Changing link of terminal apps post and backups post

main
TitanElectrons 1 year ago
parent 02792e4ddf
commit 2c1e8315d6

@ -25,7 +25,7 @@
<p>I use Linux-based <a href="../definitions/operating-system" style="color:#50fa7b">operating systems</a>. I have been doing so since 2021. As of 2023, I use <a href="../definitions/arch-linux" style="color:#50fa7b">Arch Linux</a> as I love its lightweight and do-it-yourself nature. The AUR is also incredibly useful. For my text editor, I use <a href="https://neovim.io/">Neovim</a> because I love the plugins that can be used along with it.</p> <p>I use Linux-based <a href="../definitions/operating-system" style="color:#50fa7b">operating systems</a>. I have been doing so since 2021. As of 2023, I use <a href="../definitions/arch-linux" style="color:#50fa7b">Arch Linux</a> as I love its lightweight and do-it-yourself nature. The AUR is also incredibly useful. For my text editor, I use <a href="https://neovim.io/">Neovim</a> because I love the plugins that can be used along with it.</p>
<p>In terms of programming languages, I know Python really well but I am branching off to learning C and shell scripting due to the advantages of each one. C is much faster and teaches you more about how a computer thinks as compared to the easy-going nature of Python. <a style="color:#bd93f9" href="../ta">I also use terminal applications</a> which means that I use the terminal a lot. My preferred terminal emulator of choice is <a href="https://alacritty.org/">Alacritty</a>. This means that a lot of the manual work that I do in the terminal can easily be automated using shell scripting.</p> <p>In terms of programming languages, I know Python really well but I am branching off to learning C and shell scripting due to the advantages of each one. C is much faster and teaches you more about how a computer thinks as compared to the easy-going nature of Python. <a style="color:#bd93f9" href="../terminal">I also use terminal applications</a> which means that I use the terminal a lot. My preferred terminal emulator of choice is <a href="https://alacritty.org/">Alacritty</a>. This means that a lot of the manual work that I do in the terminal can easily be automated using shell scripting.</p>
<p>I use Librewolf with two profiles (<a style="color:#bd93f9" href="../browser/">more details here</a>). One of the profiles is optimised for browsing only and has strong tracking protection and runs in permanent private browsing mode. The other profile is used for accounts and has less tracking protection to prevent site breakage when logging in.</p> <p>I use Librewolf with two profiles (<a style="color:#bd93f9" href="../browser/">more details here</a>). One of the profiles is optimised for browsing only and has strong tracking protection and runs in permanent private browsing mode. The other profile is used for accounts and has less tracking protection to prevent site breakage when logging in.</p>

@ -21,5 +21,5 @@
<li><code class="code-posts">17/03/23</code> - <a style="color:#bd93f9" href="../browser"><i class="fa fa-firefox" aria-hidden="true"></i>My New Browser Setup</a></li> <li><code class="code-posts">17/03/23</code> - <a style="color:#bd93f9" href="../browser"><i class="fa fa-firefox" aria-hidden="true"></i>My New Browser Setup</a></li>
<li><code class="code-posts">14/03/23</code> - <a style="color:#bd93f9" href="../email"><i class="fa fa-lock" aria-hidden="true"></i>How To Encrypt Emails</a></li> <li><code class="code-posts">14/03/23</code> - <a style="color:#bd93f9" href="../email"><i class="fa fa-lock" aria-hidden="true"></i>How To Encrypt Emails</a></li>
<li><code class="code-posts">14/03/23</code> - <a style="color:#bd93f9" href="../crypto"><i class="fa fa-btc" aria-hidden="true"></i>Keep Crypto Off Exchanges</a></li> <li><code class="code-posts">14/03/23</code> - <a style="color:#bd93f9" href="../crypto"><i class="fa fa-btc" aria-hidden="true"></i>Keep Crypto Off Exchanges</a></li>
<li><code class="code-posts">13/03/23</code> - <a style="color:#bd93f9" href="../ta"><i class="fa fa-terminal" aria-hidden="true"></i>Why I Use Terminal Apps</a></li></ul> <li><code class="code-posts">13/03/23</code> - <a style="color:#bd93f9" href="../terminal"><i class="fa fa-terminal" aria-hidden="true"></i>Why I Use Terminal Apps</a></li></ul>
<p class="homepage-body">You have hit rock bottom!</p><hr/><footer><p class="footer-text"><a style="color:#bd93f9" href="../.">blog</a> - <a style="color:#ffb86c" href="../about">about</a> - <a style="color:#f1fa8c" href="../portfolio">portfolio</a> - <a style="color:#ff5555" href="../links">links</a></p><p class="footer-text" style="font-size:80%"><a href="../">sufyaan.cyou</a></p><p class="footer-text" style="font-size:65%"><a style="color:#aaaaaa" href="../sitemap">Site Map</a></p></footer> <p class="homepage-body">You have hit rock bottom!</p><hr/><footer><p class="footer-text"><a style="color:#bd93f9" href="../.">blog</a> - <a style="color:#ffb86c" href="../about">about</a> - <a style="color:#f1fa8c" href="../portfolio">portfolio</a> - <a style="color:#ff5555" href="../links">links</a></p><p class="footer-text" style="font-size:80%"><a href="../">sufyaan.cyou</a></p><p class="footer-text" style="font-size:65%"><a style="color:#aaaaaa" href="../sitemap">Site Map</a></p></footer>

