22,405 Matching Annotations
  1. Apr 2024
    1. google.search: allow+unsecure+ws+connections

      possible.answer - thisisunsafe bypassing chrome security

      Description

    2. Sep 20, 2017 — However, my page is loaded over HTTPS, which means the browser won't allow an unsecure WS connection, instead it will require a secure WSS ...
    1. If you have admin privileges on the POS terminals, how about adding a line to the HOSTS file like: 127.0.0.1 localhost.mycompany.com

      answer

    2. How can I establish a secure connection to a websocket on localhost?

      secure ws websocket connection to localhost

    1. You would need a WebSocket proxy

      to - HTML5 Web sockets Proxy Server

    2. I can't downgrade my site to http

      cannot downgrade my site

    3. "the browser won't allow it"

      so no

    4. Connect to an unsecured WebSocket over https

      I am trying to establish a connection to a unsecured WebSocket.

    1. Sep 20, 2017 — However, my page is loaded over HTTPS, which means the browser won't allow an unsecure WS connection, instead it will require a secure WSS .
    1. How HTML5 Web Sockets Interact With Proxy Servers $("#translated_"+InfoQConstants.userDetectedCountryCode.toLowerCase()).show(); Like Print Bookmarks if(loggedIn){ $('#showBookmarks').show(); } function performBookmark() { Bookmarks.toggleBookmark('articles', 'Web-Sockets-Proxy-Servers'); } infoq.event.on('bookmarkRequested', function(e) { Bookmarks.toggleBookmark('articles', 'Web-Sockets-Proxy-Servers'); }); infoq.event.on("loaded", function(){ if(loggedIn){ var href = window.location.href; if(href.indexOf("#bookmarkPage") != -1){ $('#bookmarkBtn').click(); } } }); $(document).ready(function() { if(Bookmarks.isContentBookmarked == 'true'){ $('#bookmarkBtn').addClass('button__green'); $('#bookmarkBtn').removeClass('button__gray'); }else{ $('#bookmarkBtn').removeClass('button__green'); $('#bookmarkBtn').addClass('button__gray'); } });

      from

  2. Mar 2024
    1. This is a free equivalent to ngrok and it only uses SSH - https://serveo.net/ - and it accepts custom subdomains.

      seveo

    1. Expose local servers to the internetNo installation, no signup

      ssh -R 80:localhost:3000 serveo.net

    Annotators

    URL

    1. here are a couple of good free services that let you do the same. Ideal for showing something quickly during development/testing: http://localtunnel.me/

      fist one is the best

    2. http://localtunnel.me/

    1. you have a web server running on your machine. To access it from Internet,
    2. google.search: access server running on local machine from the internet

    1. Localtunnel allows you to easily share a web service on your local development machine without messing with DNS and firewall settings.

      <svg class="dib header__logo__text" role="img" title="Localtunnel"><use xlink:href="#logo-text"></use></svg>

      <svg class="dib header__logo__monogram" role="presentation" aria-hidden="true"><use xlink:href="#monogram"></use></svg>

    1. expose yourself localtunnel.me

      localtunnel

    2. localtunnel localtunnel exposes your localhost to the world for easy testing and sharing! No need to mess with DNS or deploy just to have others test out your changes. Great for working with browser testing tools like browserling or external api callback services like twilio which require a public url for callbacks.

      e

    1. File access control
    2. A p2p, secure file storage, social network and application protocol
    3. web interface build

      build web interface

    4. migrate to another server first ensure you have sufficient quota on it, then run the migrate command on it.

      migrate to another server

    5. mirror all of your data on another server first run the following command (on any instance):

      mirror locally

      for: peergos

    6. can revoke their following at any time

      revoke following

    7. onion routing is integrated

      Once onion routing is integrated, there will be no way for an attacker (or us) to deduce the friendship graph (who is friends with who).

      for: indy.web.mesh untraceable friendship graph

    8. respond to friend requests with their own friend request to make it bi-directional

      respond friend request bi-directional

    9. "following" someone and is a one way protocol.

      one way protocol

    10. two random symmetric keys are generated for every file or directory

      is that ephemeral encyption for each file and folder?

    11. IPFS itself is not trusted

      but self-certifying

    12. Servers are trustless

      trustless servers

    13. There is a pki node which ensures unique usernames using a structure similar to certificate transparency. This data is mirrored on every peergos server. A new node contacts any public Peergos server to join the network

      unique usernames

      servers mirror

  3. bafybeidwoxkwqq4643rd3q7bapfsz4ymgmgjxzb2x5wg6v7jsb5t4wzhki.ipfs.dweb.link bafybeidwoxkwqq4643rd3q7bapfsz4ymgmgjxzb2x5wg6v7jsb5t4wzhki.ipfs.dweb.link
    1. Application Protocol | System Design - GeeksforGeeksGeeksforGeeks

      to

    2. y R Sharp · 2008 — We shall see examples of applications which illustrate all these architectures. Keywords. User Agent · Application Protocol · File Transfer Protocol · Origin ...

      to

    1. achieve

      This allows us to achieve - cross-platform reproducible builds and - future proof our build system

      (we should be able to build - any commit - any number of years into the future

      with only a JVM).

      /**

      npm even with nvm is broken need pnpm to make your projects tree copyable */ -

    2. We avoid JS based build tools and managers like npm, webpack etc. to maintain greater control over the build process.

      control over the uild process

      future proof

      our build

      all u need is a JVM

      /* perfect

      npm even with nvm is broken

      */

    1. Aug 28, 2023 — When I was at the United Nations at the World Intellectual Property Organization, I was known as the "scourge" of the simultaneous translation ...

    1. 28c3: The coming war on general computation

      for: war computation means

    1. brave.search: Origin+trial+controlled+feature+not+enabled%3A+%27interest-cohort%27

    2. 4 August 2023 - As for The "Error with Permissions-Policy header: Origin trial controlled feature not enabled: 'interest-cohort'." warning is related to Google's FLoC (Federated Learning of Cohorts) experiment, which is a part of their Privacy Sandbox initiative. This error is not critical and should not cause ...
    1. Permissions policy header error: Interest cohert not enabled #52356

      Description

      for - local Peergos server

    2. Permissions policy header error: Interest cohert not enabled

      seen this error in peergos log

      Brave blocker rendered it unusable

    1. log in to your account from another Peergos instance

      log into your account from another peergos instance

    2. Usage - self hosting

      self hosting

      peergos self-host self-hosted self-hosting

    1. Video/audio player. Image gallery. Secure PDF viewer. Customizable profiles · Personal website hosting. Why use it? Strong client-side ...

    1. the human readable path in the Peergos global filesystem

      Human Readable Path

    2. browser fingerprinting is irrelevant for such websites because no information can be exfiltrated!

      private websites

    1. Example messages

      ``` From: John Doe jdoe@machine.example Sender: Michael Jones mjones@machine.example To: Mary Smith mary@example.net Subject: Saying Hello Date: Fri, 21 Nov 1997 09:55:06 -0600 Message-ID: 1234@local.machine.example

      This is a message just to say hello. So, "Hello". ```

    1. from: "Video: Lecture: Indy Johar – D…" (www.youtube.com)

      His last answer - self-authoring

      is indeed spot on.

    2. Lecture: Indy Johar – Designing Our Futures ⏐ Live Stream

    3. the biggest things that we need for crisis is actually our own capacity to 01:11:50 become more self-authoring

      for crisis we need - building our capacity for self authoring - self-authoring societies - capacity to author yourself

      the biggest things that we need for crisis is actually our own capacity to become more self-authoring -

      people like the Nordic secret

      from Thomas Borman I think

      who talks about vult schools in the scandix and nordics

      being a key part of building self-authoring societies and actually

      building the capacity to author yourself

      is probably the

      greatest single contribution

      to be able to operate in crisis and

      I think that's going to be a key part

    1. Sep 21, 2023 — Simple step-by-step guide on How to Install Java on Ubuntu, and any other Ubuntu-based distribution. Get started with Java today!

      to

      Description

    1. dream interpreter about comparative mythology

      X

    2. mythological ideal ideas

      and concepts are functional

      • Do things
      • Act about
      • Not label
      • not descriptive
    3. functional quality of our object categories

      functional

    4. a word was more like a um a piece in a 00:03:43 chess game

      3+ - words 🧩 piece in a chess ♟️ game 🎯 - 🏷️ label 🏷️ for an object - Do things with - not just 🧪🧫 label 🏷️ things with

      💬 🤔 think with - Concepts not theories 🤔 about objects

      Correspondence theory bunk - Action oriented - Motor 🛵 oriented cup - Motor action activated at perception

    5. philosophical investigations

      Wittgenstein

    6. 3+ - words 🧩 piece in a chess ♟️ game 🎯 - 🏷️ label 🏷️ for an object - Do things with - 💬 🤔 think with - Concepts not theories 🤔 about objects Action oriented Motor 🛵 oriented cup Motor action activated at perception

    1. Select the peergos-app.json file and choose 'Run App' to launch the app from the current directory. This is only available for launchable apps.

    1. Multiple low data rate signals are multiplexed over a single high-data-rate link, then demultiplexed at the other end.

      for

      = on - indyplex - inter personal-planetary personal first people centered communication networks

    1. network multicasting:

      Description

    2. The namespace is only bounded by the max interest packet size of 8kb and the number of possible unique combinations of characters composing names.

      namespace bounded

    3. increasing the closeness of mapping between an application's data and its use of the network.

      a clear example of integration of concerns

      remember multics

      multiplexing info-com/mumnic/puta-tion systems

    4. names used for local communications may require only local routing (or local broadcast)

      local routing

      aka

      clandestine currier networks

    1. electronic cash was pretty much the same as naming,

      naming

      for - What's in a name - anything is possible if you CAN deem it so

    1. To access the same desktop session, you need a different VNC server. x11vnc can do desktop sharing; in your GNOME environment, Vino is probably the preferable choice (as Ignacio pointed out)

      vino

    1. This can be a backbone for almost any secure peer 2 peer application. I always thought that ipfs on its own is great for sharing public files. But I think its to hard to implement the whole security aspect for every application yourself, thats why peergos is so great. D

      backbone fo any p2p application

    2. Selfhosted #785

    1. Secure by defaultA program run with Deno has no file, network, or environment access unless explicitly enabled.

      security by default

    2. Instantly create standalone executables from your Deno program. It even supports cross-compiling for other platforms!

      intant executables

    3. Batteries includedThe essential tools you need to build, test, and deploy your applications are all included out of the box.

      all essential tools

    Annotators

    URL

    1. Here a complete HTTP server module is added as a dependency in a single line

      deno run

    2. Deno is (and always will be) a single executable file. Like a web browser, it knows how to fetch external code.

      knows how to fetch external code

    3. executing JavaScript and TypeScript outside of the web browser

      executing javascript outside the browser

    4. Deno 1.0
    5. the mechanism for linking to external libraries is fundamentally centralized through the NPM repository, which is not inline with the ideals of the web.

      With the changing JavaScript language, and new additions like - TypeScript,

      building Node projects can become - an arduous endeavor,

      involving managing - build systems and other heavy handed tooling

      that takes away from the fun of - dynamic language scripting.

      Furthermore the mechanism for - linking to external libraries is - fundamentally centralized

      through the NPM repository, which is not inline - with the ideals of the web.

    1. an import system via urls

      The main reason that the developers of Deno have given for the use of an import system via urls is

      "Furthermore the mechanism for linking to external libraries is fundamentally centralized through the NPM repository, which is not inline with the ideals of the web."

      (quoted from the v1 blogpost,

      I highly suggest the 15min read if you are struggling to see the point of deno). So essentially they are trying to avoid the whole central-source-of-trust-by-a-company thing that happened out of necessity in Node, because it was so hard to manage packages and are trying to make importing packages as easy as including javascript files in a webpage (This also means you don't have to manually install packages). After all, if you read the blogpost, the ambitions of deno are to be runtime environment like a web browser.

    2. From Node to Deno

    1. They wouldn't have called it an  operating system back then. Back   then it was just seen as this convenient  platform for developing software

      Small and tinkerable. Based around a bad idea of hierarchical filr system. The original creators were aiming higher boiling the ocean 🌊 filesystem was a quick and dirty way to get off thr ground. Did not have a chance to built something better. 60 years later with rust we cold build Named data networks and that would be a universal Multics Multi player info communication in compute system kernel universal autopoietic info-communication system the one that can grew and keep up with our growing needs and understanding evergreen permanent by design future proof silver bullet

    1. However, if you only need to display the Word Document, but don't need to edit it, you can use Google Documents' Viewer via an <iframe> to display a remotely hosted .doc/.docx. <iframe src="https://docs.google.com/gview?url=http://remote.url.tld/path/to/document.doc&embedded=true"></iframe>

      doc to html via google

      to: jsfiddle

  4. bafybeibgduwvv4dya4nwez5bcy24z5ya27oisiixpioafnxjjx56jgkv4m.ipfs.localhost:8080 bafybeibgduwvv4dya4nwez5bcy24z5ya27oisiixpioafnxjjx56jgkv4m.ipfs.localhost:8080
    1. “In Liberalism and the Challenge of Climate Chang

      Locally annotate publicly and only the annotations are shared publicly with the snippets not the entire text

      📖✍️- join.ann0te - Shaw Liberalism and the Challenge of Climate Change

      view.only 👥📖✍️group.ann0te - CS-LCCC

    2. Join the private<br /> - reading - hypothesis social annotating and - conversations on CryptPad

      with this link:

      https://cryptpad.fr/pad/#/2/pad/view/ovtqxiVuUX6QGM3urq7jmydd3+HCSmnVvHQtZZLojY4/

    1. File Converter Convert your files to any format

      for

      doc to html

  5. bafybeif5qypgldompgrewcwvrvkxy7astgufiq55l6cigdi3bptqtmdb5a.ipfs.localhost:8080 bafybeif5qypgldompgrewcwvrvkxy7astgufiq55l6cigdi3bptqtmdb5a.ipfs.localhost:8080
    1. the advantage of a high-level language isnotational rather than computational.

      read this 40 years ago I've been working on exploring ways to create a neew reality inspired by that insight

    1. We may amend these terms at any time.

      amend terms at any time

    2. We may in our sole discretion cease operating Peergos at any time.

      cease operating at any time

    3. grant us access to the relevant Data

      grant access

    4. process personal data

      about others save with their consent, or otherwise in accordance with applicable data protection legislation.

    5. use Peergos to breach

      use Peergos to breach any policies or regulations applicable to your local or internet connection, or any other network connected to Peergos

    6. Host any Data that you do not have a right to reproduce,

      right to reproduce

    7. Passwords cannot be recovered.

      passwords are not recoverable

    8. Under no circumstances will Peergos be liable for any reason for the existence or content of any Data on Peergos.

      Peergos not liable for content

    9. in receipt of a public sharing link

      Peergos (including, if you so authorise, making your Data available to other users in receipt of a public sharing link).

    10. You should keep a local backup of any Data stored using Peergos

      need a local running mirror and/or IPFS Desktop or Brave IPFS

    11. PEERGOS TERMS OF USE

    1. Secure, decentralized, meaningful, pick two

    2. !- threads :

      • New Architectures for the Internet
      • Named People's Networks Zooko
    1. Peergos is building the next web - the private web, where end users are in control.

      your private online space

    1. Peergos is built on top of IPFS. You can run Peergos on your own machine and still access your files through any other Peergos server.

      decenetralized

    1. It is the x,y coordinates of the text baseline start position (in the left bottom corner of the first char).

      answer

    2. Understanding SVG <text> x-y coordinates and padding

      It is the x,y coordinates of the text baseline start position (in the left bottom corner of the first char).

