From 186db0c7c8e53de64c10e7cfdcfbbe4faa70768b Mon Sep 17 00:00:00 2001 From: TitanE Date: Fri, 2 Jun 2023 18:28:42 +0300 Subject: [PATCH] Moving donation footer to about page + Static & new (image) header design --- about/donate.webp | Bin 0 -> 25610 bytes about/index.html | 2 +- blog/browser-setup/index.html | 2 +- blog/crypto-exchanges/index.html | 4 +- blog/discord-account/index.html | 2 +- blog/do-it-yourself/index.html | 7 +- blog/doas-sudo/index.html | 2 +- blog/dont-use-github/index.html | 7 +- blog/eid-mubarak-2023/index.html | 2 +- blog/email-encrypt/index.html | 2 +- blog/guides/index.html | 4 +- blog/index.html | 4 +- blog/linux/index.html | 4 +- blog/metal-usb/index.html | 7 +- blog/other/index.html | 4 +- blog/passwd-2023/index.html | 7 +- blog/public-insta/index.html | 6 +- blog/social-media/index.html | 2 +- blog/software/index.html | 4 +- blog/switching-to-ffmpeg/index.html | 6 +- blog/technology/index.html | 4 +- blog/terminal-apps/index.html | 2 +- blog/tfa-guide/index.html | 7 +- definitions/arch-linux/index.html | 9 +- definitions/file-extensions/index.html | 2 +- definitions/free-software/index.html | 7 +- definitions/git/index.html | 6 +- definitions/hardware/index.html | 2 +- definitions/index.html | 6 +- definitions/lineageos/index.html | 7 +- definitions/linux-distribution/index.html | 9 +- definitions/linux-phones/index.html | 7 +- definitions/malware/index.html | 6 +- definitions/non-free/index.html | 7 +- definitions/operating-system/index.html | 7 +- definitions/pre-built-computers/index.html | 7 +- definitions/prism/index.html | 7 +- definitions/security-key/index.html | 7 +- definitions/self-host/index.html | 7 +- definitions/software/index.html | 2 +- definitions/thinkpad/index.html | 7 +- definitions/unix-philosophy/index.html | 7 +- images/sufyaan.webp | Bin 0 -> 2552 bytes index.html | 2 +- links/index.html | 7 +- portfolio/index.html | 6 +- sitemap/index.html | 16 +- style.css | 191 ++++++++++++++++++++- 48 files changed, 269 insertions(+), 163 deletions(-) create mode 100644 about/donate.webp create mode 100644 images/sufyaan.webp diff --git a/about/donate.webp b/about/donate.webp new file mode 100644 index 0000000000000000000000000000000000000000..55882e8a9910af67f99353700d063a78e847c5ff GIT binary patch literal 25610 zcmd42W0WM@+AUnR%`V%vZQEv-tIM`++qP|Xb=kJoE56=?GPxdoT0gJe1Ww(> zJY$~u*1oQE?^JCs_15@weC(g_KChN(Yi>{P;OBh~zrMe3y!d=Te{4O`UFQJtiTTWb zZd`-E7Q6v}hOA!Avt8Pj;+^pAeOd6V|L*jsN8IPe=h-swtIxa7*JqpV0AJ^~fu0$@ zrLV7t&5x63mCuGRy}6#Rua7M|_^;2EF1k;d_mr2VNBA?nIiJX{(yyv#sbimGx20>x zxwO$wg6D?kx|@FDEv7f{2f5>|ai1z5r;pXQy7!(NzTTK|Iu9SK8=(7^d)ouNA)f&s z*N=hskU(&$uf19H?X9pc<4>VCvUm9XgyWv*PXO<)udmmDmmGQcpI;YW!(X>wbDyBU z+rC!uR(uM5@IF2ti*v!R<#uxR`KElpKN6m$KO$aQzVKeYmVTe}$t!AU&b{1@&s9&C zPw-Rt*Vm=qEcny!U#?!=MwcTd0G575Pc|dXf*aRIB0c{2tSqCH5*1)9kkntMczy8 zn#`iD_uHJrBl?Lzy9(%m|6fmc=B;qK=>Ku2Zba#*E4JDYLciF;n@+q0b*|x1 z@7z#nbP=Qc<~1I_R2R;Wu6*rkGR89v^60#rVIPTKj|k<`(LGu@THC_iS#9Edbh3VZ zRXU-K&wkT3dUYKqCgW0ULFxo`xnbK<5H|$E?8g|Tgch( z8f&@VEsr2BaqBcfWB`log?p9snQ#>|VAZPWK>$IDU2YpCZn2f}LP|zJSCBfLd1)3= zQ*1$oxqZq%{A2>h3Pg7E`1DZSkoovt>7`6msm2CTEIQ%L_Rep7?oj2yQ8~x%CK;q$ z68`~sG^z_jKjCh-r|iJXF9$MkybNTvk`ly6BK4isj5gma_A)p!))UC$d?$}Ln!Cm! zHw?7WOST?>o?s6fumOk4jwRhoayVUcY%2#YI+)+Je$at2VlygmXL3>6TGTyg`6frI z+HnDVW-=30ehT@bFhQrgIZz^S7qmwzS+NaBGGy*wWb5OUV$9kzZvtS)@fJ6<@AWy_2CNbg> z8FcF(O=6ug!@3wvHP?Aiju23bl9?WynHbmTCU-QyB8!{U3nfLsVx@dllf+Ll=n*t*|&1TF< z>MKhQc}x0kg}F7;x)zjgkO}~PL#Ub?jw#KNIk&_2yLP-0JA)0uwb(IUu17HW!3KDM zt5qQ)JJ;_zYh@U=W5aiSCits=G`fZj4Wu5LeOX=c01&vg#6!wyGs!+u<&e zwmi7<`ey0IRD7hRQCs~}1#>QT8jE@+Azz(ASa5xGT2taPQp|Q}%UWVKCF&nKlIzl3 z3A&yQkhJWP9l!B%^5N#_n=R~D*}Gw`U8}eO|j0Ss2}5-SRJ6X;&VhicoHg%rhAob5n?1Dix*FR7+HS4$3Rb4fE9^Ey`TQ!06>XJOkaPlh8xY;#Y>BDF&7`N$S(PibVmJj1AGccf4O0|)J?HTNAvZ+VA z)1NY#LqG>Qw$yHV_H~y+E&lB#c_VB)q^h83rb#nnJ%ljjZ6ImeZ!PCQqJJRxuCV;I2`|Tj2sTm4>wV=~r0(Z7(Zi zSyAsh!ZkB-zx3wY*911+uWqxCIcvprX=;<;{Y%cQ^JPouT;kF>zmY`~dyda6(4Dw4 zI<*F2vrKlQFrQy)L{#|-0C{~+q)L_J-#{t$E9YNJAC+}MX9*70KLa`ZU#DRd99I^* zDG(bp201?!dCL(;ow^Bb5JWH;5h>fht%PvVK#Wm!UgsBDV|p=px#pM95e#6Lx5`^y z=Vlpd+kN~-+*l66A8y*~glX6`^IHdWLu~R>*2TM`@CA!o%>Y>U=XkmRo-~)QK<|UD zc!EgA+qdUAInC+(I(B4+{-MdpeB(gZAsDV>&%#pR_IF{)oC-snaw#vu2 zEGjk_GL3EtK)71N9{6XBb!Mz#h?AX1#B>qSdMbm)c|T%{f6HNU}<{TD)|{AxCW zT(y=tm}VgI#9h!gQ&GirC*L;rp3Ip_g6iwTvVm-d^uUpvr(?4j=u{1&<<*3QHWs$- zOqt1*4rV5W7oPw>+?c*|Mh~~pZy7KdM7Fld?-hY(J45EoHvpG6oAbM+8!qLu6H%(= zqRntG`ZyHD!eJ=X*aa$Qy6-Dvk`0z5kM%Nd-Gnd)i7+Vs7O05_;8oS)NLdlkJYJm= zv;B+#TzFh}kfBZT-9N-!<6fZkic-qRcy92)(VYLB$J^W|nPey}r7kGL z^t3K$8{t*FP=BPM1BW({ge$2Iz>M`s+#;}xmZ6QO7>^~2-V{%OluT1)a;d4SJA4e3 zVo#8qcS9effFDbcA4z!RPMf1Kz#F~N8;J`#ouYsv#L%?B7g($l*TbSo+dBdXU~Ec0 z-yGPMXS0a;^-8oKi)=`7M-d2czPw=O5i!enQVk>)^@Iynl0)Sq32;3;UL{TqLvjx& zN1DYM%^;MwC8tr@s4SR3P$aumsja1z=bG*;hh6Yp=PXV|XM4#Mn4UPKZ^0uZ1`rU{ zpbI$N)h&Na3q?yv>KYcN2wAD_=pdxWl;Mw1DY%&-1-kZ~aMUO+-(wINKOLm7-+8Rk zmKASn8if1x?-0nt2F%<-K`udtAHupHOy3_+BDhP7#xKo_=2GV6j#!Kit+@p4Z+X~u z5=w6sE-G~05oNe#?Z-tVdr05n_qVpV2hyLRv5Gv6LRWNrBv7`S5a>D!n!q0^H>j+-wu?i;YoUK6-DrABvQghUkzPh&3_`l5&h?|7LGkpshWt z*bJ~+0xo2d-rKY7Jp0sEccaOc4zw(yc!)+>bKfSDz1_XDA0V%17GHbfH1swIn=lGt zU7{=vI2x6a4A2yQW&uFhU1??1Ks%cw_Dyx;MJIrMjcV0CSKFlk_d>M014lW*Ldvy` zWj)HKHt(0nbITHSwljn2wAepO{(>HLy?rh0^yH5_0v5e-b%+@b^v4{w!jj3_Y4sf`Eh5I1?vf zCV=hPv`9ZEz1cZX=%1ONd#u~C2#RL|PcZ3VQrq!zlAGyZWpgq<^WCnUIFZUaX0zi& z0HpFPYFxmBJztQTvLc8kKP#J5Nn{xe%uK1ujP9q9 z(*V(ffFPdmib|raD|-dku?P6E2JuEC48^9Wb}UG^XxL|4BH9BTWR4BU!4jiqNS923 zSl=hJKeudF@kSrNx72er1wW&Q-z*)9e8J>v)i_EWb`BLcU?gYm>&tpKd6FxYPbN>} z)Cdu+M%Uxwa+aY8cCzs(VLa?_P!Ad9mI|1tkI-pg@390>xChoDGt?>FqmR9g>-9<< zDp-5wBvUVRw=qx@f}%XXe?81I8wzT(c2}cZLvV&;i2i6`SatBNfE%?na#Jj%g>$|x z151~!lNLoYs2h&cs-#H=QH+pVl1x;L%#N5pB7%~tDk&rAp%$f>6JPW_k7i&U@z>>w zg2%YhzrVGZE#Z$oTCllohBJls#psPxI|6VZTIKeSoPRmbo|@f(F*#e-t*C9 zO4CI-BDI*XjuTN=OEOI>$7C!`(q1KN*VC6cOpswI=L#(;>FiV<+894@Z#q-iLXr(=QMWr1T|=d zdqY{*AAXmN%628UVxNNPKBiv*tL`#@=Dl4!VY zjIJMK$GRKukMeZBkl<_1A49Us=EN(GL+@$V*>nO$pQ?)TtLDQ;HiyUqe2~K{I>w1$ z(mHd2ftIItnNx&9uYN=3^YaOz9`8tN8hR~nTTX*5r-SZSoT($i2U&Jtu(JJrZeYxt zeyj`lr$YgUX$TYA?-h$x~+q$c=YWs$VHMS0}vME#uh zTb5F5e8z=1q^sl1oQpB`rbr1e^_)$09q+c-i{PRRrBLyWI1H82a)j)maIA+Bnb|&ICtoUt`0ZD{mZo0%&@+d3!%Gsy1ahjng zZ@P=?0UwZ~UQ_0q8Kkdw5-VpV9QG4f1l6SHIsnSlS}Ibci0|1H;{+!wg!$LRKkwW zsX=XR11`w}ylMsY61`IVLcQD$r~hyq;}GveG%f^M$j46N_BvOTD*A^pDViTnw2R(& zs*R7oj)i|IK#$b5V{E4;k_}N=ULjcSDkX8(3&G18ru?h61LRJ&%VvOSd3?<=dQeLz zXd3z9I53g_oXc^?x|4%ysZ1=%+B!#}NH*56qnV5U{UI(x!q5yzEhI#QCTz+vv4Zyu z>n1h$l#L)p4TEL%d!6V5v|ef(Vvre<(wMl%=@TrXn$QkIU< zHJFdVrwpPB42Wq+$Anj=g+o6O^B-A zg{uz5+a}ISCGSo1<}^qJ)FbT?Lg_v}9#ppjL#n44Q)p}NfF$~8n!s3r3&>VW0n_RV z{6DjM{g2c#g$Na7n6U=rJsK2$+n73qh)*VKbED1W~aP zaXZT}`Dv-YmSjxKJ$V&0`ZKtxyG=7By8*FAK8{V-8e2&yvmz4ff*sVva}ahjZ2Q~s`32l23k(Bn zx>sSJ3G~rf6^3F_g;;~v>F~vQtV%L5p2dL^fa$X^&V zZ`m6s);h7TdPQ_~=o8rd0fvk>g*lg^{hVEVY1j~Z6;8-hP5(-oSDC$5*e}eUQGw2G zw-6;->(eMrF}EG~aY)JAvEU%tf0egPLX)s_2-04NP^ve4w%?Q24?vk~K2CuRFKhaY zKBU|2@}aE%A@TTiG(Uc_iEGQXOX<;)S8oUugBv9K+fO2jP$D#q;IYf$?%G(URxi1S zO_5jld65;{N~bJG97N^*z$ddqi_~H4sR8w+oZ1YB9x_NGI!!>(<8s^$i(*4b%_wK= z_$T}FV2L@X)Zf`hh&UybV&i;2A^hag*D?Z-8!mwI-(1SxvYU7A2e!_*gi>A3fK>vm315XKw zw77vjQVFuI8+Vz&F>%O{te{Y$Doqp0%q;?->`HL)^MFgXxr9=j1fxpM;Q+TF)oMfm zT1=a`<npgD^V6H1D&2eC3e;QZG5a! zy&FQm1(Ayi``0*svgt55xt_z@$z$Dy+O{()9ph2_5Fx9T@NUvDHR!OlF$kIKQ_T(E zfIW?)c4FbHX&L~PHP5g6n~`%H=T0>mokT`dtMtd>C^KeNSK@W7jne zzz$waM*{A~`=Mz=UmI+fgIazwDSAb&zfSLwaY@*01TEWyoZ_GAJ|Ns#6fpNnFVDSO zPRJThn39Yno>0JyY`|t#fy(3`rZzql6&Bir!QPj2$Ap)%^AZNC`|$aU1<)Hnsfw(k zJORW4`&{WbJSjd#lor_73rqN&3&BMkm0{@ZUM4|bEF<;k+S&K5H| zm-eQaSk28S22F36@Ft;J2_WTEgTd%Wg%OB6l?9()^{L$FsTjpSg`ob`RB#1NqwSDp zvGYEuXq$lOugBD%4x0^FB$Z zgb$1zIiB)@ipHbu5$Zo3K{E=DKZ`K3YL#^j>Z*gaXRM1H_*(r(aL818y%(WR zqiK#ELM)a_F)pAkTf;4dLi9I*`b&?ud#|hePZ>JV6geT1 zuYoHXY^xyrs(Y7?8d&GAv9Zi=J}RmFxIzD-wiY?S{J|aru?m$_!y$5|P6^dyJ~|Y( zs}!