Short statement on the Ovarit situation
This commit is contained in:
parent
2639aba46c
commit
7728287dcd
24 changed files with 529 additions and 69 deletions
33
garden/android_root/hltevzw.gmi
Executable file
33
garden/android_root/hltevzw.gmi
Executable file
|
@ -0,0 +1,33 @@
|
|||
# Rooting the Samsung Galaxy Note 3 (Verizon) and installing LineageOS
|
||||
|
||||
## Stuff you need
|
||||
|
||||
=> https://download.lineageos.org/hltetmo The latest LineageOS recovery file
|
||||
=> https://download.lineageos.org/hltetmo The latest LineageOS ROM file
|
||||
=> https://androidfilehost.com/?fid=4349826312261712202 This very specific version of the Odin image flashing tool
|
||||
=> https://developer.samsung.com/android-usb-driver Samsung Android USB Driver
|
||||
=> https://ipfs.letsdecentralize.org/ipfs/QmNhEPB2oCAmkwM7rD6bN2EhmXxVTRZKxLckRh7DHAZnNf ArabicToolApp.exe (ignore virus warnings. Of course an Android exploit is going to be classified as "malware")
|
||||
=> https://web.archive.org/web/20221010233203/https://forum.xda-developers.com/t/official-note-3-verizon-bootloader-unlock.3359370/ Note 3 Verizon Bootloader Unlock
|
||||
|
||||
### If some of the links are broken, try these mirrors
|
||||
=> ../../dl/hltevzw/Odin_3.13.1.zip Odin image flashing tool
|
||||
=> ipfs://QmaBWnbqJsWMFXS8aDspWsga7s3MtH7Gt3xF5sfKL6qGxr Odin image flashing tool (IPFS)
|
||||
=> ipfs://QmaRn2E65XPT1YHFXL5qkMeWdgd7MwnNCtWzmQQtgWguNR Note 3 Verizon Bootloader Unlock script (IPFS)
|
||||
=> ipfs://QmNhEPB2oCAmkwM7rD6bN2EhmXxVTRZKxLckRh7DHAZnNf ArabicToolApp.exe (IPFS)
|
||||
|
||||
### Also:
|
||||
|
||||
* a machine running Windows 10 (a VM will likely not work)
|
||||
* the Note 3 has to be running build version "OB6" (not "SEPL")
|
||||
* a blank microSD card (the bootloader unlock script will say how big it has to be)
|
||||
|
||||
## Instructions
|
||||
|
||||
1. Wipe the phone
|
||||
2. Downgrade the software to OB6 using Odin (you don't need to do anything fancy to downgrade; just flash the image)
|
||||
3. Enable ADB in developer settings
|
||||
4. Get root using ArabicToolApp.exe
|
||||
5. Follow the instructions on the bootloader unlock page to push the "unlock_n3" binary to the device and run it
|
||||
6. Follow these instructions (it says "hltetmo", but it counts for "hltevzw" too):
|
||||
|
||||
=> https://wiki.lineageos.org/devices/hltetmo/install Install LineageOS on hltetmo
|
69
garden/android_root/nook1.gmi
Executable file
69
garden/android_root/nook1.gmi
Executable file
|
@ -0,0 +1,69 @@
|
|||
# Rooting the Barnes & Noble Nook 1st Generation
|
||||
|
||||
## Stuff you need
|
||||
|
||||
=> ../../dl/nook/ Individual files
|
||||
=> https://upload.letsdecentralize.org/misc/nook.7z All the files in one .7z pack
|
||||
=> ipfs://QmPV9YTCNV3StpfbbXGpcJQWDbxstrato1keqprvBG7Gw9 All the files in one .7z pack (IPFS)
|
||||
|
||||
## Instructions
|
||||
|
||||
1. Get a server running on port 80 on a machine on the same Wi-Fi network as the Nook.
|
||||
|
||||
All the server needs to host is "exploit.html" from the pack linked above. For best results, rename the HTML file to "index.html".
