this post was submitted on 26 Jul 2025
866 points (99.0% liked)

Programmer Humor

25282 readers
1550 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 2 years ago
MODERATORS
 
top 50 comments
sorted by: hot top controversial new old
[–] NigelFrobisher@aussie.zone 4 points 3 hours ago

You could say they “spilled the tea”.

[–] zarkanian@sh.itjust.works 12 points 12 hours ago (1 children)

These people should serve jail time. I'm not kidding.

[–] percent@infosec.pub 8 points 11 hours ago* (last edited 11 hours ago)

I'm no lawyer, but this seems like at least grounds for a class action lawsuit, I would think. Like, it seems like privacy and security is implied (however ironic for an app like this) when requiring users to upload their PII.

Also, I assume their privacy policy didn't mention that they were just gonna publish their users' PII.

[–] gonf@lemmy.world 4 points 10 hours ago

Almost definitely both were involved.

[–] HugeNerd@lemmy.ca 2 points 10 hours ago

Guess someone spilled the tea

[–] JackbyDev@programming.dev 32 points 23 hours ago* (last edited 22 hours ago) (2 children)

Hack has at least two definitions in a computing context.

  1. A nifty trick or shortcut that is useful. "Check out this hack to increase your productivity."
  2. Accessing something you shouldn't. "They hacked into the database."

A lot of times they sort of get used in conjunction to describe interesting ways to gain access to secure systems, but using it to describe accessing insecure things you shouldn't is still a valid usage of the phrase.

That said I definitely wanna see the company face charges for this, this is insane.

[–] SpaceCowboy@lemmy.ca 17 points 21 hours ago (3 children)

Yeah, if I leave my house door wide open for a few weeks and I get robbed, it's still burglary.

[–] Rivalarrival@lemmy.today 5 points 4 hours ago

Terrible analogy. A webserver is not at all like a door. It doesn't block or allow traffic to and from your file system.

A web server is more like a receptionist. It handles requests. "Can I have your basic catalog?" "Certainly, here you go."

"Can I get this item from your basic catalog?" "Certainly."

"I don't see it in your catalog, but my buddy said he got this other item from you. Can I have this other item too?" "Absolutely."

"Can I borrow your stapler?" Sure. "How about a pad of paper?" "Of Course". "Can I just have the contents of your supply closet?" "Here you go." "How about your accounting files, can I get those?" "No problem!" "How about your entire customer list?" "Consider it done!"

When you hire a receptionist and specifically tell them to give customers anything they request, that's entirely on you. You have to at least make a token effort to restrict access to only authorized users before you can even claim that a particular user was unauthorized.

This wasn't burglary. This was putting up signs that say "come in" and labeling everything in your house with "free" stickers.

[–] grendel84@tiny.tilde.website 11 points 21 hours ago (2 children)

@SpaceCowboy @JackbyDev

In a legal context there's also the concept of a "reasonable expectation of privacy". The computer abuse and fraud act defines hacking as accessing data or systems you are not authorized to access.

A better analogy is putting your journal in a public library and getting mad when somone reads it.

I'm not saying what these ass holes did was right, I'm saying that the company weakened their legal position by not protecting the data.

[–] SpaceCowboy@lemmy.ca 7 points 19 hours ago (1 children)

Terrible analogy. You have permission to read books in a library.

Forgetting to lock your door isn't granting permission to people enter your house, and it doesn't grant people permission to take your valuables. It may be neglectful to leave your door unlocked, but it doesn't imply granting permission to enter your house.

Same goes with computer security. Leaving your computer insecure may be neglectful, but it does not imply someone has permission to take your data.

[–] grendel84@tiny.tilde.website 1 points 17 hours ago (1 children)

@SpaceCowboy

Then how do I know what I am not allowed to access?

In this specific case there was no (formal) indication that the data was out of bounds.

I can't put 10 pdf files in a web dir and claim 5 are public and 5 are private, then charge you with a crime for viewing them.

