Skip to content

Instantly share code, notes, and snippets.

View tildelowengrimm's full-sized avatar
🚯
Drop ICE, you cowards.

Tilde Lowengrimm tildelowengrimm

🚯
Drop ICE, you cowards.
View GitHub Profile
@tildelowengrimm
tildelowengrimm / Astral-Throb_archiver.sh
Last active April 18, 2020 18:26
Archive Synthwave Mixes from Astral Throb
## Download the excellent synthwave mixes created by Astral Throb, split the
## audio into individual songs, and label them with metadata, including
## excellent cover art. Ideal for offline listening.
## Dependencies:
## - youtube-dl
## - jq
## - ffmpeg
## - eyeD3
#!/bin/bash
# A script to increase the amount of swap space available in VMs running
# Qubes' default kernel. VMs running non-default kernels will be allocated
# volatile images which are un-necessarily large, but will otherwise run fine.
#
# Why not increase the swap allocated for all kernels? If something goes
# horribly wrong, it would be nice to be able to use an older kernel version
# temporarily while fixing whatever went wrong.
#
#!/bin/zsh
zmodload zsh/mathfunc
THRESHOLD=35
CANDIDATE=$(ps -ax -o "%p|%C|%a" | grep '/opt/google/chrome/chrome' | grep 'type=gpu-process')
if [ "$CANDIDATE" = "" ] ; then
echo "["$(date --rfc-3339=seconds)"]: No Chrome GPU processes running."
@tildelowengrimm
tildelowengrimm / qubes-authentication.md
Last active May 26, 2018 18:21
Qubes OS authentication info
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

When I install software, I'd prefer to have a secure delivery mechanism. Qubes OS uses a relatively robust system. A master signing key is kept on a “dedicated, air-gapped "vault" machine”. This key certifies dedicated keys for each major release.

Sadly, I don't have a good way to verify the Qubes master signing key. Instead, I tried downloading the Qubes key packet from various different network endpoints, and over a bunch of different Tor circuits. I asked some friends to try the same thing. We all got the same results.