<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://baszerr.eu/lib/exe/css.php?s=feed" type="text/css"?>
<rss version="2.0">
    <channel xmlns:g="http://base.google.com/ns/1.0">
        <title>BaSzErr - blog:2016:02:29</title>
        <description></description>
        <link>https://baszerr.eu/</link>
        <lastBuildDate>Sun, 26 Apr 2026 13:31:37 +0000</lastBuildDate>
        <generator>FeedCreator 1.8</generator>
        <image>
            <url>https://baszerr.eu/lib/exe/fetch.php?media=wiki:dokuwiki.svg</url>
            <title>BaSzErr</title>
            <link>https://baszerr.eu/</link>
        </image>
        <item>
            <title>auto-generating_revision_and_tags</title>
            <link>https://baszerr.eu/doku.php?id=blog:2016:02:29:auto-generating_revision_and_tags</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;auto-generating_revision_and_tags&quot;&gt;2016-02-29 - auto-generating revision and tags&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
most project deal with providing build-reversion and tags to build manually. there is however an interesting trick to &lt;a href=&quot;http://stackoverflow.com/questions/3780667/use-cmake-to-get-build-time-svn-revision&quot; class=&quot;urlextern&quot; title=&quot;http://stackoverflow.com/questions/3780667/use-cmake-to-get-build-time-svn-revision&quot; rel=&quot;ugc nofollow&quot;&gt;automate getting revision number in cmake&lt;/a&gt;. while not perfect (one must rebuild twice when &lt;a href=&quot;https://en.wikipedia.org/wiki/ninja (build)&quot; class=&quot;interwiki iw_wp&quot; title=&quot;https://en.wikipedia.org/wiki/ninja (build)&quot;&gt;ninja&lt;/a&gt; is used)), it is reasonably useful to put into a real project.
&lt;/p&gt;

&lt;p&gt;
i&amp;#039;ve introduced the concept for getting revision ID (git&amp;#039;s commit hash) and list (!!) of tags in production system, we&amp;#039;re currently working on. it works like a charm. from now on, whenever we get logs from testers, we can clearly see which version of our software was used, even if there are human-errors in description fields. it turned out to be quite a time savior, in some cases.
&lt;/p&gt;

&lt;/div&gt;
</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 15 Jun 2021 20:09:24 +0000</pubDate>
        </item>
        <item>
            <title>bugtracking_at_scale</title>
            <link>https://baszerr.eu/doku.php?id=blog:2016:02:29:bugtracking_at_scale</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;bugtracking_at_scale&quot;&gt;2016-02-29 - bugtracking at scale&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
since some time i work in a project that is part of a much larger system. in reality it means it is not uncommon to have a problem report from testers, that takes days-to-weeks to fix, and spans multiple system components, and different locations. often it means you&amp;#039;re added into a middle of some ongoing discussion, that goes on and for 10s of pages. it&amp;#039;s hard to get up to speed quickly here, and filter “findings” that turned out to be inaccurate from the ones that are currently main subjects.
&lt;/p&gt;

&lt;p&gt;
i recently came to a conclusion bugtracker could be amended to support two tabs: discussion (forum-like) and facts (wiki). on forum ppl cloud just put in what they think, ask questions, loop other is, etc… business as usual. whenever something relevant has been found – like an important part of log, or interesting fact about particular test setup – it would be then put on “facts” tab, so that when a new person is added to a discussion, she can skip all the discussion and just go through “facts” to see what&amp;#039;s up and what to do next.
&lt;/p&gt;

&lt;p&gt;
an interesting side effect would be a nice option for analyzing historical bugs. if you need to know what was the bug&amp;#039;s reason, how it was located and what caused it, you just open one, short page with all the important pieces of information and you&amp;#039;re good. no need to look for old @s (which you may not have even participated in, in a first place!) and reading through 30 pages of free-form text, to find 3 relevant sentences.
&lt;/p&gt;

&lt;p&gt;
now having such a “facts” page organized in a computer-readable fashion would help to do data mining. this way system could, in theory, try to correlate typical scenarios with historical issues. for instance having similar parts of logs marked as relevant in two problem reports, could directly point out similar issue and direct ppl towards a solution (if the problem is known) or right subsystem (if the problem is new, but similar to the one already processed). it would probably do a good job at detecting duplicates as well.
&lt;/p&gt;

&lt;/div&gt;
</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 15 Jun 2021 20:09:24 +0000</pubDate>
        </item>
        <item>
            <title>c_interactive_console</title>
            <link>https://baszerr.eu/doku.php?id=blog:2016:02:29:c_interactive_console</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;c_interactive_console&quot;&gt;2016-02-29 - C++ interactive console&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
ppl often complain about lack of &lt;a href=&quot;https://en.wikipedia.org/wiki/C++&quot; class=&quot;interwiki iw_wp&quot; title=&quot;https://en.wikipedia.org/wiki/C++&quot;&gt;C++&lt;/a&gt; interactive console to try things out fast, like in say &lt;a href=&quot;https://en.wikipedia.org/wiki/Python (programming language)&quot; class=&quot;interwiki iw_wp&quot; title=&quot;https://en.wikipedia.org/wiki/Python (programming language)&quot;&gt;python&lt;/a&gt;. actually there is at least one project that does that – &lt;a href=&quot;http://root.cern.ch/drupal/content/cling&quot; class=&quot;urlextern&quot; title=&quot;http://root.cern.ch/drupal/content/cling&quot; rel=&quot;ugc nofollow&quot;&gt;cling&lt;/a&gt;. it is not perfect, but it is already usable at this stage.
&lt;/p&gt;

&lt;/div&gt;
</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 15 Jun 2021 20:09:24 +0000</pubDate>
        </item>
        <item>
            <title>green_light_for_mass-invigilation_in_poland</title>
            <link>https://baszerr.eu/doku.php?id=blog:2016:02:29:green_light_for_mass-invigilation_in_poland</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;green_light_for_mass-invigilation_in_poland_and_how_to_deal_with_it&quot;&gt;2016-02-29 - green light for mass-invigilation in poland (and how to deal with it)&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
around the christmas/new year&amp;#039;s eve time 2015 was an interesting time for PL citizens. new regulations, that &lt;a href=&quot;https://niebezpiecznik.pl/post/nowelizacja-ustawy-o-policji-i-kontrowersje-w-sprawie-wprowadzanych-zmian/&quot; class=&quot;urlextern&quot; title=&quot;https://niebezpiecznik.pl/post/nowelizacja-ustawy-o-policji-i-kontrowersje-w-sprawie-wprowadzanych-zmian/&quot; rel=&quot;ugc nofollow&quot;&gt;allow widespread invigilation&lt;/a&gt;, have been accepted. it &lt;a href=&quot;https://niebezpiecznik.pl/post/ustawa-inwigilacyjna-jak-sie-bronic-przed-podgladaniem-przez-policje-i-sluzby/&quot; class=&quot;urlextern&quot; title=&quot;https://niebezpiecznik.pl/post/ustawa-inwigilacyjna-jak-sie-bronic-przed-podgladaniem-przez-policje-i-sluzby/&quot; rel=&quot;ugc nofollow&quot;&gt;came live earlier this month&lt;/a&gt;. this is quite a problem for at least several reasons – just to quote few interesting opinions here:
&lt;/p&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;https://en.wikipedia.org/wiki/Robert A. Heinlein&quot; class=&quot;interwiki iw_wp&quot; title=&quot;https://en.wikipedia.org/wiki/Robert A. Heinlein&quot;&gt;Robert A. Heinlein&lt;/a&gt;: &lt;em&gt;Secrecy is the keystone to all tyranny. Not force, but secrecy and censorship. When any government or church for that matter, undertakes to say to its subjects, “This you may not read, this you must not know,” the end result is tyranny and oppression, no matter how holy the motives. Mighty little force is needed to control a man who has been hoodwinked in this fashion; contrariwise, no amount of force can control a free man, whose mind is free. No, not the rack nor the atomic bomb, not anything. You can&amp;#039;t conquer a free man; the most you can do is kill him.&lt;/em&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;https://en.wikipedia.org/wiki/Edward Snowden&quot; class=&quot;interwiki iw_wp&quot; title=&quot;https://en.wikipedia.org/wiki/Edward Snowden&quot;&gt;Edward Snowden&lt;/a&gt;: &lt;em&gt;Arguing that you don&amp;#039;t care about the right to privacy because you have nothing to hide is no different than saying you don&amp;#039;t care about free speech because you have nothing to say.&lt;/em&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;https://en.wikipedia.org/wiki/Vladimir Lenin&quot; class=&quot;interwiki iw_wp&quot; title=&quot;https://en.wikipedia.org/wiki/Vladimir Lenin&quot;&gt;Vladimir Lenin&lt;/a&gt;: &lt;em&gt;Supervision is a base of trust.&lt;/em&gt; (any1 else see the irony?)&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
thus having said, i must admit i&amp;#039;m a bit shocked by how few ppl do really care about their privacy. “&lt;em&gt;i have nothing to hide&lt;/em&gt;” is probably the most widespread argument. i usually reply with something like: “&lt;em&gt;so why do you have curtains in your windows?&lt;/em&gt;” or “&lt;em&gt;i do not recall seeing you running naked on the streets – are you ashamed of something?&lt;/em&gt;”.
&lt;/p&gt;

&lt;p&gt;
my observation is that in general tech ppl are more aware and do “fight back”.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;2016-02-29 - green light for mass-invigilation in poland (and how to deal with it)&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;green_light_for_mass-invigilation_in_poland_and_how_to_deal_with_it&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-1960&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;dealing_with_the_problem&quot;&gt;dealing with the problem&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://baszerr.eu/lib/exe/detail.php?id=blog%3A2016%3A02%3A29%3Agreen_light_for_mass-invigilation_in_poland&amp;amp;media=blog:2016:02:29:openvpn_logo.png&quot; class=&quot;media&quot; title=&quot;blog:2016:02:29:openvpn_logo.png&quot;&gt;&lt;img src=&quot;https://baszerr.eu/lib/exe/fetch.php?media=blog:2016:02:29:openvpn_logo.png&quot; class=&quot;mediaright&quot; align=&quot;right&quot; loading=&quot;lazy&quot; title=&quot;OpenVPN logo (https://upload.wikimedia.org/wikipedia/commons/8/88/Ovpntech_logo-s_REVISED.png)&quot; alt=&quot;OpenVPN logo (https://upload.wikimedia.org/wikipedia/commons/8/88/Ovpntech_logo-s_REVISED.png)&quot; /&gt;&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
i&amp;#039;m using full-disk encryption for over a decade now. since sometime i&amp;#039;m also using &lt;a href=&quot;https://en.wikipedia.org/wiki/Signal (software)&quot; class=&quot;interwiki iw_wp&quot; title=&quot;https://en.wikipedia.org/wiki/Signal (software)&quot;&gt;Signal (software)&lt;/a&gt; for texting (unfortunately not that many ppl i know use it as well). recently i&amp;#039;ve setup &lt;a href=&quot;https://en.wikipedia.org/wiki/VPN&quot; class=&quot;interwiki iw_wp&quot; title=&quot;https://en.wikipedia.org/wiki/VPN&quot;&gt;VPN&lt;/a&gt; on my router, to access the internet. there is an &lt;a href=&quot;https://docs.google.com/spreadsheets/d/1FJTvWT5RHFSYuEoFVpAeQjuQPU4BVzbOigT0xebxTOw/htmlview?usp=sharing&amp;amp;sle=true&quot; class=&quot;urlextern&quot; title=&quot;https://docs.google.com/spreadsheets/d/1FJTvWT5RHFSYuEoFVpAeQjuQPU4BVzbOigT0xebxTOw/htmlview?usp=sharing&amp;amp;sle=true&quot; rel=&quot;ugc nofollow&quot;&gt;interesting comparison of VPN providers&lt;/a&gt; you can filter to find your best match. what is worth checking making sure of?
&lt;/p&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; company is located &lt;strong&gt;OUTSIDE&lt;/strong&gt; of &lt;a href=&quot;https://en.wikipedia.org/wiki/Five Eyes&quot; class=&quot;interwiki iw_wp&quot; title=&quot;https://en.wikipedia.org/wiki/Five Eyes&quot;&gt;fourteen eyes&lt;/a&gt; countries. otherwise the cure might be worse than the disease, as “14 eyes” have &lt;a href=&quot;https://en.wikipedia.org/wiki/Utah