I hereby claim:
- I am stuartlangridge on github.
- I am sil (https://keybase.io/sil) on keybase.
- I have a public key ASDGq9mbJlRG62EgMM5EdILRa4w4G3NimkeoCWxL6bQbQwo
To claim this, I am signing this object:
| #!/usr/bin/env python3 | |
| """Parses the text of Unsong, and the list of chapter initials, and finds | |
| longest common subsequences. The idea here is that if the notarikon formed | |
| by the first letter of each chapter conceals a secret message, then perhaps | |
| parts of that message have already been revealed in the book... so if there | |
| were "NIEAC" is somewhere in the list of chapter initials, then that probably | |
| stands for "Nothing Is Ever A Coincidence", as per the many times that phrase | |
| is mentioned. Idea from 75thTrombone at | |
| https://www.reddit.com/r/unsong/comments/69k1im/preemptive_final_exam_suggestion/ | |
| This script calculates those substrings. The answers are not all that promising. |
I hereby claim:
To claim this, I am signing this object:
| # Import standard python modules. | |
| import sys | |
| import time | |
| import threading | |
| import os | |
| import queue | |
| # Import Adafruit IO MQTT client. | |
| from Adafruit_IO import MQTTClient |
| #!/bin/bash | |
| file --brief --mime-type "$1" | grep "^image/" | |
| if [ $? != 0 ]; then | |
| zenity --error --text="'$1' does not seem to be an image file." | |
| exit 1 | |
| fi | |
| if ! hash convert 2>/dev/null; then |
| import sys | |
| # call as | |
| # python deredact.py "$(python redact.py hello world)" | |
| instr = " ".join(sys.argv[1:]).replace(".", "").replace(",", "") | |
| fp = open("/usr/share/dict/words") | |
| words = [x.lower() for x in fp.read().split("\n")] | |
| fp.close() |
| <?php | |
| // get this data by logging into icloud.com on the calendars page and looking at the dev tools | |
| // as per https://translate.google.com/translate?sl=de&tl=en&js=y&prev=_t&hl=de&ie=UTF-8&u=http%3A%2F%2Fnico-beuermann.de%2Fblogging%2Farchives%2F115-Zugriff-auf-iCloud-Kalender-mit-Thunderbird.html&edit-text=&act=url | |
| $account = array( | |
| 'server' => '', // note, this will be p12 or something, not P0; see the server that iclod.com serves json from | |
| 'icloudid' => '', // the "dsid" | |
| 'appleid' => '', // your Apple ID; will be an email address | |
| 'pass' => '', // password for your Apple ID | |
| 'calid' => '' // the "pGuid" |
| Verifying I am +sil on my passcard. https://onename.com/sil |
| from pelican import signals | |
| import json, urllib, urlparse, datetime, html5lib, os, codecs | |
| LIVESITEURL = "" | |
| WM_CACHE_PATH = None | |
| WM_CACHE = { | |
| "domains": {}, | |
| "pinged": {} | |
| } |
| "use strict"; | |
| /*global process, console */ | |
| function Thingy() {} | |
| Thingy.prototype.returns5 = function(cb) { process.nextTick(function() { cb(null, 5); }); }; | |
| Thingy.prototype.returns8 = function(cb) { process.nextTick(function() { cb(null, 8); }); }; | |
| var thingy1 = new Thingy(), | |
| thingy2 = new Thingy(), |
| { | |
| "browsers": [{ | |
| "chrome": { | |
| "chromeOptions": { "args": ["--incognito"] } | |
| } | |
| }] | |
| } |