Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - la xasop

Pages: [1] 2 3 ... 101  Next >
1
Technology & Information / Re: Custom keyboard layouts in X11
« on: April 04, 2021, 10:09:04 PM »
I made a futhorc keyboard layout! This one does not inherit from any existing layout since its only purpose is to type Old English using runes, which didn't tend to use punctuation, although I did include numbers because they seem kind of useful. The layout is based on phonetic correspondence (or similarity) to QWERTY, but I relegated the pseudo-runes, īor, cweorð and stan, to the punctuation keys to the right where they can go mostly untouched. Cealc, being just a variant of calc which is not really necessary, is typed as Shift+calc.

With this layout, I can now say that ᚦᚩᚱᛣ ᛁᛋ ᚪᛏᚩᛚ.

Code: [Select]
xkb_symbols "basic" {
    name[Group1]= "Old English (Futhorc)";

    key <AE01> { [ 1 ] };
    key <AE02> { [ 2 ] };
    key <AE03> { [ 3 ] };
    key <AE04> { [ 4 ] };
    key <AE05> { [ 5 ] };
    key <AE06> { [ 6 ] };
    key <AE07> { [ 7 ] };
    key <AE08> { [ 8 ] };
    key <AE09> { [ 9 ] };
    key <AE10> { [ 0 ] };

    key <AD01> { [ U16C7 ] }; // eoh
    key <AD02> { [ U16B9 ] }; // wynn
    key <AD03> { [ U16D6 ] }; // ehwaz
    key <AD04> { [ U16B1 ] }; // rad
    key <AD05> { [ U16CF ] }; // tiwaz
    key <AD06> { [ U16A3 ] }; // yr
    key <AD07> { [ U16A2 ] }; // ur
    key <AD08> { [ U16C1 ] }; // is
    key <AD09> { [ U16A9 ] }; // os
    key <AD10> { [ U16C8 ] }; // peorth
    key <AD11> { [ U16E2 ] }; // cweorth
    key <AD12> { [ U16E5 ] }; // stan

    key <AC01> { [ U16AA ] }; // ac
    key <AC02> { [ U16CB ] }; // sigel
    key <AC03> { [ U16DE ] }; // daeg
    key <AC04> { [ U16A0 ] }; // feoh
    key <AC05> { [ U16B7 ] }; // gyfu
    key <AC06> { [ U16BB ] }; // haegl
    key <AC07> { [ U16C4 ] }; // ger
    key <AC08> { [ U16DF ] }; // ethel
    key <AC09> { [ U16DA ] }; // lagu
    key <AC10> { [ U16E0 ] }; // ear
    key <AC11> { [ U16E1 ] }; // ior

    key <AB01> { [ U16AB ] }; // aesc
    key <AB02> { [ U16C9 ] }; // eolhx
    key <AB03> { [ U16B3 ] }; // cen
    key <AB04> { [ U16A6 ] }; // thorn
    key <AB05> { [ U16D2 ] }; // beorc
    key <AB06> { [ U16BE ] }; // nyd
    key <AB07> { [ U16D7 ] }; // mann
    key <AB08> { [ U16DD ] }; // Ing
    key <AB09> { [ U16E3, U16E4 ] }; // calc, cealc
    key <AB10> { [ U16B8 ] }; // gar
};

2
Technology & Information / Re: Custom keyboard layouts in X11
« on: April 03, 2021, 10:16:36 AM »
Use a text expandor and it will auto correct to add all the silly accents for you.

No.

Also, 100% of Irish people speak English. Most don't speak Irish very well. You are wasting your life. You could be learning Japanese or Korean or something instead.

Coming from an Englishman, this is particularly rich.

3
Technology & Information / Custom keyboard layouts in X11
« on: April 03, 2021, 12:53:52 AM »
As a student of the Irish language, I wanted a way to enter a sineadh fada without using the XCompose method that has served me so well up to this point. The reasons are efficiency and accuracy: XCompose requires three keystrokes to input é, as opposed to two for a keyboard layout with AltGr+e; and this has the knock-on effect of making mistakes commonplace, such as pressing the keys in the wrong order and getting *iománáiocht instead of iománaíocht.

Unfortunately, the standard Irish keyboard layout is based on the terminally crippled UK layout, which means that it has (among other things) @, ", #, ~ and a few other symbols in the wrong places. Therefore, I took it upon myself to learn how to write my own xkb symbols file to create an ANSI-based Irish keyboard layout.

This turned out to be quite straightforward. The main annoyance is that if you make a mistake, X gives you no information whatsoever except that your symbols file has a mistake somewhere in it. But with a little trial and error, it's easy to get something that works well.

