You've gotten some good answers already so I'm going to comment on something unrelated, mostly because I've had a couple glasses of wine and for some reason found this hysterical.
I've googled with a few search engines....
I'm old enough to remember search before Google, the rise of Google and the verbification of Google's name to become a term to meaning to search with Google. To see it now used in this way is deeply funny to me for some reason. Incredible to see how language evolves over time.
Back when I was in college I took a computer engineering class around 2010 I think with a professor who had done CPU design at one of the big chip manufacturers. He had a story about how no human knows how they work anymore because they'll do the designs, then feed them through some optimization algorithm thing before the fabrication. Then when they would evaluate the chip they'd find that it was behaving in completely unexpected ways due to the optimization finding crazy efficient but unintuitive (to a human) ways of performing different operations.
I wish I could remember the details of what he talked about better, but that was a long time ago.
Your comment made me curious, so I tracked it down.
The "comic" was used with an article on differential privacy written by a publication called "ad exchanger" and the ad symbol on the outfit is their logo.
He is best known for his role in the creation of Netscape Navigator, Netscape Mail, Lucid Emacs, Mozilla.org, and XScreenSaver. He is also the proprietor of DNA Lounge, a nightclub and live music venue in San Francisco.
Definitely the worst, a C# .net mvc application with multiple controllers that were 10s of thousands of lines long. I ran sonarqube on this at one point and it reported over 70% code duplication.
This code base actively ignored features in the framework that would have made things easier and instead opted to do things in ways that were both worse, and harder to do. For example, all SQL queries were done using antiquated methods that, as an added benefit, also made them all injectable.
Reading the code itself was like looking at old school PHP, but c#. I know that statement probably doesn't make sense, but neither did the code.
Lastly, there was no auth on any of the endpoints. None. There was a login, but you could supply whatever data you wanted on any call and the system would just accept it.
At the time I was running an internal penetration test team and this app was from a recent acquisition. After two weeks I had to tell my team to stop testing so we could just write up what we had already and schedule another test a couple months down the line.
I once saw an application that would encrypt (not hash, encrypt) passwords but then when a user was logging in, they'd encrypt the password candidate and then compare the cipher texts to see if they were the same. This was using 3des, so no IV.
I just recently joined a company that offers two options for operating systems, Mac or Linux. Windows is explicitly not allowed. Seeing that in my onboarding paperwork was like walking into a warm sunny meadow.
There's a great interview somewhere with the writers of one of these shows talking about how they knew this was shit and they had unofficial competitions with other shows to constantly one up each other on the stupidity.
Keep fighting the good fight.