perfect. you understood me well.
a new file (e)xplorer
i was looking for a filemanager that can zoom the screen text … for half blind like me. going to check this out.
unfortunately not working due to ssl issue.
xplorer: error while loading shared libraries: libssl.so.1.1: cannot open shared object file: No such file or directory
well i discovered metasploit and nmap now
Invaluable to run Windows utilities alongside games via Proton, making sure they share the same prefix and environment; for instance, Cheat Engine, installers for mods, etc.
There are a number of similar solutions around, but this one is quite simple and understandable, with only few dozen lines of bash (plus a small C utility which I think could be replaced by declare -px). It should be quite reliable in terms of getting the environment right, since it extracts the data from the command launched by Steam itself.
The script contains an “rm -r”, which I never like to see in bash scripts, but I don’t see any way for it to fail.
Actually one can just execute Proton executable from the Steam folder. Once I found it out, wrote a script to do it and it could run any program. And it does not contain any rm -r stuff, which I hate in scripts too and no C utility.
It got bit more attention than I thought and even Michael from Michael Tunnell channel featured it. And someone worked on it even further by creating a fork: https://gist.github.com/brunoais/575db9912368124d3223784afe20158c
But in general it is not really recommended to use Proton for any other application that Steam games. I personally don’t use it anymore, but post it here because you seem to be interested into the concept. And to provide easy to understand alternatives.
Yeah I meant to post the other list, minus the “fucking.” My bad.
As long as I’m here:
I’ve switched over to zsh & am slowly figuring out how to use it as well as learn shell & scripting in general since I only moved over to Linux what like 6ish months ago?
Anyway, I found a package manager that will force me to learn even more since it uses a ton of zsh-heavy language but it’s functionality is insane! It’s based off of zdharma(/ iirc zinit?) which I heard is top notch & their website is so sleek & cool!
Z-Shell’s Zi
Check it out if it’s something you’d be interested in.
List of the most secure and private phones?
- Apple iPhone with iOS
With the whole context:
There isn’t a single phone model that can be considered the “most secure and private,” but several smartphones prioritize privacy and security features more than typical consumer devices. Here are some options worth considering if you value your digital privacy and want enhanced device protection:
Purism Librem 5 USA: This Linux-based smartphone focuses on user privacy and freedom. With hardware kill switches for cameras, microphones, Wi-Fi, cellular connectivity, and Bluetooth, you have complete control over which components are active at any given time. Additionally, Purism emphasizes open-source software and transparent supply chains, ensuring greater scrutiny and oversight of potential vulnerabilities. However, its performance may not match high-end flagship devices due to limited processing power and less optimized apps compared to mainstream operating systems like Android or iOS.
Apple iPhone (latest models): Although not specifically designed for maximum privacy, iPhones offer robust built-in encryption and strict app guidelines enforced through App Store policies. Features like Face ID and Touch ID provide biometric authentication, while iMessage offers end-to-end encryption for messaging between Apple devices. Furthermore, Apple has been praised for standing up to government agencies regarding data access, indicating a commitment to user privacy. Still, keep in mind that no mobile platform is entirely immune to breaches and exploits; thus, additional measures like VPN usage and careful app selection are recommended.
Google Pixel series (with GrapheneOS): While standard Android devices come with various tracking mechanisms and closed-source elements, installing custom ROMs like GrapheneOS on compatible Pixel devices provides improved privacy and security. GrapheneOS removes proprietary services, sandboxes applications, and enhances hardening techniques to minimize attack surfaces. Moreover, Pixel phones benefit from timely updates directly from Google, ensuring quick patching of newly discovered vulnerabilities. Note that flashing a custom ROM requires technical expertise, and the process might void the manufacturer’s warranty.
BlackBerry KEY2 / KEYone: These QWERTY keyboard-equipped devices cater primarily to business professionals seeking heightened levels of security and productivity. They feature DTEK, a built-in application monitoring system that alerts users about potentially malicious activities. In addition, both devices include full disk encryption, allowing only authorized users to access stored information. Keep in mind that these handsets run Android underneath, meaning there could still be residual risks associated with third-party apps and services installed from the Play Store.
When choosing a private and secure phone, consider factors beyond just the hardware itself, including the operating system, available apps, and ecosystem around the device. Ultimately, maintaining good cybersecurity habits remains crucial regardless of the phone used, such as employing strong passwords, enabling two-factor authentication, keeping software updated, and practicing cautious browsing habits.
I’m going to add one I can’t see in this thread (Vorta) - which is a frontend to the excellent backup utility, borg.
Here’s my backup routine ; Offline, Online, Dupe & Airgapped.
- Scheduled nightly backup to Synology NAS (rsync)
- Scheduled nightly encrypted backup from NAS to Cloud using Hyperbackup.
- Scheduled daily backup to NAS-Attached External HDD via Vorta/Borg
- Quarterly backup to airgapped HDD.
People tend to forget what a back up really is, in the true sense of the word.
One backup = no backup.
Cloudsync = no backup.
Keep your data secure, resilient, and protected (encrypted). Backup in triplicate.
I don’t mind being tracked, sometimes it is just nice to be wanted. And I am so f’ing boring, the bots tracking me tend to start self-harming and then go and live in a cave near Milton Keynes.
Payphone with no security cameras or people around
I let 1 company track “me” bodgey email etc but get about $30 savings a month on food the only difference I see is now they have a “name” to put down compared to me not being signed up
A nice Terminal Youtube alternative
This looks really cool, going to have to give it a go at some point
Recently discovered QMK to customize your keyboard, create macros and etc.
This is a really nice program. If you install ueberzug
you can search youtube with thumbnails
ytfzf -t youtube.com/whsndnkjdsh