freunde.ma-nic.de

Search

Items tagged with: opensource

The poddery story


Bild/Foto

poddery.com ( #poddery stands for Pod Dery ) was started around 2010 (domain name was registered on 2010 December 07) by Joe Bivins. To place this in history of #diaspora,
1. The famous lecture "Freedom in The could" by Eben Moglen, was delivered on 2010 Feb 05.
1. This speech inspired 4 students of New York University’s Courant Institute (Illia Zhitomirskiy, Daniel Greppi, and Raphael Sofaer) to launch a crowd funding campaign to replace #facebook on 2010 April 24.
1. The first developer preview was released on 2010 September 15 and first consumer alpha version was released on 2010 November 23. The first tag on the github repo dates 2010 December 2.

As you can see from these dates, poddery.com is one of the earliest diaspora pods. Possibly, third pod after joindiaspora.com and diasp.org (if you know another pod started before poddery.com, let me know in comments). When we organized our second Mini #Debian Conference in Pune in 2011, we opened an account in poddery.com () and its first post was on 2011 June 23.

We posted many photos of the events on this account and when we heard Joe Bivins was planning to close this pod on 2013 June 30, we did not want to lose these posts. We offered to take over the maintenance and launched Save Poddery Campaign in June 2013. We got around 50% of the target amount and with around 66% discount by KnightSwarm, we took over maintenance of poddery.com. We are running this service for about 6 years now. In between we added #xmpp service and last year #matrix.

You can follow the history of this service via and @poddery.com updates accounts.

We are running our 3rd crowd funding campaign now. Thanks to everyone who contributed, money as well as time and effort to run the service.

Contribute to this campaign at https://fund.poddery.com


#savepoddery #fundpoddery #privacy #FreeSoftware #OpenSource #FOSS
 

The poddery story


Bild/Foto

poddery.com ( #poddery stands for Pod Dery ) was started around 2010 (domain name was registered on 2010 December 07) by Joe Bivins. To place this in history of #diaspora,
1. The famous lecture "Freedom in The could" by Eben Moglen, was delivered on 2010 Feb 05.
1. This speech inspired 4 students of New York University’s Courant Institute (Illia Zhitomirskiy, Daniel Greppi, and Raphael Sofaer) to launch a crowd funding campaign to replace #facebook on 2010 April 24.
1. The first developer preview was released on 2010 September 15 and first consumer alpha version was released on 2010 November 23. The first tag on the github repo dates 2010 December 2.

As you can see from these dates, poddery.com is one of the earliest diaspora pods. Possibly, third pod after joindiaspora.com and diasp.org (if you know another pod started before poddery.com, let me know in comments). When we organized our second Mini #Debian Conference in Pune in 2011, we opened an account in poddery.com () and its first post was on 2011 June 23.

We posted many photos of the events on this account and when we heard Joe Bivins was planning to close this pod on 2013 June 30, we did not want to lose these posts. We offered to take over the maintenance and launched Save Poddery Campaign in June 2013. We got around 50% of the target amount and with around 66% discount by KnightSwarm, we took over maintenance of poddery.com. We are running this service for about 6 years now. In between we added #xmpp service and last year #matrix.

You can follow the history of this service via and @poddery.com updates accounts.

We are running our 3rd crowd funding campaign now. Thanks to everyone who contributed, money as well as time and effort to run the service.

Contribute to this campaign at https://fund.poddery.com


#savepoddery #fundpoddery #privacy #FreeSoftware #OpenSource #FOSS
 
Sicherheitslücke: Root-Zugriff für Angreifer bei Exim-Mailservern #E-Mail #Datensicherheit #Debian #Linux #Server-Applikationen #Sicherheitslücke #Server #Applikationen #Internet #OpenSource
 
Exploit: Sicherheitslücke in Exim-Mailserver #E-Mail #Datensicherheit #Debian #Linux #Server-Applikationen #Sicherheitslücke #Telekommunikation #Server #Internet #OpenSource
 
Super Sache. Ich habe bisher nur Saatgut-Tauschbörsen mitbekommen, wo die Samen bereits vorhandener Züchtungen getauscht werden. Übrigens hätte der Post noch mit #opensource getaggt werden können ;)
 
Thank you @mspoweruser!
#android #os #privacy #opensource
 
Ich bin von ihrer Rede, wie soll ich es ausdrücken, fast schon gerührt. #LiMux #München #Linux #opensource #fsfe

Bild/FotoFree Software Foundation Europe wrote the following post Fri, 24 May 2019 12:05:16 +0200

Christine Prayon, bekannt aus der @heuteshow@twitter.com , zu Freier Software in München:
 
This guy unwittingly makes one of the strongest cases for why humanity must make open-source, and likewise the rejection of all that is proprietary, a fundamental aspect of any society that claims to value freedom. Without an openness in the things that govern aspects of our lives we cannot assess whether those things are of benefit or threat to our lives, our freedom, our safety, etc.

If you take the time to watch this video (I do it at 2x speed with subtitles so it takes half the time and you still take it all in), while you do so just ask yourself, in a world where these problems have increasingly grave consequences, would having these systems open-sourced not make you feel much better than trusting corporations that keep them vaulted as proprietary trade secrets being the one's to find all the flaws and keep you and your friends/family safe?

https://www.youtube.com/watch?v=TRzBk_KuIaM
#open-source #opensource #opensourcesociety #opensociety

The Real Reason to be Afraid of Artificial Intelligence | Peter Haas | TEDxDirigo

A robotics researcher afraid of robots, Peter Haas, invites us into his world of understand where the threats of robots and artificial intelligence lie. Befo...
www.youtube.com
 
Does anyone have experience with https://www.minds.com/

Just throwing this out to the #fediverse. i stumbled upon the site today and don't really know anything beyond what their homepage states. I'm curious to hear some thoughts on this, or if it's even worth delving deeper.

#opensource #ideas #minds
 
Hey look, @Huawei - I'm using a Google-free Android OS. Still running Android apps...
#android #opensource #privacy
e.foundation

 
Mobile tech giants didn't learn from the past and should look at Linux history, /e/ and the progressive web apps.
Point of view on Medium: #Huawei and other mobile “tech giants”: you should (really) break free from Google/Android.
#Android #OpenSource
medium.com/@gael_duval/hu…

 
Kroah-Hartman: Linux 3.18 wandert von der Kernel-Community zu Android #Linux-Kernel #Android #Android9 #Android-Updates #GregKroah-Hartman #Linux #Google #EmbeddedSystems #OpenSource
 

[ANN]Arronax v0.7.0


I just released a new version of Arronax.

Arronax is a program that allows you to create and edit starters for programs and locations (*.desktop files) under Linux. Besides a standalone program there are optional plugins for the file managers Caja, Nautilus and Nemo.

Arronax is written in Python and uses GTK for the graphical user interface.

Bild/Foto

#linux #opensource #foss #freesoftware #debian #ubuntu #python #mywork #gtk
EU 
Während München sich durch die Abkehr von Linux gerade zu einem Provinznest degradiert, nimmt an anderen Orten der Einsatz freier Software eine positive Entwicklung. Die Free Software Foundation Europe bringt einen Überblick über die Entwicklung der letzten Jahre.
https://www.pro-linux.de/news/1/27066/fsfe-sieht-aufw%C3%A4rtstrend-freie-software-in-der-verwaltung.html
#Opensource #FSFE #Verwaltung
 
Freie Software für Schulen und Universitäten

Freie Software für Schulen und Universitäten

Dr. Patrick Breyer, Spitzenkandidat der Piratenpartei zur EU Wahl 2019 erklärt im Interview warum Open Source an Schulen und Universitäten Geld spart und Dat...
www.youtube.com
#PatrickBreyer #Piratenpartei #EU19 #Europawahl #PIRATEN #OpenSource #Datenschutz
 
Kennt einer nen Distributor von #openpower Systemen (Raptor Computer System Boards zb) in Europa?

#powerpc #openhardware #opensource #raptorcs
 
Kennt einer nen Distributor von #openpower Systemen (Raptor Computer System Boards zb) in Europa?

#powerpc #openhardware #opensource #raptorcs
 
2019 status of jailbreak apple devices tools overview - trying to unlock ipad 3 and ipad 4

Bild/Foto

to be straight: have not managed yet to unlock a pin locked ipad 3 and ipad 4 and/or recover the data.

it is easy to just overwrite the ipad with the latest firmware via itunes.

but i want to backup and extract all possible files before that.

if you want to jailbreak your Apple device, basically there are a lot of tools and you need to find the one that suits your hardware and firmware model.

not an easy task.

have an older ipad 3 to wich the PIN was lost (no it is not stolen, it’s from a relative who forgot it and also can not remember his itunes password (alzheimer is very comon these days)). (Model: A1430 iPad 3, Early 2012, +Wi-Fi + Cellular, 30-pin connecto) but latest redsn0w (redsn0w_win_0.9.15b2.zip) says „iPad 3 is not supported“ (probably it has a newer iOS installed than 5.1.1)

this site helps you find and download newer and older firmwares for your device: (GOOD JOB! 🙂

https://ipsw.me/device-finder

https://ipsw.me/iPad3,3

http://www.getios.com/ here you also can get a lot of firmware versions for your iDevice.

also interesting: https://nerdpol.ch/tags/jailbreak

theory:

  • pull an (encrypted) backup from the device
    • not possible via itunes with PIN locked ipad
    • most approaches use some exploit to load their own ramdisk and get access to the device
  • via brute force, find the decryption PIN
  • extract the data
  • reset the device
…. not so easy.

„Imagine a computer which is protected with an OS level password – we can still access the hard disk data by booting a live CD, or by removing the hard disk and connecting it to another machine. When we compare computers to the iPhone, it is an embedded device. So it is not easy to take out the chips (hard disk) and dump data into it. To perform iPhone forensics, we use the Live CD approach. As the iPhone has only one serial port, we are going to load custom OS over the USB to access the hard disk of the device. The problem here is: the iPhone only loads firmware designed by Apple.

In order to create and load the forensic toolkit, first we need to understand iPhone functions at the operating system level. iOS (previously known as iPhone OS) is the operating system that runs on all Apple devices like iPhone, iPod, Apple TV and iPad. iOS is a zip file (ships with .ipsw extension) that contains boot loaders, kernel, system software, shared libraries & built in applications.

When an iPhone boots up, it walks through a chain of trust, which is a series of RSA signature checks among the software components in a specific order as shown below:




The BootRom is Read-only memory (ROM) and it is the first stage of booting an iOS device. BootRom contains all the root certificates to signature check the next stage.

iPhone operates in 3 modes – Normal Mode, Recovery Mode, DFU mode

In Normal mode, BootRom start off some initialization stuff and loads the low level boot loader (LLB) by verifying its signature. LLB signature checks and loads the stage 2 boot loader (iBoot). iBoot signature checks the kernel and device tree, while the kernel signature checks all the user applications.

In DFU mode, iPhone follows the boot sequence with a series of signature checks as shown below. BootRom signature checks the second level boot loaders (iBSS, iBEC). Boot loader signature checks the kernel, and the kernel signature checks the Ramdisk.




During iOS update, the Ramdisk gets loaded into RAM and it loads all the other OS components.

In Forensics, we will create a custom Ramdisk with our complete forensic tool kit and load it into the iPhone’s volatile memory.

Signature checks implemented at various stages in the boot sequence do not allow us to load our custom Ramdisk. To load our custom Ramdisk, we have to bypass all these signature checks. In the chain of trust boot sequence, if we compromise one link, we can fully control all the links that follow. The hacker community has found several vulnerabilities in BootRom. By using these, we can flash our own boot loader and patch all other signature checks in all the subsequent stages. Apart from signature checks, every stage is also encrypted. These encryption keys can be grabbed from JailBreaking tools.“

src: https://resources.infosecinstitute.com/iphone-forensics/

another lengthy writeup: https://blog.elcomsoft.com/2017/11/the-art-of-ios-and-icloud-forensics/

unlocking iDevices: how ex-empoyees make business


„Cellebrite, through means currently unknown, provides these services at $5,000 per device,“

https://blog.malwarebytes.com/security-world/2018/03/graykey-iphone-unlocker-poses-serious-security-concerns/

Mysterious $15,000 ‚GrayKey‘ Promises To Unlock iPhone X For The Feds


https://youtu.be/gpzl11uPmyY

https://www.magnetforensics.com/
  • AXIOM has the most advanced parsing and carving techniques which finds more evidence than any other tool, including 25% more pictures.
  • Get more detailed information about what someone was doing at any given time and where, with artifacts like KnowledgeC, iOS Wallet, geolocation data, Screen Time, and more.
  • Analyze the full file system (including iTunes backup-style images) and decrypted Keychain from iOS devices and find evidence that other tools miss.
  • Memory images could contain valuable evidence like messages, call logs, and email. AXIOM natively supports the analysis of memory from GrayKey images without the need to install third-party conversions or plugins.
  • iOS images contain a lot of native files and raw data. Use AXIOM to cut through the noise of data and save time during your investigations by quickly surfacing only relevant evidence rather than unactionable data.
  • Discover new artifacts with Dynamic App Finder to automatically scan your file system and memory images for relevant chat, browser, geolocation, and identifier data.
  • AXIOM is a complete digital investigation platform that gives you the power to analyze evidence from GrayKey images alongside data from other computer, cloud, social media, and mobile evidentiary sources.
src: https://www.magnetforensics.com/graykey/




„can take up to three days or longer to (crack) for six-digit passcodes“ … and recover the data of the iDevice.




src: https://www.forbes.com/sites/thomasbrewster/2018/03/05/apple-iphone-x-graykey-hack/#566b2c9c2950

Jailbreak iPhone XS, iPhone XR on iOS 12 – iOS 12.1.2 Using Chimera Jailbreak [How to]


Bild/Foto

Posted by Rajesh Pandey on Apr 30, 2019

The Electra team surprised everyone today by releasing Chimera, a new iOS 12 – iOS 12.1.2 jailbreak for A7-A12 devices including the iPhone XS and iPhone XR. Chimera has been built from the ground up and comes with Sileo as its default package manager.

the hardware hack: How to unlock iCloud locked Apple iPad 2, 3, 4, iPad Air and Air 2, iPad mini 1, 2, 3, 4, iPad 12.9 and 9.7 – WARNING!

This method works ONLY on iPads with 3G/4G/LTE and removes cellular from your iPad.

it will become wifi-only! (no 3G/4G/LTE no more!)


„This method will help you bypass iCloud on locked iPads.

This manual will help you with iCloud bypass on your iPad Cellular.
  • After bypass iCloud you will have iPad Wi-Fi Only.
  • Sim-slot (GSM, Mobile, SimCard) will not work.
  • GPS and Bluetooth will work.
At this moment it works with Apple iPad 2, iPad 3, iPad 4, iPad Air, iPad mini, iPad mini 2, iPad Air 2, iPad mini 3, iPad mini 4, iPad Pro 12.9, iPad Pro 9.7 which is locked by service iCloud. Include locked through “Lost and erased” mode.
  • On the iPad 2 3G Model A1396 (GSM) remove the resistor r1205. On the Model iPad 2 3G A1397 (CDMA) move resistor r1205 to position r1204.
  • iPad 2 3G will enter DFU mode.
  • Connect the iPad 2 3G to your PC or Mac.
  • After that you need to restore the iPad 2 3G through iTunes with firmware of Wi-Fi ONLY model and activate using the official method.
  • Turn off the automatic firmware update: Settings \ iTunes Store, App Store \ Automatic download \ Updates.
You can support this project through donations. „PayPal block my account with all money because I’m from Ukraine. “

After this you will can install any apps on your iCloud free iPad, make jailbreak, assign your own Apple ID account and do any other things.

Apple devices (for example iPads) have some part on logic board which called Board_id. Board_id is responsible for how device identifies itself. For iPad there are several possible configurations: Apple TV, Apple iPhone, Apple iPad Cellular, Apple iPad WiFi only.

When Apple’s iCloud servers bloсked iPads they do this in 2 ways:
  • iPad WiFi only will be blocked by it serial number.
  • iPad Cellular will be blocked by it serial number and IMEI.
To bypass iCloud on iPads Cellular you need disable it modem chip and change Board_id.

If you just only disable modem you will get error and not working device. Sometimes this happens when modem or cable modem is broken even on iPads which isn’t blocked in iCloud. My method can revive such devices.

When you disabled modem chip and changed Board_id device will stop work properly. Something inside will say: “Hey man, something wrong! My hardware is like for WiFi only model, but you use firmware for Cellular model. I go in DFU-mode and you should go in iTunes and restore me”.

When you connect your iPad to BigBrother OS will install driver for it.

At finish you will have iCloud unlocked iPad WiFi only. Now It can be registered on your own Apple ID through new clean serial number. Voila!

If you have some problem with recovering check USB cable and restore iPad manualy from file with firmware. You can download firmware from ipsw.me. Remember that now you have iPad WiFi only hardware and you should download WiFi only firmware. For example, if you have iCloud locked iPad Air Cellular A1475 you should download firmware for iPad Air WiFi only A1474.

And Yes. At any moment you can covert your iCloud freу iPad WiFi only with hardware method back to iPad Cellular. But iCloud blocking will back too.

Be careful and good luck!“

Here you can read manual to bypass iCloud on model of your iPad:If you are looking for a way to unlock the iCloud on iPad Wi-Fi Only, iPhone or iPod, then read this article: How to bypass iCloud on iPad WiFi, iPad Cellular, iPhone and iPod

src: https://pasha4ur.org.ua/

https://pasha4ur.org.ua/articles/difdevices/131-how-unlock-apple-ipad-2-3g-icloud-locked

unlock: A1430 (GSM) and A1403 (CDMA)








… respect! this border_id change thing needs further investiagion.

src: https://pasha4ur.org.ua/images/phocagallery/stories/portfolio/apple/ipad2unlock/ipad3-icloud-unlock-by-pasha4ur.png

how to open the thing:




warning!


all sort of weird things happening:

Hi can someone help me with ipad mini A1454 I have removed the resistor R1204 as stated in the instructions I need to now make a jumper on R1205 because itunes detects my ipad as a apple tv so a jumper going from R1205 but unsure where the other end of the jumper goes please help me I would be really grateful

„use good pencil (graphite) to make short (jumper) in R1205“

src: http://forum.gsmhosting.com/vbb/f631/bypass-icloud-ipad-2-3-4-air-mini-mini-retina-3g-hardware-method-1872271/index8.html

redsn0w is ooooold:


in this video DiplInf Sebastian Scheiber shows how to jailbreak an locked (!) iPad and recover the data.

Method used:problem: this probably only works with on older versions of the iPad / iPhone supported by Redsn0w and iOS 5.1 is rather old, most devices will have a newer version of iOS installed by now.

how to get into DFU (recovery) mode:

  • hold power button pressed for 3 seconds
  • now keep power button pressed while also holding home button pressed
  • after a few seconds screen goes dark, now RELEASE POWER BUTTON but still keep home button pressed
… screen should stay dark and PC you connect do should detect an iPad in DFU mode.

Stuck in DFU mode – How to Exit DFU Mode:


Press Home and Power/ Sleep buttons at the same time for 10s > Release the Home and Power/ Sleep buttons together.

iOS 9.2 – 9.3.3 64-bit devices only


iphone 5s iphone 6 iphone 6 plus iphone 6s iphone 6s plus iphone se ipod touch 6g ipad mini 2 ipad mini 3 ipad mini 4 ipad air ipad air 2 ipad pro

will need your apple id and password.

https://en.pangu.io/

Evasi0n (Evasi0n7) Jailbreak Tool:

for iOS 6.x – iOS 7.0.x


… this can not be used to unlock an iPad. Your iPad/iPhone will have to be unlocked (PIN) before jailbreaking.

http://www.ijailbreak.com/evasi0n/

evasi0n is an unconventional utility able to perform jailbreak operations on devices running iOS 6 and 7.

A consequence of the procedure is the removal of several limitations imposed by Apple, allowing users to install software that is not approved by the company and switch phone carriers seamlessly.

evasi0n became a success just days after its first release.

Supposedly, a few million copies have been downloaded in a very short period, which is not necessarily an indication of its efficiency, but sure says a lot. Statistics aside, the general opinion (as stated by most users on the Internet) is that evasi0n is a trustworthy jailbreak application, one that has to offer everything and asks for nothing in return.

evasi0n is special because it can perform an untethered jailbreak operation, which translates into the fact that the iOS device will be able to reboot without requiring a connection with an external device.

The principle it relies on involves a number of complicated steps, most of which are related to exploiting several vulnerabilities that were overlooked by Apple. However, the process is completed silently, without user intervention.

This is the main reason why evasi0n is considered one of the most easy-to-use and accessible applications of its type. It’s not pretentious as far as OS requirements are concerned, nor does it require advanced configurations.

In order for the jailbreak operation to be successful, you need to equip your system with iTunes and connect your iPhone, iPad or iPod to the computer via a USB cable.