^(|9=quwb}ZR)^v^au{tMyHfe)|Em6C$t*RuZe;q_wq5X3JeuUDbs`<^|5zv5C zrzZmpV2{jTVQYe&n8F~6Y9QLJnz1kY0g8uM8W2f^H>rla{VDpZR+&83?YN?c>I87u<>W+`S;OfvtS5@!(HJltdtLvMXPAFkh7&VuuH5F zutPw|uyt#?(*wx5r=#f*eQrnncz?0~eQR9g@WqfPOob@m0?X{|Zg@3K3W;jM@+TN1 z(+d<9fp2slj$+eDDRm&50-|3ctG#PHoQpPFSeJh(zhMk?RO2z_dy=@+m_hb80!a$j zm$5)rw;Xd1J>j{{(yvl=#ydP5&$oHdj)wz`uKb&OfN*=&3L=%l0gr@oQw%^ZN_X)* zGKSfE?f@f)TW?8x_>N42@x3E?G1+R@_s6smjJC{}&0L2zr6meZ9&Ml92*4)TY@6yR zmUR%DEbyA)VV|#Cn6Y;qAA@q#OmYi=8N1ja1SVm_*e%LmQ*d+KvU-#7_gxI_ETG<9 z^C4tE&a@+MBzZ1vObnDA%7q%TB?pOzni@@F_D7?5i=h+$ksBTl+(;FPl7q8>yIGrq zn_J#iR546p(i42a&G>D%4F%w|%{Jrdr(m%*YwTwYb}VoxW<=r~+AMb#f1`|K0ER7g z&A+=XtOILn_9C4`O2PQZw{W)1NxUTD6pCies|M9^AY%MYI{5rTZU8Wm?MNhN=W>Ak zRYNZo#jnJKpj4WkTub-@KYQf{Va&mXkw8j7>AL6;&JF?lsSUJauoyjoV}!_yOF*?C z0rBba|8i*hDdK)p`akQOMMq~FKfP>5t+|S;|BZ1oO(3=w*3Is1Q-_Xd;a|4 zP#JsF`xgk-;2a0zmEi*qL2SnuuI7$A(vGA4I7Xi!Z_?X;TSjojxcAD<}aXOI%q$2b`o~)n=}uH9l@8__{gF zo<^uYpAT}ja2nqBl6^cK{{Q_GCn6CVmLd+&D`)<{4-o(WQ1ceT6aTM4lW_R`^$AKx z|98ViB*qP?*Mk2O?-VHf!AN%}d)RLq#UA-8=v&%@53w8z;%XzJ5a2qME(4IH7- zmM)I)pUtF(sE)OSS3HIMj6Xw? znKRu}d5CP6UbpP7OOeQkQd?v^VX`lO9o8YW`G4A_?DJ}jv4q+B4k|0P6JCt9iY(yT zuFa#!a5lXPs$u#W7T1mSX=(JtbLg%R@JgG?7$L;)xb3d*g6w+|u&vP)kqcMA+F-UN zR2mz)Xc}(G;kmoF6PsE>QGDP{9=Qvi0M*swm>x!D9e(t@#GVAOM~Qq{du^b!c$bEI zHw;|qM`}DNDx7ww4i(yAQS^zT@e2K3gyd&u2SoEA%ux%3-U}rhryhgn2>|_&`3Cf_ zEBBp@im|ydK|i$30V8x-8eG~|sgXHscNmG3HwG<*Q;S_};oEKEz1_yFqgc+$0ohgX z%qG~&EroAL9v?_9{^Pq^rU>{08j!=t6|(0__j``s2utMpE^L(mADAy zyjbwZu+V2&DO$6!rpyLrS$$sfB{$~+EchRFKByP76-Q|FJXt)gUno;w+&`I2$l&yc znZ3r!;(LFQSDARUX}22_VB6olVwGF9Xbi_nZS6eSW>jqI58w#%?$(VsvCe71EG`0h zd?m_&LIw})n|W7vVd28vEDnA_`g$*}Z5}W~UIT!HT{P47vsB`}T`-M@R<4Ubxg?1H2k5i9A*}aSjP?Xj)|-p$4*c+*FdgI9ZzRkG7p6 zp&+N4(YVwa9BPFidwY}(vE4O##6H;y4EhKC9-rfNYEVmnuABJm*UI|NvuX93oJyv* zu8bjR+s#n4_HF#cJ!wO-5~q?g(X;04g|mH9IT>+2YrX#Qh0CqM9qcu@t0Or7UN(l8 z%EAJ;575qISK6%RZm|AKIzga>qT`LlhW-)D$=EJQ+^rt~&DOzgB4T__`Xk|iFa|f1 z;J9G6KSt|eL`mF_=+?5C9o?#RDu3h(iQ1`VD)tIr6$RaHm>=1e9bL%3LJuvXeDRSF zoX34(TTPx40u$E5vb_>tfhG;M@E8a+_B5PVUNmx2c*-h?gC0tuLL{p7NYUmv)@B|N zXR`0!Gn=EF)&*qAtql@E8`EQtiK6)sFLW~YZ&R@*L{;{L{$THnc={BMwHT-~smCnZ zgcsQ}dv+>@mgW~UDzRE>6PLvKu*L+~Eu@~<9HT(!)r;B~0Q{oBa_P?&?=k@udsU&XGWLG^Aa1M>UDMy! zI*5LO>046WsaJqN z{m;eD#0TS2!*7h^&kHyn;%49rk!0@9Uh7-lrO5?%R%^_(d1kPwYX`Q~d#Jv9sY>N5 zD-uy^610!6j2R_N4fk$0wH3ZkxrG(jMG}?-@ieJRT7PIdX#*eu%2K6wEaA&8%IGL*vnbRy;n)Hes6(SK6$R9>Bo?DOri&_A8o`|Sp< z!rky2i(?1r)QtlVi&W99C*HgP#i_ey_)j~Th_sFD9zV!q6~n^{eMwHhtYj3_W>r7Z z8$zmh!$yq`6U|K4F)|CBS$x4|#-Ga0bQ&SqUvR0vf&sz)nv<#I0Qb|$TU4>7H9d2K zP%|4XnU#vC7fBLEDPls`4axwH`(nDrtS)(25A?qfOWLmR3?ju!%B*0~=VoWVtT4;C zE(PYWe9F1;Tpl2*&;%u^Mu&KMCAm=~%S_z zcuXbU#)1Ws2`flxsf$ALI$0$q7_DCYyy*@z^?|`YoBnz~iJq%q7~uPr#7Y6rD9Pl zeA+aM^=O7yZ_-^$E`Xh?7T8^M9bnQA=PtGnJ9IU~BRJTRib*@x2H9p^+W}a5cez<^ATf#L5%2F=anXfGea( zp4BNp;5UMDygt)=$l_;1$o|$Qc2W{jJB^O3uUjHTu0yzfd^BAUKvU@NnoMaTV9^b7 zQF#n1LD=vksqr;>)9b>eDO-ToIOMnZAY3p9dUtFi?EKYXy6^=lMs=KLBSc1~{j+~& z&m>;B{O5yQF&{xoK}5IJ(K+>lAy?;}$l~nTF}a*59xP=p0Sjjf0bB2#XD;8R-I94x zmG_LW&}8vfRMVj|B4BJukHoLpne)p^QH8! z7(yuZwcaYHsn5(`SRtx|(lnfV30)^m*iCJ@0w;GDw-UJ}Dv>y+Uy zKgi^SB&O6=%cg4CEyrax;GE|80N(bl?tM;r&w<*?e?ge~tN=R}ppBX(D((rn zhnV)1oC-EDeU>9cl*=T52%oPWfGCPx>YB?KYYDCI6?Ea~-02BwuF$TKD@q%m99x3a z2FNHo@Rxe=gb+2vZXJ(eBtOj+vbV=_w`_fo_x>6Ed!a}Y=cE%ZSny-_PwJ{K+QQB` zBiwT#t{>!2G+oRy2D|j%L3@^;C0>ebJxn(u@xKte6hJm|yDz_gGY>^u2Z;pcrr0f_ z65p@5JED~R(KSqf;pxBD*wJDWfUNBopW8y9=!{DoWB&6zD#0Jp>2TRu#m%*X#Ir|pgPK*7AMgw)7Gj;62 z!4keuC$qID8v|VC(ziIVCv9R8Li-;4cA-A~XF75<-=ylQ( z)qT?EZ?+-wVJvIQusOIJKn}BKlfl#XM7l+JUcNvY1U8Av>dAGh;lXTdJbUL1geR{H z()qaoQ4eT9tcR!YMoZ+Dab%Et~Mi?kwu~Q-R~X05G4>f8aCf_T449c)MM;*I146_}u47Dzi7U z6;+z_g6;q%-TNhu>28f~;*5n8h;%ahWMaTVfDgjVw7mdQ1tNr7`G9=CCYNUtKQ5R( z)Jxe*B@S8l!6+N?n;^pn!ia}A5avpC>43QR!|?!|C5_dTo%LBa>+(W zwK~Sc;fz!blVdYqR#zH!a6NAdk!8h{cYw_U4~84%ER||Qu9}OUO3ppI)%5h%sa`&B zh|*FOtVQTOb|RAxWqzsJQ%DeI%l&eQgccu4V4bbQbE@uiW1weNy69SRy;giIW|EcO zL*aWHN9Xw_zdOCZD&R*URWSy%c1KG#sQ(_C!&4$Vx@)+y%?L32i5D6Iw<~m5N_#W? z2YJ#LDuG7E2N6_4wld~JA2Dv=pqP#mtlLa?kK+vQz*oDWT%UHa% zj3Vt_m=uczs1CW&#$w8(q|V;wkWq@bM>!Ors6JYH)bfyU!3b4Nsk$qx$=6bN-Ouqj zon}!QO95thf`Ol8np@Kd*fp3UBm5m_3!YNXbz7wLogO5EA;cod&C(17(N`!F1g_!- zo&TD$P{Dy@k}<*cGc>;+ROz=NDF|KU^RlY)DfoH04n*1pOg{e$u4gn{joCQ=kd-^% zNt_L9P$_B#${{Zy%mNj`Qd}9rMdlX-`_vqXry*G&^tC?3Nw1T-x1d$U#x^=mb z%1-`EV$T_1zw+ysyseorxTC7`mUMD&E_)d?<5Rt)Fg*qdK~>2$;wX(3r5o2@Y_0do zu__dE=KIPfg)g{G;pRd`!HV|lR7HnGThc?+*Mf79_Ocl{{6qEx=@c!1RCbi<5^FwWd^<>d{k#ZSn{$q5K_`gl9_uXLWtN zCLBWM=VY)K(_51*s;3HPOFA={%+? z4jv=?POeYDS6x9Ag+8TXo{!eQ>};m@ht?-$wEC>oDK~H~-MLtUzKIl4?I^XN+1$tIfV4d5O8W3pqEzOaX1f&m8Q36Fv-T`k_L(rU~Io%mW-)XTz#O zs2W$Pi?Zq&P=*kb*pFfhP*>iQ?1FY%6w+S{cP7>Gua$rp9d%k-+Tu`8zk|Ns^R1Eoc)|I)n{pm*?iWEE_3MStL#!0=?a&>aR zY$nwDv8|r~g1?k$LW5)2xr+bV#Q#2v`L4&J!AvMl?*h9n#m#7UmLcDr2r;m88*w?n zyT0f9(L-9=$p9=_-brq}7xpe4$io@jEnl^-UKtk5%|7-bI^C`*?Jh4KG<8=Ez+Qp- z+~r0)jEn;q?d*t-(#%K|keApV=r*Z?4~{^}dmYU9_;C4Sq&v(ve18pkQ*-kF);-lakDTGJ||v}Wb}ml!8Z9Ae|Pd(dQ7%63#LFIlUURJPkpMKQSyXh#;Ht$e@?(%j z`iLLDDXQlLD!T?Z+Z70q+jH*6IX7~?LLvVQ8IbJk==r^7m<9e(z+&=I^Ak3B^I#q9 z&3K8lbi4!y`WomyJFP3;{gI8RWM&e+Tv(ow^|K?t4>4a%8CgC+5w_c;3JlxCQEdcJ zgsWj|W$fWuVLyM@tkMs5NJuJlP~4hUhkSFNA4|^W%sW;>Um2TLDaE**^g8xb?^sX60>%D%jdOKgf2IVVuW) zjOkGz`9Ji{LIO=k#5(rSdh;*f^d0+wP0>#v*L`i!Is!RttJX7=-IARVB>=>@>v=fn zBxa?$;2)~7Fcd17)@)jrB>Dz~YLfWxEYdv*Oi zK5gRNTj$5O7ET8RBGPS_UNpM0;dSr67a+EgJz#~r3Te#ZM(U;I(!yon! z?_W$Iu(I=NwF}DY(vqt0VgM_ZOlWZd{DtCQ)Rww7a*;Ov!2RY#0@>UF?)`^I<7%Y} zC=-k@@h(VnGnS3);DQ?wMwL|3TQ}ZeN#kb0M8}lFVmoDgTv_2 zF`CGKs+HLl_*^*sL~uKDWBO@jngjMSh=VAt>rxSS7R%rYh84L)VxtK+DMo_Ggtiarmh%I$`jVlfHnm~%9Qx4h( z8Z_wMyc0)@9j%;W7o9<$l9;DjcpFQ{9oX9qRBZWU@1q+$sh1&f*aabAL%s?@Fj-!Cm)aaCrHL&Vd zhaA(4Kef1i6B$?-MbPA^4Hy8f-G6b; zxz%q4=&;AvHp|1>B=5^&2^T3+X1<)Tvti3|RmKZ@g ze$|3|hWusmPM-I512@nT7DioOL)5z>>G(oUH~`vcmmE@8`EXzyu+*lYH1<0)S)K;@ zpExDN?oXVGydjjwQ$7-BUOYiAt;VIXxzkngFn(D6B>mMf;aWQ|3A;7Og?w(s#hTu5S}ptFzr`xy`0K?PU%OF$7uJzpckB|w)zA;EKs z1tV}i9-$F8OB?9Ib1*?^YnBniw{_42)G0YP6irQtFj1nM#Ku&pB1MWg5~9Tmm}eTH z-e}`p(Cc$t&$(x`m)bz6-eOXXtarm#U$GN)BW%WJ2GERVWj=V>2+-CZE$$@Xl5XsY zp39;sfqo*``xPau3o+jXjJWm{JXLn3ao&B z4b_jeR56sVMvz``HYkeSaYOd2v$4xcexcPN+hm=KBeyz_Ap|~_iW>u>COwkoU&)O3 zdBK8_9l%x0HO*b1n2;T0{%_(1ZxNNhrE`MPlNn!N-uOsT6kCL_qYK&Rz^e`s*6}dx zpN5(v7UwTptzzzqy8wl_10F5ol9@8XAIT(q66e94jD4LJX3kJ(5fcDiIIB?b-@;?5n0E*Vc8WS3L6d?Y`cddF-(UFx|2sx6fuOo8o5Q5l*64t8mW}zzjyp#)U9vqFqiLT9Mm-A#9Aq}tf`KH z5ygti6uZbi+4*Vkhia_Q&V4FKlw1u^=v7ZrOmqUj)YfhQc@h3SXX>)53QR?8!)lCZ z5S%IKObYV*Z0HteNcc}diUff3JloTzGLBJOF<@ZG9aV$PLG>Eku`7aDB+f>q482Yx z{73Wetq9mBB1$j0ov+;Lvy}kj##-KHDLzTP$gh0WIq7?dr2XF$O3Cc*%OMK)4{=91 zlBT3BP`HY2ZC_Ix8k6kz82|)T!yMg+0?!L~fp0#{vxqDrNdi%RZ0iM0fwbjAeixppMXiJ%#wyKU2zzzK@@a_@RSpxK2 zR+YlGE3%nC!*jT@hIl2(zO|@zyb-oDcUala4Q=17h8gd`blS$~5Q-XFXg)^1$F`WR zNYRWtRL3fYoKd9YcAD_ba@F`p?#>rQP#e<>CCDVxUTYSKHDsV#l9Kd6tGqY8`@A== z643VBsf1b&-29S(Ck;*etN%`5?hQTiyu-Vejp*;_myT=8*d82y zS(Ajz|H3U#zKvNmRW!0H!n95pl&ZpbfO(ZVzaw9 zKi^%oitj|dxYg0XZMtM2lh%j&WXx*4JSzmUuBDxfuq9!3%)CZ!2DwKV5ROHRIXm?5 zt7{(X#eV$UyMeT89p{>Q^o#yD{EW=JX0UoPYw~ipR_?2^EeNFM6aO$3#LzKqF0B1t zZNvEj5#6HxY?2lc;41&L-+$w7F{x8)P3`42M6Dw0Y!U#Ny*kH*kcz(OP(ZEod&lBV zPl;M6g`*Ul>^hH+g8_Xe|3gL`z`Fnzjc#OoCE{xgv+H=pDi9d)zlm&`w!8+AXZ5!= zdeM$lvYLfV;v1-<(Tw{Sn)DnG`p!5Fj38JtL2*L$C&M&^8+*RbY)|5IrB@2)6sULp zrq0rw1%YcIdK1#JrW1}rd`bZIO2uZh!_wUW^7 z4!8e0KK%@&>0(!kAxne&f?fwVH#AmWhmljf0VOYChG55db7075|^Hgm?rNm_U&dgDP9v%<)Q&!RZ&OW zHzO?nu>#6jsei=%qxABl5z8p$LGxsy>M?Ll5BXl#w1TmWZh>6Gr!bW6pG2dc$YD!O zJtq%M+(|v_D9Z*E=IaLcEsS&V(@x8K*;L^WzHcvwjQqcHP?