• 0 Posts
  • 51 Comments
Joined 9 months ago
cake
Cake day: October 7th, 2023

help-circle










  • Ha

    You should hear of the method of pretending you’re at breakfast or some other anthropomorphized situation, where you name things as butter and cheese, knife and bread, tea and teapot

    Then there’s Hungarian notation which is actually used seriously. But I can’t give an entertaining example only s boring and probably inaccurate one.








  • If Json wasn’t status quo, coming from a language that’s status quo, all these comments could be reversed against it.

    And well, if you’re not using JavaScript, Json is not that great anyways.

    What I like about graphql that Json over rest doesn’t have it: fragments and types.

    On types: have you ever got across bad swagger documentation? Like a parameter called something unclear like usertype, with no explanation of what it is or examples, ? Oh yeah, it’s a string. Very helpful. Well in graph ql, that parameter is likely to be called userType, which if you go into the schema file, you’ll likely see it’s an enum and you’ll also see all possible values. If your backend developer is half decent you’ll also get comments right there next to the enum. You don’t need a tool to spit out a html page that you’ll host somewher. Most reasonable information can be part of the schema file, and that’s it.

    All that said, everyone now is familiar with Json and rest. Because of that, small projects are better doing it. But that supremacy will eventually end. And for large projects, specially with static types, graphql makes some things much easier, like types, fragments and unions.



  • trolololol@lemmy.worldtoProgrammer Humor@lemmy.mlthat ain't legal either
    link
    fedilink
    arrow-up
    2
    arrow-down
    1
    ·
    edit-2
    3 months ago

    Another speculation from the suse team was a private company with intent to sell the exploit to state across actors

    I think there’s lots of known backdoors that are not publicly disclosed and privately sold.

    But given the history of cves in inclined to believe most come from well intentioned developers. When you read the blogs from the Google security team for example, it’s interesting to see how you need to chain a couple exploits at least, to get a proper attack going. Not in this case, it would make it very straightforward to accomplish very intrusive actions.