It is also recommended that you backup the device in case something goes wrong.

Once you’ve completed these steps, you can proceed with the jailbreak operation, which, if free of errors, shouldn’t take more than five minutes. However, if the process fails, simply reboot the device and relaunch evasi0n.

On an ending note, this is a well-built jailbreak software, easy to use and user-friendly. Nevertheless, a backup operation is vital in case anything goes wrong.

windows versions:

https://www.softpedia.com/get/Mobile-Phone-Tools/IPhone/evasi0n.shtml

https://www.softpedia.com/downloadTag/jailbreak

linux version:

https://www.mediafire.com/file/21zlxh81cqtqqgb/evasi0n-linux-1.0-3c53ba10e2448d311b0f4157f2d7eb568f106c4f-release.tar+%281%29.lzma

phoenixpwn.com


jailbreak works only on 32-bit devices, which includes :
  • iPhone 4S, 5C and 5
  • iPad 2, 3, 4
  • iPad Mini 1
  • iPod Touch 5
https://phoenixpwn.com/ -> you will need an apple id associated with the device?

https://youtu.be/6I8V-BRx2hk

https://twitter.com/saurik/status/1119211957188345856

for older devices and firmwares (iOS 5.1.X)


„RedSn0w actually evolved from the Jailbreaking tool Quickpwn, which was an early Jailbreaking tool used to Jailbreak the 2nd generation of iOS. Nowadays RedSn0w can be used to Jailbreak a lot of versions of iPhone, iPod Touch and iPad.“ … but not all, iPad 4 seems not supported.

RedSn0w iPhone Support:


iPhone 6s Plus: Not Supported
iPhone 6s: Not Supported
iPhone 6 Plus: Not Supported
iPhone 6: Not Supported
iPhone 5s: Not Supported
iPhone 5c: Not Supported
iPhone 5: Not Supported
iPhone 4S: iOS 5 (iOS 5.1.1, iOS 5.0.1, iOS 5.0)
iPhone 4: iOS 6 (iOS 6.0,6.0.1) + iOS 5 (iOS 5.1.1, iOS 5.1, iOS 5.0.1, iOS 5.0) + iOS 4 (4.3.5, 4.3.4, 4.3.3, 4.3.2, 4.3.1, 4.3, 4.2.6, 4.2.1, 4.1, 4.0.2, 4.0.1, 4.0) + iOS 3 (iOS 3.1.3)
iPhone 3GS: iOS 6 (iOS 6.0, 6.0.1) + iOS 5 (iOS 5.1.1, iOS 5.1, iOS 5.0.1, iOS 5.0) + iOS 4 (4.3.5, 4.3.4, 4.3.3, 4.3.2, 4.3.1, 4.3, 4.2.6, 4.2.1, 4.1, 4.0.2, 4.0.1, 4.0) + iOS 3 (3.1.3)
iPhone 3G: iOS 4 (4.3.4, 4.2.1, 4.1, 4.0.2, 4.0.1, 4.0) + iOS 3 (3.1.3)

RedSn0w iPad Support:


iPad Pro: Not Supported
iPad Air 2: Not Supported
iPad Air: Not Supported
iPad Mini 4: Not Supported
iPad Mini 3: Not Supported iPad Mini 2: Not Supported
iPad Mini: Not Supported
iPad 4: Not Supported <- argh!
iPad 3: iOS 5 (iOS 5.1.1) <- RedSn0w told me „Ipad 3 is not supported“, probably it has a newer iOS installed than 5.1.1)
iPad 2: iOS 5 (iOS 5.1.1, 5.0.1)
iPad 1: iOS 5 (iOS 5.1.1, iOS 5.1, iOS 5.0.1, iOS 5.0) + iOS 4 (iOS 4.3.5, 4.3.4, 4.3.3, 4.3.2, 4.3.1, 4.3, 4.2.1) + iOS 3 (iOS 3.2.2)

src: http://www.ijailbreak.com/redsn0w/

PwnageTool 4.3 Info

http://public.stuff.hu/pwnagetool/PwnageTool_4.3.dmg

Method 2: Get Out of DFU Mode on iPhone/iPad/iPod touch with PhoneRescue


Click here to download PhoneRescue free version!

Step 1: Launch PhoneRescue on your computer > Connect your iOS device to your computer with a USB cable > Wait for PhoneRescue to recognize your iOS device.

Step 2: Click on „Exit Ramdisk Mode“ at the bottom of the Homepage.

other jailbreaking tools:

links:


https://www.antid0te.com/

https://www.sektioneins.de/

http://www.ijailbreak.com/jailbreak-software/

https://www.theiphonewiki.com/wiki/I0n1c

tweets:


https://twitter.com/angelXwind

#linux #gnu #gnulinux #opensource #administration #sysops #apple #ipad #phone #jailbreak
Quelle: https://dwaves.org/2019/05/12/2019-status-of-jailbreak-apple-devices-tools-overview-trying-to-unlock-ipad-3-and-ipad-4/
 
2019 status of jailbreak apple devices tools overview - trying to unlock ipad 3 and ipad 4

Bild/Foto

to be straight: have not managed yet to unlock a pin locked ipad 3 and ipad 4 and/or recover the data.

it is easy to just overwrite the ipad with the latest firmware via itunes.

but i want to backup and extract all possible files before that.

if you want to jailbreak your Apple device, basically there are a lot of tools and you need to find the one that suits your hardware and firmware model.

not an easy task.

have an older ipad 3 to wich the PIN was lost (no it is not stolen, it’s from a relative who forgot it and also can not remember his itunes password (alzheimer is very comon these days)). (Model: A1430 iPad 3, Early 2012, +Wi-Fi + Cellular, 30-pin connecto) but latest redsn0w (redsn0w_win_0.9.15b2.zip) says „iPad 3 is not supported“ (probably it has a newer iOS installed than 5.1.1)

this site helps you find and download newer and older firmwares for your device: (GOOD JOB! 🙂

https://ipsw.me/device-finder

https://ipsw.me/iPad3,3

http://www.getios.com/ here you also can get a lot of firmware versions for your iDevice.

also interesting: https://nerdpol.ch/tags/jailbreak

theory:

  • pull an (encrypted) backup from the device
    • not possible via itunes with PIN locked ipad
    • most approaches use some exploit to load their own ramdisk and get access to the device
  • via brute force, find the decryption PIN
  • extract the data
  • reset the device
…. not so easy.

„Imagine a computer which is protected with an OS level password – we can still access the hard disk data by booting a live CD, or by removing the hard disk and connecting it to another machine. When we compare computers to the iPhone, it is an embedded device. So it is not easy to take out the chips (hard disk) and dump data into it. To perform iPhone forensics, we use the Live CD approach. As the iPhone has only one serial port, we are going to load custom OS over the USB to access the hard disk of the device. The problem here is: the iPhone only loads firmware designed by Apple.

In order to create and load the forensic toolkit, first we need to understand iPhone functions at the operating system level. iOS (previously known as iPhone OS) is the operating system that runs on all Apple devices like iPhone, iPod, Apple TV and iPad. iOS is a zip file (ships with .ipsw extension) that contains boot loaders, kernel, system software, shared libraries & built in applications.

When an iPhone boots up, it walks through a chain of trust, which is a series of RSA signature checks among the software components in a specific order as shown below:




The BootRom is Read-only memory (ROM) and it is the first stage of booting an iOS device. BootRom contains all the root certificates to signature check the next stage.

iPhone operates in 3 modes – Normal Mode, Recovery Mode, DFU mode

In Normal mode, BootRom start off some initialization stuff and loads the low level boot loader (LLB) by verifying its signature. LLB signature checks and loads the stage 2 boot loader (iBoot). iBoot signature checks the kernel and device tree, while the kernel signature checks all the user applications.

In DFU mode, iPhone follows the boot sequence with a series of signature checks as shown below. BootRom signature checks the second level boot loaders (iBSS, iBEC). Boot loader signature checks the kernel, and the kernel signature checks the Ramdisk.




During iOS update, the Ramdisk gets loaded into RAM and it loads all the other OS components.

In Forensics, we will create a custom Ramdisk with our complete forensic tool kit and load it into the iPhone’s volatile memory.

Signature checks implemented at various stages in the boot sequence do not allow us to load our custom Ramdisk. To load our custom Ramdisk, we have to bypass all these signature checks. In the chain of trust boot sequence, if we compromise one link, we can fully control all the links that follow. The hacker community has found several vulnerabilities in BootRom. By using these, we can flash our own boot loader and patch all other signature checks in all the subsequent stages. Apart from signature checks, every stage is also encrypted. These encryption keys can be grabbed from JailBreaking tools.“

src: https://resources.infosecinstitute.com/iphone-forensics/

another lengthy writeup: https://blog.elcomsoft.com/2017/11/the-art-of-ios-and-icloud-forensics/

unlocking iDevices: how ex-empoyees make business


„Cellebrite, through means currently unknown, provides these services at $5,000 per device,“

https://blog.malwarebytes.com/security-world/2018/03/graykey-iphone-unlocker-poses-serious-security-concerns/

Mysterious $15,000 ‚GrayKey‘ Promises To Unlock iPhone X For The Feds


https://youtu.be/gpzl11uPmyY

https://www.magnetforensics.com/
  • AXIOM has the most advanced parsing and carving techniques which finds more evidence than any other tool, including 25% more pictures.
  • Get more detailed information about what someone was doing at any given time and where, with artifacts like KnowledgeC, iOS Wallet, geolocation data, Screen Time, and more.
  • Analyze the full file system (including iTunes backup-style images) and decrypted Keychain from iOS devices and find evidence that other tools miss.
  • Memory images could contain valuable evidence like messages, call logs, and email. AXIOM natively supports the analysis of memory from GrayKey images without the need to install third-party conversions or plugins.
  • iOS images contain a lot of native files and raw data. Use AXIOM to cut through the noise of data and save time during your investigations by quickly surfacing only relevant evidence rather than unactionable data.
  • Discover new artifacts with Dynamic App Finder to automatically scan your file system and memory images for relevant chat, browser, geolocation, and identifier data.
  • AXIOM is a complete digital investigation platform that gives you the power to analyze evidence from GrayKey images alongside data from other computer, cloud, social media, and mobile evidentiary sources.
src: https://www.magnetforensics.com/graykey/




„can take up to three days or longer to (crack) for six-digit passcodes“ … and recover the data of the iDevice.




src: https://www.forbes.com/sites/thomasbrewster/2018/03/05/apple-iphone-x-graykey-hack/#566b2c9c2950

Jailbreak iPhone XS, iPhone XR on iOS 12 – iOS 12.1.2 Using Chimera Jailbreak [How to]


Bild/Foto

Posted by Rajesh Pandey on Apr 30, 2019

The Electra team surprised everyone today by releasing Chimera, a new iOS 12 – iOS 12.1.2 jailbreak for A7-A12 devices including the iPhone XS and iPhone XR. Chimera has been built from the ground up and comes with Sileo as its default package manager.

the hardware hack: How to unlock iCloud locked Apple iPad 2, 3, 4, iPad Air and Air 2, iPad mini 1, 2, 3, 4, iPad 12.9 and 9.7 – WARNING!

This method works ONLY on iPads with 3G/4G/LTE and removes cellular from your iPad.

it will become wifi-only! (no 3G/4G/LTE no more!)


„This method will help you bypass iCloud on locked iPads.

This manual will help you with iCloud bypass on your iPad Cellular.
  • After bypass iCloud you will have iPad Wi-Fi Only.
  • Sim-slot (GSM, Mobile, SimCard) will not work.
  • GPS and Bluetooth will work.
At this moment it works with Apple iPad 2, iPad 3, iPad 4, iPad Air, iPad mini, iPad mini 2, iPad Air 2, iPad mini 3, iPad mini 4, iPad Pro 12.9, iPad Pro 9.7 which is locked by service iCloud. Include locked through “Lost and erased” mode.
  • On the iPad 2 3G Model A1396 (GSM) remove the resistor r1205. On the Model iPad 2 3G A1397 (CDMA) move resistor r1205 to position r1204.
  • iPad 2 3G will enter DFU mode.
  • Connect the iPad 2 3G to your PC or Mac.
  • After that you need to restore the iPad 2 3G through iTunes with firmware of Wi-Fi ONLY model and activate using the official method.
  • Turn off the automatic firmware update: Settings \ iTunes Store, App Store \ Automatic download \ Updates.
You can support this project through donations. „PayPal block my account with all money because I’m from Ukraine. “

After this you will can install any apps on your iCloud free iPad, make jailbreak, assign your own Apple ID account and do any other things.

Apple devices (for example iPads) have some part on logic board which called Board_id. Board_id is responsible for how device identifies itself. For iPad there are several possible configurations: Apple TV, Apple iPhone, Apple iPad Cellular, Apple iPad WiFi only.

When Apple’s iCloud servers bloсked iPads they do this in 2 ways:
  • iPad WiFi only will be blocked by it serial number.
  • iPad Cellular will be blocked by it serial number and IMEI.
To bypass iCloud on iPads Cellular you need disable it modem chip and change Board_id.

If you just only disable modem you will get error and not working device. Sometimes this happens when modem or cable modem is broken even on iPads which isn’t blocked in iCloud. My method can revive such devices.

When you disabled modem chip and changed Board_id device will stop work properly. Something inside will say: “Hey man, something wrong! My hardware is like for WiFi only model, but you use firmware for Cellular model. I go in DFU-mode and you should go in iTunes and restore me”.

When you connect your iPad to BigBrother OS will install driver for it.

At finish you will have iCloud unlocked iPad WiFi only. Now It can be registered on your own Apple ID through new clean serial number. Voila!

If you have some problem with recovering check USB cable and restore iPad manualy from file with firmware. You can download firmware from ipsw.me. Remember that now you have iPad WiFi only hardware and you should download WiFi only firmware. For example, if you have iCloud locked iPad Air Cellular A1475 you should download firmware for iPad Air WiFi only A1474.

And Yes. At any moment you can covert your iCloud freу iPad WiFi only with hardware method back to iPad Cellular. But iCloud blocking will back too.

Be careful and good luck!“

Here you can read manual to bypass iCloud on model of your iPad:If you are looking for a way to unlock the iCloud on iPad Wi-Fi Only, iPhone or iPod, then read this article: How to bypass iCloud on iPad WiFi, iPad Cellular, iPhone and iPod

src: https://pasha4ur.org.ua/

https://pasha4ur.org.ua/articles/difdevices/131-how-unlock-apple-ipad-2-3g-icloud-locked

unlock: A1430 (GSM) and A1403 (CDMA)








… respect! this border_id change thing needs further investiagion.

src: https://pasha4ur.org.ua/images/phocagallery/stories/portfolio/apple/ipad2unlock/ipad3-icloud-unlock-by-pasha4ur.png

how to open the thing:




warning!


all sort of weird things happening:

Hi can someone help me with ipad mini A1454 I have removed the resistor R1204 as stated in the instructions I need to now make a jumper on R1205 because itunes detects my ipad as a apple tv so a jumper going from R1205 but unsure where the other end of the jumper goes please help me I would be really grateful

„use good pencil (graphite) to make short (jumper) in R1205“

src: http://forum.gsmhosting.com/vbb/f631/bypass-icloud-ipad-2-3-4-air-mini-mini-retina-3g-hardware-method-1872271/index8.html

redsn0w is ooooold:


in this video DiplInf Sebastian Scheiber shows how to jailbreak an locked (!) iPad and recover the data.

Method used:problem: this probably only works with on older versions of the iPad / iPhone supported by Redsn0w and iOS 5.1 is rather old, most devices will have a newer version of iOS installed by now.

how to get into DFU (recovery) mode:

  • hold power button pressed for 3 seconds
  • now keep power button pressed while also holding home button pressed
  • after a few seconds screen goes dark, now RELEASE POWER BUTTON but still keep home button pressed
… screen should stay dark and PC you connect do should detect an iPad in DFU mode.

Stuck in DFU mode – How to Exit DFU Mode:


Press Home and Power/ Sleep buttons at the same time for 10s > Release the Home and Power/ Sleep buttons together.

iOS 9.2 – 9.3.3 64-bit devices only


iphone 5s iphone 6 iphone 6 plus iphone 6s iphone 6s plus iphone se ipod touch 6g ipad mini 2 ipad mini 3 ipad mini 4 ipad air ipad air 2 ipad pro

will need your apple id and password.

https://en.pangu.io/

Evasi0n (Evasi0n7) Jailbreak Tool:

for iOS 6.x – iOS 7.0.x


… this can not be used to unlock an iPad. Your iPad/iPhone will have to be unlocked (PIN) before jailbreaking.

http://www.ijailbreak.com/evasi0n/

evasi0n is an unconventional utility able to perform jailbreak operations on devices running iOS 6 and 7.

A consequence of the procedure is the removal of several limitations imposed by Apple, allowing users to install software that is not approved by the company and switch phone carriers seamlessly.

evasi0n became a success just days after its first release.

Supposedly, a few million copies have been downloaded in a very short period, which is not necessarily an indication of its efficiency, but sure says a lot. Statistics aside, the general opinion (as stated by most users on the Internet) is that evasi0n is a trustworthy jailbreak application, one that has to offer everything and asks for nothing in return.

evasi0n is special because it can perform an untethered jailbreak operation, which translates into the fact that the iOS device will be able to reboot without requiring a connection with an external device.

The principle it relies on involves a number of complicated steps, most of which are related to exploiting several vulnerabilities that were overlooked by Apple. However, the process is completed silently, without user intervention.

This is the main reason why evasi0n is considered one of the most easy-to-use and accessible applications of its type. It’s not pretentious as far as OS requirements are concerned, nor does it require advanced configurations.

In order for the jailbreak operation to be successful, you need to equip your system with iTunes and connect your iPhone, iPad or iPod to the computer via a USB cable.

It is also recommended that you backup the device in case something goes wrong.

Once you’ve completed these steps, you can proceed with the jailbreak operation, which, if free of errors, shouldn’t take more than five minutes. However, if the process fails, simply reboot the device and relaunch evasi0n.

On an ending note, this is a well-built jailbreak software, easy to use and user-friendly. Nevertheless, a backup operation is vital in case anything goes wrong.

windows versions:

https://www.softpedia.com/get/Mobile-Phone-Tools/IPhone/evasi0n.shtml

https://www.softpedia.com/downloadTag/jailbreak

linux version:

https://www.mediafire.com/file/21zlxh81cqtqqgb/evasi0n-linux-1.0-3c53ba10e2448d311b0f4157f2d7eb568f106c4f-release.tar+%281%29.lzma

phoenixpwn.com


jailbreak works only on 32-bit devices, which includes :
  • iPhone 4S, 5C and 5
  • iPad 2, 3, 4
  • iPad Mini 1
  • iPod Touch 5
https://phoenixpwn.com/ -> you will need an apple id associated with the device?

https://youtu.be/6I8V-BRx2hk

https://twitter.com/saurik/status/1119211957188345856

for older devices and firmwares (iOS 5.1.X)


„RedSn0w actually evolved from the Jailbreaking tool Quickpwn, which was an early Jailbreaking tool used to Jailbreak the 2nd generation of iOS. Nowadays RedSn0w can be used to Jailbreak a lot of versions of iPhone, iPod Touch and iPad.“ … but not all, iPad 4 seems not supported.

RedSn0w iPhone Support:


iPhone 6s Plus: Not Supported
iPhone 6s: Not Supported
iPhone 6 Plus: Not Supported
iPhone 6: Not Supported
iPhone 5s: Not Supported
iPhone 5c: Not Supported
iPhone 5: Not Supported
iPhone 4S: iOS 5 (iOS 5.1.1, iOS 5.0.1, iOS 5.0)
iPhone 4: iOS 6 (iOS 6.0,6.0.1) + iOS 5 (iOS 5.1.1, iOS 5.1, iOS 5.0.1, iOS 5.0) + iOS 4 (4.3.5, 4.3.4, 4.3.3, 4.3.2, 4.3.1, 4.3, 4.2.6, 4.2.1, 4.1, 4.0.2, 4.0.1, 4.0) + iOS 3 (iOS 3.1.3)
iPhone 3GS: iOS 6 (iOS 6.0, 6.0.1) + iOS 5 (iOS 5.1.1, iOS 5.1, iOS 5.0.1, iOS 5.0) + iOS 4 (4.3.5, 4.3.4, 4.3.3, 4.3.2, 4.3.1, 4.3, 4.2.6, 4.2.1, 4.1, 4.0.2, 4.0.1, 4.0) + iOS 3 (3.1.3)
iPhone 3G: iOS 4 (4.3.4, 4.2.1, 4.1, 4.0.2, 4.0.1, 4.0) + iOS 3 (3.1.3)

RedSn0w iPad Support:


iPad Pro: Not Supported
iPad Air 2: Not Supported
iPad Air: Not Supported
iPad Mini 4: Not Supported
iPad Mini 3: Not Supported iPad Mini 2: Not Supported
iPad Mini: Not Supported
iPad 4: Not Supported <- argh!
iPad 3: iOS 5 (iOS 5.1.1) <- RedSn0w told me „Ipad 3 is not supported“, probably it has a newer iOS installed than 5.1.1)
iPad 2: iOS 5 (iOS 5.1.1, 5.0.1)
iPad 1: iOS 5 (iOS 5.1.1, iOS 5.1, iOS 5.0.1, iOS 5.0) + iOS 4 (iOS 4.3.5, 4.3.4, 4.3.3, 4.3.2, 4.3.1, 4.3, 4.2.1) + iOS 3 (iOS 3.2.2)

src: http://www.ijailbreak.com/redsn0w/

PwnageTool 4.3 Info

http://public.stuff.hu/pwnagetool/PwnageTool_4.3.dmg

Method 2: Get Out of DFU Mode on iPhone/iPad/iPod touch with PhoneRescue


Click here to download PhoneRescue free version!