(~Doozowa4Q;lV+BSK zcyuZ5`DjKFzhMTyko_^W-1dZ=zdVQd#y$<(j>*S zxikZV>}{zet7W-Opx%9K%(%Y6D0*Z%x%{y{j-@~@E5do${&@caCnWk-PJD^Mz+Rxu9MtsYEA6m%=yE2f8tH9pvRD`Z7a8t%>t5yMCb@eIL4QIFEpeq?fXjpHpc2$AZKY zcikh=z>8};%@*^7<_|A`o)J{#Kn4WQr2V=E-l#9U8J4W)qZc(vvr2G+D5vjy zGZM6|@=M4%B|g~iU4ivTAG0z7ex?`Z)%m?@?pOnTlX61@j+K4NIxv;Zl$Fr4PWRpS zVUj>Qvj>ih6=q9DnHH@)Tt7Yn@*wRu+TA5}xHNKj)W=%^+TMx8k&_TSzHNc%uR=F_ z;rTO$&w)* ze4;6t`V|w>!u+e?w5I}2#Qt|LAO6qG+N){iO%Z@^=_{$0BKa06UcUcWYUZ9>J@+WGgi|h00@sZf4@xIynyqt z(frEK98uZ8ZO?Te#M(`WjB8$EV$824uRy1{lWa~9^wMF$K)t;3gl|I#qai69jRyNEp0$vm*LtoN>d>3lz1IfzN3w3&Fxm@q( zG}ansr#_IvmV;6Rt{DbxHvq?M7p@7;M2e1U_BBl&iXeO0gO^^g9stE;=Kx~n$U+N*Pf z(rRUY9&}nKh0w$l9_`@hDbZNXU1?5oK?Q2=g2vJ}SS_IyEzk6Q_Lgr|r0p^FZvmb= zr(v7SN}2O~23|F1HBWcOuJ=fG6boULm=aSZAIiqkv%1s#V}?8RWmPaZX-F|$l!`DT zu;mdJ;dn>E>gr9j@Nsq~T5~12i2&ArqZQGix3+l4LF;V;S+Ce_LNL@BDPbz(jZbg5 z{VQ`*ZJN!gLmK5jmArStud3NkZ+$odzQ_qI$2FktvESs9mq!w0xWR<57ls-q-Cq0t z0@+U%!?g_S#2luh@|ne7n*}sBS^irtVzKAJzncs*J@9;7(J@s(#UsqW(bu524j^h; zeTj8#`eGIIPyBoT8A(FpoJ1et%lPc|{7ZQVnI=yb;|$IiB*UkiQTuLC1vzJ<1o~|v zp4Na4$Dd8fjDj0%DSbh^jAj>}8n=%=|}4sNKGx&F7Ze8N&wx-7}Lw1JIQ za3L!&0u^L)G1?650}~6AY}NT;`%`*;8%7_EfxQeuggv}Ee)yE=taTp(s|RDEmYWx3Nv=WeU4|FqAU0;%1z})9vFl_OFM6*I>uE z*GM|BtL^vtnE&h=Ab;r1M5Pwz_DvPU%zZmv=Ee+-E;bDooNSaa6rxo@i?cBZIuUwq z6?~~bgmYz0uaJ@lm0J$Gin{?F6_s97D4yM zDs16&3%%NiKi=y%#(eov8MbSp-DI-!u*N-&szZvubrWt9j|T_+JTWrFFCZ4( zM;1rLoVrZ`ukPU`8kdtK0bykr5U722cH$~XA}t8p%Rab)6i}T6Zrq%iOyZ)i=a;O@ zKpl&#R@9W>M7ACx@4gAxq>MzqtC3^613v?K<`}9r=Aj?j$u#kWaAD)oy_4Pv-8Y70ESb|1H68AN}VA3SM~> zt97JH;rdnDZ%dIG3s4vyJ|ZfREc72SL1)Z`@*@9bLGWUAy6mI%{TKDk4DZe-_%CVi z{&ATF&P9SR=2uHSW6vRe4*Mu*eI_p|97erAdV>by3$S_j!oynP?CqJQSVgyL_Jnhx z;Emh1kdpL(a{B~HZ?*!-CUjq@!8D&U`ypT4q5?{<=5*+X_vOW^5Wz<kbD z!BKNB49xHsV_)Y9dt{c&2dw^er_jk2Q@taoD~;1Brky2eGUf}V`(E&t_w23Juv}3IN9VPu7pSAuo8^lOvz6K|B__ zFL^`u^y_u#-N^TwVA}s0@LT>h_|$$HD*jz@_i1=t*U5yB)wK-HOp}KW|A1SF-JE$i z@8%IgZHh7TAdiPwMK6^mhiRrzjF&>OlPM&RBic-oktX5qrcI0&@(fU+A@_TLEK`*J zq^-I|DZ?|3O{hsk!Tw9v{hYvKQ&Im!)u{^ZI`%gd_tjm#(4m1DOhNn3{OwFZ{ zKLDN~)4RJm-$l;{7}%-<)FQy-3!_mz*FgI)JVg{P_03hDGysoSk@fk_^t~_4Kc$J+m>!>$K$B;`dWO0E|&D3X z4Rr2tGhf60%Tp+R5EQO_PA*IF`19hPka|9=V-iET6-2LpR1-7D;n%Y0R_~&9)!DAN zB`KqeSJ_|9iMPSNtFLe9?G<@{dAL3Li`fJE(YE~aTNep_bj6v^8!E121Jae&-N`#G zotQf_3bB+0O*{ZZSN_Nr*i5^a948x%aJ~EsUAL7*hMhw<38F4vnhIlK&G$GRdsVRg zzvO#!8-WS_PHE zUjqFgfc>CHwwhM&eOT{a>XSaV%MlZ<=N#c?cor!2$76;WdDn|fS}W&`g*8x1pg9MC zK<75J;CKIw8|Rx-(Zq|zy?FEt-JU65;Ly$7-cOSHmbI?-x=8w3&e?5S-vpo|X(!{j z(cV?u``I4+zIf{03~4BX;Whm0cU2=?soBkD6C^L|pWy_qP7VS0HI7Ym_}k<|D3hTF zuPjwI+@&jFZ(GB@bh`)^h1meC(=xc0nNl*WrgX5c8bAr`f%CbuxP6NR1 zQ<;L(`sD}B{Zzb+uB&RH9`e1iaL|(4!6DJ@wI0dDrF%MzK6}yBpJ3x7v?$(}B#ILd z$vhM5!UmYbhtc(e1`1>wGo&svd4t-Sr4jJW&c5tu_?}{}e9z1~!{1LtV!PFG<+N4v z>R|Ep3b6wD5YmEV3xh8VHs`_HM@H0@k?_Yz!n%m{Frpr#>uUbW40e$GUEu5C&*&z6 zZ1d4=u2I&FYOqdI`xEg1bGyh=;e0z)(h~s4B0Hs0KDLr?b$Et2tyKy&0IoEFZk#&G zI8F6JQISyyNW|i7Z;9^(6j6)y#eAZ3p!7yWCi524;J+~&>(EiRTEj@WYaImOsQ}0H zzCki>R^wsJlF)-*E@sz_25w{cwIaMZf7GI&O?F0!M9{@`mcg#L#R$yC!&(QPeE;#V z#BJ^wa@CPoz#T+g=JcHGuJvNuCav%l2|^tiGqiF{fhNc(@C?o`=%8|ZzhXFHUIc7C z(3YO?>)xLx?ZB8(_5i;|hXr)K&1hG3BR?6`xhk~`tw>pqoD?&J5jx7K1V+W_0ni_Ez?k5gxod^#)}i5ddw1-c-#XodAqvf1kfU`Q3+9*N`u@N1;xC;I{w(Y_XpRb*2V1JJST!V4!gVmz#MSjV+e0ts7Tb_DH4#?h3k(s*nm6?*y|$;ZE7HPq zssxY`qJA1Ju3wGV>jQv*!8Q9HN~0$UhrM{G4k?4DH%EbkwpOLi9wN6r&jc`5E=F8> zu@C8O*h%lOz>rYp`$;60nv2^CVABt~R%v`}MXE*7SK)Db#zTKEbeos!q7bMk`Eb)UK$IIkl#zY z;jJq2RnJZ=s_A31vmnbuw5hP6=slzB4o8#lal9Q_HC@ic7oHdYU|skq#K9Z_E!=sD*|5m_L@#T|%O58n zeFrQ!xGbNVM5KYhJhOp})k-ekfOx?n;|sn@7UKf1v06+`cmV6tF%43^^G6a8@UiEI zAQis1XbX7K1_a2pb8FGlv*EJnD4I%hdg)rlD;)q$#ToewN4ca-gWE3#8iSzMh8(3{ zhq>gPhNSU*_~75?mC5+^+!Fntp>)%>!lFZf78%xR9zkKnNs%9qmG-n(-)o!Kr0cz6d^jT(5Ws2`ljQ0tY$4u1RBK;z%YMnwyy8=3IDx z*Pt}i)t%jBT(-POf|)17+=Ou&Zkv=1$+1je!2P9YFjI?s@sYHO-#i2-OGWRNDY1bQ zU4Gcc-DQ2LQPOlPzJ(Ss3N3S`-6JGvqO_Fs2lMl2zFNn|Y|U(~Xc-o&yHGYqdxH}L zqLiGoA^4t=U&UH9M{}V&TLIfs7gW@94G%z4f=R2G+2PbC5hlSx;TnC+-%^|>HdL}? zp4=CUZ(UJJ)|4I%qPzWfp3RuhiG8~`lR7TW&JM=LkYO@^y$keiB{*ICiyVm@$Rp3V z@ndDjzHvF}7tr49pAO6%8*L`-o)7TEwN5CG$3R%NFx2D0N`evOlq6EQhx)%iW2S*} zclEEs6~sj}pCBLN;Y<6>@%9ejSEe9uyi75VTK>QLHat$AQJ{;ShG#^8`SMSQ1xT8^U}KMA zl=46+ReA6TS>bERHp5QAA<`lT`8!!Y>(P9IJZG_5t(x)dFJwtX#&krrls%S|^FVkn zv6w#sm)bNh=s-3zT_cF{$v-0{I(e0u5QnY)`v{CDKck8U%WC>N>b4g`?%gx~?B?Q! zwcw}ZyJ!~+A#y!++3JQ-_?)i}CzlpeyBV!op@d)R$z{uJ0+<^T<;q_O%;-+CKU~Lb zGQnd@dVDul1H*Ty(e(sUshe9=mMk~Lhf>Tu5){D2ZNyu>!C9I+#d-O0$W#y-iKlox zaaAR;z3DUGHzF|6S#sCJPN#uVbdOVC1Wwn!3@6M{sN&P;o)aN>bTm})cEYv!46X@J zB!5rm>bHnf9t+WdT<%FRJ%T5- zT!JN!L+~v`Wn_in0&;QNU|YHhbWlsq$jrxNU929|(in$nHa$3rurb7NGp)JGoURlr zPYNUuY@>?xgL9O!r##pVY(b|I3fn03G5)R8c4Ud*9hQZP#dsbESDm!3jZ3!q6W!FK z-9hl;q&KlbjPPnbTrC{S7?-gkJD9I&2`AGY zA{ZZrTk$tehppkmtK=PP>P<#fbujlg%N??9_nI;0sVpc$vU(-_8PGGhZfq7z%OFSK z$DhG*NNBDU^v*0?d$O4|-on+JMTR_X9w%$ipdY<}ysDA1Qs|OimPpm{ii-z7paJSc z5>I)|gF1F$KCRJJ0F{TmNFq3%-tuus;^S%>0{I*jkietUcIYtr7PYPoJN&TpN@Va6 zrfa1=;MC6nL&M8&G{S6vWm?dFPTn0nS)E3ZN5rF@d`zUfa+lk*fVpRPWLznh650BG zz5LEw7qJr*+ITWPj8QK2B^$o$7ik#8jR~7=ft6PfCa0~D1Ce$p&^yKXvU{cQBQJe) zXD#$T7{Q!u&?rlM+FT1Zbi>8#i~q=^Elf%)6G<9@2CKhV7*>ioOLt((=)i`F;nM^A zQY2M}Z<{80a*}>59mLMz{0Z`LZFsm#wFHuT%n(VOhUn=SY*;@DiPCdc`$zQnf(lRe zJUb$d!mIwG&3(CEsH~X7=DX~Z9}HQ(w(^xgFKpHfD|6JpUAZL4+u|lhQJP4edIj z5M0R9yB+Pa+$xk@riqfn@G%V(=LD&k%#6WM&^Mf^lkD!nFq-n{Zo*=XU5dKOCHqC* z4FU8B%SZ~m121iPTno#AelKkFXhh;A0 z$A;-?dIU?uMceOtu>x!+Za5>D?)Xsh+NrW-ck3D7n{!-rmvND{mUHBi>*>6wGR-C? zgFEEm*fPr1zNPQ(NsAJ|QmuUm=1~7e6$H4VZ<)xO+)+@a5+!wk9>wHZl|L}}h)%yw z_V^t$pA!R+z>6DEDIua#`wP|{p>(G?7nJI3o4ts)kJdGqs~54NLR=Z`$eFbfO$1le zzWUu#XKzuV7pQztI4J`LVi0>}dv+c&xt;NmG#IYRH)>1EE~8Be}7p}B**MdI!vk$GpWXH-J|@!5szSWGK? zZZI3YOV3sc&Ix*P)W?>$A{M1i6HB6kKMP(+N>OO@7U0*xqbkRt!yFS2>SekR5I z79{5#@4J&Dxt1f?N^TAF?cK|OW)t1!Vyhq|S(~`qfZZbSd$xYKomInPcb9p^v4g?M zo9rJ+^}4m+z?gOYVZlr3&<>e55aF${bVgM`mWNu`%s(h%PijiSxZO1HYZp;lu@@d?mTV?Ki)x9Y*D_4?b z;>r;Wvo7}}Q#A@M|IX}9sg4Aqh*yLvt!O@Dt!l}ArB5PVJtI;hTvM&BlvbuiiQR)` zJzG4W3OwOdE&K&g?exhwuwpWjgxC*9#n1?$Elx02hD6GLeu4OG>o~oW?uMSJ-UODw zQF3@eMeFy!3@S&5_4*XUd}GE*q1Lj&(Z?#JqTBU=Coy#NXt;p=vkQ8Q6KmL)W4VOM z)zC`n&mGel%{Cw_ewLdMs2(w60Z24Qa9t#1Z3JUFU`9QVJm>f4SCGFe9P8us@4vi} zo@t6LUT*|yDm)gxI$M}+9-xGoSCc0(MLFw}K+i#o?dGS1e;LszRMG0w?dmZs{pB#m zR6NJE>^{D)Q$2!f#vX?0uTrLQ`{gDe_je>3amwBl4&755($UD|6g?F`uSj(cVh|a) zF^+vbfX7{d!Uy}gXl(BClO6iT$v-sUibK*rR}vPxCwR{7&5BY zj1gZ5Hp|74PpR|o2U^bs>&lT+yH7<~o{(7*U)pDA&O90s9_VX_T*E_HF0^#H$m)97 zRRT`xbY1+dwx-Gj#qN4wH>t`vpML!v$k+~fsgwC4R^Pk&Q~5nbdRj`rl?=c|z-s+m zmgJ*3$d63SSjiIMCRP}7Ey64<~+M{#H3g5otC+jx*L;7GIJgY=}G^tJ4A%cqCi z_y(c;Hcd7@mkOBxg1WhB6I#1GdJPz2vda1Tj3z4@4d)cxSVJmladgqZ3Z=O}F9wO4 z#y&)yp4=29_ZsC9`hlS2$7cZ|D)lYtvbOZF9Us4V@zyDLu&K*=^7lnaTyz^4U z+j>t0k?W@JRveU*3Ft}0f~8pL3hxi6vC%QN>@(|?kdsZ7ziiO0Ku%~vDeK#Ic_jIP zdc`e!_cS>Ab?Z?_b~u@YMEnMvy?JobDBOyazgeC>hn|zgWet?i)8#A7sDqu;eg zPZ1%6V1S#LcZ8KnyfpS74TO%e8d3_-={U|?cJxYjn;mh*LlxBrT^tE+>@~ip3Y|en z1^7n5MaXjEoK(NK_OaxI5EQM8)rcc5QHHgcb8Q}-u95WjAGO;^3j32VhQ*;oqfXY( z^Q=)rlQh{EPJxzsU6LBd%hgoGhZCYmFph+ml2>z2t3AR{VR?xBkGsNEf^H}N!p(bD z+SQOjzFdFT#?JY44J}WPe!^AA%)oG-IIL#IYokTFo7LhpMV!zKjiqdLnq!y+hqFvP zbD4#8bDb_@IWj%7B{N#}Bj2X3aIG_hs!&v^uuZpwF2T%&_I=~Tag^Y!k9(ZV$Rd}$ z4j}G=QOP`3fI1F)(LB&PqD!(R*y(5E#~jAx6SB9CZE{Cth* zKq{$kL^yEsvp>sHt}@#|8BP=Pl7^}JJr$A%U7hxj_uHMAOrGxcnjAA!Yqz5VW^Ruh zz7cT|57bbP;^IpXwF|#5JE(!cxZ|MDA+4rAYVtdcG0iwvLmi7-D4QDP374?IBbBi(3v; zi$8*ilQ2*LK=YjaN>z!g3o{f}z9R;eh>YJHA7@P`1g)5qfx4^zQt|n-dUPj?`!S{c ztf2)va4BdN_UN2w1IK4XXJd-mN9ng^z##y1SxERFQE_@|^lBJH+jaiD0GRC9|H1}H>Ro>Se06XVtWd@Nsvn9rEfxny|l1J(n`;MydlbH|JkNAv&inBL;wHyANUORX#fBK literal 0 HcmV?d00001 diff --git a/about/index.html b/about/index.html index 9054546..ab68577 100644 --- a/about/index.html +++ b/about/index.html @@ -1 +1 @@ -(ABOUT) Sufyaan's Webpage

sf.cu > About

Contact

If you would like to contact me, please keep reading.

Email

My preferred way of communication is email. However, it is incredibly insecure. Therefore, I request you to encrypt your emails with me.

My email is sufyaan@counterhawks.com [public key].

Fingerprint: 7CC9 2B65 FEC5 5C3F CC35 2891 6635 5EDD F4E5 B3EC

Please note that all emails (both encrypted & plaintext) from me will be signed with my public key.

Websites

I am not active on most social media platforms. Please read this post to find out why. Below are the only social media platforms I am on:

As aforementioned, I am not active on these platforms. I post rarely. This is the only website on which I post regularly.

I post branding and design related content on these websites.


+(ABOUT) Sufyaan's Webpage

sf.cu > About

Contact

If you would like to contact me, please keep reading.

Email

My preferred way of communication is email. However, it is incredibly insecure. Therefore, I request you to encrypt your emails with me.

My email is sufyaan@counterhawks.com [public key].

Fingerprint: 7CC9 2B65 FEC5 5C3F CC35 2891 6635 5EDD F4E5 B3EC

Please note that all emails (both encrypted & plaintext) from me will be signed with my public key.

Websites

I am not active on most social media platforms. Please read this post to find out why. Below are the only social media platforms I am on:

As aforementioned, I am not active on these platforms. I post rarely. This is the only website on which I post regularly.

I post branding and design related content on these websites.

Donate

If you would like to support my by donating, you can send me some Monero or Bitcoin. Monero is preferred.

Monero: 8A8HeXwULYKWtbujMkGiBYKQPahJCT3ye2N6wCAdEv1L6ipoJjDmfVLKa7XnmE77nGLFmu5dGrL8U4zVGrkDncKEDfkpDEj

Bitcoin: bc1qj0zdajhrg5uxac036u2t5empuc7xwrds5dde98

Please do not feel compelled to donate. Once again, Monero is preferred.


diff --git a/blog/browser-setup/index.html b/blog/browser-setup/index.html index b19d885..469438a 100644 --- a/blog/browser-setup/index.html +++ b/blog/browser-setup/index.html @@ -1 +1 @@ -(POST) My New Browser Setup

sf.cu > Blog > My New Browser Setup

My New Browser Setup

Posted on 17 March 2023

Categories: Software

I have a new browser setup on my desktop to increase my privacy and convenience. It is divided into two profiles that perform differently based on what I need to do in the moment.

What is it?

I use Librewolf as my browser. It is a fork of Firefox that is enhanced for privacy without heavily impacting user experience. I divided it into two profiles:

  1. Accounts (instances in which I need to login)
  2. Browsing (general website browsing)

Let me walk through how each profile is setup.

Profile Setup

Firstly, let me talk about common settings between both profiles.

Common In Both

On both profiles, I have my settings to optimize my privacy. On Firefox-based browsers, it is very easy to use these settings because most of them have little impact on convenience. I use Brave Search as my search engine and will switch to my own SearX instance when I get a good server. In terms of extensions, I have the 'uBlock Origin' extension installed setup to block JavaScript and remote fonts by default. I have the default lists along all the others unchecked by default apart from language lists. I block every single domain from Google, Facebook, Microsoft and other websites which are known for tracking. If a website breaks, I whitelist that website in particular.

Accounts Profile

My accounts profile is optimized to work well with day-to-day logins and important websites. I use this profile for all websites where I can login like Google or Microsoft.

I use the following extensions:

  1. Cookie AutoDelete
    • Enabled with whitelisting to auto-delete cookies for websites which I open by accident.
    • Using extension instead of Librewolf's built-in setting because it currently does not work for me.
  2. Containers
    • For multiple accounts

Browsing Profile

My browsing profile runs in permanent private browsing mode so my cookies, cache and browsing history are automatically deleted when I close my browser. I use it for general web browsing like watching videos, viewing articles and more. I have most of the content I like in an RSS feed but this profile is useful for some websites which either do not have an RSS feed or I only need to use once.

For this profile, I use these extensions:

  1. Dark Reader
    • 'Invert Listed Only' mode turned on because most websites I use have dark mode turned on already.
  2. LibRedirect
    • To redirect common websites to their free, libre and open-source frontends.
    • Some examples are:
      • YouTube --> Invidious
      • Twitter --> Nitter
      • Reddit --> LibReddit
      • Medium --> Scribe
      • Wikipedia --> Wikiless
    • I highly recommend everyone to do the same because these frontends are lightweight and do not use JavaScript which makes them load swiftly.

Conclusion

This setup has been serving me extremely well. I will continue using this setup and building on it if any specific need arises.

>>> Reply To Me

Previous Post - Next Post


+(POST) My New Browser Setup

sf.cu > Blog > My New Browser Setup

My New Browser Setup

Posted on 17 March 2023

Categories: Software

I have a new browser setup on my desktop to increase my privacy and convenience. It is divided into two profiles that perform differently based on what I need to do in the moment.

What is it?

I use Librewolf as my browser. It is a fork of Firefox that is enhanced for privacy without heavily impacting user experience. I divided it into two profiles:

  1. Accounts (instances in which I need to login)
  2. Browsing (general website browsing)

Let me walk through how each profile is setup.

Profile Setup

Firstly, let me talk about common settings between both profiles.

Common In Both

On both profiles, I have my settings to optimize my privacy. On Firefox-based browsers, it is very easy to use these settings because most of them have little impact on convenience. I use Brave Search as my search engine and will switch to my own SearX instance when I get a good server. In terms of extensions, I have the 'uBlock Origin' extension installed setup to block JavaScript and remote fonts by default. I have the default lists along all the others unchecked by default apart from language lists. I block every single domain from Google, Facebook, Microsoft and other websites which are known for tracking. If a website breaks, I whitelist that website in particular.

Accounts Profile

My accounts profile is optimized to work well with day-to-day logins and important websites. I use this profile for all websites where I can login like Google or Microsoft.

I use the following extensions:

  1. Cookie AutoDelete
    • Enabled with whitelisting to auto-delete cookies for websites which I open by accident.
    • Using extension instead of Librewolf's built-in setting because it currently does not work for me.
  2. Containers
    • For multiple accounts

Browsing Profile

My browsing profile runs in permanent private browsing mode so my cookies, cache and browsing history are automatically deleted when I close my browser. I use it for general web browsing like watching videos, viewing articles and more. I have most of the content I like in an RSS feed but this profile is useful for some websites which either do not have an RSS feed or I only need to use once.

For this profile, I use these extensions:

  1. Dark Reader
    • 'Invert Listed Only' mode turned on because most websites I use have dark mode turned on already.
  2. LibRedirect
    • To redirect common websites to their free, libre and open-source frontends.
    • Some examples are:
      • YouTube --> Invidious
      • Twitter --> Nitter
      • Reddit --> LibReddit
      • Medium --> Scribe
      • Wikipedia --> Wikiless
    • I highly recommend everyone to do the same because these frontends are lightweight and do not use JavaScript which makes them load swiftly.

Conclusion

This setup has been serving me extremely well. I will continue using this setup and building on it if any specific need arises.

>>> Reply To Me

Previous Post - Next Post


diff --git a/blog/crypto-exchanges/index.html b/blog/crypto-exchanges/index.html index 2501681..ded834e 100644 --- a/blog/crypto-exchanges/index.html +++ b/blog/crypto-exchanges/index.html @@ -1,2 +1,2 @@ -(POST) Keep Crypto Off Exchanges

sf.cu > Blog > Keep Crypto Off Exchanges

Keep Crypto Off Exchanges

Posted on 14 March 2023

Categories: Software && Technology

-

In this article, we will discover why it is horrible to keep cryptocurrency on exchanges. If you do not have time to read this article, please stop keeping your cryptocurrencies on exchanges. If you do, your crypto may get stolen or lost. If you are interested in the details, please keep reading.

Lack of Ownership

When you keep cryptocurrencies on exchanges like Coinbase, they have your private keys. Anyone who has your private keys can manage your wallet as if it is their own. They can send, receive and do whatever they want with your wallet. Even if the exchange you are trading on is trusted, if they shut down, you will lose your crypto. This happened a few times before and thousands of people lost all of their crypto. This is why exchanges should be used for what they are good at; purchasing crypto. Keep exchanges only for one purpose.

No Regulation

Currently, the whole crypto exchange industry has a severe lack of regulation. The fact that exchanges have your private keys means that they can freeze your account which would cut off your access to your own crypto. Governments can request such freezes. This may seem improbable but it happened in South Korea.

Hacking

Even if the exchange you are trading on is secure, they may store your private keys in plaintext. This happens much more than people think. If this happens, hackers can easily take control of people's wallets and send all the crypto to themselves. If a hack like this happens through Bitcoin, it can at least be tracked. However, many hackers convert their crypto to Monero which cannot be tracked. If this happens, you will never get your money back unless the hacker decides to return the money.

Conclusion

To sum it up, you should never store your crypto on exchanges because you do not own your own crypto. There is little regulation and your account or the exchange can also be hacked. All of these pose serious risks to your crypto. Just get a wallet like Electrum or Monero and start using it.

>>> Reply To Me

Previous Post - Next Post


+(POST) Keep Crypto Off Exchanges

sf.cu > Blog > Keep Crypto Off Exchanges

Keep Crypto Off Exchanges

Posted on 14 March 2023

Categories: Software && Technology

+

In this article, we will discover why it is horrible to keep cryptocurrency on exchanges. If you do not have time to read this article, please stop keeping your cryptocurrencies on exchanges. If you do, your crypto may get stolen or lost. If you are interested in the details, please keep reading.

Lack of Ownership

When you keep cryptocurrencies on exchanges like Coinbase, they have your private keys. Anyone who has your private keys can manage your wallet as if it is their own. They can send, receive and do whatever they want with your wallet. Even if the exchange you are trading on is trusted, if they shut down, you will lose your crypto. This happened a few times before and thousands of people lost all of their crypto. This is why exchanges should be used for what they are good at; purchasing crypto. Keep exchanges only for one purpose.

No Regulation

Currently, the whole crypto exchange industry has a severe lack of regulation. The fact that exchanges have your private keys means that they can freeze your account which would cut off your access to your own crypto. Governments can request such freezes. This may seem improbable but it happened in South Korea.

Hacking

Even if the exchange you are trading on is secure, they may store your private keys in plaintext. This happens much more than people think. If this happens, hackers can easily take control of people's wallets and send all the crypto to themselves. If a hack like this happens through Bitcoin, it can at least be tracked. However, many hackers convert their crypto to Monero which cannot be tracked. If this happens, you will never get your money back unless the hacker decides to return the money.

Conclusion

To sum it up, you should never store your crypto on exchanges because you do not own your own crypto. There is little regulation and your account or the exchange can also be hacked. All of these pose serious risks to your crypto. Just get a wallet like Electrum or Monero and start using it.

>>> Reply To Me

Previous Post - Next Post


diff --git a/blog/discord-account/index.html b/blog/discord-account/index.html index 100f86f..bd83d5a 100644 --- a/blog/discord-account/index.html +++ b/blog/discord-account/index.html @@ -1 +1 @@ -(POST) Delete Your Discord Account

sf.cu > Blog > Delete Your Discord Account

Delete Your Discord Account

Posted on 22 March 2023

Categories: Software && Guides

As mentioned in the title, I have deleted my Discord account. This was obviously not without a reason. There are two reasons due to which I deleted my Discord account:

  • Privacy
  • Lack of Use

The most prominent reason is privacy but lack of use compelled me to actually take the plunge and delete my Discord account.

Privacy

Introduction

Discord is a hellhole for your privacy. Avoid it at all costs. In this section, I will show you the various things that Discord tracks.

DISCORD'S HISTORY

OpenFeint was a mobile social network for gaming. The Founder of OpenFeint was Jason Citron, the current CEO of Discord. OpenFeint received a class-action lawsuit for storing data like:

  • Unique Device Identifiers
  • Exact GPS Location
  • Internet Browsing History
  • Facebook and Twitter Profiles

OpenFeint then revealed all of this data to any mobile game developer who asked for it and advertising networks.

Well, if they collected all of this data, you must have agreed to it, right?

No. The company never asked for your consent. This data collection involved over 100M mobile devices.

PRIVACY ISSUES

So, when you have the CEO of a company that did all of this data collection become the CEO of another company, what do you think he is going to do? The answer is obvious. Of course he will do the same thing.

Let us go over what privacy issues there currently are with Discord.

  1. All messages, including direct messages are unencrypted.
    • Do not share any sensitive information on it. It can be detrimental if you store a password on their servers as any Discord employee can view it.
  2. Discord collects every single thing you do.
    • Do not be surprised if they log the amount of times you breathe while using Discord. It is stored with your User ID, an event ID, a timestamp and a detailed explanation of everything you do.
  3. Discord collects information about game executables.
    • After scanning your game executables, Discord basically will have a tally of what games you play. If they are doing it for game executables, there is no doubt that they are doing it for other apps as well.
  4. Government agencies, gather round!
    • Discord's privacy policy states that your data will be given to any government organisation that asks for it.
  5. The privacy toggles in the Discord app do nothing.
    • All they do is tell the server to delete the data as soon as it receives it. There is no verification, let alone an audit to verify this.
  6. Your messages are with us... and everyone else.
    • When you delete your Discord account, your messages are still kept and your profile will simply be replaced by “Deleted Account”. If you used Discord for even more than a few days to talk with friends, your messages are more than enough to deanonymize you.
  7. Oh, and don't do it yourself.
    • You will get banned for using tools to delete messages on Discord.

ALL IN ALL...

... this is not all that Discord does. If we know that Discord does all of this, there is obviously more that they are doing that we do not know. You should always assume closed-source pieces of software are tracking you and sending your information to a third-party.

Lack of Use

I was not using Discord anymore so I deleted it. The reason is that my previous account got banned for botting when I did not do anything. I made a new account, chatted with three or four of my friends. Afterwards, the CounterHawks Discord server got banned. Due to this, I realized there is no use for my account and that there is no reason for me to support Discord.

Conclusion

I do not use Discord anymore and probably never will. Previously, it was difficult to delete my Discord account but Discord themselves have done all the hard work for me.

>>> Reply To Me

Previous Post - Next Post


+(POST) Delete Your Discord Account

sf.cu > Blog > Delete Your Discord Account

Delete Your Discord Account

Posted on 22 March 2023

Categories: Software && Guides

As mentioned in the title, I have deleted my Discord account. This was obviously not without a reason. There are two reasons due to which I deleted my Discord account:

  • Privacy
  • Lack of Use

The most prominent reason is privacy but lack of use compelled me to actually take the plunge and delete my Discord account.

Privacy

Introduction

Discord is a hellhole for your privacy. Avoid it at all costs. In this section, I will show you the various things that Discord tracks.

DISCORD'S HISTORY

OpenFeint was a mobile social network for gaming. The Founder of OpenFeint was Jason Citron, the current CEO of Discord. OpenFeint received a class-action lawsuit for storing data like:

  • Unique Device Identifiers
  • Exact GPS Location
  • Internet Browsing History
  • Facebook and Twitter Profiles

OpenFeint then revealed all of this data to any mobile game developer who asked for it and advertising networks.

Well, if they collected all of this data, you must have agreed to it, right?

No. The company never asked for your consent. This data collection involved over 100M mobile devices.

PRIVACY ISSUES

So, when you have the CEO of a company that did all of this data collection become the CEO of another company, what do you think he is going to do? The answer is obvious. Of course he will do the same thing.

Let us go over what privacy issues there currently are with Discord.

  1. All messages, including direct messages are unencrypted.
    • Do not share any sensitive information on it. It can be detrimental if you store a password on their servers as any Discord employee can view it.
  2. Discord collects every single thing you do.
    • Do not be surprised if they log the amount of times you breathe while using Discord. It is stored with your User ID, an event ID, a timestamp and a detailed explanation of everything you do.
  3. Discord collects information about game executables.
    • After scanning your game executables, Discord basically will have a tally of what games you play. If they are doing it for game executables, there is no doubt that they are doing it for other apps as well.
  4. Government agencies, gather round!
    • Discord's privacy policy states that your data will be given to any government organisation that asks for it.
  5. The privacy toggles in the Discord app do nothing.
    • All they do is tell the server to delete the data as soon as it receives it. There is no verification, let alone an audit to verify this.
  6. Your messages are with us... and everyone else.
    • When you delete your Discord account, your messages are still kept and your profile will simply be replaced by “Deleted Account”. If you used Discord for even more than a few days to talk with friends, your messages are more than enough to deanonymize you.
  7. Oh, and don't do it yourself.
    • You will get banned for using tools to delete messages on Discord.

ALL IN ALL...

... this is not all that Discord does. If we know that Discord does all of this, there is obviously more that they are doing that we do not know. You should always assume closed-source pieces of software are tracking you and sending your information to a third-party.

Lack of Use

I was not using Discord anymore so I deleted it. The reason is that my previous account got banned for botting when I did not do anything. I made a new account, chatted with three or four of my friends. Afterwards, the CounterHawks Discord server got banned. Due to this, I realized there is no use for my account and that there is no reason for me to support Discord.

Conclusion

I do not use Discord anymore and probably never will. Previously, it was difficult to delete my Discord account but Discord themselves have done all the hard work for me.

