Yes. 127.0.0.0/8 is reserved IPv4 address space for Loopback. It is perfectly valid, and occasionally useful, to use other loopback addresses that are functionally identical, like 127.0.1.1 or 127.0.0.53, which carry semantic information for the initiated, like “53? Must be DNS-related, obviously!”
Gyroplast
- 0 Posts
- 9 Comments
Gyroplast@pawb.socialto Programmer Humor@programming.dev•My version of a for loopEnglish4·23 days agoWow… I… I did not expect such density of triggers in a single panel. Trolling truly is a art. The more you look, the worse it gets. I love it.
Gyroplast@pawb.socialto Programmer Humor@programming.dev•You can't "skill issue" yourself out from every situationEnglish8·2 months agoThey were holding it wrong, obviously.
What AI-generated, non-working, obviously incorrect garbage is this? Also, you want to define this as an alias to type the command 33% faster, too!
alias fc='ffmpeg -c copy -map 0:0 -f data - 2>/dev/null -i '
Amateurs.
“I’m not alone here. Gotta setup a k-line to this surfer’s cyberjack and ice his codes before he cracks my firewalls!”
Gyroplast@pawb.socialto Programmer Humor@programming.dev•me when i find out i can use ssh to sign my git commitsEnglish71·3 months agoConsider a key pair, consisting of two brutally large numbers, but otherwise pretty much identical. Magical math exists that makes it so that if you math your data with one of these brutally large numbers, you get the original data back only if you math it with the other large number. That’s basically it.
Now we slap convention onto this, and keep one of the paired, large numbers a secret, and call it our private key, the other number is disseminated and called the public key for that reason.
Now everyone can math data with your public key, so that only the paired private key, which only you know, can de-math it. This is encryption/decryption.
Signing is very similar, but now you use your private key, which only you know, to math a digest of your data, and all the world can de-math this correctly only with your public key, thus proving it was indeed your private key used to math the data in the first place, and by extension attribute the signature to your public key identity. Your private key is never known to anyone but you, which is an essential difference to “classical” symmetric encryption with a shared secret.
You may realize how easily a code signature can become a liability, if you fail to keep your private key secret for any reason. You can be trivially impersonated, with basically no chance of recourse or deniability with an SSH key, while you can at least invalidate a GPG key publicly and mark it as “stolen” that way. This is potentially very important, if there’s any legal meaning attached to your signature, and if not, why bother with code signing in the first place, if “trust me bro” is well enough.
Gyroplast@pawb.socialto Programmer Humor@programming.dev•Connecting to the wrong server27·6 months agoProbably molly-guard.
This reminds me of the tale of the coder tasked to write an input validator for IPv4 addresses. Poor bastard.
Another fun one:
0177.042.017.066
PSA: Don’t zero-pad your IPv4 octets. Decimal is for simpletons.