Skip to content

Instantly share code, notes, and snippets.

View jscott22's full-sized avatar

Jason Scott jscott22

  • Tink
  • Gothenburg, Sweden
View GitHub Profile
@jscott22
jscott22 / full-disk-encryption-arch-uefi.md
Created June 28, 2019 05:13 — forked from huntrar/full-disk-encryption-arch-uefi.md
Arch Linux Full-Disk Encryption Installation Guide [Encrypted Boot, UEFI, NVMe, Evil Maid]

Arch Linux Full-Disk Encryption Installation Guide

This guide provides instructions for an Arch Linux installation featuring full-disk encryption via LVM on LUKS and an encrypted boot partition (GRUB) for UEFI systems.

Following the main installation are further instructions to harden against Evil Maid attacks via UEFI Secure Boot custom key enrollment and self-signed kernel and bootloader.

Preface

You will find most of this information pulled from the Arch Wiki and other resources linked thereof.

Note: The system was installed on an NVMe SSD, substitute /dev/nvme0nX with /dev/sdX or your device as needed.

@jscott22
jscott22 / evil-refresh-cursor.el
Created March 19, 2019 14:25 — forked from yuhan0/evil-refresh-cursor.el
rate limit evil-refresh-cursor
(defvar evil--refresh-cursor-last-executed 0
"Unix time of when the evil cursor was last refreshed")
(defvar evil-refresh-cursor-delay 0.1
"Max delay in seconds between each cursor refresh")
(defvar evil--refresh-cursor-current-timer nil
"Current timer keeping track of cursor refresh changes")
(defvar evil--refresh-cursor-delayed-specs nil
"Cons pair of cursor (state . buffer) to set after the delay")