- 1 Post
- 98 Comments
Penta@lemmy.worldto
Linux@lemmy.ml•Is there a CLI Tor HTTP client, like curl/wget but routed over the Tor network?
12·3 months agoSee the “usage” section here for more details: https://wiki.archlinux.org/title/Tor
Penta@lemmy.worldto
Linux@lemmy.ml•Is there a CLI Tor HTTP client, like curl/wget but routed over the Tor network?
27·3 months agoYou can use curl itself, just set a SOCKS5 proxy with --socks5. Simply point it to the address of a running tor instance. So on arch linux for example, install the tor package, start the systemd service and use localhost:9050 as the proxy.
Penta@lemmy.worldto
Open Source@lemmy.ml•VoidAuth Release v1.1.0 - Passkey-only Users 🔑
5·4 months agoAbsolutely. But passkeys themselves are an open standard, so the implementation is different depending on device, browser etc. I dont use Windows, I dont know how it works there. I dont even use passkeys a lot in general, mostly due to it not being used on that many sites. I still think the technology pretty interesting and will be more relevant in a few years.
Penta@lemmy.worldto
Open Source@lemmy.ml•VoidAuth Release v1.1.0 - Passkey-only Users 🔑
8·4 months agoA lot of the bigger players like Microsoft, Google and Apple support it. For small sites its a lot rarer. The keys are stored on device, but can be synced in a variety of ways, often using the cloud. There is problems with vendor lock in vecause of that, even though passkeys are an open standard by themselves. Generally nothing is stopping you from copying/synching them yourself.
Penta@lemmy.worldto
Open Source@lemmy.ml•VoidAuth Release v1.1.0 - Passkey-only Users 🔑
7·4 months agoI replaces passwords with a cryptographic key. When you register at a website, you do not put in a password, instead it generates a key-pair, kinda like you would have with ssh auth. Usually to login you use biometrics, which will unlock the keys on your device. Advantage is that they are phishing resistant (the keys are bound to a specific domain), convenient and if the database of the website is leaked, it doesnt matter since they can only store your public key, which is worthless for authentication.
Penta@lemmy.worldto
Final Fantasy@lemmy.world•If you're like me you can hear this image
4·7 months agoReceived “Grenade”!
deleted by creator
Penta@lemmy.worldto
Selfhosted@lemmy.world•Need some help with geoblocking caddy.English
34·7 months agoYou are defining the geofilter, but not using it. Try doing “reverse_proxy @mygeofilter mydude:8096”
I still have not received a single nicole dm :(
Penta@lemmy.worldto
Linux@lemmy.ml•3633Bet: Diversão, Segurança e Variedade em uma Plataforma de Jogos Online
1·10 months agoligma balls
Check out distrobox. Basically podman or docker containers, but automatically more integrated into the host system. GUI programs work pretty much out of the box with it.
Penta@lemmy.worldto
Linux Gaming@lemmy.world•Pewdiepie built a Gaming PC, and installed Linux Mint on it!English
37·10 months agoThe year of the linux desktop is upon us… right guys?
Penta@lemmy.worldto
Selfhosted@lemmy.world•What's up, selfhosters? - Sunday threadEnglish
1·10 months agoHeadscale is pretty light on resources, especially since it doesn’t come with a webui (there is third-party ones like headplane you can use though). RAM usage is like 70mb for me currently.



ligma balls