I didn’t know they allowed you to search without JS before. If you’re at the point of disabling JS, presumably for security or privacy reasons, why not just use DDG which works perfectly well without JS?
I didn’t know they allowed you to search without JS before. If you’re at the point of disabling JS, presumably for security or privacy reasons, why not just use DDG which works perfectly well without JS?
Ah lol sure. It depends on what level of state repression you’re looking at. Regular cops will just not bother trying to decrypt a drive if they don’t have the password and you don’t freely give it up (you have the right to refuse to provide a password here, it’s under the same kind of principle as having the right to not incriminate yourself), but I’m sure military intelligence etc will go to the wrench technique. Also deniable encryption for anything particularly sensitive is good for the old wrench technique.
It’s off at the moment. I turn it off whenever I’m not using it for security reasons, and also just noise reasons so the fan doesn’t bother me. It boots relatively quickly so I’m unbothered.
I don’t want to say where I live for anonymity reasons, but I will note that it’s fairly standard for political dissidents to be raided by any government so it doesn’t actually particularly narrow down my location.
What’s the wrench technique?
I encrypt all my drives. Me and the people I know get occasionally raided by the police. Plus I guess also provides protection for nosy civilians who get their hands on my devices. Unlike most security measures, there is hardly any downside to encrypting your drives—a minor performance hit, not noticeable on modern hardware, and having to type in a password upon boot, which you normally have to do anyway.
Yeah, I was also using FreeTube when Mullvad got blocked. Mullvad’s South African servers worked for me for a while but they’re now blocked too, and I’ve tried a bunch of countries and all blocked. Annoyingly even yt-dlp is blocked with Mullvad on now, so I can’t even use that to watch YouTube.
I’d like to know if any of these frontends work with Mullvad VPN, because all the Mullvad servers I’ve tried have been blocked. Even on youtube.com I’m getting throttled to the point where all videos are 360p. Ridiculous, but I’m not turning my VPN off just for YouTube videos.
actually make them write their own and give back
Yeah just cure your deafness and write the subtitles yourself, idiot
Maybe? I remember I have used it to read optical discs before (on Linux too) and I don’t think I’ve unplugged anything
Afraid I don’t have a /dev/sr0
. Tbh I built this PC yonks ago, I don’t remember how I plugged in my optical drive. I assume SATA would be the sensible and most likely option.
I’m on Artix Linux with runit if that matters at all?
I mean, it doesn’t matter to me whether or not I can eject my optical drive with a command, but at this point I’m just curious as to where the drive is on the filesystem lol
Edit: I tried loading sr_mod
with modprobe sr_mod
(which wasn’t loaded for me) but still not seeing any sr*
or cdrom
in /dev
. Again, not too bothered about this, but I’m kinda curious.
I still have a disk drive but eject
doesn’t seem to affect it since for some reason I don’t have a /dev/cdrom
. I just checked with the physical eject button on the drive and it is at least still physically working—the tray ejects! I don’t have any optical media to test if the drive still works to read CDs though
Because it’s so simple, a good default config can be a one-liner. For similar functionality to default sudo:
permit persist setenv {PATH=/usr/local/bin:/usr/local/sbin:/usr/bin:/usr/sbin} :wheel
Allows members of wheel
to run commands as any user (if you just run doas <cmd>
it will default to root), and “persists” for 5 minutes, ie if you run doas then for the next 5 minutes in the same session you won’t have to enter your password to run doas again, similar to default sudo settings.
https://wiki.archlinux.org/title/Doas
What problems were you having where you couldn’t get it to work?
Very useful for shell scripts that need to do maths as well. I use it to make percentages when stdout has values between 0.0 and 1.0
And that’s precisely why OP is asking for frontends. So they can view the posts. They aren’t looking to make posts.
Use a VPN and a good ad/tracking blocker
Have you tried going to Instagram with a VPN on? You can’t see shit unless you log in, and I don’t want to make an account.
I don’t want all these fancy schmancy features. I’m very happy with foot in its current form. The only additional feature I would like is ligature support, but otherwise foot already has the features I want in a terminal emulator, and more that are optional for me (e.g. sixel support; although I do use sixels for my lf previewer, it is not necessary for me). I also don’t want my terminal emulator to have tiling, because rivertile does that for me, or whatever your window tiler is. Same for tabs. You can use i3 tabs, sway tabs, Hyprland groups, etc instead of having tabs in your terminal emulator.
That kind of data access is generally included under security not privacy (which is more about telemetry), but obviously with a state threat model privacy and security can become blurred, and that kind of data access is of concern if you are at risk of having devices seized by the state.
That would be a security issue, not a privacy issue. Maybe that was what RelativeArea0 meant but if so I think that confused people because “privacy” implies somehow corpos/the state is spying on you through Lineage
I prefer to do it clean and manually transfer files, because I usually don’t want a copy paste of my previous setup. For files that are just, for lack of a better way of putting it, personal storage (ie the files that are not dotfiles in my home directory, eg pictures and documents etc), they are on a Nextcloud.
I don’t do deniable encryption on my root drives, just on external drives, and store the headers on my (non-deniably encrypted) computers. But if you want to deniably encrypt your root drive, Arch Wiki has some info:
https://wiki.archlinux.org/title/Dm-crypt/Specialties#Encrypted_system_using_a_detached_LUKS_header
You would still ultimately need an unencrypted header somewhere in order to boot your computer, so if it’s your main daily computer you’d likely carry around the USB stick all day and therefore it wouldn’t work against a state adversary who would obtain the USB stick with your header when they arrest you, if it’s on your person.
Also, it’s much more plausible that an external drive is genuinely just random data with no encrypted contents than that the drive installed into a computer has no data. I do have some USB sticks etc with genuinely nothing on them because I wiped them with /dev/urandom at some point, and they’re lying around waiting for me to need an unused USB drive. The average person doesn’t have an “unused computer” with nothing on it, just random data on the drive. Especially if you are an activist/organiser, if the state finds your computer with just pure random data on it and no encryption header I think they will assume it is deniably encrypted.