From db9555078e7712899f0955aa3438f288ed803d23 Mon Sep 17 00:00:00 2001 From: TitanE Date: Sat, 21 Oct 2023 19:50:26 +0300 Subject: [PATCH] removing icons - phase 2 --- browser/index.html | 12 ++++----- crypto/index.html | 14 +++++------ discord/index.html | 12 ++++----- diy/index.html | 8 +++--- doas/index.html | 16 ++++++------ eid23/index.html | 4 +-- email/index.html | 16 ++++++------ ffmpeg/index.html | 8 +++--- github/index.html | 18 +++++++------- index.html | 60 ++++++++++++--------------------------------- insta/index.html | 4 +-- islam/index.html | 6 ++--- kpst/index.html | 14 +++++------ mnml/index.html | 10 ++++---- pwd/index.html | 12 ++++----- sm/index.html | 18 +++++++------- style.css | 4 ++- terminal/index.html | 6 ++--- tfa/index.html | 12 ++++----- usb/index.html | 6 ++--- 20 files changed, 116 insertions(+), 144 deletions(-) diff --git a/browser/index.html b/browser/index.html index 80b4a69..c0d812d 100644 --- a/browser/index.html +++ b/browser/index.html @@ -16,21 +16,21 @@
-

sf.cu > Blog > My New Browser Setup

-

My New Browser Setup

+

sf.cu > Blog > My New Browser Setup

+

My New Browser Setup

Posted on: 17 March 2023

Reading time: 2 min

-

Category: Software

+

Category: Software

I have a new browser setup on my desktop to increase my privacy and convenience. It is divided into two profiles that perform differently based on what I need to do in the moment.

-

What is it?

+

What is it?

I use Librewolf as my browser. It is a fork of Firefox that is enhanced for privacy without heavily impacting user experience. I divided it into two profiles:

  1. Accounts (instances in which I need to login)
  2. Browsing (general website browsing)

Let me walk through how each profile is setup.

-

Profile Setup

+

Profile Setup

Firstly, let me talk about common settings between both profiles.

Common In Both

On both profiles, I have my settings to optimize my privacy. On Firefox-based browsers, it is very easy to use these settings because most of them have little impact on convenience. I use Brave Search as my search engine and will switch to my own SearX instance when I get a good server. In terms of extensions, I have the 'uBlock Origin' extension installed setup to block JavaScript and remote fonts by default. I have the default lists along with all the others unchecked by default apart from language lists. I block every single domain from Google, Facebook, Microsoft and other websites which are known for tracking. If a website breaks, I whitelist that website in particular.

@@ -80,7 +80,7 @@ -

Conclusion

+

Conclusion

This setup has been serving me extremely well. I will continue using this setup and building on it if any specific need arises.

diff --git a/crypto/index.html b/crypto/index.html index d1ec596..25c91ef 100644 --- a/crypto/index.html +++ b/crypto/index.html @@ -16,19 +16,19 @@
-

sf.cu > Blog > Keep Crypto Off Exchanges

-

Keep Crypto Off Exchanges

+

sf.cu > Blog > Keep Crypto Off Exchanges

+

Keep Crypto Off Exchanges

Posted on: 14 March 2023

Reading time: 3 min -

Category: Software && Technology

+

Category: Software && Technology

In this article, we will discover why it is horrible to keep cryptocurrency on exchanges. If you do not have time to read this article, please stop keeping your cryptocurrencies on exchanges. If you do, your crypto may get stolen or lost. If you are interested in the details, please keep reading.

-

Lack of Ownership

+

Lack of Ownership

When you keep cryptocurrencies on exchanges like Coinbase, they have your private keys. Anyone who has your private keys can manage your wallet as if it is their own. They can send, receive and do whatever they want with your wallet. Even if the exchange you are trading on is trusted, if they shut down, you will lose your crypto. This happened a few times before and thousands of people lost all of their crypto. This is why exchanges should be used for what they are good at; purchasing crypto. Keep exchanges only for one purpose.

-

No Regulation

+

No Regulation

Currently, the whole crypto exchange industry has a severe lack of regulation. The fact that exchanges have your private keys means that they can freeze your account which would cut off your access to your own crypto. Governments can request such freezes. This may seem improbable but it happened in South Korea.

-

Hacking

+

Hacking

Even if the exchange you are trading on is secure, they may store your private keys in plaintext. This happens much more than people think. If this happens, hackers can easily take control of people's wallets and send all the crypto to themselves. If a hack like this happens through Bitcoin, it can at least be tracked. However, many hackers convert their crypto to Monero which cannot be tracked. If this happens, you will never get your money back unless the hacker decides to return the money.

-

Conclusion

+

Conclusion

To sum it up, you should never store your crypto on exchanges because you do not own your own crypto. There is little regulation and your account or the exchange can also be hacked. All of these pose serious risks to your crypto. Just get a wallet like Electrum or Monero and start using it.