@ -2,5 +2,5 @@
<h1 class="homepage-heading"><i class="fa fa-terminal" aria-hidden="true"></i></a>Linux</h1><p class="homepage-body">In this category, I post about tools and information related to Linux.</p><ul class="posts"> <h1 class="homepage-heading"><i class="fa fa-terminal" aria-hidden="true"></i></a>Linux</h1><p class="homepage-body">In this category, I post about tools and information related to Linux.</p><ul class="posts">
<li><code class="code-posts">26/07/23</code> - <a style="color:#bd93f9" href="../../vimwiki/"><i class="fa fa-sticky-note" aria-hidden="true"></i>VimWiki Is Terrific</a></li> <li><code class="code-posts">26/07/23</code> - <a style="color:#bd93f9" href="../../vimwiki/"><i class="fa fa-sticky-note" aria-hidden="true"></i>VimWiki Is Terrific</a></li>
<li><code class="code-posts">20/04/23</code> - <a style="color:#bd93f9" href="../../doas"><i class="fa fa-key" aria-hidden="true"></i>Use Doas Instead Of Sudo</a></li> <li><code class="code-posts">20/04/23</code> - <a style="color:#bd93f9" href="../../doas"><i class="fa fa-key" aria-hidden="true"></i>Use Doas Instead Of Sudo</a></li>
<li><code class="code-posts">13/03/23</code> - <a style="color:#bd93f9" href="../../ta"><i class="fa fa-terminal" aria-hidden="true"></i>Why I Use Terminal Apps</a></li></ul> <li><code class="code-posts">13/03/23</code> - <a style="color:#bd93f9" href="../../terminal"><i class="fa fa-terminal" aria-hidden="true"></i>Why I Use Terminal Apps</a></li></ul>
<p class="homepage-body">You reached the bottom of your screen!</p><hr/><footer><p class="footer-text"><a style="color:#bd93f9" href="../../../">blog</a> - <a style="color:#ffb86c" href="../../about">about</a> - <a style="color:#f1fa8c" href="../../portfolio">portfolio</a> - <a style="color:#ff5555" href="../../links">links</a></p><p class="footer-text" style="font-size:80%"><a href="../../">sufyaan.cyou</a></p><p class="footer-text" style="font-size:65%"><a style="color:#aaaaaa" href="../../sitemap">Site Map</a></p></footer> <p class="homepage-body">You reached the bottom of your screen!</p><hr/><footer><p class="footer-text"><a style="color:#bd93f9" href="../../../">blog</a> - <a style="color:#ffb86c" href="../../about">about</a> - <a style="color:#f1fa8c" href="../../portfolio">portfolio</a> - <a style="color:#ff5555" href="../../links">links</a></p><p class="footer-text" style="font-size:80%"><a href="../../">sufyaan.cyou</a></p><p class="footer-text" style="font-size:65%"><a style="color:#aaaaaa" href="../../sitemap">Site Map</a></p></footer>

