-----BEGIN PGP SIGNED MESSAGE----- | |
Hash: SHA512 | |
Undercover communication | |
It should be obvious by now, that the only way to communicate | |
stealthily and securely is to avoid raising suspicion to the | |
level at which the authorities might consider it worthwhile | |
to put you under active surveillance (e.g., park a van with | |
TEMPEST equipment by your apartment). |
#!/usr/bin/env bash | |
printf '\033[0;34m%s\033[0m\n' "Installing font for statusline..." | |
mkdir $HOME/.fonts | |
wget -O $HOME/.fonts/PowerlineSymbols.otf https://github.com/Lokaltog/powerline/raw/develop/font/PowerlineSymbols.otf | |
fc-cache -vf $HOME/.fonts | |
mkdir $HOME/.fonts.conf.d | |
wget -O $HOME/.fonts.conf.d/10-powerline-symbols.conf https://github.com/Lokaltog/powerline/raw/develop/font/10-powerline-symbols.conf |
This is a guide on how to email securely.
There are many guides on how to install and use PGP to encrypt email. This is not one of them. This is a guide on secure communication using email with PGP encryption. If you are not familiar with PGP, please read another guide first. If you are comfortable using PGP to encrypt and decrypt emails, this guide will raise your security to the next level.
I've been looking for the best Linux backup system, and also reading lots of HN comments.
Instead of putting pros and cons of every backup system I'll just list some deal-breakers which would disqualify them.
Also I would like that you, the HN community, would add more deal breakers for these or other backup systems if you know some more and at the same time, if you have data to disprove some of the deal-breakers listed here (benchmarks, info about something being true for older releases but is fixed on newer releases), please share it so that I can edit this list accordingly.
- It has a lot of management overhead and that's a problem if you don't have time for a full time backup administrator.
This is a collection of snippets, not a comprehensive guide. I suggest you start with Operational PGP.
Here is an incomplete list of things that are different from other approaches:
- I don't use keyservers. Ever.
- Yes, I use Gmail instead of some bespoke hipster freedom service
As a good crypto nerd, I usually use an entirely encrypted linux FS: /
but also
/boot
using grub LUKS support. It's a good setup but it's not perfect, the BIOS and
the bootloader are not protected.
I recently got a USBArmory and I wanted to apply the same (or a better) setup.
I found some useful links but no clear howto. So this is my setup.
# rip off from https://zeroturnaround.com/rebellabs/your-maven-build-is-slow-speed-it-up/ | |
# in .bashrc | |
set MAVEN_OPTS="-XX:+TieredCompilation -XX:TieredStopAtLevel=1" | |
# add -DdependencyLocationsEnabled=false to retain fewer outgoing connections. | |
# compile all modules | |
mvn -T 1C install -offline |
Disclaimer: This piece is written anonymously. The names of a few particular companies are mentioned, but as common examples only.
This is a short write-up on things that I wish I'd known and considered before joining a private company (aka startup, aka unicorn in some cases). I'm not trying to make the case that you should never join a private company, but the power imbalance between founder and employee is extreme, and that potential candidates would