Skip to content
View cyfrost's full-sized avatar
👨‍💻
👨‍💻
Block or Report

Block or report cyfrost

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned

  1. sleekxmpp-simple-bot-cli sleekxmpp-simple-bot-cli Public

    A tiny python script that uses the SleekXMPP library to send a message and waits for the response stanza

    Python 2

  2. copr-veracrypt copr-veracrypt Public

    COPR sources (SRPM generation spec files) for Veracrypt

  3. todoist-linux todoist-linux Public archive

    Todoist for Linux

    31 5

  4. install-gnome-extensions install-gnome-extensions Public archive

    A simple (scriptable) way to install GNOME Shell extensions from Terminal

    41 6

  5. The Monkey Sphere (article written b... The Monkey Sphere (article written by Jason Pargin in 2007 for cracked.com), this article has stuck and resonates with me since a long time. Preserving it in markdown for future reference (because I hate ads and love markdown)
    1
    # What is the Monkeysphere?
    2
    
                  
    3
    by Jason Pargin, September 30, 2007
    4
    
                  
    5
    
                  
  6. iOS, The Future Of macOS, Freedom, S... iOS, The Future Of macOS, Freedom, Security And Privacy In An Increasingly Hostile Global Environment
    1
    iOS, The Future Of macOS, Freedom, Security And Privacy In An Increasingly Hostile Global Environment
    2
    =====================================================================================================
    3
    
                  
    4
    
                  
    5
    *This post by a security researcher who prefers to remain anonymous will elucidate concerns about certain problematic decisions Apple has made and caution about future decisions made in the name of “security” while potentially hiding questionable motives. The content of this article represents only the opinion of the researcher. The researcher apologises if any content is seen to be inaccurate, and is open to comments or questions through [PGP-encrypted mail](https://gist.githubusercontent.com/iosecure/4cdf67a7c3238b89bb902fad53b35e63/raw/).*