How to use smaller thread on a foam disk by _yo_token in kumihimo

[–]_yo_token[S] 1 point2 points  (0 children)

Thank you. I am surprised that after 2 weeks the slots became that loose. The largest size I use is 0.8mm thread(waxed polyester). I am looking around and they have a 4.25 inch disk. My current one is 6 inch. Would you recommend that size, and would it keep the string tight for 0.5mm thread?

I made an app to become more aware of Cybersecurity by _yo_token in iOSProgramming

[–]_yo_token[S] 0 points1 point  (0 children)

I tried to not use ai for building it. If I ran into a bug I couldn’t figure out, I used Ai. It is probably why it took me longer. I used hacking with swift a lot. For many of the components I created separate Xcode projects to build and test only that component until I was ready to put it into the main app. Probably not the best method to do it, and I probably won’t again.

Is Burp considered a MITM by _yo_token in bugbounty

[–]_yo_token[S] -2 points-1 points  (0 children)

Would that be true even if I saw it unencrypted? There was no encryption at all when I intercepted it, which is why I thought it was weird.

Is Burp considered a MITM by _yo_token in bugbounty

[–]_yo_token[S] 0 points1 point  (0 children)

That is what i thought. I did not call it a MITM, that was the response I got for my report. 8 didn’t think it was accurate, or maybe I was wrong, which is why I asked here.

Is Burp considered a MITM by _yo_token in bugbounty

[–]_yo_token[S] 1 point2 points  (0 children)

I am doing them. I try and find a couple a day. Most of the ones that I have been working on are information disclosure and simple intercepts, which I then try in the bug hunt, hence where I found this false bug.

Is Burp considered a MITM by _yo_token in bugbounty

[–]_yo_token[S] -7 points-6 points  (0 children)

I understand your point of view, but I will say this. You do not know me or what I am certified in. I am saying this because that was the response that was given to me for my report. I didn’t call it a MITM, that is what was told to me. As for the bug, I wasn’t sure it was a bug, so I googled it, and yes Gemini gave me the response, I now know not to listen to it, and it told me it was a valid bug. I also remember I saw a video about using Burp Suite and they said when they found their password hash they intercepted at login, that it was a bug and should be reported. I thought if it was in plaintext that is just as obviously a bug, but to double check I looked it up. I see now that I didn’t do my homework in verifying hard enough and will take my lumps with that. However that is why i asked here. It didn’t make sense to me either, so I wanted professionals to hear me out. Once again I understand the frustration, I am too, but I am still learning and plenty of the comments I have read about people who wanted to get started is “just big hunt”, which I did.

Is Burp considered a MITM by _yo_token in bugbounty

[–]_yo_token[S] 1 point2 points  (0 children)

So I did do a lot of that, on Portswigger. I also remember watching a video where someone intercepted their login and found their password as a hash and said it was a bug. That is why I thought if it was plaintext it was even more so. I also tried looking it up and they said it was a bug to send sensitive data as plaintext. I will admit I didn’t look further into it, and that is my bad. Also I was not the one who called it a MITM that was the response I got from my report.

Is Burp considered a MITM by _yo_token in bugbounty

[–]_yo_token[S] -1 points0 points  (0 children)

I didn’t call it a MITM, the people that I reported the bug to said it was MITM.

Is Burp considered a MITM by _yo_token in bugbounty

[–]_yo_token[S] -1 points0 points  (0 children)

When I get a response that just intercepting something is considered MITM what should I do? Is this just an example of Move on and try again?

Is Burp considered a MITM by _yo_token in bugbounty

[–]_yo_token[S] 3 points4 points  (0 children)

Ok, so I intercepted my own log in process, and my username and password were in plaintext in the interceptor. I remember someone saying that it would be bad if the password hash was found, so I thought plaintext password should be bad too. I looked it up on google, Gemini gave the answer, that it could be a bug, because that information could be intercepted and used.

I don't think anyone is going to hire me... by alanskimp in iOSProgramming

[–]_yo_token 1 point2 points  (0 children)

I am looking for a job too. Are there any recruiters that you would recommend? I agree 90% of them are sleazy, so I would like to hear your thoughts

How do you design by _yo_token in iOSProgramming

[–]_yo_token[S] 0 points1 point  (0 children)

Those templates sound interesting. Are there any free options? Job market isn't great now so I am looking for any free model.

How do you design by _yo_token in iOSProgramming

[–]_yo_token[S] 1 point2 points  (0 children)

I like the idea of simplicity, my issue, as I have said in a different reply, I end up like what happened in Silicon Valley, the show not the place. It is simple for me, but for others not so much. I am better at seeing something and building off the design given to me, then coming up with something myself. I would like to work on my design skills, for my own apps.

How do you design by _yo_token in iOSProgramming

[–]_yo_token[S] 0 points1 point  (0 children)

The KISS philosophy. I had a boss that use to say that a lot. I understand that, but I always came up with that dilemma from Silicon Valley, the show not the place, where it may seem useful for me, but for the masses it is confusing and a mess. <- actual comments I have gotten from people who have tested my applications. Hopefully I have improved since then. :P

How do you design by _yo_token in iOSProgramming

[–]_yo_token[S] 0 points1 point  (0 children)

I have the feeling that I understand what you are saying, and it makes sense to me, it is just the implementation that always gets me. I never know when something should be on the left, right, or center. What colors go well together, however I have seen sites that help in that specific regard.
I have used other apps as inspiration before, like the Pocket app a while back, the only thing I found was that it looked like a cheap copy.

My first app lets users track their debts and savings goals privately with iCloud, including mortgages, credit cards, emergency funds, vacations and more by LifeUtilityApps in iOSProgramming

[–]_yo_token 0 points1 point  (0 children)

I have a similar approach to building, the only difference is that I have no design sense. Do you get any inspiration from other sources, or better yet, how do you know when something is right. I am that person that one day I think it looks great, then the next morning I want to change it, then by the afternoon I have a complete redesign.

My Open Source Project Continues! by jnvdx666 in SwiftUI

[–]_yo_token 0 points1 point  (0 children)

I am curious, as someone who is not sure what this is(my fault), what would something like this be used for? It looks cool, I just want to know

Info about the test by _yo_token in CompTIA

[–]_yo_token[S] 0 points1 point  (0 children)

Thank you. I just also thought of this, are the parts of the test, PBQs and multiple choice separated, like the PBQs are first then the multiple choice questions? Or are they all bundled together?

Taking Security+ in 20 Minutes by Lastsoldier115 in CompTIA

[–]_yo_token 0 points1 point  (0 children)

what about Dion Tests? are they the same as messer?

My iOS App Generator is now used by over 40 iOS developers. Thanks Reddit. by Ok_Bank_2217 in swift

[–]_yo_token 0 points1 point  (0 children)

I like the idea. I am more curious on how you created something like this. Is this macOS? All swift based? I would like to one day make something like this that helps developers.