cYpherpunK.at > encrypt - protect - private - information

cYpherpunK.at

encrypt – protect – private – information

Home
Skip to primary content
Skip to secondary content
Home1231213>>
Posted on February 12, 2017 by eagleFebruary 12, 2017

Privacy is not on top of Facebook’s agenda. At least not in the sense that users typically define privacy.

However, recently I created my first Facebook event. Afterwards I found out that the event is private by default if you don’t change any predefined settings. It means that actually nobody can see your event except you explicitly invite them.

So, did they really implement privacy by default? Or is it just an accident?

And furthermore, there is no option to change the event’s visibility once it is created. The only way to make it public is to recreate the event.

This is a very interesting behavior because in contrast there are a lot of other settings in Facebook which I would except them to be private, but they are not.

Actually, I don’t believe in accidents of a multi-billion dollar company…

Share this:
    Posted in Society | Tagged Facebook, Privacy | Leave a reply
    Posted on February 11, 2017 by eagleFebruary 11, 2017
    1

    You have problems booting Linux from an SSD disk? You recycled an older notebook or you enhanced your newer notebook by replacing the old-school spinning harddrive with a new SSD drive and then…

    error: unknown filesystem.Entering rescue mode...grub rescue>

    You booted from an external drive and installed Linux to the SSD disk and everything seems to work fine. But after shutting down the system you suddenly cannot boot anymore.

    Googling for it brings several similar issues but it’s hard to find a solution between all those people’s postings looking for help. Continue reading

    Share this:
      Posted in Hacking | Tagged GRUB, Linux, SSD | 1 Reply
      Posted on December 16, 2016 by eagleDecember 16, 2016

      is a skilled sailor currently taking part in the , the world’s hardest race around the globe. It is a single-handed non-stop sailing race which lasts about 10 to 12 weeks.

      Pieter had an unexpected severe problem with his auto pilot in the middle of the southern Indian ocean, 4500 kilometers away from the next harbor. The autopilot keeps the boat on track. Obviously, the autopilot is a very important piece because the skippers have to go to sleep during 10 weeks alone on a boat.

      In a live interview in the Vendee Globe web TV live edition on the 15th of December 2016 he said:

      “[…] …these companies that deliver this crap… […] …they just keep on pluging in new items and new software and new this and new that and it’s all nonsense. I mean, we don’t need all that stuff. We just need an straight up and down autopilot. It’s all this electronic designer geeks that really ruin a system. It’s so unstable! You don’t find all this crap on a fishing boat or a tug boat. It’s all way too advanced stuff that is designed behind a screen and a board and has nothing to do with seamanship or a seaworthiness.”

      These are true words spoken by a man whose life depends on software. In my opinion this can be applied not just to companies writing software for boat electronics.

      Here’s the original video. The interview starts at about 3:55.

      Share this:
        Posted on January 23, 2016 by eagleMarch 22, 2016

        Short answer: you can’t but yes, you can!

        This is an endlessly recurring question in many groups on the Internet. Today (2016/01/14) . This article answers the question and sheds some light on arrays in C. In the second part below I’ll discuss two-dimensional arrays as well.

        IMO, arrays are the most misunderstood language construction of C, even more than pointers. Everybody knows that these mysterious pointers are somehow dangerous, thus people (beginners) tend to either avoid, or really try to understand them.

        But arrays are something that every beginner quickly understands (in any language). But in C, arrays are actually hidden pointers which makes them even more dangerous than pointers.

        Beginners may also read my articles about learning C part I, part II, and part III. Continue reading

        Share this:
          Posted in Hacking | Tagged Arrays, C, Pointers
          Posted on January 17, 2016 by eagleJanuary 21, 2016

          Some time ago I wrote this article about using integer operations to calculate fractal images. Currently, I’m giving a course which prepares for malware analysis. Among other things we deal a lot with Intel assembler and how compilers create and optimize code.

          The full code of everything discussed below (and also of the article referred to above) is found on Github at .

          One of the exercises was to write the integer version of the iteration function manually in assembler. Here is the original version in C: Continue reading

          Share this:
            Posted in Hacking | Tagged Assembler, x86
            Posted on December 28, 2015 by eagleJanuary 1, 2016

            supports several output file formats (PNG, PDF, SVG) and PNG as input format. But often it is necessary to read and write JPG files as well.

            does all the JPEG stuff. All you have to do is to combine this with the Cairographics library. I implemented . Most of the code is derived by the of libjpeg and I modified it to fit into the Cairographics world.

            Look at the comments in the source code for further information and have phun using it. Don’t hesitate to contact me!


            • 2016/01/01: Code updated.
            • 2015/12/29: Code updated.
            Share this:
              Posted in Making | Tagged JPEG, libcairo, libjpeg, libjpeg-turbo
              Posted on December 16, 2015 by eagleDecember 16, 2015

              Cypherpunk.at is now available on a at http://7pd3i34noxnxolha.onion/.

              Please be aware that this is experimental because it requires a lot of URL rewriting which is done by Apache’s mod_proxy, mod_proxy_http, and . I debugged it with Firebug and tried to fix all internal links. Please note that external links to other pages are not rewritten.

              The main purpose is to be able to access cypherpunk.at completely surveillance-free (and for me to gain experience in proxying WordPress and mod_proxy_html 😉 )

              Share this:
                Posted in Making | Tagged Hidden Service, Surveillance, Tor

                Tags

                28C329C3AndroidAnonymizationApacheAPKAssemblerAVRBürokratieCCodingConfigurationDebianEncodingfailFreeBSDGarliCatGPSHPhttpsI2PIPv6LatexlibcairoLinuxNetworkNeusprechNotebookOnionCatOpenSeamapOpenSourceOSMOSXRP13SecuritySmartphoneSmrenderTorUbuntuWindowsWLANWordpressWPAX11Überwachungsstaat
                Prickle-Prickle,
                11st day of Discord,
                in the YOLD 3183.

                Categories

                Blogroll

                  Meta

                  © 2017 - cYpherpunK.at  Weaver II by