|
||||
|
||||
2. Crash your Nook's browser to enable ADB.
|
||||
|
||||
Using the Nook's browser, navigate to the web server via its local IPv4 address. The browser should refresh a few times and then crash to the home menu.
|
||||
|
||||
3. Connect to the Nook over ADB.
|
||||
|
||||
```
|
||||
adb connect YOUR_NOOKS_LOCAL_IP_HERE
|
||||
```
|
||||
|
||||
If ADB refuses to connect, run step 2 repeatedly until ADB manages to connect. It could take between one and one hundred tries.
|
||||
|
||||
4. Get and edit "/init.rc".
|
||||
|
||||
```
|
||||
adb pull /init.rc
|
||||
```
|
||||
|
||||
Open "init.rc" in your favorite text editor on your local machine. Find the line that says:
|
||||
|
||||
```
|
||||
service adbd /sbin/adbd
|
||||
```
|
||||
|
||||
Below that should say "disabled". Change that to "enabled".
|
||||
|
||||
5. Get root access.
|
||||
|
||||
While still connected to the Nook over ADB, run:
|
||||
|
||||
```
|
||||
adb push ratc.bin /sqlite_stmt_journals
|
||||
adb shell
|
||||
cd /sqlite_stmt_journals
|
||||
/system/bin/chmod 777 ./ratc.bin
|
||||
./ratc.bin
|
||||
```
|
||||
|
||||
Several lines of output will appear. Do not press anything. A few seconds later, adb will disconnect you.
|
||||
|
||||
```
|
||||
adb kill-server
|
||||
```
|
||||
|
||||
6. Push the patched "init.rc" to the Nook.
|
||||
|
||||
Repeat step 3 to reconnect to the Nook over ADB. Then run:
|
||||
|
||||
```
|
||||
adb push init.rc /
|
||||
```
|
||||
|
||||
After a reboot, your Nook should now be rooted.
|
||||
|
||||
The default launcher will not show third-party apps. "ru.mynook.launcher.apk" included in the pack is an alternative launcher that will show all apps installed, including third-party ones.
|
73
garden/darknet/tor.gmi
Executable file
73
garden/darknet/tor.gmi
Executable file
|
@ -0,0 +1,73 @@
|
|||
# Creating a Tor hidden service using Caddy and Debian 11
|
||||
|
||||
1. Install Tor.
|
||||
|
||||
```
|
||||
sudo apt install tor
|
||||
```
|
||||
|
||||
2. Install the Caddy web server.
|
||||
|
||||
```
|
||||
echo "deb [trusted=yes] https://apt.fury.io/caddy/ /" | sudo tee -a /etc/apt/sources.list.d/caddy-fury.list
|
||||
sudo apt update; sudo apt install caddy -y
|
||||
```
|
||||
|
||||
3. Edit "/etc/tor/torrc" to create the hidden service.
|
||||
|
||||
Open "/etc/tor/torrc" in your favorite text editor. (Please note that this usually requires root privileges.)
|
||||
|
||||
Go to the lines that say:
|
||||
|
||||
```
|
||||
#HiddenServiceDir /var/lib/tor/hidden_service/
|
||||
#HiddenServicePort 80 127.0.0.1:80
|
||||
```
|
||||
|
||||
Uncomment them by deleting the # mark in front of each line.
|
||||
|
||||
If you want, you can change the HiddenServiceDir directory, but you will need to remember it for later. For security purposes, keep the new directory inside of "/var/lib/tor/".
|
||||
|
||||
4. Restart the Tor daemon.
|
||||
|
||||
```
|
||||
sudo systemctl restart tor@default
|
||||
```
|
||||
|
||||
5. As root, go to the hidden service directory and get the new hidden service's domain.
|
||||
|
||||
```
|
||||
sudo -i
|
||||
cd /var/lib/tor/directory/
|
||||
```
|
||||
|
||||
Replace "directory" with the actual directory you chose in step 3.
|
||||
|
||||
```
|
||||
cat hostname
|
||||
```
|
||||
|
||||
If all is well, you should now see a long string of letters and numbers that ends in ".onion". Copy this somewhere safe. You'll need it next step.