And so, behold! My new keyboard layout. I simply inherited the us(basic) layout I was already using (I don't want any of my existing usage to change), and added some new characters as combinations with AltGr. Each key has four symbols associated with it, corresponding to the key on its own, with Shift, with AltGr and with AltGr+Shift, respectively. NoSymbol means not to change the existing behaviour, which is why I used it everywhere that AltGr is not involved.

Code: [Select]
xkb_symbols "basic" {
    include "us(basic)"

    name[Group1]= "Irish (ANSI)";

    // Euro on 5 key
    key <AE05> { [ NoSymbol, NoSymbol,  EuroSign,       cent ] };

    // Q row
    key <AD03> { [ NoSymbol, NoSymbol,    eacute,     Eacute ] };
    key <AD04> { [ NoSymbol, NoSymbol, 0x100027C,   NoSymbol ] };
                                       // long r
    key <AD05> { [ NoSymbol, NoSymbol, tabovedot,  Tabovedot ] };
    key <AD07> { [ NoSymbol, NoSymbol,    uacute,     Uacute ] };
    key <AD08> { [ NoSymbol, NoSymbol,    iacute,     Iacute ] };
    key <AD09> { [ NoSymbol, NoSymbol,    oacute,     Oacute ] };
    key <AD10> { [ NoSymbol, NoSymbol, pabovedot,  Pabovedot ] };

    // A row
    key <AC01> { [ NoSymbol, NoSymbol,    aacute,     Aacute ] };
    key <AC02> { [ NoSymbol, NoSymbol, sabovedot,  Sabovedot ] };
    key <AC03> { [ NoSymbol, NoSymbol, dabovedot,  Dabovedot ] };
    key <AC04> { [ NoSymbol, NoSymbol, fabovedot,  Fabovedot ] };
    key <AC05> { [ NoSymbol, NoSymbol, gabovedot,  Gabovedot ] };

    // Z row
    key <AB01> { [ NoSymbol, NoSymbol, 0x100017F,  0x1001E9B ] };
                                       // long s, long s dot
    key <AB03> { [ NoSymbol, NoSymbol, cabovedot,  Cabovedot ] };
    key <AB05> { [ NoSymbol, NoSymbol, babovedot,  Babovedot ] };
    key <AB07> { [ NoSymbol, NoSymbol, mabovedot,  Mabovedot ] };

    include "level3(ralt_switch)"
};

4
Suggestions & Concerns / Re: Post limit on DMs
« on: March 18, 2021, 04:01:31 PM »
I am in agreement also. Actually, I thought we already discussed this at some point and agreed on it, but I may be wrong.

5
In fact, I'm certain I've come across threads where posts have been edited and I didn't get flagged as unread.

I was pretty sure of the opposite, but maybe I am confusing it with the delete-and-repost switcheroo.

6
If so, I think that should be disabled if possible. Only new posts should count towards such things.

The thing is that if someone edits a post to add substantial content, then this behaviour is desirable — otherwise someone may not notice they've added stuff and just never read it.

But we could certainly look at tweaking this. Certainly, if no changes are made at all, it shouldn't mark the thread unread. Perhaps small changes (say, with fewer than 10 added/removed characters, or some other arbitrary threshold) should also be exempted.

What do people think?

7
Technology & Information / Re: Laptop Help
« on: March 01, 2021, 03:24:16 PM »
So I found a refurbished 2017 Thinkpad or a new Ideapad at comparable cost, both from Newegg. Anyone have an opinion on which will be better value?

Refurbs are almost always better value than new laptops. Unless you want to run the latest AAA games or bleeding-edge video editing software, hardware doesn't advance rapidly enough that you'll notice a difference between what they can do, and the older laptop will have depreciated in price.

That said, look at the specs before making a decision. My suspicion is that the refurb will have better specs (or perhaps comparable specs and better build quality) if it's comparably priced, but it's good to be sure.

They dont handle aggressive multi tasking very well.... if I have two GIS programs up and then fire up chrome to troubleshoot issues I'm having, things slow down to a crawl. And they're pretty heavy.

This really depends on which model you have. Lenovo is a brand, and they produce a very wide variety of laptops. My previous laptop (an X1 Carbon) was extremely lightweight, and my current one (a T14 AMD) has an 8-core Ryzen that handles parallelism very well.

8
Technology & Information / Re: Ask Rushy about Bitcoins.
« on: February 23, 2021, 08:59:10 PM »
Here is the latest from Rushy on Bitcoin:

<Rushy> it could go up or down from here

10
Technology & Information / Re: New laptop
« on: February 10, 2021, 06:34:11 PM »
https://twitter.com/bluerise/status/1354216838406823936

Looks like the M1 may actually be useful soon.

