Category: Tech
-
My vim setup – with some rust specifities
So, I’ve got this thing called a sick leave due ti my depression. It means I have a lot of time to do whatever I want. It includes writing stuff here, making the garden and wait for plant to grow, spend countless hours on Crusader Kings 2 et Europa Universalis 4 (my life is now…
-
Onionify
Hidden services So, for those of you who never heard about it, there’s some hidden services in the wild. They’re called .onion if you use Tor – and you should. Facebook, for instance, also have a .onion. My blog to. It’s neat, it helps protect privacy of the user and escape mass surveillance and censorship.…
-
GMail … seriously?
[[!meta description="""No, seriously, people are arguing that GMail is in fact a good choice to protect your privacy online. They might be on GMail: why it’s not a good thing This post is an answer to jbfavre post[FR], in which he state that – from a metadata point of view, your safer in the mass…
-
Searx
Welcome to searx You might have noticed some change on my seeks node since it’s not a seeks node anymore, but instead it’s a searx node. Searx is a project started by asciimoo after Taziden gave a talk at Camp zer0 about going forward with seeks and opening it up to a wider base of…
-
TBS – Distributing Transcoding
The issue at hand Recently I’ve worked a lot on adding content to the TBS by parsing the intertubes auto magically. Fr instance, I have a tumblr and a twitter parser who allows me to gather data (especially in Egypt for instance). Even if those parsers are stupid, they works. Another one I wante dto…
-
Building OpenWRT to have PirateBox working on TL-WR703N v1.7
It started with a workshop With some friends, we decided to have a workshop around the [Piratebox][], so we ordered a lot of TP-link WR703n and started to flash them. They are labelled as 1.6 revision, but we discovered it the hard way they’re not (worse, some of them actually are, and we were lucky…
-
Yubikey required at boot
Update (02/11/2012) I added the ‘ask a passphrase’ functionnality in the hook. Intro As you might already know, I have a yubikey I use as an authentication token. Without it, I cannot log on my computer as a normal user. But I wanted to do more than that. Like, blocking the boot if the key…
-
VPN in a pocket
About the so-called Pirate Box Everything started when I found not less than three pirate boxes running at the PSES 2012 conferences and all of them were unaware of the two other. Worse, you could connect to one piratebox or to the internet, but not both, because pirate box runs off-line. And this is the…
-
How did I streamed the last JHack conference
Introduction So, yesterday, the regular Jhack crew set-up an event with Richard Stallman to talk and exchange around the issues involving Free Software and Human rights. And, as we want to build and keep history (also, it was a week day, so some people can’t come physically to the nice place we’ve had for the…
-
Yubico, PAM, and Challenge/response Authentication
Introducing the yubikey The yubikey is a small device that act as a token generator for authentication system. Yubico build them and, as they’re seen as a Universal Keyboard, they can be easily interfaced with any kind of system. From generating OATH token, to One Time Password systems, going by Radius and OpenVPN server authentication,…