sxan

joined 2 years ago
[–] sxan@midwest.social 1 points 18 hours ago

This is very true; that's just plain Capitalism, and the government takes advantage of that through simply asking for the data.

It's a great reason to never use MS or Apple software.

I'm stuck on Android, which is no better, at least until someone sells a phone that is reasonably usable as a reliably daily driver. So, I assume everything going through my phone is surveilled. It's the price I pay for not wanting to limit myself to a dumb phone; a minimalist phone that will allowed me to use a P2P encrypted chat client would be sufficient; I'd even accept Signal, although I'm not a fan. But phones like the Light Phone are just too dumb, and none provide any sort of encrypted chat. Linux based phones (or, a phone-oriented Linux distro) are almost there, though, and I'm ready to jump when one gets a decent review.

[–] sxan@midwest.social 2 points 18 hours ago

Sure. If anyone is willing to put in that effort; I'm not going to audit all that code.

Does Deepin have its own package sources? B/c if so, you also have you audit all of the third-party packages for trojans, too.

[–] sxan@midwest.social 1 points 18 hours ago (1 children)

I was going off what you said:

my threat model involves someone trying to physically unlock my device

This doesn't sound to me as if you're concerned about espionage - repeated, covert, root access to your computer, for the purpose of installing software to capture your keys, so that they can steal your computer and have complete access. If someone has remote root access to your computer, you're fucked, TPM or not; they'll just read what they want whenever you're logged in and using your computer.

TPM is for when you might not have secured physical access to your computer. Like, you're worried the NSA is going to sneak into your house while you're out shopping, pull your HD, replace the boot loader, and re-install it before you get home.

If you're only worried about, say, losing a laptop, or a search & seizure at your house, an encrypted HD is good enough. TPM and a keylocked BIOS are belts-and-suspenders, but if they want to get at the data they'll just pull the HD and run code-breaking software on it on and entirely different super-computer. TPM won't help you at all in that case.

Honestly, TPM is for a specific threat mode, which is much more like ongoing espionage, than simple opportunity theft. Your stated use case sounds more like the latter than the former.

[–] sxan@midwest.social 2 points 18 hours ago (1 children)

They were expecting tens of thousands (40,000 by one count) - which was the estimate hyped by the protest organizers. They got a few thousands ("more than 2,000"). The police were probably over-prepared, less threatened, and therefore less reactionary. It seems like the protesters behaved themselves pretty well, although that's not always a guarantee against police brutality.

[–] sxan@midwest.social 10 points 19 hours ago

Better off Ted was great. The studio gave it a chance, even renewing a second season despite consistently poor ratings.

I don't know why it flopped. It certainly wasn't due to the usual corporate malfeasance, like what happened to Firefly. Maybe it was just timing; I'm honestly surprised that broadcast TV is still lurching along, with the pressure from streaming services.

[–] sxan@midwest.social 10 points 20 hours ago

There's a bot that just reposts X posts to Lemmy; so much, it is essentially just spam.

Thank god for the ability to block accounts and communities.

[–] sxan@midwest.social 1 points 21 hours ago

Man, you're just like Jill Stein!

[–] sxan@midwest.social 1 points 1 day ago (1 children)

Humans can turn nearly anything into a weapon, no argument; even a bicycle has offensive capability. I don't think it's being pedantic to claim that the intent being the design is significant in this case.

I read somewhere (Memory Alpha?) that the Defiant was Starfleet's first pure-play warship, the first starship that whose primary purpose was as an offensive attack craft. Whether or not that's true, the TARDIS' offensive capabilities are clearly just side-effects, like the ability to use a wrench as a club. A wrench makes a good club, but that's not what it was designed or intended for.

[–] sxan@midwest.social 11 points 2 days ago

Mine is 3-pronged:

  1. btrfs + snapper takes care of most level-1 situations, and I take a snapshot of every /root change, plus one nightly /home snapshot. but it's pretty demanding on disk space, and doesn't handle drive failure; so I also do
  2. restic + USB drive, which I can cram way more snapshots onto, so I keep a couple of weeks of daily snapshots, one monthly snapshot for a year, and one snapshot per year, going back several years. I currently have snapshots from my past 3 computers on one giant drive. However, these drives can also fail, and won't protect me from burglary or house fire, so I also do
  3. restic + BackBlaze. I just take a nightly snapshot for every computer and VM I manage. My monthly B2 bill is around $10. The VMs don't change much, and I only snapshot data and config directories (only stuff I can't spin up fairly quickly in a container, or via a simple install command), so most of the charge comes from a couple of decades of amateur digital photography, and an archive of all our digital music (because I'll be damned if I'm going to spend weeks re-digitizing all those CDs).

The only "restore entire system b/c of screwing up the OS" is #1. I could - and probably should, make a whole disk snapshot to a backup drive via #2, but I'm waiting until bcachefs is more mature, then I'll migrate to that, for the interesting replication options it allows which would make real-time disk replication to slow USB drives practical; I'd only need to snapshot /efi after kernel upgrades, and if I had that set up and a spare NVME on hand, I could probably be back up and running within a half hour.

[–] sxan@midwest.social 13 points 2 days ago (4 children)

K, so I'm probably oversimplifying, but almost all distros should allow you to at least encrypt /home, and although I haven't tried it myself yet, whole-disk encryption via UEFI is possible. You say your threat model is only someone trying to unlock your device, but it sounds as if you're not worried about espionage - someone gaining access to your computer and replacing the /efi boot process with something that will harvest your password when you log in. If all you're worried about is seizure and data protection, why isn't disk encryption sufficient?

If you really feel like you need TPM, Arch supports it, which means other distros do, too. Although, figuring it out for, e.g., Ubuntu of something you'll have to research; the Arch wiki is the most fantastic source of Linux documentation on the web, and much (but not all) of it can help with other distros.

I may be completely misunderstanding what problem you're encountering, but (a) disk encryption is trivial to set up on both Mint and EndeavorOS installers (the two I've used most recently), and (b) TPM certainly seems possible from the Arch wiki.

[–] sxan@midwest.social 9 points 2 days ago (15 children)

The Tardis doesn't have phasers or photon torpedoes, either. The Tardis has no offensive capabilities at all, whereas the Defiant is an offensive capability.

[–] sxan@midwest.social 14 points 2 days ago (5 children)

The difference is that laws in China require companies doing business in China provide the Chinese government with means to access all data crossing Chinese borders or involving persons of interest. You can read the DSL of China yourself; and consider that nearly every executive of any significant Chinese company also holds an office of some sort in the Chinese government, there are a vast number of Chinese nationals who are considered "persons of interest" to the national security of China and therefore fall under the DSL purview.

Any company building or selling software in China has to provide the Chinese government with access to data collected in China, or outside of China if it involves persons of interest for national security. Like I said, find the DSL and read it yourself, or read an InfoSec analysis of it from a company you trust - you don't have to take my word for it.

This immediately puts Chinese software into a different category of risk than non-Chinese software. Of course, the US could twist arms to get companies to put backdoors in software. But it's a false equivalency to say that they're the same. When the US does it, they have to do it covertly, and there's always the risk of a leak. When Chinese companies do it, they're doing it because Chinese data laws require them to.

 

cross-posted from: https://feddit.uk/post/15132091

Bedfordshire Police have said just ten arrests were made over the Bedford River Festival this weekend (20/21 July) with Live Facial Recognition (LFR) technology responsible...

 

cross-posted from: https://feddit.uk/post/15132091

Bedfordshire Police have said just ten arrests were made over the Bedford River Festival this weekend (20/21 July) with Live Facial Recognition (LFR) technology responsible...

 

I vastly prefer to support community artisans over mass-produced material when I can. Is anyone in the community making Moopsies?

 

Cross-posting here, as the content under discussion is political in nature, and I feel as if the question might be of similar concern to other posters. Most probably don't care; data miners harvesting information to sell to HR departments and hiring managers are a real thing, though, so I think answers are relevant.

cross-posted from: https://midwest.social/post/14464872

A friend of mine would like to post an op-ed style political essay about the current turmoil in the Democratic Party about Biden's fitness. They are concerned about it affecting their career, should it be linked back to them; the US is highly divided and they know some of their peers are Republicans, and they're not sure about the affiliations of people in their upward chain of command. My friend is concerned that posting an emotional opinion piece might -- if attributed to them and seen -- negatively affect their career. They want to stay anonynmous.

I think getting something posted anonymously in Lemmy would be fairly easy; no-one is going to trying legally coercing an email out of a Lemmy instance over an op-ed. And getting a boost in Mastodon would be simple. I was hoping that there'd be something like WriteFreely where they could post, but anonymity appears to be not even a consideration by the main developers.

And then there's the question of how to get links to the essay out of the Fediverse, where 90% of the people are. I don't have a Xitter account anymore, and have never had a Facebook account.

What suggestions does Lemmy have? How, in today's world, does someone anonymously post content?

Subscript: I do not mean political anonymity -- not in the way that protection from law enforcement is needed. My friend lives in the US where freedom of speech is still more-or-less ensured, and the content is not illegal, incidiary, inciting, or even unusual. However, they want anonymity sufficient to guard against data miners, correlators, and brokers. They need to get something off their chest, express an opinion, but not at a risk to their career.

14
submitted 1 month ago* (last edited 1 month ago) by sxan@midwest.social to c/asklemmy@lemmy.world
 

A friend of mine would like to post an op-ed style political essay about the current turmoil in the Democratic Party about Biden's fitness. They are concerned about it affecting their career, should it be linked back to them; the US is highly divided and they know some of their peers are Republicans, and they're not sure about the affiliations of people in their upward chain of command. My friend is concerned that posting an emotional opinion piece might -- if attributed to them and seen -- negatively affect their career. They want to stay anonynmous.

I think getting something posted anonymously in Lemmy would be fairly easy; no-one is going to trying legally coercing an email out of a Lemmy instance over an op-ed. And getting a boost in Mastodon would be simple. I was hoping that there'd be something like WriteFreely where they could post, but anonymity appears to be not even a consideration by the main developers.

And then there's the question of how to get links to the essay out of the Fediverse, where 90% of the people are. I don't have a Xitter account anymore, and have never had a Facebook account.

What suggestions does Lemmy have? How, in today's world, does someone anonymously post content?

Subscript: I do not mean political anonymity -- not in the way that protection from law enforcement is needed. My friend lives in the US where freedom of speech is still more-or-less ensured, and the content is not illegal, incidiary, inciting, or even unusual. However, they want anonymity sufficient to guard against data miners, correlators, and brokers. They need to get something off their chest, express an opinion, but not at a risk to their career.

 

It is not my intention to ignite an EMACS/vim war; I will say that I find it baffling that Lower Decks is ending while Strange New Worlds is being continued. I like Strange New Worlds, despite disagreeing with some of the artistic licenses being taken. But if I had to choose between the two shows, it'd be no contest. Not only as a viewer do I prefer LD, but it has to be the cheaper show to produce. The fact that next season is the last (both by design, it only being contracted for 5 years; and announcement) is sad and incomprehensible in the same way the cancelation of Firefly was - except LD is popular and successful, whereas Firefly merely had a fanatical (🖐️) fan base.

I don't understand it. Yes, you want to end on a high note. Maybe the writers are running out of plot ideas. Perhaps, given an initial life span of 5 years, the actors have all made other arrangements and aren't available. But I just can't believe the One Big Plot Arc that's been building would necessitate ending the series by its resolution.

LD is a strong show. It's lighthearted. It's a breath of fresh air after the more decidedly darker, ethically challenging, and emotionally straining runs of TNG, Voyager, DS9. And Strange New Worlds... the Gorn are basically Xenomorphs from the Alien franchise.Who, despite being the existential threat of the show, somehow get entirely forgotten about by the time in TOS.

But I digress. I'm going to miss Lower Decks, badly. How can this happen? And why?

 

This is kind of a rant, but mostly a plea.

There are times when BusyBox is the only tool you can use. You've got some embedded device with 32k RAM or something; I get it. It's the right tool. But please, please, In begging you: don't use it just because you're lazy.

I find BusyBox used in places where it's not necessary. There's enough RAM, there's more than enough storage, and yet, it's got BusyBox.

BusyBox tooling is absolutely aenemic. Simple things, common things, like - oh, - capturing a regexp group from a simple match are practically impossible. But you can do this in bash; heck, it's built in! But BusyBox uses ash, which is barely a shell and certainly doesn't support regexp matching with group capture. Maybe awk? Well, gawk lets you, with -oP, but of course BusyBox doesn't use GNU awk, and so you can't get at the capture groups because it doesn't support perl REs. It'd be shocking if BusyBox provided any truly capable tools like ripgrep, in which this would be trivial. I haven't tried BB's sed yet, because sed's RE escaping is and has always been a bizarre nightmarish Frankenstein syntax, but I've got a dime riding on some restriction in BB's sed that prevents getting at capture groups there, too.

BusyBox serves a purpose; it is intentionally barely functional; size constraining trumps all other considerations. It achieves this well. My issue isn't with BusyBox, it's with people using it everywhere when they don't need to, making life hell for anyone who's trying to actually get any work done in it.

So please. For the sanity of your users: don't reach for BusyBox just because it's easy, or because you're tickled that you're going to save a megabyte or two; please spare a thought for your users on which you are inflicting these constraints. Use it when you have to, because otherwise it doesn't fit. Otherwise, chose a real shell, at least bash, and include some tools capable of more than less than the bare minimum.

 

I know it's tragically pedestrian; and I know there's supposed to be a 4 in 2025; and I also know there's many a slip twixt cup and lip, and the gaming industry is going through some pretty radical changes... but all I really want is another Borderlands.

There's not much they can do with it, not many places to go, and I'm sure everyone who's worked on the series over the years is thoroughly sick of it. But, damn. Every one of the main games (at least; I haven't loved every in-between spin-off) has his a sweet spot of mindless fun, funniness, and replay-ability. I've played 3 so many times through, and spent so many hours just running around in every location, even I can't work up much enthusiasm to fire it up anymore.

There's an occasional game that fills the same niche; Bullet Storm was pretty fun, but with low replay-ability. I just want a game where I can turn off the higher brain functions and run around killing stuff in interesting ways.

Thanks for attending my Ted Talk.

 

Rook provides a secret service a-la secret-tool, keyring, or pass/gopass, except backed by a Keepass v2 kdbx file.

The problem Rook solves is mainly in script automation, where you have aerc, offlineimap, isync, vdirsyncer, msmtp, restic, or any other cron jobs that need passwords and which are often configured to fetch these passwords from a secret service with a CLI tool. Unlike existing solutions, Rook is headless, and does not have a bespoke secrets database full of passwords that must be manually synchronized with Keepass; instead, it uses a Keepass db directly.

Rook is in the AUR; binaries are available from the project page.

From the changelog, since the last Lemmy release announcement (v0.0.9):

[v0.1.3] Mon May 20 17:12:25 2024 -0500

Added

  • status command, a more lightweight way of testing if a DB is open. Using this instead of info in e.g. statusbar scripts greatly reduces CPU load.
  • case-insensitive search.

Changed

  • removing some nil panics that could occur when DB is closed while a client call is being processed.

Fixed

  • a hidden bug in the OTP pin code.
  • some errors being ignored (and therefore not logged)
  • TOTP attributes getting missed by otp generator check

[v0.1.2] Fri Apr 26 15:13:55 2024 -0500

Added

  • one-time pin soft locking
  • installation instructions for distributions that have rook in a repository
  • more of the special autotype {} commands are supported (backspace, space, esc)

Changed

  • getAttr adds a little delay before typing, allowing initiator tools (like rofi) to close windows before text is output
  • cleans up code per golint/gochk

Fixed

  • an autotype bug in outputting literals

[v0.1.1] Sun Mar 17 13:44:54 2024 -0500

Added

  • the original source rook.svg
  • ability to start the rook server passing in the password via stdin pipe.

Changed

  • assets moved to directory
  • documentation referenced Keepass v4; there's no such thing, it's v2.
  • license, was missing (c) from original
  • stop trying to remove the version number from build assets
  • documentation to clarify when the master password exists as plain text, in response to questions from @d3Xt3r@lemmy.nz

[v0.1.0] Fri Mar 15 14:03:25 2024 -0500

Added

  • nfpm file
  • logo

Changed

  • clears out the password so it's not being held in plain text by the flags library.
  • some of the documentation, and fixes the duplicated v0.0.9 entry in the changelog.
  • CI build targets are more limited, but also include some distro packages
  • better README documentation

Removed

  • the monitor attribute was taken out, as rook no longer busy-polls the DB
1
submitted 4 months ago* (last edited 4 months ago) by sxan@midwest.social to c/coffee@lemmy.world
 

Update

On a whim, I tried searching YouTube instead of search engines and found a short video which led me to this shop in Etsy. It looks quite promising, so I'm going to update the title as "solved."

Original post

I've had an Elektra Micro Casa Leva for a number of years, and a while ago I bought a naked portafilter for it. It was (and still is, on the product site) as "for the Micro Casa." It is, without a doubt, one of the poorest quality things I've ever bought. The wood appears painted, not stained; it's been resistant to oiling, and lately the paint has been flaking off leaving what I assume is cheap pine. The wood itself has been cracking and splitting. The portafilter itself is painted to look like brass; I can tell this because that paint has started chipping and peeling. It looks as if it's some type of steel underneath -- I'd suspect aluminum, except for the weight and I assume the maker would be concerned about having one literally melt on a user. In any case, it's horrible. The handle is not screwed in, or else it's screwed & glued; if the metal weren't so obviously crap, I'd consider routing out the handle and replacing it myself; as is, it's so poorly made it hardly seems worth the effort. Regardless, I've been using it for a few years and it hasn't outright broken yet, but with all the paint chipping and peeling, it's looking really rough, and you don't own a Micro Casa Leva for the convenience.

The Elektra takes a non-standard 49mm portafilter, which can make finding parts challenging. Is there a company that makes decent portafilters that fit the Leva? It's possible I simply haven't delved the depths of the web deeply enough. Or, is there a craftsman in the community who does this sort of work -- making nice handles, sourcing appropriate baskets, etc? Failing all of that, is there a place I can buy a naked portafilter of good quality for the Leva, and is there anyone making good handles for portafilters? I'm no craftsman, but I can manage sanding wood to fit a hole, and I can mix epoxy.

What I'd really like to end up with is a brass portafilter with a beautiful wood handle with a nice grain and stain. I'd settle for a naked portafilter for the Leva that isn't a cheap piece of garbage.

 

Howdy Lemmy,

I'm announcing Rook v0.0.9, software that provides a secret service a-la secret-tool, keyring, or pass/gopass, except backed by a Keepass 4.x kdbx file.

The problem Rook solves is mainly in script automation, where you have aerc, offlineimap, isync, vdirsyncer, msmtp, restic, or any other cron jobs that need passwords and which are often configured to fetch these passwords from a secret service with a CLI tool. Unlike existing solutions, Rook is headless and does not have a bespoke secrets database, full of passwords that must be manually synchronized with Keepass; instead, it uses a Keepass db directly.

While the readme goes into more detail, I will say the motivation for Rook evolved from a desire to use a Keepass db in a GUI-less environment and finding no existing solutions. KeepassXC provides a secret service, but is not headless; it also provides a CLI tool, but this requires the db credentials on every call. kpmenu exists, but is designed specifically to require human interaction and is unsuitable for cron environment scripting. Every other solution maintains its own DB back end, incompatible with Keepass.

Rook also benefits from minimal external dependencies, and at 1kloc is auditable by developers - I believe even by ones who do not know Go (the language of implementation). Being able to verify for yourself that there's no malicious code is a critical trait for a tool with which you're trusting secrets.

Rook is fit for purpose, and signed binaries are provided as well as build-from-source instructions (for auditors).

The project contains work in progress: credentials are limited to simple password-locked kdbx, and so doesn't yet support key files. Bash scripts that provide autotyping and attribute/secret selection via rofi, fzf, and xdotool are provided, for GUI environments; these have known bugs. Rook has not been tested on BSD, Darwin, or any other system than Linux, but may well work; the main sticking point is the use of a local file socket for client/server communication, so POSIX systems should be fine, but still, YMMV.

As a final caveat: up until v0.0.9 I've been compressing with brotli, which is very nice yet somewhat obscure. With the next release, everything will be gzipped. Also included in the next release will be packages for various distributions.

1
Help with QMK issue (midwest.social)
submitted 5 months ago* (last edited 5 months ago) by sxan@midwest.social to c/mechanicalkeyboards@lemmy.ml
 

I assume this is QMK, because changing the settings clears or introduces the issue. I'm using Vial for the programming/configuration.

I have a key configured tap-dance, like many others: - on tap, and ctrl on hold. The issue is that most of the time when I type something like -p, I get only the -. Then, the next time I type p, I get 2 of them. So something like this will happen:

I type foo -p bar baz, but don't notice the p is missing until after baz, cursor left and type p again, and end up with -pp

Most of my keys are tap-dance of some pattern: on tap, layer shift in hold, on tap-hold. I've noticed this buffered character after - on other characters; it isn't just p. Changing the timeout does affect the frequency, but doesn't entirely eliminate it. I haven't noticed it on any other combo, although they're all of the same pattern; it seems to be only happening with the -/ctrl tap-dance. Removing the multitap on - eliminates the issue.

This is my first QMK. I'd been using an Ergodox for years, and kmonad on my laptop for a year or so, although I recently switched to kanata (fantastic piece of software, incidentally), so I'm more or less familiar with the world of layers, multi-tap/tap-dance, combos, and so on. This one has me stumped, though.

I've checked and there's no combo defined that involves dash. I've never created a QMK macro, but it occurs to me that I didn't check if there are any defined.

Does anyone have a suggestion of how I can debug this? Could there be some bug, some bit that I accidentally set, that's causing this? Is there some QMK feature that does exactly this thing, and I've somehow enabled it? I've power cycled the keyboard, although I haven't yet tried a hard or factory reset.

Any ideas would be appreciated!

Edit corrected "multi-tap" to "tap-dance", as QMK calls it the one thing and not t'other

view more: next ›