I hereby claim:
- I am jackusm on github.
- I am jackus (https://keybase.io/jackus) on keybase.
- I have a public key whose fingerprint is 2F54 D3E8 0FF0 199A 67FD 341D 67B3 C030 0626 3121
To claim this, I am signing this object:
# https://github.com/uBlockOrigin/uAssets/pull/3517 | |
twitch-videoad.js application/javascript | |
(function() { | |
if ( /(^|\.)twitch\.tv$/.test(document.location.hostname) === false ) { return; } | |
var realFetch = window.fetch; | |
window.fetch = function(input, init) { | |
if ( arguments.length >= 2 && typeof input === 'string' && input.includes('/access_token') ) { | |
var url = new URL(arguments[0]); | |
url.searchParams.forEach(function(value, key) { | |
url.searchParams.delete(key); |
#!/usr/bin/env bash | |
set -euo pipefail | |
shopt -s inherit_errexit 2>/dev/null || true | |
# this script will connect macOS to Cloudflare Warp using Wireguard | |
# note: this is *absolutely not* an official client from Cloudflare | |
# Copyright (C) 2019 Jay Freeman (saurik) | |
# Zero Clause BSD license {{{ |
I hereby claim:
To claim this, I am signing this object:
# Description: Boxstarter Script | |
# | |
# Install boxstarter: | |
# . { iwr -useb http://boxstarter.org/bootstrapper.ps1 } | iex; get-boxstarter -Force | |
# | |
# You might need to set: Set-ExecutionPolicy RemoteSigned | |
# | |
# Run this boxstarter by calling the following from an **elevated** command-prompt: | |
# start http://boxstarter.org/package/nr/url?<URL-TO-RAW-GIST> | |
# OR |
# | |
# wm independent hotkeys | |
# | |
# terminal emulator | |
super + Return | |
urxvt | |
super + shift + Return | |
urxvt -name mini |
Docker containers seems ideal for running Tor hidden services, since they can easily be made very clean, containing little identifying data that can leak. Identifying it from the outside should be difficult.
To run a hidden web server we need two containers: