Skip to content

Instantly share code, notes, and snippets.

Avatar

Dietrich Ayala autonome

View GitHub Profile
@autonome
autonome / thingfinder.js
Created March 17, 2023 16:03
script to dump IPFS Thing airtable to local toml files ready for a GHA to make a PR w/ those changes
View thingfinder.js
const https = require('https');
const token = process.env.AIRTABLE_TOKEN;
const url = 'https://api.airtable.com/v0/apptAzTf0HPbYkCbn/Responses'
const options = {
headers: {
'Authorization': 'Bearer ' + token
@autonome
autonome / camera-test.html
Created October 31, 2019 19:59
getUserMedia camera test
View camera-test.html
<style>
html, body, div, a-scene {
background-color: transparent;
}
#video {
/* overrule a-frame default styles */
width: 100% !important;
max-width: 100% !important;
View userChrome.css
/*
* Do not remove the @namespace line -- it's required for correct functioning
*/
@namespace url("http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul"); /* set default namespace to XUL */
/*
Disable tab throbber to stop battery death.
https://bugzilla.mozilla.org/show_bug.cgi?id=1422090#c67
*/
@autonome
autonome / download-site-as-static.sh
Created January 21, 2019 22:52
download website for static/offline use
View download-site-as-static.sh
wget \
--recursive \
--no-clobber \
--page-requisites \
--html-extension \
--convert-links \
--restrict-file-names=windows \
--domains yourdomain.com \
--no-parent \
--no-cache \
View webextension-protocols-and-origins.txt
<dietrich> asuth: do you know anything about whether indexedb should be available for pages that are non-http/s protocols? looks like it worked until 63.
<dietrich> (or who would know?)
<mconley> dietrich: maybe bevis?
<asuth> dietrich: Are you actually creating origins under new protocols? Many things won't like that.
dietrich: QuotaManager won't create directories for origins it doesn't understand. Here's the "okay" list: https://searchfox.org/mozilla-central/source/dom/quota/ActorsParent.cpp#8462
<asuth> dietrich: In particular, are the protocols implemented via https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/WebExtensions/manifest.json/protocol_handlers? Because if so I'd expect the semantics to conform to those of https://html.spec.whatwg.org/multipage/system-state.html#custom-handlers
dietrich: And in particular the clause ```User agents must throw a "SecurityError" DOMException if the resulting URL record has an origin that differs from the origin specified by the relevant settings objec
View metalsmith.js
function build(callback) {
Metalsmith(__dirname) // __dirname defined by node.js:
// name of current working directory
.metadata({ // add any variable you want
// use them in layout-files
sitename: "foo",
siteurl: "https://foo.com/",
description: "Website!",
generatorname: "Metalsmith",
generatorurl: "https://metalsmith.io/"
View xoxo-venues-with-location.json
{
"coliseum": {
"name": "Veterans Memorial Coliseum",
"location": {
"latitude": "45.532141",
"longitude": "-122.6693299"
},
"link": "https://goo.gl/maps/sPJe9UY5Nqs"
},
"mainstage": {
@autonome
autonome / web-tech-subreddits.csv
Last active March 27, 2018 17:56
Subreddits related to web development - name, subscribers, age in years
View web-tech-subreddits.csv
name subscribers ageinyears
/r/programming 1003937 12
/r/technology 6005355 10
/r/learnprogramming 517081 8
/r/javascript 227797 10
/r/webdev 208237 9
/r/node 54220 8
/r/reactjs 47536 4
/r/learnjavascript 40905 5
/r/frontend 32008 6
@autonome
autonome / Privacy-by-Design.md
Created February 8, 2018 22:42 — forked from anseljh/Privacy-by-Design.md
Enhancing Alert App User Privacy by Design
View Privacy-by-Design.md

SMS and Privacy

There are a few problems with delivering alerts via SMS, but they mostly boil down to this: SMS is not very private.

For vulnerable audiences, it’s preferable to not collect any subscriber information at all. This isn’t possible with SMS, because you have to know the recipient’s phone number to deliver a message. Unless you’re talking about burners—which most people won’t have—that phone number is tied to a real identity. This is a vulnerability in at least these scenarios:

  • If the alerting app itself gets targeted (whether by LE or other malicious actors), user-identifying information could be leaked.
  • Phone companies cooperate with LE, through legal process (subpoenas) or otherwise, to find out which phone subscribers are receiving SMS alerts.
  • LE , IC, or well-resourced hackers snoop on the SMS network.
@autonome
autonome / userChrome.css
Created January 18, 2018 19:31
@dietrich's userChrome.css file for Firefox
View userChrome.css
/*
* Do not remove the @namespace line -- it's required for correct functioning
*/
@namespace url("http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul"); /* set default namespace to XUL */
/*
Disable tab throbber to stop battery death.
https://bugzilla.mozilla.org/show_bug.cgi?id=1422090#c67
*/