>>> Reply To Me

>>> Download PDF

diff --git a/discord/index.html b/discord/index.html index 3e565a7..00e6b4d 100644 --- a/discord/index.html +++ b/discord/index.html @@ -16,19 +16,19 @@
-

sf.cu > Blog > Delete Your Discord

-

Delete Your Discord

+

sf.cu > Blog > Delete Your Discord

+

Delete Your Discord

Posted on: 22 March 2023

Reading time: 3 min

-

Category: Software && Guides

+

Category: Software && Guides

As mentioned in the title, I have deleted my Discord account. This was obviously not without a reason. There are two reasons due to which I deleted my Discord account:

The most prominent reason is privacy but lack of use compelled me to actually take the plunge and delete my Discord account.

-

Privacy

+

Privacy

Introduction

Discord is a hellhole for your privacy. Avoid it at all costs. In this section, I will show you the various things that Discord tracks.

DISCORD'S HISTORY

@@ -91,9 +91,9 @@

ALL IN ALL...

... this is not all that Discord does. If we know that Discord does all of this, there is obviously more that they are doing that we do not know. You should always assume closed-source pieces of software are tracking you and sending your information to a third-party.

-

Lack of Use

+

Lack of Use

I was not using Discord anymore so I deleted it. The reason is that my previous account got banned for botting when I did not do anything. I made a new account, chatted with three or four of my friends. Afterwards, the CounterHawks Discord server got banned. Due to this, I realized there is no use for my account and that there is no reason for me to support Discord.

-

Conclusion

+

Conclusion

I do not use Discord anymore and probably never will. Previously, it was difficult to delete my Discord account but Discord themselves have done all the hard work for me.

>>> Reply To Me

diff --git a/diy/index.html b/diy/index.html index c865d5e..c383f63 100644 --- a/diy/index.html +++ b/diy/index.html @@ -18,16 +18,16 @@
-

sf.cu > Blog > Do It Yourself

-

Do It Yourself

-

Posted on: 19 May 2023

Reading time: 2 min

Category: Software

+

sf.cu > Blog > Do It Yourself

+

Do It Yourself

+

Posted on: 19 May 2023

Reading time: 2 min

Category: Software

With regards to technology, the average person would rather buy a new computer when their WiFi stops working instead of taking it to a repair shop or fixing it themselves. They would rather buy a new smartphone when their screen cracks than repair it. They would also rather buy a device because of its looks and arbitrary specifications than one specific to their use case and their interests. They focus on the marketing of a company and become 'fanboys' of a specific company, buying nothing but their products, stating that the company in question makes the best products in the world. Self-servicing and repairability are not even factors in their decision to buy a device.

As an example, a plethora of technology enthusiasts still buy ThinkPads to this day. When others look at ThinkPads, they think whoever buys them is not making a good decision. They think ThinkPads look ugly. They do not focus on the usability of a device. ThinkPads are used because of their durability, repairability, fast performance, and more. The fact that they are made for businesses means that there is no profit for Lenovo in letting a ThinkPad break early. Instead, they earn money by selling long-lasting and durable devices that last individuals for years on end.

Instead of buying ThinkPads that function amazingly, people go for looks that impress amazingly. A computer is a device designed to perform computation. If you are shelling out a lot of money, you should have a device that performs fast and can be repaired by you.

What I have realized is that you should 'do it yourself' as much as possible. This is why my computer is custom-built. Had I bought a pre-built computer, I would have never known what was inside my computer. This is tedious on smartphones since they are becoming more and more locked down. Linux phones are alternatives but they are not great as of 2023. I hope they become mainstream soon because I want to buy one.

Doing it yourself also helps in terms of software. I used to flash custom ROMs on my old phone and used LineageOS extensively. Now, I use Arch Linux on my computer, which is a Linux distribution that is basically barebones. It has only the packages required to boot up. Everything else is done by you. The advantage of an operating system like this is that you know what runs on your system and there is minimal resource usage. If there is an issue, you can easily find out which program it is from and fix it immediately after gaining knowledge.

-

Conclusion

+

Conclusion

You should try to 'do it yourself'. Take control of your hardware and software and know what you are running. It will not only be cheaper, but it will make it easier to fix issues and learn about computing and technology in the long run.

>>> Reply To Me

>>> Download PDF

diff --git a/doas/index.html b/doas/index.html index e24c69e..d24d7b0 100644 --- a/doas/index.html +++ b/doas/index.html @@ -18,16 +18,16 @@
-

sf.cu > Blog > Use Doas Instead Of Sudo

-

Use Doas Instead Of Sudo

+

sf.cu > Blog > Use Doas Instead Of Sudo

+

Use Doas Instead Of Sudo

Posted on: 20 April 2023

Reading time: 2 min -

Category: Linux && Software && Guides

+

Category: Linux && Software && Guides

Sudo. It is often used by Linux users to perform commands with root privileges instead of being in a root shell all the time. However, there has recently been a vulnerability in sudo due to which people are switching to doas.

-

What is Doas?

+

What is Doas?

OpenDoas or Doas is a portable version of the doas utility that is used on OpenBSD. OpenDoas can be installed on Unix-like system which includes Linux. It is designed to be more minimal and has less configuration options than sudo. If you are on a personal computer, then I highly recommend you switch to doas because it has a much smaller codebase which leaves less room for error.

However, if you are part of a professional environment with many individuals needing to use sudo, I recommend staying with sudo because it offers more configuration options to be used for groups and users.