Data Center&quot; class=&quot;interwiki iw_wp&quot; title=&quot;https://en.wikipedia.org/wiki/Utah Data Center&quot;&gt;much bigger budget for mass invigilation&lt;/a&gt; than &lt;a href=&quot;https://en.wikipedia.org/wiki/poland&quot; class=&quot;interwiki iw_wp&quot; title=&quot;https://en.wikipedia.org/wiki/poland&quot;&gt;poland&lt;/a&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; it should not log traffic. preferably nothing should be logged.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; should accept p2p. there are certain occasions p2p can be the only source of information, that is not centrally-controlled, thus cannot be easily shut-down.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;strong&gt;4096 bit RSA&lt;/strong&gt; key. this unfortunately is not provided in the mentioned spreadsheet, so you must check it out on your own. there is an interesting &lt;a href=&quot;https://www.reddit.com/r/linux/comments/43cvvz/someone_told_me_that_you_guys_might_be_interested/&quot; class=&quot;urlextern&quot; title=&quot;https://www.reddit.com/r/linux/comments/43cvvz/someone_told_me_that_you_guys_might_be_interested/&quot; rel=&quot;ugc nofollow&quot;&gt;discussion on VPNs&lt;/a&gt;, where a reference is made to an article, pointing out that &lt;a href=&quot;http://arstechnica.com/security/2015/10/how-the-nsa-can-break-trillions-of-encrypted-web-and-vpn-connections/&quot; class=&quot;urlextern&quot; title=&quot;http://arstechnica.com/security/2015/10/how-the-nsa-can-break-trillions-of-encrypted-web-and-vpn-connections/&quot; rel=&quot;ugc nofollow&quot;&gt;NSA can break 1024 bit RSA in a massive scale&lt;/a&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;dealing with the problem&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;dealing_with_the_problem&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;1961-3591&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;configuration&quot;&gt;configuration&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
configuration of &lt;a href=&quot;https://en.wikipedia.org/wiki/OpenVPN&quot; class=&quot;interwiki iw_wp&quot; title=&quot;https://en.wikipedia.org/wiki/OpenVPN&quot;&gt;OpenVPN&lt;/a&gt; is nowadays simple, since most providers offer ready-to-go configuration files. just download it, put in your user/pass, and you&amp;#039;re good to go. this should be set on your router, so that all networked devices do use your VPN. having &lt;a href=&quot;https://en.wikipedia.org/wiki/OpenWRT&quot; class=&quot;interwiki iw_wp&quot; title=&quot;https://en.wikipedia.org/wiki/OpenWRT&quot;&gt;OpenWRT&lt;/a&gt; or other linux distro, means this is a piece of cake – just setup OpenVPN client on that device and you&amp;#039;re done!
&lt;/p&gt;

