removing icons - phase 2

main
TitanE 1 year ago
parent 7601aa8d60
commit db9555078e

@ -16,21 +16,21 @@
</pre> </pre>
</a> </a>
<hr/> <hr/>
<p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href="."><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M12.001 2c5.523 0 10 4.477 10 10s-4.477 10-10 10s-10-4.477-10-10c0-1.463.314-2.854.88-4.106c.466-.939 1.233-1.874 1.85-2.194c-.653 1.283-.973 2.54-1.04 3.383c.454-1.5 1.315-2.757 2.52-3.644c2.066-1.519 4.848-1.587 5.956-.62c-2.056.707-4.296 3.548-3.803 6.876c.08.55.245 1.083.489 1.582c-.384-1.01-.418-2.433.202-3.358c.692-1.03 1.678-1.248 2.206-1.136c-.208-.044-.668.836-.736.991a2.97 2.97 0 0 0-.251 1.25a3.394 3.394 0 0 0 1.03 2.38c1.922 1.871 5.023 1.135 6.411-1.002c.954-1.471 1.07-3.968-.154-5.952a6.916 6.916 0 0 0-1.084-1.32c-1.85-1.766-4.48-2.57-6.982-2.205c-1.106.177-2.047.496-2.824.956C7.756 2.798 9.912 2 12 2Z"/></svg>My New Browser Setup</a></p> <p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href=".">My New Browser Setup</a></p>
<h1><svg class="titles" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M12.001 2c5.523 0 10 4.477 10 10s-4.477 10-10 10s-10-4.477-10-10c0-1.463.314-2.854.88-4.106c.466-.939 1.233-1.874 1.85-2.194c-.653 1.283-.973 2.54-1.04 3.383c.454-1.5 1.315-2.757 2.52-3.644c2.066-1.519 4.848-1.587 5.956-.62c-2.056.707-4.296 3.548-3.803 6.876c.08.55.245 1.083.489 1.582c-.384-1.01-.418-2.433.202-3.358c.692-1.03 1.678-1.248 2.206-1.136c-.208-.044-.668.836-.736.991a2.97 2.97 0 0 0-.251 1.25a3.394 3.394 0 0 0 1.03 2.38c1.922 1.871 5.023 1.135 6.411-1.002c.954-1.471 1.07-3.968-.154-5.952a6.916 6.916 0 0 0-1.084-1.32c-1.85-1.766-4.48-2.57-6.982-2.205c-1.106.177-2.047.496-2.824.956C7.756 2.798 9.912 2 12 2Z"/></svg>My New Browser Setup</h1> <h1>My New Browser Setup</h1>
<p style="font-size:110%">Posted on: <strong>17 March 2023</strong></p> <p style="font-size:110%">Posted on: <strong>17 March 2023</strong></p>
<p style="font-size:110%">Reading time: <strong><strong>2 min</strong> <p style="font-size:110%">Reading time: <strong><strong>2 min</strong>
<p> <p>
<p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M14 18.32A7.06 7.06 0 0 1 11.28 16H3V4h18v2.26a7.08 7.08 0 0 1 2 2.15V4a2 2 0 0 0-2-2H3a2 2 0 0 0-2 2v12a2 2 0 0 0 2 2h7v2H8v2h8v-2h-2Z"/><path fill="currentColor" d="M17 6a6 6 0 1 0 6 6a6 6 0 0 0-6-6Zm0 7.5a1.5 1.5 0 1 1 1.5-1.5a1.5 1.5 0 0 1-1.5 1.5Z"/></svg><strong>Software</strong></a></p> <p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><strong>Software</strong></a></p>
<p>I have a new browser setup on my desktop to increase my privacy and convenience. It is divided into two profiles that perform differently based on what I need to do in the moment.</p> <p>I have a new browser setup on my desktop to increase my privacy and convenience. It is divided into two profiles that perform differently based on what I need to do in the moment.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16"><path fill="currentColor" fill-rule="evenodd" d="M8 16A8 8 0 1 0 8 0a8 8 0 0 0 0 16ZM4.927 4.99c-.285.429-.427.853-.427 1.27c0 .203.09.392.27.566c.18.174.4.26.661.26c.443 0 .744-.248.903-.746c.168-.475.373-.835.616-1.08c.243-.244.62-.366 1.134-.366c.439 0 .797.12 1.075.363c.277.242.416.54.416.892a.97.97 0 0 1-.136.502a1.91 1.91 0 0 1-.336.419a14.35 14.35 0 0 1-.648.558c-.34.282-.611.525-.812.73c-.2.205-.362.443-.483.713c-.322 1.245 1.35 1.345 1.736.456c.047-.086.118-.18.213-.284c.096-.103.223-.223.382-.36a41.14 41.14 0 0 0 1.194-1.034c.221-.204.412-.448.573-.73a1.95 1.95 0 0 0 .242-.984c0-.475-.141-.915-.424-1.32c-.282-.406-.682-.726-1.2-.962c-.518-.235-1.115-.353-1.792-.353c-.728 0-1.365.14-1.911.423c-.546.282-.961.637-1.246 1.066Zm2.14 7.08a1 1 0 1 0 2 0a1 1 0 0 0-2 0Z" clip-rule="evenodd"/></svg>What is it?</h2> <h2>What is it?</h2>
<p>I use Librewolf as my browser. It is a fork of Firefox that is enhanced for privacy without heavily impacting user experience. I divided it into two profiles:</p> <p>I use Librewolf as my browser. It is a fork of Firefox that is enhanced for privacy without heavily impacting user experience. I divided it into two profiles:</p>
<ol> <ol>
<li>Accounts (instances in which I need to login)</li> <li>Accounts (instances in which I need to login)</li>
<li>Browsing (general website browsing)</li> <li>Browsing (general website browsing)</li>
</ol> </ol>
<p>Let me walk through how each profile is setup.</p> <p>Let me walk through how each profile is setup.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="-2 -2 24 24"><path fill="currentColor" d="M20 6v5H0V6h6.126a4.002 4.002 0 0 0 7.748 0H20zm0-2H0l5-4h10l5 4zm0 9v5a2 2 0 0 1-2 2H2a2 2 0 0 1-2-2v-5h6.126a4.002 4.002 0 0 0 7.748 0H20zM8.268 13h3.464a2 2 0 0 1-3.464 0zm-.002-6.988h3.464a2 2 0 0 1-3.464 0z"/></svg>Profile Setup</h2> <h2>Profile Setup</h2>
<p>Firstly, let me talk about common settings between both profiles.</p> <p>Firstly, let me talk about common settings between both profiles.</p>
<h3>Common In Both</h3> <h3>Common In Both</h3>
<p>On both profiles, I have my settings to optimize my privacy. On Firefox-based browsers, it is very easy to use these settings because most of them have little impact on convenience. I use Brave Search as my search engine and will switch to my own SearX instance when I get a good server. In terms of extensions, I have the 'uBlock Origin' extension installed setup to block JavaScript and remote fonts by default. I have the default lists along with all the others unchecked by default apart from language lists. I block every single domain from Google, Facebook, Microsoft and other websites which are known for tracking. If a website breaks, I whitelist that website in particular.</p> <p>On both profiles, I have my settings to optimize my privacy. On Firefox-based browsers, it is very easy to use these settings because most of them have little impact on convenience. I use Brave Search as my search engine and will switch to my own SearX instance when I get a good server. In terms of extensions, I have the 'uBlock Origin' extension installed setup to block JavaScript and remote fonts by default. I have the default lists along with all the others unchecked by default apart from language lists. I block every single domain from Google, Facebook, Microsoft and other websites which are known for tracking. If a website breaks, I whitelist that website in particular.</p>
@ -80,7 +80,7 @@
</ul> </ul>
</li> </li>
</ol> </ol>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M6.012 18H21V4a2 2 0 0 0-2-2H6c-1.206 0-3 .799-3 3v14c0 2.201 1.794 3 3 3h15v-2H6.012C5.55 19.988 5 19.805 5 19s.55-.988 1.012-1zM8 6h9v2H8V6z"/></svg>Conclusion</h2> <h2>Conclusion</h2>
<p>This setup has been serving me extremely well. I will continue using this setup and building on it if any specific need arises. <p>This setup has been serving me extremely well. I will continue using this setup and building on it if any specific need arises.
</p> </p>
<div style="text-align:center;"><img src="../blog/images/ieshit.gif" style="width:81px;"><img src="../blog/images/iestop.gif" style="width:81px;"><img src="../blog/images/iesucks.gif" style="width:81px;"></div> <div style="text-align:center;"><img src="../blog/images/ieshit.gif" style="width:81px;"><img src="../blog/images/iestop.gif" style="width:81px;"><img src="../blog/images/iesucks.gif" style="width:81px;"></div>

@ -16,19 +16,19 @@
</pre> </pre>
</a> </a>
<hr/> <hr/>
<p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href="."><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M14.24 10.56c-.31 1.24-2.24.61-2.84.44l.55-2.18c.62.18 2.61.44 2.29 1.74m-3.11 1.56l-.6 2.41c.74.19 3.03.92 3.37-.44c.36-1.42-2.03-1.79-2.77-1.97m10.57 2.3c-1.34 5.36-6.76 8.62-12.12 7.28C4.22 20.36.963 14.94 2.3 9.58A9.996 9.996 0 0 1 14.42 2.3c5.35 1.34 8.61 6.76 7.28 12.12m-7.49-6.37l.45-1.8l-1.1-.25l-.44 1.73c-.29-.07-.58-.14-.88-.2l.44-1.77l-1.09-.26l-.45 1.79c-.24-.06-.48-.11-.7-.17l-1.51-.38l-.3 1.17s.82.19.8.2c.45.11.53.39.51.64l-1.23 4.93c-.05.14-.21.32-.5.27c.01.01-.8-.2-.8-.2L6.87 15l1.42.36c.27.07.53.14.79.2l-.46 1.82l1.1.28l.45-1.81c.3.08.59.15.87.23l-.45 1.79l1.1.28l.46-1.82c1.85.35 3.27.21 3.85-1.48c.5-1.35 0-2.15-1-2.66c.72-.19 1.26-.64 1.41-1.62c.2-1.33-.82-2.04-2.2-2.52Z"/></svg>Keep Crypto Off Exchanges</a></p> <p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href=".">Keep Crypto Off Exchanges</a></p>
<h1><svg class="titles" xmlns="http://www.w3.org/2000/svg" width="40" height="40" viewBox="0 0 24 24"><path fill="currentColor" d="M14.24 10.56c-.31 1.24-2.24.61-2.84.44l.55-2.18c.62.18 2.61.44 2.29 1.74m-3.11 1.56l-.6 2.41c.74.19 3.03.92 3.37-.44c.36-1.42-2.03-1.79-2.77-1.97m10.57 2.3c-1.34 5.36-6.76 8.62-12.12 7.28C4.22 20.36.963 14.94 2.3 9.58A9.996 9.996 0 0 1 14.42 2.3c5.35 1.34 8.61 6.76 7.28 12.12m-7.49-6.37l.45-1.8l-1.1-.25l-.44 1.73c-.29-.07-.58-.14-.88-.2l.44-1.77l-1.09-.26l-.45 1.79c-.24-.06-.48-.11-.7-.17l-1.51-.38l-.3 1.17s.82.19.8.2c.45.11.53.39.51.64l-1.23 4.93c-.05.14-.21.32-.5.27c.01.01-.8-.2-.8-.2L6.87 15l1.42.36c.27.07.53.14.79.2l-.46 1.82l1.1.28l.45-1.81c.3.08.59.15.87.23l-.45 1.79l1.1.28l.46-1.82c1.85.35 3.27.21 3.85-1.48c.5-1.35 0-2.15-1-2.66c.72-.19 1.26-.64 1.41-1.62c.2-1.33-.82-2.04-2.2-2.52Z"/></svg>Keep Crypto Off Exchanges</h1> <h1>Keep Crypto Off Exchanges</h1>
<p style="font-size:110%">Posted on: <strong>14 March 2023</strong></p> <p style="font-size:110%">Posted on: <strong>14 March 2023</strong></p>
<p style="font-size:110%">Reading time: <strong>3 min</strong> <p style="font-size:110%">Reading time: <strong>3 min</strong>
<strong><p><p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M14 18.32A7.06 7.06 0 0 1 11.28 16H3V4h18v2.26a7.08 7.08 0 0 1 2 2.15V4a2 2 0 0 0-2-2H3a2 2 0 0 0-2 2v12a2 2 0 0 0 2 2h7v2H8v2h8v-2h-2Z"/><path fill="currentColor" d="M17 6a6 6 0 1 0 6 6a6 6 0 0 0-6-6Zm0 7.5a1.5 1.5 0 1 1 1.5-1.5a1.5 1.5 0 0 1-1.5 1.5Z"/></svg><strong>Software</strong></a> && <a style="color:#ff79c6" href="../blog/technology/"><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="m23 12l-7.071 7.07l-1.414-1.413L20.172 12l-5.657-5.657l1.414-1.414L23 11.999ZM3.828 12l5.657 5.657l-1.414 1.414L1 12l7.071-7.071l1.414 1.414L3.828 12Z"/></svg><strong>Technology</strong></a></p> <strong><p><p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><strong>Software</strong></a> && <a style="color:#ff79c6" href="../blog/technology/">Technology</strong></a></p>
<p>In this article, we will discover why it is horrible to keep cryptocurrency on exchanges. If you do not have time to read this article, please stop keeping your cryptocurrencies on exchanges. If you do, your crypto may get stolen or lost. If you are interested in the details, please keep reading.</p> <p>In this article, we will discover why it is horrible to keep cryptocurrency on exchanges. If you do not have time to read this article, please stop keeping your cryptocurrencies on exchanges. If you do, your crypto may get stolen or lost. If you are interested in the details, please keep reading.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" width="32" height="32" viewBox="0 0 16 16"><path fill="currentColor" d="M0 4a2 2 0 0 1 2-2h12a2 2 0 0 1 2 2v1H0V4zm0 3v5a2 2 0 0 0 2 2h12a2 2 0 0 0 2-2V7H0zm3 2h1a1 1 0 0 1 1 1v1a1 1 0 0 1-1 1H3a1 1 0 0 1-1-1v-1a1 1 0 0 1 1-1z"/></svg>Lack of Ownership</h2> <h2>Lack of Ownership</h2>
<p>When you keep cryptocurrencies on exchanges like Coinbase, they have your private keys. Anyone who has your private keys can manage your wallet as if it is their own. They can send, receive and do whatever they want with your wallet. Even if the exchange you are trading on is trusted, <a href="https://www.investopedia.com/terms/m/mt-gox.asp">if they shut down, you will lose your crypto.</a> This happened a few times before and thousands of people lost all of their crypto. This is why exchanges should be used for what they are good at; purchasing crypto. Keep exchanges only for one purpose.</p> <p>When you keep cryptocurrencies on exchanges like Coinbase, they have your private keys. Anyone who has your private keys can manage your wallet as if it is their own. They can send, receive and do whatever they want with your wallet. Even if the exchange you are trading on is trusted, <a href="https://www.investopedia.com/terms/m/mt-gox.asp">if they shut down, you will lose your crypto.</a> This happened a few times before and thousands of people lost all of their crypto. This is why exchanges should be used for what they are good at; purchasing crypto. Keep exchanges only for one purpose.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="m504.971 199.362l-22.627-22.627c-9.373-9.373-24.569-9.373-33.941 0l-5.657 5.657L329.608 69.255l5.657-5.657c9.373-9.373 9.373-24.569 0-33.941L312.638 7.029c-9.373-9.373-24.569-9.373-33.941 0L154.246 131.48c-9.373 9.373-9.373 24.569 0 33.941l22.627 22.627c9.373 9.373 24.569 9.373 33.941 0l5.657-5.657l39.598 39.598l-81.04 81.04l-5.657-5.657c-12.497-12.497-32.758-12.497-45.255 0L9.373 412.118c-12.497 12.497-12.497 32.758 0 45.255l45.255 45.255c12.497 12.497 32.758 12.497 45.255 0l114.745-114.745c12.497-12.497 12.497-32.758 0-45.255l-5.657-5.657l81.04-81.04l39.598 39.598l-5.657 5.657c-9.373 9.373-9.373 24.569 0 33.941l22.627 22.627c9.373 9.373 24.569 9.373 33.941 0l124.451-124.451c9.372-9.372 9.372-24.568 0-33.941z"/></svg>No Regulation</h2> <h2>No Regulation</h2>
<p>Currently, the whole crypto exchange industry has a severe lack of regulation. The fact that exchanges have your private keys means that <strong>they can freeze your account which would cut off your access to your own crypto.</strong> Governments can request such freezes. This may seem improbable but <a href="https://www.ccn.com/south-koreas-biggest-cryptocurrency-exchange-investigated-by-local-police-market-drops/">it happened in South Korea.</a></p> <p>Currently, the whole crypto exchange industry has a severe lack of regulation. The fact that exchanges have your private keys means that <strong>they can freeze your account which would cut off your access to your own crypto.</strong> Governments can request such freezes. This may seem improbable but <a href="https://www.ccn.com/south-koreas-biggest-cryptocurrency-exchange-investigated-by-local-police-market-drops/">it happened in South Korea.</a></p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M12 1L3 5v6c0 5.55 3.84 10.74 9 12c5.16-1.26 9-6.45 9-12V5l-9-4zm0 10.99h7c-.53 4.12-3.28 7.79-7 8.94V12H5V6.3l7-3.11v8.8z"/></svg>Hacking</h2> <h2>Hacking</h2>
<p>Even if the exchange you are trading on is secure, they may store your private keys in plaintext. This happens much more than people think. If this happens, hackers can easily take control of people's wallets and send all the crypto to themselves. If a hack like this happens through Bitcoin, it can at least be tracked. However, many hackers convert their crypto to Monero which cannot be tracked. If this happens, you will never get your money back unless the hacker decides to return the money.</p> <p>Even if the exchange you are trading on is secure, they may store your private keys in plaintext. This happens much more than people think. If this happens, hackers can easily take control of people's wallets and send all the crypto to themselves. If a hack like this happens through Bitcoin, it can at least be tracked. However, many hackers convert their crypto to Monero which cannot be tracked. If this happens, you will never get your money back unless the hacker decides to return the money.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 256 256"><path fill="currentColor" d="M216 32v160a8 8 0 0 1-8 8H72a16 16 0 0 0-16 16h136a8 8 0 0 1 0 16H48a8 8 0 0 1-8-8V56a32 32 0 0 1 32-32h136a8 8 0 0 1 8 8Z"/></svg>Conclusion</h2> <h2>Conclusion</h2>
<p>To sum it up, you should never store your crypto on exchanges because you do not own your own crypto. There is little regulation and your account or the exchange can also be hacked. All of these pose serious risks to your crypto. Just get a wallet like Electrum or Monero and start using it.</p> <p>To sum it up, you should never store your crypto on exchanges because you do not own your own crypto. There is little regulation and your account or the exchange can also be hacked. All of these pose serious risks to your crypto. Just get a wallet like Electrum or Monero and start using it.</p>
<p><a href="mailto:sufyaan@counterhawks.com?subject=Keep%20Crypto%20Off%20Exchanges">>>> Reply To Me</a></p> <p><a href="mailto:sufyaan@counterhawks.com?subject=Keep%20Crypto%20Off%20Exchanges">>>> Reply To Me</a></p>
<p><a href="crypto.pdf">>>> Download PDF</a></p> <p><a href="crypto.pdf">>>> Download PDF</a></p>

@ -16,19 +16,19 @@
</pre> </pre>
</a> </a>
<hr/> <hr/>
<p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href="."><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M19.27 5.33C17.94 4.71 16.5 4.26 15 4a.09.09 0 0 0-.07.03c-.18.33-.39.76-.53 1.09a16.09 16.09 0 0 0-4.8 0c-.14-.34-.35-.76-.54-1.09c-.01-.02-.04-.03-.07-.03c-1.5.26-2.93.71-4.27 1.33c-.01 0-.02.01-.03.02c-2.72 4.07-3.47 8.03-3.1 11.95c0 .02.01.04.03.05c1.8 1.32 3.53 2.12 5.24 2.65c.03.01.06 0 .07-.02c.4-.55.76-1.13 1.07-1.74c.02-.04 0-.08-.04-.09c-.57-.22-1.11-.48-1.64-.78c-.04-.02-.04-.08-.01-.11c.11-.08.22-.17.33-.25c.02-.02.05-.02.07-.01c3.44 1.57 7.15 1.57 10.55 0c.02-.01.05-.01.07.01c.11.09.22.17.33.26c.04.03.04.09-.01.11c-.52.31-1.07.56-1.64.78c-.04.01-.05.06-.04.09c.32.61.68 1.19 1.07 1.74c.03.01.06.02.09.01c1.72-.53 3.45-1.33 5.25-2.65c.02-.01.03-.03.03-.05c.44-4.53-.73-8.46-3.1-11.95c-.01-.01-.02-.02-.04-.02zM8.52 14.91c-1.03 0-1.89-.95-1.89-2.12s.84-2.12 1.89-2.12c1.06 0 1.9.96 1.89 2.12c0 1.17-.84 2.12-1.89 2.12zm6.97 0c-1.03 0-1.89-.95-1.89-2.12s.84-2.12 1.89-2.12c1.06 0 1.9.96 1.89 2.12c0 1.17-.83 2.12-1.89 2.12z"/></svg>Delete Your Discord</a></p> <p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href=".">Delete Your Discord</a></p>
<h1><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M19.27 5.33C17.94 4.71 16.5 4.26 15 4a.09.09 0 0 0-.07.03c-.18.33-.39.76-.53 1.09a16.09 16.09 0 0 0-4.8 0c-.14-.34-.35-.76-.54-1.09c-.01-.02-.04-.03-.07-.03c-1.5.26-2.93.71-4.27 1.33c-.01 0-.02.01-.03.02c-2.72 4.07-3.47 8.03-3.1 11.95c0 .02.01.04.03.05c1.8 1.32 3.53 2.12 5.24 2.65c.03.01.06 0 .07-.02c.4-.55.76-1.13 1.07-1.74c.02-.04 0-.08-.04-.09c-.57-.22-1.11-.48-1.64-.78c-.04-.02-.04-.08-.01-.11c.11-.08.22-.17.33-.25c.02-.02.05-.02.07-.01c3.44 1.57 7.15 1.57 10.55 0c.02-.01.05-.01.07.01c.11.09.22.17.33.26c.04.03.04.09-.01.11c-.52.31-1.07.56-1.64.78c-.04.01-.05.06-.04.09c.32.61.68 1.19 1.07 1.74c.03.01.06.02.09.01c1.72-.53 3.45-1.33 5.25-2.65c.02-.01.03-.03.03-.05c.44-4.53-.73-8.46-3.1-11.95c-.01-.01-.02-.02-.04-.02zM8.52 14.91c-1.03 0-1.89-.95-1.89-2.12s.84-2.12 1.89-2.12c1.06 0 1.9.96 1.89 2.12c0 1.17-.84 2.12-1.89 2.12zm6.97 0c-1.03 0-1.89-.95-1.89-2.12s.84-2.12 1.89-2.12c1.06 0 1.9.96 1.89 2.12c0 1.17-.83 2.12-1.89 2.12z"/></svg>Delete Your Discord</h1> <h1>Delete Your Discord</h1>
<p style="font-size:110%">Posted on: <strong>22 March 2023</strong></p> <p style="font-size:110%">Posted on: <strong>22 March 2023</strong></p>
<p style="font-size:110%">Reading time: <strong><strong>3 min</strong> <p style="font-size:110%">Reading time: <strong><strong>3 min</strong>
<p> <p>
<p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M14 18.32A7.06 7.06 0 0 1 11.28 16H3V4h18v2.26a7.08 7.08 0 0 1 2 2.15V4a2 2 0 0 0-2-2H3a2 2 0 0 0-2 2v12a2 2 0 0 0 2 2h7v2H8v2h8v-2h-2Z"/><path fill="currentColor" d="M17 6a6 6 0 1 0 6 6a6 6 0 0 0-6-6Zm0 7.5a1.5 1.5 0 1 1 1.5-1.5a1.5 1.5 0 0 1-1.5 1.5Z"/></svg><strong>Software</strong></a> && <a style="color:#ff79c6" href="../blog/guides/"><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 512 512"><path fill="currentColor" d="M464 48c-67.61.29-117.87 9.6-154.24 25.69c-27.14 12-37.76 21.08-37.76 51.84V448c41.57-37.5 78.46-48 224-48V48ZM48 48c67.61.29 117.87 9.6 154.24 25.69c27.14 12 37.76 21.08 37.76 51.84V448c-41.57-37.5-78.46-48-224-48V48Z"/></svg><strong>Guides</strong></a></p> <p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><strong>Software</strong></a> && <a style="color:#ff79c6" href="../blog/guides/"><strong>Guides</strong></a></p>
<p>As mentioned in the title, I have deleted my Discord account. This was obviously not without a reason. There are two reasons due to which I deleted my Discord account:</p> <p>As mentioned in the title, I have deleted my Discord account. This was obviously not without a reason. There are two reasons due to which I deleted my Discord account:</p>
<ul> <ul>
<li>Privacy</li> <li>Privacy</li>
<li>Lack of Use</li> <li>Lack of Use</li>
</ul> </ul>
<p>The most prominent reason is privacy but lack of use compelled me to actually take the plunge and delete my Discord account.</p> <p>The most prominent reason is privacy but lack of use compelled me to actually take the plunge and delete my Discord account.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 20 20"><path fill="currentColor" d="M10 9.6c-.6 0-1 .4-1 1c0 .4.3.7.6.8l-.3 1.4h1.3l-.3-1.4c.4-.1.6-.4.6-.8c.1-.6-.3-1-.9-1zm.1-4.3c-.7 0-1.4.5-1.4 1.2V8h2.7V6.5c-.1-.7-.6-1.2-1.3-1.2zM10 2L3 5v3c.1 4.4 2.9 8.3 7 9.9c4.1-1.6 6.9-5.5 7-9.9V5l-7-3zm4 11c0 .6-.4 1-1 1H7c-.6 0-1-.4-1-1V9c0-.6.4-1 1-1h.3V6.5C7.4 5.1 8.6 4 10 4c1.4 0 2.6 1.1 2.7 2.5V8h.3c.6 0 1 .4 1 1v4z"/></svg>Privacy</h2> <h2>Privacy</h2>
<h3>Introduction</h3> <h3>Introduction</h3>
<p>Discord is a hellhole for your privacy. Avoid it at all costs. In this section, I will show you the various things that Discord tracks.</p> <p>Discord is a hellhole for your privacy. Avoid it at all costs. In this section, I will show you the various things that Discord tracks.</p>
<h3>DISCORD'S HISTORY</h3> <h3>DISCORD'S HISTORY</h3>
@ -91,9 +91,9 @@
</ol> </ol>
<h3>ALL IN ALL...</h3> <h3>ALL IN ALL...</h3>
<p>... this is not all that Discord does. If we know that Discord does all of this, there is obviously more that they are doing that we do not know. You should always assume closed-source pieces of software are tracking you and sending your information to a third-party.</p> <p>... this is not all that Discord does. If we know that Discord does all of this, there is obviously more that they are doing that we do not know. You should always assume closed-source pieces of software are tracking you and sending your information to a third-party.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M13.72 21.84c-.56.1-1.13.16-1.72.16c-5.5 0-10-4.5-10-10S6.5 2 12 2s10 4.5 10 10c0 .59-.06 1.16-.16 1.72A5.9 5.9 0 0 0 19 13c-1.26 0-2.43.39-3.4 1.06l-3.1-1.86V7H11v6l3.43 2.11A5.963 5.963 0 0 0 13 19c0 1.03.26 2 .72 2.84M15 18v2h8v-2h-8Z"/></svg>Lack of Use</h2> <h2>Lack of Use</h2>
<p>I was not using Discord anymore so I deleted it. The reason is that my previous account got banned for botting when I did not do anything. I made a new account, chatted with three or four of my friends. Afterwards, the CounterHawks Discord server got banned. Due to this, I realized there is no use for my account and that there is no reason for me to support Discord.</p> <p>I was not using Discord anymore so I deleted it. The reason is that my previous account got banned for botting when I did not do anything. I made a new account, chatted with three or four of my friends. Afterwards, the CounterHawks Discord server got banned. Due to this, I realized there is no use for my account and that there is no reason for me to support Discord.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M6.012 18H21V4a2 2 0 0 0-2-2H6c-1.206 0-3 .799-3 3v14c0 2.201 1.794 3 3 3h15v-2H6.012C5.55 19.988 5 19.805 5 19s.55-.988 1.012-1zM8 6h9v2H8V6z"/></svg>Conclusion</h2> <h2>Conclusion</h2>
<p>I do not use Discord anymore and probably never will. Previously, it was difficult to delete my Discord account but Discord themselves have done all the hard work for me.</p> <p>I do not use Discord anymore and probably never will. Previously, it was difficult to delete my Discord account but Discord themselves have done all the hard work for me.</p>
<div style="text-align:center;"><img src="../blog/images/discord-no-way.gif" style="width:81px;"></div> <div style="text-align:center;"><img src="../blog/images/discord-no-way.gif" style="width:81px;"></div>
<p><a href="mailto:sufyaan@counterhawks.com?subject=Delete%20Your%20Discord%20Account">>>> Reply To Me</a></p> <p><a href="mailto:sufyaan@counterhawks.com?subject=Delete%20Your%20Discord%20Account">>>> Reply To Me</a></p>

@ -18,16 +18,16 @@
</pre> </pre>
</a> </a>
<hr/> <hr/>
<p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href="."><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M20 3H4a2 2 0 0 0-2 2v4a2 2 0 0 0 2 2h16a2 2 0 0 0 2-2V5a2 2 0 0 0-2-2zm-5 5h-2V6h2zm4 0h-2V6h2zm1 5H4a2 2 0 0 0-2 2v4a2 2 0 0 0 2 2h16a2 2 0 0 0 2-2v-4a2 2 0 0 0-2-2zm-5 5h-2v-2h2zm4 0h-2v-2h2z"/></svg>Do It Yourself</a></p> <p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href=".">Do It Yourself</a></p>
<h1><svg class="titles" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M20 3H4a2 2 0 0 0-2 2v4a2 2 0 0 0 2 2h16a2 2 0 0 0 2-2V5a2 2 0 0 0-2-2zm-5 5h-2V6h2zm4 0h-2V6h2zm1 5H4a2 2 0 0 0-2 2v4a2 2 0 0 0 2 2h16a2 2 0 0 0 2-2v-4a2 2 0 0 0-2-2zm-5 5h-2v-2h2zm4 0h-2v-2h2z"/></svg>Do It Yourself</h1> <h1>Do It Yourself</h1>
<p style="font-size:110%">Posted on: <strong>19 May 2023</strong></p><p style="font-size:110%">Reading time: <strong><strong>2 min</strong><p><p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M14 18.32A7.06 7.06 0 0 1 11.28 16H3V4h18v2.26a7.08 7.08 0 0 1 2 2.15V4a2 2 0 0 0-2-2H3a2 2 0 0 0-2 2v12a2 2 0 0 0 2 2h7v2H8v2h8v-2h-2Z"/><path fill="currentColor" d="M17 6a6 6 0 1 0 6 6a6 6 0 0 0-6-6Zm0 7.5a1.5 1.5 0 1 1 1.5-1.5a1.5 1.5 0 0 1-1.5 1.5Z"/></svg><strong>Software</strong></a></p> <p style="font-size:110%">Posted on: <strong>19 May 2023</strong></p><p style="font-size:110%">Reading time: <strong><strong>2 min</strong><p><p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><strong>Software</strong></a></p>
<p>With regards to technology, the average person would rather buy a new computer when their WiFi stops working instead of taking it to a repair shop or fixing it themselves. They would rather buy a new smartphone when their screen cracks than repair it. They would also rather buy a device because of its looks and arbitrary specifications than one specific to their use case and their interests. They focus on the marketing of a company and become 'fanboys' of a specific company, buying nothing but their products, stating that the company in question makes the best products in the world. Self-servicing and repairability are not even factors in their decision to buy a device. <p>With regards to technology, the average person would rather buy a new computer when their WiFi stops working instead of taking it to a repair shop or fixing it themselves. They would rather buy a new smartphone when their screen cracks than repair it. They would also rather buy a device because of its looks and arbitrary specifications than one specific to their use case and their interests. They focus on the marketing of a company and become 'fanboys' of a specific company, buying nothing but their products, stating that the company in question makes the best products in the world. Self-servicing and repairability are not even factors in their decision to buy a device.
</p> </p>
<p>As an example, a plethora of technology enthusiasts still buy <a style="color:#50fa7b" href="../definitions/thinkpad">ThinkPads</a> to this day. When others look at <a style="color:#50fa7b" href="../definitions/thinkpad">ThinkPads</a>, they think whoever buys them is not making a good decision. They think <a style="color:#50fa7b" href="../definitions/thinkpad">ThinkPads</a> look ugly. They do not focus on the usability of a device. <a style="color:#50fa7b" href="../definitions/thinkpad">ThinkPads</a> are used because of their durability, repairability, fast performance, and more. The fact that they are made for businesses means that there is no profit for Lenovo in letting a ThinkPad break early. Instead, they earn money by selling long-lasting and durable devices that last individuals for years on end.</p> <p>As an example, a plethora of technology enthusiasts still buy <a style="color:#50fa7b" href="../definitions/thinkpad">ThinkPads</a> to this day. When others look at <a style="color:#50fa7b" href="../definitions/thinkpad">ThinkPads</a>, they think whoever buys them is not making a good decision. They think <a style="color:#50fa7b" href="../definitions/thinkpad">ThinkPads</a> look ugly. They do not focus on the usability of a device. <a style="color:#50fa7b" href="../definitions/thinkpad">ThinkPads</a> are used because of their durability, repairability, fast performance, and more. The fact that they are made for businesses means that there is no profit for Lenovo in letting a ThinkPad break early. Instead, they earn money by selling long-lasting and durable devices that last individuals for years on end.</p>
<p>Instead of buying ThinkPads that <em>function</em> amazingly, people go for looks that <em>impress</em> amazingly. A computer is a device designed to perform computation. If you are shelling out a lot of money, you should have a device that performs fast and can be repaired by you.</p> <p>Instead of buying ThinkPads that <em>function</em> amazingly, people go for looks that <em>impress</em> amazingly. A computer is a device designed to perform computation. If you are shelling out a lot of money, you should have a device that performs fast and can be repaired by you.</p>
<p>What I have realized is that you should 'do it yourself' as much as possible. This is why my computer is custom-built. Had I bought a <a style="color:#50fa7b" href="../definitions/pre-built-computers/">pre-built computer,</a> I would have never known what was inside my computer. This is tedious on smartphones since they are becoming more and more locked down. <a style="color:#50fa7b" href="../definitions/linux-phones"><strong>Linux</strong> phones</a> are alternatives but they are not great as of 2023. I hope they become mainstream soon because I want to buy one.</p> <p>What I have realized is that you should 'do it yourself' as much as possible. This is why my computer is custom-built. Had I bought a <a style="color:#50fa7b" href="../definitions/pre-built-computers/">pre-built computer,</a> I would have never known what was inside my computer. This is tedious on smartphones since they are becoming more and more locked down. <a style="color:#50fa7b" href="../definitions/linux-phones"><strong>Linux</strong> phones</a> are alternatives but they are not great as of 2023. I hope they become mainstream soon because I want to buy one.</p>
<p>Doing it yourself also helps in terms of software. I used to flash custom ROMs on my old phone and used <a style="color:#50fa7b" href="../definitions/lineageos">LineageOS</a> extensively. Now, I use <a style="color:#50fa7b" href="../definitions/arch-linux">Arch <strong>Linux</strong></a> on my computer, which is a <a style="color:#50fa7b" href="../definitions/linux-distribution"><strong>Linux</strong> distribution</a> that is basically barebones. It has only the packages required to boot up. Everything else is done by you. The advantage of an <a style="color:#50fa7b" href="../definitions/operating-system">operating system</a> like this is that you know what runs on your system and there is minimal resource usage. If there is an issue, you can easily find out which program it is from and fix it immediately after gaining knowledge.</p> <p>Doing it yourself also helps in terms of software. I used to flash custom ROMs on my old phone and used <a style="color:#50fa7b" href="../definitions/lineageos">LineageOS</a> extensively. Now, I use <a style="color:#50fa7b" href="../definitions/arch-linux">Arch <strong>Linux</strong></a> on my computer, which is a <a style="color:#50fa7b" href="../definitions/linux-distribution"><strong>Linux</strong> distribution</a> that is basically barebones. It has only the packages required to boot up. Everything else is done by you. The advantage of an <a style="color:#50fa7b" href="../definitions/operating-system">operating system</a> like this is that you know what runs on your system and there is minimal resource usage. If there is an issue, you can easily find out which program it is from and fix it immediately after gaining knowledge.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M6.012 18H21V4a2 2 0 0 0-2-2H6c-1.206 0-3 .799-3 3v14c0 2.201 1.794 3 3 3h15v-2H6.012C5.55 19.988 5 19.805 5 19s.55-.988 1.012-1zM8 6h9v2H8V6z"/></svg>Conclusion</h2> <h2>Conclusion</h2>
<p>You should try to 'do it yourself'. Take control of your hardware and software and know what you are running. It will not only be cheaper, but it will make it easier to fix issues and learn about computing and technology in the long run.</p> <p>You should try to 'do it yourself'. Take control of your hardware and software and know what you are running. It will not only be cheaper, but it will make it easier to fix issues and learn about computing and technology in the long run.</p>
<p><a href="mailto:sufyaan@counterhawks.com?subject=Do%20It%20Yourself">>>> Reply To Me</a></p> <p><a href="mailto:sufyaan@counterhawks.com?subject=Do%20It%20Yourself">>>> Reply To Me</a></p>
<p><a href="diy.pdf">>>> Download PDF</a></p> <p><a href="diy.pdf">>>> Download PDF</a></p>

