A year later. Getting by without a SIM card in my smartphone.
Subscriber Identity Module. That’s what “SIM” stands for. I acquired my first SIM when I was 17 at a T-Mobile outside Chicago when I got my first cell phone, the Nokia 1110, the
best-selling phone of all-time.
A few years later I was working in Chicago and almost everyone in the office had an iPhone. But a few people had Android phones. Their phones did so much my dumb phone couldn’t do. Though having grown up in an analog world the idea of the phone doing everything concerned me in that I would grow dependent on it.
Surf the Web more privately on Vivaldi browser for Android.
For the last three years I have been living in a predominantly Muslim country where pornography is censored. And I’m not just talking the obvious sites like PornHub. Reddit and Vimeo – both of which contain porn – are also censored.
If not being able to access any of the above websites seems unfree to you consider the fact you too are are being censored on a daily basis. The censorship most of you experience just isn’t as obvious because you’ve grown accustomed to paywalls, cookie disclaimers and the occasional reCAPTCHA.
Deniably encrypted file downloads using Bitcoin, WireGuard and Deluge.
It was around 2004 when TBP was infiltrated by the Feds. For at least a day or two the homepage of the website showed nothing other than an emblazoned FBI logo. I’m sure I still have a screenshot somewhere but I trust you know how to verify claims people make on the Internet.
Back then I was an avid IRC user and knew how to set up a sophisticated FTP server replete with eggdrop reporting real-time connection activity to a hidden channel on EFNet. Those were the days when anything felt possible online. Then, all of a sudden, the walls came crashing down.
Inspired by a
chiptune topic on ZeroNet I downloaded one of the songs shared using youtube-dl but wasn’t satisfied with the quality of the video encoding. The song on the other hand was great. And thankfully the author’s website was still up so I could download the original MP3 and creating a new video.
I spent a few hours learning FFMpeg from the comfort of the chair behind my Invisible Arch. The manpages for FFMpeg include tons of diagrams and examples so cobbling something together wasn’t as hard as I’d expected. Once I was satisfied with the result I transitioned over to my 2019 Mac to share the video…
How to privately move your GPG keys from one machine to another.
If you’re a software developer working ethically you’re almost certainly using
sign your work. And if you’ve been at it for any length of time you’ve almost certainly been forced to switch machines. Unless your aim is to create a new identity for each machine you use (please don’t) you need a simple, repeatable strategy moving GPG keys privately. Let me show you how.
Safeguard your privacy online. Arm yourself with knowledge and use these tips, tools and techniques to secure your digital life.
I’m no Steve Wozniak but I carry a healthy distrust of computers. After hearing of the
Equifax data breach affecting the privacy of more than 145 million Americans, learning Uber
paid and tried to cover up the loss of 57 million driver and passenger records and seeing the lasting impact of the
Meltdown attack I’m starting to understand the gravity this quote from Woz:
It’s the first of it’s kind — and like no other performance plugin to precede it. Based on initial tests it speeds up the stock Twenty Seventeen theme about 300% and I suspect time will show even greater gains for other themes. It builds on top of a performance optimization technique called Fetch Injection, enabling external scripts to download asynchronously in parallel while preserving execution order.
How to create secure external backups with LUKS, Borg and BLAKE2.
A friend in Bali handed me a 1 terabyte external SATA drive recently and that’s great because the device is an integral part of a 3-2-1 backup strategy I’m adopting after Apple Care suggested I make a full backup of my 15” MacBomb Pro.
The principle is simple:
3 copies, 2 different types of storage (physical and in the cloud for example) and one copy being physically separated from the others
In this post I will show you how to securely store your backup data with two layers of encryption on an external drive or disk. After securing the disk we will start to automate the creation of space-efficient backups. Tools we’ll be using include
DMCrypt, a device-mapper crypto target, and
Borgmatic to automate our backups in a expressive way.
How to install and configure WireGuard on Manjaro Linux, a step-by-step guide.
One of the motivations behind dual-booting Linux on my MacBook Pro was to take back control of my personal data. Not just because Apple
uses faux encryption on iCloud. And not because macOS has been shown to leave users open to eavesdropping exploits. But because when I use my Mac with macOS the operating system gratuitously beams out activity records1, sharing information I’d rather keep private with people I don’t personally know nor have I ever met. And without the ability to shut it off, I find my privacy – the sentient and autonomous nature of my very being – constantly under attack.
In many instances, privacy is threatened not by singular egregious acts, but by a slow series of relatively minor acts which gradually begin to add up.
In this short guide I’ll show you how to encrypt and route your local Internet traffic through a fast, modern, and secure VPN tunnel called
WireGuard using a free and open source operating system called
Manjaro Linux. I will explain how to install WireGuard on Manjaro, share a simple means of establishing and testing an encrypted Internet connection, and leave you with next steps and personal experience to help further your understanding and gain confidence getting started.
Frameworks, tools and tips for brewing up a hot website.
Thinking about brewing up the next Smashing Magazine? Maybe you’re looking for tools to delivery value inside your app’s continuous delivery pipeline? Whatever your reasons for building you’re in the right place. Read on for a hand-picked list of toolkits specifically designed for creating incredible webapps – online or off.
Using Rio in a compact Kubernetes cluster for Git-based continuous delivery.
Rio is a MicroPaaS for Kubernetes designed to run using minimal resources. Rio provides automatic DNS and HTTPS, load balancing, routing, metrics and more. Use it to remove the chore of creating and managing a secure IT infrastructure.
k3s is a lightweight, certified Kubernetes distribution capable of running on constrained hardware and therefore ideal for local, edge and IoT substrates. K3s was originally developed for Rio but useful enough to stand on its own.
Today I’m going to show you how to easily set-up k3s and Rio on Manjaro Linux MacBook and use them to create a self-hosted, git-based continuous delivery pipeline to serve your own website.
If you’re not yet familiar with Kubernetes, no problem. Please let this gentle introduction serve as your practical guide. When you’re finished you’ll have a better understanding of the concepts and tools used in container orchestration and a shiny new website you can use to demonstrate your skills.