Skip to content

Instantly share code, notes, and snippets.

Decentralize and democratize the Web.

Jacky Alciné jalcine

Decentralize and democratize the Web.
Block or report user

Report or block jalcine

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
jalcine / .gitignore
Last active Jun 24, 2019
Getting libuv and zeromq working together (polling setup)
View AndroidManifext.xml
<uses-permission android:name="android.permission.ACCESS_WIFI_STATE"></uses-permission>
<uses-permission android:name="android.permission.INTERNET"></uses-permission>
View webfinger.cpp
QString extractUserName(const QString& path) {
const auto parts = path.split("/", QString::SkipEmptyParts);
if (path.startsWith("/@")) {
return parts.first();
if (path.startsWith("/users")) {
return parts.last();
View ThingsIWant.markdown

Things I Want

The following is a list of things I'd like to have or would like to do to make my life a tad bit easier. Under it, I've marked off my acknowledgment (not really the completion date of) said items.

  1. A compatible equivalent for Vagrant Manager for KDE/Linux.
  2. Better management for forwarding SSH keys between tmux. done
  3. Pull out publicly available files for KDE into a kderc repository. done
  4. Incorporate this into my dotfiles
View gist:3a6cbcc642b856f036c82e01a1d4e6bc
So while doing some roadmap planning for GoodForPoc's API, I noticed a few
things that were coming up that could lead into potential issues. One notably is
how we would handle authentication and authorization. There's the option of
using Warden, a Rack-based authentication (with subtle authorization
capabilities) for Sinatra, but we'd have to write a lot of this logic by hand.
It'd be nice to leverage the community's work in the land of Devise or OmniAuth
here. That plus adding any form of social login tool would also have to be
written by hand for the project.
Migrations and data loading is also done a bit by hand (though made easier

Keybase proof

I hereby claim:

  • I am jalcine on github.
  • I am jackyalcine ( on keybase.
  • I have a public key ASAtgza3H2biYzp31HcDnfJ83FcpYgbdw8cm6rf8WRBMIgo

To claim this, I am signing this object:

jalcine / Contract Killer
Created May 22, 2017 — forked from malarkey/Contract Killer
The latest version of my ‘killer contract’ for web designers and developers
View Contract Killer

Contract Killer

The popular open-source contract for web professionals by Stuff & Nonsense

  • Originally published: 23rd December 2008
  • Revised date: March 15th 2016
  • Original post


Raspberry Pi VPN Router

This is a quick-and-dirty guide to setting up a Raspberry Pi as a "router on a stick" to PrivateInternetAccess VPN.


Install Raspbian Jessie (2016-05-27-raspbian-jessie.img) to your Pi's sdcard.

Use the Raspberry Pi Configuration tool or sudo raspi-config to:

jalcine /
Created Jan 7, 2013
Automatic speech recognition with PocketSphinx and GStreamer.
#!/usr/bin/env python
# Copyright (c) 2008 Carnegie Mellon University.
# You may modify and redistribute this file under the same terms as
# the CMU Sphinx system. See
# for more information.
import pygtk
jalcine / gist:509b4cc280226eec5c49876106239d29
Created Jan 8, 2017 — forked from mtigas/gist:952344
Mini tutorial for configuring client-side SSL certificates.
View gist:509b4cc280226eec5c49876106239d29

Client-side SSL

For excessively paranoid client authentication.

Using self-signed certificate.

Create a Certificate Authority root (which represents this server)

Organization & Common Name: Some human identifier for this server CA.

openssl genrsa -des3 -out ca.key 4096
openssl req -new -x509 -days 365 -key ca.key -out ca.crt
You can’t perform that action at this time.