Hacker Newsnew | past | comments | ask | show | jobs | submit | Kimcha's commentslogin

I created this plugin because I frequently scroll back in my terminal history and wanted a way to know at what time a command was run and how long it took.

Unfortunately, the prompt normally shows the time when the prompt was generated and not when the command was run.

This plugin solves this issue.

I also added a detailed guide on how to set up fish with the super customizable starship prompt and make it super fast with the `fish-sync-prompt` plugin.

You can find the guide here:

https://github.com/infused-kim/fish-refresh-prompt-on-cmd#id...

And of course all of this has been tested and is compatible with the new rust-based v4 fish beta.

Let me know what you think and consider leaving a github star if you like it.


How much do you think would be reasonably-priced?


In a range of 100-150 US$ a piece.

Perhaps 500-800 US$ for 5 finished keyboards.

Similar to this Omnikey Ultra T, in a similar build quality, but with few keys rearranged. I wish the F11 and F12 on the life side to be below F9 and F10 keys.

https://www.thurrott.com/forums/general-discussion/hardware/...

I like the heavy metal bottom plate, but can be (cheaper) molded plastic.

My current Ultra T is at end of life, I am resoldering the gradually failing white ALPS.


Not if you are using their cloud version instead of the open source self hosted server.

The code they are running does have to be the code they are publishing.

And if someone compromises their cloud servers, they could also modify it to log the passwords entered.


They have a paper about their architecture.

Basically, your master password is never sent, and everything is encrypted and decrypted locally.

You can't audit the server side code, but you can audit the client (and compile it from source) to make sure that the encryption is local and the master password is not sent.


Hah, so I suppose the next step would be a browser extension that performs this auditing on every visit


Yes we can degenerate into inordinate amounts of rabbit holes. For 1, you can audit the JS that runs on your browser, it's not hiding (so it's not strictly fair to say that just because you loaded a webpage in your browser from their server it can't be trusted). And anyway, generally, your argument holds for any software interaction ever. GH doesn't have to ship you the repo that you browsed on the web client. A malicious actor could have compromised their infra and be serving fake code in the web UI but have added all sorts of malware to the stuff you download. Apple app store doesn't eve ship you the exact binary the developer uploaded. Scary. At some point you have to decide which threat vectors you actually care about. Give me a scenario and I can tell you how someone can theoretically attack it and why you're not safe. The only thing you can be 100% sure about is manually auditing every single release at the source level and building it yourself.


Well even then you have to make sure your compiler isn’t playing tricks on you. So compile your compiler from source … oh wait. Then you have your cpu microcode, firmware, security coprocessors.

Trusting trust


If you run keepass in a cgroup with no networking (or blocking in/outbound traffic in windows firewall) or extra disk access, your attack vector shrinks considerably. That's not particularly difficult to do, while it is to audit js on every single bitwarden page load


But your data is encrypted client side. It shouldn't be too difficult to audit thay the client side code matches a build of their original sources.


Then host your own.


I saw a post on Reddit where a user was denied service, because the thermal pad left a spot that looked like it could be liquid.

Apple refused to service it due to liquid damage.

It was probably the glue residue. So perhaps it would be better to stick it to the lid and not the heat sink.


There are services that use humans to solve captchas for a very reasonable price, such as 2Captcha.

Some of the protections are better than others. For example, you may need to use a real browser with Java script support instead of just HTTP requests.

Browserless works well if you enable the stealth functions.


I am using https://www.arqbackup.com/ to back up to my Microsoft OneDrive.

It’s end to end encrypted. So there are no privacy concerns.

And you get get Microsoft 365 family, which gives you 5x 1tb accounts for something like $60 per year.

This ends up super cheap and protects your data even if your house burns down as it’s off-site.


I have approached the problem in a similar way, but without python.

I published my self-documenting docker Makefiles here:

https://github.com/Infused-Insight/docker_makefiles


Have you read the actual documents?

Most of it is Murphy’s unsubstantiated opinion.

All the quotes in the video are from Murphy’s opinion and not from the leaked funding request documents.

Nowhere in the documents is any proof that DARPA rejected the research due to gain of function concerns.

All we know from the documents is that HealthAlliance requested funding to research and vaccinated bats.

That’s it.

Everything else is fan fiction by a soldier.


>>>Have you read the actual documents? Most of it is Murphy’s unsubstantiated opinion.

His letter to the Inspector General lists reference documents. Even a cursory search via DDG yields some of them, which were covered on HN when they were released back in September ( https://news.ycombinator.com/item?id=28965770 ).

https://newsrescue.com/wp-content/uploads/2021/09/defuse-pro...

https://drasticresearch.files.wordpress.com/2021/09/defuse-p...

https://drasticresearch.org/2021/09/21/the-defuse-project-do...

>>>Nowhere in the documents is any proof that DARPA rejected the research due to gain of function concerns.

Here's the rejection: https://drasticresearch.files.wordpress.com/2021/09/hr00118s...

"The team discusses risk mitigation strategies to address potential risks of the research to public health and animal safety but does not mention or assess potential risks of Gain of Function (GoF) research and DURC. Given the team's approach does potentially involve GoF/DURC research (they aim to synthesize spike glycoproteins that may bind to human cell receptors and insert them into SARSsr-CoV backbones to assess capacity to cause SARS-like disease), if selected for funding an appropriate DURC risk mitigation plan should be incorporated into contracting language that includes a responsible communications plan."

Major Murphy's letter also states: "When synthesized with the EcoHealth Alliance proposal, US collections confirm EcoHealth Alliance was performing the work proposed. The analysts produce their reports in a vacuum, absent the context the proposal provides. As a fellow at DARPA, I could see both, and can do the synthesis."

Do you have access to the intelligence agency collections plans, and/or their analyst outputs? What information do you have that contradicts his statement that his conclusions are corroborated by Top Secret intel analysis?

>>>Everything else is fan fiction by a soldier.

Are you ready to retract that accusation?


I love docker, but I really dislike having to remember and type long commands (even with docker-compose).

So I decided to create a set of Makefiles to make it easier and more convenient.

The Makefiles...

   * Auto-generate a list of all available targets / commands that you can see by running `make help`

   * Provide useful defauult commands such as `make run`, `make restart` and many more

   * Allow you to add additional service-specific commands

   * Allow you to override default commands

   * Display the traefik URL of the service on start / restart
Decided to share it here, since it might be useful to someone else.

Let me know what you think!


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: