I use brew
to install command line applications on my new shiny M1 Mac.
Since neovim is not yet available for the M1's I had to fork the HEAD-branch.
Do it like this:
brew install --HEAD tree-sitter
brew install --HEAD luajit
brew install --HEAD neovim
It might brake during the install of tree-sitter, but just build rust and whatever it complains about. After this everything worked out fine.
In times like this, when the corona pandemic hits hard and lot. You might invite friends over for work or play. And when friends are over, there is always a need to share your Wi-Fi, I mean what else are you supposed to do?
But what do you do when you don't want to say your passphrase to all of your friends and neighbours. You can of course share your access point and passphrase with a QR-code. Isn't that fantastic? So how do you do that? Well, it's real easy.
First of all you need to install the application: qrencode
This is installed by issuing the following commands:
OpenBSD:
$ pkg_add libqrencode
Void Linux:
$ xbps-install -S qrencode
Arch Linux/Manjaro/etc:
$ pacman -S qrencode
Debian/Ubuntu/etc:
$ apt install qrencode
Then you have to use a specific format like this:
WIFI:S:{SSID};T:{WPA};P:{passphrase};;
On Linux or equivalent system: qrencode -o - -t utf8 'WIFI:S:HomeNetwork;T:WPA;P:ThisismylongpassphrasethatevenIcantremember;;'
There is a template for building (not for musl) it from source in void-packages. I never tried the official binary.
# git clone --depth=1 https://github.com/void-linux/void-packages
# cd void-packages
# ./xbps-src binary-bootstrap
# echo XBPS_ALLOW_RESTRICTED=yes >> etc/conf
# ./xbps-src pkg MEGAsync
$ xbps-install --repository=hostdir/binpkgs MEGAsync
And when Megasync is updated or you do a full
$ xbps-install -Su
you need to build Megasync from the sources again.
I am really impressed with the new upgrade process in OpenBSD. It's called 'sysupgrade' – “upgrade system to the next release or a new snapshot”.
I am using the awesome service at openbsd.amsterdam for various BSD explorations and teaching myself the whole ecosystem.
Now the 6.5 version has been released into the wild I decided to upgrade my vm on openbsd.amsterdam. Here's the guide to upgrade your vm.
Hope this helps!
I have been translating Tusky to Swedish for a couple of months now. It is a great and fuzzy feeling when there is a great FOSS-project we all can contribute to.
The last weeks the head developer @ConnyDuck@chaos.social has tested a couple of different translation projects, like Crowdin and now lately Weblate, we both prefer the latter since it is open source and possible to host on your own infrastructure.
I've just donated $12 to Tusky. Consider donating too, every little helps! https://opencollective.com/tusky?referral=32452
Spleen is the new default font in OpenBSD, thanks to Frederic Cambus.
Monospaced bitmap fonts for consoles,
terminals, and code editors.
available in 5 sizes:
1. 5x8
2. 8x16
3. 12x24
4. 16x32
5. 32x64
I personally installed the fonts on both Mac OS X and Arch Linux without any issues. The fonts are looking really great.
As seen on reddit. CloudFlare's 1.1.1.1 public DNS manually manipulates the .org zone for its users, setting a scary precedent.
This is a list I wrote about a year ago, but it's still accurate:
- It's not really free. It's like a drug dealer “First ones free”.
- Shared SSL certificates
- Forced to use Comodo for SSL. Comodo's CEO is a sleazebag.
- Can't use Let's Encrypt for SSL
- Can't use your own SSL
- Decrypts SSL traffic, breaking End-To-End Encryption.
- Cooperates with tyrannical governments
- Provides services to terrorists, child pornographers, and so on
- Has no “vetting” process for new customers
- Does not protect your website from hacking
- Doesn't provide any value to 99% of websites
- Cloudflare's CEO is an ego-maniac who believes he controls the entire internet.
More details on SSL decryption:
Keyless SSL requires that Cloudflare decrypt, inspect and re-encrypt traffic > for transmission back to a customer’s origin.''
Source: https://www.cloudflare.com/ssl/keyless-ssl/
By doing that, Cloudflare is violating the trust between users and server operators and making the SSL certificate itself worthless. A website cannot be considered “Secure” if the traffic is decrypted by a man in the middle.