@ -17,5 +17,5 @@
<li><code class="code-posts">17/03/23</code> - <a style="color:#bd93f9" href="../../browser"><i class="fa fa-firefox" aria-hidden="true"></i>My New Browser Setup</a></li> <li><code class="code-posts">17/03/23</code> - <a style="color:#bd93f9" href="../../browser"><i class="fa fa-firefox" aria-hidden="true"></i>My New Browser Setup</a></li>
<li><code class="code-posts">14/03/23</code> - <a style="color:#bd93f9" href="../../email"><i class="fa fa-lock" aria-hidden="true"></i>How To Encrypt Emails</a></li> <li><code class="code-posts">14/03/23</code> - <a style="color:#bd93f9" href="../../email"><i class="fa fa-lock" aria-hidden="true"></i>How To Encrypt Emails</a></li>
<li><code class="code-posts">14/03/23</code> - <a style="color:#bd93f9" href="../../crypto"><i class="fa fa-btc" aria-hidden="true"></i>Keep Crypto Off Exchanges</a></li> <li><code class="code-posts">14/03/23</code> - <a style="color:#bd93f9" href="../../crypto"><i class="fa fa-btc" aria-hidden="true"></i>Keep Crypto Off Exchanges</a></li>
<li><code class="code-posts">13/03/23</code> - <a style="color:#bd93f9" href="../../ta"><i class="fa fa-terminal" aria-hidden="true"></i>Why I Use Terminal Apps</a></li></ul> <li><code class="code-posts">13/03/23</code> - <a style="color:#bd93f9" href="../../terminal"><i class="fa fa-terminal" aria-hidden="true"></i>Why I Use Terminal Apps</a></li></ul>
<p class="homepage-body">ERROR: Cannot show more posts (EOFError)</p><hr/><footer><p class="footer-text"><a style="color:#bd93f9" href="../../">blog</a> - <a style="color:#ffb86c" href="../../about">about</a> - <a style="color:#f1fa8c" href="../../portfolio">portfolio</a> - <a style="color:#ff5555" href="../../links">links</a></p><p class="footer-text" style="font-size:80%"><a href="../../">sufyaan.cyou</a></p><p class="footer-text" style="font-size:65%"><a style="color:#aaaaaa" href="../../sitemap">Site Map</a></p></footer> <p class="homepage-body">ERROR: Cannot show more posts (EOFError)</p><hr/><footer><p class="footer-text"><a style="color:#bd93f9" href="../../">blog</a> - <a style="color:#ffb86c" href="../../about">about</a> - <a style="color:#f1fa8c" href="../../portfolio">portfolio</a> - <a style="color:#ff5555" href="../../links">links</a></p><p class="footer-text" style="font-size:80%"><a href="../../">sufyaan.cyou</a></p><p class="footer-text" style="font-size:65%"><a style="color:#aaaaaa" href="../../sitemap">Site Map</a></p></footer>

@ -57,7 +57,7 @@
<li><a style="color:#bd93f9" href="../browser/">My New Browser Setup</a></li> <li><a style="color:#bd93f9" href="../browser/">My New Browser Setup</a></li>
<li><a style="color:#bd93f9" href="../email/">How To Encrypt Emails</a></li> <li><a style="color:#bd93f9" href="../email/">How To Encrypt Emails</a></li>
<li><a style="color:#bd93f9" href="../crypto/">Keep Crypto Off Exchanges</a></li> <li><a style="color:#bd93f9" href="../crypto/">Keep Crypto Off Exchanges</a></li>
<li><a style="color:#bd93f9" href="../ta">Why I Use Terminal Apps</a></li> <li><a style="color:#bd93f9" href="../terminal/">Why I Use Terminal Apps</a></li>
</ul> </ul>
<h2><a style="color:#ffb86c" href="../about/">About</a></h2> <h2><a style="color:#ffb86c" href="../about/">About</a></h2>
<ul class="posts" style="color:#ffb86c"> <ul class="posts" style="color:#ffb86c">