>>> Reply To Me

Previous Post - Next Post


diff --git a/blog/do-it-yourself/index.html b/blog/do-it-yourself/index.html index 2bb6848..ce298b0 100644 --- a/blog/do-it-yourself/index.html +++ b/blog/do-it-yourself/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Blog > Do It Yourself

Do It Yourself

@@ -29,8 +29,5 @@ diff --git a/blog/doas-sudo/index.html b/blog/doas-sudo/index.html index 220a01e..1bd7467 100644 --- a/blog/doas-sudo/index.html +++ b/blog/doas-sudo/index.html @@ -1 +1 @@ -(POST) Use Doas Instead Of Sudo

sf.cu > Blog > Use Doas Instead Of Sudo

Use Doas Instead Of Sudo

Posted on 20 April 2023

Categories: Linux && Software && Guides

Sudo. It is often used by Linux users to perform commands with root privileges instead of being in a root shell all the time. However, there has recently been a vulnerability in sudo due to which people are switching to doas.

What is Doas?

OpenDoas or Doas is a portable version of the doas utility that is used on OpenBSD. OpenDoas can be installed on Unix-like system which includes Linux. It is designed to be more minimal and has less configuration options than sudo. If you are on a personal computer, then I highly recommend you switch to doas because it has a much smaller codebase which leaves less room for error.

However, if you are part of a professional environment with many individuals needing to use sudo, I recommend staying with sudo because it offers more configuration options to be used for groups and users.

Installing Doas

Doas is available on almost all major distributions. If your distribution is Debian-based (Ubuntu, Linux Mint, Zorin OS), simply type:

sudo apt install doas

If you run an Arch-based system (Artix, Arco, Endeavour, Manjaro), type:

sudo pacman -S opendoas

If you use RHEL-based systems (Fedora, CentOS), type:

sudo dnf install opendoas

Doas should now be installed but it will not work out of the box. There is one line that we need to add to the configuration file.

Configuring Doas

You have to configure doas as it is not included in most distributions by default but do not fret! One of its plus points is that its configuration is much better than sudo's.

To begin, edit the /etc/doas.conf file as root.

If you are the only user on your system and do not plan to allow other users to use your system, this line will suffice.

permit persist username as root

Many distributions have a group (wheel, sudoers) that are allowed to run sudo commands. If you would like to allow that group to send commands as root, type this:

permit persist :wheel as root

Using Doas

Using doas is incredibly simple. Just type doas instead of sudo. For example, if you usually type:

sudo pacman -Syu

then just type:

doas pacman -Syu

I also recommend aliasing doas to 'doas --' since it causes issues sometimes if you just use doas. Apart from that, this is it for the setup.

Conclusion

If you are the only person on your Linux machine, you should switch to doas. It is much more lightweight and is similar to sudo. It has a smaller codebase which, in my opinion, prevents exploits from popping up as often as sudo.

However, if you are in a professional environment, you should stick with sudo.

>>> Reply To Me

Previous Post - Next Post


+(POST) Use Doas Instead Of Sudo

sf.cu > Blog > Use Doas Instead Of Sudo

Use Doas Instead Of Sudo

Posted on 20 April 2023

Categories: Linux && Software && Guides

Sudo. It is often used by Linux users to perform commands with root privileges instead of being in a root shell all the time. However, there has recently been a vulnerability in sudo due to which people are switching to doas.

What is Doas?

OpenDoas or Doas is a portable version of the doas utility that is used on OpenBSD. OpenDoas can be installed on Unix-like system which includes Linux. It is designed to be more minimal and has less configuration options than sudo. If you are on a personal computer, then I highly recommend you switch to doas because it has a much smaller codebase which leaves less room for error.

However, if you are part of a professional environment with many individuals needing to use sudo, I recommend staying with sudo because it offers more configuration options to be used for groups and users.

Installing Doas

Doas is available on almost all major distributions. If your distribution is Debian-based (Ubuntu, Linux Mint, Zorin OS), simply type:

sudo apt install doas

If you run an Arch-based system (Artix, Arco, Endeavour, Manjaro), type:

sudo pacman -S opendoas

If you use RHEL-based systems (Fedora, CentOS), type:

sudo dnf install opendoas

Doas should now be installed but it will not work out of the box. There is one line that we need to add to the configuration file.

Configuring Doas

You have to configure doas as it is not included in most distributions by default but do not fret! One of its plus points is that its configuration is much better than sudo's.

To begin, edit the /etc/doas.conf file as root.

If you are the only user on your system and do not plan to allow other users to use your system, this line will suffice.

permit persist username as root

Many distributions have a group (wheel, sudoers) that are allowed to run sudo commands. If you would like to allow that group to send commands as root, type this:

permit persist :wheel as root

Using Doas

Using doas is incredibly simple. Just type doas instead of sudo. For example, if you usually type:

sudo pacman -Syu

then just type:

doas pacman -Syu

I also recommend aliasing doas to 'doas --' since it causes issues sometimes if you just use doas. Apart from that, this is it for the setup.

Conclusion

If you are the only person on your Linux machine, you should switch to doas. It is much more lightweight and is similar to sudo. It has a smaller codebase which, in my opinion, prevents exploits from popping up as often as sudo.

However, if you are in a professional environment, you should stick with sudo.

>>> Reply To Me

Previous Post - Next Post


diff --git a/blog/dont-use-github/index.html b/blog/dont-use-github/index.html index 296de79..d9178a4 100644 --- a/blog/dont-use-github/index.html +++ b/blog/dont-use-github/index.html @@ -11,7 +11,7 @@ - +

Don't Use GitHub

Posted on 27 May 2023

Categories: Software

@@ -39,8 +39,5 @@ diff --git a/blog/eid-mubarak-2023/index.html b/blog/eid-mubarak-2023/index.html index 1e8b9d5..e2ccc35 100644 --- a/blog/eid-mubarak-2023/index.html +++ b/blog/eid-mubarak-2023/index.html @@ -1 +1 @@ -(POST) Eid Mubarak!

sf.cu > Blog > Eid Mubarak!

Eid Mubarak!

Posted on 21 April 2023

Categories: Other

I would like to wish an 🌙 AUSPICIOUS EID 🌙 to you and your family!

>>> Reply To Me

Previous Post - Next Post


+(POST) Eid Mubarak!

sf.cu > Blog > Eid Mubarak!

Eid Mubarak!

Posted on 21 April 2023

Categories: Other

I would like to wish an 🌙 AUSPICIOUS EID 🌙 to you and your family!

>>> Reply To Me

Previous Post - Next Post


diff --git a/blog/email-encrypt/index.html b/blog/email-encrypt/index.html index ad745d0..93c36f3 100644 --- a/blog/email-encrypt/index.html +++ b/blog/email-encrypt/index.html @@ -1 +1 @@ -(POST) How To Encrypt Emails

sf.cu > Blog > How To Encrypt Emails

How To Encrypt Emails

Posted on 14 March 2023

Categories: Software && Guides

In this article, I will show you how to encrypt emails. You can encrypt emails on almost any device. In this article, however, I will be focusing on Gmail, Outlook, Yahoo. I will also be focusing on making ProtonMail encrypt emails with Gmail.

Myths

Firstly, let us dispell a few myths. The first myth is a big one.

Gmail's Confidential mode does not encrypt your emails

Yes, you heard that right. Gmail's confidential mode does not encrypt your emails. Whenever I speak about email encryption, I hear something along the lines of:

“Why are you making things so complicated? Just use Gmail's confidential mode! It encrypts your emails for you!”

No, Gmail's confidential mode does not encrypt emails. It simply puts a password on your email.

ProtonMail does not encrypt emails sent to non-ProtonMail users

This is also a huge myth. ProtonMail encrypts emails sent to other ProtonMail users. However, they do not encrypt emails sent to or received from non-ProtonMail users. It collects less data about you and it stores your emails with encryption on their servers but the email itself is not encrypted on the other person's end.

Encryption for non-ProtonMail users works on a user-to-user basis. You have to have the encryption keys of the other person if they are a non-ProtonMail user and they also have to encrypt their emails manually. We will learn how to do this in this guide.

Online Email

Encrypting your emails online is a simple process.

Step 1: Get the Mailvelope extension

Mailvelope is a free, libre and open-source browser extension which allows you to not only encrypt emails using public keys but also has a keyserver which has a list of other people who use Mailvelope. Emails sent to other people using Mailvelope will automatically be encrypted.

Step 2: Set it up

Open the extension and generate your keypair if you do not have a keypair or import your keypair if you do have one.

Mailvelope Setup Screen

Step 3: Import other people's keys

Encourage all of your friends to get the Mailvelope extension. Afterwards, you can import their public keys. Henceforth, all emails will be encrypted. Many websites also give their own public key along with their emails so that you can encrypt them as well. If you have friends who use ProtonMail, go to the ProtonMail import section of this post.

Step 4: Send encrypted emails!

Whenever you go to compose an email, there will be a button like the image below. Just click on it and there will be a popup to compose your encrypted email. Just fill in the info and send your email!

Mailvelope Icon to send encrypted emails

Smartphones

Firstly, I would like to give a disclaimer. There is no way to use PGP encryption on iOS. Most encryption that is used on iOS is either paid or unavailable. On Android, you cannot encrypt emails using the native applications for Gmail, Outlook or Yahoo. Even if there is such a feature, you should not use their official clients due to their invasive tracking. To encrypt emails, we will use an email app called K-9 Mail. I believe that everyone should use K-9 Mail even if they are not encrypting their emails. It is a fantastic app.

K-9 Mail is a free and open-source email app that has a lot of features. I believe that no one should be writing emails on their phones but it is a great app to have just to make sure there is nothing urgent in your inbox.

Step 1: Get the app

K-9 Mail is on the Play Store, but do not get it from there. Get F-Droid and make it a habit to download apps you use and the alternatives to them through F-Droid. K-9 Mail is available on F-Droid and is a popular app there.

Step 2: Set it up

Follow the guide to enter your email address and get it working through K-9 Mail. I have tried Gmail and it works flawlessly. Other email providers will work well but some may not work at all.

Step 3: Get the OpenKeychain app

OpenKeychain is an app that allows you to import and manage PGP keys. It is also available on F-Droid.

Step 4: Generate/Import your key

Generate your key by pressing the option to create a key or import the key file.

Step 5: Setup K-9 Mail

Go back to K-9 Mail, go to settings, go to your account that you added, go to end-to-end encryption and enable it. Select your key. Turn on autocrypt mutual mode. That is it! You should see a lock icon whenever you are sending an email to someone if you have their PGP public key. If you need to import more keys, just go to the OpenKeychain app and import them.

Composing an encrypted email in K-9 Mail

Exporting ProtonMail Keys

To export your ProtonMail public keys, follow these steps.

  1. Login to your ProtonMail account
  2. Go to the settings
  3. Go to the section labelled 'Encryption and keys'
  4. Scroll down to 'Email encryption keys' and click 'Export'.

The image below is how it looks like in 2023.

ProtonMail Key Export Dashboard

You can now send these keys to anyone to import into their PGP keychain. They will then be able to encrypt emails when sending them to your ProtonMail address!

Conclusion

That is it! You have setup encryption on your emails. This is a great step as email itself is very unsecure, so this will boost your privacy and security by a lot. Sharing passwords through email has never been safe but encryption allows you to do it with a good range of security.

>>> Reply To Me

Previous Post - Next Post


+(POST) How To Encrypt Emails

sf.cu > Blog > How To Encrypt Emails

How To Encrypt Emails

Posted on 14 March 2023

Categories: Software && Guides

In this article, I will show you how to encrypt emails. You can encrypt emails on almost any device. In this article, however, I will be focusing on Gmail, Outlook, Yahoo. I will also be focusing on making ProtonMail encrypt emails with Gmail.

Myths

Firstly, let us dispell a few myths. The first myth is a big one.

Gmail's Confidential mode does not encrypt your emails

Yes, you heard that right. Gmail's confidential mode does not encrypt your emails. Whenever I speak about email encryption, I hear something along the lines of:

“Why are you making things so complicated? Just use Gmail's confidential mode! It encrypts your emails for you!”

No, Gmail's confidential mode does not encrypt emails. It simply puts a password on your email.

ProtonMail does not encrypt emails sent to non-ProtonMail users

This is also a huge myth. ProtonMail encrypts emails sent to other ProtonMail users. However, they do not encrypt emails sent to or received from non-ProtonMail users. It collects less data about you and it stores your emails with encryption on their servers but the email itself is not encrypted on the other person's end.

Encryption for non-ProtonMail users works on a user-to-user basis. You have to have the encryption keys of the other person if they are a non-ProtonMail user and they also have to encrypt their emails manually. We will learn how to do this in this guide.

Online Email

Encrypting your emails online is a simple process.

Step 1: Get the Mailvelope extension

Mailvelope is a free, libre and open-source browser extension which allows you to not only encrypt emails using public keys but also has a keyserver which has a list of other people who use Mailvelope. Emails sent to other people using Mailvelope will automatically be encrypted.

Step 2: Set it up

Open the extension and generate your keypair if you do not have a keypair or import your keypair if you do have one.

Mailvelope Setup Screen

Step 3: Import other people's keys

Encourage all of your friends to get the Mailvelope extension. Afterwards, you can import their public keys. Henceforth, all emails will be encrypted. Many websites also give their own public key along with their emails so that you can encrypt them as well. If you have friends who use ProtonMail, go to the ProtonMail import section of this post.

Step 4: Send encrypted emails!

Whenever you go to compose an email, there will be a button like the image below. Just click on it and there will be a popup to compose your encrypted email. Just fill in the info and send your email!

Mailvelope Icon to send encrypted emails

Smartphones

Firstly, I would like to give a disclaimer. There is no way to use PGP encryption on iOS. Most encryption that is used on iOS is either paid or unavailable. On Android, you cannot encrypt emails using the native applications for Gmail, Outlook or Yahoo. Even if there is such a feature, you should not use their official clients due to their invasive tracking. To encrypt emails, we will use an email app called K-9 Mail. I believe that everyone should use K-9 Mail even if they are not encrypting their emails. It is a fantastic app.

K-9 Mail is a free and open-source email app that has a lot of features. I believe that no one should be writing emails on their phones but it is a great app to have just to make sure there is nothing urgent in your inbox.

Step 1: Get the app

K-9 Mail is on the Play Store, but do not get it from there. Get F-Droid and make it a habit to download apps you use and the alternatives to them through F-Droid. K-9 Mail is available on F-Droid and is a popular app there.

Step 2: Set it up

Follow the guide to enter your email address and get it working through K-9 Mail. I have tried Gmail and it works flawlessly. Other email providers will work well but some may not work at all.

Step 3: Get the OpenKeychain app

OpenKeychain is an app that allows you to import and manage PGP keys. It is also available on F-Droid.

Step 4: Generate/Import your key

Generate your key by pressing the option to create a key or import the key file.

Step 5: Setup K-9 Mail

Go back to K-9 Mail, go to settings, go to your account that you added, go to end-to-end encryption and enable it. Select your key. Turn on autocrypt mutual mode. That is it! You should see a lock icon whenever you are sending an email to someone if you have their PGP public key. If you need to import more keys, just go to the OpenKeychain app and import them.

Composing an encrypted email in K-9 Mail

Exporting ProtonMail Keys

To export your ProtonMail public keys, follow these steps.

  1. Login to your ProtonMail account
  2. Go to the settings
  3. Go to the section labelled 'Encryption and keys'
  4. Scroll down to 'Email encryption keys' and click 'Export'.

The image below is how it looks like in 2023.

ProtonMail Key Export Dashboard

You can now send these keys to anyone to import into their PGP keychain. They will then be able to encrypt emails when sending them to your ProtonMail address!

Conclusion

That is it! You have setup encryption on your emails. This is a great step as email itself is very unsecure, so this will boost your privacy and security by a lot. Sharing passwords through email has never been safe but encryption allows you to do it with a good range of security.

>>> Reply To Me

Previous Post - Next Post


diff --git a/blog/guides/index.html b/blog/guides/index.html index 5623384..2d0d77b 100644 --- a/blog/guides/index.html +++ b/blog/guides/index.html @@ -1,4 +1,4 @@ -(GUIDES) Sufyaan's Webpage

sf.cu > Blog > Guides

+(GUIDES) Sufyaan's Webpage

sf.cu > Blog > Guides

Guides

In this category, I post guides about computing and technology.

-

You have read the last page!


+

You have read the last page!


diff --git a/blog/index.html b/blog/index.html index b1c787b..342d5bc 100644 --- a/blog/index.html +++ b/blog/index.html @@ -1,4 +1,4 @@ -(BLOG) Sufyaan's Webpage

sf.cu > Blog

+(BLOG) Sufyaan's Webpage

sf.cu > Blog

Blog

Categories:

Read my (mostly) computing-related articles here.

-

You have hit rock bottom!


+

You have hit rock bottom!


diff --git a/blog/linux/index.html b/blog/linux/index.html index 382c965..81b81d5 100644 --- a/blog/linux/index.html +++ b/blog/linux/index.html @@ -1,5 +1,5 @@ -(LINUX) Sufyaan's Webpage

sf.cu > Blog > Linux

+(LINUX) Sufyaan's Webpage

sf.cu > Blog > Linux

Linux

In this category, I post about tools and information related to Linux.

