I created this plugin because I frequently scroll back in my terminal history and wanted a way to know at what time a command was run and how long it took.
Unfortunately, the prompt normally shows the time when the prompt was generated and not when the command was run.
This plugin solves this issue.
I also added a detailed guide on how to set up fish with the super customizable starship prompt and make it super fast with the `fish-sync-prompt` plugin.
Similar to this Omnikey Ultra T, in a similar build quality, but with few keys rearranged. I wish the F11 and F12 on the life side to be below F9 and F10 keys.
Basically, your master password is never sent, and everything is encrypted and decrypted locally.
You can't audit the server side code, but you can audit the client (and compile it from source) to make sure that the encryption is local and the master password is not sent.
Yes we can degenerate into inordinate amounts of rabbit holes. For 1, you can audit the JS that runs on your browser, it's not hiding (so it's not strictly fair to say that just because you loaded a webpage in your browser from their server it can't be trusted). And anyway, generally, your argument holds for any software interaction ever. GH doesn't have to ship you the repo that you browsed on the web client. A malicious actor could have compromised their infra and be serving fake code in the web UI but have added all sorts of malware to the stuff you download. Apple app store doesn't eve ship you the exact binary the developer uploaded. Scary. At some point you have to decide which threat vectors you actually care about. Give me a scenario and I can tell you how someone can theoretically attack it and why you're not safe. The only thing you can be 100% sure about is manually auditing every single release at the source level and building it yourself.
Well even then you have to make sure your compiler isn’t playing tricks on you. So compile your compiler from source … oh wait.
Then you have your cpu microcode, firmware, security coprocessors.
If you run keepass in a cgroup with no networking (or blocking in/outbound traffic in windows firewall) or extra disk access, your attack vector shrinks considerably. That's not particularly difficult to do, while it is to audit js on every single bitwarden page load
There are services that use humans to solve captchas for a very reasonable price, such as 2Captcha.
Some of the protections are better than others. For example, you may need to use a real browser with Java script support instead of just HTTP requests.
Browserless works well if you enable the stealth functions.
>>>Have you read the actual documents? Most of it is Murphy’s unsubstantiated opinion.
His letter to the Inspector General lists reference documents. Even a cursory search via DDG yields some of them, which were covered on HN when they were released back in September ( https://news.ycombinator.com/item?id=28965770 ).
"The team discusses risk mitigation strategies to address potential risks of the research to public health and animal safety but does not mention or assess potential risks of Gain of Function (GoF) research and DURC. Given the team's approach does potentially involve GoF/DURC research (they aim to synthesize spike glycoproteins that may bind to human cell receptors and insert them into SARSsr-CoV backbones to assess capacity to cause SARS-like disease), if selected for funding an appropriate DURC risk mitigation plan should be incorporated into contracting language that includes a responsible communications plan."
Major Murphy's letter also states: "When synthesized with the EcoHealth Alliance proposal, US collections confirm EcoHealth Alliance was performing the work proposed. The analysts produce their reports in a vacuum, absent the context the proposal provides. As a fellow at DARPA, I could see both, and can do the synthesis."
Do you have access to the intelligence agency collections plans, and/or their analyst outputs? What information do you have that contradicts his statement that his conclusions are corroborated by Top Secret intel analysis?
I love docker, but I really dislike having to remember and type long commands (even with docker-compose).
So I decided to create a set of Makefiles to make it easier and more convenient.
The Makefiles...
* Auto-generate a list of all available targets / commands that you can see by running `make help`
* Provide useful defauult commands such as `make run`, `make restart` and many more
* Allow you to add additional service-specific commands
* Allow you to override default commands
* Display the traefik URL of the service on start / restart
Decided to share it here, since it might be useful to someone else.
Unfortunately, the prompt normally shows the time when the prompt was generated and not when the command was run.
This plugin solves this issue.
I also added a detailed guide on how to set up fish with the super customizable starship prompt and make it super fast with the `fish-sync-prompt` plugin.
You can find the guide here:
https://github.com/infused-kim/fish-refresh-prompt-on-cmd#id...
And of course all of this has been tested and is compatible with the new rust-based v4 fish beta.
Let me know what you think and consider leaving a github star if you like it.