realtime output of parallel cmds in one terminal? -- Re: mutt, neomutt, and searching emails

2020-05-09 Thread Zenaan Harkness
On Sun, May 10, 2020 at 12:08:03PM +1000, Zenaan Harkness wrote:
> There are some ageing dinosauruses that still use TUIs and even the more 
> archaic mbox "all emails in this folder in a single file" email storage, and 
> to distressingly admit to the truly ancient practice of "grep"ing an mbox 
> file when mutt's search feature is just so dang diddly ang dang SLOW on a 
> 20,000+ email folder (and that's barely 4 years of cypherpunks!).


Anyone have experience or suggestions on reasonable ways to print/dump the 
output of 'multiple commands being run in parallel' to the command line/ 
terminal?

For example, mpop can download emails from multiple email accounts in parallel 
(it uses separate email UID files per account to isolate its download activity 
to a single email account), but how to actually do this in parallel -and- 
display the output of each command 'in real time' in a single terminal in a 
"reasonable" way?

I've a little wrapper that retries up to MAX_TRIES=7 if an mpop account 
download has a TLS error (gmail pop3 dl producing a lot of these the last week 
or so...), and 7 retries * 5 lines of text per retry (retry header, date time 
stamp, echo of cmd being run, and finally the 2 mpop "TLS handshake failed" 
error lines) is a fair few lines of output...

is it time to learn a 'full blown' TUI library?  If so, is there such a thing 
usable from a shell script?


They Know What's Best For Me

2020-05-09 Thread Zig the N.g
Keep front running sedition, muffas :D

   "In fact, they know me better than I know me."
   http://www.youtube.com/watch?v=QcUAG6t5aN8



mutt, neomutt, and searching emails

2020-05-09 Thread Zenaan Harkness
There are some ageing dinosauruses that still use TUIs and even the more 
archaic mbox "all emails in this folder in a single file" email storage, and to 
distressingly admit to the truly ancient practice of "grep"ing an mbox file 
when mutt's search feature is just so dang diddly ang dang SLOW on a 20,000+ 
email folder (and that's barely 4 years of cypherpunks!).

What to do.  Well the installation of neomutt many moons ago, which was not 
accompanied by any man page reading nor even a simple yandex, has not changed 
the search speed automatically.

Mutt (/neomutt)'s "~b" email body search feature is so slow across 20k emails 
it's impressive, especially given the speed of grep from the command line, and 
the speed of opening that 20k email folder.

The following thought arises:

On opening an mbox folder, mutt evidently scans those 20k messages, since it 
numbers them uniquely, and can jump very quickly to any single email, and also 
can filter the subjects, senders, recipients etc using it's secret incantations 
for "L"imiting etc.

So it at least appears that mutt indexes that mbox file by (presumably) line 
number, and also (again, apparently at least) caches certain of the headers of 
each email.

If the above assumptions are correct, then searching the body of emails could 
be done using grep at the command line, and scanning grep's output for line 
numbers, and mapping that against mutt's internal mapping of the mbox.

Theoretically at least, this is a relatively simple algorithm.  But although 
it's simple, it may be too late given the existence of neomutt which probably 
just requires some reading, config, and learning the new commands for searching 
emails using whatever new whizz bang system that puts the neo into neomutt (for 
the lazy, that would be libnotmuch).


USPS - Cryptoplatform. Information.

2020-05-09 Thread other.arkitech
FYI
I have renewed the landing page including more information about the USPS 
cryptoplatform I've designed.

http://otheravu4v6pitvw.onion/

If you find it more convenient I have attached a pdf document with its content.

You are always welcome. Enjoy.
Thanks
--
Other Arkitech

Sent with [ProtonMail](https://protonmail.com) Secure Email.

usps.pdf
Description: Adobe PDF document


Re: IQNets - low b/w end user nodes - maximise 'user experience'

2020-05-09 Thread Zenaan Harkness
>  - ("atomic ccdex" fmradio link I did not include, this proj is about overlay 
> nets not DCs, and for now I have no idea what ccdex means, so perhaps if 
> someone comments that it's somehow quite relevant to the implementation of an 
> overlay net, it can get added in),

CCDEX must relate to DEX, distributed/decentralized exchange for digital 
currencies, so may be CCDEX is just "Crypto Currency Decentralized EXchange" - 
but then why use CCDEX when we already have the term "DEX" .. not sure.

   https://en.bitcoinwiki.org/wiki/DEXes

Anyway, incentivization may well involve DCs - in present average human 
consciousness, money seems a motivation turbocharger.

Any DC that is not inherently 'fair' in its basic operation will be eclipsed by 
a "more fair" DC.

Some will wish to avoid the "pollution" of financial motivation in their street 
nets/N2N phys buildouts etc, and that too is just fine.

In any case, DCs in the context of IQNets falls under incentivization of some 
sort.


4th May; 4,350 miles over Pacific Ocean; 2020JJ; ~2.7-6m dia -- Re: 2020, year of 98ft, 10,000 mph asteroids exploding in atmosfear (tonight) - be afraid & Get Out Yer Telescopes :D

2020-05-09 Thread Zig the N.g
On Fri, Mar 20, 2020 at 07:26:28AM -0400, grarpamp wrote:
> 2020EF and 2020DP4 are moot.
> 
> The bad boys are out there, lucky if you know ahead of time,
> nothing you can do about the ones you would know about
> that are relavant to and in your lifetime anyway.
> 
> https://en.wikipedia.org/wiki/Near-Earth_object
> https://cneos.jpl.nasa.gov/sentry/
> https://cneos.jpl.nasa.gov/ca/
> https://ssd.jpl.nasa.gov/


The 6th closest asteroid to Earth recorded since 1900, named 2020JJ, which 
escaped detection prior to arrival over the Pacific Ocean on 4th May 2020, was 
not very big - just "truck sized" at about 2.7 to 6 meters diameter and 
therefore likely would have burnt up in the atmosphere prior to hitting the 
Earth if it had been on a collision course.

   Truck-Sized Asteroid Avoids Detection Ahead of Near-Record Close Flyby Over 
Earth
   
https://sputniknews.com/science/202005061079222704-truck-sized-asteroid-avoids-detection-ahead-of-near-record-close-flyby-over-earth-/

  .. CNET highlighted that out of the top 10 closest near-Earth flybys 
recorded by NASA since 1900, 2020 JJ ranks as the sixth-closest approach. 
Moreover, all of the asteroids in NASA’s top 10 passed by in 2004 or later.

  “This isn't because asteroids started attacking us in the 21st century. 
Rather, it says something about how astronomers and their technology are 
becoming better at spotting ever-smaller and closer asteroids,” noted CNET’s 
Eric Mack. ...



The next big-ish asteroid we no longer need to really keep an eye on is 99942 
Apophis, ~370m diameter, next due 2029 and on course to fly BELOW 
geosynchronous (some satellites) orbit:

   https://en.wikipedia.org/wiki/99942_Apophis

which as of December 2004, briefly reached "4" on the Torino Scale (0-10, 
higher is worse, comparing kinetic energy with probability of impact), the 
highest level of any object recorded so far:

   https://en.wikipedia.org/wiki/Torino_scale


For the time being, for all yer fear porn, look elsewhere than asteroids..


Re: tor replacement - was Re: Box for simple Tor node.

2020-05-09 Thread jim bell
 Okay, so what should I actually do?  I didn't suggest this project intending 
to make the decisions by myself, alone.  I figured I might be one of dozens of 
deciders who combine ideas to plan this.  
At this point, I see the main impediment is finding somebody with the 
motivations and qualifications to write the software.  An additional 
complication is that whoever volunteers, he might not be trusted by others. 
What is to be done?
The one situation that I consider intolerable is that TOR remains as a monopoly 
in the "anonymization marketplace".  
          Jim Bell 


On Friday, May 8, 2020, 01:09:16 PM PDT, John Young  
wrote:  
 
 So long as it is much more profitable to prevent 
and damage cybersecurity it is unlikely that any 
scheme for reliable and trustworthy public 
cybersecurity will be developed for any longer 
than it takes to monetize it, following a 
campaign to generate public trust with freeware 
and high recommendations of experts already 
deeply compromized (that's what experts means).

This has been the pattern for as long as 
insecurity and fear has been promoted by 
authoritarians, revolutionaries and "freedom fighters."

Challengers of authority inevitably betray 
believers for king's coin and/or other 
irresistable rewards. The only sec methods that 
publicly protect as expected are the ones never 
heard about, used briefly, disappear without a 
trace. "Never heard about," "used briefly," and 
"disappear without a trace" are obviously 
deception marketing tools. "Obviously deception marketing tools" too.

Mea culpa. This is freeware. Don't click it.

At 02:17 PM 5/8/2020, you wrote:
>Excellent.  I should mention that I have 
>focussed on Raspberry Pi 4 merely because it was 
>new, and seemed to be quite capable of serving 
>as a anonymization node.  If anything, we might 
>call it "over-capable", but in the computer 
>world that's not necessarily a bad 
>thing.  Standardized devices, especially if they 
>are manufactured in huge quantity, become more 
>economical. If somebody has an alternative idea 
>for the hardware, now would be an excellent time to speak up.
>
>  They also tend to be studied more intensely 
> than obscure, low-volume devices, I would 
> imagine.  What's the old saying, something like 
> "Yes, we're paranoid, but I sometimes wonder if 
> we are paranoid 
> ENOUGH?" 
> https://www.goodreads.com/quotes/876669-yes-i-m-paranoid-but-am-i-paranoid-enough
>
>
>One big improvement that I think we've settled 
>on should be done is to implement 'chaff' into 
>the protocol. 'chaff' might have been a problem 
>if the people who host the nodes had some 
>limited-data Internet service, but I am aware 
>that Centurylink now offers 1 gigabit service 
>for $65 monthly, and I think that service has no 
>monthly data limit.  (their slower services have 
>a 1 terabyte montly limit).  That should be 
>plenty to allow for generous chaff.
>
>  I also thought of an idea to encrypt, or at 
> least combine the outputs of two output nodes 
> to generate the final data.  Why?  It is 
> frequently (and quite wisely!) recommended that 
> a home-user NOT act as an output node, for fear 
> of being held liable (civilly or criminally) 
> for plaintext that comes out of an output 
> node.  But I think there is a solution.  Don't 
> output plaintext, encrypt it somewhat so 
> 'nobody' can simply point to it and declare, 
> "There goes that forbidden data, again!".
>
>One idea, mine, is to output TWO 
>seemingly-random files, from two different 
>output nodes, which when XOR'd with each other 
>regenerates the (suspicious?) data.  Another 
>possibility is to encrypt the output with a 
>symmetrical key, and perhaps deliver the key 
>from another node.  Not so much to make the data 
>REALLY secure, but instead merely turn it into 
>seemingly-randomized data that cannot be 
>labelled 'suspicious' merely by monitoring the node's output.
>
>Why shouldn't ordinary people be able to run an 
>anonymization node, and even an output node, if these precautions are taken?
>
>
>My point about the lifetime of SD cards was 
>simply that if it used 'frequently', they might 
>wear out.  But, if they are only used for 
>program storage and settings, that won't be a problem.
>
>                  Jim Bell
>
>
>
>On Friday, May 8, 2020, 01:51:58 AM PDT, 
>other.arkitech  wrote:
>
>
>I've been running USPS on a network of raspberry pis.
>You anonymization layer project is very aligned 
>with my cryptoplatform project, and they both could be the same thing.
>with respect to wearing out the SD cards I have 
>Raspberry pis older than 2 years runing the 
>blockchain protocol and I haven detected failures in any of the _60 nodes
>
>best
>OA
>
>
>Sent with ProtonMail Secure Email.
>
>������� Original Message �������
>On Friday, May 8, 2020 8:35 AM, jim bell  wrote:
>
>>
>>It turns out 

Headline: "Did we just witness one of the nuttiest foreign policy blunders in American history?" Jim Bell doesn't thing so.

2020-05-09 Thread jim bell
https://usa-onlinenews.com/2020/05/07/did-we-just-witness-one-of-the-nuttiest-foreign-policy-blunders-in-american-history/

"I cannot be the only American who somehow missed the news that on March 26 
Secretary of State Mike Pompeo announced the United States would offer bounties 
of a combined $55 million for the capture of President Nicolás Maduro of 
Venezuela and four of his top associates. By the end of March, most of the 
country was living under some sort of mandatory lockdown. People were fighting 
for toilet paper and stocking up on bags of rice and making plans for 
aspirational quarantine reading. Millions of us were preparing for Mad Max.
"It now appears that we were thinking of the wrong '80s action flick. Last 
weekend it was reported that a group of more than 100 American mercenaries, 
including two former Green Berets and one ex-agent from the Drug Enforcement 
Administration, had failed in some kind of apparent coup attempt and that some 
of them were being detained by the Maduro government. What was being called 
"Operation Gideon" perhaps unsurprisingly failed to bring about regime change, 
much less result in the apprehension of the country's socialist dictator. 
Reports suggest that 50 of the mercenaries stormed Venezuela by sea, joining up 
with around the same number of fellow soldiers of fortune already waiting 
behind enemy lines. The Venezuelan army (and Maduro's own paramilitary loyalist 
forces) outmatched them by around 350,000. A small ragtag band of American 
warriors attempts to force the commies out of South America against all odds? 
This is basically the plot of Predator if the Predator hadn't shown up.
"Pompeo maintains that the United States government was not involved in this 
offensive. For what it's worth, he is probably telling the truth. Instead it 
appears that the plot was launched long ago by a bunch of former Venezuelan 
military officials who have been training deserters from the Maduro regime in 
secret Colombian camps for a year. One of the principals, a retired general 
named Cliver Alcalá, was arrested in the United States back in March for drug 
smuggling and is imprisoned in New York."   [end of partial quote]

Jim Bell's comment follows:
I consider the headline of this article foolish.  It suggests that a single 
attempt to remove Maduro and his corrupt cronies, having failed, somehow means 
that the entire concept of offering a reward for their removal is somehow ill 
advised.  To the contrary, it might have succeeded, at which point the plan 
would have been labelled "brilliant".   The world doesn't get just one chance 
to do so.  

If there was one thing about this idea that was foolish, it was offer to give 
that money only if Maduro et al were "removed", not killed.  It would probably 
be much easier to kill Maduro than to engineer his physical removal from 
Venezuela.
I also wonder if the United States Government set up any sort of system to 
allow people to anonymously collect this $55 million.  So, how do these people 
imagine that they will  be able to successfully get away with this money?  IF 
the US government secretly says to them, "We're only giving you one tenth of 
what you were promised.  Be glad we gave you that much.  If you complain we'll 
broadcast your name, picture, and location to the entire world!"
A large promised reward is only useful if the potential collector is confident 
he will actually receive all of it, and won't be killed by enemies before he is 
good and old.  
            Jim Bell

When we fail to vet those we allow into Australia - hate crimes against White Aussies - [PEACE]

2020-05-09 Thread Zig the N.g
How do we bring peace to our countries and neighbourhoods - it's an ongoing 
question, and one which suggests that on a global level, different people or at 
least those of different religious persuasions, live different ethics, and 
mixing such differing "cultures" often enough results in murder, as we see 
here, with the police calling multiple murders a "home invasion".

   VICTORIA: Violent Home Invasion leaves TWO DEAD
   https://concit.org/victoria-violent-home-invasion-leaves-two-dead/
   http://www.protectvictoria.org/youth-gang-home-invasion-victorian-style/



It may not be too late to protect our "Aussie culture" - those who live here 
and value the Aussie's relaxed, open and larrikin nature, would do well to 
contemplate on ways to protect this and uphold publicly our right to protect 
our culture.

It is not only the "culture of minorities" that needs protecting.