Hacker Newsnew | past | comments | ask | show | jobs | submit | igoose1's commentslogin

Sure, it works with Selenium but every other popular browser works with it as well.


Thanks, Daho0n, you've just showed I shouldn't write without checking what I'm going to send. Seriously, it's helpful that I posted with a mistake because I had no idea what the word 'twitting' means. Will edit a title.


Hi!

Consider trying redo[0]. It's an idea of D. J. Bernstein (a.k.a. djb) what could already be a good advertising.

Your problem can be solved with make as it pointed by others but I see a wonderful example where redo's target files are pretty clear describing what redo can do.

redo's target files are usually SHELL-scripts but they can be whatever you want if it can be executed by a kernel. `redo-ifchange file1` is a command which waits until file1 have been rebuilt or, by other words, waits until a file1's target file have been executed if it requires.

There are 4 target files to show how to solve your problem --- downloading and merging two files:

all.do file is

  DEPS="foo.json bar.json"
  redo-ifchange $DEPS
  jq -s '.[0] * .[1]' $DEPS
foo.json.do file is

  curl "http://example.com/foo.json"  # redo guarantees that any errors won't update foo.json as it can happen in make world.
bar.json.do file is

  curl "http://example.com/bar.json"
After creating these files you could write `redo all` (or just `redo`) and it will create a graph of deps and will execute them in parallel --- foo.json and bar.json will be downloading at the same time.

I'd recommend getting started with a Go version of redo --- goredo[1] by stargrave. There is also a link to documentations, FAQ and other implementations on the web-site.

[0] http://cr.yp.to/redo.html

[1] http://www.goredo.cypherpunks.ru


I'll note that nq's author also has a redo implementation¹. Being generally redo curious I've wondered a few times why their other projects(nq/mblaze/etc) don't use redo, but never actually asked.

¹ https://github.com/leahneukirchen/redo-c


By the way, it's not a FOSS project. It's just open-sourced but it's not allowed to be republished even without changes.


Unable to connect. Android, Fennec F-Droid.


Moreover, if you use "Security" and "Cybersecurity" tags. I'm sure, it's possible to find the written ML script for "unblurring".


Hey,

Firstly, you must change firmware. Choose something open source: AOSP or its forks.

Do not install Google apps (Gapps). Google is the evilest part of phones: there r lotta telemetric functions and it takes much memory.

Find out more about F-Droid. It's a repo of FOSS apps for android. For apps that exist just in Google Play you can use Yalp but I'd not recommend downloading them 'coz you don't know what they really do.

Get used to use VPS as default.

That's all what I did myself and what I recommend to do.


Looks really fast! Thanks for "just bash". It's great for me 'cause of portability. I'm not bash scripts pro but I found code is simple to understand. vi-like keys and functions of multiple moving and removing are also great.

I definitely will try it next day. I'm sure it can be my #1 cli file manager!


Thanks, that's the idea. The project is still young so don't hesitate to bug me with issues etc. I'm sure you'll come across some. :)


I'm not about not RCE 0day but here's some information about Telegram's security problems:

https://gitlab.com/edu4rdshl/blog/raw/master/why-telegram-is...


That's from several years ago.


May 2017 isn't that long ago.

   "However, our survey shows that Telegram has had serious and simple 
   issues in the protocol (e.g. modified buggy Diffie-Hellman key exchange)
   that any knowledgeable security expert could penetrate.
   By using the command line interface of Telegram we have been able to
   snoop on some of our friends and detect the times when they were conversing
   to each other. We believe that this is a serious privacy issue, because it 
   can be exploited to detect relationships in classroom for example."
see https://courses.csail.mit.edu/6.857/2017/project/19.pdf


You are switching the subject.

This has nothing to do with the security of the protocol.


That seems like old Mtproto.


Found that when was trying to make Firefox browser safer.

I'd recommend to read these notes of Firefox config: https://www.privacytools.io/#about_config

It might be difficult to read, but there a little bit more information and links which aim to protect privacy.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: