Please leave me alone we are sleeping
Posts by Brett Lamy
@colinhacks.com can you cut a release on deno.land
latest release is 3.25
deno.land/x/zod@v3.25
Raise your hand if you would trade bank accounts with a former macromedia employee.
You’re absolutely right! That is annoying I will try to not use this in my future responses.
Anthropic please stop the side project is already dead. You guys blocked it months ago.
What about the anti JavaScript typescript club.
O3-Pro is the worst model I have ever used.
How is can’t install packages a partial outage?
What if they were called collections and they were public and everyone could see your collections.
- Bsky product manager probably.
Tesla stock is too high should be $4.20 a share.
Are you saying that these pigs are in a blanket?
Speed up your CI builds with this one simple trick.
rsc is the hand basket that sends your components to hell
<marquee> comes before anything else. We can support <b> tags in q4
It's ugly but it (kinda) works
github.com/blamy/bolt.new
I also got a failing grade on this project because “my code wasn’t clear enough”
github.com/BLamy/ISTE-3...
I remember there was a beautiful period of time where electron had nodeIntegration on by default in the render process no preload script and I went wild with impossible components.
Then the haters (security team) got to me.
github.com/DiamondEleme...
GitHub Copilot agent looping is horrendous. 90% of my messages are just "okay do it"
Inside every senior engineer there is one wolf.
But then you will miss bangers like this.
bsky.app/profile/thel...
Could I use the same passkey to be both sent to the server for login and also use it to derive my client side encryption key?
Or does that mean my server would be able to decrypt the data making it no longer zero knowledge.
That’s fair. This was mostly just a POC but will definitely look into secure recovery options if I run with this idea further.
Right now the goal is to present it to the user as a 2 factor auth step so the user experience is the same.
The fact that I’m encrypting their data is abstracted away.
The argument being that if users loose their passkey they lose access to their encrypted data?
Or is this approach some how insecure?
Apple keychain and other password managers will sync your passkeys so you can easily encrypt your data on any of your devices.
password manager made with chef
Screenshot of the database showing the data is encrypted before being sent to convex
Webauthn allow you to e2e encrypt user data
Here is a password manager I built with @convex.dev's chef but after you login it ask for a passkey and that passkey is used to encrypt your passwords before sending them to the server giving to you Zero Knowledge convex setup chef.show/56627f
Claude 3.7 sonnet is cracked. People having issues with drive by refactoring are not being specific with their prompts.
And by specific I mean they should be passing in massive test files that explain why the code works the way it currently works. Otherwise Claude just assumes it’s not important.
Similar to how a bundler can build your app for different envs (web, native, electron) it can also abstract how you communicate between them.
Sure RSC's streaming concurrently suspended components is impressive.
But I just like co-locating code without thinking of RPCs.
github.com/BLamy/vite-p...
how is rating tied to what is being rendered at all?