- Use an iPod or an iPad without a SIM card
- Use an iPhone
- Do not jailbreak
- Always upgrade to new iOS versions
- Use Brave browser
#!/bin/bash | |
#updated ffmpeg progress indicator | |
#by Rupert Plumridge | |
#for updates visit www.prupert.co.uk | |
#Creative Commons Attribution-Non-Commercial-Share Alike 2.0 UK: England & Wales Licence | |
# Based on the ffmpegprogress bar from: http://handybashscripts.blogspot.com/2011/01/ffmpeg-with-progress-bar-re-work.html | |
# which was based on my initital progress script - circle of life and all that ;) | |
# version 2.0 | |
# 07.04.2011 | |
# now uses apparently better progress detection, based on duration of overall video and progress along the conversion |
import socket | |
import random | |
host = "blackbox_ced7f267475a0299446fa86c26d77161.quals.shallweplayaga.me" | |
port = 18324 | |
inputs = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789!\"#$%&'()*+,-./:;<=>?@[\]^_`{|}~ " | |
s = socket.socket() | |
s.connect((host, port)) |
151 out = "" | |
152 shift = 0 | |
153 for j in xrange(0,len(ans),4): | |
154 try: | |
155 i = j | |
156 out += inputs[(inputs.index(ans[i])-inputs.index(key[0])-shift)%len(inputs)] | |
157 shift += inputs.index(ans[i])+1 | |
158 i = j+1 | |
159 out += inputs[(inputs.index(ans[i])-inputs.index(key[0])-shift)%len(inputs)] | |
160 shift += inputs.index(ans[i])+1 |
clear all; | |
close all; | |
clc; | |
load data_logreg.mat; | |
isOctave = exist('OCTAVE_VERSION', 'builtin') ~= 0; | |
eta = 1; | |
options.degrees = [1 2 5 15]; |
Short version: I strongly do not recommend using any of these providers. You are, of course, free to use whatever you like. My TL;DR advice: Roll your own and use Algo or Streisand. For messaging & voice, use Signal. For increased anonymity, use Tor for desktop (though recognize that doing so may actually put you at greater risk), and Onion Browser for mobile.
This mini-rant came on the heels of an interesting twitter discussion: https://twitter.com/kennwhite/status/591074055018582016
#!/usr/bin/env python | |
import urllib2 | |
import json | |
if __name__ == '__main__': | |
# Computer Science (557), BSc. (140), Current "Studienjahr" (1034) | |
# .json -> simple json | |
# .js -> jsonp | |
# webcal:// ... /exams.ical -> iCalendar | |
url = 'http://tugbox.herokuapp.com/tug/curriculum/557,140,1034/exams.ical' |
I hope this patch is acceptable in something like its present form. If | |
so, I'll write up the documentation updates as well. (But I suspect it | |
may spark some discussion.) | |
It updates some rather outdated defaults hard-wired into GnuPG: | |
1. Default cipher algorithm: CAST5 -> AES256 | |
2. Default digest algorithm: SHA1 -> SHA512 | |
3. Default S2K hash algorithm: SHA1 -> SHA256 | |
4. Default S2K iterations: 255 (this takes about 400ms in E2E, not |
- Developers have responded:
https://www.grc.com/misc/truecrypt/truecrypt.htm | https://twitter.com/stevebarnhart/status/472192457145597952
Steven Barnhart (@stevebarnhart) wrote to an eMail address he had used before and received several replies from “David.” The following snippets were taken from a twitter conversation which then took place between Steven Barnhart (@stevebarnhart) and Matthew Green (@matthew_d_green):
TrueCrypt Developer “David”: “We were happy with the audit, it didn't spark anything. We worked hard on this for 10 years, nothing lasts forever.”
Steven Barnhart: (Paraphrasing) Developer “personally” feels that fork is harmful: “The source is still available as a reference though.” >
I wasn't first to get the key. Nor was I second, third, or even fourth. I'm probably not even the | |
10th to get it (ok, looks like I was the 8th.) But I'm happy that I was able to prove to myself | |
that I too could do it. | |
First, I have to admit I was a skeptic. Like the handful of other dissenters, I had initially | |
believed that it would be highly improbable under normal conditions to obtain the private key | |
through exploiting Heartbleed. So this was my motivation for participating in Cloudflare's | |
challenge. I had extracted a lot of other things with Heartbleed, but I hadn't actually set out to | |
extract private keys. So I wanted to see first-hand if it was possible or not. |