kb_cpu   620

« earlier    

Welcome — Magic-Wormhole 0.10.5+29.g355cc01.dirty documentation
The notion of a "magic wormhole" comes from the image of two distant wizards speaking the same enchanted phrase at the same time, and causing a mystical connection to pop into existence between them. The wizards then throw books into the wormhole and they fall out the other side. Transferring files securely should be that easy.
kb_cpu  security  encryption  tools  library 
3 days ago by rootis0
How the Math Men Overthrew the Mad Men | The New Yorker
Google, for its part, has merged all the data it collects from its search, YouTube, and other services, and has introduced an About Me page, which offers advertisers your date of birth, phone number, where you work, mailing address, education, where you’ve travelled, your nickname, photo, and e-mail address. Amazon knows even more about you. Since it is the world’s largest store and sees what you’ve actually purchased, its data are unrivalled. Amazon reaches beyond what interests you (revealed by a Google search) or what your friends are saying (on Facebook) to what you actually purchase. With Amazon’s Alexa, it has an agent in your home that not only knows what you bought but when you wake up, what you watch, read, listen to, ask for, and eat. And Amazon is aggressively building up its meagre ad sales, which gives it an incentive to exploit its data.
kb_society  kb_cpu  privacy  law 
3 days ago by rootis0
Who will steal Android from Google? – Steve Yegge – Medium
And Android? Yep. It’s the biggest poo sandwich of them all. Android devs are heroes, if you’ll pardon the pun. Programming Android for a huge app like Google Maps or Facebook or Snapchat is… just… I mean you wouldn’t believe me if I told you. Sitting there for twenty minutes to wait to see what happens after you change one line of code. And every change you make, no matter how tiny, has an 80% chance of not working the first time you try it, because the feature interoperability matrix is bizarrely sparse. Sure you can use X, and you can use Y, but you can’t use X together with Y because screw you buddy.
kb_cpu  android 
5 weeks ago by rootis0
Eramdam: "Did You Know: Mastodon's webapp is a PWA (Progre…" - Octodon
Did You Know™: Mastodon's webapp is a PWA (Progressive Web App) so you can have your-very-own Mastodon app on your desktop in a few clicks in Chrome now!
kb_cpu  web  app 
5 weeks ago by rootis0
jrblevin/deft: Deft for Emacs
Deft is an Emacs mode for quickly browsing, filtering, and editing directories of plain text notes, inspired by Notational Velocity. It was designed for increased productivity when writing and taking notes by making it fast and simple to find the right file at the right time and by automating many of the usual tasks such as creating new files and saving files.
kb_cpu  emacs 
5 weeks ago by rootis0
Build a house in Minecraft using Python - Raspberry Pi
Writing programs that create things in Minecraft is not only a great way to learn how to code, but it also means that you have a program that you can run again and again to make as many copies of your Minecraft design as you want.
kb_cpu  raspberry_pi 
6 weeks ago by rootis0
I Downloaded the Information That Facebook Has on Me. Yikes. - The New York Times
With a few clicks, I learned that about 500 advertisers — many that I had never heard of, like Bad Dad, a motorcycle parts store, and Space Jesus, an electronica band — had my contact information, which could include my email address, phone number and full name. Facebook also had my entire phone book, including the number to ring my apartment buzzer. The social network had even kept a permanent record of the roughly 100 people I had deleted from my friends list over the last 14 years, including my exes.
kb_cpu  privacy 
6 weeks ago by rootis0
Cloudflare Argo Tunnel with Rust+Raspberry Pi
Argo Tunnel exposes applications running on your local web server, on any network with an Internet connection, without adding DNS records or configuring a firewall or router. It just works.
kb_cpu  web  documentation  rust  raspberry_pi 
6 weeks ago by rootis0
How to keep your ISP’s nose out of your browser history with encrypted DNS | Ars Technica
And in addition to simple, passive eavesdropping attacks, there's also the threat of more active attacks against your DNS traffic—efforts by an ISP or a government on the wire to "spoof" the identity of a DNS server, routing traffic to their own server to log or block traffic.
kb_cpu  web  documentation 
6 weeks ago by rootis0
Using Emacs as a C++ IDE - Take 2
...it only parses the file you currently have open, unlike some completion frameworks that would re-parse the entire project.
kb_cpu  emacs 
7 weeks ago by rootis0
emacs-lsp/lsp-mode: Emacs client/library for the Language Server Protocol
A Emacs Lisp library for implementing clients for servers using Microsoft's Language Server Protocol (v3.0).
kb_cpu  emacs 
10 weeks ago by rootis0
converse.js (Slack Bait and Switch)
For the last few years I've been working in my spare time on making a JavaScript XMPP chat client, called converse.js. Originally the idea was to make a Gtalk like chat client that you integrate in your website
kb_cpu  web  library 
10 weeks ago by rootis0
Easy photo galleries with Sigal [LWN.net]
Sigal is a "simple static gallery generator" with a straightforward design, a nice feature set, and great themes.
kb_cpu  photography  linux  web  tools 
10 weeks ago by rootis0
Options for Structured Data in Emacs Lisp « null program
...we should also define some setters using the built-in _gv_ (generalized variable) package
kb_cpu  emacs 
february 2018 by rootis0

« earlier    

related tags

5*  accounting  android  app  bash  book  bookmarklet  c++  c  command_line  crypto  css  dlang  documentation  dropbox  egypt  emacs  email  encryption  extensions  fonts  game  golang  gtk  hardware  history  html  html5  irc  java  javasacript  javascript  kb_society  kernel  language  law  libraries  library  linux  lisp  lua  mac  mail  newyorker  photography  privacy  programmig  programming  python  raspberry_pi  rust  scheme  security  server  tcl  tool  tools  unix  video  web 

Copy this bookmark:



description:


tags: