hperrin

joined 2 weeks ago
[–] hperrin@lemmy.ca 6 points 5 days ago* (last edited 5 days ago)

http://nymph.io/

This project technically started in 2009, as part of another project called Dandelion (which then was renamed to Pines), then around 2014 I pulled it out into its own project, Nymph. I worked on it on and off, until 2021, when I rewrote it for Node.js as Nymph.js.

It now runs my email service, https://port87.com/

Here's the oldest code I can find on GitHub from July 7, 2009:

https://github.com/sciactive/pines-components/blob/144ce877e1ec9af7fa34c8eb8b11aeb7ae0efb5e/com_entity/common.php

And here's the first version as its own project from Sep 8, 2014:

https://github.com/sciactive/nymph/tree/fdf5f770da7e5acc6938debbaeb8c09cfd080e15/src

[–] hperrin@lemmy.ca 7 points 5 days ago

Yeah, that’s why I have a silk touch shovel, so I can pick up grass blocks.

[–] hperrin@lemmy.ca 5 points 5 days ago
sudo apt install flatpak libfuse2t64
[–] hperrin@lemmy.ca 3 points 5 days ago

Used and refurbished Macs aren’t that expensive.

[–] hperrin@lemmy.ca 9 points 5 days ago (2 children)

Every Flatpak, Snap, and AppImage works on every Linux system I’ve tried.

[–] hperrin@lemmy.ca 19 points 5 days ago (2 children)

Hey! I have a life. It just wholly revolves around my computer.

[–] hperrin@lemmy.ca 5 points 6 days ago* (last edited 6 days ago)

Well, regarding the phone thing, modern phones don’t have removable batteries, but it’s very unlikely that the cops have a way to access the camera and microphone even when the phone is on. Cops have a notoriously difficult time just unlocking a phone that’s in their possession. The FBI/CIA etc might be another story. Who knows what active exploits they’re using.

But if your phone is powered off, it won’t be sending or receiving any data, both of which require power and create EM signals that can be detected. Unless your phone advertises some sort of remote wake feature, once it’s off, it’s off. It is doing nothing but tracking the time (RTC is always on in all modern tech with any sort of battery).

Cops can, however, triangulate your location to within a block or two using your phone’s cell tower pings. Those happen as long as your phone isn’t in Airplane mode. It takes a while (like, an hour or two), and the phone company has to do it for them, but that’s often how they find missing people.

Edit: recent iPhones DO have a sort of remote on function, btw. It’s not cellular, but some propriety thing based on MagSafe, so it requires a machine to be within a few inches of the phone. Basically it uses the same circuitry as the wireless charging does.

[–] hperrin@lemmy.ca 5 points 6 days ago (1 children)

It was tongue in cheek, man. Call down.

[–] hperrin@lemmy.ca 7 points 6 days ago (2 children)

I can’t say there’s no possibility, but the probability is incredibly low. The domain was registered on the day he was arrested, likely after he was arrested, because the first Wayback snapshot is at 2:47 PM EST and the page is blank. Meaning, a web server had been set up to respond to requests, but no content had been added, so it just responded with an empty body. The first snapshot with content was taken two hours later at 4:28 PM EST.

The rat that ratted him out called 911 shortly after 9 AM, which means he was in custody during this time.

The story had just started to spread by the early afternoon, so whoever registered the domain could have done so after learning his name from the news. (Utah Dispatch posted the story at 12:39 PM.)

[–] hperrin@lemmy.ca 58 points 6 days ago* (last edited 6 days ago) (13 children)

As a decades experienced web engineer, I’d like to know, what is an encrypted .WHOIS server? In all of my time, I’ve never seen those words put together in that order.

I think what you’re trying to say is that the WHOIS data associated with the domain is from a privacy service, not an actual person. You can pretty clearly see in that data that the domain was registered on Dec 9th of this year, and that part can’t be faked (at least, it can only be faked by the registrar, and I don’t think NameCheap Inc is in on it). So unless he set this domain up right before they arrested him, no, this is not his domain.

The IP address in the A record for that domain belongs to Amazon Inc, and is located in San Jose, CA. That pretty much shows that it’s running on an AWS machine. So yeah, literally anyone with some basic web knowledge could have set that up in a few minutes.

As even further evidence that it wasn’t him, the Wayback Machine only shows snapshots of that domain since Dec 9, 2024, the day the domain was registered. And the page changes between the night of the ninth, and the morning of the tenth, while he was in custody.

[–] hperrin@lemmy.ca 12 points 6 days ago

Is it any surprise that a pig is also a scab?

[–] hperrin@lemmy.ca 35 points 6 days ago (3 children)

Ok, burn it all down. The whole planet. Maybe next time it’ll be better.

view more: ‹ prev next ›