Step 1: Launch PhoneRescue on your computer > Connect your iOS device to your computer with a USB cable > Wait for PhoneRescue to recognize your iOS device.

Step 2: Click on „Exit Ramdisk Mode“ at the bottom of the Homepage.

other jailbreaking tools:

links:


https://www.antid0te.com/

https://www.sektioneins.de/

http://www.ijailbreak.com/jailbreak-software/

https://www.theiphonewiki.com/wiki/I0n1c

tweets:


https://twitter.com/angelXwind

#linux #gnu #gnulinux #opensource #administration #sysops #apple #ipad #phone #jailbreak
Quelle: https://dwaves.org/2019/05/12/2019-status-of-jailbreak-apple-devices-tools-overview-trying-to-unlock-ipad-3-and-ipad-4/
 
#youtube-dl is a public domain video and audio downloader for a wide range of sites.

youtube-dl can download from YouTube, PeerTube, and pretty much anything with a video or audio stream embedded somewhere in the page.

youtube-dl can also recurse into other video links present on the page, allowing for a full account/channel #backup if so desired.

It can also download comments and other metadata.

Website 🔗: https://ytdl-org.github.io/youtube-dl/index.html

apt 📦: youtube-dl

#free #opensource #foss #fossmendations
 
Librem One: Purism startet Angebot für sichere Online-Dienste #Purism #Crowdfunding #Datensicherheit #Sicherheitslücke #XMPP #librem5 #Internet #OpenSource #Security
 
dann wünsche ich denen mal viel Spaß beim implementieren sicherer Verschlüsselung ohne #opensource. #anwaltspostfach
 
How to install flash LibreBoot / CoreBoot on Lenovo X60S Tutorial from 2018

NOTE: LibreBoot (status of 2018) can NOT boot Windows X-D (who cares). So i guess you want to use LibreBoot with Linux and Linux only. even when CoreBoot is a 10 year old project... replacing your BIOS with LINUX can be a[...]

#linux #gnu #gnulinux #opensource #administration #sysops #free #fsf #libreboot #coreboot #thinkpad #freehardware #hardware #bios #computrace #surveillance
Quelle: https://dwaves.org/2018/06/18/how-to-install-flash-libreboot-coreboot-on-lenovo-x60s-tutorial-from-2018/
 
How to install flash LibreBoot / CoreBoot on Lenovo X60S Tutorial from 2018

NOTE: LibreBoot (status of 2018) can NOT boot Windows X-D (who cares). So i guess you want to use LibreBoot with Linux and Linux only. even when CoreBoot is a 10 year old project... replacing your BIOS with LINUX can be a[...]

#linux #gnu #gnulinux #opensource #administration #sysops #free #fsf #libreboot #coreboot #thinkpad #freehardware #hardware #bios #computrace #surveillance
Quelle: https://dwaves.org/2018/06/18/how-to-install-flash-libreboot-coreboot-on-lenovo-x60s-tutorial-from-2018/
 

Despite my animosity towards Micro$oft... THIS IS COOL!!!

Now, don't get me wrong, there's a lot of cringe-worthy content in this HoloLens 2 presentation... I hate hearing them brag about their interface ideas as if they invented responsive and naturally intuitive UI. Those sort of irksome things aside, this idea itself is great! This really is where things have to go in the future. Imagine, with virtualization and remote access, having your Linux machines running with potentially infinite monitors, and remote consoles scattered all around, yet never hidden behind virtual desktops or windows...

That's a utopian view, and only the tip the iceberg. I'd so love this technology to grow in to something fundamentally non-proprietary and truly open, otherwise there could be some big problems from this technology. Just imagine the damage to young minds from having to learn to filter out a literal world of ads and marketing as they try to play a game, or so their homework online... Not to mention, the magnitudes more personal information this device deals with.

We cannot accept this sort of tech if marketing and information harvesting is coded in to it's core engine. This is where the rubber hits the road for you Microsoft, will you really embrace and participate in the open-source world, or just attempt to co-opt it in to submission for your own gain? My instincts say the latter, but the optimist in me hopes I'm wrong.

#microsoft #opensource #hololens #hololens2 #video #3d #augmentedreality #virtualreality #vr #ar
 

Farewell GNU screen... Where’s Byobu been all my life!?!

This looks amazing! I’m def digging deeper in to Byobu tomorrow.
I don’t even know if I need i3wm anymore, ha! /s
#GNULinux #linux #OpenSource #terminal

Learn Byobu while listening to Mozart

This 10-minute instructional video will start with the basic hotkey shortcuts to using Byobu effectively. If you're interested in learning how to more effect...
youtu.be
 
Linux: Debian wählt einen neuen Projektchef #Debian #IanMurdock #Linux #Applikationen #OpenSource
 

software preservation site


Software Heritage aims to preserve all public software
https://archive.softwareheritage.org/

Their own software for running the site
https://forge.softwareheritage.org/

This could come in handy when upstream repos for small projects are down...

#linux #opensource #programming
 

software preservation site


Software Heritage aims to preserve all public software
https://archive.softwareheritage.org/

Their own software for running the site
https://forge.softwareheritage.org/

This could come in handy when upstream repos for small projects are down...

#linux #opensource #programming
 
Linux-Hersteller: Purism kooperiert mit Private Internet Access für VPN #Purism #Datensicherheit #EFF #Linux #Smartphone #VPN #librem5 #Handy #OpenSource #Security
 
Linux: Spurv soll Android-Apps in Wayland integrieren #Linux #Android #ChromeOS #Systemd #OpenSource
 

GNU/Linux Tips: Thunar's Secret Weapon!

If you use a desktop environment then there's a lot of reasons to like the Thunar file manager. Especially so, for example, if you're tired of Nautilus trying to be Windows Explorer, crashing at the worst times, like while you're transferring files over sFTP, or just generally devouring your system's memory (e.g. tracker & tracker miners run even if you use Nautilus without the Gnome DE). But I digress.

The real purpose of this post isn't to vent my frustrations with Nautilus, it is to shed some extra light on a feature of Thunar that often goes unmentioned and unnoticed - the bulk renamer. It's no secret, really, but it isn't specifically mentioned in the Edit or right-click menus, where you only find the regular 'Rename...' option. In fact, I don't see it mentioned, or even hinted at, anywhere in the app, despite the great utility this little tool possesses!