-

You reached the bottom of your screen!


+

You reached the bottom of your screen!


diff --git a/blog/metal-usb/index.html b/blog/metal-usb/index.html index 2504c11..ed2915a 100644 --- a/blog/metal-usb/index.html +++ b/blog/metal-usb/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Blog > Buy Only Metal USBs

Buy Only Metal USBs

Posted on 6 May 2023

Categories: Technology @@ -29,8 +29,5 @@

diff --git a/blog/other/index.html b/blog/other/index.html index ed69924..fa05451 100644 --- a/blog/other/index.html +++ b/blog/other/index.html @@ -1,5 +1,5 @@ -(OTHER) Sufyaan's Webpage

sf.cu > Blog > Other

+(OTHER) Sufyaan's Webpage

sf.cu > Blog > Other

Other

In this category, I post about miscellaneous things. These posts may be information related to me or general things which do not apply to my regular posts.

-

You have hit rock bottom!


+

You have hit rock bottom!


diff --git a/blog/passwd-2023/index.html b/blog/passwd-2023/index.html index 8c3e2b1..60b1b89 100644 --- a/blog/passwd-2023/index.html +++ b/blog/passwd-2023/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Blog > Password Systems

Password Systems

Posted on 2 May 2023

Categories: Software && Guides

@@ -80,8 +80,5 @@ diff --git a/blog/public-insta/index.html b/blog/public-insta/index.html index 8f1572e..7597ab3 100644 --- a/blog/public-insta/index.html +++ b/blog/public-insta/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Blog > Instagram Deleted!

Instagram Deleted!

Posted on 7 May 2023

Categories: Software

@@ -23,8 +23,4 @@ diff --git a/blog/social-media/index.html b/blog/social-media/index.html index 5ce23aa..ec120f7 100644 --- a/blog/social-media/index.html +++ b/blog/social-media/index.html @@ -1 +1 @@ -(POST) Stop Using Social Media

sf.cu > Blog > Stop Using Social Media

Stop Using Social Media

Posted on 20 April 2023

Categories: Software && Guides

I know how you felt reading the title. If you are a heavy social media user, you probably said:

"What? Who in their right mind would delete their social media accounts? How are they supposed to live life and talk to their friends?"

Don't worry. That was me last year. I understand your feelings. However, the disadvantages of social media and the perks of deleting it far outweigh its benefits. In this post, I will go over the reasons why you should delete all of your social media.

Cons of Social Media

Time-Consuming

A study counted 5 billion internet users and it was concluded that, on average, an internet user spends 6 hours and 53 minutes online per day. 6. HOURS. AND. 53. MINUTES. That is almost a whole third of people's daily lives. Another study concluded that people spend more time on social media in their whole lifetime than grooming, socialising (social media !=socialising) and doing the laundry combined.

It is not as if any of the time spent is valuable. Sure, you may learn one or two 'fun facts, which will make you think that you need social media. You may talk with your friends a lot, which will make you think that your account is required to socialise with people. However, these are all nonsensical excuses that your brain makes to justify getting cheap dopamine. Imagine how much work you can get done, how many actual connections you can make with people, and how many good habits can be formed that will make you happier in the long term than social media.

Affects Your Mental Health

Whenever people hear that social media affects your mental health, they agree but say that it does not affect them specifically. The most common argument I hear is:

"Yeah, I know that it affects other people. However, I am fine with it. I feel normal and do not feel depressed at all.

All I can say is not to trust what your brain tells you whenever you are dealing with any addiction, not just social media. Think about it. The same brain that is telling you that you should keep using social media for meaningless reasons is the one telling you that it is not affecting you.

Social media is a constant source of comparison. You open it up, view a few triggering posts, find out that your favourite actor has passed away, and see your friends perfect lives. Before closing the app, you apply filters to yourself and edit the picture as much as possible for your stories to make yourself look artificially good.

You see, not only is social media fake, it also has an absurd effect on your mental health. It has been proven that many social media platforms track you to show you personalised content. They use human psychology to hook you onto their platforms.

There are two chemicals in your brain that are responsible for happiness:

  • Dopamine - released when you are anticipating something good
  • Endorphin - released when you are happy

In many cases, the effect of dopamine is much greater than the effect of endorphins. Recall back to a young age when you realised you were about to receive a toy that you had been waiting for for a few days. The feeling you got when you realised you would get it soon was more intense than the actual feeling of getting the toy.

The same trick applies on social media. Many social media platforms show you content that is completely different from the content that you like just before showing you content that you really like. This results in more dopamine being released, with a good amount of endorphin being released as well. To your brain, it has just achieved something great when, in reality, you have not.

Constantly high dopamine and endorphin releases raise your base happiness levels. This is why things that you used to love now seem boring to you. It is not 'growing up'. It is your social media addiction.

Social media metrics also contribute to this. It makes you think that likes and comments are proportional to your worth, which is simply not the case. When you get a like, it is a form of validation that you are valuable to someone. Someone not liking your post does not mean that you are not valuable.

FOMO (fear of missing out) plays a big role as well. The phrase:

"If everyone is using [insert anything here], why shouldn't I?"

is commonly said by an individual who experiences FOMO without the thing in question. There is a constant fear of missing out on information, which simply will not happen. You may miss some arbitrary information that you would not care about otherwise, but this is not a reason at all to continue using social media.

To hook you into their addiction, social media companies hire "attention designers" who take references and inspiration from casinos to keep you hooked.

Before ending this unexpectedly long section, I would like you to read this quote.

"You're either on, and you're connected and distracted all the time, or you're off, but then you're wondering, Am I missing something important? In other words, you're either distracted or you have a fear of missing out."

Tristan Harris, Former Design Ethicist at Google

Privacy

If you post everything you do on social media, there is no longer any privacy. Anything you do is public information. If you have a 'private' account, your friends know everything you do. There is no privacy at all if you keep posting everything on social media.

Then there is the elephant in the room. Digital Privacy.

It is well-known that apps like Instagram, Facebook, Twitter, and some Google apps collect your data like their lives depend on it (technically, they do). Everything from your name to your IP address and phone number to even the amount of network requests you make or the model of your phone. Not to mention, literally everything you do on the app. This all goes to their servers and is used for more advertisements.

It is pretty safe to say that your digital footprint, as it is called, can be nearly eliminated by deleting your accounts. There are more steps that you have to take to take care of your privacy, but preventing data collection from big corporations is a huge step.

Fake News

Fake news. It's everywhere. Even the worst social media addict cannot deny it. You see parody pages that copy the design of famous news channels perfectly and post random news. You see people edit images to exaggerate or divert the subject of an article. There is not much that I need to say. You know what I mean.

Much Worse Sleep

The blue-light from your phone tricks your brain into thinking it's daytime. So, when you use your phone late into the night scrolling on your social media feed, it makes you feel less sleepy.

When this happens, do you know what most people do? They pick up their phones again since they cannot sleep, thinking that they will sleep in 30 minutes when they are sleepy. This cycle goes on. Many individuals of Generation Z do not sleep the whole night for many days on end and instead take naps in the afternoon. Does this sound healthy to you?

And no, using a blue-light filter does not fix the issue. It only slightly reduces its effect.

Decline In Physical Health

When you spend hours and hours a day sitting down with no exercise or action apart from flicking your thumb, what do you think will happen? You may experience the following effects:

  1. Weight Gain
  2. Back Pain
  3. Bad Posture
  4. Neck Pain
  5. Eye Strain
  6. Increased Risk of Heart Disease

Many individuals who use social media are experiencing these problems, which are usually experienced by older people, at ages like 25.

Horrible Productivity

When you are working and are in the zone (a phase in which you do high-quality work without even thinking about it), any minor disturbance will move you out of that state. A notification about someone liking your post can shake you out of the zone. In the long-term, this will waste hours of your time.

Getting Rid of It

So, you are ready. You want to quit social media and break this horrible addiction. You realise the effects it has on your life. However, you do not know where to start. If this is the case, check out 'The AIR Method'. If you would like to read how I did it, please refer to the steps below. Referring to the steps I took may help you understand your weak points and how to combat them.

1. Alternative Contact Details

Make a list of all of your friends and cross out the ones that you know can be reached on other chat applications. Ask the rest for alternative contact methods. This may be through apps like Signal, Session, XMPP, Matrix, or WhatsApp. Just make sure that it is not another social media app.

2. Download Your Data

Download your data to refer to in the future. Most social media platforms include chats along with it so that you can refer back to the chats if needed. A website like JustGetMyData will allow you to quickly get to this section. Most websites place it in places which are difficult to access to prevent people from deleting their accounts.

3. Start Using Healthier Apps

Quitting social media 'cold-turkey' (abruptly) may work for the first few days but it will cause you to fail completely. It is better to slowly reduce your usage by using healthier apps.

If you haven't already, start using RSS feeds. There is nothing wrong with using old technology. RSS provides you with a similar feed to social media but with content you actually like and want to read. It is managed by you, not an algorithm. You read what you want and stop. There is no algorithm or endless feed that compells you to keep using the app.

I am going to make a post about RSS feeds soon. It will be updated here.

4. Announce

It is also important to announce that you are deleting your accounts. This may not be necessary if you have less than five friends you talk to on your accounts but it is important if you have many friends. This announcement will allow your friends to contact you and tell you their alternative forms of contact. It will also allow people to know that you are leaving for good.

5. Take The Plunge!

The moment you have been waiting for. Click on the delete button.

This is much easier said than done, however. Most social media accounts have a grace period during which if you login to your account, your account deletion will be cancelled. For Instagram, the grace period is 1 month. To combat this, I did the following:

  1. Removed all recovery options (phone number, 2FA) from my accounts and changed my email to one from TempMail to prevent password reset
  2. Generated a random 128-character password in Bitwarden (my password manager)
  3. Changed my account password to the new password
  4. Deleted my account
  5. Immediately delete all records of the password and restart your device to clear it from your clipboard

These steps were drastic but they practically cemented the fact that my account was going to be deleted, no matter what.

Conclusion

There is not much left to say. I am much, much happier without social media. I have more time on my hands and I am still getting the information I want from RSS feeds without an algorithm trying to pull me in. Big corporations have much less data about me, I have a lot of time and have produced a lot of work. In terms of academics, my overall percentage in school has increased by over 20%. I find difficult subjects easier and easy subjects a piece of cake.

All in all, if you care about yourself, delete your social media. It is a hellhole that is getting worse by the day.

>>> Reply To Me

Previous Post - Next Post


+(POST) Stop Using Social Media

sf.cu > Blog > Stop Using Social Media

Stop Using Social Media

Posted on 20 April 2023

Categories: Software && Guides

I know how you felt reading the title. If you are a heavy social media user, you probably said:

"What? Who in their right mind would delete their social media accounts? How are they supposed to live life and talk to their friends?"

Don't worry. That was me last year. I understand your feelings. However, the disadvantages of social media and the perks of deleting it far outweigh its benefits. In this post, I will go over the reasons why you should delete all of your social media.

Cons of Social Media

Time-Consuming

A study counted 5 billion internet users and it was concluded that, on average, an internet user spends 6 hours and 53 minutes online per day. 6. HOURS. AND. 53. MINUTES. That is almost a whole third of people's daily lives. Another study concluded that people spend more time on social media in their whole lifetime than grooming, socialising (social media !=socialising) and doing the laundry combined.

It is not as if any of the time spent is valuable. Sure, you may learn one or two 'fun facts, which will make you think that you need social media. You may talk with your friends a lot, which will make you think that your account is required to socialise with people. However, these are all nonsensical excuses that your brain makes to justify getting cheap dopamine. Imagine how much work you can get done, how many actual connections you can make with people, and how many good habits can be formed that will make you happier in the long term than social media.

Affects Your Mental Health

Whenever people hear that social media affects your mental health, they agree but say that it does not affect them specifically. The most common argument I hear is:

"Yeah, I know that it affects other people. However, I am fine with it. I feel normal and do not feel depressed at all.

All I can say is not to trust what your brain tells you whenever you are dealing with any addiction, not just social media. Think about it. The same brain that is telling you that you should keep using social media for meaningless reasons is the one telling you that it is not affecting you.

Social media is a constant source of comparison. You open it up, view a few triggering posts, find out that your favourite actor has passed away, and see your friends perfect lives. Before closing the app, you apply filters to yourself and edit the picture as much as possible for your stories to make yourself look artificially good.

You see, not only is social media fake, it also has an absurd effect on your mental health. It has been proven that many social media platforms track you to show you personalised content. They use human psychology to hook you onto their platforms.

There are two chemicals in your brain that are responsible for happiness:

  • Dopamine - released when you are anticipating something good
  • Endorphin - released when you are happy

In many cases, the effect of dopamine is much greater than the effect of endorphins. Recall back to a young age when you realised you were about to receive a toy that you had been waiting for for a few days. The feeling you got when you realised you would get it soon was more intense than the actual feeling of getting the toy.

The same trick applies on social media. Many social media platforms show you content that is completely different from the content that you like just before showing you content that you really like. This results in more dopamine being released, with a good amount of endorphin being released as well. To your brain, it has just achieved something great when, in reality, you have not.

Constantly high dopamine and endorphin releases raise your base happiness levels. This is why things that you used to love now seem boring to you. It is not 'growing up'. It is your social media addiction.

Social media metrics also contribute to this. It makes you think that likes and comments are proportional to your worth, which is simply not the case. When you get a like, it is a form of validation that you are valuable to someone. Someone not liking your post does not mean that you are not valuable.

FOMO (fear of missing out) plays a big role as well. The phrase:

"If everyone is using [insert anything here], why shouldn't I?"

is commonly said by an individual who experiences FOMO without the thing in question. There is a constant fear of missing out on information, which simply will not happen. You may miss some arbitrary information that you would not care about otherwise, but this is not a reason at all to continue using social media.

To hook you into their addiction, social media companies hire "attention designers" who take references and inspiration from casinos to keep you hooked.

Before ending this unexpectedly long section, I would like you to read this quote.

"You're either on, and you're connected and distracted all the time, or you're off, but then you're wondering, Am I missing something important? In other words, you're either distracted or you have a fear of missing out."

Tristan Harris, Former Design Ethicist at Google

Privacy

If you post everything you do on social media, there is no longer any privacy. Anything you do is public information. If you have a 'private' account, your friends know everything you do. There is no privacy at all if you keep posting everything on social media.

Then there is the elephant in the room. Digital Privacy.

It is well-known that apps like Instagram, Facebook, Twitter, and some Google apps collect your data like their lives depend on it (technically, they do). Everything from your name to your IP address and phone number to even the amount of network requests you make or the model of your phone. Not to mention, literally everything you do on the app. This all goes to their servers and is used for more advertisements.

It is pretty safe to say that your digital footprint, as it is called, can be nearly eliminated by deleting your accounts. There are more steps that you have to take to take care of your privacy, but preventing data collection from big corporations is a huge step.

Fake News

Fake news. It's everywhere. Even the worst social media addict cannot deny it. You see parody pages that copy the design of famous news channels perfectly and post random news. You see people edit images to exaggerate or divert the subject of an article. There is not much that I need to say. You know what I mean.

Much Worse Sleep

The blue-light from your phone tricks your brain into thinking it's daytime. So, when you use your phone late into the night scrolling on your social media feed, it makes you feel less sleepy.

When this happens, do you know what most people do? They pick up their phones again since they cannot sleep, thinking that they will sleep in 30 minutes when they are sleepy. This cycle goes on. Many individuals of Generation Z do not sleep the whole night for many days on end and instead take naps in the afternoon. Does this sound healthy to you?

And no, using a blue-light filter does not fix the issue. It only slightly reduces its effect.

Decline In Physical Health

When you spend hours and hours a day sitting down with no exercise or action apart from flicking your thumb, what do you think will happen? You may experience the following effects:

  1. Weight Gain
  2. Back Pain
  3. Bad Posture
  4. Neck Pain
  5. Eye Strain
  6. Increased Risk of Heart Disease

Many individuals who use social media are experiencing these problems, which are usually experienced by older people, at ages like 25.

Horrible Productivity

When you are working and are in the zone (a phase in which you do high-quality work without even thinking about it), any minor disturbance will move you out of that state. A notification about someone liking your post can shake you out of the zone. In the long-term, this will waste hours of your time.

Getting Rid of It

So, you are ready. You want to quit social media and break this horrible addiction. You realise the effects it has on your life. However, you do not know where to start. If this is the case, check out 'The AIR Method'. If you would like to read how I did it, please refer to the steps below. Referring to the steps I took may help you understand your weak points and how to combat them.

1. Alternative Contact Details

Make a list of all of your friends and cross out the ones that you know can be reached on other chat applications. Ask the rest for alternative contact methods. This may be through apps like Signal, Session, XMPP, Matrix, or WhatsApp. Just make sure that it is not another social media app.

2. Download Your Data

Download your data to refer to in the future. Most social media platforms include chats along with it so that you can refer back to the chats if needed. A website like JustGetMyData will allow you to quickly get to this section. Most websites place it in places which are difficult to access to prevent people from deleting their accounts.

