Show newer

@light That's fine. i get disrespected and abused for my identity constantly. Another knife in my back is irrelevant. I wish you better treatment and kindness.

TIL git worktrees are a thing.

Whenever you're tempted to clone the same repository multiple times to work on different branches simultaneously, use a worktree instead.

This is a 10 year old git feature that I wish I'd known about 10 years ago.

Thanks @webology for the tip.

Feels kinda good to make little apps that nobody will ever use. It does exactly what I want in as little code as it needs.

hyper://816idd9ddxq8asy68sya1y3du3nyipiszcr6tfyq66x47ha3jxuy/notepad.html

Custom keybindings are like spells you can cast in cyberspace. I just conjured one that pulls wayland's selection buffer and uses it as an LLM prompt then uses ydotool to write out the response.

Since my main input device is a game controller the key binding is the BackRight paddle plus the A button.

@j3rn Jeeze, these things are getting so beefy :P The xreal beam pro might be an OK alternative too. Termux or VNC into a linux box could get around some system limitations for example. I guess it also depends on what you want to do on em? I mostly do node/rust dev lately which is okay ish on ARM.

youtube.com/watch?v=9TnBpCnX31

@j3rn Yeah big same. Or even something with the same specs of my GPD WIN 4 but just a compute puck with a battery.

Phones are a bit too weak IMO

16. I feel like I'm the sort of weirdo that'd wear chair pants in public and sometimes I really do be wanting to sit whenever. Feels like it'd be a good part of my "cyborg setup" with the scanner thingie.

aliexpress.com/item/1005008244

Show thread

Anyway. I know plenty of people have said this before but "disabled" is is the minority you can be forced to join with no consent or advance notice. You can see those tiny fonts fine, you've got two working hands and fine motor control, you can hear, you can walk an unassisted city block pain free on two working feet? Sure you can. Today. For now. Maybe tomorrow, too!

Our AC is starting to struggle to keep up. 😵

Been horrifying teammates by referring to undocumented information that's held only in people's heads as "locked in meat storage".

Please use this with your teams/projects and report back on how they like it?

@trwnh IMO the Nostr approach of keeping keys in the client and having relays be more simple is good. Key management and multi devicw identity is a major PITA, but there's a lot of known approaches that can be taken.

@tahnok That's awesome! I haven't reversed BLE stuff in ages. I usually just decompile / recompile the vendor's app then set breakpoints/logpoints in the Android APIs for talking to the characteristics then do replays. Any tips on the firmware rewriting? I'd love to have some flow where I could turn it into something like C and back but have no clue where to even start. 😅

EDIT: I have more advice than I know what to do with thank you so much, I'll hopefully be able to convince her to let me back up and wipe the phone. If she doesn't consent to that, I also have some good direction on detecting anything malicious. Thank you again <3

ORIGINAL POST: Can anyone point me toward some resources on detecting and removing stalkerware on Android?

A friend of a friend has just gotten out of an abusive relationship and I've been asked the look over their phone and computer for any stalkerware the ex might have planted. I'm fairly confident in my abilities on a PC, but not an android phone.

@CursedSilicon “You get used to it after a while. I don’t even see the messages anymore, All I see is Unable to decrypt message, Unable to decrypt message, Unable to decrypt message…”

Show older
Mauvestodon

Escape ship from centralized social media run by Mauve.