-

Installing Doas

+

Installing Doas

Doas is available on almost all major distributions. If your distribution is Debian-based (Ubuntu, Linux Mint, Zorin OS), simply type:

sudo apt install doas

If you run an Arch-based system (Artix, Arco, Endeavour, Manjaro), type:

@@ -35,20 +35,20 @@

If you use RHEL-based systems (Fedora, CentOS), type:

sudo dnf install opendoas

Doas should now be installed but it will not work out of the box. There is one line that we need to add to the configuration file.

-

Configuring Doas

+

Configuring Doas

You have to configure doas as it is not included in most distributions by default but do not fret! One of its plus points is that its configuration is much better than sudo's.

To begin, edit the /etc/doas.conf file as root.

If you are the only user on your system and do not plan to allow other users to use your system, this line will suffice.

permit persist username as root

Many distributions have a group (wheel, sudoers) that are allowed to run sudo commands. If you would like to allow that group to send commands as root, type this:

permit persist :wheel as root

-

Using Doas

+

Using Doas

Using doas is incredibly simple. Just type doas instead of sudo. For example, if you usually type:

sudo pacman -Syu

then just type:

doas pacman -Syu

I also recommend aliasing doas to 'doas --' since it causes issues sometimes if you just use doas. Apart from that, this is it for the setup.

-

Conclusion

+

Conclusion

If you are the only person on your Linux machine, you should switch to doas. It is much more lightweight and is similar to sudo. It has a smaller codebase which, in my opinion, prevents exploits from popping up as often as sudo.

However, if you are in a professional environment, you should stick with sudo.

>>> Reply To Me

diff --git a/eid23/index.html b/eid23/index.html index efa5950..c1ad19a 100644 --- a/eid23/index.html +++ b/eid23/index.html @@ -18,8 +18,8 @@
-

sf.cu > Blog > Eid Mubarak!

-

Eid Mubarak!

+

sf.cu > Blog > Eid Mubarak!

+

Eid Mubarak!

Posted on: 21 April 2023

Reading time: Less than 1 min

diff --git a/email/index.html b/email/index.html index 141d8d5..d07d6f7 100644 --- a/email/index.html +++ b/email/index.html @@ -16,14 +16,14 @@


-

sf.cu > Blog > How To Encrypt Emails

-

How To Encrypt Emails

+

sf.cu > Blog > How To Encrypt Emails

+

How To Encrypt Emails

Posted on: 14 March 2023

Reading time: 4 min

-

Category: Software && Guides

+

Category: Software && Guides

In this article, I will show you how to encrypt emails. You can encrypt emails on almost any device. In this article, however, I will be focusing on Gmail, Outlook, Yahoo. I will also be focusing on making ProtonMail encrypt emails with Gmail.

-

Myths

+

Myths

Firstly, let us dispell a few myths. The first myth is a big one.

Gmail's Confidential mode does not encrypt your emails

Yes, you heard that right. Gmail's confidential mode does not encrypt your emails. Whenever I speak about email encryption, I hear something along the lines of:

@@ -32,7 +32,7 @@

ProtonMail does not encrypt emails sent to non-ProtonMail users

This is also a huge myth. ProtonMail encrypts emails sent to other ProtonMail users. However, they do not encrypt emails sent to or received from non-ProtonMail users. It collects less data about you and it stores your emails with encryption on their servers but the email itself is not encrypted on the other person's end.

Encryption for non-ProtonMail users works on a user-to-user basis. You have to have the encryption keys of the other person if they are a non-ProtonMail user and they also have to encrypt their emails manually. We will learn how to do this in this guide.

-

Online Email

+

Online Email

Encrypting your emails online is a simple process.

Step 1: Get the Mailvelope extension

Mailvelope is a free, libre and open-source browser extension which allows you to not only encrypt emails using public keys but also has a keyserver which has a list of other people who use Mailvelope. Emails sent to other people using Mailvelope will automatically be encrypted.

@@ -44,7 +44,7 @@

Step 4: Send encrypted emails!

Whenever you go to compose an email, there will be a button like the image below. Just click on it and there will be a popup to compose your encrypted email. Just fill in the info and send your email!

Mailvelope Icon to send encrypted emails
-

Smartphones

+

Smartphones

Firstly, I would like to give a disclaimer. There is no way to use PGP encryption on iOS. Most encryption that is used on iOS is either paid or unavailable. On Android, you cannot encrypt emails using the native applications for Gmail, Outlook or Yahoo. Even if there is such a feature, you should not use their official clients due to their invasive tracking. To encrypt emails, we will use an email app called K-9 Mail. I believe that everyone should use K-9 Mail even if they are not encrypting their emails. It is a fantastic app.

K-9 Mail is a free and open-source email app that has a lot of features. I believe that no one should be writing emails on their phones but it is a great app to have just to make sure there is nothing urgent in your inbox.

Step 1: Get the app

@@ -58,7 +58,7 @@

Step 5: Setup K-9 Mail

Go back to K-9 Mail, go to settings, go to your account that you added, go to end-to-end encryption and enable it. Select your key. Turn on autocrypt mutual mode. That is it! You should see a lock icon whenever you are sending an email to someone if you have their PGP public key. If you need to import more keys, just go to the OpenKeychain app and import them.

Composing an encrypted email in K-9 Mail
-

Exporting ProtonMail Keys

+

Exporting ProtonMail Keys

To export your ProtonMail public keys, follow these steps.

  1. Login to your ProtonMail account
  2. @@ -69,7 +69,7 @@

    The image below is how it looks like in 2023.

    ProtonMail Key Export Dashboard

    You can now send these keys to anyone to import into their PGP keychain. They will then be able to encrypt emails when sending them to your ProtonMail address!

    -

    Conclusion

    +

    Conclusion

    That is it! You have setup encryption on your emails. This is a great step as email itself is very unsecure, so this will boost your privacy and security by a lot. Sharing passwords through email has never been safe but encryption allows you to do it with a good range of security.

    >>> Reply To Me

    >>> Download PDF

    diff --git a/ffmpeg/index.html b/ffmpeg/index.html index e497628..1de5de4 100644 --- a/ffmpeg/index.html +++ b/ffmpeg/index.html @@ -18,17 +18,17 @@

    sf.cu > Blog > Switching To FFmpeg

    -

    Switching To FFmpeg

    -

    Posted on: 1 June 2023

    Reading time: 2 min

    Category: Software

    +

    Switching To FFmpeg

    +

    Posted on: 1 June 2023

    Reading time: 2 min

    Category: Software

    I just started using FFmpeg... and it is AMAZING! When I mean amazing, I really mean amazing.

    For those of you who do not know what FFmpeg is, it is basically a command-line application that can be installed on all platforms that is basically the Swiss army knife of videos, audio files and images. It merges almost every single codec, encoders and decoders, filters and more in a single application allowing for fast access and modularity.

    FFmpeg is one of those tools which have impacted your life without you realising it. Whenever you watch a movie, show or any piece of edited or converted content, there is an extremely high change that FFmpeg was involved.

    You may say:

    "Bu.. But I use a video editor and online file converters! Those are not FFmpeg!"

    Most file converters and video editors use at least some FFmpeg. Many websites like YouTube and WhatsApp use FFmpeg directly when they need to compress a video.

    -

    Why?

    +

    Why?

    The reason I switched is because of its versatility. You can create a single command to record your screen in lossless quality, save the original file in '.mov', the audio in '.mp3' format in another folder, encode a '.mp4' file, transcode it to be played on Android and trim a specific part of the video and send it to a server that you own.

    FFmpeg is a difficult program to learn but the rewards are worth it. I currently have a command that records my screen, converts the audio in the recording from stereo to mono and finally encode it in H.264 for ultimate compatibility.

    -

    To Close The File...

    +

    To Close The File...

    All in all, you should learn FFmpeg if you do even a little amount of multimedia manipulation. It will help you out immensely.

    >>> Reply To Me

    diff --git a/github/index.html b/github/index.html index 8833a47..943b972 100644 --- a/github/index.html +++ b/github/index.html @@ -17,28 +17,28 @@ ______| |_____| | | | | | | | \_| -

    sf.cu > Blog > Don't Use GitHub

    +

    sf.cu > Blog > Don't Use GitHub

    -

    Don't Use GitHub

    -

    Posted on: 27 May 2023

    Reading time: 3 min

    Category: Software

    +

    Don't Use GitHub

    +

    Posted on: 27 May 2023

    Reading time: 3 min

    Category: Software

    If you are a developer, programmer or a coder who works with open-source software, you must have clicked this post in shock. First off, I would like to state that I am not telling everyone to stop making open-source software. What I am trying to say is that GitHub is one of the worst Git platforms to host your projects. We will cover why in this post.

    -

    Freedom!

    +

    Freedom!

    Simply put, GitHub uses non-free software and non-free JavaScript on their website. It is shockingly ironic that the biggest open-source platform for anyone to use is itself a proprietary piece of software. It is also centralised, for-profit and politically active, which are all completely against free, libre and open-source software. These factors make it similar to SourceForge, which was abandoned by most of its users because of this very reason.

    If everyone stops using GitHub and moves to better alternatives like Codeberg, GitLab or even a self-hosted Git instance, then GitHub will fall. Many people may be seething at me suggesting GitLab, but the truth is that GitLab is still open-source and uses free JavaScript instead of non-free JavaScript on their website. It is certainly not the best option, but it is miles ahead of GitHub.

    Codeberg is entirely free software and it is a great option for most people. It works in a similar way to GitHub so it is trivial for individuals to migrate. SourceHut is also amazing. It is just as good as GitHub and much better for your rights. Self-hosting a Forgejo or Gitea instance is one of the best options as it offers complete independence. Git is the underlying technology which anyone can use. Therefore, everyone should be independent in using it.

    This is the reason I have a website. Everyone should have a website as it gives you independence on the web.

    -

    Embrace, Extend, Extinguish

    +

    Embrace, Extend, Extinguish

    Microsoft's strategy against open-source has always been to embrace, extend and extinguish. They have tried to do it before with Linux when it was being popularized among developers. Now, they are using Copilot to do so, which is an AI tool that can autocomplete code for you. The main issue with it is that they trained it all on open-source code without giving any credit to the original developers. GitHub's Copilot is now being used to help code for-profit and close-source programs.

    Essentially, this results in open-source programs being used to grow close-source programs.

    -

    Copyleft? What's that?

    +

    Copyleft? What's that?

    Microsoft and GitHub's multiple CEOs have kept on speaking negatively about copyleft. This includes GitHub's founder and former CEO. Their OSCON keynote was meant for attacking copyleft and the GPL, trying to discourage the use of free software. Instead, they suggest the MIT license using which many megacorporations exploit people's code without any credit.

    -

    Microsoft Owns It

    +

    Microsoft Owns It

    There are many people who suggest using alternatives to products offered by big corporations and they are mostly right. Big corporations are able to give you free products because they profit off of your data. They are not trying to be kind.

    For example, look at Google. They offer a search engine, documents storage, free email, cloud storage, a video site with billions of videos, a meeting platform and much more. They are not doing this to help people. They are doing this to harvest your data and sell it to the highest bidder.

    Microsoft? Windows, Xbox and GitHub are not tools offered out of their sympathy towards you. All of it is for their own profit, whether it be collecting your data in Windows or preventing distribution of truly free software on GitHub.

    -

    "Don't Do It Yourself!"

    +

    "Don't Do It Yourself!"

    GitHub is perhaps the only Git platform that has no option to self-host. You do not know what is running on their servers and cannot know what is happening with your code.

    -

    Conclusion

    +

    Conclusion

    Please don't use GitHub. Just use alternatives or self-host it. GitHub does have a lot of projects but if you use it, it brings them closer towards extinguishing open-source.

    >>> Reply To Me

    >>> Download PDF

    diff --git a/index.html b/index.html index 628e58c..0ab9a5f 100644 --- a/index.html +++ b/index.html @@ -25,30 +25,19 @@

    Useful Pages

    @@ -56,54 +45,35 @@

    Interesting Stuff

    diff --git a/insta/index.html b/insta/index.html index 0e4409d..72f1a9b 100644 --- a/insta/index.html +++ b/insta/index.html @@ -18,8 +18,8 @@
    -

    sf.cu > Blog > Instagram Deleted!

    -

    Instagram Deleted!

    Posted on: 7 May 2023

    Reading time: Less than 1 min

    Category: Software

    +

    sf.cu > Blog > Instagram Deleted!

    +

    Instagram Deleted!

    Posted on: 7 May 2023

    Reading time: Less than 1 min

    Category: Software

    This post is to inform you that the grace period for the deletion of my public Instagram account has been completed. My Instagram account has been deleted... forever. I highly recommend you do it too. Read this post for more information.

    >>> Reply To Me

    diff --git a/islam/index.html b/islam/index.html index 1565acb..e1b281d 100644 --- a/islam/index.html +++ b/islam/index.html @@ -17,9 +17,9 @@ ______| |_____| | | | | | | | \_| -

    sf.cu > Blog > Open-Source Islam Apps?

    -

    Open-Source Islam Apps?

    -

    Posted on: 2 July 2023

    Reading time: 2 min

    Category: Software

    +

    sf.cu > Blog > Open-Source Islam Apps?

    +

    Open-Source Islam Apps?

    +

    Posted on: 2 July 2023

    Reading time: 3 min

    Category: Software

    I have tried finding open-source and free Islamic apps for a long time and it is tiring to do so. Most of the apps are Quran and prayer time apps which are perfect but we do not have apps for other parts of Islam like hadeeths, duas and even Qibla locating. If I do run across an app, its last update is always more than five years ago which is not ideal. There are two Islamic apps that I use on a daily basis that I absolutely love and will never switch from:

    • QuranApp
    • diff --git a/kpst/index.html b/kpst/index.html index f216efa..39cc644 100644 --- a/kpst/index.html +++ b/kpst/index.html @@ -17,21 +17,21 @@ ______| |_____| | | | | | | | \_| -

      sf.cu > Blog > KeePass + Syncthing

      -

      KeePass + Syncthing

      -

      Posted on: 23 June 2023

      Reading time: 2 min

      Category: Software

      +

      sf.cu > Blog > KeePass + Syncthing

      +

      KeePass + Syncthing

      +

      Posted on: 23 June 2023

      Reading time: 2 min

      Category: Software

      I have decided to switch from a self-hosted Vaultwarden (Bitwarden) instance to using KeePass along with Syncthing to sync it to all my devices. There are numerous reasons why I decided to make this change.

      -

      Security

      +

      Security

      The offline nature of KeePass makes it so that it is nearly impossible to crack. Connecting things to the internet makes it trivial for a script kiddie thousands of kilometers away from you to attempt to crack your passwords. A password manager is a place where all of your passwords are stored. Due to this very reason, I decided to upgrade my security by moving to a reputed piece of software.

      It has a plethora of security features. Firstly, it has the ability to generate passwords of any length. It allows you to choose what characters are allowed. Its generation is so complex and liberating that even foreign characters like Æ, É, or even mathematics symbols and arbitrary symbols that no one would care about can be used. For example, the division sign (÷) or the copyright symbol (©) are included in password generation. Since most hackers try alphanumeric character cracking, KeePass password generation can make your passwords practically impossible to crack.