@ -18,16 +18,16 @@
</a> </a>
</a> </a>
<hr/> <hr/>
<p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href="."><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M2.69 2c.85-.05 3.39 1.16 3.44 1.19c-1.29.81-2.39 1.9-3.22 3.19C2.09 4.81 1.34 2.91 2 2.25c.17-.17.4-.25.69-.25m18.15.13c.41-.05.74.01.94.21c1.07 1.08-1.9 5.81-2.4 6.32c-.51.5-1.81.04-2.88-1.03c-1.07-1.08-1.53-2.37-1.03-2.88c.41-.41 3.62-2.45 5.37-2.62M12 2.56c1.29 0 2.53.26 3.66.72c-.49.32-.85.57-.97.69c-.99.99-.55 2.86 1.03 4.44c.98.97 2.12 1.56 3.06 1.56c.68 0 1.14-.29 1.38-.53c.17-.17.44-.56.75-1.03c.51 1.18.78 2.47.78 3.84c0 5.36-4.33 9.72-9.69 9.72c-5.36 0-9.69-4.36-9.69-9.72A9.68 9.68 0 0 1 12 2.56Z"/></svg>Use Doas Instead Of Sudo</a></p> <p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href=".">Use Doas Instead Of Sudo</a></p>
<h1><svg class="titles" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M2.69 2c.85-.05 3.39 1.16 3.44 1.19c-1.29.81-2.39 1.9-3.22 3.19C2.09 4.81 1.34 2.91 2 2.25c.17-.17.4-.25.69-.25m18.15.13c.41-.05.74.01.94.21c1.07 1.08-1.9 5.81-2.4 6.32c-.51.5-1.81.04-2.88-1.03c-1.07-1.08-1.53-2.37-1.03-2.88c.41-.41 3.62-2.45 5.37-2.62M12 2.56c1.29 0 2.53.26 3.66.72c-.49.32-.85.57-.97.69c-.99.99-.55 2.86 1.03 4.44c.98.97 2.12 1.56 3.06 1.56c.68 0 1.14-.29 1.38-.53c.17-.17.44-.56.75-1.03c.51 1.18.78 2.47.78 3.84c0 5.36-4.33 9.72-9.69 9.72c-5.36 0-9.69-4.36-9.69-9.72A9.68 9.68 0 0 1 12 2.56Z"/></svg>Use Doas Instead Of Sudo</h1> <h1>Use Doas Instead Of Sudo</h1>
<p style="font-size:110%">Posted on: <strong>20 April 2023</strong></p> <p style="font-size:110%">Posted on: <strong>20 April 2023</strong></p>
<p style="font-size:110%">Reading time: <strong><strong>2 min</strong> <p style="font-size:110%">Reading time: <strong><strong>2 min</strong>
<p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/linux"><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="none" stroke="currentColor" stroke-linecap="round" stroke-linejoin="round" stroke-width="2" d="m5 7l5 5l-5 5m7 2h7"/></svg><strong>Linux</strong></a> && <a style="color:#ff79c6" href="../blog/software/"><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M14 18.32A7.06 7.06 0 0 1 11.28 16H3V4h18v2.26a7.08 7.08 0 0 1 2 2.15V4a2 2 0 0 0-2-2H3a2 2 0 0 0-2 2v12a2 2 0 0 0 2 2h7v2H8v2h8v-2h-2Z"/><path fill="currentColor" d="M17 6a6 6 0 1 0 6 6a6 6 0 0 0-6-6Zm0 7.5a1.5 1.5 0 1 1 1.5-1.5a1.5 1.5 0 0 1-1.5 1.5Z"/></svg><strong>Software</strong></a> && <a style="color:#ff79c6" href="../blog/guides/"><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 512 512"><path fill="currentColor" d="M464 48c-67.61.29-117.87 9.6-154.24 25.69c-27.14 12-37.76 21.08-37.76 51.84V448c41.57-37.5 78.46-48 224-48V48ZM48 48c67.61.29 117.87 9.6 154.24 25.69c27.14 12 37.76 21.08 37.76 51.84V448c-41.57-37.5-78.46-48-224-48V48Z"/></svg><strong>Guides</strong></a></p> <p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/linux"><strong>Linux</strong></a> && <a style="color:#ff79c6" href="../blog/software/"><strong>Software</strong></a> && <a style="color:#ff79c6" href="../blog/guides/"><strong>Guides</strong></a></p>
<p>Sudo. It is often used by <strong>Linux</strong> users to perform commands with root privileges instead of being in a root shell all the time. However, <a href="https://access.redhat.com/security/cve/CVE-2023-22809">there has recently been a vulnerability in sudo due to which people are switching to doas.</a></p> <p>Sudo. It is often used by <strong>Linux</strong> users to perform commands with root privileges instead of being in a root shell all the time. However, <a href="https://access.redhat.com/security/cve/CVE-2023-22809">there has recently been a vulnerability in sudo due to which people are switching to doas.</a></p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 1024 1024"><path fill="currentColor" d="M512 64a448 448 0 1 1 0 896a448 448 0 0 1 0-896zm23.744 191.488c-52.096 0-92.928 14.784-123.2 44.352c-30.976 29.568-45.76 70.4-45.76 122.496h80.256c0-29.568 5.632-52.8 17.6-68.992c13.376-19.712 35.2-28.864 66.176-28.864c23.936 0 42.944 6.336 56.32 19.712c12.672 13.376 19.712 31.68 19.712 54.912c0 17.6-6.336 34.496-19.008 49.984l-8.448 9.856c-45.76 40.832-73.216 70.4-82.368 89.408c-9.856 19.008-14.08 42.24-14.08 68.992v9.856h80.96v-9.856c0-16.896 3.52-31.68 10.56-45.76c6.336-12.672 15.488-24.64 28.16-35.2c33.792-29.568 54.208-48.576 60.544-55.616c16.896-22.528 26.048-51.392 26.048-86.592c0-42.944-14.08-76.736-42.24-101.376c-28.16-25.344-65.472-37.312-111.232-37.312zm-12.672 406.208a54.272 54.272 0 0 0-38.72 14.784a49.408 49.408 0 0 0-15.488 38.016c0 15.488 4.928 28.16 15.488 38.016A54.848 54.848 0 0 0 523.072 768c15.488 0 28.16-4.928 38.72-14.784a51.52 51.52 0 0 0 16.192-38.72a51.968 51.968 0 0 0-15.488-38.016a55.936 55.936 0 0 0-39.424-14.784z"/></svg>What is Doas?</h2> <h2>What is Doas?</h2>
<p>OpenDoas or Doas is a portable version of the doas utility that is used on OpenBSD. OpenDoas can be installed on Unix-like system which includes <strong>Linux</strong>. It is designed to be more minimal and has less configuration options than sudo. If you are on a personal computer, then I highly recommend you switch to doas because it has a much smaller codebase which leaves less room for error.</p> <p>OpenDoas or Doas is a portable version of the doas utility that is used on OpenBSD. OpenDoas can be installed on Unix-like system which includes <strong>Linux</strong>. It is designed to be more minimal and has less configuration options than sudo. If you are on a personal computer, then I highly recommend you switch to doas because it has a much smaller codebase which leaves less room for error.</p>
<p>However, if you are part of a professional environment with many individuals needing to use sudo, I recommend staying with sudo because it offers more configuration options to be used for groups and users.</p> <p>However, if you are part of a professional environment with many individuals needing to use sudo, I recommend staying with sudo because it offers more configuration options to be used for groups and users.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M11 2v5H8l4 4l4-4h-3V2h7a1 1 0 0 1 1 1v18a1 1 0 0 1-1 1H4a1 1 0 0 1-1-1V3a1 1 0 0 1 1-1h7Zm8 14H5v4h14v-4Zm-2 1v2h-2v-2h2Z"/></svg>Installing Doas</h2> <h2>Installing Doas</h2>
<p>Doas is available on almost all major distributions. If your distribution is Debian-based (Ubuntu, <strong>Linux</strong> Mint, Zorin OS), simply type:</p> <p>Doas is available on almost all major distributions. If your distribution is Debian-based (Ubuntu, <strong>Linux</strong> Mint, Zorin OS), simply type:</p>
<p><code>sudo apt install doas</code></p> <p><code>sudo apt install doas</code></p>
<p>If you run an Arch-based system (Artix, Arco, Endeavour, Manjaro), type:</p> <p>If you run an Arch-based system (Artix, Arco, Endeavour, Manjaro), type:</p>
@ -35,20 +35,20 @@
<p>If you use RHEL-based systems (Fedora, CentOS), type:</p> <p>If you use RHEL-based systems (Fedora, CentOS), type:</p>
<p><code>sudo dnf install opendoas</code></p> <p><code>sudo dnf install opendoas</code></p>
<p>Doas should now be installed but it will not work out of the box. There is one line that we need to add to the configuration file.</p> <p>Doas should now be installed but it will not work out of the box. There is one line that we need to add to the configuration file.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 256 256"><path fill="currentColor" d="M232 96a72 72 0 0 1-100.94 66L79 222.22c-.12.14-.26.29-.39.42a32 32 0 0 1-45.26-45.26c.14-.13.28-.27.43-.39L94 124.94a72.07 72.07 0 0 1 83.54-98.78a8 8 0 0 1 3.93 13.19L144 80l5.66 26.35L176 112l40.65-37.52a8 8 0 0 1 13.19 3.93A72.6 72.6 0 0 1 232 96Z"/></svg>Configuring Doas</h2> <h2>Configuring Doas</h2>
<p>You have to configure doas as it is not included in most distributions by default but do not fret! One of its plus points is that its configuration is much better than sudo's.</p> <p>You have to configure doas as it is not included in most distributions by default but do not fret! One of its plus points is that its configuration is much better than sudo's.</p>
<p>To begin, edit the /etc/doas.conf file as root.</p> <p>To begin, edit the /etc/doas.conf file as root.</p>
<p>If you are the only user on your system and do not plan to allow other users to use your system, this line will suffice.</p> <p>If you are the only user on your system and do not plan to allow other users to use your system, this line will suffice.</p>
<p><code>permit persist username as root</code></p> <p><code>permit persist username as root</code></p>
<p>Many distributions have a group (wheel, sudoers) that are allowed to run sudo commands. If you would like to allow that group to send commands as root, type this:</p> <p>Many distributions have a group (wheel, sudoers) that are allowed to run sudo commands. If you would like to allow that group to send commands as root, type this:</p>
<p><code>permit persist :wheel as root</code></p> <p><code>permit persist :wheel as root</code></p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M12 14v8H4a8 8 0 0 1 8-8Zm0-1c-3.315 0-6-2.685-6-6s2.685-6 6-6s6 2.685 6 6s-2.685 6-6 6Zm9 4h1v5h-8v-5h1v-1a3 3 0 1 1 6 0v1Zm-2 0v-1a1 1 0 1 0-2 0v1h2Z"/></svg>Using Doas</h2> <h2>Using Doas</h2>
<p>Using doas is incredibly simple. Just type doas instead of sudo. For example, if you usually type:</p> <p>Using doas is incredibly simple. Just type doas instead of sudo. For example, if you usually type:</p>
<p><code>sudo pacman -Syu</code></p> <p><code>sudo pacman -Syu</code></p>
<p>then just type:</p> <p>then just type:</p>
<p><code>doas pacman -Syu</code></p> <p><code>doas pacman -Syu</code></p>
<p>I also recommend aliasing doas to 'doas --' since it causes issues sometimes if you just use doas. Apart from that, this is it for the setup.</p> <p>I also recommend aliasing doas to 'doas --' since it causes issues sometimes if you just use doas. Apart from that, this is it for the setup.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M6.012 18H21V4a2 2 0 0 0-2-2H6c-1.206 0-3 .799-3 3v14c0 2.201 1.794 3 3 3h15v-2H6.012C5.55 19.988 5 19.805 5 19s.55-.988 1.012-1zM8 6h9v2H8V6z"/></svg>Conclusion</h2> <h2>Conclusion</h2>
<p>If you are the only person on your <strong>Linux</strong> machine, you should switch to doas. It is much more lightweight and is similar to sudo. It has a smaller codebase which, in my opinion, prevents exploits from popping up as often as sudo.</p> <p>If you are the only person on your <strong>Linux</strong> machine, you should switch to doas. It is much more lightweight and is similar to sudo. It has a smaller codebase which, in my opinion, prevents exploits from popping up as often as sudo.</p>
<p>However, if you are in a professional environment, you should stick with sudo.</p> <p>However, if you are in a professional environment, you should stick with sudo.</p>
<p><a href="mailto:sufyaan@counterhawks.com?subject=Use%20Doas%20Instead%20Of%20Sudo">>>> Reply To Me</a></p> <p><a href="mailto:sufyaan@counterhawks.com?subject=Use%20Doas%20Instead%20Of%20Sudo">>>> Reply To Me</a></p>

@ -18,8 +18,8 @@
</a> </a>
</a> </a>
<hr/> <hr/>
<p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href="."><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 256 256"><path fill="currentColor" d="M235.54 150.21a104.84 104.84 0 0 1-37 52.91A104 104 0 0 1 32 120a103.09 103.09 0 0 1 20.88-62.52a104.84 104.84 0 0 1 52.91-37a8 8 0 0 1 10 10a88.08 88.08 0 0 0 109.8 109.8a8 8 0 0 1 10 10Z"/></svg>Eid Mubarak!</a></p> <p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href=".">Eid Mubarak!</a></p>
<h1><svg class="titles" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 256 256"><path fill="currentColor" d="M235.54 150.21a104.84 104.84 0 0 1-37 52.91A104 104 0 0 1 32 120a103.09 103.09 0 0 1 20.88-62.52a104.84 104.84 0 0 1 52.91-37a8 8 0 0 1 10 10a88.08 88.08 0 0 0 109.8 109.8a8 8 0 0 1 10 10Z"/></svg>Eid Mubarak!</h1> <h1>Eid Mubarak!</h1>
<p style="font-size:110%">Posted on: <strong>21 April 2023</strong></p> <p style="font-size:110%">Posted on: <strong>21 April 2023</strong></p>
<p style="font-size:110%">Reading time: <strong><strong>Less than 1 min</strong> <p style="font-size:110%">Reading time: <strong><strong>Less than 1 min</strong>
<p> <p>

@ -16,14 +16,14 @@
</pre> </pre>
</a> </a>
<hr/> <hr/>
<p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href="."><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M10.5 15h3l-.575-3.225q.5-.25.788-.725T14 10q0-.825-.588-1.413T12 8q-.825 0-1.413.588T10 10q0 .575.288 1.05t.787.725L10.5 15Zm1.5 7q-3.475-.875-5.738-3.988T4 11.1V5l8-3l8 3v6.1q0 3.8-2.263 6.913T12 22Z"/></svg>How To Encrypt Emails</a></p> <p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href=".">How To Encrypt Emails</a></p>
<h1><svg class="titles" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M10.5 15h3l-.575-3.225q.5-.25.788-.725T14 10q0-.825-.588-1.413T12 8q-.825 0-1.413.588T10 10q0 .575.288 1.05t.787.725L10.5 15Zm1.5 7q-3.475-.875-5.738-3.988T4 11.1V5l8-3l8 3v6.1q0 3.8-2.263 6.913T12 22Z"/></svg>How To Encrypt Emails</h1> <h1>How To Encrypt Emails</h1>
<p style="font-size:110%">Posted on: <strong>14 March 2023</strong></p> <p style="font-size:110%">Posted on: <strong>14 March 2023</strong></p>
<p style="font-size:110%">Reading time: <strong><strong>4 min</strong> <p style="font-size:110%">Reading time: <strong><strong>4 min</strong>
<p> <p>
<p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M14 18.32A7.06 7.06 0 0 1 11.28 16H3V4h18v2.26a7.08 7.08 0 0 1 2 2.15V4a2 2 0 0 0-2-2H3a2 2 0 0 0-2 2v12a2 2 0 0 0 2 2h7v2H8v2h8v-2h-2Z"/><path fill="currentColor" d="M17 6a6 6 0 1 0 6 6a6 6 0 0 0-6-6Zm0 7.5a1.5 1.5 0 1 1 1.5-1.5a1.5 1.5 0 0 1-1.5 1.5Z"/></svg><strong>Software</strong></a> && <a style="color:#ff79c6" href="../blog/guides/"><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 512 512"><path fill="currentColor" d="M464 48c-67.61.29-117.87 9.6-154.24 25.69c-27.14 12-37.76 21.08-37.76 51.84V448c41.57-37.5 78.46-48 224-48V48ZM48 48c67.61.29 117.87 9.6 154.24 25.69c27.14 12 37.76 21.08 37.76 51.84V448c-41.57-37.5-78.46-48-224-48V48Z"/></svg><strong>Guides</strong></a></p> <p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><strong>Software</strong></a> && <a style="color:#ff79c6" href="../blog/guides/"><strong>Guides</strong></a></p>
<p>In this article, I will show you how to encrypt emails. You can encrypt emails on almost any device. In this article, however, I will be focusing on Gmail, Outlook, Yahoo. I will also be focusing on making ProtonMail encrypt emails with Gmail.</p> <p>In this article, I will show you how to encrypt emails. You can encrypt emails on almost any device. In this article, however, I will be focusing on Gmail, Outlook, Yahoo. I will also be focusing on making ProtonMail encrypt emails with Gmail.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" fill-rule="evenodd" d="M2 12C2 6.477 6.477 2 12 2s10 4.477 10 10s-4.477 10-10 10S2 17.523 2 12Zm5.5-2.5A1.5 1.5 0 0 1 9 8h.01a1.5 1.5 0 0 1 1.5 1.5v.01a1.5 1.5 0 0 1-1.5 1.5H9a1.5 1.5 0 0 1-1.5-1.5V9.5Zm6 0A1.5 1.5 0 0 1 15 8h.01a1.5 1.5 0 0 1 1.5 1.5v.01a1.5 1.5 0 0 1-1.5 1.5H15a1.5 1.5 0 0 1-1.5-1.5V9.5Z" clip-rule="evenodd"/></svg>Myths</h2> <h2>Myths</h2>
<p>Firstly, let us dispell a few myths. The first myth is a big one.</p> <p>Firstly, let us dispell a few myths. The first myth is a big one.</p>
<h3>Gmail's Confidential mode does not encrypt your emails</h3> <h3>Gmail's Confidential mode does not encrypt your emails</h3>
<p>Yes, you heard that right. Gmail's confidential mode does not encrypt your emails. Whenever I speak about email encryption, I hear something along the lines of:</p> <p>Yes, you heard that right. Gmail's confidential mode does not encrypt your emails. Whenever I speak about email encryption, I hear something along the lines of:</p>
@ -32,7 +32,7 @@
<h3>ProtonMail does not encrypt emails sent to non-ProtonMail users</h3> <h3>ProtonMail does not encrypt emails sent to non-ProtonMail users</h3>
<p>This is also a huge myth. ProtonMail encrypts emails sent to other ProtonMail users. However, they do not encrypt emails sent to or received from non-ProtonMail users. It collects less data about you and it stores your emails with encryption on their servers but the email itself is not encrypted on the other person's end.</p> <p>This is also a huge myth. ProtonMail encrypts emails sent to other ProtonMail users. However, they do not encrypt emails sent to or received from non-ProtonMail users. It collects less data about you and it stores your emails with encryption on their servers but the email itself is not encrypted on the other person's end.</p>
<p>Encryption for non-ProtonMail users works on a user-to-user basis. You have to have the encryption keys of the other person if they are a non-ProtonMail user and they also have to encrypt their emails manually. We will learn how to do this in this guide.</p> <p>Encryption for non-ProtonMail users works on a user-to-user basis. You have to have the encryption keys of the other person if they are a non-ProtonMail user and they also have to encrypt their emails manually. We will learn how to do this in this guide.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><g id="evaEmailFill0"><g id="evaEmailFill1"><path id="evaEmailFill2" fill="currentColor" d="M19 4H5a3 3 0 0 0-3 3v10a3 3 0 0 0 3 3h14a3 3 0 0 0 3-3V7a3 3 0 0 0-3-3Zm0 2l-6.5 4.47a1 1 0 0 1-1 0L5 6Z"/></g></g></svg>Online Email</h2> <h2>Online Email</h2>
<p>Encrypting your emails online is a simple process.</p> <p>Encrypting your emails online is a simple process.</p>
<h3>Step 1: Get the Mailvelope extension</h3> <h3>Step 1: Get the Mailvelope extension</h3>
<p><a href="https://mailvelope.com/">Mailvelope is a free, libre and open-source browser extension</a> which allows you to not only encrypt emails using public keys but also has a keyserver which has a list of other people who use Mailvelope. Emails sent to other people using Mailvelope will automatically be encrypted.</p> <p><a href="https://mailvelope.com/">Mailvelope is a free, libre and open-source browser extension</a> which allows you to not only encrypt emails using public keys but also has a keyserver which has a list of other people who use Mailvelope. Emails sent to other people using Mailvelope will automatically be encrypted.</p>
@ -44,7 +44,7 @@
<h3>Step 4: Send encrypted emails!</h3> <h3>Step 4: Send encrypted emails!</h3>
<p>Whenever you go to compose an email, there will be a button like the image below. Just click on it and there will be a popup to compose your encrypted email. Just fill in the info and send your email!</p> <p>Whenever you go to compose an email, there will be a button like the image below. Just click on it and there will be a popup to compose your encrypted email. Just fill in the info and send your email!</p>
<div style="text-align:center"><img src="mailvelope-2.webp" alt="Mailvelope Icon to send encrypted emails"></div> <div style="text-align:center"><img src="mailvelope-2.webp" alt="Mailvelope Icon to send encrypted emails"></div>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16"><path fill="currentColor" d="M3 2a2 2 0 0 1 2-2h6a2 2 0 0 1 2 2v12a2 2 0 0 1-2 2H5a2 2 0 0 1-2-2V2zm6 11a1 1 0 1 0-2 0a1 1 0 0 0 2 0z"/></svg>Smartphones</h2> <h2>Smartphones</h2>
<p>Firstly, I would like to give a disclaimer. There is no way to use PGP encryption on iOS. Most encryption that is used on iOS is either paid or unavailable. On Android, you cannot encrypt emails using the native applications for Gmail, Outlook or Yahoo. Even if there is such a feature, you should not use their official clients due to their invasive tracking. To encrypt emails, we will use an email app called K-9 Mail. I believe that everyone should use K-9 Mail even if they are not encrypting their emails. It is a fantastic app.</p> <p>Firstly, I would like to give a disclaimer. There is no way to use PGP encryption on iOS. Most encryption that is used on iOS is either paid or unavailable. On Android, you cannot encrypt emails using the native applications for Gmail, Outlook or Yahoo. Even if there is such a feature, you should not use their official clients due to their invasive tracking. To encrypt emails, we will use an email app called K-9 Mail. I believe that everyone should use K-9 Mail even if they are not encrypting their emails. It is a fantastic app.</p>
<p>K-9 Mail is a free and open-source email app that has a lot of features. I believe that no one should be writing emails on their phones but it is a great app to have just to make sure there is nothing urgent in your inbox.</p> <p>K-9 Mail is a free and open-source email app that has a lot of features. I believe that no one should be writing emails on their phones but it is a great app to have just to make sure there is nothing urgent in your inbox.</p>
<h3>Step 1: Get the app</h3> <h3>Step 1: Get the app</h3>
@ -58,7 +58,7 @@
<h3>Step 5: Setup K-9 Mail</h3> <h3>Step 5: Setup K-9 Mail</h3>
<p>Go back to K-9 Mail, go to settings, go to your account that you added, go to end-to-end encryption and enable it. Select your key. Turn on autocrypt mutual mode. That is it! You should see a lock icon whenever you are sending an email to someone if you have their PGP public key. If you need to import more keys, just go to the OpenKeychain app and import them.</p> <p>Go back to K-9 Mail, go to settings, go to your account that you added, go to end-to-end encryption and enable it. Select your key. Turn on autocrypt mutual mode. That is it! You should see a lock icon whenever you are sending an email to someone if you have their PGP public key. If you need to import more keys, just go to the OpenKeychain app and import them.</p>
<div style="text-align:center"><img src="k9-encryption.webp" alt="Composing an encrypted email in K-9 Mail"></div> <div style="text-align:center"><img src="k9-encryption.webp" alt="Composing an encrypted email in K-9 Mail"></div>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="m15.24 8.998l3.656-3.073v15.81H2.482C1.11 21.735 0 20.609 0 19.223V6.944l7.58 6.38a2.186 2.186 0 0 0 2.871-.042l4.792-4.284h-.003zm-5.456 3.538l1.809-1.616a2.438 2.438 0 0 1-1.178-.533L.905 2.395A.552.552 0 0 0 0 2.826v2.811l8.226 6.923a1.186 1.186 0 0 0 1.558-.024zM23.871 2.463a.551.551 0 0 0-.776-.068l-3.199 2.688v16.653h1.623c1.371 0 2.481-1.127 2.481-2.513V2.824a.551.551 0 0 0-.129-.36z"/></svg>Exporting ProtonMail Keys</h2> <h2>Exporting ProtonMail Keys</h2>
<p>To export your ProtonMail public keys, follow these steps.</p> <p>To export your ProtonMail public keys, follow these steps.</p>
<ol> <ol>
<li>Login to your ProtonMail account</li> <li>Login to your ProtonMail account</li>
@ -69,7 +69,7 @@
<p>The image below is how it looks like in 2023.</p> <p>The image below is how it looks like in 2023.</p>
<div style="text-align:center"><img src="protonmail-key-export.webp" alt="ProtonMail Key Export Dashboard"></div> <div style="text-align:center"><img src="protonmail-key-export.webp" alt="ProtonMail Key Export Dashboard"></div>
<p>You can now send these keys to anyone to import into their PGP keychain. They will then be able to encrypt emails when sending them to your ProtonMail address!</p> <p>You can now send these keys to anyone to import into their PGP keychain. They will then be able to encrypt emails when sending them to your ProtonMail address!</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M6.012 18H21V4a2 2 0 0 0-2-2H6c-1.206 0-3 .799-3 3v14c0 2.201 1.794 3 3 3h15v-2H6.012C5.55 19.988 5 19.805 5 19s.55-.988 1.012-1zM8 6h9v2H8V6z"/></svg>Conclusion</h2> <h2>Conclusion</h2>
<p>That is it! You have setup encryption on your emails. This is a great step as email itself is very unsecure, so this will boost your privacy and security by a lot. Sharing passwords through email has never been safe but encryption allows you to do it with a good range of security.</p> <p>That is it! You have setup encryption on your emails. This is a great step as email itself is very unsecure, so this will boost your privacy and security by a lot. Sharing passwords through email has never been safe but encryption allows you to do it with a good range of security.</p>
<p><a href="mailto:sufyaan@counterhawks.com?subject=How%20To%20Encrypt%20Emails">>>> Reply To Me</a></p> <p><a href="mailto:sufyaan@counterhawks.com?subject=How%20To%20Encrypt%20Emails">>>> Reply To Me</a></p>
<p><a href="email.pdf">>>> Download PDF</a></p> <p><a href="email.pdf">>>> Download PDF</a></p>