So how do we access this bulk renamer? Does it even exist, or am I just toying with you here? So many questions... Well, the Thunar developers are actually quite ingenious; the bulk renamer is context-activated! Whenever you select multiple items, and then choose that regular old 'Rename...' function - poof - there it is!
Bild/Foto

Isn't that nifty? It can even support regular expressions, as well as several other functions aside from your standard 'Search & Replace'. For example, the bulk renamer can pull tags from your music files, making it easy to fix those CD rips that end up all named 'Track_01.mp3', and so on, and give them a meaningful name based on something like the track number and song title. Likewise, you can add timestamps to filenames from various meta-data sources such as last access, last modified, or even get the time a photo was taken using it's meta-data! I could go on and on, but it's just a great bulk rename utility! Especially so, given that it's already built in to the file-manager many of us use.

But maybe you don't use Thunar, or for whatever reason you would just rather just have a stand-alone bulk rename utility... Well, remember when I mentioned how ingenious the Thunar devs are? They got you covered here as well! If we run thunar --help we get the following:
Usage:
  thunar [OPTION…]

Help Options:
  -h, --help                 Show help options
  --help-all                 Show all help options
  --help-gapplication        Show GApplication options
  --help-gtk                 Show GTK+ Options

Application Options:
  -B, --bulk-rename          Open the bulk rename dialog
  --daemon                   Run in daemon mode
  -q, --quit                 Quit a running Thunar instance
  -V, --version              Print version information and exit
  --display=DISPLAY          X display to use

Ah ha! So you can run Thunar with that -B or --bulk-rename switch and it will open the bulk renamer in stand-alone mode, and not even display the Thunar file-manager!

On my system (Arch Linux) there's already an application launcher to run the bulk renamer this way If you have Thunar installed. I imagine this is pretty standard, so you should see it on your system as well and it goes by the unassuming title of 'Bulk Rename'. Personally, I use i3 window manager and simply added a line in the config to allow me to easily run exec /usr/bin/thunar -B at the press of a key (...board shortcut). And of course similar functionality can be achieved in most window managers, for those who prefer keyboard shortcuts over excessive mousing around :P

Now, I know a lot of you probably use the terminal, and solve these issues by piping various commands and such... Which is admittedly pretty powerful, and a bad ass way of working! I too prefer the terminal for many tasks and always at least four tiled terminals open at any given time. However, I do find it more convenient to do certain tasks with a GUI, and I love that the Thunar bulk renamer allows me to quickly and easily preview the file names, and make changes as needed in real time.

This may have been totally obvious to many of you, but I had been using Thunar for a couple of years before I discovered the bulk rename functionality some time back! I hope this tip helps others, who may also be oblivious to this little (simi-) hidden gem!

Happy file organizing!

#Linux #GNULinux #GNU-Linux #thunar #filemanager #file-manager #desktop #windowmanager #OpenSource #open-source #mp3 #photos #music #files #rename #bulk #tips #tricks #HOWTO #tutorial
 
Firefox: Mozilla nimmt Änderungen bei Erweiterungen vor
Mozilla nimmt Änderungen am System der Erweiterungen von Firefox vor, die den Schutz der Privatsphäre betreffen.

https://www.pro-linux.de/news/1/26913/firefox-mozilla-nimmt-%C3%84nderungen-bei-erweiterungen-vor.html
#News #Mozilla #Firefox #Browser #Internet #Privatsphäre #Software #OpenSource
 
Firefox: Mozilla nimmt Änderungen bei Erweiterungen vor
Mozilla nimmt Änderungen am System der Erweiterungen von Firefox vor, die den Schutz der Privatsphäre betreffen.

https://www.pro-linux.de/news/1/26913/firefox-mozilla-nimmt-%C3%84nderungen-bei-erweiterungen-vor.html
#News #Mozilla #Firefox #Browser #Internet #Privatsphäre #Software #OpenSource
 

Good Linux Podcast???


Hi guys,

it is only recently that I have discovered the Linux podcasts, for one of the very few I follow I almost reached its regular release, #latenightlinux, so I was looking for new podcasts beside the other one I follow too, #thelunduke show.

Specifically I would like some suggestions for podcasts that are free-software oriented rather than just opensource and not particularly Ubuntu centric, Ubuntu is boring. I remember the first edition of Late Night Linux were more interesting with Ikey of Solus rather than the latter with Will and Graham from Ubuntu.

Thanks!

#Linux #gnu #fsf #freesoftware #foss #floss #opensource #podcast #podcasts #distro

p.s. something got wrong between the interchange between #Friendica and #diaspora
 
Interview with @GetTogether - Open source free speech replacement for Meetup -
(AskNoah)
#asknoahshow #gettogether #opensource #federation
 
Firefox Lockbox: Mozilla bringt Firefox-Passwortverwaltung als Android-App #Mozilla #Android #App #Datensicherheit #GooglePlay #Passwort #OpenSource
 

I’m not adjusting well to seeing M$ assimilating open-source...

Pyright: Static type checker for Python


Static type checker for Python. Contribute to Microsoft/pyright development by creating an account on GitHub.
Article word count: 34

HN Discussion: https://news.ycombinator.com/item?id=19473631
Posted by JacobHenner (karma: 126)
Post stats: Points: 143 - Comments: 39 - 2019-03-24T01:55:38Z

\#HackerNews #checker #for #pyright #python #static #type
Article content:

Bild/Foto

You can’t perform that action at this time.

You signed in with another tab or window. [1]Reload to refresh your session. You signed out in another tab or window. [2]Reload to refresh your session.

References

Visible links
1. file:///dev/
2. file:///dev/

HackerNewsBot debug: Calculated post rank: 108 - Loop: 67 - Rank min: 100 - Author rank: 74

#opensource #microsoft #python
 
Want to get out of your job? I'm looking for partners in crime:
• Media Designers / Content Producers
• Software Developers
• System Administrators
• Support Technicians

See details and benefits here: https://www.tuxedocomputers.com/en/Infos/Jobs.tuxedo #Linux #OpenSource #Jobs
 
Browsh is a text based (but modern) webbrowser. It uses Firefox's engine and converts the rendered page to text characters that'll display in your terminal. brow.sh #opensource #linux #internet

 
I love @fdroidorg but one feature I miss is "Changelogs" for apps. I'd like to know what this new update for my favourite app offers me. Is there a new feature? Or is there a critical bug fix?

Who else thinks we need this feature in #Fdroid?

#OpenSource #FOSS #Android #apps #updates
 
Anyone here knows #Arduboy?

It just crossed my radar and looks very #awesome at first and also second glance. It's a miniature #gameboy #clone based on #arduino which plays small (but sophisticated) #opensource #games that the users themselves create and #share. So far I'm sold, I'd like to buy one, unless there is a catch - does anyone have experience with this #console?

I'd sooo love to make games for this 😀 And it's not even expensive.

Bild/Foto

Bild/Foto

https://arduboy.com/

#foss #gaming
 
Later posts Earlier posts