Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)NO
Posts
30
Comments
75
Joined
5 mo. ago

  • Rather than running a Tor relay, running a simple Tor bridge (e.g. via the browser add-on Snowflake as suggested by @ryokimball@infosec.pub) is probably the best thing to do with one's home hardware.

    Actual relays must suffice certain requirements, according to the Tor project:

    Requirements for Tor relays depend on the type of relay and the bandwidth they provide. ==== Bandwidth and Connections ====

    A non-exit relay should be able to handle at least 7000 concurrent connections. This can overwhelm consumer-level routers. If you run the Tor relay from a server (virtual or dedicated) in a data center you will be fine. If you run it behind a consumer-level router at home you will have to try and see if your home router can handle it or if it starts failing. Fast exit relays (>=100 Mbit/s) usually have to handle a lot more concurrent connections (>100k).

    It is recommended that a relay have at least 16 Mbit/s (Mbps) upload bandwidth and 16 Mbit/s (Mbps) download bandwidth available for Tor. More is better. The minimum requirements for a relay are 10 Mbit/s (Mbps). If you have less than 10 Mbit/s but at least 1 Mbit/s we recommend you run a [/wiki/doc/PluggableTransports/obfs4proxy bridge with obfs4 support]. If you do not know your bandwidth you can use http://beta.speedtest.net/ to measure it.

    As for exit relays aka exit nodes, the obligatory advice is of course to not run them at all unless you know exactly what you are doing both legally and technically, and probably only if you're a foundation or something.

  • Love it. Under text editors, would you like to add Helix? It's much like (n)vim, but among many other aspects it has better discoverability of features (although several key features like plugins and code folding are still missing).

  • A good start is to install tldr. You use it like man, but it gives you shorter explanations – or rather, a short list of illustrative examples.

    As for man pages themselves (which I often find overwhelming, too), if you're not doing that already, you can pipe it into grep to extract just those lines that contain your search string:

     
        
    man ps | grep user
    
    # or for two lines of context above and below each match:
    man ps | grep user -C 2 
    
      

    Going further, check out Fish instead of Bash. I haven't use Fish yet, but it's said to be much better for learning Linux commands as a beginner. Later on, you may switch to Zsh. In any case, hitting Tab once or twice will often give you a list of possible completions to the command you are typing.

    PS: I see no good reason why anyone should downvote this question.

    Edit (June 23): As it so happens, just today I've stumbled into the O'Reilly book "Classic Shell Scripting" by Robbins and Beebe (ISBN 9780596005955). What can I say – its age notwithstanding, it's apparently an extremely good book for understanding things and learning how to solve real problems. (It presupposes some familiarity with Unix-like systems and with the shell, so if one's just starting out, the book "Learning the Unix Operating System" may be better.)

  • lmgtfy always was needlessly unfriendly, but in the age of search result enshittification, it's even lost the excuse of technically providing a good solution (at least in cases like this).

    Creating a live USB with persistence is lengthy and even the decent tutorials out there vary greatly in their suggested approach, making it perfectly legitimate (even for non-beginners) to ask for guides that others have found helpful.

  • Some local libraries (e.g. in Heidelberg) or ecological initiatives lend devices to measure electricity consumption at the power plug. In particular, this is useful to measure other appliances as well.

    Specifically for computers, they probably have some means to tell you their own consumption, but they may not be accurate or complete and will most certainly omit any peripherals, e.g. external hard drives.

  • In case anyone wonders about the context, this is the paragraph:

    In April, Palantir co-founder Joe Lonsdale got into a brawl with former Coinbase chief technology officer and Network State advocate Balaji Srinivasan. It wasn’t on a prominent stage or even Twitter/X; it happened in a Signal group chat that’s become a virtual gathering place for influential tech figures. Srinivasan wasn’t going along with the tech right’s aggressive anti-China rhetoric, so Lonsdale accused him of “insane CCP thinking.” “Not sure what leaders hang out w you in Singapore but on this you have been taken over by a crazy China mind virus,” he wrote.

  • There's also SomaFM, a listener-supported, commercial-free radio project that has numerous stations with very great music selection that are suitable for coding. It's quite nice not to have to decide about individual songs, and it's free from large capitalist corporations like Spotify.