You can't have "unauthorized access" when there's no authorization at all

[–] SpaceCowboy@lemmy.ca 2 points 17 hours ago (1 children)

If I'm clicking around on a website and find a gallery of images, that's something I'm supposed to have access to. If I start typing in URLs that aren't linked anywhere on the site, then I'm accessing stuff the site hasn't explicitly indicated I have access to. If I'm doing this with the intent of getting data and distributing to others, then yeah that would be illegal.

The law allows for someone to exercise judgement. The people who do this are not so coincidentally called Judges. If the 4chan guys had have been white hat and reported the issue to the site owners, then they'd be fine. But it's obvious to anyone their intent was to get private information, they poked around to find some private information, and then distributed that private information to others causing a privacy violation. Yes, it was easier to do than it should have been, but it's obvious they had malicious intent and it's obvious they were accessing information they weren't supposed to access.

A crime being really easy to commit doesn't make it no longer a crime. Many times I've seen things that I could easily steal, but I don't steal things when I have an opportunity to do so because a) stealing is wrong and b) saying "they just left this thing out there in a place anyone could steal it" would not be any kind of legal defense. Simply because you're presented an opportunity to do a crime doesn't mean it's acceptable to do a crime, both legally and morally speaking.

[–] Rivalarrival@lemmy.today 1 points 3 hours ago

I start typing in URLs that aren't linked anywhere on the site, then I'm accessing stuff the site hasn't explicitly indicated I have access to.

Doesn't work like that. With the policy you describe, anyone who ever sees a "404" error is a criminal.

I don't have to publish everything I am willing to offer. You are free to ask for something I may or may not have. I get to decide how to respond to your request.

To use your analogy, I can walk up to your door and request a glass of water. You've never explicitly offered a glass of water to anyone; I'm still allowed to ask. If you dont want me to have your water, you can say "No" or you can ignore me.

When you go ahead and give me a glass of water, you don't get to claim I stole it from you. It is not theft to ask.

You have to make some sort of effort to have your web server limit my access, and I have to make some sort of effort to convince your webserver to bypass those restrictions before you can claim I am exceeding my authorization.

[–] iii@mander.xyz 5 points 20 hours ago (1 children)

A better analogy is putting your journal in a public library and getting mad when someone reads it.

Good analogy indeed. I'd go one step further and add: it's like promising others you'll keep their diary safe, then putting it in a public library, to then get mad when someone reads it.

[–] grendel84@tiny.tilde.website 6 points 20 hours ago (1 children)

@iii

Yeah the internet by design is a public space, and we must be responsible and treat it as such when handling sensative data.

Again, it was very wrong for people to take that data and especially to post like that.

The company also has to do their part and produce at least some kind of barrier to the data.

Even using UUIDs and making sure the data wasn't query-able would have been something.

[–] silasmariner@programming.dev 3 points 18 hours ago (1 children)

The web is a public space by design. The internet? I don't think you can make that case well. Https and all that. Private infra abounds.

[–] iii@mander.xyz 1 points 8 hours ago

The data was on the public web in this case

[–] JackbyDev@programming.dev 7 points 21 hours ago

Thank you! I feel like I'm taking crazy pills reading people's reactions to this. And if it was a business instead of your house and it was customer data you weren't protecting you should still be in trouble too. It's like people think only one side can be in the wrong in this or that because the data wasn't secured and in the public that gives them free reign to post it everywhere. I wonder how those people would feel if their addresses were leaked. Afterall, if you're a homeowner your name is attached to the property and is publicly accessible.

[–] spicehoarder@lemmy.zip 12 points 22 hours ago (3 children)

No, this was a data leak. The word "hack" has legal implications and shifts the blame away from the company and onto the individual who discovered the leak.

[–] JackbyDev@programming.dev 6 points 22 hours ago (1 children)

It can be both. The company can be at fault for not keeping something secure while the people who steal the data are at fault for stealing data. Data leaks and hacks are not mutually exclusive.

[–] percent@infosec.pub 1 points 11 hours ago

I don't disagree with your main point, but I'm not sure it's really even "stealing", as that means to take without permission. In this case, the storage permissions were configured so that the files were publicly available to everyone, so everyone had permission to access them.

Semantics though. It's still unethical to access that data, even if it's not technically stealing.

[–] indepndnt@lemmy.world 3 points 22 hours ago (1 children)

Based on this comment alone, I am 100% sure that you are not a lawyer.

load more comments (1 replies)
load more comments (1 replies)
[–] m3t00@lemmy.world 5 points 17 hours ago

dev came from marketing. pictures wouldn't show up with all that security enabled.

[–] angstylittlecatboy@reddthat.com 12 points 22 hours ago

At this point I think the women using it got psyopped

[–] grrgyle@slrpnk.net 13 points 22 hours ago (1 children)
[–] finitebanjo@lemmy.world 14 points 21 hours ago (2 children)

An app called Tea™ was marketed as a safespace for women and used government issued IDs as a way to verify users.

4Chan users leaked all of the IDs onto the larger internet.

[–] RampantParanoia2365@lemmy.world 4 points 11 hours ago (1 children)

So it essentially became a honey trap, either through malice or sheer incompetence.

[–] finitebanjo@lemmy.world 2 points 11 hours ago* (last edited 10 hours ago) (1 children)

Well, I get what you mean, but a "honey trap" idiom in English, also called a "honeypot scheme", usually refers to utilizing romantic connections to influence people to make decisions or release confidential information.

[–] ICastFist@programming.dev 1 points 1 hour ago

Honeypot is a common term in computing/cybersecurity, setting up fake important servers so bad actors invade and the security team can analyze what got in and how to deal with it.

[–] grrgyle@slrpnk.net 10 points 21 hours ago

Wow what a fuckin shitshow. I have so many follow-up questions

[–] Diplomjodler3@lemmy.world 24 points 1 day ago (4 children)

I always get irrationally angry when i see python code using os.path instead of pathlib. What is this, the nineties?

[–] UndercoverUlrikHD@programming.dev 3 points 18 hours ago (1 children)

What big advantages does pathlib provide? os.path works just fine

[–] Diplomjodler3@lemmy.world 8 points 18 hours ago (2 children)
  • Everything is in one library which offers consistency for all operations.
  • You can use forward slashes on Windows paths, which makes for much better readability.
  • You can access all the parts of a pathlib object with attributes like .stem, .suffix or .parent.
  • You can easily find the differences between paths with .relative_to()
  • You can easily build up complex paths with the / operator (no string additions).

Just off the top of my head.

[–] brucethemoose@lemmy.world 1 points 11 hours ago* (last edited 11 hours ago)

I suppose os.path is simpler? It's a string and operation.

Python is all about 'attention efficiency,' which there's something to be said for. People taking the path of least resistance (instead of eating time learning the more complex/OOP pathlib) to bang out their script where they just need to move a file or something makes sense. I'm with you here, but it makes sense.


...Also, os.path has much better Google SEO, heh.

[–] nibbler@discuss.tchncs.de 1 points 17 hours ago* (last edited 17 hours ago) (1 children)

if you don't need those, why burden the program with another dependency?

[–] Diplomjodler3@lemmy.world 2 points 17 hours ago

It's in the standard library, just like os or shutil.

[–] Gonzako@lemmy.world 10 points 1 day ago (1 children)
[–] axEl7fB5@lemmy.cafe 7 points 23 hours ago

Be the change you want to see in the world.

[–] indepndnt@lemmy.world 5 points 22 hours ago

And what's with the string addition? Never heard of f-strings or even .format()?

load more comments (1 replies)
[–] m3t00@lemmy.world 2 points 17 hours ago

crack heads, meth heads, what's the diff

load more comments
view more: next ›