|
||||
|
||||
6. Configure Caddy to serve the hidden service.
|
||||
|
||||
Open "/etc/caddy/Caddyfile" with your favorite text editor. You should already be root, but if you did "exit" after getting the Tor hostname, just "sudo -i" again.
|
||||
|
||||
Type the following in:
|
||||
|
||||
```
|
||||
http://YourTorHostnameHere.onion {
|
||||
root * /your/website/file/path/here
|
||||
file_server
|
||||
encode gzip
|
||||
bind 127.0.0.1
|
||||
}
|
||||
```
|
||||
|
||||
The "http://" in front of the address is important as that tells Caddy to not try to enable HTTPS on that domain. HTTPS is unnecessary for Tor hidden services as all traffic to and from the server is already encrypted in transit. And since Tor hidden services aren't accessible on the normal clearnet, the request for Let's Encrypt to give Caddy a certificate would fail as they wouldn't be able to access the domain.
|
||||
|
||||
7. Restart Caddy to apply your changes.
|
||||
|
||||
```
|
||||
sudo systemctl restart caddy
|
||||
```
|
81
garden/darknet/yggdrasil.gmi
Executable file
81
garden/darknet/yggdrasil.gmi
Executable file
|
@ -0,0 +1,81 @@
|
|||
# Creating a Yggdrasil website using Caddy and Debian 11
|
||||
|
||||
1. Install Yggdrasil.
|
||||
|
||||
```
|
||||
sudo apt install dirmngr
|
||||
gpg --fetch-keys https://neilalexander.s3.dualstack.eu-west-2.amazonaws.com/deb/key.txt
|
||||
gpg --export 569130E8CA20FBC4CB3FDE555898470A764B32C9 | sudo apt-key add -
|
||||
echo 'deb http://neilalexander.s3.dualstack.eu-west-2.amazonaws.com/deb/ debian yggdrasil' | sudo tee /etc/apt/sources.list.d/yggdrasil.list
|
||||
sudo apt update; sudo apt install yggdrasil
|
||||
```
|
||||
|
||||
2. Install Caddy.
|
||||
|
||||
```
|
||||
echo "deb [trusted=yes] https://apt.fury.io/caddy/ /" | sudo tee -a /etc/apt/sources.list.d/caddy-fury.list
|
||||
sudo apt update; sudo apt install caddy -y
|
||||
```
|
||||
|
||||
3. Get the IP Yggdrasil generates for you.
|
||||
|
||||
```
|
||||
sudo systemctl start yggdrasil; sudo systemctl enable yggdrasil
|
||||
sudo journalctl -xfe -u yggdrasil
|
||||
```
|
||||
|
||||
There will be a line that says "Your IPv6 address is". Copy the rest of that line somewhere safe.
|
||||
|
||||
Press the Control and C buttons on your keyboard at the same time to exit "journalctl".
|
||||
|
||||
4. Configure Caddy to serve the hidden service.
|
||||
|
||||
Open "/etc/caddy/Caddyfile" as root with your favorite text editor.
|
||||
|
||||
Type the following in:
|
||||
|
||||
```
|
||||
http://[YGGDRASIL_IP_ADDRESS_HERE] {
|
||||
root * /your/website/file/path/here
|
||||
file_server
|
||||
encode gzip
|
||||
}
|
||||
```
|
||||
|
||||
The "http://" in front of the address is important as that tells Caddy to not try to enable HTTPS for that website. HTTPS is unnecessary for Yggdrasil hidden services as all traffic to and from the server is already encrypted in transit. Besides, Let's Encrypt wouldn't be able to issue a certificate for an IP address anyway.
|
||||
|
||||
5. Restart Caddy to apply your changes.
|
||||
|
||||
```
|
||||
sudo systemctl restart caddy
|
||||
```
|
||||
|
||||
6. Get some peers for Yggdrasil.
|
||||
|
||||
=> https://github.com/yggdrasil-network/public-peers Copy some peers from this page. Try to select ones closest to your geographical location.
