Skip to content

Instantly share code, notes, and snippets.

Simon Loffler sighmon

Block or report user

Report or block sighmon

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@sighmon
sighmon / carthage-xcodebuild.fsA2FO.log
Created Feb 19, 2019
Tor.framework build error log
View carthage-xcodebuild.fsA2FO.log
This file has been truncated, but you can view the full file.
/usr/bin/xcrun xcodebuild -project /Users/xxx/Coding/iOS/Tor.framework/Tor.xcodeproj -scheme Tor-iOS -configuration Release -sdk iphoneos ONLY_ACTIVE_ARCH=NO CODE_SIGNING_REQUIRED=NO CODE_SIGN_IDENTITY= CARTHAGE=YES archive -archivePath /var/folders/jx/yr801c_w8xj3860059bj5rtr0000gp/T/Tor.framework SKIP_INSTALL=YES GCC_INSTRUMENT_PROGRAM_FLOW_ARCS=NO CLANG_ENABLE_CODE_COVERAGE=NO STRIP_INSTALLED_PRODUCT=NO (launched in /Users/xxx/Coding/iOS/Tor.framework)User defaults from command line:
IDEArchivePathOverride = /var/folders/jx/yr801c_w8xj3860059bj5rtr0000gp/T/Tor.framework
Build settings from command line:
CARTHAGE = YES
CLANG_ENABLE_CODE_COVERAGE = NO
CODE_SIGN_IDENTITY =
CODE_SIGNING_REQUIRED = NO
GCC_INSTRUMENT_PROGRAM_FLOW_ARCS = NO
@sighmon
sighmon / README.md
Last active Jan 20, 2019
OnionShare for iOS
View README.md
@sighmon
sighmon / autorun.brs
Last active Oct 23, 2018
autorun.brs - roVideoPlayer responds with playback information via HTTP get to /hello on port 8080, and UDP packet to port 6666
View autorun.brs
Sub Main()
' MuseumOS BrightSign video player
' NOTE: This script uses an roHttpServer which doesn't do TLS
' So be sure not to let the general public on this network
' Settings
videoFileToPlay = "SD:/test.mp4"
museumosUri = "http://192.168.2.1:4444"
brightSignTimestampUri = "/hello"
@sighmon
sighmon / autorun.brs
Last active Oct 11, 2018
BrightSign cache test with remote debugging
View autorun.brs
Sub Main()
msgPort = CreateObject("roMessagePort")
r = CreateObject("roRectangle", 0, 0, 1920, 1080)
is = {
port: 3000
}
config = {
inspector_server: is
brightsign_js_objects_enabled: true
@sighmon
sighmon / install-wifi.sh
Created May 22, 2018
Raspberry Pi usb -> wifi dongle driver installation
View install-wifi.sh
#!/bin/bash
#set -e
# install-wifi - 12/02/2018 - by MrEngman.
UPDATE_SELF=${UPDATE_SELF:-1}
UPDATE_URI="http://downloads.fars-robotics.net/wifi-drivers/install-wifi"
ROOT_PATH=${ROOT_PATH:-"/"}
WORK_PATH=${WORK_PATH:-"${ROOT_PATH}/root"}
View gist:e92a08dd2a9ac2b8d1970a64a1d33fe9
Verifying my Blockstack ID is secured with the address 16i4q6T3nnGfuPSYLDxBkGVaA9k8Xt25GF https://explorer.blockstack.org/address/16i4q6T3nnGfuPSYLDxBkGVaA9k8Xt25GF
@sighmon
sighmon / joy.js
Created Oct 19, 2015
Press a play button every 6 minutes
View joy.js
function playJoy(){
/* click play every 6 minutes */
document.getElementsByClassName("heroPlayButton")[0].click();
setTimeout(playJoy, 1000 * 60 * 6);
}
playJoy();
@sighmon
sighmon / gist:e5d0828c82935c9689d6
Last active Aug 29, 2015
GPGTools decrypted block in reply
View gist:e5d0828c82935c9689d6
Summary:
Replying to a partly encrypted message, https://gpgtools.org includes the decrypted block of the original message in the reply.
Steps to Reproduce:
* Reply to an email with a block of encrypted data in it amongst some unencrypted data.
* Press send, hastely read the warning, make bad assumption, send anyway.
Expected Results:
* I expected GPGTools to include the original encrypted block in the reply when clicking send.
View gist:51317d2c6ec0d6d4483b
### Keybase proof
I hereby claim:
* I am sighmon on github.
* I am sighmon (https://keybase.io/sighmon) on keybase.
* I have a public key whose fingerprint is FE44 56A4 49BD 1486 247F F787 89BB F41F DC97 AF5D
To claim this, I am signing this object:
View gist:1d84a0f87969c6feacb4
Verifying that +sighmon is my Bitcoin username. You can send me #bitcoin here: https://onename.io/sighmon
You can’t perform that action at this time.