• 9 Posts
  • 46 Comments
Joined 2 years ago
cake
Cake day: June 18th, 2023

help-circle
  • Yeah, the last 5 jobs (of 6 jobs) I’ve had I’ve applied with a markdown file or just a link to the rendered webpage in an email, IIRC.

    In my head at least, it helps me filter for companies/managers that appreciate a hacker mentality. I also suspect it might help the applicant tracking systems parse my shit more correctly since it’s just plaintext. (Though the opposite could also be true since I assume the vast majority of submissions would be PDF.)


  • I wrote my CV in markdown for my website. I just submit the markdown file as the resume. For the few jobs I’ve applied to that have required a PDF, I just copied the text from my webpage (to get rich text formatting) into LibreOffice and exported as a PDF.

    Though, I might not not be the best example to follow, I’ve been unemployed for almost 6 months.



  • I’m in the process writing my own version of webscript.io, an old service that died back in 2017. It was a dead simple service that would run a Lua script for each HTTP request that came in to a URL. It sounds pretty trivial, but it was remarkably useful for hacking together little scripts for things like watching webpages for changes, little custom APIs for DIY IoT devices, translating from one API to another, and other simple stuff like that.

    I’ve got enough of it built that I’ve been able to make a few actually useful things with it already. A few different job posting website scrapers were the first thing I made. I also made a little script that queries a live traffic api and sends my wife an estimated drive time for her commute home. The plan with that one is to watch the drive time as it’s getting closer to the end of the day and if it starts spiking earlier/worse than normal, it can email her letting her know she should leave early if she can.





  • So what you meant was: this isn’t enough evidence to change my mind.

    No.

    One thing getting more upvotes than another isn’t somehow evidence that reddit is manipulating anything. There’s no immutible law that the original source of something should naturally get more upvotes than anything else. I find that the opposite is most often the case, even when the re-blogged story is crap.


  • That is not a repost, this is an other article from ProPublica

    Ah, I just assume that was a slightly different title for the same article. Maybe a mod made the same assumption.

    Are you joking with me? They are using a paraphrased title.

    Well, the first part is. But, I don’t know what “munching” means. The second part of the Ars title actually says what it’s about. Don’t get me wrong, I can probably make a guess. But when you’re scrolling social media, I don’t think anyone is stopping to think about what a title really means. If it’s not obvious at first glace most people are just scrolling by. The Ars title, at least to me, skims as “AI bad” since those are the words anchoring each end of the title, that’s probably enough all by itself to get some people to upvote.

    I am really curious, what sort of evidence you want/expect to see?

    Literally anything vaguely conclusive. I’m not saying you should go find more evidence for me or anything. I’m just trying to explain why I don’t find your evidence here convincing.

    I suspect that Reddit has more than enough money to be competently shitty. So, if they are doing what you suggest, unless they fuck up or decide they don’t care, you might not be able to find solid evidence.


  • I don’t think that shows what you say it does.

    First, deleting a repost is clearly not evidence of any kind of bias.

    Second, maybe Ars is just more popular/trusted? Maybe it’s more upvoted because the Ars title is more meaningful, it’s super well known that people mostly only read the title.

    I’m not saying reddit isn’t manipulating things, I’d be shocked if they weren’t. But this isn’t really evidence that they are.





  • I don’t think is is a backdoor. At the moment I wouldn’t consider this article any more than FUD.

    It’s unclear to me if the security company has actually said what the vuln is or not, but if it’s what was presented in the slides linked in the article this is at worst something that can be “attacked” from a computer connected via USB (and I’m pretty sure it would also require special software already on the ESP32), where the attack is sending out possibly invalid bluetooth messages to try to attack other devices or flashing new firmware to the ESP itself. It’s not a general “backdoor” in the ESP32 itself. At least that’s the best interpretation I’ve been able to make. Happy to be corrected if anyone finds more info.