/etc/mkinitcpio.conf
HOOKS="systemd autodetect modconf block keymap sd-encrypt filesystems keyboard fsck"
lsblk
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT
nvme0n1 259:0 0 477G 0 disk
# Create new chain | |
iptables -t nat -X REDSOCKS | |
iptables -t nat -N REDSOCKS | |
# Ignore LANs and some other reserved addresses. | |
iptables -t nat -A REDSOCKS -d 0.0.0.0/8 -j RETURN | |
iptables -t nat -A REDSOCKS -d 10.0.0.0/8 -j RETURN | |
iptables -t nat -A REDSOCKS -d 10.10.1.0/22 -j RETURN | |
iptables -t nat -A REDSOCKS -d 127.0.0.0/8 -j RETURN | |
iptables -t nat -A REDSOCKS -d 169.254.0.0/16 -j RETURN |
Verifying that +daemonp is my openname (Bitcoin username). https://onename.io/daemonp |
/etc/mkinitcpio.conf
HOOKS="systemd autodetect modconf block keymap sd-encrypt filesystems keyboard fsck"
lsblk
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT
nvme0n1 259:0 0 477G 0 disk
Stable enough for my initial use-case, light-duty laptop for travel and presentations, running Linux all the time but retain a small ChromeOS volume for firmware updates and restoring settings.
1st attempt I wiped the drive and then found that when the machine attempted to suspect when the lid closed it wiped the NVRAM with no other option to boot into legacy mode than to restore ChromeOS and enable it again.
jq '[path(..)|map(if type=="number" then "[]" else tostring end)|join(".")|split(".[]")|join("[]")]|unique|map("."+.)|.[]'
Simple way to post an encrypted screenshot to IPFS and decrypt it on the fly with the public key as an anchor in the link.
Garto:
ipfs hash A is just the encrypted image, and ipfs hash B is a page that isn't encrypted and contains js that downloads the image using a hard coded (in B) reference to A and decrypts using the frag identifier from url B. Then you just share B and it Just Works.