• 3 Posts
  • 112 Comments
Joined 1 year ago
cake
Cake day: October 6th, 2024

help-circle




  • I don’t think this will work within the context of a feed of posts. You would have to make at least 1 additional comment for every post in the feed to fetch the comments for a post. So if you fetch a feed of 50 posts, you will have to make 51 requests. If a post has too many comments to fetch in one page, you will have to iterate through all the pages until you have all the comments. So it’s actually >=51 requests. Though I suspect you could get a good idea of a posts comments by fetching just the first page of comments.

    PieFed seems to have tags, but I’m not exactly sure how they work. But that might be a better place to start.







  • Not that you should vibe code, but you could vibe code this so easily. Have it output a static website. Give the source code a scan if you’re paranoid. Check the network tab if you’re really really paranoid. But literally you could have it output this as a static index.html file that you drop into your browser of choice.

    This is the only type of coding LLMs should ever be used for imo. A small, very clearly defined task that is very easy to verify if it works. And code that won’t infect a larger project.

    Edit: as others pointed out, that url isn’t base64 encoded. You would have to clearly define what you are trying to do if you want this to work. For example, do all urls follow the same format as the above?




  • I wonder how that works. The point of password hashing is to uniquely scramble your password. So userOneHash(“password”) should give a different output than userTwoHash(“password”) even if they use the same password. So your password manager shouldn’t really be able to generate the same password hash since an infinite number of hashes can be generated from the same password.




  • But if you use a salt that is global to your site/server, you still have this problem: If a hacker cracks “p@ssword” in your database, they immediately know all users that also use “p@ssword”. Imo the biggest benefit of using salts is two users with the same password get different hashes. Right?

    I’m not saying using a global salt isn’t better than no salt, but I do think you’re missing out on a huge benefit of using a per hash salt. Keep in mind I’m a frontend engineer not backend or security lol.



  • moseschrute@lemmy.worldtoTechnology@lemmy.worldPlex got hacked.
    link
    fedilink
    English
    arrow-up
    10
    ·
    edit-2
    1 month ago

    I don’t think that’s how salts work. I might be wrong, but I think it works like this

    Password + Salt -> Hash

    • “p@ssword” + “hakf” -> “hifbskjf”
    • “p@ssword” + “jkjh” -> “gaidjshj”
    • “p@ssword” + “afgd” -> “afgdufj”

    Notice how those 3 users use the same password, but the different salts results in 3 different hashes. That doesn’t make it any harder to crack a single hash, but it means I have to crack the same password 3 times. It just slows down password cracking.

    Edit: my explanation isn’t wrong, but I didn’t understand the pepper part until now. So I understand the above now.


  • But if you can solve the hash by generating password guesses, hashing them, and comparing them to the hashed passwords in the database. Say I hash “p@ssword” and I use the salts sorted in the stolen database. I find that jon@example.com uses “p@ssword”. I then go to Amazon.com, login with Jon’s account, and order a bunch of stuff to my address.

    Salt just makes it so I can’t hash “p@ssword” once and find everyone with that password the database. Instead I have to hash “p@ssword” multiple times. It really only slows me down.

    I’m not a security expert, can someone tell me if I got that right?