deleted by creator
programmer interested in privacy/security. Mostly Go and Python
- 2 Posts
- 31 Comments
gibson@sopuli.xyzto Steam@lemmy.ml•Excited to release my first game in 2 weeks on Steam - Bedroom Battlegrounds, a turn based strategy game with toy army men4·7 months agoDid you play that Army Men: RTS game or the other army men 3DO games? Though they probably don’t hold up well, i thought they were very fun as a kid. Going to keep tabs on this game
technically there is a lot it could do, but it would not be a number 1 pick for any of it (even if you only have a $100 budget) so i agree, get rid of it.
gibson@sopuli.xyzto Privacy@lemmy.ml•[Youtube video]: Is it really that easy to hack someone's Discord? Is it the same with: Telegram, Twitter, facebook ...ect ? and does this work if I'm accessing Discord through Firefox ?1·9 months agoyou can still use a yubikey or even a password manager like keepassxc with passkeys, no need for any google/apple or even secure enclave.
it was always free for me but i think i was early enough of an adopter to be grandfathered in on some old setup
gibson@sopuli.xyzto Open Source@lemmy.ml•My open source "proof of useful work" captcha alternative (python)4·11 months agoThere is already gridcoin which is a cryptocurrency that awards boinc work, so I’d say this concern has already been addressed because of that.
cock.li but it doesn’t encrypt your inbox so keep that in mind.
gibson@sopuli.xyzto Open Source@lemmy.ml•What open-source software would you like more people to know about?9·1 year agoxpra: it is like tmux but for X windows (works on wayland), but it can do much more than that. You can seamlessly run GUI programs from a container or VM on your main desktop while still sandboxing their X capabilities, forward windows from Windows desktops, and it has efficient encoding so it is usable over poor connections as well.
gibson@sopuli.xyzto Privacy@lemmy.ml•Cops can force suspect to unlock phone with thumbprint, US court rules2·1 year agoAt least on my phone, rebooting also makes it require PIN
gibson@sopuli.xyzto Privacy@lemmy.ml•Downsides of Signal alternatives compared to Signal?11·1 year agoFor those who don’t remember, not only could signal be used for SMS, it used to be able to do encrypted sms convos.
gibson@sopuli.xyzto Linux@lemmy.ml•Proton Mail Finally Releases Desktop Apps With a Linux Beta Version1·1 year agoThe main benefit is since it is locally installed, it is harder for proton’s server to access your encrypted data by serving you malicious JS. A malicious desktop app/update could be served too, but that may be trickier.
It usually isn’t super hard to tell apart randomized junk like this from real human patterns. That is why Tor Browser for example tries its best to make everyone look the same instead of randomizing everything.
That said, for the mere purpose of throwing off the ISPs profiling algorithms, you could make a relatively simple python program to solve this. A naive solution would just do an http GET to each site, but a better solution would mimic human web browsing:
- Get a list of various news sites and political forum sites
- Setup headless firefox or chromium
- Use Selenium or similar to crawl links on each site. Make sure you have the pages fully load and wait a random amount of time that a human would before going to the next page.
- https://realpython.com/modern-web-automation-with-python-and-selenium/#test-driving-a-headless-browser
If you have no programming capability this will be rough. If you have at least a little you can follow tutorials and use an LLM to help you.
The main issue with this goal is that it isn’t possible to tell how advanced your ISP’s profiling is, so you have no way to know if your solution is effective.
Feel free to DM me if you go this route.
I do something similar with rclone and vultr’s s3 service. I made an s3 remote in rclone and then a encryption layer remote on top of that.
You can make actual
docker compose
use podman by running a user podman docker socket and setting that as an environment variable (export DOCKER_HOST=unix:///run/user/$UID/podman/podman.sock)https://brandonrozek.com/blog/rootless-docker-compose-podman/
gibson@sopuli.xyzto Privacy@lemmy.ml•I'm not worried about saving my location. Are you?21·2 years agoJust because you can’t stop all the leaks in your plumbing doesn’t mean you shouldn’t fix the ones you can.
Its best to have some defence in depth. Ideally you would have a firewall on your network AND your local machine. If you are running a laptop definitely have a local firewall on that as you cannot trust random networks you connect to when out and about in the world.
firewalld is sufficient, i suggest learning its CLI as it is not super complicated. ufw is ok if you are allergic to command line.
I believe he does extend it to JavaScript however, so if he were required to run unfree javascript on a webpage relating to his treatment that could be a problem.
One Hour One Life is open source, it is a 2D hand drawn survival game where you have 1 real life houre to live from a baby to an elder and contribute to the player-made society in your life as best you can.
You have to pay for an account on the official servers, but i recommend you do to support the development.
Not sure if the dev accepts community patches or not, but the game is public domain license.
deleted by creator