Can run for years, but keeping things kind of up-to-date can become a challenge. php7.4 is running as well as new apache.
Next move will be MariaDB10 and hopefully php8.2 will work. 8.3 has issues with file_exists, fopen, thus WordPress won’t run. Then Muryokoin will go SQL and 4D bye bye đ
A Journey
A year ago, I was in pain, depressed, no income, sitting in an apartment way to big and expensive. Something had to happen. I started selling things, books, tools, records, cds, what ever was sell-able and then I packed my stuff. Still some things sit in Germany, like my basses. One I took with me.
On the net I found a place, saying a place of light, a community working together. I applied, was accepted and then I went there with a big suitcase and a bass case. I worked there for the Tech-Department for around 7 month as a volunteer. This was an outstanding time, I met new friends and especially they allowed me to make some of the most precious experiences there, solidarity, when my contract was not prolonged.
After that I spent a short time on a dead ends place, run by a man without vision or plan. Sad, I left. After some time in guesthouses, I received a call, if I would like to build a community together. I was delighted, but when I arrived, things already have changed into a kind of work-away place. Then, all the sudden, the atmosphere turned over night, new rules were introduced, like cleaning the toilet every 2 days or not closing the toilet lid. Also bringing stuff and not getting payed for it. After 2 days I literally ran off, went to another island and just discovered a wonderful place. It’s an art installation with a beautiful view and I sleep in a Jurt, which is a drafty as the Kamaboku House in Koyasan đ
The journey will go on…
About Wladimir Putin
This person seams to make Europeans a lot of trouble. The “usual” information about him can be found here. I want to look onto him from his body structure. We know he holds the degree of Hanshin, 8th Dan in Judo, which he has been training since he was 11 years old. We also know that he has been an KGB office before as well.
His Body structure could be said to be athletic on the first view. Strong legs, small butt, sexy heep, strong chest and wide shoulders. The head, a little bit too small for this massive body.
The first thing I observed are his wide shoulders, like all the energy got caught up in the shoulders. Looking a bit more close, the chest is like a barrel, like a ton, guarding the heart. Thus we can say the heart chakra is heavily guarded and a shoulder-shield is protecting it from the top.
His hip is sexy, but looks like a cut between lower body and upper body, like being disconnected. The belly is strong, well trained and governed by the fire chakra above. No space for emotions and the armoured heart doesn’t leave space to connect and thus for empathy. The small sexy butt indicates overregulation. Keep the ass together, just stand it.
Lowen would call this body type psychopath. It shows the treason the person experienced as a child and wants that never to happen again. This is one side, another side is a small little self inside, which needs protection through greatness, protection from humilation.
What I’m afraid of is, that every step back in Ukraine, Putin will see as humilation and act accordingly. The guy is dangerous, very dangerous.
Ukraine
Seitdem Korona zur NormalitÀt geworden, die Bundestagswahl vorbei ist, drÀngt sich das Thema Ukraine immer weiter in den Vordergrund. Jetzt hat die CIA verlauten lassen, Russland oder Putin könnte nÀchsten Mittwoch angreifen.
Ob die Astrologie das hergibt kann ich nicht wirklich beurteilen, bestenfalls raten. Nummerologie ist einfacher, da wĂ€r der 23. Februar interessanter. Quersummer 13 = 4 und 4 heisst auf Japanisch “shi” der Tod. Bringt in etwa soviel GlĂŒck wie Freitag der der 13te.
Es könnt aber auch noch ganz anders kommen, weil es kommt ja immer anders als usw …..
Analysen, Blickwinkel, Gedankenspiele.
Der Joe Biden, der Onkel-President aus Amerika brĂ€uchte dringend ein Instrument um die gesellschaftliche Spaltung zwischen {Republikanern, Trumpisten, Querdenkern …}, also faktisch zwischen der Land- und der linksliberale/n/leren Bevölkerung Nord-Amerikas zu ĂŒberwinden. Der DĂ€mon Trump spaltet weiter. Der grosse umweltpolitische Wurf droht im Senat zu scheitern. Möglicherweise könnte ein aussenpolitisches Drama, an dem die Anderen Schuld sind, zumindest den Fokus verlagern.
England wiederum scheint gern zu wollen, also dem Herrn Putin eine Abreibung verpassen zu wollen. Johnson ist wohl nicht nur auf Grund von Partygate auf Stress gebĂŒrstet.
Wie Russland die NATO vorgefĂŒhrt hat wurde nicht vergessen.
In Frankreich wird im April gewÀhlt. Macron will wiedergewÀhlt werden. Bestenfalls kann er als der grosse Friedensbringer darstehen, keinesfalls will er als Kriegstreiber gesehen werden.
Deutschland wiederum fĂŒrchtet den Krieg, insbesondere die wirtschaftlichen Folgen, das Problem mit dem Gas aus Russland. Das wĂ€r plötzlich weg.
Polen und die baltischen Staaten fĂŒrchten den russischen BĂ€ren. Ob zu Recht oder nicht wird die Zukunft weisen, es bleibt jedenfalls spannend.
Iâm back
Some things have changed since I wrote here, Iâm back in Germany since quite some time. I made an additional education here to become a Heilpraktiker for Psychotherapy. So now, itâs time to also come back to this blog in these difficult times. How will they be called in 50 years? The Corona-Times? Or will it fade out of the common memory, like the last pandemic in Germany did, back in 1964 – the black pox. Sounds like black death, but well we know today, different bacteria. Interestingly the desease called black death jumped from rodents to humans in China. Bats are also rodents, right? They are under suspicion to be the origin of this Corona virus. Nature is striking back! Does it really? Has nature something like an instinct of selfpreservation? I donât think I can ask like that. Nature, or better to say, what I understand under nature is the system of beings, plants, earth, water and air, which surrounds this planet and makes life possible, thus any life is a member of this system and again a system by itself. Every life form has also that, what we call instinct for selfpreservation, although that might look a bit strange, when the wife eats the man, as the black widow spider does. The corona virus expresses its instinct of selfpreservation through mutations – Omikron is called the last one of concern. Adabtability the expression of natures instinct of selfpreservation even if some things go bye, bye, like dinosaurs. So if we humans are too slow, to stubborn or stupid to adapt, we might share the fate of these dinosaurs.
E-Mail and Privacy
In the old time, before we had computers, internet and cell phones, how did we communicate? We were writing letters for birthdays, Christmas or just to let the other person know, we are still thinking on him. We wrote the letter and sealed it well in an envelope. The letter was dropped in the postbox and transported over several hops to its recipient. This was save in most countries a save way to transmit personal information to someone else. In some countries there have been sitting man in grey coats with sunglasses in the post office, opening the letters over steam and checking out, what people write. In countries based on law and justice an order from of judge was necessary to do so in some other countries this was a standard procedure implemented for persons opposing the local regime. In the so called âfree worldâ this was seen as an intrusion into personal privacy and thus the privacy was protected by law.
For quick communication we have been using a phone, which was attached by a wire to the wall đ The same procedure applies as to letters. Listening to private communication requires a court order. This hasnât changed much, besides, well we use cell phones and at least their location can be tracked down easily today. Additional we use today application to chat quickly and to ensure privacy most chat apps, like Threema, Telegram , Signal or WhatsUp are using end to end encryption. This means the message is put into an envelope on the sender side and only the recipient can open it and read the massage. To intercept such a message, the agent has to install some kind of spy-software on the phone or the computer of the sender or of the receiver. That process is similar to when spies wire tapped the home of a potential target. Although this process was again a standard procedure for enemies of the state in certain countries, it requires a court order in most other countries. The process to do so is work intensive and was done only in connection with severe crimes. Although installing spy-software can be done from remote today, itâs still not a simple process and usually requires the âcooperationâ of the target. After security authorities found a way to intercept Telegram chats it can be assumed that this security hole will be fixed in the near future. Usually we can assume that our private conversation through a chat application using end to end encryption is quite save as long as the information thief doesnât get hold of the hardware used. Mass surveillance is not possible as long as we use end-to-end encryption for our communication.
But whatâs about our e-mail?
Most mail-servers are using encryption we might assert, so it should be save, right?
Letâs have a look onto the transport way of an e-mail. We write it and send it to our mail-server. This connection is usual encrypted. But now the mail-server decrypts the e-mail and stores it in a readable format, before it encrypts the e-mail again to send it to the mail-sever of the recipient, this server again will decrypt the mail, store it in the inbox of the recipient until he fetches the e-mail. If we compare it with the old fashioned way of sending letters, itâs like the letter gets opened and closed again on every post office on the way to the recipient. Huh? Yes, everyone with access to the post office or the mail server can read the mail! This is the way how free-mail services, like gmail are working. They use scan the e-mails stored on their servers in order to present the sender and recipient personalized advertising. What else they are going to do with the information obtained this way, we donât know. We also donât know, who else is able to get access to our personal messages stored on the mail server. This opens the door to mass surveillance. Well, of course, we already share a lot of personal information today on social media, like Facebook. Therefore anything, we donât want to see being published about us in a newspaper, we shouldât share on these social media. This information is public, accessible at least for any security agency. Sacrificing our privacy might therefore also sacrifice under certain circumstances our personal security, like many examples about bloggers or posters on Twitter or Facebook have shown in the past. Some countries still donât appreciate free speech, they are afraid of it and jail people instead. The sentence, âI donât have anything to hideâ can be considered just plain ignorant, everyone has his private secrets, everyone has his privacy and itâs worth to be protected. So, whatâs the best way to do so with e-mails?
So what we can do to reclaim privacy in our e-mails?
Sure, we can run our own mail-server and make sure the potential recipients have mail accounts on our mail server. But this requires not only to run a computer 7/24, but also a reachable address, like a fixed IP-address or the use of a service, like DynIP. As mail-servers are popular targets for hackers, we need to harden the server against attacks. This requires at least some advanced technical knowledge, most people donât have. In some cases, like for companies, this might be the solution of choice, itâs not a choice for everyone.
The answer would be, we use end-to-end encryption, like with our chat-apps.
How does end-to-end encryption work?
It basically works with a key-pair: a public-key and a private-key. As the names already indicate the public-key is public and thus accessible to everybody. The public-key is usually also used to sign an e-mail and it is sent as an attachment. The e-mail is encrypted with the private-key of the sender and the public-key of the receiver, who then is able the decrypt the e-mail and read it.
Today there are two methods around for signing and encrypting emails and they are not compatible.
S/MIME works with certificates, like SSL encryption used to secure traffic between a computer and an internet-server. The certificate can be bought from a certification authority, which guarantees the identity of the owner of the certificate. Some certification authorities issue free certificates, alternatively one can also create so called self-signed certificates. Most operating systems will only trust certificates for which you have to pay money. Thus S/MIME is often used by companies, as they can also distribute the public part of the certificates through an Active Directory Service. So if you ever receive an e-mail with an “smime.p7sâ signature, then the sender is using S/MIME.
OpenPGP or PGP is the other method used for signing and encryption. This is the most common method as it does not require any authority. The public keys are stored together with the e-mail address on key-servers. PGP is a commercial product-line offered by Symantec, OpenPGP is, as the name already implies a free and open source solution for signing and encrypting e-mails and is the preferred solution to sign and encrypt mails. Mails with an attachment, like âsignature.ascâ are signed with OpenPGP, the signature is also the public key of the sender, but you should verify it through a key server. Both solutions, the commercial one from Symantec and the OpenSource one are compatible.
In the next post, I will explain, how to really encrypt and decrypt e-mails as comfortable as possible.
Chrome phones home
Once Google Chrome has been installed on your Mac, it phones home every couple of minutes.
Google Chrome has some nice features, especially the debugger comes in very hand when doing java script development together with the Angular framwork. It allows to directly debug the TypeScript code used with Angular and the debugger jumps also in, when the Firefox or Safari debugger fails.
So far so good, but ultimatly, I don’t like to have a software on my box, which phones home every couple of minutes.
To get rid of the updater in MacOS 10.11 one can call the updater like this in the terminal:
~/Library/Google/GoogleSoftwareUpdate/GoogleSoftwareUpdate.bundle/Contents/Resources/ksinstall –nuke
To just disable it, seet the intervall to 0:
~/Library/Google/GoogleSoftwareUpdate/GoogleSoftwareUpdate.bundle/Contents/Resources/ksinstall –interval=0
Responsive
AngularJS looked pretty promising on the first view, but it is complicated to debug and has a steep learning curve. Finally I dropped it for the moment. Then I played around with my own pages and Twitter’s Bottstrap3. Bootstrap is really quite practical and not difficult to understand. I also polished up my knowledge about CSS3, mostly through learning by doing đ
For the redesign of Muryokoin’s website I also added Boilerplate, which is especially helpful to tighten up security of the webserver. It required also some recoding in the database, which on the end is speeding up the loading of some pages.
I’m still not yet satisfied with the theme of WordPress, so I guess I play a bit around with some other themes until I find one, which I like.
At least all pages are now usable on all devices I tested.
The Karma of AngularJS
Recently I discovered AngularJS. Itâs a Java Environment for dynamic webpages and one can do pretty cool stuff with it. Until I was able to do really cool stuff, I needed to remove a couple of obstacles. As easy as it is to debug JavaScript with Safari or Firefox as more tricky it gets with AngularJS code. Thereâs a nice extension, which allows to view AngularJS objects. Itâs called ng-inspector. It installs a little button next to the field for entering urls, but surprise, surprise, one can press it as long as one likes to, nothing happens. After some time DuckDuckGo helped me to figure out that, ng-inspector doesnât like the file protocol and wants the page to be opened from a web server. If you have configured Apache on your local box for testing that will do the trick. Since MacOS10.7 the WebSharing prefPane disappeared for starting apache, but itâs still all there. So you can either use terminal to start and stop Apache via apachctl or you can install a 3rd Party prefPane. A more simple solution is to just start SimpleHTTPServer via terminal: python -m SimpleHTTPServer 3000, thatâs what I did. Actually, if you are not comfortable with using the Terminal, you should stop right else proceed by going to the AngularJS tutorial đ The first real challenge comes with Karma, well not karma in the spiritual sense đ Karma is a test runner for unit testing, AngularJS is using then the Jasmine framework for actual testing. On the Mac the first nodeJS has to be installed, because everything else is based on nodeJS. So having installed nodeJS I ran the command npm install karma –save-dev command from the terminal. This basically installs karma, then one needs also to install Jasmine: npm install karma-jasmine –save-dev, now necessary browser support needs to be installed for Chrome: npm install karma-chrome-launcher âsave-dev, for Safari: npm install karma-safari-launcher –save-dev and for Firefox: npm install karma-firefox-launcher –save-dev. Now I tried to start karma: ./node_modules/karma/bin/karma start and ended up with errors, like missing package.json file. What karma actually needs first is to run: npm init, this will create the necessary files. But weâre not yet done. Additional Angular-Mocks is needed to make karma run, so I ran npm install angular-mocks, it didnât do the trick, I expected, So I downloaded the file again from here and saved in a subdirectory called node-modules. Finally the karma.conf.js file needs to be set up and it should look something like this:
module.exports = function (config) { config.set({         // path to the root of the test site, in this case the root is one level up basePath: '../', //AngularJS is using the jasmine framework for unit-testing frameworks: ['jasmine'], files: [  //karma loads the files in alphabetical order, so to makle sure angular is loaded first 'angular.js',  //make sure the angular-mocks file is loaded next before anything else is loaded 'node_modules/*.js',  //all the java files, in our case we would need to load only the file containing our controller '*.js',  //load our unit test file and run it 'test/unit/*.js',  // take a look on our html file, in case we change it   '*.html' ], exclude: [], reporters: ['progress'], port: 9876, colors: true, logLevel: config.LOG_INFO, // this runs the test again, if any of the above files are changed autoWatch: true, //I like the Safari debugger, so here we go browsers: ['Safari'], singleRun: false, plugins: [ '~/node_modules/karma-safari-launcher', '~/node_modules/karma-jasmine', ] }) }
On the end I installed for convenience also the command line interface for karma: npm install -g karma-cli Now finally I could start running: karma start /[Path/to/folder]/test/karma.conf.js and voila, karma runs the test. Yes đ
My data and PRISM
Everyday we can read about Prism in the big media. Prism is a data-mining software used by the NSA, the national secret service of the USA.