3. Start Using Healthier Apps

Quitting social media 'cold-turkey' (abruptly) may work for the first few days but it will cause you to fail completely. It is better to slowly reduce your usage by using healthier apps.

If you haven't already, start using RSS feeds. There is nothing wrong with using old technology. RSS provides you with a similar feed to social media but with content you actually like and want to read. It is managed by you, not an algorithm. You read what you want and stop. There is no algorithm or endless feed that compells you to keep using the app.

I am going to make a post about RSS feeds soon. It will be updated here.

4. Announce

It is also important to announce that you are deleting your accounts. This may not be necessary if you have less than five friends you talk to on your accounts but it is important if you have many friends. This announcement will allow your friends to contact you and tell you their alternative forms of contact. It will also allow people to know that you are leaving for good.

5. Take The Plunge!

The moment you have been waiting for. Click on the delete button.

This is much easier said than done, however. Most social media accounts have a grace period during which if you login to your account, your account deletion will be cancelled. For Instagram, the grace period is 1 month. To combat this, I did the following:

  1. Removed all recovery options (phone number, 2FA) from my accounts and changed my email to one from TempMail to prevent password reset
  2. Generated a random 128-character password in Bitwarden (my password manager)
  3. Changed my account password to the new password
  4. Deleted my account
  5. Immediately delete all records of the password and restart your device to clear it from your clipboard

These steps were drastic but they practically cemented the fact that my account was going to be deleted, no matter what.

Conclusion

There is not much left to say. I am much, much happier without social media. I have more time on my hands and I am still getting the information I want from RSS feeds without an algorithm trying to pull me in. Big corporations have much less data about me, I have a lot of time and have produced a lot of work. In terms of academics, my overall percentage in school has increased by over 20%. I find difficult subjects easier and easy subjects a piece of cake.

All in all, if you care about yourself, delete your social media. It is a hellhole that is getting worse by the day.

>>> Reply To Me

Previous Post - Next Post


diff --git a/blog/software/index.html b/blog/software/index.html index e2183c7..ac5d593 100644 --- a/blog/software/index.html +++ b/blog/software/index.html @@ -1,4 +1,4 @@ -(SOFTWARE) Sufyaan's Webpage

sf.cu > Blog > Software

+(SOFTWARE) Sufyaan's Webpage

sf.cu > Blog > Software

Software

In this category, I post new software I find, information about current software or tricks that can be utilised in current software.

-

ERROR: Cannot show more posts (EOFError)


+

ERROR: Cannot show more posts (EOFError)


diff --git a/blog/switching-to-ffmpeg/index.html b/blog/switching-to-ffmpeg/index.html index 1078e04..1de1e4c 100644 --- a/blog/switching-to-ffmpeg/index.html +++ b/blog/switching-to-ffmpeg/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Blog > Switching To FFmpeg

Switching To FFmpeg

Posted on 1 June 2023

Categories: Software

@@ -31,8 +31,4 @@ diff --git a/blog/technology/index.html b/blog/technology/index.html index ace36b1..aa93e5d 100644 --- a/blog/technology/index.html +++ b/blog/technology/index.html @@ -1,6 +1,6 @@ -(TECH) Sufyaan's Webpage

sf.cu > Blog > Technology

+(TECH) Sufyaan's Webpage

sf.cu > Blog > Technology

Technology

In this category, I post about tools and information related to Linux.

-

You have hit rock bottom!


+

You have hit rock bottom!


diff --git a/blog/terminal-apps/index.html b/blog/terminal-apps/index.html index 288e8ad..d0a6ff2 100644 --- a/blog/terminal-apps/index.html +++ b/blog/terminal-apps/index.html @@ -1 +1 @@ -(POST) Why I Use Terminal Apps

sf.cu > Blog > Why I Use Terminal Apps

Why I Use Terminal Apps

Posted on 13 March 2023

Categories: Linux && Software

“Ah, yes. Graphical-user interface (GUI) apps. They are so comfortable and easy to use. You just click some buttons and get your computer to do what you want.”

That was what I thought before I learned how spectacular terminal applications are. I do not use a calendar or email GUI app. I use its terminal equivalent. Specifically, I use Calcurse for my calendar/todo, neomutt for my email, sxiv for my image viewing, mpv for my video playing and even Joplin (CLI) for my notes. I am still actively looking for more apps like terminal file managers (lf, ranger, mc) and terminal versions of GUI apps I use (Bitwarden?). What compelled me to switch?

The Right Tool For The Right Job

Firstly, I realized that apps that allow me to use my keyboard and reduce mouse usage to as little as possible saved me a lot of time. By a lot of time, I don't mean a few minutes. I mean hours in the long run. Moving your hand to your mouse and clicking a button takes at least three seconds. Multiply that hundreds of times a day and 365 days an year. That leads to a lot of time wasted just moving your hand to your mouse.

Fast. Very Fast.

The speed of terminal apps have helped me get a lot more productive. Getting myself to start working immediately helped me a lot. I use Neovim for my text editor, and whenever I need to write text, its much faster to press a shortcut to open a blank file in Neovim than to open a GUI equivalent. It is also much faster to press a shortcut than to open my applications menu and search for my calendar app and wait a few seconds for the bloated app to open up. Terminal apps are just more lightweight. As a result, they operate faster and save me more than just a few seconds.

"Professionals Have Standards"

CLI apps are more standardized. With a GUI, the procedure for solving an issue or using the application's functionality is similar to this:

  1. Click 'button1' on the top right.
  2. Hover over 'dialogue2'
  3. Click on 'button3'
  4. Scroll down to 'setting4'
  5. Change the value to False.
  6. Click on Apply and OK.

This is the sole reason that you see the terminal being used so much in Linux. It's easier to say “Open your terminal and type this” than to blabber a long list of instructions that will become redundant if the application in question decides to change their UI in an update.

Run Them on a Potato!

Due to the lightweight nature of the command line, your tools can run on just about any computer. It does not matter if your computer has a Pentium processor or a 12th-generation i9. GUI tools have system requirements and if it is a robust tool with a fancy interface, chances are that the requirements just for the app to look good knocks that tool off your app list on your 10-year-old computer.

Exponential Learning Curve

While GUI apps are simple to use initially, your speed using the apps remains slow all the time. Sure, you may learn where every button is and be able to open any setting you want quickly, but that speed is nothing compared to one of a command line. With a command line, your speed is slower than a snail at first. However, after some time of using the program, you can do things at a similar speed as a GUI app.

If you daily-drive a terminal program, it takes only a few days for you to become faster at it than using a GUI program. After that, you will be able to understand your most used commands and use aliases to shorten them.

For example, if you view your free space regulary, instead of typing a 50-line command to print your free space, you can just alias that command to 'free-space'. Doing this will make it so that whenever you type 'free-space', it performs the aforementioned 50-line command and displays the output. This will save your more than just a few hours of time.

The Choices Never End!

With terminal apps, you have a plethora of choices. I can almost guarantee that an app with functionality you wish existed does exist in the form of a command line application. There are obscure apps with spectacular functionality which can change your computing experience that you will miss out on if you stay away from the terminal.

Bathe In Possibilities!

When it comes to GUI apps, you have to be honest. They do not have 100% functionality. It is simply implausible to fit every single function in a GUI app. Doing so would result in a lot of code to maintain, an extremely heavy app and a confusing layout. However, with a terminal app, all you have to do is type:

man command

or

command --help

and get the complete functionality of the app, all within less than 5% of the app size of its GUI equivalent.

Skip The Middlemen

All GUI apps are basically middlemen for the command line. They essentially use the command line for you. When you ditch the GUI and go straight for the terminal, you talk directly to the computer in a way in which the computer understands.

First Impressions Matter

When people first look at the terminal, it becomes set in their mind that it is difficult to use and that mentality stays for an extraordinarily long time. Due to this, they never experiment or even open the terminal application. If they run into an issue which requires the use of the terminal to fix, they decide to just live with the issue instead of using the terminal. However, if people use the terminal for a few weeks, they realize that it outpaces almost every other GUI app in almost everything.

Nothing is Perfect...

... including terminal applications. Terminal applications are amazing. They allow me to do so much. However, there are extremely rare cases in which I have no choice but to use a GUI. This is if the GUI application in question requires you to use only their app. There are also some specific use-cases in which GUI apps just make more sense. Video editing, advanced photo manipulation and 3D modelling are great examples.

To Sum It All Up...

...terminal applications should be used as much as possible. They are swift. They can be used quickly and also use less resources and space while running on just about anything. They are not as difficult as they look and can be used for uses which GUI apps do not have. They cannot be used all the time because there are rare exceptions in which GUI applications have to be used. However, these are so little that I do not mind keeping GUI apps just for these use cases.

>>> Reply To Me

Next Post


+(POST) Why I Use Terminal Apps

sf.cu > Blog > Why I Use Terminal Apps

Why I Use Terminal Apps

Posted on 13 March 2023

Categories: Linux && Software

“Ah, yes. Graphical-user interface (GUI) apps. They are so comfortable and easy to use. You just click some buttons and get your computer to do what you want.”

That was what I thought before I learned how spectacular terminal applications are. I do not use a calendar or email GUI app. I use its terminal equivalent. Specifically, I use Calcurse for my calendar/todo, neomutt for my email, sxiv for my image viewing, mpv for my video playing and even Joplin (CLI) for my notes. I am still actively looking for more apps like terminal file managers (lf, ranger, mc) and terminal versions of GUI apps I use (Bitwarden?). What compelled me to switch?

The Right Tool For The Right Job

Firstly, I realized that apps that allow me to use my keyboard and reduce mouse usage to as little as possible saved me a lot of time. By a lot of time, I don't mean a few minutes. I mean hours in the long run. Moving your hand to your mouse and clicking a button takes at least three seconds. Multiply that hundreds of times a day and 365 days an year. That leads to a lot of time wasted just moving your hand to your mouse.

Fast. Very Fast.

The speed of terminal apps have helped me get a lot more productive. Getting myself to start working immediately helped me a lot. I use Neovim for my text editor, and whenever I need to write text, its much faster to press a shortcut to open a blank file in Neovim than to open a GUI equivalent. It is also much faster to press a shortcut than to open my applications menu and search for my calendar app and wait a few seconds for the bloated app to open up. Terminal apps are just more lightweight. As a result, they operate faster and save me more than just a few seconds.

"Professionals Have Standards"

CLI apps are more standardized. With a GUI, the procedure for solving an issue or using the application's functionality is similar to this:

  1. Click 'button1' on the top right.
  2. Hover over 'dialogue2'
  3. Click on 'button3'
  4. Scroll down to 'setting4'
  5. Change the value to False.
  6. Click on Apply and OK.

This is the sole reason that you see the terminal being used so much in Linux. It's easier to say “Open your terminal and type this” than to blabber a long list of instructions that will become redundant if the application in question decides to change their UI in an update.

Run Them on a Potato!

Due to the lightweight nature of the command line, your tools can run on just about any computer. It does not matter if your computer has a Pentium processor or a 12th-generation i9. GUI tools have system requirements and if it is a robust tool with a fancy interface, chances are that the requirements just for the app to look good knocks that tool off your app list on your 10-year-old computer.

Exponential Learning Curve

While GUI apps are simple to use initially, your speed using the apps remains slow all the time. Sure, you may learn where every button is and be able to open any setting you want quickly, but that speed is nothing compared to one of a command line. With a command line, your speed is slower than a snail at first. However, after some time of using the program, you can do things at a similar speed as a GUI app.

If you daily-drive a terminal program, it takes only a few days for you to become faster at it than using a GUI program. After that, you will be able to understand your most used commands and use aliases to shorten them.

For example, if you view your free space regulary, instead of typing a 50-line command to print your free space, you can just alias that command to 'free-space'. Doing this will make it so that whenever you type 'free-space', it performs the aforementioned 50-line command and displays the output. This will save your more than just a few hours of time.

The Choices Never End!

With terminal apps, you have a plethora of choices. I can almost guarantee that an app with functionality you wish existed does exist in the form of a command line application. There are obscure apps with spectacular functionality which can change your computing experience that you will miss out on if you stay away from the terminal.

Bathe In Possibilities!

When it comes to GUI apps, you have to be honest. They do not have 100% functionality. It is simply implausible to fit every single function in a GUI app. Doing so would result in a lot of code to maintain, an extremely heavy app and a confusing layout. However, with a terminal app, all you have to do is type:

man command

or

command --help

and get the complete functionality of the app, all within less than 5% of the app size of its GUI equivalent.

Skip The Middlemen

All GUI apps are basically middlemen for the command line. They essentially use the command line for you. When you ditch the GUI and go straight for the terminal, you talk directly to the computer in a way in which the computer understands.

First Impressions Matter

When people first look at the terminal, it becomes set in their mind that it is difficult to use and that mentality stays for an extraordinarily long time. Due to this, they never experiment or even open the terminal application. If they run into an issue which requires the use of the terminal to fix, they decide to just live with the issue instead of using the terminal. However, if people use the terminal for a few weeks, they realize that it outpaces almost every other GUI app in almost everything.

Nothing is Perfect...

... including terminal applications. Terminal applications are amazing. They allow me to do so much. However, there are extremely rare cases in which I have no choice but to use a GUI. This is if the GUI application in question requires you to use only their app. There are also some specific use-cases in which GUI apps just make more sense. Video editing, advanced photo manipulation and 3D modelling are great examples.

To Sum It All Up...

...terminal applications should be used as much as possible. They are swift. They can be used quickly and also use less resources and space while running on just about anything. They are not as difficult as they look and can be used for uses which GUI apps do not have. They cannot be used all the time because there are rare exceptions in which GUI applications have to be used. However, these are so little that I do not mind keeping GUI apps just for these use cases.

>>> Reply To Me

Next Post


diff --git a/blog/tfa-guide/index.html b/blog/tfa-guide/index.html index 2d71a3d..56a723d 100644 --- a/blog/tfa-guide/index.html +++ b/blog/tfa-guide/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Blog > Start Using 2FA Properly

Start Using 2FA Properly

Posted on 13 May 2023

Categories: Software && Guides

@@ -39,8 +39,5 @@ diff --git a/definitions/arch-linux/index.html b/definitions/arch-linux/index.html index a07a8ee..1efbe0e 100644 --- a/definitions/arch-linux/index.html +++ b/definitions/arch-linux/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Definitions > Arch Linux

Arch Linux

Categories: Software

@@ -21,9 +21,4 @@
+ diff --git a/definitions/file-extensions/index.html b/definitions/file-extensions/index.html index 368c474..d173f62 100644 --- a/definitions/file-extensions/index.html +++ b/definitions/file-extensions/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Definitions > File Extensions

File Extensions

These are file extensions that I use in my blog posts.

diff --git a/definitions/free-software/index.html b/definitions/free-software/index.html index 578b543..5ee3fb5 100644 --- a/definitions/free-software/index.html +++ b/definitions/free-software/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Definitions > Free Software

Free Software

Categories: Software

@@ -32,8 +32,5 @@ diff --git a/definitions/git/index.html b/definitions/git/index.html index f795aae..16f1dba 100644 --- a/definitions/git/index.html +++ b/definitions/git/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Definitions > Git

Git

Categories: Software

@@ -27,8 +27,4 @@ diff --git a/definitions/hardware/index.html b/definitions/hardware/index.html index 314327b..4027581 100644 --- a/definitions/hardware/index.html +++ b/definitions/hardware/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Definitions > Hardware

Hardware

These definitions all include hardware like laptops and phones.

diff --git a/definitions/index.html b/definitions/index.html index c6ef28b..a8134fb 100644 --- a/definitions/index.html +++ b/definitions/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Definitions

Definitions

Categories:

@@ -47,8 +47,4 @@ diff --git a/definitions/lineageos/index.html b/definitions/lineageos/index.html index 40cb2cf..2601765 100644 --- a/definitions/lineageos/index.html +++ b/definitions/lineageos/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Definitions > LineageOS

LineageOS

Categories: Software

@@ -25,8 +25,5 @@ diff --git a/definitions/linux-distribution/index.html b/definitions/linux-distribution/index.html index d0ec503..a38925d 100644 --- a/definitions/linux-distribution/index.html +++ b/definitions/linux-distribution/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Definitions > Linux Distribution

Linux Distribution

Categories: Software

@@ -40,9 +40,4 @@
+ diff --git a/definitions/linux-phones/index.html b/definitions/linux-phones/index.html index bd23ed8..756856e 100644 --- a/definitions/linux-phones/index.html +++ b/definitions/linux-phones/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Definitions > Linux Phones

Linux Phones

Categories: Hardware

@@ -32,8 +32,5 @@ diff --git a/definitions/malware/index.html b/definitions/malware/index.html index d1ecd4a..d3dced8 100644 --- a/definitions/malware/index.html +++ b/definitions/malware/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Definitions > Malicious Software [malware]

Malicious Software [malware]

Categories: Software

@@ -37,8 +37,4 @@ diff --git a/definitions/non-free/index.html b/definitions/non-free/index.html index 19d3ff1..4a09e5c 100644 --- a/definitions/non-free/index.html +++ b/definitions/non-free/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Definitions > Non-Free Software

Non-Free Software

Categories: Software

@@ -27,8 +27,5 @@ diff --git a/definitions/operating-system/index.html b/definitions/operating-system/index.html index 314ce71..262b563 100644 --- a/definitions/operating-system/index.html +++ b/definitions/operating-system/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Definitions > Operating System