    1. fill-opacity

      The fill-opacity attribute is a presentation attribute defining the opacity of the paint server (color, gradient, pattern, etc.) applied to a shape.

      ``` <svg viewBox="0 0 400 100" xmlns="http://www.w3.org/2000/svg">

      <circle cx="50" cy="50" r="40" />

      <circle cx="150" cy="50" r="40" fill-opacity="0.7" />

      <circle cx="250" cy="50" r="40" fill-opacity="50%" />

      <circle cx="350" cy="50" r="40" style="fill-opacity: .25;" /> </svg> ```

    1. img.src = "data:image/svg+xml;base64,"+btoa(xml);

      img.src = "data:image/svg+xml;base64,"+btoa(xml);

    1. This is a lazy encryption system

      .for: lazy encyption

      in that it's not designed to - securely obscure data,

      but rather that it is designed to - prevent people from reading data - without first taking steps to decrypt it.

      This makes this system useful for - hiding clues in games,

      where people can use a deciphering tool within the game itself if they really want to spoil the answer. Other uses are left to the imagination.

    2. .for: lazy encryption

    1. 160IPFS

      IPFS is a - global, - versioned, - peer-to-peer - filesystem.

      It combines ideas from - Git, - BitTorrent, - Kademlia, - SFS, and the - web.

      It is like - a single bittorrent swarm, - exchanging git objects.

      IPFS provides - an interface - as simple as the HTTP web,

      but with - permanence - built in.

    2. 0Spot-On Encryption Suite

      Spot-On is Encryption software that securely connects two friends for chat, group chat, email, file sharing and file transfers with magnet links and P2P web search. Description

    3. .from: "android peergos - Google Searc…" (www.google.co.uk)

      Peergos Alternatives

      Cloud Storage Services and other similar apps like Peergos

    4. Peergos is a secure and private online space where you can store, share and view your photos, videos, music and documents.
    1. Nov 29, 2023 — Our crowd-sourced lists contains more than 10 apps similar to Peergos for Windows, Linux, Mac, Android and more ... Android and Self-Hosted apps ...

      self-hosted apps alternatives .to: "Peergos Alternatives: Top 10 C…" (alternativeto.net)

    2. .google.search: android peergoss

    3. .google.search: android+peergos

    1. PeergosPeergos is a secure and private online space where you can store, share and view your photos, videos, music and documents.

    1. This allows you to store "deep bookmarks"

      deep bookmarks

      to things in Peergos which don't reveal anything to someone who get's access you your bookmarks!

    1. All you need is your username and your password

      Can do away with that too

    2. It is not tied to any other data like your phone number or email address.

      .for - No Account

    1. Dec 21, 2023 — Consider a lazy encryption scheme that does not encrypt a message at all:

      does not encrypt at all

    1. lazy re-encryption.

      .to.do-search - lazy enciption

    1. secret link mechanism for sharing files with people who do not have peergos accounts.

      secret link fpr

      .for - Indy.Web.Mesh.Net/Hub/One/Dialog/Linminal

      sharing files with people who do not have peergos account!

    2. Following can be revoked

      following allows sharing between peers

    3. Following is a one-way mechanism

      following one way

    1. The web interface can be accessed from a public server over https or from your machine if you run Peergos locally.

      same for the IndyWeb

      location independence!

    2. You even load it directly from ipfs and log in!

      Entirely client side load it from IPFS and log in!

    3. aim to be as convenient to use as existing centralised services,

      as convenient and usable as centralised services

    1. Hashes and signatures are all verified client side

      client side verification

    1. Because the server only ever sees encrypted data you can also tell it to directly store your data in a standard cloud storage provider like Backblaze or Amazon

      .query - or IPFS?

    2. Peergos is fully self hostable

      .to.do : must try it out for self osting

    1. no central surveillance point that an attacker could monitor all file transfers

      no central suveilance point