Skip to content

Instantly share code, notes, and snippets.

Avatar

Simon Loffler sighmon

View GitHub Profile
@sighmon
sighmon / carthage-xcodebuild.fsA2FO.log
Created Feb 19, 2019
Tor.framework build error log
View carthage-xcodebuild.fsA2FO.log
This file has been truncated, but you can view the full file.
/usr/bin/xcrun xcodebuild -project /Users/xxx/Coding/iOS/Tor.framework/Tor.xcodeproj -scheme Tor-iOS -configuration Release -sdk iphoneos ONLY_ACTIVE_ARCH=NO CODE_SIGNING_REQUIRED=NO CODE_SIGN_IDENTITY= CARTHAGE=YES archive -archivePath /var/folders/jx/yr801c_w8xj3860059bj5rtr0000gp/T/Tor.framework SKIP_INSTALL=YES GCC_INSTRUMENT_PROGRAM_FLOW_ARCS=NO CLANG_ENABLE_CODE_COVERAGE=NO STRIP_INSTALLED_PRODUCT=NO (launched in /Users/xxx/Coding/iOS/Tor.framework)User defaults from command line:
IDEArchivePathOverride = /var/folders/jx/yr801c_w8xj3860059bj5rtr0000gp/T/Tor.framework
Build settings from command line:
CARTHAGE = YES
CLANG_ENABLE_CODE_COVERAGE = NO
CODE_SIGN_IDENTITY =
CODE_SIGNING_REQUIRED = NO
GCC_INSTRUMENT_PROGRAM_FLOW_ARCS = NO
@sighmon
sighmon / README.md
Last active Jan 20, 2019
OnionShare for iOS
View README.md
@sighmon
sighmon / autorun.brs
Last active Mar 15, 2021
autorun.brs - roVideoPlayer responds with playback information via HTTP get to /hello on port 8080, and UDP packet to port 6666
View autorun.brs
Sub Main()
' MuseumOS BrightSign video player
' NOTE: This script uses an roHttpServer which doesn't do TLS
' So be sure not to let the general public on this network
' Settings
videoFileToPlay = "SD:/test.mp4"
museumosUri = "http://192.168.2.1:4444"
brightSignTimestampUri = "/hello"
@sighmon
sighmon / autorun.brs
Last active Oct 11, 2018
BrightSign cache test with remote debugging
View autorun.brs
Sub Main()
msgPort = CreateObject("roMessagePort")
r = CreateObject("roRectangle", 0, 0, 1920, 1080)
is = {
port: 3000
}
config = {
inspector_server: is
brightsign_js_objects_enabled: true
@sighmon
sighmon / install-wifi.sh
Created May 22, 2018
Raspberry Pi usb -> wifi dongle driver installation
View install-wifi.sh
#!/bin/bash
#set -e
# install-wifi - 12/02/2018 - by MrEngman.
UPDATE_SELF=${UPDATE_SELF:-1}
UPDATE_URI="http://downloads.fars-robotics.net/wifi-drivers/install-wifi"
ROOT_PATH=${ROOT_PATH:-"/"}
WORK_PATH=${WORK_PATH:-"${ROOT_PATH}/root"}
View gist:e92a08dd2a9ac2b8d1970a64a1d33fe9
Verifying my Blockstack ID is secured with the address 16i4q6T3nnGfuPSYLDxBkGVaA9k8Xt25GF https://explorer.blockstack.org/address/16i4q6T3nnGfuPSYLDxBkGVaA9k8Xt25GF
@sighmon
sighmon / joy.js
Created Oct 19, 2015
Press a play button every 6 minutes
View joy.js
function playJoy(){
/* click play every 6 minutes */
document.getElementsByClassName("heroPlayButton")[0].click();
setTimeout(playJoy, 1000 * 60 * 6);
}
playJoy();
@sighmon
sighmon / gist:e5d0828c82935c9689d6
Last active Aug 29, 2015
GPGTools decrypted block in reply
View gist:e5d0828c82935c9689d6
Summary:
Replying to a partly encrypted message, https://gpgtools.org includes the decrypted block of the original message in the reply.
Steps to Reproduce:
* Reply to an email with a block of encrypted data in it amongst some unencrypted data.
* Press send, hastely read the warning, make bad assumption, send anyway.
Expected Results:
* I expected GPGTools to include the original encrypted block in the reply when clicking send.
View gist:51317d2c6ec0d6d4483b
### Keybase proof
I hereby claim:
* I am sighmon on github.
* I am sighmon (https://keybase.io/sighmon) on keybase.
* I have a public key whose fingerprint is FE44 56A4 49BD 1486 247F F787 89BB F41F DC97 AF5D
To claim this, I am signing this object:
View gist:1d84a0f87969c6feacb4
Verifying that +sighmon is my Bitcoin username. You can send me #bitcoin here: https://onename.io/sighmon