Wow, after 25 years of Unix experience, I learned that you can filter output in #less.
Press ampersand (&) and enter a regex to show only lines matching the regex.
Press ampersand (&) and then exclamation mark (!) to apply an inverse filter.
Last week an update arrived in PureOS with improvements for #Librem5 call audio. You should be more legible to your interlocutors during calls; also, the phone now automatically switches to external wired microphone once connected. The whole audio path went through a big overhaul, allowing for hardware volume control with zero-cross and reducing unnecessary amplification that could cause distortions.
Haven't seen people complaining about the changes so far - that's a good sign :)
@mayread3 I only started weaving as a hobby a year ago but I find it to be a really nice and relaxing way to spend some of my free time. It's a great departure from my day job and exercises a different part of my brain.
I've also found it to be really rewarding (and appreciated) to gift things I've made, so I've ended up devoting more of my free time than normal during the holiday season to weaving so I can make presents!
Desktop-sized Fully Automatic Loom is an Electromechanical Marvel
https://hackaday.com/2022/11/28/desktop-sized-fully-automatic-loom-is-an-electromechanical-marvel/ #weaving #electromechanical #hackaday
A recent scoop by Reuters revealed that mobile apps for the U.S. Army and the Centers for Disease Control and Prevention (CDC) were integrating software that sends visitor data to a Russian company called Pushwoosh, which claims to be based in the United States.
But that story omitted an important historical detail about Pushwoosh: In 2013, one of its developers admitted to authoring the Pincer Trojan, malware designed to surreptitiously intercept and forward text messages from Android mobile devices. https://krebsonsecurity.com/2022/11/u-s-govt-apps-bundled-russian-code-with-ties-to-mobile-malware-developer/
@artcollisions Dibs!
Apple has limited Airdrop in China to prevent it from being used by protestors. https://qz.com/apple-airdrop-china-protest-tool-1849824435/amp
Hey friends! https://ottawa.place is now open for signups 🎉🇨🇦❤️
@andrew and I built it as a hosted-in-Canada, capital-region-focused (but open to all Canadians) instance.
Please boost so folks can find us! 👀
#fediverse #twittermigration #canada #ontario #ottawa #canpoli
You should be mindful of the degree to which vendors can remotely control the hardware and software you buy.
Even if you are privileged enough to live in a country where the government doesn't force vendors to push features that squash public dissent and protests, or aid government surveillance, there is no guarantee it will always be that way. If the capability is there, some will be tempted to (ab)use it. #privacy #surveillance
@kashhill Hashtags actually do mean something on this platform and after following interesting people (and possibly people they boost), searching for and following hashtags (and using them yourself) is the next way to find interesting conversations. Many people also put hashtags in their profile to advertise the types of topics they discuss. For instance searching #privacy would likely turn up quite a few conversations.
@IPXFong Compared to the Stahly razors, the Fat Boy handle seems positively tiny! At least the way I hold my razors, the size of the handle hasn't even been something I've noticed. There *is* a subtle difference shaving with it compared to my Slim on the same setting, but that also could just be slight differences in technique when holding the two razors.
@mayread3 Thank you!
Project use-up-the-rest-of-this-warp is well under way. I decided to weave enough fabric for another tote so the warp doesn't go to waste and this time I'm going with a color scheme inspired by leaves (brown, green, orange and red). I don't have any plans for this tote so I'm actually just going to weave the fabric and then set it aside so I can get to the other weaving projects in my queue. #weaving
@hacks4pancakes [Context of these questions is around attackers who gain access to exploit later vs those who take advantage immediately.]
What are the average incubation times between an attacker getting a foothold in a system and discovery? Are there particular things they do that blow their cover?
@Kymberly The closest to a solution I know of is to tie temporary heddles using loops of thread (many floor loom weaving books have examples of how to tie one-off heddles). Then you can move the mis-threaded warp to those temporary heddles and remove them once you are done weaving.
Technical author, FOSS advocate, public speaker, Linux security & infrastructure geek, author of The Best of Hack and /: Linux Admin Crash Course, Linux Hardening in Hostile Networks and many other books, ex-Linux Journal columnist.