That something like this will happen in the future could have been expected. Until now weâve seen technology like that only in SiFi kind of action movies, like 24hours for example.
Many of us thought to be save, our privacy is thought to be a far more higher good than the information interests of security agencies. Everyone who said, hey guys, youâre wrong, was stamped to be neurotic, anxious, way to fearful of big brother government. Now after parts of the truth surfaced, people are upset.
The German government wants the US government to immediately release all informations concerning data-mining of German citizens. Who do they believe they are? Are they serious, that the NSA will give them any more information, then the one could be found in the media? If they really believe that, they are simply naive. Besides that, the German government just passed a law, called âGesetz zur Neuregelung der Bestandsdatenauskunftâ, in English something like âact revising the inventory data informationâ. This law allows security agencies to break into any data-privacy of a person, even if the person just got a parking ticket. It gives the authorities access to passwords, email accounts, chat protocols.
Everything what is considered in non digital live as private and is protected by special laws.
To listen to your phone conversation or to search your home, authorities need a warrant signed by a judge. In digital live, no warrant is needed, they just get the access. And the funny thing in Germany is, neither Social Democrats nor the Greens opposed this law.
The EC also makes pressure that a law about the retention of telecommunication data is passed in every member state.
So why they are all now that upset about what the NSA is doing? Because the NSA is not storing the data by itself, instead they use Apple, Google, Facebook etc. as free mass-storage places of peopleâs personal data? Or what?
We all should now by now, that modern governments have no interest in protecting civil rights, their interest is to protect their own power and influence.
Just recently two young German students got denied entrance to the US, because the border authorities accused them of planning illegal actions in the US, as proof the authorities showed the students private chats from Facebook.
Benjamin Franklin once wrote: âThey who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety.â He also said: âFreedom of speech is a principal pillar of a free government; when this support is taken away, the constitution of a free society is dissolved, and tyranny is erected on its ruins.â This is the development we are seeing right now.
In Turkey the media didnât reported in the beginning about the protests on Taksim Square, later lawyers were arrested and Erdogan, the PM of Turkey declared the protestors to be vandalists etc. In Germany a demonstration against the power of banks was beaten down by police and in the US the police was doing nearly the same before in New York with the occupy movement, which was internally marked as being terrorists by the FBI.
Our societies are loosing their liberty, their freedom for which so many people have fought and died in the past.
The sad thing is, most of the people are not interested. Panem et circensem, bread and games, worked already well at the time of the Roman Empire and itâs still functioning.
If you as reader are interested to protect your privacy at least a little bit, here are some tips:
First some big NOs, donât do this, donâtâŠ
- publish anything on social media, like Facebook or Twitter, you donât want to read in the newspaper
- chat about personal things with people using Facebook Chat, AIM, Yahoo Chat, Skype or simular
- pass on personal information through email without encrypting it
- save or backup personal data on any cloud service, if a software doesnât give you a choice like Things, drop it
- use encryption in e-mail, like PGP, GnuPGP or OpenPG
- use your personal hardware for backup or
- use point to point encryption on rented server space
- avoid or minimize the use of personal data
- treat unencrypted email, like sending a postcard
- use Jabber also called XMPP for chatting with a server you can trust via SSL/TLS additional an end-to-end encryption can be used with OpenPGP. The encryption is integrated with some clients like Adium for Mac
- use TOR for brownsing, if you want to sat annonym
- use https whenever possible
Here are some links:
MacOS (for AppleMail): GnuPG
iOS (iPhone, IPad): oPenGP (not free)
Android: The Guardian Project
For Thunderbird: Enigmail
Windows: GPG4Win
Payed solution from Symantec for example
Point to Point encryption:
Most OSes have that capability built in for the local hard drive, called full disk encryption. Check Point offers a more professional solution for the Mac. There are many solutions on the market, free open source solutions and payed services. The important point is that only you have the key and the control over the key and not the hosting company.