@ -27,7 +27,7 @@
<p>An authenticator app is much better than SMS-based 2FA. This is because authenticator apps usually follow the TOTP or HOTP standard, which is very secure. It basically uses a secret key along with the current time to create a unique code that changes every thirty seconds.</p> <p>An authenticator app is much better than SMS-based 2FA. This is because authenticator apps usually follow the TOTP or HOTP standard, which is very secure. It basically uses a secret key along with the current time to create a unique code that changes every thirty seconds.</p>
<p>One thing that you should absolutely not do is use Google Authenticator, Microsoft Authenticator, Authy or anything as such. This is because the clients are close-sourced, which means that the code is not public. This means that they could be doing anything with your 2FA secret keys. Authy syncs your codes which is convenient but it does not allow you to export your keys, just like other properietary authentication apps. This is unethical as you should have complete control over what is required to access your own accounts. If your Authy account gets disabled, you will no longer be able to log in to most accounts. A much better alternative is:</p> <p>One thing that you should absolutely not do is use Google Authenticator, Microsoft Authenticator, Authy or anything as such. This is because the clients are close-sourced, which means that the code is not public. This means that they could be doing anything with your 2FA secret keys. Authy syncs your codes which is convenient but it does not allow you to export your keys, just like other properietary authentication apps. This is unethical as you should have complete control over what is required to access your own accounts. If your Authy account gets disabled, you will no longer be able to log in to most accounts. A much better alternative is:</p>
<ul><li><a href="https://getaegis.app/">Aegis</a> (Android)</li><li><a href="https://raivo-otp.com/">Raivo</a> (iOS)</li><li><a href="https://www.tofuauth.com/">Tofu</a> (iOS)</li><li><a href="https://www.passwordstore.org/">password store</a> with <a href="https://github.com/tadfisher/pass-otp">pass-otp</a> (UNIX-based systems)</a></li><li><a href="https://keepass.info/download.html">Keepass Password Manager</a> (Linux/Windows/MacOS/Android/iOS)</a></li></ul> <ul><li><a href="https://getaegis.app/">Aegis</a> (Android)</li><li><a href="https://raivo-otp.com/">Raivo</a> (iOS)</li><li><a href="https://www.tofuauth.com/">Tofu</a> (iOS)</li><li><a href="https://www.passwordstore.org/">password store</a> with <a href="https://github.com/tadfisher/pass-otp">pass-otp</a> (UNIX-based systems)</a></li><li><a href="https://keepass.info/download.html">Keepass Password Manager</a> (Linux/Windows/MacOS/Android/iOS)</a></li></ul>
<p>You should also be taking frequent <strong>encrypted backups</strong> of not only your 2FA codes, but all data that is important to you. Read <a style="color:#bd93f9" href="../bk/">this post</a> to learn how to take encrypted backups properly. Remember, you should keep your backups as far away from other people's hands as possible. If they have your secret keys, they have your 2FA codes.</p> <p>You should also be taking frequent <strong>encrypted backups</strong> of not only your 2FA codes, but all data that is important to you. Read <a style="color:#bd93f9" href="../backups/">this post</a> to learn how to take encrypted backups properly. Remember, you should keep your backups as far away from other people's hands as possible. If they have your secret keys, they have your 2FA codes.</p>
<h2><i class="fa fa-key" aria-hidden="true"></i>Security Keys</h2> <h2><i class="fa fa-key" aria-hidden="true"></i>Security Keys</h2>
<p>Security keys are the best form of two-factor authentication. They are physical keys which need to be plugged in to your computer or smartphone in order to be used. They use NFC, USB-C, USB-A and also the Lightning port. This 2FA method makes it so that it does not matter which person gets your credentials because they need access to your key physically in order to login. One drawback of this method is that, if you lose your key, you cannot login to your accounts. This is why people buy 2 or 3 as a backup. It should be noted that, although other methods can be used alongside <a style="color:#50fa7b" href="../definitions/security-key">security keys</a>, it is not recommended as it is still possible to just use the other insecure methods for a cybercriminal and bypass your <a style="color:#50fa7b" href="../definitions/security-key">security key</a>.</p> <p>Security keys are the best form of two-factor authentication. They are physical keys which need to be plugged in to your computer or smartphone in order to be used. They use NFC, USB-C, USB-A and also the Lightning port. This 2FA method makes it so that it does not matter which person gets your credentials because they need access to your key physically in order to login. One drawback of this method is that, if you lose your key, you cannot login to your accounts. This is why people buy 2 or 3 as a backup. It should be noted that, although other methods can be used alongside <a style="color:#50fa7b" href="../definitions/security-key">security keys</a>, it is not recommended as it is still possible to just use the other insecure methods for a cybercriminal and bypass your <a style="color:#50fa7b" href="../definitions/security-key">security key</a>.</p>
<p>I recommend <a href="https://www.yubico.com/">Yubico</a> and <a href="https://shop.nitrokey.com/shop/product/nkfi2-nitrokey-fido2-55">NitroKey</a> <a style="color:#50fa7b" href="../definitions/security-key">security keys</a>.</p> <p>I recommend <a href="https://www.yubico.com/">Yubico</a> and <a href="https://shop.nitrokey.com/shop/product/nkfi2-nitrokey-fido2-55">NitroKey</a> <a style="color:#50fa7b" href="../definitions/security-key">security keys</a>.</p>

Loading…
Cancel
Save