@ -18,17 +18,17 @@
</pre> </pre>
</a> </a>
<hr/><p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href=".">Switching To FFmpeg</a></p> <hr/><p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href=".">Switching To FFmpeg</a></p>
<h1><svg class="titles" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M21.72 17.91V6.5l-.53-.49L9.05 18.52l-1.29-.06L24 1.53l-.33-.95l-11.93 1l-5.75 6.6v-.23l4.7-5.39l-1.38-.77l-9.11.77v2.85l1.91.46v.01l.19-.01l-.56.66v10.6c.609-.126 1.22-.241 1.83-.36L14.12 5.22l.83-.04L0 21.44l9.67.82l1.35-.77l6.82-6.74v2.15l-5.72 5.57l11.26.95l.35-.94v-3.16l-3.29-.18a64.66 64.66 0 0 0 1.28-1.23z"/></svg>Switching To FFmpeg</h1> <h1>Switching To FFmpeg</h1>
<p style="font-size:110%">Posted on: <strong>1 June 2023</strong></p><p style="font-size:110%">Reading time: <strong><strong>2 min</strong><p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M14 18.32A7.06 7.06 0 0 1 11.28 16H3V4h18v2.26a7.08 7.08 0 0 1 2 2.15V4a2 2 0 0 0-2-2H3a2 2 0 0 0-2 2v12a2 2 0 0 0 2 2h7v2H8v2h8v-2h-2Z"/><path fill="currentColor" d="M17 6a6 6 0 1 0 6 6a6 6 0 0 0-6-6Zm0 7.5a1.5 1.5 0 1 1 1.5-1.5a1.5 1.5 0 0 1-1.5 1.5Z"/></svg><strong>Software</strong></a></p> <p style="font-size:110%">Posted on: <strong>1 June 2023</strong></p><p style="font-size:110%">Reading time: <strong><strong>2 min</strong><p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><strong>Software</strong></a></p>
<p>I just started using <a href="https://ffmpeg.org/">FFmpeg</a>... and it is <strong>AMAZING!</strong> When I mean amazing, I really mean amazing.</p> <p>I just started using <a href="https://ffmpeg.org/">FFmpeg</a>... and it is <strong>AMAZING!</strong> When I mean amazing, I really mean amazing.</p>
<p>For those of you who do not know what FFmpeg is, it is basically a command-line application that can be installed on all platforms that is basically the Swiss army knife of videos, audio files and images. It merges almost every single codec, encoders and decoders, filters and more in a single application allowing for fast access and modularity.</p> <p>For those of you who do not know what FFmpeg is, it is basically a command-line application that can be installed on all platforms that is basically the Swiss army knife of videos, audio files and images. It merges almost every single codec, encoders and decoders, filters and more in a single application allowing for fast access and modularity.</p>
<p>FFmpeg is one of those tools which have impacted your life without you realising it. Whenever you watch a movie, show or any piece of edited or converted content, there is an extremely high change that FFmpeg was involved.</p> <p>FFmpeg is one of those tools which have impacted your life without you realising it. Whenever you watch a movie, show or any piece of edited or converted content, there is an extremely high change that FFmpeg was involved.</p>
<p>You may say:</p><p><em>"Bu.. But I use a video editor and online file converters! Those are not FFmpeg!"</em></p> <p>You may say:</p><p><em>"Bu.. But I use a video editor and online file converters! Those are not FFmpeg!"</em></p>
<p>Most file converters and video editors use at least some FFmpeg. Many websites like YouTube and WhatsApp use FFmpeg directly when they need to compress a video.</p> <p>Most file converters and video editors use at least some FFmpeg. Many websites like YouTube and WhatsApp use FFmpeg directly when they need to compress a video.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16"><path fill="currentColor" fill-rule="evenodd" d="M8 16A8 8 0 1 0 8 0a8 8 0 0 0 0 16ZM4.927 4.99c-.285.429-.427.853-.427 1.27c0 .203.09.392.27.566c.18.174.4.26.661.26c.443 0 .744-.248.903-.746c.168-.475.373-.835.616-1.08c.243-.244.62-.366 1.134-.366c.439 0 .797.12 1.075.363c.277.242.416.54.416.892a.97.97 0 0 1-.136.502a1.91 1.91 0 0 1-.336.419a14.35 14.35 0 0 1-.648.558c-.34.282-.611.525-.812.73c-.2.205-.362.443-.483.713c-.322 1.245 1.35 1.345 1.736.456c.047-.086.118-.18.213-.284c.096-.103.223-.223.382-.36a41.14 41.14 0 0 0 1.194-1.034c.221-.204.412-.448.573-.73a1.95 1.95 0 0 0 .242-.984c0-.475-.141-.915-.424-1.32c-.282-.406-.682-.726-1.2-.962c-.518-.235-1.115-.353-1.792-.353c-.728 0-1.365.14-1.911.423c-.546.282-.961.637-1.246 1.066Zm2.14 7.08a1 1 0 1 0 2 0a1 1 0 0 0-2 0Z" clip-rule="evenodd"/></svg>Why?</h2> <h2>Why?</h2>
<p>The reason I switched is because of its versatility. You can create a single command to record your screen in lossless quality, save the original file in '.mov', the audio in '.mp3' format in another folder, encode a '.mp4' file, transcode it to be played on Android and trim a specific part of the video and send it to a server that you own.</p> <p>The reason I switched is because of its versatility. You can create a single command to record your screen in lossless quality, save the original file in '.mov', the audio in '.mp3' format in another folder, encode a '.mp4' file, transcode it to be played on Android and trim a specific part of the video and send it to a server that you own.</p>
<p>FFmpeg is a difficult program to learn but the rewards are worth it. I currently have a command that records my screen, converts the audio in the recording from stereo to mono and finally encode it in <a style="color:#50fa7b" href="../definitions/h264">H.264</a> for ultimate compatibility.</p> <p>FFmpeg is a difficult program to learn but the rewards are worth it. I currently have a command that records my screen, converts the audio in the recording from stereo to mono and finally encode it in <a style="color:#50fa7b" href="../definitions/h264">H.264</a> for ultimate compatibility.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M6.012 18H21V4a2 2 0 0 0-2-2H6c-1.206 0-3 .799-3 3v14c0 2.201 1.794 3 3 3h15v-2H6.012C5.55 19.988 5 19.805 5 19s.55-.988 1.012-1zM8 6h9v2H8V6z"/></svg>To Close The File...</h2> <h2>To Close The File...</h2>
<p>All in all, you should learn FFmpeg if you do even a little amount of multimedia manipulation. It will help you out immensely.</p> <p>All in all, you should learn FFmpeg if you do even a little amount of multimedia manipulation. It will help you out immensely.</p>
<a href="https://ffmpeg.org/"><div style="text-align:center;"><img src="../blog/images/ffmpeg.gif" style="width:81px;"></div></a> <a href="https://ffmpeg.org/"><div style="text-align:center;"><img src="../blog/images/ffmpeg.gif" style="width:81px;"></div></a>
<p><a href="mailto:sufyaan@counterhawks.com?subject=Switching%20To%20FFmpeg">>>> Reply To Me</a></p> <p><a href="mailto:sufyaan@counterhawks.com?subject=Switching%20To%20FFmpeg">>>> Reply To Me</a></p>

@ -17,28 +17,28 @@
______| |_____| | | | | | | | \_| ______| |_____| | | | | | | | \_|
</pre> </pre>
</a> </a>
<hr/><p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href="."><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M12 2A10 10 0 0 0 2 12c0 4.42 2.87 8.17 6.84 9.5c.5.08.66-.23.66-.5v-1.69c-2.77.6-3.36-1.34-3.36-1.34c-.46-1.16-1.11-1.47-1.11-1.47c-.91-.62.07-.6.07-.6c1 .07 1.53 1.03 1.53 1.03c.87 1.52 2.34 1.07 2.91.83c.09-.65.35-1.09.63-1.34c-2.22-.25-4.55-1.11-4.55-4.92c0-1.11.38-2 1.03-2.71c-.1-.25-.45-1.29.1-2.64c0 0 .84-.27 2.75 1.02c.79-.22 1.65-.33 2.5-.33c.85 0 1.71.11 2.5.33c1.91-1.29 2.75-1.02 2.75-1.02c.55 1.35.2 2.39.1 2.64c.65.71 1.03 1.6 1.03 2.71c0 3.82-2.34 4.66-4.57 4.91c.36.31.69.92.69 1.85V21c0 .27.16.59.67.5C19.14 20.16 22 16.42 22 12A10 10 0 0 0 12 2Z"/></svg>Don't Use GitHub</a></p> <hr/><p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href=".">Don't Use GitHub</a></p>
<h1><svg class="titles" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M12 2A10 10 0 0 0 2 12c0 4.42 2.87 8.17 6.84 9.5c.5.08.66-.23.66-.5v-1.69c-2.77.6-3.36-1.34-3.36-1.34c-.46-1.16-1.11-1.47-1.11-1.47c-.91-.62.07-.6.07-.6c1 .07 1.53 1.03 1.53 1.03c.87 1.52 2.34 1.07 2.91.83c.09-.65.35-1.09.63-1.34c-2.22-.25-4.55-1.11-4.55-4.92c0-1.11.38-2 1.03-2.71c-.1-.25-.45-1.29.1-2.64c0 0 .84-.27 2.75 1.02c.79-.22 1.65-.33 2.5-.33c.85 0 1.71.11 2.5.33c1.91-1.29 2.75-1.02 2.75-1.02c.55 1.35.2 2.39.1 2.64c.65.71 1.03 1.6 1.03 2.71c0 3.82-2.34 4.66-4.57 4.91c.36.31.69.92.69 1.85V21c0 .27.16.59.67.5C19.14 20.16 22 16.42 22 12A10 10 0 0 0 12 2Z"/></svg>Don't Use GitHub</h1> <h1>Don't Use GitHub</h1>
<p style="font-size:110%">Posted on: <strong>27 May 2023</strong></p><p style="font-size:110%">Reading time: <strong><strong>3 min</strong><p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M14 18.32A7.06 7.06 0 0 1 11.28 16H3V4h18v2.26a7.08 7.08 0 0 1 2 2.15V4a2 2 0 0 0-2-2H3a2 2 0 0 0-2 2v12a2 2 0 0 0 2 2h7v2H8v2h8v-2h-2Z"/><path fill="currentColor" d="M17 6a6 6 0 1 0 6 6a6 6 0 0 0-6-6Zm0 7.5a1.5 1.5 0 1 1 1.5-1.5a1.5 1.5 0 0 1-1.5 1.5Z"/></svg><strong>Software</strong></a></p> <p style="font-size:110%">Posted on: <strong>27 May 2023</strong></p><p style="font-size:110%">Reading time: <strong><strong>3 min</strong><p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><strong>Software</strong></a></p>
<p>If you are a developer, programmer or a coder who works with open-source software, you must have clicked this post in shock. First off, I would like to state that I am not telling everyone to stop making open-source software. What I am trying to say is that GitHub is one of the worst <a style="color:#50fa7b" href="../definitions/git">Git</a> platforms to host your projects. We will cover why in this post.</p> <p>If you are a developer, programmer or a coder who works with open-source software, you must have clicked this post in shock. First off, I would like to state that I am not telling everyone to stop making open-source software. What I am trying to say is that GitHub is one of the worst <a style="color:#50fa7b" href="../definitions/git">Git</a> platforms to host your projects. We will cover why in this post.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 1200 1200"><path fill="currentColor" d="M600.073 17.426C268.728 17.426 0 286.008 0 617.353c0 260.49 166.117 482.172 398.146 565.076L546.04 791.313c-74.269-23.013-128.273-92.136-128.273-173.96c0-100.646 81.661-182.307 182.308-182.307c100.646 0 182.16 81.66 182.16 182.307c0 81.888-53.952 151.147-128.273 174.106l147.896 391.115C1033.938 1099.72 1200 877.909 1200 617.353c0-331.345-268.581-599.927-599.927-599.927z"/></svg>Freedom!</h2> <h2>Freedom!</h2>
<p>Simply put, GitHub uses <a style="color:#50fa7b" href="../definitions/non-free">non-free</a> software and <a style="color:#50fa7b" href="../definitions/non-free">non-free</a> JavaScript on their website. It is shockingly ironic that the biggest open-source platform for anyone to use is itself a proprietary piece of software. It is also centralised, for-profit and politically active, which are all completely against free, libre and open-source software. These factors make it similar to SourceForge, which was abandoned by most of its users because of this very reason.</p> <p>Simply put, GitHub uses <a style="color:#50fa7b" href="../definitions/non-free">non-free</a> software and <a style="color:#50fa7b" href="../definitions/non-free">non-free</a> JavaScript on their website. It is shockingly ironic that the biggest open-source platform for anyone to use is itself a proprietary piece of software. It is also centralised, for-profit and politically active, which are all completely against free, libre and open-source software. These factors make it similar to SourceForge, which was abandoned by most of its users because of this very reason.</p>
<p>If everyone stops using GitHub and moves to better alternatives like <a href="https://codeberg.org/">Codeberg</a>, <a href="https://gitlab.com/">GitLab</a> or even a <a style="color:#50fa7b" href="../definitions/self-host">self-hosted</a> <a style="color:#50fa7b" href="../definitions/git">Git</a> instance, then GitHub will fall. Many people may be seething at me suggesting <a href="https://gitlab.com/">GitLab</a>, but the truth is that <a href="https://gitlab.com/">GitLab</a> is still open-source and uses free JavaScript instead of <a style="color:#50fa7b" href="../definitions/non-free">non-free</a> JavaScript on their website. It is certainly not the best option, but it is miles ahead of GitHub.</p> <p>If everyone stops using GitHub and moves to better alternatives like <a href="https://codeberg.org/">Codeberg</a>, <a href="https://gitlab.com/">GitLab</a> or even a <a style="color:#50fa7b" href="../definitions/self-host">self-hosted</a> <a style="color:#50fa7b" href="../definitions/git">Git</a> instance, then GitHub will fall. Many people may be seething at me suggesting <a href="https://gitlab.com/">GitLab</a>, but the truth is that <a href="https://gitlab.com/">GitLab</a> is still open-source and uses free JavaScript instead of <a style="color:#50fa7b" href="../definitions/non-free">non-free</a> JavaScript on their website. It is certainly not the best option, but it is miles ahead of GitHub.</p>
<p><a href="https://codeberg.org/">Codeberg</a> is entirely <a style="color:#50fa7b" href="../definitions/free-software">free software</a> and it is a great option for most people. It works in a similar way to GitHub so it is trivial for individuals to migrate. <a href="https://sr.ht/">SourceHut</a> is also amazing. It is just as good as GitHub and much better for your rights. Self-hosting a <a href="https://forgejo.org/">Forgejo</a> or <a href="https://gitea.io/">Gitea</a> instance is one of the best options as it offers complete independence. <a style="color:#50fa7b" href="../definitions/git">Git</a> is the underlying technology which anyone can use. Therefore, everyone should be independent in using it.</p> <p><a href="https://codeberg.org/">Codeberg</a> is entirely <a style="color:#50fa7b" href="../definitions/free-software">free software</a> and it is a great option for most people. It works in a similar way to GitHub so it is trivial for individuals to migrate. <a href="https://sr.ht/">SourceHut</a> is also amazing. It is just as good as GitHub and much better for your rights. Self-hosting a <a href="https://forgejo.org/">Forgejo</a> or <a href="https://gitea.io/">Gitea</a> instance is one of the best options as it offers complete independence. <a style="color:#50fa7b" href="../definitions/git">Git</a> is the underlying technology which anyone can use. Therefore, everyone should be independent in using it.</p>
<p>This is the reason I have a website. Everyone should have a website as it gives you independence on the web.</p> <p>This is the reason I have a website. Everyone should have a website as it gives you independence on the web.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M17.66 11.2c-.23-.3-.51-.56-.77-.82c-.67-.6-1.43-1.03-2.07-1.66C13.33 7.26 13 4.85 13.95 3c-.95.23-1.78.75-2.49 1.32c-2.59 2.08-3.61 5.75-2.39 8.9c.04.1.08.2.08.33c0 .22-.15.42-.35.5c-.23.1-.47.04-.66-.12a.58.58 0 0 1-.14-.17c-1.13-1.43-1.31-3.48-.55-5.12C5.78 10 4.87 12.3 5 14.47c.06.5.12 1 .29 1.5c.14.6.41 1.2.71 1.73c1.08 1.73 2.95 2.97 4.96 3.22c2.14.27 4.43-.12 6.07-1.6c1.83-1.66 2.47-4.32 1.53-6.6l-.13-.26c-.21-.46-.77-1.26-.77-1.26m-3.16 6.3c-.28.24-.74.5-1.1.6c-1.12.4-2.24-.16-2.9-.82c1.19-.28 1.9-1.16 2.11-2.05c.17-.8-.15-1.46-.28-2.23c-.12-.74-.1-1.37.17-2.06c.19.38.39.76.63 1.06c.77 1 1.98 1.44 2.24 2.8c.04.14.06.28.06.43c.03.82-.33 1.72-.93 2.27Z"/></svg>Embrace, Extend, Extinguish</h2> <h2>Embrace, Extend, Extinguish</h2>
<p>Microsoft's strategy against open-source has always been to embrace, extend and extinguish. They have tried to do it before with <strong>Linux</strong> when it was being popularized among developers. Now, they are using Copilot to do so, which is an AI tool that can autocomplete code for you. The main issue with it is that they trained it all on open-source code without giving any credit to the original developers. GitHub's Copilot is now being used to help code for-profit and close-source programs.</p> <p>Microsoft's strategy against open-source has always been to embrace, extend and extinguish. They have tried to do it before with <strong>Linux</strong> when it was being popularized among developers. Now, they are using Copilot to do so, which is an AI tool that can autocomplete code for you. The main issue with it is that they trained it all on open-source code without giving any credit to the original developers. GitHub's Copilot is now being used to help code for-profit and close-source programs.</p>
<p>Essentially, this results in open-source programs being used to grow close-source programs.</p> <p>Essentially, this results in open-source programs being used to grow close-source programs.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 256 256"><path fill="currentColor" d="M128 20a108 108 0 1 0 108 108A108.12 108.12 0 0 0 128 20Zm0 192a84 84 0 1 1 84-84a84.09 84.09 0 0 1-84 84Zm52-84a52 52 0 0 1-93.59 31.21a12 12 0 1 1 19.18-14.41a28 28 0 1 0 0-33.6a12 12 0 1 1-19.18-14.41A52 52 0 0 1 180 128Z"/></svg>Copyleft? What's that?</h2> <h2>Copyleft? What's that?</h2>
<p>Microsoft and GitHub's multiple CEOs have kept on speaking negatively about copyleft. This includes GitHub's founder and former CEO. <a href="https://www.youtube.com/watch?v=-bAAlPXB2-c">Their OSCON keynote was meant for attacking copyleft and the GPL, trying to discourage the use of free software.</a> Instead, they suggest the MIT license using which many megacorporations exploit people's code without any credit.</p> <p>Microsoft and GitHub's multiple CEOs have kept on speaking negatively about copyleft. This includes GitHub's founder and former CEO. <a href="https://www.youtube.com/watch?v=-bAAlPXB2-c">Their OSCON keynote was meant for attacking copyleft and the GPL, trying to discourage the use of free software.</a> Instead, they suggest the MIT license using which many megacorporations exploit people's code without any credit.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16"><path fill="currentColor" d="M7.462 0H0v7.19h7.462V0zM16 0H8.538v7.19H16V0zM7.462 8.211H0V16h7.462V8.211zm8.538 0H8.538V16H16V8.211z"/></svg>Microsoft Owns It</h2> <h2>Microsoft Owns It</h2>
<p>There are many people who suggest using alternatives to products offered by big corporations and they are mostly right. Big corporations are able to give you free products because they profit off of your data. They are not trying to be kind.</p> <p>There are many people who suggest using alternatives to products offered by big corporations and they are mostly right. Big corporations are able to give you free products because they profit off of your data. They are not trying to be kind.</p>
<p>For example, look at Google. They offer a search engine, documents storage, free email, cloud storage, a video site with billions of videos, a meeting platform and much more. They are not doing this to help people. They are doing this to harvest your data and sell it to the highest bidder.</p> <p>For example, look at Google. They offer a search engine, documents storage, free email, cloud storage, a video site with billions of videos, a meeting platform and much more. They are not doing this to help people. They are doing this to harvest your data and sell it to the highest bidder.</p>
<p>Microsoft? Windows, Xbox and GitHub are not tools offered out of their sympathy towards you. All of it is for their own profit, whether it be collecting your data in Windows or preventing distribution of truly <a style="color:#50fa7b" href="../definitions/free-software">free software</a> on GitHub.</p> <p>Microsoft? Windows, Xbox and GitHub are not tools offered out of their sympathy towards you. All of it is for their own profit, whether it be collecting your data in Windows or preventing distribution of truly <a style="color:#50fa7b" href="../definitions/free-software">free software</a> on GitHub.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M4 1h16a1 1 0 0 1 1 1v4a1 1 0 0 1-1 1H8.82l-2-2H7V3H5v.18L3.21 1.39C3.39 1.15 3.68 1 4 1m18 21.72L20.73 24l-1-1H4a1 1 0 0 1-1-1v-4a1 1 0 0 1 1-1h9.73l-2-2H4a1 1 0 0 1-1-1v-4a1 1 0 0 1 1-1h1.73L3.68 6.95c-.3-.1-.53-.33-.63-.63L1 4.27L2.28 3L22 22.72M20 9a1 1 0 0 1 1 1v4a1 1 0 0 1-1 1h-3.18l-6-6H20m0 8a1 1 0 0 1 1 1v1.18L18.82 17H20M9 5h1V3H9v2m0 8h.73L9 12.27V13m0 8h1v-2H9v2M5 11v2h2v-2H5m0 8v2h2v-2H5Z"/></svg>"Don't Do It Yourself!"</h2> <h2>"Don't Do It Yourself!"</h2>
<p>GitHub is perhaps the only Git platform that has no option to <a style="color:#50fa7b" href="../definitions/self-host">self-host</a>. You do not know what is running on their servers and cannot know what is happening with your code.</p> <p>GitHub is perhaps the only Git platform that has no option to <a style="color:#50fa7b" href="../definitions/self-host">self-host</a>. You do not know what is running on their servers and cannot know what is happening with your code.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M6.012 18H21V4a2 2 0 0 0-2-2H6c-1.206 0-3 .799-3 3v14c0 2.201 1.794 3 3 3h15v-2H6.012C5.55 19.988 5 19.805 5 19s.55-.988 1.012-1zM8 6h9v2H8V6z"/></svg>Conclusion</h2> <h2>Conclusion</h2>
<p>Please don't use GitHub. Just use alternatives or self-host it. GitHub does have a lot of projects but if you use it, it brings them closer towards extinguishing open-source.</p> <p>Please don't use GitHub. Just use alternatives or self-host it. GitHub does have a lot of projects but if you use it, it brings them closer towards extinguishing open-source.</p>
<p><a href="mailto:sufyaan@counterhawks.com?subject=Don't%20Use%20GitHub">>>> Reply To Me</a></p> <p><a href="mailto:sufyaan@counterhawks.com?subject=Don't%20Use%20GitHub">>>> Reply To Me</a></p>
<p><a href="github.pdf">>>> Download PDF</a></p> <p><a href="github.pdf">>>> Download PDF</a></p>

@ -25,30 +25,19 @@
<h2 class="pane">Useful Pages</h2> <h2 class="pane">Useful Pages</h2>
<ul class="pane"> <ul class="pane">
<li> <li>
<a style="color:#bd93f9" href="blog/"> <a style="color:#bd93f9" href="blog/">Blog</a>
<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24">
<path fill="currentColor" fill-rule="evenodd" d="M2 6a3 3 0 0 1 3-3h14a3 3 0 0 1 3 3v12a3 3 0 0 1-3 3H5a3 3 0 0 1-3-3V6zm5 1a1 1 0 0 0-1 1v4a1 1 0 0 0 1 1h4a1 1 0 0 0 1-1V8a1 1 0 0 0-1-1H7zm1 4V9h2v2H8zm7-4a1 1 0 1 0 0 2h2a1 1 0 1 0 0-2h-2zm0 4a1 1 0 1 0 0 2h2a1 1 0 1 0 0-2h-2zm-8 4a1 1 0 1 0 0 2h10a1 1 0 1 0 0-2H7z" clip-rule="evenodd"/>
</svg>Blog</a>
[ <a style="color:#bd93f9" href="rss.xml">RSS</a> ] [ <a style="color:#bd93f9" href="rss.xml">RSS</a> ]
</li> </li>
<li> <li>
<a style="color:#ffb86c" href="about/"> <a style="color:#ffb86c" href="about/">About Me</a>
<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24">
<path fill="currentColor" d="M12 4a4 4 0 0 1 4 4a4 4 0 0 1-4 4a4 4 0 0 1-4-4a4 4 0 0 1 4-4m0 10c4.42 0 8 1.79 8 4v2H4v-2c0-2.21 3.58-4 8-4Z"/>
</svg>About Me</a>
</li> </li>
<li> <li>
<a style="color:#ff5555" href="links/"> <a style="color:#ff5555" href="links/">
<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"> Links To Useful Websites
<path fill="currentColor" d="m13.06 8.11l1.415 1.415a7 7 0 0 1 0 9.9l-.354.353a7 7 0 1 1-9.9-9.9l1.415 1.415a5 5 0 0 0 7.07 7.07l.354-.353a5 5 0 0 0 0-7.07l-1.414-1.415L13.06 8.11Zm6.718 6.011l-1.414-1.414a5 5 0 0 0-7.071-7.071l-.354.353a5 5 0 0 0 0 7.071l1.414 1.415l-1.414 1.414l-1.414-1.414a7 7 0 0 1 0-9.9l.353-.353a7 7 0 0 1 9.9 9.9Z"/>
</svg>Links To Useful Websites
</a> </a>
</li> </li>
<li> <li>
<a style="color:#50fa7b" href="definitions/"> <a style="color:#50fa7b" href="definitions/">Definitions To Technical Terms
<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24">
<path fill="currentColor" d="M18 2H6c-1.1 0-2 .9-2 2v16c0 1.1.9 2 2 2h12c1.1 0 2-.9 2-2V4c0-1.1-.9-2-2-2zM6 4h5v8l-2.5-1.5L6 12V4z"/>
</svg>Definitions To Technical Terms
</a> </a>
</li> </li>
</ul> </ul>
@ -56,54 +45,35 @@
<div class="column"> <div class="column">
<h2 class="pane">Latest Posts</h2> <h2 class="pane">Latest Posts</h2>
<ul class="pane"> <ul class="pane">
<li><a style="color:#bd93f9" href="domain/"><svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M20 4H4c-1.1 0-1.99.9-1.99 2L2 18c0 1.1.9 2 2 2h16c1.1 0 2-.9 2-2V6c0-1.1-.9-2-2-2zm0 4l-8 5l-8-5V6l8 5l8-5v2z"/></svg>Domain, Email & PGP Keys Changed</a></li> <li><a style="color:#bd93f9" href="domain/">Domain, Email & PGP Keys Changed</a></li>
<li><a style="color:#bd93f9" href="students/"><svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M2 5.27L3.28 4L20 20.72L18.73 22l-6-6H9v-2l.79-.94L2 5.27M23 12h-6v-2l3.39-4H17V4h6v2l-3.38 4H23v2M9.82 8H15v2l-1.46 1.72L9.82 8M7 20H1v-2l3.39-4H1v-2h6v2l-3.38 4H7v2Z"/> </svg>A Student's Nightmare </a> </li> <li><a style="color:#bd93f9" href="students/">A Student's Nightmare </a> </li>
<li><a style="color:#bd93f9" href="ask/"><svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><g fill="none"><path d="M24 0v24H0V0h24ZM12.593 23.258l-.011.002l-.071.035l-.02.004l-.014-.004l-.071-.035c-.01-.004-.019-.001-.024.005l-.004.01l-.017.428l.005.02l.01.013l.104.074l.015.004l.012-.004l.104-.074l.012-.016l.004-.017l-.017-.427c-.002-.01-.009-.017-.017-.018Zm.265-.113l-.013.002l-.185.093l-.01.01l-.003.011l.018.43l.005.012l.008.007l.201.093c.012.004.023 0 .029-.008l.004-.014l-.034-.614c-.003-.012-.01-.02-.02-.022Zm-.715.002a.023.023 0 0 0-.027.006l-.006.014l-.034.614c0 .012.007.02.017.024l.015-.002l.201-.093l.01-.008l.004-.011l.017-.43l-.003-.012l-.01-.01l-.184-.092Z"/><path fill="currentColor" d="M20 4a2 2 0 0 1 1.995 1.85L22 6v12a2 2 0 0 1-1.85 1.995L20 20H4a2 2 0 0 1-1.995-1.85L2 18V6a2 2 0 0 1 1.85-1.995L4 4h16Zm-3 11H7a1 1 0 0 0-.117 1.993L7 17h10a1 1 0 0 0 .117-1.993L17 15Zm-4.5-4h-1a1 1 0 0 0-.117 1.993L11.5 13h1a1 1 0 0 0 .117-1.993L12.5 11ZM8 11H7a1 1 0 1 0 0 2h1a1 1 0 1 0 0-2Zm9 0h-1a1 1 0 1 0 0 2h1a1 1 0 1 0 0-2Zm0-4h-1a1 1 0 0 0-.117 1.993L16 9h1a1 1 0 0 0 .117-1.993L17 7Zm-4.5 0h-1a1 1 0 1 0 0 2h1a1 1 0 1 0 0-2ZM8 7H7a1 1 0 0 0 0 2h1a1 1 0 0 0 0-2Z"/></g></svg>Use AnySoftKeyboard</a></li> <li><a style="color:#bd93f9" href="ask/">Use AnySoftKeyboard</a></li>
<li><a style="color:#bd93f9" href="forget/"><svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M11 2.535A4 4 0 0 0 5 6v1.774c-.851.342-1.549.874-2.059 1.575C2.292 10.242 2 11.335 2 12.5c0 1.561.795 2.936 2 3.742V17.5a4.5 4.5 0 0 0 7 3.742V17.5c0-1.333-.33-2.185-.86-2.76c-.543-.587-1.424-1.024-2.804-1.254l.328-1.972c1.302.216 2.442.623 3.336 1.313V2.535Zm2 0v10.292c.894-.69 2.034-1.097 3.336-1.313l.328 1.972c-1.38.23-2.261.667-2.804 1.255c-.53.574-.86 1.426-.86 2.759v3.742a4.5 4.5 0 0 0 7-3.742v-1.258c1.205-.806 2-2.18 2-3.742c0-1.165-.292-2.258-.941-3.15c-.51-.702-1.208-1.234-2.059-1.576V6a4 4 0 0 0-6-3.465Z"/></svg>Forget Your Passwords</a></li> <li><a style="color:#bd93f9" href="forget/">Forget Your Passwords</a></li>
<li><a style="color:#bd93f9" href="pgp/"><svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M9 5.82L7.36 4.16A4.987 4.987 0 0 1 12 1c2.76 0 5 2.24 5 5v2h1a2 2 0 0 1 2 2v6.8L11.2 8H15V6c0-1.66-1.34-3-3-3c-1.59 0-2.89 1.25-3 2.82m13.11 15.64l-1.27 1.27l-1.38-1.38c-.36.4-.88.65-1.46.65H6c-1.11 0-2-.89-2-2V10a2 2 0 0 1 2-2h.11l-5-5l1.28-1.27l19.72 19.73m-8.26-5.72l-2.59-2.59C10.5 13.44 10 14.16 10 15a2 2 0 0 0 2 2c.84 0 1.56-.5 1.85-1.26Z"/></svg>PGP KEYS CHANGED!</a></li> <li><a style="color:#bd93f9" href="pgp/">PGP KEYS CHANGED!</a></li>
<li><a style="color:#bd93f9" href="blog/"><svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 32 32"><path fill="currentColor" d="M11.166 23.963L22.36 17.5c1.43-.824 1.43-2.175 0-3L11.165 8.037c-1.43-.826-2.598-.15-2.598 1.5v12.926c0 1.65 1.17 2.326 2.598 1.5z"/></svg>View More</a></li> <li><a style="color:#bd93f9" href="blog/">View More</a></li>
</ul> </ul>
</div> </div>
<div class="column"> <div class="column">
<h2 class="pane">Interesting Stuff</h2> <h2 class="pane">Interesting Stuff</h2>
<ul class="pane"> <ul class="pane">
<li> <li>
<a style="color:#bd93f9" href="uses/"> <a style="color:#bd93f9" href="uses/">Tools I Use
<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 512 512">
<path fill="none" d="M336 80H176a16 16 0 0 0-16 16v16h192V96a16 16 0 0 0-16-16Z"/>
<path fill="currentColor" d="M496 176a64.07 64.07 0 0 0-64-64h-48V96a48.05 48.05 0 0 0-48-48H176a48.05 48.05 0 0 0-48 48v16H80a64.07 64.07 0 0 0-64 64v48h480Zm-144-64H160V96a16 16 0 0 1 16-16h160a16 16 0 0 1 16 16Zm-16 152a24 24 0 0 1-24 24H200a24 24 0 0 1-24-24v-4a4 4 0 0 0-4-4H16v144a64 64 0 0 0 64 64h352a64 64 0 0 0 64-64V256H340a4 4 0 0 0-4 4Z"/>
</svg>Tools I Use
</a> </a>
</li> </li>
<li> <li>
<a style="color:#bd93f9" href="browser/"> <a style="color:#bd93f9" href="browser/">Browser Setup
<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24">
<path fill="currentColor" d="M12.001 2c5.523 0 10 4.477 10 10s-4.477 10-10 10s-10-4.477-10-10c0-1.463.314-2.854.88-4.106c.466-.939 1.233-1.874 1.85-2.194c-.653 1.283-.973 2.54-1.04 3.383c.454-1.5 1.315-2.757 2.52-3.644c2.066-1.519 4.848-1.587 5.956-.62c-2.056.707-4.296 3.548-3.803 6.876c.08.55.245 1.083.489 1.582c-.384-1.01-.418-2.433.202-3.358c.692-1.03 1.678-1.248 2.206-1.136c-.208-.044-.668.836-.736.991a2.97 2.97 0 0 0-.251 1.25a3.394 3.394 0 0 0 1.03 2.38c1.922 1.871 5.023 1.135 6.411-1.002c.954-1.471 1.07-3.968-.154-5.952a6.916 6.916 0 0 0-1.084-1.32c-1.85-1.766-4.48-2.57-6.982-2.205c-1.106.177-2.047.496-2.824.956C7.756 2.798 9.912 2 12 2Z"/>
</svg>Browser Setup
</a> </a>
</li> </li>
<li> <li>
<a style="color:#bd93f9" href="kpst/"> <a style="color:#bd93f9" href="kpst/">Password Manager Setup
<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24">
<path fill="currentColor" fill-rule="evenodd" d="M22 8.293c0 3.476-2.83 6.294-6.32 6.294c-.636 0-2.086-.146-2.791-.732l-.882.878c-.519.517-.379.669-.148.919c.096.105.208.226.295.399c0 0 .735 1.024 0 2.049c-.441.585-1.676 1.404-3.086 0l-.294.292s.881 1.025.147 2.05c-.441.585-1.617 1.17-2.646.146l-1.028 1.024c-.706.703-1.568.293-1.91 0l-.883-.878c-.823-.82-.343-1.708 0-2.05l7.642-7.61s-.735-1.17-.735-2.78c0-3.476 2.83-6.294 6.32-6.294S22 4.818 22 8.293Zm-6.319 2.196a2.2 2.2 0 0 0 2.204-2.195a2.2 2.2 0 0 0-2.204-2.196a2.2 2.2 0 0 0-2.204 2.196a2.2 2.2 0 0 0 2.204 2.195Z" clip-rule="evenodd"/>
</svg>Password Manager Setup
</a> </a>
</li> </li>
<li> <li>
<a style="color:#bd93f9" href="vimwiki/"> <a style="color:#bd93f9" href="vimwiki/">Notes Setup
<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24">
<path fill="currentColor" d="M19 3H5a2 2 0 0 0-2 2v14a2 2 0 0 0 2 2h8l8-8V5a2 2 0 0 0-2-2zm-7 16v-7h7l-7 7z"/>
</svg>Notes Setup
</a> </a>
</li> </li>
<li> <li>
<a style="color:#bd93f9" href="sm/"> <a style="color:#bd93f9" href="sm/">Quit Social Media
<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24">
<g fill="none" stroke-linecap="round" stroke-linejoin="round" stroke-width="2">
<path d="M0 0h24v24H0z"/>
<path fill="currentColor" d="M17 3.34a10 10 0 1 1-14.995 8.984L2 12l.005-.324A10 10 0 0 1 17 3.34zM12 6a1 1 0 0 0-.993.883L11 7v5l.009.131a1 1 0 0 0 .197.477l.087.1l3 3l.094.082a1 1 0 0 0 1.226 0l.094-.083l.083-.094a1 1 0 0 0 0-1.226l-.083-.094L13 11.585V7l-.007-.117A1 1 0 0 0 12 6z"/>
</g>
</svg>Quit Social Media
</a> </a>
</li> </li>
</ul> </ul>

@ -18,8 +18,8 @@
</pre> </pre>
</a> </a>
<hr/> <hr/>
<p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href="."><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M13.028 2.001a78.82 78.82 0 0 1 2.189.022l.194.007c.224.008.445.018.712.03c1.064.05 1.79.218 2.427.465c.66.254 1.216.598 1.772 1.154a4.908 4.908 0 0 1 1.153 1.771c.247.637.415 1.364.465 2.428c.012.266.022.488.03.712l.006.194a79 79 0 0 1 .023 2.188l.001.746v1.31a78.836 78.836 0 0 1-.023 2.189l-.006.194c-.008.224-.018.445-.03.712c-.05 1.064-.22 1.79-.466 2.427a4.884 4.884 0 0 1-1.153 1.772a4.915 4.915 0 0 1-1.772 1.153c-.637.247-1.363.415-2.427.465c-.267.012-.488.022-.712.03l-.194.006a79 79 0 0 1-2.189.023l-.746.001h-1.309a78.836 78.836 0 0 1-2.189-.023l-.194-.006a60.64 60.64 0 0 1-.712-.03c-1.064-.05-1.79-.22-2.428-.466a4.89 4.89 0 0 1-1.771-1.153a4.904 4.904 0 0 1-1.154-1.772c-.247-.637-.415-1.363-.465-2.427a74.367 74.367 0 0 1-.03-.712l-.005-.194A79.053 79.053 0 0 1 2 13.028v-2.056a78.82 78.82 0 0 1 .022-2.188l.007-.194c.008-.224.018-.446.03-.712c.05-1.065.218-1.79.465-2.428A4.88 4.88 0 0 1 3.68 3.68a4.897 4.897 0 0 1 1.77-1.155c.638-.247 1.363-.415 2.428-.465l.712-.03l.194-.005A79.053 79.053 0 0 1 10.972 2h2.056Zm-1.028 5A5 5 0 1 0 12 17a5 5 0 0 0 0-10Zm0 2A3 3 0 1 1 12.001 15a3 3 0 0 1 0-6Zm5.25-3.5a1.25 1.25 0 0 0 0 2.498a1.25 1.25 0 0 0 0-2.5Z"/></svg>Instagram Deleted!</a></p> <p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href=".">Instagram Deleted!</a></p>
<h1><svg class="titles" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M13.028 2.001a78.82 78.82 0 0 1 2.189.022l.194.007c.224.008.445.018.712.03c1.064.05 1.79.218 2.427.465c.66.254 1.216.598 1.772 1.154a4.908 4.908 0 0 1 1.153 1.771c.247.637.415 1.364.465 2.428c.012.266.022.488.03.712l.006.194a79 79 0 0 1 .023 2.188l.001.746v1.31a78.836 78.836 0 0 1-.023 2.189l-.006.194c-.008.224-.018.445-.03.712c-.05 1.064-.22 1.79-.466 2.427a4.884 4.884 0 0 1-1.153 1.772a4.915 4.915 0 0 1-1.772 1.153c-.637.247-1.363.415-2.427.465c-.267.012-.488.022-.712.03l-.194.006a79 79 0 0 1-2.189.023l-.746.001h-1.309a78.836 78.836 0 0 1-2.189-.023l-.194-.006a60.64 60.64 0 0 1-.712-.03c-1.064-.05-1.79-.22-2.428-.466a4.89 4.89 0 0 1-1.771-1.153a4.904 4.904 0 0 1-1.154-1.772c-.247-.637-.415-1.363-.465-2.427a74.367 74.367 0 0 1-.03-.712l-.005-.194A79.053 79.053 0 0 1 2 13.028v-2.056a78.82 78.82 0 0 1 .022-2.188l.007-.194c.008-.224.018-.446.03-.712c.05-1.065.218-1.79.465-2.428A4.88 4.88 0 0 1 3.68 3.68a4.897 4.897 0 0 1 1.77-1.155c.638-.247 1.363-.415 2.428-.465l.712-.03l.194-.005A79.053 79.053 0 0 1 10.972 2h2.056Zm-1.028 5A5 5 0 1 0 12 17a5 5 0 0 0 0-10Zm0 2A3 3 0 1 1 12.001 15a3 3 0 0 1 0-6Zm5.25-3.5a1.25 1.25 0 0 0 0 2.498a1.25 1.25 0 0 0 0-2.5Z"/></svg>Instagram Deleted!</h1><p style="font-size:110%">Posted on: <strong>7 May 2023</strong></p><p style="font-size:110%">Reading time: <strong><strong>Less than 1 min</strong><p><p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M14 18.32A7.06 7.06 0 0 1 11.28 16H3V4h18v2.26a7.08 7.08 0 0 1 2 2.15V4a2 2 0 0 0-2-2H3a2 2 0 0 0-2 2v12a2 2 0 0 0 2 2h7v2H8v2h8v-2h-2Z"/><path fill="currentColor" d="M17 6a6 6 0 1 0 6 6a6 6 0 0 0-6-6Zm0 7.5a1.5 1.5 0 1 1 1.5-1.5a1.5 1.5 0 0 1-1.5 1.5Z"/></svg><strong>Software</strong></a></p> <h1>Instagram Deleted!</h1><p style="font-size:110%">Posted on: <strong>7 May 2023</strong></p><p style="font-size:110%">Reading time: <strong><strong>Less than 1 min</strong><p><p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><strong>Software</strong></a></p>
<p>This post is to inform you that the grace period for the deletion of my public Instagram account has been completed. My Instagram account has been deleted... forever. I highly recommend you do it too. Read <a style="color:#bd93f9" href="../sm">this post</a> for more information.</p> <p>This post is to inform you that the grace period for the deletion of my public Instagram account has been completed. My Instagram account has been deleted... forever. I highly recommend you do it too. Read <a style="color:#bd93f9" href="../sm">this post</a> for more information.</p>
<p><a href="mailto:sufyaan@counterhawks.com?subject=Instagram%20Deleted!">>>> Reply To Me</a></p> <p><a href="mailto:sufyaan@counterhawks.com?subject=Instagram%20Deleted!">>>> Reply To Me</a></p>

@ -17,9 +17,9 @@
______| |_____| | | | | | | | \_| ______| |_____| | | | | | | | \_|
</pre> </pre>
</a> </a>
<hr/><p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href="."><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M12.3 2H12A10 10 0 0 0 2 12a10 10 0 0 0 10 10c3 0 4.7-1 6.5-2.5C13 21 8 17 8 12s5-9 10.5-7.5A8.56 8.56 0 0 0 12.3 2m4.5 4.2l-1.5 3.5l-3.7.3l2.9 2.5l-.9 3.5l3.2-2l3.2 2l-1-3.5l3-2.5l-3.7-.3l-1.5-3.5Z"/></svg>Open-Source Islam Apps?</a></p> <hr/><p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href=".">Open-Source Islam Apps?</a></p>
<h1><svg class="titles" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M12.3 2H12A10 10 0 0 0 2 12a10 10 0 0 0 10 10c3 0 4.7-1 6.5-2.5C13 21 8 17 8 12s5-9 10.5-7.5A8.56 8.56 0 0 0 12.3 2m4.5 4.2l-1.5 3.5l-3.7.3l2.9 2.5l-.9 3.5l3.2-2l3.2 2l-1-3.5l3-2.5l-3.7-.3l-1.5-3.5Z"/></svg>Open-Source Islam Apps?</h1> <h1>Open-Source Islam Apps?</h1>
<p style="font-size:110%">Posted on: <strong>2 July 2023</strong></p><p style="font-size:110%">Reading time: <strong><strong>2 min</strong><p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M14 18.32A7.06 7.06 0 0 1 11.28 16H3V4h18v2.26a7.08 7.08 0 0 1 2 2.15V4a2 2 0 0 0-2-2H3a2 2 0 0 0-2 2v12a2 2 0 0 0 2 2h7v2H8v2h8v-2h-2Z"/><path fill="currentColor" d="M17 6a6 6 0 1 0 6 6a6 6 0 0 0-6-6Zm0 7.5a1.5 1.5 0 1 1 1.5-1.5a1.5 1.5 0 0 1-1.5 1.5Z"/></svg><strong>Software</strong></a></p> <p style="font-size:110%">Posted on: <strong>2 July 2023</strong></p><p style="font-size:110%">Reading time: <strong><strong>3 min</strong><p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><strong>Software</strong></a></p>
<p>I have tried finding open-source and <a href="../definitions/free-software/" style="color:#50fa7b">free</a> Islamic apps for a long time and it is tiring to do so. Most of the apps are Quran and prayer time apps which are perfect but we do not have apps for other parts of Islam like hadeeths, duas and even Qibla locating. If I do run across an app, its last update is always more than five years ago which is not ideal. There are two Islamic apps that I use on a daily basis that I absolutely love and will never switch from:</p> <p>I have tried finding open-source and <a href="../definitions/free-software/" style="color:#50fa7b">free</a> Islamic apps for a long time and it is tiring to do so. Most of the apps are Quran and prayer time apps which are perfect but we do not have apps for other parts of Islam like hadeeths, duas and even Qibla locating. If I do run across an app, its last update is always more than five years ago which is not ideal. There are two Islamic apps that I use on a daily basis that I absolutely love and will never switch from:</p>
<ul> <ul>
<li><a href="https://apt.izzysoft.de/fdroid/index/apk/com.quranapp.android">QuranApp</a></li> <li><a href="https://apt.izzysoft.de/fdroid/index/apk/com.quranapp.android">QuranApp</a></li>

@ -17,21 +17,21 @@
______| |_____| | | | | | | | \_| ______| |_____| | | | | | | | \_|
</pre> </pre>
</a> </a>
<hr/><p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href="."><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M12 0C5.378 0 0 5.378 0 12c0 6.623 5.378 12 12 12c6.623 0 12-5.377 12-12c0-6.622-5.377-12-12-12zm0 .791a11.203 11.203 0 0 1 11.209 11.21A11.202 11.202 0 0 1 12 23.208A11.203 11.203 0 0 1 .791 12A11.203 11.203 0 0 1 12.001.791zm0 1.871a9.356 9.356 0 0 0-1.705.162A1.746 1.746 0 0 0 12 4.95a1.746 1.746 0 0 0 1.706-2.126A9.342 9.342 0 0 0 12 2.662zM7.2 4a9.338 9.338 0 0 0-4.54 8a9.338 9.338 0 0 0 18.677 0a9.338 9.338 0 0 0-4.54-7.998a4.888 4.888 0 0 1-2.701 5.365l-.12 2.066l1.482 1.483l-1.483 1.482l.989.989l-.989.988l.12 1.857L12 20.328l-2.096-2.096V9.367A4.89 4.89 0 0 1 7.2 4zm3.4 6.543v6.99h.7v-6.99z"/></svg>KeePass + Syncthing</a></p> <hr/><p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href=".">KeePass + Syncthing</a></p>
<h1><svg class="titles" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M12 0C5.378 0 0 5.378 0 12c0 6.623 5.378 12 12 12c6.623 0 12-5.377 12-12c0-6.622-5.377-12-12-12zm0 .791a11.203 11.203 0 0 1 11.209 11.21A11.202 11.202 0 0 1 12 23.208A11.203 11.203 0 0 1 .791 12A11.203 11.203 0 0 1 12.001.791zm0 1.871a9.356 9.356 0 0 0-1.705.162A1.746 1.746 0 0 0 12 4.95a1.746 1.746 0 0 0 1.706-2.126A9.342 9.342 0 0 0 12 2.662zM7.2 4a9.338 9.338 0 0 0-4.54 8a9.338 9.338 0 0 0 18.677 0a9.338 9.338 0 0 0-4.54-7.998a4.888 4.888 0 0 1-2.701 5.365l-.12 2.066l1.482 1.483l-1.483 1.482l.989.989l-.989.988l.12 1.857L12 20.328l-2.096-2.096V9.367A4.89 4.89 0 0 1 7.2 4zm3.4 6.543v6.99h.7v-6.99z"/></svg>KeePass + Syncthing</h1> <h1>KeePass + Syncthing</h1>
<p style="font-size:110%">Posted on: <strong>23 June 2023</strong></p><p style="font-size:110%">Reading time: <strong><strong>2 min</strong><p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M14 18.32A7.06 7.06 0 0 1 11.28 16H3V4h18v2.26a7.08 7.08 0 0 1 2 2.15V4a2 2 0 0 0-2-2H3a2 2 0 0 0-2 2v12a2 2 0 0 0 2 2h7v2H8v2h8v-2h-2Z"/><path fill="currentColor" d="M17 6a6 6 0 1 0 6 6a6 6 0 0 0-6-6Zm0 7.5a1.5 1.5 0 1 1 1.5-1.5a1.5 1.5 0 0 1-1.5 1.5Z"/></svg><strong>Software</strong></a></p> <p style="font-size:110%">Posted on: <strong>23 June 2023</strong></p><p style="font-size:110%">Reading time: <strong><strong>2 min</strong><p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><strong>Software</strong></a></p>
<p>I have decided to switch from a self-hosted Vaultwarden (Bitwarden) instance to using KeePass along with Syncthing to sync it to all my devices. There are numerous reasons why I decided to make this change.</p> <p>I have decided to switch from a self-hosted Vaultwarden (Bitwarden) instance to using KeePass along with Syncthing to sync it to all my devices. There are numerous reasons why I decided to make this change.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M18 8h-1V6c0-2.76-2.24-5-5-5S7 3.24 7 6v2H6c-1.1 0-2 .9-2 2v10c0 1.1.9 2 2 2h12c1.1 0 2-.9 2-2V10c0-1.1-.9-2-2-2zm-6 9c-1.1 0-2-.9-2-2s.9-2 2-2s2 .9 2 2s-.9 2-2 2zM9 8V6c0-1.66 1.34-3 3-3s3 1.34 3 3v2H9z"/></svg>Security</h2> <h2>Security</h2>
<p>The offline nature of KeePass makes it so that it is nearly impossible to crack. Connecting things to the internet makes it trivial for a script kiddie thousands of kilometers away from you to attempt to crack your passwords. A password manager is a place where all of your passwords are stored. Due to this very reason, I decided to upgrade my security by moving to a reputed piece of software.</p> <p>The offline nature of KeePass makes it so that it is nearly impossible to crack. Connecting things to the internet makes it trivial for a script kiddie thousands of kilometers away from you to attempt to crack your passwords. A password manager is a place where all of your passwords are stored. Due to this very reason, I decided to upgrade my security by moving to a reputed piece of software.</p>
<p>It has a plethora of security features. Firstly, it has the ability to generate passwords of any length. It allows you to choose what characters are allowed. Its generation is so complex and liberating that even foreign characters like <code>Æ</code>, <code>É</code>, or even mathematics symbols and arbitrary symbols that no one would care about can be used. For example, the division sign (÷) or the copyright symbol (©) are included in password generation. Since most hackers try alphanumeric character cracking, KeePass password generation can make your passwords practically impossible to crack.</p> <p>It has a plethora of security features. Firstly, it has the ability to generate passwords of any length. It allows you to choose what characters are allowed. Its generation is so complex and liberating that even foreign characters like <code>Æ</code>, <code>É</code>, or even mathematics symbols and arbitrary symbols that no one would care about can be used. For example, the division sign (÷) or the copyright symbol (©) are included in password generation. Since most hackers try alphanumeric character cracking, KeePass password generation can make your passwords practically impossible to crack.</p>
<p>The encryption algorithm used for your password database is AES-256, commonly known as 256-bit encryption. It is a form of encryption that is so difficult to crack that the only way you can actually hope to obtain someone's password is by phishing them or using external methods. For more information, please <a href="https://invidious.tiekoetter.com/watch?v=S9JGmA5_unY">watch this video by 3Blue1Brown.</a> It is extremely interesting.</p> <p>The encryption algorithm used for your password database is AES-256, commonly known as 256-bit encryption. It is a form of encryption that is so difficult to crack that the only way you can actually hope to obtain someone's password is by phishing them or using external methods. For more information, please <a href="https://invidious.tiekoetter.com/watch?v=S9JGmA5_unY">watch this video by 3Blue1Brown.</a> It is extremely interesting.</p>
<p>In fact, KeePass is so secure that even the passwords that are stored in your memory while you are viewing your database is encrypted. That way, even a <a href='../definitions/management-engine' style='color:#50fa7b'>management engine</a> attack will not work. If you want to try viewing the cleared memory sectors to find remnants of your passwords, good luck. The passwords which are stored in your memory are first overwritten to the point of unrecoverability before being cleared.</p> <p>In fact, KeePass is so secure that even the passwords that are stored in your memory while you are viewing your database is encrypted. That way, even a <a href='../definitions/management-engine' style='color:#50fa7b'>management engine</a> attack will not work. If you want to try viewing the cleared memory sectors to find remnants of your passwords, good luck. The passwords which are stored in your memory are first overwritten to the point of unrecoverability before being cleared.</p>
<p>You can even setup a keyfile (a file you need to use to login), a <a href='../definitions/security-key/' style='color:#50fa7b'>security key</a>, or both.</p> <p>You can even setup a keyfile (a file you need to use to login), a <a href='../definitions/security-key/' style='color:#50fa7b'>security key</a>, or both.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32"><path fill="currentColor" d="M15.5 1.125C7.278 1.125.59 7.815.59 16.035c0 6.263 3.88 11.635 9.36 13.84l3.64-9.076a5.131 5.131 0 1 1 3.818-.001l3.64 9.075c5.48-2.206 9.36-7.578 9.36-13.84c.002-8.22-6.687-14.91-14.908-14.91z"/></svg>View. The. Code.</h2> <h2>View. The. Code.</h2>
<p>KeePass is open-source under the GPLv2 license, which is the best open-source license for people's freedom. That makes it <a href='../definitions/free-software/' style='color:#50fa7b'>free software</a>.</p> <p>KeePass is open-source under the GPLv2 license, which is the best open-source license for people's freedom. That makes it <a href='../definitions/free-software/' style='color:#50fa7b'>free software</a>.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32"><path fill="currentColor" d="M24.26 32H7.739a1.28 1.28 0 0 1-1.281-1.281V18.495c0-.708.573-1.286 1.281-1.286h1.552v-1.974c0-3.698 3.01-6.708 6.708-6.708s6.708 3.01 6.708 6.708v1.974h1.552c.708 0 1.281.578 1.281 1.286v12.224A1.28 1.28 0 0 1 24.259 32zm-7.421-6.76c1.521-.859.911-3.182-.839-3.182c-1.745.005-2.354 2.318-.839 3.182v1.656c0 1.115 1.677 1.115 1.677 0zm-3.698-8.032h5.724v-1.974c0-1.578-1.286-2.859-2.865-2.859s-2.859 1.281-2.859 2.859zm-7.078-1.817H2.079c-.651 0-1.172-.526-1.172-1.172s.521-1.172 1.172-1.172h3.984c.646 0 1.172.526 1.172 1.172s-.526 1.172-1.172 1.172zM8.87 9.12a1.14 1.14 0 0 1-.74-.271L4.974 6.255a1.166 1.166 0 0 1-.156-1.646a1.166 1.166 0 0 1 1.646-.161L9.62 7.042c.849.698.349 2.078-.75 2.073zM16 6.359a1.174 1.174 0 0 1-1.172-1.172V1.171c0-.646.526-1.172 1.172-1.172s1.172.526 1.172 1.172v4.016c0 .646-.526 1.172-1.172 1.172zm7.13 2.761c-1.104 0-1.599-1.38-.75-2.078l3.156-2.594c1.208-.99 2.693.818 1.49 1.813L23.87 8.855a1.16 1.16 0 0 1-.74.266zm6.792 6.271h-4.021c-.651 0-1.172-.526-1.172-1.172s.521-1.172 1.172-1.172h4.021c.651 0 1.172.526 1.172 1.172s-.521 1.172-1.172 1.172z"/></svg>The Encryption Never Stops</h2> <h2>The Encryption Never Stops</h2>
<p>Along with KeePass, I use Syncthing to sync my database. Syncthing also uses cryptographic encryption. This makes it so that anyone who wants to brute-force my database needs access to both my Syncthing password and my KeePass password.</p> <p>Along with KeePass, I use Syncthing to sync my database. Syncthing also uses cryptographic encryption. This makes it so that anyone who wants to brute-force my database needs access to both my Syncthing password and my KeePass password.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M6.012 18H21V4a2 2 0 0 0-2-2H6c-1.206 0-3 .799-3 3v14c0 2.201 1.794 3 3 3h15v-2H6.012C5.55 19.988 5 19.805 5 19s.55-.988 1.012-1zM8 6h9v2H8V6z"/></svg>To Conclude...</h2> <h2>To Conclude...</h2>
<p>I use KeePass along with Syncthing for three reasons.</p> <p>I use KeePass along with Syncthing for three reasons.</p>
<ol> <ol>
<li>KeePass is extremely secure. It has industry-standard protection methods and algorithms and its offline nature makes it practically uncrackable.</li> <li>KeePass is extremely secure. It has industry-standard protection methods and algorithms and its offline nature makes it practically uncrackable.</li>

@ -17,11 +17,11 @@
______| |_____| | | | | | | | \_| ______| |_____| | | | | | | | \_|
</pre> </pre>
</a> </a>
<hr/><p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href="."><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M12 2C6.486 2 2 6.486 2 12s4.486 10 10 10s10-4.486 10-10S17.514 2 12 2zm-1 9H4.069a7.965 7.965 0 0 1 .52-2H11v2zm0 4H4.589a7.965 7.965 0 0 1-.52-2H11v2zm0-10.931V7H5.765A7.996 7.996 0 0 1 11 4.069zM5.765 17H11v2.931A7.996 7.996 0 0 1 5.765 17z"/></svg>Keep It Minimal</a></p> <hr/><p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href=".">Keep It Minimal</a></p>
<h1><svg class="titles" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M12 2C6.486 2 2 6.486 2 12s4.486 10 10 10s10-4.486 10-10S17.514 2 12 2zm-1 9H4.069a7.965 7.965 0 0 1 .52-2H11v2zm0 4H4.589a7.965 7.965 0 0 1-.52-2H11v2zm0-10.931V7H5.765A7.996 7.996 0 0 1 11 4.069zM5.765 17H11v2.931A7.996 7.996 0 0 1 5.765 17z"/></svg>Keep It Minimal</h1> <h1>Keep It Minimal</h1>
<p style="font-size:110%">Posted on: <strong>27 June 2023</strong></p><p style="font-size:110%">Reading time: <strong><strong>3 min</strong><p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M14 18.32A7.06 7.06 0 0 1 11.28 16H3V4h18v2.26a7.08 7.08 0 0 1 2 2.15V4a2 2 0 0 0-2-2H3a2 2 0 0 0-2 2v12a2 2 0 0 0 2 2h7v2H8v2h8v-2h-2Z"/><path fill="currentColor" d="M17 6a6 6 0 1 0 6 6a6 6 0 0 0-6-6Zm0 7.5a1.5 1.5 0 1 1 1.5-1.5a1.5 1.5 0 0 1-1.5 1.5Z"/></svg><strong>Software</strong></a></p> <p style="font-size:110%">Posted on: <strong>27 June 2023</strong></p><p style="font-size:110%">Reading time: <strong><strong>3 min</strong><p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><strong>Software</strong></a></p>
<p>In technology, you should keep it simple as much as possible. The KISS philosophy and the <a href="../definitions/unix-philosophy/" style="color:#50fa7b">UNIX philosophy</a> especially must be followed if you want quality software. Most pieces of famous software nowadays do not follow this guideline and it is costing millions of people dearly.</p> <p>In technology, you should keep it simple as much as possible. The KISS philosophy and the <a href="../definitions/unix-philosophy/" style="color:#50fa7b">UNIX philosophy</a> especially must be followed if you want quality software. Most pieces of famous software nowadays do not follow this guideline and it is costing millions of people dearly.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 20 20"><path fill="currentColor" fill-rule="evenodd" d="M2 4.75A.75.75 0 0 1 2.75 4h14.5a.75.75 0 0 1 0 1.5H2.75A.75.75 0 0 1 2 4.75ZM2 10a.75.75 0 0 1 .75-.75h14.5a.75.75 0 0 1 0 1.5H2.75A.75.75 0 0 1 2 10Zm0 5.25a.75.75 0 0 1 .75-.75h14.5a.75.75 0 0 1 0 1.5H2.75a.75.75 0 0 1-.75-.75Z" clip-rule="evenodd"/></svg>Why Minimal?</h2> <h2>Why Minimal?</h2>
<p>Simply put, a piece of minimal software:</p> <p>Simply put, a piece of minimal software:</p>
<ol> <ol>
<li>Is easier to maintain</li> <li>Is easier to maintain</li>
@ -36,7 +36,7 @@
<p>Minimal software can be extensible as per the <a href="../definitions/unix-philosophy/" style="color:#50fa7b">UNIX philosophy</a>. Instead of creating a massive program that tries to do everything, minimalist programs create modules for certain functions. This makes troubleshooting a piece of cake as the initial confusion of finding out what exactly causes the error is practically eliminated. For example, if you are making a login page and the authentication does not work, you know that you should look in the authentication module. However, if you make it all in a single program, it is difficult to root out whether an issue is due to an incorrect variable type or a redundant function.</p> <p>Minimal software can be extensible as per the <a href="../definitions/unix-philosophy/" style="color:#50fa7b">UNIX philosophy</a>. Instead of creating a massive program that tries to do everything, minimalist programs create modules for certain functions. This makes troubleshooting a piece of cake as the initial confusion of finding out what exactly causes the error is practically eliminated. For example, if you are making a login page and the authentication does not work, you know that you should look in the authentication module. However, if you make it all in a single program, it is difficult to root out whether an issue is due to an incorrect variable type or a redundant function.</p>
<p>All of this helps developers to avoid complications. No team wants another error or speed complaint in the middle of another issue. All of the advantages listed thus far help developers have peace of mind.</p> <p>All of this helps developers to avoid complications. No team wants another error or speed complaint in the middle of another issue. All of the advantages listed thus far help developers have peace of mind.</p>
<p>Finally, minimal pieces of software can be liberated and made into <a href="../definitions/free-software/" style="color:#50fa7b">free software</a> to contribute to the world. Once the initial stages of bug-fixing and optimization is over, it is just a matter of letting the world find ways to make the program better. An inefficiency that no one would spot otherwise can be ironed out by a top-tier programmer who worked in a plethora of huge companies with decades of experience. It also helps budding developers learn about development.</p> <p>Finally, minimal pieces of software can be liberated and made into <a href="../definitions/free-software/" style="color:#50fa7b">free software</a> to contribute to the world. Once the initial stages of bug-fixing and optimization is over, it is just a matter of letting the world find ways to make the program better. An inefficiency that no one would spot otherwise can be ironed out by a top-tier programmer who worked in a plethora of huge companies with decades of experience. It also helps budding developers learn about development.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 256 256"><path fill="currentColor" d="M71.68 97.22L34.74 128l36.94 30.78a12 12 0 1 1-15.36 18.44l-48-40a12 12 0 0 1 0-18.44l48-40a12 12 0 0 1 15.36 18.44Zm176 21.56l-48-40a12 12 0 1 0-15.36 18.44L221.26 128l-36.94 30.78a12 12 0 1 0 15.36 18.44l48-40a12 12 0 0 0 0-18.44ZM164.1 28.72a12 12 0 0 0-15.38 7.18l-64 176a12 12 0 0 0 7.18 15.37a11.79 11.79 0 0 0 4.1.73a12 12 0 0 0 11.28-7.9l64-176a12 12 0 0 0-7.18-15.38Z"/></svg>Closing The Program</h2> <h2>Closing The Program</h2>
<p>To sum it up, everyone should use and develop minimal software if possible. This is because minimal software is easier to maintain, debug and optimize due to its smaller codebase. It also runs fast on all devices and avoids complications during development time. Minimal software can also be liberated into <a href="../definitions/free-software/" style="color:#50fa7b">free software</a> which will allow talented developers to review the program and contribute to the world.</p> <p>To sum it up, everyone should use and develop minimal software if possible. This is because minimal software is easier to maintain, debug and optimize due to its smaller codebase. It also runs fast on all devices and avoids complications during development time. Minimal software can also be liberated into <a href="../definitions/free-software/" style="color:#50fa7b">free software</a> which will allow talented developers to review the program and contribute to the world.</p>
<p><a href="mailto:sufyaan@counterhawks.com?subject=Keep%20It%20Minimal">>>> Reply To Me</a></p> <p><a href="mailto:sufyaan@counterhawks.com?subject=Keep%20It%20Minimal">>>> Reply To Me</a></p>
<p><a href="mnml.pdf">>>> Download PDF</a></p> <p><a href="mnml.pdf">>>> Download PDF</a></p>

@ -18,14 +18,14 @@
</a> </a>
</a> </a>
<hr/> <hr/>
<p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href="."><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M2 17h20v2H2v-2zm1.15-4.05L4 11.47l.85 1.48l1.3-.75l-.85-1.48H7v-1.5H5.3l.85-1.47L4.85 7L4 8.47L3.15 7l-1.3.75l.85 1.47H1v1.5h1.7l-.85 1.48l1.3.75zm6.7-.75l1.3.75l.85-1.48l.85 1.48l1.3-.75l-.85-1.48H15v-1.5h-1.7l.85-1.47l-1.3-.75L12 8.47L11.15 7l-1.3.75l.85 1.47H9v1.5h1.7l-.85 1.48zM23 9.22h-1.7l.85-1.47l-1.3-.75L20 8.47L19.15 7l-1.3.75l.85 1.47H17v1.5h1.7l-.85 1.48l1.3.75l.85-1.48l.85 1.48l1.3-.75l-.85-1.48H23v-1.5z"/></svg>Password Systems</a></p> <p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href=".">Password Systems</a></p>
<h1><svg class="titles" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M2 17h20v2H2v-2zm1.15-4.05L4 11.47l.85 1.48l1.3-.75l-.85-1.48H7v-1.5H5.3l.85-1.47L4.85 7L4 8.47L3.15 7l-1.3.75l.85 1.47H1v1.5h1.7l-.85 1.48l1.3.75zm6.7-.75l1.3.75l.85-1.48l.85 1.48l1.3-.75l-.85-1.48H15v-1.5h-1.7l.85-1.47l-1.3-.75L12 8.47L11.15 7l-1.3.75l.85 1.47H9v1.5h1.7l-.85 1.48zM23 9.22h-1.7l.85-1.47l-1.3-.75L20 8.47L19.15 7l-1.3.75l.85 1.47H17v1.5h1.7l-.85 1.48l1.3.75l.85-1.48l.85 1.48l1.3-.75l-.85-1.48H23v-1.5z"/></svg>Password Systems</h1> <h1>Password Systems</h1>
<p style="font-size:110%">Posted on: <strong>2 May 2023</strong></p> <p style="font-size:110%">Posted on: <strong>2 May 2023</strong></p>
<p style="font-size:110%">Reading time: <strong><strong>4 min</strong> <p style="font-size:110%">Reading time: <strong><strong>4 min</strong>
<p> <p>
<p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M14 18.32A7.06 7.06 0 0 1 11.28 16H3V4h18v2.26a7.08 7.08 0 0 1 2 2.15V4a2 2 0 0 0-2-2H3a2 2 0 0 0-2 2v12a2 2 0 0 0 2 2h7v2H8v2h8v-2h-2Z"/><path fill="currentColor" d="M17 6a6 6 0 1 0 6 6a6 6 0 0 0-6-6Zm0 7.5a1.5 1.5 0 1 1 1.5-1.5a1.5 1.5 0 0 1-1.5 1.5Z"/></svg><strong>Software</strong></a> && <a style="color:#ff79c6" href="../blog/guides/"><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 512 512"><path fill="currentColor" d="M464 48c-67.61.29-117.87 9.6-154.24 25.69c-27.14 12-37.76 21.08-37.76 51.84V448c41.57-37.5 78.46-48 224-48V48ZM48 48c67.61.29 117.87 9.6 154.24 25.69c27.14 12 37.76 21.08 37.76 51.84V448c-41.57-37.5-78.46-48-224-48V48Z"/></svg><strong>Guides</strong></a></p> <p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><strong>Software</strong></a> && <a style="color:#ff79c6" href="../blog/guides/"><strong>Guides</strong></a></p>
<p>If you find it difficult to maintain strong passwords, then this guide is the only article you need to refer to. In this article, I will talk about an amazing trick to remember and manage all of your passwords.</p> <p>If you find it difficult to maintain strong passwords, then this guide is the only article you need to refer to. In this article, I will talk about an amazing trick to remember and manage all of your passwords.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M464 48c-67.61.29-117.87 9.6-154.24 25.69c-27.14 12-37.76 21.08-37.76 51.84V448c41.57-37.5 78.46-48 224-48V48ZM48 48c67.61.29 117.87 9.6 154.24 25.69c27.14 12 37.76 21.08 37.76 51.84V448c-41.57-37.5-78.46-48-224-48V48Z"/></svg>Introduction</h2> <h2>Introduction</h2>
<p>It goes without saying that passwords are incredibly important. It is undeniably important to make sure your passwords are:</p> <p>It goes without saying that passwords are incredibly important. It is undeniably important to make sure your passwords are:</p>
<ul> <ul>
<li>Strong</li> <li>Strong</li>
@ -37,7 +37,7 @@
<p>The most common response I hear from people when I ask them to create a password system is:</p> <p>The most common response I hear from people when I ask them to create a password system is:</p>
<p><em>"I think using the same password on all accounts is better because I don't have a good memory to use a password system."</em></p> <p><em>"I think using the same password on all accounts is better because I don't have a good memory to use a password system."</em></p>
<p>That response always baffles me. The whole point of a password system is not to remember your passwords but to remember a ruleset that will be cemented into your brain after 3 or 4 times of entering your passwords.</p> <p>That response always baffles me. The whole point of a password system is not to remember your passwords but to remember a ruleset that will be cemented into your brain after 3 or 4 times of entering your passwords.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M18 10h-4V6a2 2 0 0 0-4 0l.071 4H6a2 2 0 0 0 0 4l4.071-.071L10 18a2 2 0 0 0 4 0v-4.071L18 14a2 2 0 0 0 0-4z"/></svg>How to Create a Password System</h2> <h2>How to Create a Password System</h2>
<p>As aforementioned, a password system is a set of rules that you need to remember instead of all of your passwords separately. An effective password system consists of the following elements:</p> <p>As aforementioned, a password system is a set of rules that you need to remember instead of all of your passwords separately. An effective password system consists of the following elements:</p>
<ul> <ul>
<li>Master Password</li> <li>Master Password</li>
@ -82,7 +82,7 @@
<p>The password above is 33 characters, yes 33 characters long. No one will be able to guess it and it will take hundreds of centuries to crack. Best of all, it is different for each account.</p> <p>The password above is 33 characters, yes 33 characters long. No one will be able to guess it and it will take hundreds of centuries to crack. Best of all, it is different for each account.</p>
<p>You can mix the order up. Just make sure you don't keep changing the system and use one system. The best part is that if you need to change your passwords, you can just make another system that will work just as well. By that point, the previous system will be embedded into your brain. So, you can remember multiple strong passwords using this step.</p> <p>You can mix the order up. Just make sure you don't keep changing the system and use one system. The best part is that if you need to change your passwords, you can just make another system that will work just as well. By that point, the previous system will be embedded into your brain. So, you can remember multiple strong passwords using this step.</p>
<p>Please note that this is not enough. If you have followed this guide, you have taken a massive step towards protecting your accounts. However, many cybercriminals rely on phishing attacks. Please do not click on random links and please do not enter your information on random websites.</p> <p>Please note that this is not enough. If you have followed this guide, you have taken a massive step towards protecting your accounts. However, many cybercriminals rely on phishing attacks. Please do not click on random links and please do not enter your information on random websites.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M6.012 18H21V4a2 2 0 0 0-2-2H6c-1.206 0-3 .799-3 3v14c0 2.201 1.794 3 3 3h15v-2H6.012C5.55 19.988 5 19.805 5 19s.55-.988 1.012-1zM8 6h9v2H8V6z"/></svg>Conclusion</h2> <h2>Conclusion</h2>
<p>Congratulations! You now know how to create an extremely strong password that is different on each account.</p> <p>Congratulations! You now know how to create an extremely strong password that is different on each account.</p>
<p> <p>
<p><a href="mailto:sufyaan@counterhawks.com?subject=Password%20Systems">>>> Reply To Me</a></p> <p><a href="mailto:sufyaan@counterhawks.com?subject=Password%20Systems">>>> Reply To Me</a></p>

@ -18,15 +18,15 @@
</a> </a>
</a> </a>
<hr/> <hr/>
<p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href="."><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><g fill="none" stroke-linecap="round" stroke-linejoin="round" stroke-width="2"><path d="M0 0h24v24H0z"/><path fill="currentColor" d="M17 3.34a10 10 0 1 1-14.995 8.984L2 12l.005-.324A10 10 0 0 1 17 3.34zM12 6a1 1 0 0 0-.993.883L11 7v5l.009.131a1 1 0 0 0 .197.477l.087.1l3 3l.094.082a1 1 0 0 0 1.226 0l.094-.083l.083-.094a1 1 0 0 0 0-1.226l-.083-.094L13 11.585V7l-.007-.117A1 1 0 0 0 12 6z"/></g></svg>Stop Using Social Media</a></p> <p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href=".">Stop Using Social Media</a></p>
<h1><svg class="titles" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><g fill="none" stroke-linecap="round" stroke-linejoin="round" stroke-width="2"><path d="M0 0h24v24H0z"/><path fill="currentColor" d="M17 3.34a10 10 0 1 1-14.995 8.984L2 12l.005-.324A10 10 0 0 1 17 3.34zM12 6a1 1 0 0 0-.993.883L11 7v5l.009.131a1 1 0 0 0 .197.477l.087.1l3 3l.094.082a1 1 0 0 0 1.226 0l.094-.083l.083-.094a1 1 0 0 0 0-1.226l-.083-.094L13 11.585V7l-.007-.117A1 1 0 0 0 12 6z"/></g></svg>Stop Using Social Media</h1> <h1>Stop Using Social Media</h1>
<p style="font-size:110%">Posted on: <strong>20 April 2023</strong></p> <p style="font-size:110%">Posted on: <strong>20 April 2023</strong></p>
<p style="font-size:110%">Reading time: <strong><strong>9 min</strong></p> <p style="font-size:110%">Reading time: <strong><strong>9 min</strong></p>
<p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software"><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M14 18.32A7.06 7.06 0 0 1 11.28 16H3V4h18v2.26a7.08 7.08 0 0 1 2 2.15V4a2 2 0 0 0-2-2H3a2 2 0 0 0-2 2v12a2 2 0 0 0 2 2h7v2H8v2h8v-2h-2Z"/><path fill="currentColor" d="M17 6a6 6 0 1 0 6 6a6 6 0 0 0-6-6Zm0 7.5a1.5 1.5 0 1 1 1.5-1.5a1.5 1.5 0 0 1-1.5 1.5Z"/></svg><strong>Software</strong></a> && <a style="color:#ff79c6" href="../blog/guides/"><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 512 512"><path fill="currentColor" d="M464 48c-67.61.29-117.87 9.6-154.24 25.69c-27.14 12-37.76 21.08-37.76 51.84V448c41.57-37.5 78.46-48 224-48V48ZM48 48c67.61.29 117.87 9.6 154.24 25.69c27.14 12 37.76 21.08 37.76 51.84V448c-41.57-37.5-78.46-48-224-48V48Z"/></svg><strong>Guides</strong></a></p> <p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software"><strong>Software</strong></a> && <a style="color:#ff79c6" href="../blog/guides/"><strong>Guides</strong></a></p>
<h3>Table Of Contents</h3> <h3>Table Of Contents</h3>
<ol> <ol>
<li><a href="#cons" style="color:#ff79c6"><svg class="posts" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M21.842 6.218a1.977 1.977 0 0 0-.424-.628A1.99 1.99 0 0 0 20 5H8c-.297 0-.578.132-.769.359l-5 6c-.309.371-.309.91 0 1.281l5 6c.191.228.472.36.769.36h12a1.977 1.977 0 0 0 1.41-.582A1.99 1.99 0 0 0 22 17V7c0-.266-.052-.525-.158-.782zm-4.135 8.075l-1.414 1.414L14 13.414l-2.293 2.293l-1.414-1.414L12.586 12l-2.293-2.293l1.414-1.414L14 10.586l2.293-2.293l1.414 1.414L15.414 12l2.293 2.293z"/></svg>Cons Of Social Media</a></li> <li><a href="#cons" style="color:#ff79c6">Cons Of Social Media</a></li>
<ul class="pane"> <ul class="pane">
<li><a href="#time-consuming" style="color:#ff79c6">Time-Consuming</a></li> <li><a href="#time-consuming" style="color:#ff79c6">Time-Consuming</a></li>
<li><a href="#mental-health" style="color:#ff79c6">Affects Your Mental Health</a></li> <li><a href="#mental-health" style="color:#ff79c6">Affects Your Mental Health</a></li>
@ -36,7 +36,7 @@
<li><a href="#physical-health" style="color:#ff79c6">Decline In Physical Health</a></li> <li><a href="#physical-health" style="color:#ff79c6">Decline In Physical Health</a></li>
<li><a href="#productivity" style="color:#ff79c6">Horrible Productivity</a></li> <li><a href="#productivity" style="color:#ff79c6">Horrible Productivity</a></li>
</ul> </ul>
<li><a href="#getting-rid" style="color:#ff79c6"><svg class="posts" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M19 4h-3.5l-1-1h-5l-1 1H5v2h14M6 19a2 2 0 0 0 2 2h8a2 2 0 0 0 2-2V7H6v12Z"/></svg>Getting Rid Of It</a></li> <li><a href="#getting-rid" style="color:#ff79c6">Getting Rid Of It</a></li>
<ul class="pane"> <ul class="pane">
<li><a href="#contact" style="color:#ff79c6">Alternative Contact Details</a></li> <li><a href="#contact" style="color:#ff79c6">Alternative Contact Details</a></li>
<li><a href="#download" style="color:#ff79c6">Download Your Data</a></li> <li><a href="#download" style="color:#ff79c6">Download Your Data</a></li>
@ -44,10 +44,10 @@
<li><a href="#announce" style="color:#ff79c6">Announce</a></li> <li><a href="#announce" style="color:#ff79c6">Announce</a></li>
<li><a href="#plunge" style="color:#ff79c6">Take The Plunge!</a></li> <li><a href="#plunge" style="color:#ff79c6">Take The Plunge!</a></li>
</ul> </ul>
<li><a href="#conclusion" style="color:#ff79c6"><svg class="posts" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M6.012 18H21V4a2 2 0 0 0-2-2H6c-1.206 0-3 .799-3 3v14c0 2.201 1.794 3 3 3h15v-2H6.012C5.55 19.988 5 19.805 5 19s.55-.988 1.012-1zM8 6h9v2H8V6z"/></svg>Conclusion</a></li> <li><a href="#conclusion" style="color:#ff79c6">Conclusion</a></li>
</ol> </ol>
<p>I know how you felt reading the title. If you are a heavy social media user, you probably said:</p><p><em>"What? Who in their right mind would delete their social media accounts? How are they supposed to live life and talk to their friends?"</em></p><p>Don't worry. That was me last year. I understand your feelings. However, the disadvantages of social media and the perks of deleting it far outweigh its benefits. In this post, I will go over the reasons why you should delete all of your social media.</p> <p>I know how you felt reading the title. If you are a heavy social media user, you probably said:</p><p><em>"What? Who in their right mind would delete their social media accounts? How are they supposed to live life and talk to their friends?"</em></p><p>Don't worry. That was me last year. I understand your feelings. However, the disadvantages of social media and the perks of deleting it far outweigh its benefits. In this post, I will go over the reasons why you should delete all of your social media.</p>
<h2 id="cons"><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M21.842 6.218a1.977 1.977 0 0 0-.424-.628A1.99 1.99 0 0 0 20 5H8c-.297 0-.578.132-.769.359l-5 6c-.309.371-.309.91 0 1.281l5 6c.191.228.472.36.769.36h12a1.977 1.977 0 0 0 1.41-.582A1.99 1.99 0 0 0 22 17V7c0-.266-.052-.525-.158-.782zm-4.135 8.075l-1.414 1.414L14 13.414l-2.293 2.293l-1.414-1.414L12.586 12l-2.293-2.293l1.414-1.414L14 10.586l2.293-2.293l1.414 1.414L15.414 12l2.293 2.293z"/></svg>Cons of Social Media</h2> <h2 id="cons">Cons of Social Media</h2>
<h3 id="time-consuming">Time-Consuming</h3> <h3 id="time-consuming">Time-Consuming</h3>
<p>A study counted 5 billion internet users and it was concluded that, on average, <a href="https://www.forbesindia.com/article/lifes/how-much-time-do-people-spend-on-social-media-and-why/79477/1">an internet user spends 6 hours and 53 minutes online per day.</a> 6. HOURS. AND. 53. MINUTES. That is almost a whole third of people's daily lives. Another study concluded that people spend more time on social media in their whole lifetime than grooming, socialising (social media !=socialising) and doing the laundry combined.</p> <p>A study counted 5 billion internet users and it was concluded that, on average, <a href="https://www.forbesindia.com/article/lifes/how-much-time-do-people-spend-on-social-media-and-why/79477/1">an internet user spends 6 hours and 53 minutes online per day.</a> 6. HOURS. AND. 53. MINUTES. That is almost a whole third of people's daily lives. Another study concluded that people spend more time on social media in their whole lifetime than grooming, socialising (social media !=socialising) and doing the laundry combined.</p>
<p>It is not as if any of the time spent is valuable. Sure, you may learn one or two 'fun facts, which will make you think that you need social media. You may talk with your friends a lot, which will make you think that your account is required to socialise with people. However, these are all nonsensical excuses that your brain makes to justify getting cheap dopamine. Imagine how much work you can get done, how many actual connections you can make with people, and how many good habits can be formed that will make you happier in the long term than social media.</p> <p>It is not as if any of the time spent is valuable. Sure, you may learn one or two 'fun facts, which will make you think that you need social media. You may talk with your friends a lot, which will make you think that your account is required to socialise with people. However, these are all nonsensical excuses that your brain makes to justify getting cheap dopamine. Imagine how much work you can get done, how many actual connections you can make with people, and how many good habits can be formed that will make you happier in the long term than social media.</p>
@ -97,7 +97,7 @@
<p>Many individuals who use social media are experiencing these problems, which are usually experienced by older people, at ages like 25.</p> <p>Many individuals who use social media are experiencing these problems, which are usually experienced by older people, at ages like 25.</p>
<h3 id="productivity">Horrible Productivity</h3> <h3 id="productivity">Horrible Productivity</h3>
<p>When you are working and are in the zone (a phase in which you do high-quality work without even thinking about it), any minor disturbance will move you out of that state. A notification about someone liking your post can shake you out of the zone. In the long-term, this will waste hours of your time.</p> <p>When you are working and are in the zone (a phase in which you do high-quality work without even thinking about it), any minor disturbance will move you out of that state. A notification about someone liking your post can shake you out of the zone. In the long-term, this will waste hours of your time.</p>
<h2 id="getting-rid"><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M19 4h-3.5l-1-1h-5l-1 1H5v2h14M6 19a2 2 0 0 0 2 2h8a2 2 0 0 0 2-2V7H6v12Z"/></svg>Getting Rid of It</h2> <h2 id="getting-rid">Getting Rid of It</h2>
<p>So, you are ready. You want to quit social media and break this horrible addiction. You realise the effects it has on your life. However, you do not know where to start. If this is the case, check out <a href="https://www.staygrounded.online/p/the-air-method-phase-i">'The AIR Method'</a>. If you would like to read how I did it, please refer to the steps below. Referring to the steps I took may help you understand your weak points and how to combat them.</p> <p>So, you are ready. You want to quit social media and break this horrible addiction. You realise the effects it has on your life. However, you do not know where to start. If this is the case, check out <a href="https://www.staygrounded.online/p/the-air-method-phase-i">'The AIR Method'</a>. If you would like to read how I did it, please refer to the steps below. Referring to the steps I took may help you understand your weak points and how to combat them.</p>
<h3 id="contact">1. Alternative Contact Details</h3> <h3 id="contact">1. Alternative Contact Details</h3>
<p>Make a list of all of your friends and cross out the ones that you know can be reached on other chat applications. Ask the rest for alternative contact methods. This may be through apps like Signal, Session, XMPP, Matrix, or WhatsApp. Just make sure that it is not another social media app.</p> <p>Make a list of all of your friends and cross out the ones that you know can be reached on other chat applications. Ask the rest for alternative contact methods. This may be through apps like Signal, Session, XMPP, Matrix, or WhatsApp. Just make sure that it is not another social media app.</p>
@ -120,7 +120,7 @@
<li>Immediately delete all records of the password and restart your device to clear it from your clipboard</li> <li>Immediately delete all records of the password and restart your device to clear it from your clipboard</li>
</ol> </ol>
<p>These steps were drastic but they practically cemented the fact that my account was going to be deleted, no matter what.</p> <p>These steps were drastic but they practically cemented the fact that my account was going to be deleted, no matter what.</p>
<h2 id="conclusion"><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M6.012 18H21V4a2 2 0 0 0-2-2H6c-1.206 0-3 .799-3 3v14c0 2.201 1.794 3 3 3h15v-2H6.012C5.55 19.988 5 19.805 5 19s.55-.988 1.012-1zM8 6h9v2H8V6z"/></svg>Conclusion</h2> <h2 id="conclusion">Conclusion</h2>
<p>There is not much left to say. I am much, much happier without social media. I have more time on my hands and I am still getting the information I want from RSS feeds without an algorithm trying to pull me in. Big corporations have much less data about me, I have a lot of time and have produced a lot of work. In terms of academics, my overall percentage in school has increased by over 20%. I find difficult subjects easier and easy subjects a piece of cake.</p> <p>There is not much left to say. I am much, much happier without social media. I have more time on my hands and I am still getting the information I want from RSS feeds without an algorithm trying to pull me in. Big corporations have much less data about me, I have a lot of time and have produced a lot of work. In terms of academics, my overall percentage in school has increased by over 20%. I find difficult subjects easier and easy subjects a piece of cake.</p>
<p>All in all, if you care about yourself, delete your social media. It is a hellhole that is getting worse by the day.</p> <p>All in all, if you care about yourself, delete your social media. It is a hellhole that is getting worse by the day.</p>
<p><a href="mailto:sufyaan@counterhawks.com?subject=Stop%20Using%20Social%20Media">>>> Reply To Me</a></p> <p><a href="mailto:sufyaan@counterhawks.com?subject=Stop%20Using%20Social%20Media">>>> Reply To Me</a></p>