      The encryption algorithm used for your password database is AES-256, commonly known as 256-bit encryption. It is a form of encryption that is so difficult to crack that the only way you can actually hope to obtain someone's password is by phishing them or using external methods. For more information, please watch this video by 3Blue1Brown. It is extremely interesting.

      In fact, KeePass is so secure that even the passwords that are stored in your memory while you are viewing your database is encrypted. That way, even a management engine attack will not work. If you want to try viewing the cleared memory sectors to find remnants of your passwords, good luck. The passwords which are stored in your memory are first overwritten to the point of unrecoverability before being cleared.

      You can even setup a keyfile (a file you need to use to login), a security key, or both.

      -

      View. The. Code.

      +

      View. The. Code.

      KeePass is open-source under the GPLv2 license, which is the best open-source license for people's freedom. That makes it free software.

      -

      The Encryption Never Stops

      +

      The Encryption Never Stops

      Along with KeePass, I use Syncthing to sync my database. Syncthing also uses cryptographic encryption. This makes it so that anyone who wants to brute-force my database needs access to both my Syncthing password and my KeePass password.

      -

      To Conclude...

      +

      To Conclude...

      I use KeePass along with Syncthing for three reasons.

      1. KeePass is extremely secure. It has industry-standard protection methods and algorithms and its offline nature makes it practically uncrackable.
      2. diff --git a/mnml/index.html b/mnml/index.html index db321f6..3c7b6b0 100644 --- a/mnml/index.html +++ b/mnml/index.html @@ -17,11 +17,11 @@ ______| |_____| | | | | | | | \_| -

        sf.cu > Blog > Keep It Minimal

        -

        Keep It Minimal

        -

        Posted on: 27 June 2023

        Reading time: 3 min

        Category: Software

        +

        sf.cu > Blog > Keep It Minimal

        +

        Keep It Minimal

        +

        Posted on: 27 June 2023

        Reading time: 3 min

        Category: Software

        In technology, you should keep it simple as much as possible. The KISS philosophy and the UNIX philosophy especially must be followed if you want quality software. Most pieces of famous software nowadays do not follow this guideline and it is costing millions of people dearly.

        -

        Why Minimal?

        +

        Why Minimal?

        Simply put, a piece of minimal software:

        1. Is easier to maintain
        2. @@ -36,7 +36,7 @@

          Minimal software can be extensible as per the UNIX philosophy. Instead of creating a massive program that tries to do everything, minimalist programs create modules for certain functions. This makes troubleshooting a piece of cake as the initial confusion of finding out what exactly causes the error is practically eliminated. For example, if you are making a login page and the authentication does not work, you know that you should look in the authentication module. However, if you make it all in a single program, it is difficult to root out whether an issue is due to an incorrect variable type or a redundant function.

          All of this helps developers to avoid complications. No team wants another error or speed complaint in the middle of another issue. All of the advantages listed thus far help developers have peace of mind.

          Finally, minimal pieces of software can be liberated and made into free software to contribute to the world. Once the initial stages of bug-fixing and optimization is over, it is just a matter of letting the world find ways to make the program better. An inefficiency that no one would spot otherwise can be ironed out by a top-tier programmer who worked in a plethora of huge companies with decades of experience. It also helps budding developers learn about development.

          -

          Closing The Program

          +

          Closing The Program

          To sum it up, everyone should use and develop minimal software if possible. This is because minimal software is easier to maintain, debug and optimize due to its smaller codebase. It also runs fast on all devices and avoids complications during development time. Minimal software can also be liberated into free software which will allow talented developers to review the program and contribute to the world.

          >>> Reply To Me

          >>> Download PDF

          diff --git a/pwd/index.html b/pwd/index.html index 4760f86..02b9046 100644 --- a/pwd/index.html +++ b/pwd/index.html @@ -18,14 +18,14 @@
          -

          sf.cu > Blog > Password Systems

          -

          Password Systems

          +

          sf.cu > Blog > Password Systems

          +

          Password Systems

          Posted on: 2 May 2023

          Reading time: 4 min

          -

          Category: Software && Guides

          +

          Category: Software && Guides

          If you find it difficult to maintain strong passwords, then this guide is the only article you need to refer to. In this article, I will talk about an amazing trick to remember and manage all of your passwords.

          -

          Introduction

          +

          Introduction

          It goes without saying that passwords are incredibly important. It is undeniably important to make sure your passwords are:

          • Strong
          • @@ -37,7 +37,7 @@

            The most common response I hear from people when I ask them to create a password system is:

            "I think using the same password on all accounts is better because I don't have a good memory to use a password system."

            That response always baffles me. The whole point of a password system is not to remember your passwords but to remember a ruleset that will be cemented into your brain after 3 or 4 times of entering your passwords.

            -

            How to Create a Password System

            +

            How to Create a Password System

            As aforementioned, a password system is a set of rules that you need to remember instead of all of your passwords separately. An effective password system consists of the following elements:

            • Master Password
            • @@ -82,7 +82,7 @@

              The password above is 33 characters, yes 33 characters long. No one will be able to guess it and it will take hundreds of centuries to crack. Best of all, it is different for each account.

              You can mix the order up. Just make sure you don't keep changing the system and use one system. The best part is that if you need to change your passwords, you can just make another system that will work just as well. By that point, the previous system will be embedded into your brain. So, you can remember multiple strong passwords using this step.

              Please note that this is not enough. If you have followed this guide, you have taken a massive step towards protecting your accounts. However, many cybercriminals rely on phishing attacks. Please do not click on random links and please do not enter your information on random websites.

              -

              Conclusion

              +

              Conclusion

              Congratulations! You now know how to create an extremely strong password that is different on each account.

              >>> Reply To Me

              diff --git a/sm/index.html b/sm/index.html index 0ccdfbc..152dd99 100644 --- a/sm/index.html +++ b/sm/index.html @@ -18,15 +18,15 @@
              -

              sf.cu > Blog > Stop Using Social Media

              -

              Stop Using Social Media

              +

              sf.cu > Blog > Stop Using Social Media

              +

              Stop Using Social Media

              Posted on: 20 April 2023

              Reading time: 9 min

              -

              Category: Software && Guides

              +

              Category: Software && Guides

              Table Of Contents

                -
              1. Cons Of Social Media
              2. +
              3. Cons Of Social Media
              4. -
              5. Getting Rid Of It
              6. +
              7. Getting Rid Of It
              8. -
              9. Conclusion
              10. +
              11. Conclusion

              I know how you felt reading the title. If you are a heavy social media user, you probably said:

              "What? Who in their right mind would delete their social media accounts? How are they supposed to live life and talk to their friends?"

              Don't worry. That was me last year. I understand your feelings. However, the disadvantages of social media and the perks of deleting it far outweigh its benefits. In this post, I will go over the reasons why you should delete all of your social media.

              -

              Cons of Social Media

              +

              Cons of Social Media

              Time-Consuming

              A study counted 5 billion internet users and it was concluded that, on average, an internet user spends 6 hours and 53 minutes online per day. 6. HOURS. AND. 53. MINUTES. That is almost a whole third of people's daily lives. Another study concluded that people spend more time on social media in their whole lifetime than grooming, socialising (social media !=socialising) and doing the laundry combined.

              It is not as if any of the time spent is valuable. Sure, you may learn one or two 'fun facts, which will make you think that you need social media. You may talk with your friends a lot, which will make you think that your account is required to socialise with people. However, these are all nonsensical excuses that your brain makes to justify getting cheap dopamine. Imagine how much work you can get done, how many actual connections you can make with people, and how many good habits can be formed that will make you happier in the long term than social media.

              @@ -97,7 +97,7 @@

              Many individuals who use social media are experiencing these problems, which are usually experienced by older people, at ages like 25.

              Horrible Productivity

              When you are working and are in the zone (a phase in which you do high-quality work without even thinking about it), any minor disturbance will move you out of that state. A notification about someone liking your post can shake you out of the zone. In the long-term, this will waste hours of your time.

              -

              Getting Rid of It

              +

              Getting Rid of It

              So, you are ready. You want to quit social media and break this horrible addiction. You realise the effects it has on your life. However, you do not know where to start. If this is the case, check out 'The AIR Method'. If you would like to read how I did it, please refer to the steps below. Referring to the steps I took may help you understand your weak points and how to combat them.

              1. Alternative Contact Details

              Make a list of all of your friends and cross out the ones that you know can be reached on other chat applications. Ask the rest for alternative contact methods. This may be through apps like Signal, Session, XMPP, Matrix, or WhatsApp. Just make sure that it is not another social media app.

              @@ -120,7 +120,7 @@
            • Immediately delete all records of the password and restart your device to clear it from your clipboard

        These steps were drastic but they practically cemented the fact that my account was going to be deleted, no matter what.

        -

        Conclusion

        +

        Conclusion

        There is not much left to say. I am much, much happier without social media. I have more time on my hands and I am still getting the information I want from RSS feeds without an algorithm trying to pull me in. Big corporations have much less data about me, I have a lot of time and have produced a lot of work. In terms of academics, my overall percentage in school has increased by over 20%. I find difficult subjects easier and easy subjects a piece of cake.

        All in all, if you care about yourself, delete your social media. It is a hellhole that is getting worse by the day.

        >>> Reply To Me

        diff --git a/style.css b/style.css index 7e7f403..c63a0e0 100644 --- a/style.css +++ b/style.css @@ -68,6 +68,7 @@ svg.titles { .pane{ padding-left: 1vw; margin-right: 5px; + list-style-type: none; } .nested-list,.posts,h1,ol,ul{ margin-top:1vw; @@ -102,7 +103,8 @@ hr{ } code{ color:#50fa7b; - overflow-wrap:break-word + overflow-wrap:break-word; + font-size: 140%; } a{ color:#8be9fd diff --git a/terminal/index.html b/terminal/index.html index 923867d..6214e7d 100644 --- a/terminal/index.html +++ b/terminal/index.html @@ -17,9 +17,9 @@

        sf.cu > Blog > Why I Use Terminal Apps

        -

        Why I Use Terminal Apps

        -

        Category: Posted on: 13 March 2023

        -

        Category: Reading time: 5 min +

        Why I Use Terminal Apps

        +

        Posted on: 13 March 2023

        +

        Reading time: 5 min

        Category: Linux && Software

        “Ah, yes. Graphical-user interface (GUI) apps. They are so comfortable and easy to use. You just click some buttons and get your computer to do what you want.”