    For Linux, I have described in a comment how one can get an easy command line control over SomaFM stations: https://feddit.org/post/9775341/6942148

  • There's also SomaFM, a listener-supported, commercial-free radio project that has numerous stations with very great music selection that are suitable for coding. It's quite nice not to have to decide about individual songs, and it's free from large capitalist corporations like Spotify.

    For Linux, I have described in a comment how one can get an easy command line control over SomaFM stations: https://feddit.org/post/9775341/6942148

  • TIL about the Gell-Mann amnesia effect. From Wikipedia:

    The Gell-Mann amnesia effect is a cognitive bias describing the tendency of individuals to critically assess media reports in a domain they are knowledgeable about, yet continue to trust reporting in other areas despite recognizing similar potential inaccuracies.

  • Oddly enough, this guy Wolfram Weimer is a die-hard right-winger. So I was quite flabbergasted when I first read the headline, and still am doubting whether he really intends to follow through with this or rather is only floating this idea in order to introduce another bargaining chip in the trade negotiations with Trump.

  • For a simple distraction-free control via Linux's command line, you can install mpg123 and add the following script files to /usr/bin/ or /usr/local/bin/:

    /usr/local/bin/soma:

     
        
    #! /usr/bin/bash
    kill $(pgrep mpg123)
    mpg123 -@ http://somafm.com/nossl/$1.pls
    
      

    /usr/local/bin/somaoff:

     
        
    #! /usr/bin/bash
    kill $(pgrep mpg123)
    
    
      

    Make them executable for everyone by running sudo chmod a+x /usr/local/bin/soma /usr/local/bin/somaoff.

    You can now run from your console (or from KRunner on KDE, or via :sh from within helix):

     
        
    # Tune into station "Lush"
    soma lush 
    # Turn Soma off
    somaoff
    
    
      

    Works fine from a tty as well, even with bluetooth on my OpenSUSE at least.

    The specific station names to enter after soma are the ones in the URL of each station's webpage, e.g. “folkfwd” for Folk Forward, as its URL is https://somafm.com/folkfwd/.

  • Thanks. Makes sense that things roughly along those lines already exist, of course. CrowdSec's pricing, which apparently start at 900$/months, seem forbiddingly expensive for most small-to-medium projects, though. Do you or does anyone else know a similar solution for small or even nonexistent budgets? (Personally I'm not running any servers or projects right now, but may do so in the future.)

  • There should be a federated system for blocking IP ranges that other server operators within a chain of trust have already identified as belonging to crawlers. A bit like fediseer.com, but possibly more decentralized.

    (Here's another advantage of Markov chain maze generators like Nepenthes: Even when crawlers recognize that they have been served garbage and they delete it, one still has obtained highly reliable evidence that the requesting IPs are crawlers.)

    Also, whenever one is only partially confident in a classification of an IP range as a crawler, instead of blocking it outright one can serve proof-of-works tasks (à la Anubis) with a complexity proportional to that confidence. This could also be useful in order to keep crawlers somewhat in the dark about whether they've been put on a blacklist.

  • Politics @beehaw.org

    Republicans Blowing Your Taxes

    People Twitter @sh.itjust.works

    Sock Puppet Twitter

    Privacy @lemmy.ml

    The German university KIT provides almost 30 free and open-source privacy-friendly Android apps. Example: A QR Scanner

    Lemmy Shitpost @lemmy.world

    Elevated

    People Twitter @sh.itjust.works

    Thank you JD

    People Twitter @sh.itjust.works

    Very much a cult

    politics @lemmy.world

    What the Comfort Class Doesn’t Get. People with generational wealth control a society that they don’t understand

    World News @lemmy.ml

    Marine Le Pen demands that politicians convicted of using their office for crimes be unelectable for life (2013, French with auto-generated subtitles)

    World News @lemmy.world

    Bloomberg: Trump tariffs on Canada lumber risk pinching toilet paper supply

    Fediverse @lemmy.world

    To boost Bookwyrm, there should be a tool to scrape book data from Amazon