@ -68,6 +68,7 @@ svg.titles {
.pane{ .pane{
padding-left: 1vw; padding-left: 1vw;
margin-right: 5px; margin-right: 5px;
list-style-type: none;
} }
.nested-list,.posts,h1,ol,ul{ .nested-list,.posts,h1,ol,ul{
margin-top:1vw; margin-top:1vw;
@ -102,7 +103,8 @@ hr{
} }
code{ code{
color:#50fa7b; color:#50fa7b;
overflow-wrap:break-word overflow-wrap:break-word;
font-size: 140%;
} }
a{ a{
color:#8be9fd color:#8be9fd

@ -17,9 +17,9 @@
</a> </a>
<hr/> <hr/>
<p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href=".">Why I Use Terminal Apps</a></p> <p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href=".">Why I Use Terminal Apps</a></p>
<h1><svg class="titles" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 256 256"><path fill="currentColor" d="M216 40H40a16 16 0 0 0-16 16v144a16 16 0 0 0 16 16h176a16 16 0 0 0 16-16V56a16 16 0 0 0-16-16ZM77.66 173.66a8 8 0 0 1-11.32-11.32L100.69 128L66.34 93.66a8 8 0 0 1 11.32-11.32l40 40a8 8 0 0 1 0 11.32ZM192 176h-64a8 8 0 0 1 0-16h64a8 8 0 0 1 0 16Z"/></svg>Why I Use Terminal Apps</h1> <h1>Why I Use Terminal Apps</h1>
<p style="font-size:110%"></strong>Category: Posted on: <strong>13 March 2023</strong></p> <p style="font-size:110%"></strong>Posted on: <strong>13 March 2023</strong></p>
<p style="font-size:110%"></strong>Category: Reading time: <strong>5 min</strong> <p style="font-size:110%"></strong>Reading time: <strong>5 min</strong>
<p style="font-size:110%">Category: <a style="color:#ff79c6" href="../blog/linux"><strong>Linux</strong></a> && <a style="color:#ff79c6" href="../blog/software/"><strong>Software</strong></a></p> <p style="font-size:110%">Category: <a style="color:#ff79c6" href="../blog/linux"><strong>Linux</strong></a> && <a style="color:#ff79c6" href="../blog/software/"><strong>Software</strong></a></p>
<p><em>“Ah, yes. Graphical-user interface (GUI) apps. They are so comfortable and easy to use. You just click some buttons and get your computer to do what you want.”</em></p> <p><em>“Ah, yes. Graphical-user interface (GUI) apps. They are so comfortable and easy to use. You just click some buttons and get your computer to do what you want.”</em></p>
<p>That was what I thought before I learned how spectacular terminal applications are. <strong>I do not use a calendar or email GUI app. I use its terminal equivalent.</strong> Specifically, I use Calcurse for my calendar/todo, neomutt for my email, sxiv for my image viewing, mpv for my video playing and even Joplin (CLI) for my notes. I am still actively looking for more apps like terminal file managers (lf, ranger, mc) and terminal versions of GUI apps I use (Bitwarden?). What compelled me to switch?</p> <p>That was what I thought before I learned how spectacular terminal applications are. <strong>I do not use a calendar or email GUI app. I use its terminal equivalent.</strong> Specifically, I use Calcurse for my calendar/todo, neomutt for my email, sxiv for my image viewing, mpv for my video playing and even Joplin (CLI) for my notes. I am still actively looking for more apps like terminal file managers (lf, ranger, mc) and terminal versions of GUI apps I use (Bitwarden?). What compelled me to switch?</p>

@ -18,25 +18,25 @@
</pre> </pre>
</a> </a>
<hr/> <hr/>
<p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href="."><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 32 32"><path fill="currentColor" d="m11 23.18l-2-2.001l-1.411 1.41L11 26l6-6l-1.41-1.41L11 23.18zM28 30h-4v-2h4V16h-4V8a4.005 4.005 0 0 0-4-4V2a6.007 6.007 0 0 1 6 6v6h2a2.002 2.002 0 0 1 2 2v12a2.002 2.002 0 0 1-2 2z"/><path fill="currentColor" d="M20 14h-2V8A6 6 0 0 0 6 8v6H4a2 2 0 0 0-2 2v12a2 2 0 0 0 2 2h16a2 2 0 0 0 2-2V16a2 2 0 0 0-2-2ZM8 8a4 4 0 0 1 8 0v6H8Zm12 20H4V16h16Z"/></svg>Start Using 2FA Properly</a></p> <p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href=".">Start Using 2FA Properly</a></p>
<h1><svg class="titles" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32"><path fill="currentColor" d="m11 23.18l-2-2.001l-1.411 1.41L11 26l6-6l-1.41-1.41L11 23.18zM28 30h-4v-2h4V16h-4V8a4.005 4.005 0 0 0-4-4V2a6.007 6.007 0 0 1 6 6v6h2a2.002 2.002 0 0 1 2 2v12a2.002 2.002 0 0 1-2 2z"/><path fill="currentColor" d="M20 14h-2V8A6 6 0 0 0 6 8v6H4a2 2 0 0 0-2 2v12a2 2 0 0 0 2 2h16a2 2 0 0 0 2-2V16a2 2 0 0 0-2-2ZM8 8a4 4 0 0 1 8 0v6H8Zm12 20H4V16h16Z"/></svg>Start Using 2FA Properly</h1><p style="font-size:110%">Posted on: <strong>13 May 2023</strong></p><p style="font-size:110%">Reading time: <strong><strong>3 min</strong><p><p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M14 18.32A7.06 7.06 0 0 1 11.28 16H3V4h18v2.26a7.08 7.08 0 0 1 2 2.15V4a2 2 0 0 0-2-2H3a2 2 0 0 0-2 2v12a2 2 0 0 0 2 2h7v2H8v2h8v-2h-2Z"/><path fill="currentColor" d="M17 6a6 6 0 1 0 6 6a6 6 0 0 0-6-6Zm0 7.5a1.5 1.5 0 1 1 1.5-1.5a1.5 1.5 0 0 1-1.5 1.5Z"/></svg><strong>Software</strong></a> && <a style="color:#ff79c6" href="../blog/guides/"><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 512 512"><path fill="currentColor" d="M464 48c-67.61.29-117.87 9.6-154.24 25.69c-27.14 12-37.76 21.08-37.76 51.84V448c41.57-37.5 78.46-48 224-48V48ZM48 48c67.61.29 117.87 9.6 154.24 25.69c27.14 12 37.76 21.08 37.76 51.84V448c-41.57-37.5-78.46-48-224-48V48Z"/></svg><strong>Guides</strong></a></p> <h1>Start Using 2FA Properly</h1><p style="font-size:110%">Posted on: <strong>13 May 2023</strong></p><p style="font-size:110%">Reading time: <strong><strong>3 min</strong><p><p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><strong>Software</strong></a> && <a style="color:#ff79c6" href="../blog/guides/"><strong>Guides</strong></a></p>
<p>If you use any online account, you should use 2FA keys. It does not matter if it is your Google account that has all of your personal information or if it is some random account you use once in a while. You should at least have 2FA enabled in an authenticator app or preferably a 2FA key. Do not use SMS.</p> <p>If you use any online account, you should use 2FA keys. It does not matter if it is your Google account that has all of your personal information or if it is some random account you use once in a while. You should at least have 2FA enabled in an authenticator app or preferably a 2FA key. Do not use SMS.</p>
<p>Why buy a 2FA key when you can use 2FA codes or SMS for free? Let us start with SMS.</p> <p>Why buy a 2FA key when you can use 2FA codes or SMS for free? Let us start with SMS.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M448 0H64C28.6 0 0 28.6 0 64v256c0 35.4 28.6 64 64 64h128l-42.7 128l192-128H448c35.4 0 64-28.6 64-64V64c0-35.4-28.6-64-64-64zM128 234.7c-23.6 0-42.7-19.1-42.7-42.7s19.1-42.7 42.7-42.7s42.7 19.1 42.7 42.7s-19.1 42.7-42.7 42.7zm128 0c-23.6 0-42.7-19.1-42.7-42.7s19.1-42.7 42.7-42.7s42.7 19.1 42.7 42.7s-19.1 42.7-42.7 42.7zm128 0c-23.6 0-42.7-19.1-42.7-42.7s19.1-42.7 42.7-42.7s42.7 19.1 42.7 42.7s-19.1 42.7-42.7 42.7z"/></svg>SMS</h2> <h2>SMS</h2>
<p>SMS is inherently insecure. It is not encrypted, and your SIM card is always susceptible to SIM swap attacks. A SIM swap attack is a type of identity theft where a cybercriminal pretends to be you and asks for your number to be switched to a SIM card in their possession. They do this by claiming that their phone was lost or stolen. Most employees working for mobile networks speak with hundreds of people a day. They cannot differentiate people's voices. Even with a small amount of voice modulation, almost anyone can trick them into thinking it's you. <p>SMS is inherently insecure. It is not encrypted, and your SIM card is always susceptible to SIM swap attacks. A SIM swap attack is a type of identity theft where a cybercriminal pretends to be you and asks for your number to be switched to a SIM card in their possession. They do this by claiming that their phone was lost or stolen. Most employees working for mobile networks speak with hundreds of people a day. They cannot differentiate people's voices. Even with a small amount of voice modulation, almost anyone can trick them into thinking it's you.
</p> </p>
<p>After gaining possession of your SIM card, the cybercriminal goes to your online accounts and tries to reset your passwords. If they already have your passwords, they may try to login using your phone number and the 2FA code received through SMS. This may seem rare, and it may also seem like it does not work on most people. However, in 2019, <a href="https://www.nytimes.com/2019/09/05/technology/sim-swap-jack-dorsey-hack.html">Jack Dorsey's (the former CEO of Twitter) account got hacked using this exact method.</a> <p>After gaining possession of your SIM card, the cybercriminal goes to your online accounts and tries to reset your passwords. If they already have your passwords, they may try to login using your phone number and the 2FA code received through SMS. This may seem rare, and it may also seem like it does not work on most people. However, in 2019, <a href="https://www.nytimes.com/2019/09/05/technology/sim-swap-jack-dorsey-hack.html">Jack Dorsey's (the former CEO of Twitter) account got hacked using this exact method.</a>
<p>As commonly said by many privacy and security professionals, you are only as secure as your weakest link. Make sure your weakest link is not SMS. <p>As commonly said by many privacy and security professionals, you are only as secure as your weakest link. Make sure your weakest link is not SMS.
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M21 10h-8.35A5.99 5.99 0 0 0 7 6c-3.31 0-6 2.69-6 6s2.69 6 6 6a5.99 5.99 0 0 0 5.65-4H13l2 2l2-2l2 2l4-4.04L21 10zM7 15c-1.65 0-3-1.35-3-3s1.35-3 3-3s3 1.35 3 3s-1.35 3-3 3z"/></svg>Authenticator Apps</h2> <h2>Authenticator Apps</h2>
<p>An authenticator app is much better than SMS-based 2FA. This is because authenticator apps usually follow the TOTP or HOTP standard, which is very secure. It basically uses a secret key along with the current time to create a unique code that changes every thirty seconds.</p> <p>An authenticator app is much better than SMS-based 2FA. This is because authenticator apps usually follow the TOTP or HOTP standard, which is very secure. It basically uses a secret key along with the current time to create a unique code that changes every thirty seconds.</p>
<p>One thing that you should absolutely not do is use Google Authenticator, Microsoft Authenticator, Authy or anything as such. This is because the clients are close-sourced, which means that the code is not public. This means that they could be doing anything with your 2FA secret keys. Authy syncs your codes which is convenient but it does not allow you to export your keys, just like other properietary authentication apps. This is unethical as you should have complete control over what is required to access your own accounts. If your Authy account gets disabled, you will no longer be able to log in to most accounts. A much better alternative is:</p> <p>One thing that you should absolutely not do is use Google Authenticator, Microsoft Authenticator, Authy or anything as such. This is because the clients are close-sourced, which means that the code is not public. This means that they could be doing anything with your 2FA secret keys. Authy syncs your codes which is convenient but it does not allow you to export your keys, just like other properietary authentication apps. This is unethical as you should have complete control over what is required to access your own accounts. If your Authy account gets disabled, you will no longer be able to log in to most accounts. A much better alternative is:</p>
<ul><li><a href="https://getaegis.app/">Aegis</a> (Android)</li><li><a href="https://raivo-otp.com/">Raivo</a> (iOS)</li><li><a href="https://www.tofuauth.com/">Tofu</a> (iOS)</li><li><a href="https://www.passwordstore.org/">password store</a> with <a href="https://github.com/tadfisher/pass-otp">pass-otp</a> (UNIX-based systems)</a></li><li><a href="https://keepass.info/download.html">Keepass Password Manager</a> (<strong>Linux</strong>/Windows/MacOS/Android/iOS)</a></li></ul> <ul><li><a href="https://getaegis.app/">Aegis</a> (Android)</li><li><a href="https://raivo-otp.com/">Raivo</a> (iOS)</li><li><a href="https://www.tofuauth.com/">Tofu</a> (iOS)</li><li><a href="https://www.passwordstore.org/">password store</a> with <a href="https://github.com/tadfisher/pass-otp">pass-otp</a> (UNIX-based systems)</a></li><li><a href="https://keepass.info/download.html">Keepass Password Manager</a> (<strong>Linux</strong>/Windows/MacOS/Android/iOS)</a></li></ul>
<p>You should also be taking frequent <strong>encrypted backups</strong> of not only your 2FA codes, but all data that is important to you. Read <a style="color:#bd93f9" href="../backups/">this post</a> to learn how to take encrypted backups properly. Remember, you should keep your backups as far away from other people's hands as possible. If they have your secret keys, they have your 2FA codes.</p> <p>You should also be taking frequent <strong>encrypted backups</strong> of not only your 2FA codes, but all data that is important to you. Read <a style="color:#bd93f9" href="../backups/">this post</a> to learn how to take encrypted backups properly. Remember, you should keep your backups as far away from other people's hands as possible. If they have your secret keys, they have your 2FA codes.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="m12.356 12.388l2.521-7.138h3.64l-6.135 15.093H8.539l1.755-4.136L6 5.25h3.717ZM12 0C5.381 0 0 5.381 0 12s5.381 12 12 12s12-5.381 12-12S18.619 0 12 0Zm0 1.5c5.808 0 10.5 4.692 10.5 10.5S17.808 22.5 12 22.5S1.5 17.808 1.5 12S6.192 1.5 12 1.5Z"/></svg>Security Keys</h2> <h2>Security Keys</h2>
<p>Security keys are the best form of two-factor authentication. They are physical keys which need to be plugged in to your computer or smartphone in order to be used. They use NFC, USB-C, USB-A and also the Lightning port. This 2FA method makes it so that it does not matter which person gets your credentials because they need access to your key physically in order to login. One drawback of this method is that, if you lose your key, you cannot login to your accounts. This is why people buy 2 or 3 as a backup. It should be noted that, although other methods can be used alongside <a style="color:#50fa7b" href="../definitions/security-key">security keys</a>, it is not recommended as it is still possible to just use the other insecure methods for a cybercriminal and bypass your <a style="color:#50fa7b" href="../definitions/security-key">security key</a>.</p> <p>Security keys are the best form of two-factor authentication. They are physical keys which need to be plugged in to your computer or smartphone in order to be used. They use NFC, USB-C, USB-A and also the Lightning port. This 2FA method makes it so that it does not matter which person gets your credentials because they need access to your key physically in order to login. One drawback of this method is that, if you lose your key, you cannot login to your accounts. This is why people buy 2 or 3 as a backup. It should be noted that, although other methods can be used alongside <a style="color:#50fa7b" href="../definitions/security-key">security keys</a>, it is not recommended as it is still possible to just use the other insecure methods for a cybercriminal and bypass your <a style="color:#50fa7b" href="../definitions/security-key">security key</a>.</p>
<p>I recommend <a href="https://www.yubico.com/">Yubico</a> and <a href="https://shop.nitrokey.com/shop/product/nkfi2-nitrokey-fido2-55">NitroKey</a> <a style="color:#50fa7b" href="../definitions/security-key">security keys</a>.</p> <p>I recommend <a href="https://www.yubico.com/">Yubico</a> and <a href="https://shop.nitrokey.com/shop/product/nkfi2-nitrokey-fido2-55">NitroKey</a> <a style="color:#50fa7b" href="../definitions/security-key">security keys</a>.</p>
<h2><svg class="heading2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M6.012 18H21V4a2 2 0 0 0-2-2H6c-1.206 0-3 .799-3 3v14c0 2.201 1.794 3 3 3h15v-2H6.012C5.55 19.988 5 19.805 5 19s.55-.988 1.012-1zM8 6h9v2H8V6z"/></svg>Conclusion</h2> <h2>Conclusion</h2>
<p>If there is one thing you take away from this post, it is to make 2FA your baseline security protocol. Use 2FA for <strong>every account that has it.</strong> Do not use SMS, use authenticator apps. If possible, spend money on three <a style="color:#50fa7b" href="../definitions/security-key">security keys</a>.</p> <p>If there is one thing you take away from this post, it is to make 2FA your baseline security protocol. Use 2FA for <strong>every account that has it.</strong> Do not use SMS, use authenticator apps. If possible, spend money on three <a style="color:#50fa7b" href="../definitions/security-key">security keys</a>.</p>
<p><a href="mailto:sufyaan@counterhawks.com?subject=Start%20Using%202FA%20Properly">>>> Reply To Me</a></p> <p><a href="mailto:sufyaan@counterhawks.com?subject=Start%20Using%202FA%20Properly">>>> Reply To Me</a></p>
<p><a href="tfa.pdf">>>> Download PDF</a></p> <p><a href="tfa.pdf">>>> Download PDF</a></p>

@ -18,12 +18,12 @@
</a> </a>
</a> </a>
<hr/> <hr/>
<p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href="."><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="M15 7v4h1v2h-3V5h2l-3-4l-3 4h2v8H8v-2.07c.7-.37 1.2-1.08 1.2-1.93c0-1.21-.99-2.2-2.2-2.2c-1.21 0-2.2.99-2.2 2.2c0 .85.5 1.56 1.2 1.93V13c0 1.11.89 2 2 2h3v3.05c-.71.37-1.2 1.1-1.2 1.95a2.2 2.2 0 0 0 4.4 0c0-.85-.49-1.58-1.2-1.95V15h3c1.11 0 2-.89 2-2v-2h1V7h-4z"/></svg>Buy Only Metal USBs</a></p> <p><a href="../">sf.cu</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href=".">Buy Only Metal USBs</a></p>
<h1><svg class="titles" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path fill="currentColor" d="M15 7v4h1v2h-3V5h2l-3-4l-3 4h2v8H8v-2.07c.7-.37 1.2-1.08 1.2-1.93c0-1.21-.99-2.2-2.2-2.2c-1.21 0-2.2.99-2.2 2.2c0 .85.5 1.56 1.2 1.93V13c0 1.11.89 2 2 2h3v3.05c-.71.37-1.2 1.1-1.2 1.95a2.2 2.2 0 0 0 4.4 0c0-.85-.49-1.58-1.2-1.95V15h3c1.11 0 2-.89 2-2v-2h1V7h-4z"/></svg>Buy Only Metal USBs</h1> <h1>Buy Only Metal USBs</h1>
<p style="font-size:110%">Posted on: <strong>6 May 2023</strong></p> <p style="font-size:110%">Posted on: <strong>6 May 2023</strong></p>
<p style="font-size:110%">Reading time: <strong><strong>2 min</strong> <p style="font-size:110%">Reading time: <strong><strong>2 min</strong>
<p> <p>
<p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/technology/"><svg class="posts" xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24"><path fill="currentColor" d="m23 12l-7.071 7.07l-1.414-1.413L20.172 12l-5.657-5.657l1.414-1.414L23 11.999ZM3.828 12l5.657 5.657l-1.414 1.414L1 12l7.071-7.071l1.414 1.414L3.828 12Z"/></svg><strong>Technology</strong></a> <p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/technology/"><strong>Technology</strong></a>
<p>You should only buy metal USBs because they last longer. Metal USBs should be used for everything that a USB is used for. First, let me clarify what USBs are supposed to be used for:</p> <p>You should only buy metal USBs because they last longer. Metal USBs should be used for everything that a USB is used for. First, let me clarify what USBs are supposed to be used for:</p>
<ul> <ul>
<li>Data Transfer</li> <li>Data Transfer</li>

Loading…
Cancel
Save