Show more

I like it when something has the function its appearance suggests.

If you installed a Linux system with disk encryption more than a couple of years ago, there's a decent chance it's using a weak key derivation function and someone who cares enough would be in a position to brute-force it. mjg59.dreamwidth.org/66429.htm has more details and instructions on how to update to a better KDF.

I certainly don't have all the answers, and this is by no means an original topic, but I would like to prompt some thoughts and discussion... There are tons of examples in the bible of giving to the poor and needy, lots of examples of being generous, there is no question that it's a good thing to do... But we don't want to be enabling people to continue in a bad situation, of course the obvious example is them spending any money given to them on drugs and alcohol or whatever... (I've heard that's especially bad here in AK)
I personally believe that the best solution is to give generously anyway (we don't want to make it a test that they have to pass or something) and follow up with spending some real time with them, getting to know their real needs, loving on them, etc. But obviously that takes time, and a certain level of discernment and also some gifting in that area that not everyone has... Another idea I've heard is giving out gift cards, so it's harder to use poorly... But that also limits some level of spicific blessing that we could be... Thoughts?

Why does Ctrl+W (close tab) have to be the same keyboard shortcut as deleting one word on the 😭

Show thread

Don't you hate it when you are typing something long on the , and when you hit submit, there's an error (e.g. timeout) and all your progress is lost? Or, you accidentally close the tab and when you re-open it, all your work is gone?

I was filling in a box with a lot of text, and I accidentally hit Ctrl+W ( users, ya know!!), which closed the tab. The webpage failed to inhibit closing the page or having a draft saved. Ah, well, I lost less text than this post has 😄

Those who think they have the world figured out understand it the least.

We’re at the random parts with wires sticking out dev phase.

Here we’re performing initial crude thermal tests.

Pixelfed is a photo sharing social network, the Fediverse's alternative to Instagram.

You can find out more from the official website at:

➡️ pixelfed.org

The site has a server list and app list (click ☰ if you're on mobile).

The official @pixelfed apps are in public beta testing, and there are third party Pixelfed apps available such as @vernissage for iPhone and @PixelDroid for Android.

You can follow Pixelfed accounts from Mastodon, and Mastodon accounts from Pixelfed.

An improved, I think, version:

Destination:
$ nc -l -p 10002 | pv | gpg -d --no-symkey-cache | tar -x

Source:
$ tar -cv [folder] | gpg -c | nc [dest's hostname] 10002

The `tar` `-v` flag is moved to the source host, so that you can see `gpg -d`'s output better to check that it isn't decrypting bogus publickey-encrypted data.

This uses the `pv` command too, which is optional in the pipeline and is usually not installed. It behaves similar to `cat` but with a handy progress indicator.

@lack

Show thread

Just found out a really neat, convenient way to transfer folders encrypted and peer-to-peer on Unix/Linux.

Destination:
$ nc -l -p 10002 | gpg -d | tar -xv

Source:
$ tar -c [folder] | gpg -c | nc [dest's hostname] 10002

I was aware of something like this before, but hadn't polished it off.

Among the list of reasons modern cars are unappealing to me: in addition to uploading location data, they also sometimes have cameras that upload video to the vendor. In this case employees at Tesla found the juiciest videos and shared them internally:

reuters.com/technology/tesla-w

It is a remarkable thing for a good person to lead a meaningful life in relative obscurity.

“Virgo” is the code name for the laptop we’ll manufacture at our Denver factory. This is the LCD “A” panel milled from thin 6061 aluminum bar stock.

INFORMATION SECURITY TIP: If you suddenly find that someone out there has submitted your email address to a ton mailing lists and attempted to register for things using your email address, don't shrug it off. This is potentially serious if it's being done at scale.

Why would someone do this? Assuming it's not just someone harassing you because they don't like you, the main reason someone would do this is to distract you from important email notifications by flooding your inbox with an avalanche of #spam.

If someone gets into your Amazon or eBay account, they can buy a bunch of stuff, but those orders will generate email notifications to tip you off that something is wrong. If your inbox is indecipherable, you might not see that someone is ordering stuff with your credit cards or moving money around.

If this happens to you, watch all of your e-commerce and financial accounts for unusual activity and change your passwords.

#infosec #fraud #techtips #safety #scam

Art is an interesting thing. A picture is worth a thousand words, and art has the potential to change hearts and convey meaning at a deep level.

AI art cheapens art.

I'd really hate for meaningful artwork, something that required dedication and heart to create, to be generated at a mere text prompt....

From @mullvadnet THE EUROPEAN COMMISSION DOES NOT UNDERSTAND WHAT IS WRITTEN IN ITS OWN CHAT CONTROL BILL

I know I am US-based, but I've been following this law and what a terrible thing it is. Mullvad coming with receipts to back up this headline.

#privacy #privacymatters #encryption #chatcontrol

mullvad.net/en/blog/2023/3/28/

Show more

Ethan Black's choices:

Librem Social

Librem Social is an opt-in public network. Messages are shared under Creative Commons BY-SA 4.0 license terms. Policy.

Stay safe. Please abide by our code of conduct.

(Source code)

image/svg+xml Librem Chat image/svg+xml