I hereby claim:
- I am junefish on github.
- I am veronicat (https://keybase.io/veronicat) on keybase.
- I have a public key whose fingerprint is 48F0 8BB9 FF21 0762 2850 CCD8 F21D 2D3E ABDB 61E0
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
curl https://updates.signal.org/desktop/apt/dists/xenial/main/binary-amd64/Packages.gz | zcat | grep Filename | sed 's_Filename: _https://updates.signal.org/desktop/apt/_' |
$ steam | |
steam.sh[483881]: Running Steam on debian rodete 64-bit | |
steam.sh[483881]: STEAM_RUNTIME is enabled automatically | |
setup.sh[483952]: Steam runtime environment up-to-date! | |
steam.sh[483881]: Steam client's requirements are satisfied | |
max open descriptors set to 131072 | |
[2022-02-16 12:40:17] Startup - updater built Jan 16 2022 17:34:43 | |
Installing breakpad exception handler for appid(steam)/version(1642451672) | |
[2022-02-16 12:40:17] Loading cached metrics from disk (/data/games/package/steam_client_metrics.bin) | |
[2022-02-16 12:40:17] Using the following download hosts for Public, Realm steamglobal |
$ ./steam.sh | |
steam.sh[956917]: Running Steam on debian rodete 64-bit | |
steam.sh[956917]: STEAM_RUNTIME is enabled automatically | |
setup.sh[956984]: Steam runtime environment up-to-date! | |
steam.sh[956917]: Steam client's requirements are satisfied | |
max open descriptors set to 131072 | |
[2022-02-17 17:47:26] Startup - updater built Jan 16 2022 17:34:43 | |
Installing breakpad exception handler for appid(steam)/version(1642451672) | |
[2022-02-17 17:47:26] Loading cached metrics from disk (/data/games/package/steam_client_metrics.bin) | |
[2022-02-17 17:47:26] Using the following download hosts for Public, Realm steamglobal |
There is an increasing count of applications which use Authy for two-factor authentication. However many users who aren't using Authy, have their own authenticator setup up already and do not wish to use two applications for generating passwords.
Since I use 1Password for all of my password storing/generating needs, I was looking for a solution to use Authy passwords on that. I couldn't find any completely working solutions, however I stumbled upon a gist by Brian Hartvigsen. His post had a neat code with it to generate QR codes for you to use on your favorite authenticator.
His method is to extract the secret keys using Authy's Google Chrome app via Developer Tools. If this was not possible, I guess people would be reverse engineering the Android app or something like that. But when I tried that code, nothing appeared on the screen. My guess is that Brian used the
javascript: Promise.all([import('https://unpkg.com/turndown@6.0.0?module'), import('https://unpkg.com/@tehshrike/readability@0.2.0'), ]).then(async ([{ | |
default: Turndown | |
}, { | |
default: Readability | |
}]) => { | |
/* Optional vault name */ | |
const vault = ""; | |
/* Optional tags */ |