Tails project released a first beta version of their upcoming 3.0 release based on Debian 9 Stretch. See their call for testing for the official announcement.
There are lot of interesting changes, but the important one for me is that TREZOR now works out of the box in Electrum. No need to install any extra packages or create custom udev rules. As a bonus, you can use TREZOR from command line using trezorctl command.
PS: You cannot use TREZOR with our official TREZOR Wallet in Tails, because TOR Browser is configured in a way that it cannot reach TREZOR Bridge which is running as a localhost service.
If you want to test the release in QEMU like I do, follow these steps:
download ISO image from the announcement above (currently tails-amd64-3.0-beta1.iso)
run lsusb | grep TREZOR, you should see line similar to this: Bus 002 Device 035: ID 534c:0001 SatoshiLabs Bitcoin Wallet [TREZOR]
note the numbers 002 and 035, this is the physical address of the USB device
run qemu-kvm -m 2048 -cdrom tails-amd64-3.0-beta1.iso -usb -device usb-host,hostbus=2,hostaddr=35 where 2 and 35 are numbers from step above
if you run lsusb in Tails you should see the TREZOR device in the listing as well
You should never ever run Tails in a virtual machine, this is just for testing!!!
My friend is a big fan of psychedelic music from the 60s and 70s. Recently, he told me about the (now defunct) internet radio he really enjoyed listening to: Technicolor Web of Sound. He also mentioned that the website has a list of all artists and their songs that used to be in the rotation. I immediately got an idea to scrape the list and convert it to Spotify playlist.
And here’s the result:
CSV file with artists and tracks for further processing
PS: The playlist does not contain all songs, only the ones that are available on Spotify. Also it might contain bogus entries, because it is autogenerated. Please, send me an email in case something is wrong. Thanks!
I guess I was around 15 when I came up with an idea. I thought it was quite ordinary and didn’t bother to think about it more. Recently, it came to me again out of the blue. With much better access to the net, I tried to find someone else who came up and documented this idea, but I failed. So here it goes:
Suppose, you are out with your friends and you want to mark a particular point in time (and space). Maybe something interesting happened and you don’t want to discuss it immediately or you just want to make some space-time reference point for past and future events. All you need to do is just say: “I’m creating an anchor” or just “anchor” later on (when your friends are aware of the concept).
When you are with your friends later again, you can use this anchor in your conversations. Some examples:
“We went to sleep 5 hours after the anchor.”
“What was the song that played 15 minutes before the anchor?”
“Let’s tell Peter, we’ll meet him at the anchor in 30 minutes.”
“There is a nice church 500 meters south from the anchor.”
“Do you remember the nice clouds that appeared when I created the anchor?”
More people can create an anchor and one person can create more anchors during one day, but I generally don’t recommend it as it gets messy easily. :-)
Have you ever tried to solve the following problem? I did. Many times.
You have just finished installing a brand new Internet node, but you need to connect to it (usually using SSH) to perform some tasks. The issue is that this node usually lies behind NAT, does not have a public IP, its local IP keeps changing or even worse even the public IP is changed by ISP from time to time.
This problem is usually solved by port forwarding on a router that has the public IP, but this is not very usable in more complex network environments.
Another option is to create a VPN where you connect your node, but this requires quite a big effort to get it working (both server and client side).
There is another way, which I find quite easy and elegant at the same time. Let’s use a Hidden Service created via Tor network! We don’t really need anonymity in this case, but it comes as a nice bonus.
I will use Raspberry Pi and Raspbian Jessie in this example, but this should work almost anywhere with small changes.
Login to Raspberry Pi and enable SSH daemon if it was not enabled (it is on by default in Raspbian).
All commands below should be run as root, so either spawn a root shell using sudo -i or prepend each line with sudo.
Update the system and install Tor package:
apt-get install tor
Edit the Tor configuration file /etc/tor/torrc and add the following lines: