• 1 Post
  • 136 Comments
Joined 1 year ago
cake
Cake day: June 13th, 2024

help-circle

















  • TV.

    I hate the smart-TV workflow, its a terrible user experience: Turn the TV on… wait for the smart-TV OS to load… land on an app menu… navigate around and choose an app… wait for the app to load… select a profile… wait for the list of shows to load… scroll almost endlessly through shows… choose a show, finally… wait for the video to load…

    I miss when you turned the TV on and it was just instantly playing whatever channel you last had on, with one single interaction. I miss not having to make the conscious choice of what to watch and feel overwhelmed by so many options. I miss TV programs being a common experience, like an event, that everyone would be talking about together the next day, instead of everyone watching their own thing on their own schedule.



  • If you want to see the source code of Photoshop, you actually need to work for Adobe. Otherwise, you need to be some kind of freaking retro-engineering expert.

    What you’re describing is known as “security through obscurity”, the practice of attempting to increase security of a system by hiding the way the system works. This practice is highly discouraged, as it is known to not actually be effective at increasing the security of a system.

    Security by obscurity alone is discouraged and not recommended by standards bodies. The National Institute of Standards and Technology (NIST) in the United States recommends against this practice: “System security should not depend on the secrecy of the implementation or its components.”

    https://en.wikipedia.org/wiki/Security_through_obscurity#Criticism

    Isn’t that actually also helping hackers?

    No, by sharing the implementation details of the system, it helps those trying to keep it secure by allowing anyone to inspect, discover, and contribute fixes to security flaws.

    Open-source software is not perfect and is suceptible to security flaws and vulnerabilities, but it is better and more secure than closed-source software in every way. Every risk that applies to open-source software also applies to closed-source software, but worse.