Operating System

Categories: Software

@@ -34,8 +34,5 @@ diff --git a/definitions/pre-built-computers/index.html b/definitions/pre-built-computers/index.html index 6e55bee..394d0ea 100644 --- a/definitions/pre-built-computers/index.html +++ b/definitions/pre-built-computers/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Definitions > Pre-Built Computer

Pre-Built Computer

Categories: Hardware

@@ -29,8 +29,5 @@ diff --git a/definitions/prism/index.html b/definitions/prism/index.html index 1776fc2..39ee7a4 100644 --- a/definitions/prism/index.html +++ b/definitions/prism/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Definitions > PRISM [NSA]

PRISM [NSA]

Categories: Software

@@ -25,8 +25,5 @@ diff --git a/definitions/security-key/index.html b/definitions/security-key/index.html index 9764d79..2726a7b 100644 --- a/definitions/security-key/index.html +++ b/definitions/security-key/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Definitions > Security Key

Security Key

Categories: Hardware

@@ -33,8 +33,5 @@ diff --git a/definitions/self-host/index.html b/definitions/self-host/index.html index 842ac3a..6e1dc0f 100644 --- a/definitions/self-host/index.html +++ b/definitions/self-host/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Definitions > Self-Host

Self-Host

Categories: Software

@@ -26,8 +26,5 @@ diff --git a/definitions/software/index.html b/definitions/software/index.html index c28f9bf..4a7ff83 100644 --- a/definitions/software/index.html +++ b/definitions/software/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Definitions > Software

Software

These definitions are related to software like operating systems.

diff --git a/definitions/thinkpad/index.html b/definitions/thinkpad/index.html index c72ed76..29b86b6 100644 --- a/definitions/thinkpad/index.html +++ b/definitions/thinkpad/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Definitions > ThinkPad

ThinkPad

Categories: Hardware

@@ -26,8 +26,5 @@ diff --git a/definitions/unix-philosophy/index.html b/definitions/unix-philosophy/index.html index d2edfac..e0dc6aa 100644 --- a/definitions/unix-philosophy/index.html +++ b/definitions/unix-philosophy/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Definitions > UNIX Philosophy

UNIX Philosophy

Categories: Software

@@ -27,8 +27,5 @@ diff --git a/images/sufyaan.webp b/images/sufyaan.webp new file mode 100644 index 0000000000000000000000000000000000000000..0cfdc627d5e831f68e40316f980d8705e439ff66 GIT binary patch literal 2552 zcmcgu_g51L5>AN1iIf$kNLN4%!GPdN=nzp%zyP6_fUtz3bcN6qa2F1OfQhgHU8+lw z5(pp==@3u}H9@KpQ6Pe$7^zZn*?adl>@V|X-prf#&CHwm293CJW8(w>;Cvl!>tqYF z{=(O_O#6QYNKQ{T@fw5KAO+|UcJ}TptSNZ5X(TN}>xoHDzJb>l)BaZpyhFKPtMe{T z$V_TA1%D|*=6s9waj*K5Vm~c8%hCEpy@pA>&rr*8tREm_5%s|{PP|rc;{&hRruOz7 z?!t^7oT!SxtFqS@3BY$BM1DJYNTOXOsvtyevnWf0E!9H>EZI)Wd6gy8ABB4(2mVL8 zygc4u!arc9Clv$HvBoix%gqb#v7^f4*B>X4fS_9FgG?Iq$Up_7S?ZQa3$XCeT-={q zk@?t-2vilgbJmCCr&{iIE-DZxP@NMeMmN-b;;KF;}rwHv>wdO8l1hQ ziAD}|&8X0zTRi|DlAw1jRP?+jM)o=!L)(q~KKWPi^%plL6u}YiRY>(nSO32_T{mr- z^Hb4e9t-rbfCkko5I4JLK!Y~to#+B}Dhryep+f+ro!*H~3cQHw|)ZwEa81^SGWZa)577ZgWi~lcH6K_G=LdnhB!N z<=vA+UxTAu17zzOm3&Cp2SQR}w>b6Y&58O=shF!((%SP4Q`oAXoEqt#c_kLQsdmjw zD276ZE`kEQC0jXmZHcj`DD)0iXwi-Qsl~2Zn@@)}k|1TAt9tM3(mXD1$4f=@4#6Fe zHHlna^gE&x0)g`3Q1o^Owg@Orp&v~OjK4h>rN4^?JcI~-O4a?o60xC{j#)d&!42_y z{HS@=b2CxyDdQAD<_AQ|l(qLNTJCBa-HKRW=TyYvV+#y4vkCJdnF7R5wFYf|Nt)o7 zZX+OS?L)d`3JQBUg`M3=#5ElZYor}LZ>+{^6uLv|o9&cH+Zd!ASo_S=sZx;WR~tJH zLsaqWEprYR{E6p7N|H(JOvRW08;kLnj^$Oa^uZ@OiW;^OQmuoVk`?bXqw-c|H#{kH zkIAG?JVt6tY~%9f0!*7IQ~pH_p^~67sTL{UoSnh}$J6+0)B2HlNN)9orVBqCe7v)U zcOP5)1Sz~JEoAqdz(iG9rCp}pH8x|0>PJ0aw;)NTAcELn8_ z5&e(Q5S@mKY^4^DhlXkl@kbRc6BELo22;P&77BDnY$QppzfHckj?d|JFGW)sV_TQL zkG|!`kPb~1(;8W9-QC}x=l+{x`>}9^k!+H-G^-fjVU_Z-IBWJUW~nPhXO2*f7OqyuS*XWhh1 zD8#t$j7$$7)(#Q9x+gWDKiq2#bk!og!()$a^#`zBf_^@QKecu6FZ)X?p9td718v*? z{Q|alIoWlqx`_3r{7Mde8azUVt;abC_sX}V_?24+YLFW2O-}8Cmw#t)vi~kA3j(cm zh)zbfcp{6h7^*d!uM1`{APY9FMg;WNLDZgO$ZvBX4L4nT^fR1E&)#$|7xJ$Wl-;vD zB12o@3Wt3;`K8e?Dh3zeCmcAm4sWn8)6RJ_4fZm>n)~xYR8GPW)^~j~0{dagdxyS=g{U}k^2wo&0n%GD)dO+m{^?QC5nf^X zp>GD>eqcpl!%rJ!y+oSdOK==9b0~ODEG&-|^f6CbJDb{f?6tqLls>=B&U>1wqsAbL z`<-)1+_S04$7c8r7=PZ1C3ay&5&HGQV)vnzPDvnXp$i)x3mY4woNR%luYTocV08xL zRG4zlH2Aup8%d?=t=YE-UrEUTGIy`;5h%k-<7l=d@uGkEnd24)hNV+xY$9G-`l4rM zwSdr(^yb58LhrGHYwhX4^9A`O=TFD8#$N1frk9St1vXlyV(uI_gP3v9pFsh@RLsf= zv(s=6Bh|7ABG_QR<~5*!T_qg&K3Ja(TOhaPB`9OV!Cl8&5uExlb&$XO4GR5_bz%7g z**>VD2_$TR&tcoICxe_t{K_@cM)<_=84W0k)vvF2N*Bgyk&M@1$1>WPPgU#Nne?1f z{`;n4q^+up_~p4}gv9jR@(GELbISz33!Y^d&o7oUhQ=yq>?G8Bv(#((2n=HvnqqT6 zA=bz&_1g`6P7rYsFo8tvU8p;-q(M(BfN=a99_Z0u`=41@2)H!pjET=b_tyOXf9lK? G0Q?uC@;Vs+ literal 0 HcmV?d00001 diff --git a/index.html b/index.html index 3975d31..710cdf9 100644 --- a/index.html +++ b/index.html @@ -1 +1 @@ -(HOMEPAGE) Sufyaan's Webpage

sf@titan [~/sf.cu]$ cat INTRO.md

Greetings, everyone!

My name is Sufyaan and I welcome you to my personal website!

I am a brand designer but my interests are in computing. I love using free (libre) software that follows the UNIX philosophy.

I like to spend my free time tinkering around with my computer and learning about new innovations in both the technology and design industries.

On this website, I post on my blog about a plethora of topics that I am interested in like:

  • Computing
  • GNU/Linux
  • Design
  • Announcements

I do not post regularly. I did not create this website for views or money. I simply post what I enjoy and what I find helpful.

If you would like to contribute to this website, please do so on it's Git repository. Any contribution, no matter how small, is appreciated.

Here are links to useful pages on this website:

  • Blog - View my blog posts on computing, Linux and design.
  • About - View some information about me and find out how to contact me.
  • Portfolio - View my designs and projects.
  • Links - My pages on other websites and sites I like to browse.
  • Definitions - View the definitions of terms that I use in my blog posts.

I hope you find useful and interesting information on this website!


+(HOMEPAGE) Sufyaan's Webpage

sf@titan [~/sf.cu]$ cat INTRO.md

Greetings, everyone!

My name is Sufyaan and I welcome you to my personal website!

I am a brand designer but my interests are in computing. I love using free (libre) software that follows the UNIX philosophy.

I like to spend my free time tinkering around with my computer and learning about new innovations in both the technology and design industries.

On this website, I post on my blog about a plethora of topics that I am interested in like:

  • Computing
  • GNU/Linux
  • Design
  • Announcements

I do not post regularly. I did not create this website for views or money. I simply post what I enjoy and what I find helpful.

If you would like to contribute to this website, please do so on it's Git repository. Any contribution, no matter how small, is appreciated.

Here are links to useful pages on this website:

  • Blog - View my blog posts on computing, Linux and design.
  • About - View some information about me and find out how to contact me.
  • Portfolio - View my designs and projects.
  • Links - My pages on other websites and sites I like to browse.
  • Definitions - View the definitions of terms that I use in my blog posts.

I hope you find useful and interesting information on this website!


diff --git a/links/index.html b/links/index.html index ee4442e..750da4c 100644 --- a/links/index.html +++ b/links/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Links

Links

@@ -38,8 +38,5 @@ diff --git a/portfolio/index.html b/portfolio/index.html index 976abfa..25321ec 100644 --- a/portfolio/index.html +++ b/portfolio/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Portfolio [PLACEHOLDER]

Under Construction!

@@ -20,8 +20,4 @@ diff --git a/sitemap/index.html b/sitemap/index.html index 9a24916..a6d3c9e 100644 --- a/sitemap/index.html +++ b/sitemap/index.html @@ -11,7 +11,7 @@ - +

sf.cu > Site Map

Site Map

@@ -57,6 +57,13 @@
  • Sufyaan's PGP Key
  • Definitions

    +

    Categories

    + +

    Definitions

    • A
    • Arch Linux
    • @@ -88,9 +95,6 @@
      diff --git a/style.css b/style.css index ec94771..7175fe2 100644 --- a/style.css +++ b/style.css @@ -1,2 +1,189 @@ -b,ol,p,ul,figcaption{font-family:jetbrains}body,h1{color:#f8f8f2}figcaption{font-weight:bold;font-size:90%;color:#50fa7b}.posts,h1,h2,h3,ol,p,ul{margin-left:8vw}.nested-list,.posts,h1,ol,ul{margin-top:1vw;margin-bottom:1vw}.responsive,div.desc,footer{text-align:center}@font-face{font-family:jetbrains;font-weight:400;font-display:swap;src:url("fonts/woff2/jetbrains-light-woff2.woff2") format('woff2'),url(fonts/woff/jetbrains-light-woff.woff) format('woff')}@font-face{font-family:jetbrains;font-weight:700;font-display: swap;src:url("fonts/woff2/jetbrains-bold-woff2.woff2") format('woff2'), url(fonts/woff/jetbrains-bold-woff.woff)}body{background:#282b35}p{margin-right:8vw;font-weight:400}img{width:40vw}b{font-weight:700}ol,ul{font-weight:400}code,h1,h2,h3{font-weight:700;font-family:jetbrains}hr{width:87%;color:#6272a4}code{color:#50fa7b;overflow-wrap:break-word}a{color:#8be9fd}footer{padding:3px}h1{font-size:200%}h2{font-size:150%;margin-top:1.5vw;margin-bottom:1.5vw}h3{font-size:110%}i{margin-right:10px}.posts{font-family:jetbrains;list-style-type:none}.code-posts{font-family:jetbrains;color:#6272a4;font-size:80%}.homepage-title{display:block;padding-top:3.25vw;padding-bottom:3vw;margin-left:auto;margin-right:auto;width:30%;max-width:35%;height:7.5%}.footer-text{font-family:jetbrains}.nested-list{margin-left:-2vw;margin-right:3vw}div.gallery{border:1px solid #6272a4}div.gallery:hover{border:1px solid #8be9fd}div.gallery img{width:100%;height:auto}div.desc{padding:15px}*{box-sizing:border-box}.main{margin-left:10vw;margin-right:7vw;width:90vw;margin-bottom:4vw}.responsive{font-family:jetbrains;padding:0 6px;margin:auto;display:block;float:left;width:22%}.clearfix:after{content:"";display:table;clear:both}@media screen and (max-width:600px){.posts,h1,h2,h3,ol,p,ul{margin-left:20px;margin-right:20px;margin-top:30px}hr{width:93%}.posts{font-size:90%;padding:0}.code-posts{font-size:75%}.homepage-title{width:50%;max-width:75%;height:12.5%}.nested-list{margin-left:-6vw;margin-top:4vw;margin-bottom:4vw}.responsive{width:100%;padding-bottom:4vw}div.gallery{border:1px solid #282b35}div.gallery:hover{border:1px solid #8be9fd}.main{width:75vw;margin-top:7vw;padding:8px}}@media screen and (max-width:1150px){img{width:75vw}} - +b,ol,p,ul,figcaption{ + font-family:jetbrains +} +body,h1{ + color:#f8f8f2 +} +figcaption{ + font-weight:bold; + font-size:90%; + color:#50fa7b +} +.posts,h1,h2,h3,ol,p,ul{ + margin-left:8vw +} +.nested-list,.posts,h1,ol,ul{ + margin-top:1vw; + margin-bottom:1vw +} +.responsive,div.desc,footer{ + text-align:center +} +@font-face{ + font-family:jetbrains; + font-weight:400; + font-display:swap; + src:url("fonts/woff2/jetbrains-light-woff2.woff2") format('woff2'),url(fonts/woff/jetbrains-light-woff.woff) format('woff') +} +@font-face{ + font-family:jetbrains; + font-weight:700; + font-display: swap; + src:url("fonts/woff2/jetbrains-bold-woff2.woff2") format('woff2'), url(fonts/woff/jetbrains-bold-woff.woff) +} +body{ + background:#282b35 +} +p{ + margin-right:8vw; + font-weight:400 +} +img{ + width:40vw +} +b{ + font-weight:700 +} +ol,ul{ + font-weight:400 +} +code,h1,h2,h3{ + font-weight:700; + font-family:jetbrains +} +hr{ + width:87%; + color:#6272a4 +} +code{ + color:#50fa7b; + overflow-wrap:break-word +} +a{ + color:#8be9fd +} +footer{ + padding:3px +} +h1{ + font-size:200% +} +h2{ + font-size:150%; + margin-top:1.5vw; + margin-bottom:1.5vw +} +h3{ + font-size:110% +} +i{ + margin-right:10px +} +.posts{ + font-family:jetbrains; + list-style-type:none +} +.code-posts{ + font-family:jetbrains; + color:#6272a4; + font-size:80% +} +.homepage-title{ + display:block; + padding-top:3.25vw; + padding-bottom:3vw; + margin-left:auto; + margin-right:auto; + width:30%; + max-width:35%; + height:7.5% +} +.footer-text{ + font-family:jetbrains +} +.nested-list{ + margin-left:-2vw; + margin-right:3vw +} +div.gallery{ + border:1px solid #6272a4 +} +div.gallery:hover{ + border:1px solid #8be9fd +} +div.gallery img{ + width:100%; + height:auto +} +div.desc{ + padding:15px +} +*{ + box-sizing:border-box +} +.main{ + margin-left:10vw; + margin-right:7vw; + width:90vw; + margin-bottom:4vw +} +.responsive{ + font-family:jetbrains; + padding:0 6px; + margin:auto; + display:block; + float:left; + width:22% +} +.clearfix:after{ + content:""; + display:table; + clear:both +} +@media screen and (max-width:600px){ + .posts,h1,h2,h3,ol,p,ul{ + margin-left:20px; + margin-right:20px; + margin-top:30px + } + hr{ + width:93% + } + .posts{ + font-size:90%; + padding:0 + } + .code-posts{ + font-size:75% + } + .homepage-title{ + width:50%; + max-width:75%; + height:12.5% + } + .nested-list{ + margin-left:-6vw; + margin-top:4vw; + margin-bottom:4vw + } + .responsive{ + width:100%; + padding-bottom:4vw + } + div.gallery{ + border:1px solid #282b35 + } + div.gallery:hover{ + border:1px solid #8be9fd + } + .main{ + width:75vw; + margin-top:7vw; + padding:8px + } +} +@media screen and (max-width:1150px){ + img{ + width:75vw + } +}