Skip to content

Instantly share code, notes, and snippets.

View chetstone's full-sized avatar

Chester Wood chetstone

View GitHub Profile
@chetstone
chetstone / nuke-firebase-db-and-users-referenced-therein.js
Last active September 24, 2018 22:13 — forked from cliffhall/nuke-firebase-db-and-users-referenced-therein.js
Nuke a Firebase Database and All User Accounts Referenced Therein
// This fork limits deletion to the first 10 users
// and deletes the data for each user separately (rather than wiping the whole database)
// Because of the firebase quota of 10 deletions/second.
// https://firebase.google.com/docs/auth/limits
// NOTE: Accounts that are not represented in your /users node will not be deleted!
// BLOG: There are other approaches, see: http://cliffordhall.com/2017/04/nuke-firebase-db-and-all-users/
'use strict';
// Get credentials and initialize firebase app
console.log(
@chetstone
chetstone / EncryptedHomeFolder.md
Last active November 28, 2023 20:35
Encrypted APFS Home Folder on Mac OSX

Encrypted APFS Home Folder on Mac OSX

Note: This is an update of Will Haley's excellent post to use APFS instead of CoreStorage.

UPDATE: Doesn't work on Catalina

The script can't read the file containing the password on the USB thumb drive. When formatted as FAT32 as described below, the user/group of the file is unknown/unknown. But I also tried formatting the USB thumb drive in HFS+, unchecking "Ignore permissions on this volume" and changing the file owner to root:wheel. The file is still not readable to the boot process. Probably something to do with new security restrictions in Catalina. A script running as root reading data from a thumb drive? Makes sense.

Back to previous program