11
Technology & Information / Re: New laptop
« on: February 10, 2021, 03:56:57 PM »
They have an SOC.

Oh, well that changes everything. ::)

12
Technology & Information / Re: New laptop
« on: February 10, 2021, 03:12:46 PM »
You took an ARM chip that was optimised for a job and gave it a completely different job making it useless. I intend to use the chip as Apple designed it to be used. And 7 years later, it does a lot more than that awful crap you bought all those years ago. That Ævan guy was right. You are an idiot.

So you are just regurgitating corporate hype. Here's a hot tip: ARM laptops are, in general, no more specialised for doing one task than x86 laptops are, you've just bought into some marketing drone telling you they are. They're just another kind of machine.

13
Technology & Information / Re: New laptop
« on: February 10, 2021, 02:55:08 PM »
The future isn't power hungry x86 chips that compute generic workloads. Its going to be ARM with SOC tech, tuned to match the silicon to the software. I'm not running complex fluid dynamics computations. I watch youtube videos, make a the odd website, browse the internet and make a spreadsheet here and there. I want fast response times, low noise, low heat.

That's interesting. When I wanted that 7 years ago, this is what you said:

You bought a computer that is optimised for the internet and now you intend to unoptimise it for the internet?

You picked a computer with an Arm cortex A15 chip on it. And then put Debian on it. Do Debian have an app store? This is a tablet chip. Not x86. What could you possibly be intending to do on this computer? The only thing it is good for is browsing the internet ... and you just made it slower at doing that.

You're an idiot.

Why the change of heart? Are you sure you're not just regurgitating corporate marketing hype again?

14
Technology & Information / Re: New laptop
« on: January 10, 2021, 07:22:18 PM »
So yeah, I returned the hunk of shit and bought an M1 Macbook Air.

How can you return something before buying it?

15
Technology & Information / Re: Who loves or hates their VPN?
« on: December 28, 2020, 07:58:42 PM »
Very interesting. I've tried the IP Blocker in the Cpanel to block the IPs and their ranges but it does nothing to stop the hits. They're not really hurting anything but these 'GET's are consuming bandwidth and showing up in my metrics as traffic. It's annoying.

Speaking as a professional computer somebody for the past decade, this is just the Internet. If you are going to put services on the public Internet, you will need to get used to the fact that this happens.

16
Technology & Information / Re: Who loves or hates their VPN?
« on: December 28, 2020, 02:44:32 AM »
Don't get me wrong - I don't actually disagree with you here. It's just that... Yeah, things that shouldn't happen happen all the time. I see no merit in just saying "but it shouldn't happen" - I'd rather mitigate the effect of it happening. It is extremely important to address these flaws in the general use case as they crop up, but the paranoid use case of "I'm doing something I shouldn't be doing" warrants a few more layers of hardening.

That's fair, I suppose. I guess where I differ is that I don't consider this protection to be worth the added complexity, but then I was also looking at it as a way of running a web browser, where elevating privileges to root is basically never needed.

You explicitly stated that you don't like pre-made solutions in the field of security. I know you, and thus I have a good idea of what you meant, but I am going to be relatively unique to see your meaning despite your choice of words.

Well, to be more specific for the benefit of others: I prefer general-purpose tools that can be easily configured and composed to work the way I want them to, rather than tools that come pre-configured the way someone else thinks they should work. I don't think of configuration to suit your needs as reinventing the wheel, and I would never in any situation advocate reinvention of wheels in security. (Reinvention of wheels in other fields is sometimes, though rarely, justified.)

I suppose the 5 users of OpenBSD might indeed be restricted there. I know for a fact that OP is not one of them, so I didn't concern myself with it when making my recommendation.

OpenBSD is but one example. I actually edited my last post while you were replying, so to expand upon that, the Whonix installation instructions for Linux provide options for Virtualbox and what they call "KVM" (which is actually libvirt managing KVM guests). My Linux systems with VMs do use KVM, but they do not use libvirt, in part because libvirt does not support using the isolation features of QEMU that I use to mitigate the risk of VM escape attacks. It is a tad ironic that a project based on security by isolation would force me to reduce the isolation of my system in order to install it.

Other situations in which this is limiting are that you cannot use it on non-x86 hardware, or on old x86 CPUs without virtualisation extensions, or on a VM without nested virtualisation support (which is its own can of worms). In case you think I am contriving scenarios that will not arise in practice, I have personally encountered users who wanted to run VMs for isolation but could not for all three of these reasons.

Granted, this likely does not apply to the OP, but it is one of my concerns about using multiple VMs for this. (If it were a single VM, it could — at least in principle — be installed onto bare hardware as a workaround.) Even if we accept that the approach improves security, it does so at the cost of portability, which reduces the number of users that can take advantage of the improved security.

Yeah - I am working with limited information, and I filled the gaps in what OP told us with my own experience with similar activities. I have some confidence in my guessed, but it obviously does not replace a well-defined spec. However, I also suspect that OP doesn't exactly know what he wants - hence my suggestion of looking at a tool and seeing if it feels right.

Agreed on that point, which is why I suggested OpenBSD as well, as an option that comes with a privacy- and security-enhanced Firefox installation by default (albeit without Tor). Hopefully one of these options will suit.

17
Technology & Information / Re: Who loves or hates their VPN?
« on: December 28, 2020, 02:05:12 AM »
You're massively overthinking this and consequently missing the point. By the time you need to ask yourself which software you "trust", you already have problems big enough that you should be wiping your entire computer and moving to Argentina.

The very existence of such a setup is contingent on not trusting some of your software, otherwise you could just trust the web browser (or whatever other tools you're running) not to leak information about your client.

This design decision can be, arguably only slightly, beneficial in case of user error.

For certain classes of user error, which I'm still not convinced are significantly more likely than the user revealing personal information directly over the "private" transport.

If you install malware on your computer, it doesn't matter how much you "trust" your kernel.

It does if you are running that malware as an unprivileged user, which should always be the case in this scenario.

This, by the way, is why we generally teach people not to reinvent the wheel when it comes to security. It usually ends very, very badly, because a single person, no matter how smart, is more likely to miss some holes than a team of dedicated people working on a solution for years.

Agreed. I can't tell if you're implying that I've suggested reinventing the wheel or not.

You're also making this assessment based on one short remark I've made about a single design decision, without having read anything else about the project. This is extremely unhelpful to this discussion, and you're potentially scaring people away from a tool which appears to be a near-perfect match to their needs.

Indeed — I don't know anything about the project and I had never heard of it until you mentioned in this thread. My reaction was based on the all-too-common approach of "put it in a VM, then it will be perfectly secure" from people with no understanding of what they are talking about, and that does make me initially sceptical of projects which rely heavily on virtualisation for isolation. I accept that it may not be warranted in this specific case — I simply don't have enough information to express anything more than wariness.

The approach has flaws (though I disagree that you identified one), but it's the least-worst option available for a relatively competent computer user who doesn't do professional-computer-somebody work for a living.

I would not go so far as to say I identified a flaw. I have concerns — and I would not personally use this project without more research to answer the questions that come to mind. But it also doesn't seem to run on my OS — actually, it doesn't have instructions to run on any system I use, since its Linux instructions assume that you use either Virtualbox or libvirt (while calling libvirt "KVM") — so there is no sense in me doing that research. This, by the way, is one of my concerns about using VMs for this, as it means they can only feasibly target a fairly narrow range of host system configurations.

Also, whether or not it is the best option depends on exactly what you want to isolate. I still think that restricting a web browser's access to OS resources is a better approach to improving privacy on the web specifically, but Whonix seems to aim for isolation of a complete OS. Depending on user needs, this may be overkill if they just need a privacy-enhanced Firefox, or it may indeed be a perfect fit.

Also, can we please just agree that, regardless of our disagreements, Thork shouldn't be further engaged in this thread?

That much is patently obvious.

18
Technology & Information / Re: Who loves or hates their VPN?
« on: December 27, 2020, 10:31:04 AM »
And memeing OpenBSD as the answer to every problem is hardly much help either.  ::)

Irrelevant.

19
Technology & Information / Re: Who loves or hates their VPN?
« on: December 27, 2020, 09:45:27 AM »
What a mess . The tl;dr

@Dr Nostrand ... spent $30 and do it right.
https://www.comparitech.com/blog/vpn-privacy/raspberry-pi-vpn

This does not address all of the concerns raised in this thread, but thanks for trying. It turns out that "just throw a VPN at it" is not a complete solution to privacy online.

20
Technology & Information / Re: Who loves or hates their VPN?
« on: December 27, 2020, 01:52:54 AM »
There is a lot of opportunity for me to fuck up permissions and own myself even without any inherent architectural issues.

If we aren't taking user caution for granted, there is also a lot of opportunity for you to send personal information over Tor or a VPN, which applies no matter what technical solution is used.

But still, don't you need IP addresses if you don't want people to see your face?

Well, this thread was asking about VPNs in general, and my initial reply was in response to that. It only became clear later that you meant using a VPN as your gateway. Also, I don't understand your question.

Also, to clarify my previous post: No work is needed to use pledge and unveil for privilege restriction, that happens for Firefox on OpenBSD by default. The work involved is to set up routing domains and pf to block non-Tor traffic, if that's a thing you want to do.

Pages: [1] 2 3 ... 101  Next >