|
||||
|
||||
On your server, open "/etc/yggdrasil.conf" as root with your favorite text editor. At the top of the configuration file will be a section that looks like this:
|
||||
|
||||
```
|
||||
Peers: []
|
||||
```
|
||||
|
||||
Pick some peers from the list and add them to that section of the file (one per line) so it now looks something like this:
|
||||
|
||||
```
|
||||
Peers:
|
||||
[
|
||||
tls://01.scv.usa.ygg.yt:443
|
||||
tls://lax.yuetau.net:6643
|
||||
tls://tasty.chowder.land:9001
|
||||
tls://supergay.network:9001
|
||||
tls://lancis.iscute.moe:49274
|
||||
tls://mayvaneday.org:1414
|
||||
]
|
||||
```
|
||||
|
||||
Save the file and close it, then run:
|
||||
|
||||
```
|
||||
sudo systemctl restart yggdrasil
|
||||
```
|
38
garden/gpg.gmi
Executable file
38
garden/gpg.gmi
Executable file
|
@ -0,0 +1,38 @@
|
|||
# Quick guide to GPG
|
||||
|
||||
## Generate a key
|
||||
|
||||
```
|
||||
gpg --generate-key
|
||||
```
|
||||
|
||||
## Import an existing key
|
||||
|
||||
```
|
||||
gpg --import key.txt
|
||||
```
|
||||
|
||||
## Export a key
|
||||
|
||||
```
|
||||
gpg --export -a person@domain.tld public.gpg
|
||||
gpg --export-secret-keys -a person@domain.tld
|
||||
```
|
||||
|
||||
## Encrypt a file using a specific key
|
||||
|
||||
```
|
||||
gpg --encrypt -a -r person@domain.tld file.ext
|
||||
```
|
||||
|
||||
## Sign a file using a specific key
|
||||
|
||||
```
|
||||
gpg --clear-sign -a file.ext
|
||||
```
|
||||
|
||||
## List all keys in the keyring
|
||||
|
||||
```
|
||||
gpg --list-keys
|
||||
```
|
19
garden/index.gmi
Executable file
19
garden/index.gmi
Executable file
|
@ -0,0 +1,19 @@
|
|||
# MayVaneDay Wiki
|
||||
|
||||
=> ./vlc.gmi VLC has an ncurses frontend that also supports equalizers
|
||||
=> ./gpg.gmi Quick guide to GPG
|
||||
=> ./list.gmi List of miscellaneous useful things
|
||||
|
||||
## Android rooting
|
||||
|
||||
=> ./android_root/hltevzw.gmi Samsung Galaxy Note 3 (Verizon)
|
||||
=> ./android_root/nook1.gmi Barnes & Noble Nook 1st Generation
|
||||
|
||||
## Darknet setup
|
||||
|
||||
=> ./darknet/tor.gmi Tor
|
||||
=> ./darknet/yggdrasil.gmi Yggdrasil
|
||||
|
||||
## Making operating systems usable
|
||||
|
||||
=> ./os/openbsd.gmi (Abandoned) notes for OpenBSD
|
38
garden/list.gmi
Executable file
38
garden/list.gmi
Executable file
|
@ -0,0 +1,38 @@
|
|||
# A big list of useful links
|
||||
|
||||
## Alternate search engines
|
||||
|
||||
=> https://wiby.me Wiby
|
||||
=> https://millionshort.com Million Short
|
||||
=> https://search.marginalia.nu Marginalia
|
||||
=> https://www.seekport.com Seekport
|
||||
=> https://teclis.com Teclis
|
||||
|
||||
## Obscure site discovery
|
||||
|
||||
=> https://theforest.link The Forest
|
||||
|
||||
## AI image generation
|
||||
|
||||
=> https://huggingface.co/spaces/stabilityai/stable-diffusion Stable Diffusion Demo
|
||||
=> https://stabilityai.us.auth0.com/u/login?state=hKFo2SBqWXBRQ25mblJrSGFuZzNIM1l2VGJxNk1SeERKUEdMWqFur3VuaXZlcnNhbC1sb2dpbqN0aWTZIHJvN2huZFA1QWJDOUhfMmNaTHJoQmtNT2xvWUw1bVlyo2NpZNkgS3ZZWkpLU2htVW9PalhwY2xRbEtZVXh1Y0FWZXNsSE4 StabilityAI
|
||||
=> https://www.drawanything.app Draw Anything
|
||||
=> https://huggingface.co/spaces/hakurei/waifu-diffusion-demo Waifu Diffusion
|
||||
=> https://neuralblender.com Neuralblender
|
||||
=> https://www.wombo.art/create Dream by WOMBO
|
||||
|
||||
## IP anon check
|
||||
|
||||
=> https://www.whatismyip.com What Is My IP?
|
||||
=> https://myip.wtf WTF is my IP?!?!?!??
|
||||
=> https://check.torproject.org Am I using Tor?
|
||||
|
||||
## Piracy
|
||||
|
||||
=> https://fitgirl-repacks.site FitGirl Repacks
|
||||
=> https://piratebayproxy.info List of Pirate Bay proxies
|
||||
=> https://gog-games.com GOG Games
|
||||
=> https://hshop.erista.me hShop for 3DS
|
||||
=> https://archive.org/details/psxgames Console Living Room: Playstation
|
||||
=> https://nxbrew.com NXBrew
|
||||
=> https://nsw2u.in nsw2u
|
30
garden/os/openbsd.md
Executable file
30
garden/os/openbsd.md
Executable file
|
@ -0,0 +1,30 @@
|
|||
## installation
|
||||
|
||||
https://www.openbsd.org/faq/faq14.html#softraid
|
||||
|
||||
remember to run `ifconfig re0 up` before starting any shell operations
|
||||
|
||||
## package manager
|
||||
|
||||
https://www.openbsd.org/faq/faq15.html#Intro
|
||||
|
||||
apt search | pkg_info -Q
|
||||
apt install | pkg_add
|
||||
apt remove | pkg_delete
|
||||
|
||||
## wifi
|
||||
|
||||
run `ifconfig` and get name of wifi interface (for example, mine is `urtwn0`)
|
||||
|
||||
make a text file (as root) at `/etc/hostname.InterfaceName` (for example, `/etc/hostname.urtwn0`) with the following contents:
|
||||
|
||||
```
|
||||
join SSID wpakey WIFIPASSWORD
|
||||
inet autoconf
|
||||
```
|
||||
|
||||
then run `doas sh /etc/netstart`
|
||||
|
||||
## misc
|
||||
|
||||
there is no `lsblk`. to get a list of all disks connected, run `sysctl hw.disknames`
|
37
garden/vlc.gmi
Executable file
37
garden/vlc.gmi
Executable file
|
@ -0,0 +1,37 @@
|
|||
# Using VLC via its ncurses frontend with equalizers
|
||||
|
||||
1. Install VLC.
|
||||
2. Open VLC and drag some music in.
|
||||
3. While playing some music, open the Tools > Effects and Filters menu. Play around with the presets until you find one that sounds good.
|
||||
4. Write down the name of the preset you used and then close VLC.
|
||||
5. In a terminal, "cd" to where the music you want to play is.
|
||||
6. In that terminal, execute this command:
|
||||
|
||||
```
|
||||
cvlc --equalizer-preset=INSERT_PRESET_NAME_HERE -I ncurses *.ext
|
||||
```
|
||||
|
||||
".ext" is the file extension of your music files, like ".mp3" or ".flac".
|
||||
|
||||
Here is a list of possible presets as of 2020:
|
||||
|
||||
* flat
|
||||
* classical
|
||||
* club
|
||||
* dance
|
||||
* fullbass
|
||||
* fulltreble
|
||||
* fullbasstreble
|
||||
* headphones
|
||||
* largehall
|
||||
* live
|
||||
* party
|
||||
* pop
|
||||
* reggae
|
||||
* rock
|
||||
* ska
|
||||
* soft
|
||||
* softrock
|
||||
* techno
|
||||
|
||||
Pressing the "h" key will open the help menu, which will show you the plyer controls.
|
Loading…
Add table
Add a link
Reference in a new issue