        That was what I thought before I learned how spectacular terminal applications are. I do not use a calendar or email GUI app. I use its terminal equivalent. Specifically, I use Calcurse for my calendar/todo, neomutt for my email, sxiv for my image viewing, mpv for my video playing and even Joplin (CLI) for my notes. I am still actively looking for more apps like terminal file managers (lf, ranger, mc) and terminal versions of GUI apps I use (Bitwarden?). What compelled me to switch?

        diff --git a/tfa/index.html b/tfa/index.html index c134e31..79c23e4 100644 --- a/tfa/index.html +++ b/tfa/index.html @@ -18,25 +18,25 @@
        -

        sf.cu > Blog > Start Using 2FA Properly

        -

        Start Using 2FA Properly

        Posted on: 13 May 2023

        Reading time: 3 min

        Category: Software && Guides

        +

        sf.cu > Blog > Start Using 2FA Properly

        +

        Start Using 2FA Properly

        Posted on: 13 May 2023

        Reading time: 3 min

        Category: Software && Guides

        If you use any online account, you should use 2FA keys. It does not matter if it is your Google account that has all of your personal information or if it is some random account you use once in a while. You should at least have 2FA enabled in an authenticator app or preferably a 2FA key. Do not use SMS.

        Why buy a 2FA key when you can use 2FA codes or SMS for free? Let us start with SMS.

        -

        SMS

        +

        SMS

        SMS is inherently insecure. It is not encrypted, and your SIM card is always susceptible to SIM swap attacks. A SIM swap attack is a type of identity theft where a cybercriminal pretends to be you and asks for your number to be switched to a SIM card in their possession. They do this by claiming that their phone was lost or stolen. Most employees working for mobile networks speak with hundreds of people a day. They cannot differentiate people's voices. Even with a small amount of voice modulation, almost anyone can trick them into thinking it's you.

        After gaining possession of your SIM card, the cybercriminal goes to your online accounts and tries to reset your passwords. If they already have your passwords, they may try to login using your phone number and the 2FA code received through SMS. This may seem rare, and it may also seem like it does not work on most people. However, in 2019, Jack Dorsey's (the former CEO of Twitter) account got hacked using this exact method.

        As commonly said by many privacy and security professionals, you are only as secure as your weakest link. Make sure your weakest link is not SMS. -

        Authenticator Apps

        +

        Authenticator Apps

        An authenticator app is much better than SMS-based 2FA. This is because authenticator apps usually follow the TOTP or HOTP standard, which is very secure. It basically uses a secret key along with the current time to create a unique code that changes every thirty seconds.

        One thing that you should absolutely not do is use Google Authenticator, Microsoft Authenticator, Authy or anything as such. This is because the clients are close-sourced, which means that the code is not public. This means that they could be doing anything with your 2FA secret keys. Authy syncs your codes which is convenient but it does not allow you to export your keys, just like other properietary authentication apps. This is unethical as you should have complete control over what is required to access your own accounts. If your Authy account gets disabled, you will no longer be able to log in to most accounts. A much better alternative is:

        You should also be taking frequent encrypted backups of not only your 2FA codes, but all data that is important to you. Read this post to learn how to take encrypted backups properly. Remember, you should keep your backups as far away from other people's hands as possible. If they have your secret keys, they have your 2FA codes.

        -

        Security Keys

        +

        Security Keys

        Security keys are the best form of two-factor authentication. They are physical keys which need to be plugged in to your computer or smartphone in order to be used. They use NFC, USB-C, USB-A and also the Lightning port. This 2FA method makes it so that it does not matter which person gets your credentials because they need access to your key physically in order to login. One drawback of this method is that, if you lose your key, you cannot login to your accounts. This is why people buy 2 or 3 as a backup. It should be noted that, although other methods can be used alongside security keys, it is not recommended as it is still possible to just use the other insecure methods for a cybercriminal and bypass your security key.

        I recommend Yubico and NitroKey security keys.

        -

        Conclusion

        +

        Conclusion

        If there is one thing you take away from this post, it is to make 2FA your baseline security protocol. Use 2FA for every account that has it. Do not use SMS, use authenticator apps. If possible, spend money on three security keys.

        >>> Reply To Me

        >>> Download PDF

        diff --git a/usb/index.html b/usb/index.html index 5ecabaa..69d35ea 100644 --- a/usb/index.html +++ b/usb/index.html @@ -18,12 +18,12 @@
        -

        sf.cu > Blog > Buy Only Metal USBs

        -

        Buy Only Metal USBs

        +

        sf.cu > Blog > Buy Only Metal USBs

        +

        Buy Only Metal USBs

        Posted on: 6 May 2023

        Reading time: 2 min

        -

        Category: Technology +

        Category: Technology

        You should only buy metal USBs because they last longer. Metal USBs should be used for everything that a USB is used for. First, let me clarify what USBs are supposed to be used for:

        • Data Transfer