&lt;p&gt;
there is however one more problem, that is not commonly mentioned, when talking about VPN. VPN does work over an actual network, that is by itself, fully operational as well. now if you &lt;strong&gt;loose your VPN connectivity in a background&lt;/strong&gt; (say – due to a malfunction of router) you&amp;#039;re connection becomes wide open, and most likely you will not even notice it!
&lt;/p&gt;

&lt;p&gt;
it actually gets worse. if some1 wants to eavesdrop your traffic, and has an access to, say &lt;a href=&quot;https://en.wikipedia.org/wiki/ISP&quot; class=&quot;interwiki iw_wp&quot; title=&quot;https://en.wikipedia.org/wiki/ISP&quot;&gt;ISP&lt;/a&gt;&amp;#039;s network, then she can block your VPN traffic, forcing its disconnection and kaboom! you&amp;#039;re now being watched again!
&lt;/p&gt;

&lt;p&gt;
in order to prevent it from happening, your router must be configured, so that it does NOT allow any “open traffic” to happen directly. you can play around with blocking &lt;abbr title=&quot;Domain Name System&quot;&gt;DNS&lt;/abbr&gt;&amp;#039; access, but it will not make a trick for connections to IPs that are already cached. what you should do instead, is to block ALL forwarded traffic, that is not directed to your VPN access node directly. for OpenWRT this means adding custom rules like these:
&lt;/p&gt;
&lt;pre class=&quot;code base&quot;&gt;iptables -A forwarding_rule -o your_wan_dev -d 1.1.1.1 -j ACCEPT # 1st VPN access node from a list
iptables -A forwarding_rule -o your_wan_dev -d 1.1.1.2 -j ACCEPT # 2nd VPN access node from a list
iptables -A forwarding_rule -o your_wan_dev -j REJECT # nothing else is allowed&lt;/pre&gt;

&lt;p&gt;
this way, if VPN goes down, internet traffic is blocked as well. if you are using multiple gateways, OpenVPN will automatically switch between them, if connection is lost.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;configuration&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;configuration&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;3592-5499&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit4&quot; id=&quot;technical_downsides&quot;&gt;technical downsides&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
aside from an obvious point, that VPN, even if cheap, it&amp;#039;s still not free, there is more. using VPN means at least 2x longer &lt;a href=&quot;https://en.wikipedia.org/wiki/Round-trip delay time&quot; class=&quot;interwiki iw_wp&quot; title=&quot;https://en.wikipedia.org/wiki/Round-trip delay time&quot;&gt;RTT&lt;/a&gt; (one extra point along the way). in real live however usually 4-6x longer RTTs are to be assumed (4-5x is a good result you should aim for). assuming you have reasonable “raw” network connection, this won&amp;#039;t be a practical problem even for gaming. the real challenge is encryption – or the CPU power of your network access point. if you have over 8Mbps connection, pretty much none of the off-the-shelf home routers will deal with &lt;a href=&quot;https://en.wikipedia.org/wiki/OpenVPN&quot; class=&quot;interwiki iw_wp&quot; title=&quot;https://en.wikipedia.org/wiki/OpenVPN&quot;&gt;OpenVPN&lt;/a&gt; using 4096 bit encryption, effectively limiting out bandwidth.
&lt;/p&gt;

&lt;p&gt;
there are many mini-ITX motherboards available, that have x86/amd64 CPUs on board, without any moving parts. this should do for encryption. putting such a mini-PC with two ethernet cards in a closet can be a nice way of dealing with CPU-power loss. while it is more expensive than even a very good router, as a free bonus it can serve as a high-speed &lt;a href=&quot;https://en.wikipedia.org/wiki/Network Attached Storage&quot; class=&quot;interwiki iw_wp&quot; title=&quot;https://en.wikipedia.org/wiki/Network Attached Storage&quot;&gt;NAS&lt;/a&gt; (cheap ones don&amp;#039;t usually go beyond ~20MB/s and more expensive ones are usually just not worth it).
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;technical downsides&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;technical_downsides&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:1,&amp;quot;secid&amp;quot;:4,&amp;quot;range&amp;quot;:&amp;quot;5500-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 15 Jun 2021 20:09:24 +0000</pubDate>
        </item>
        <item>
            <title>opencl_and_c</title>
            <link>https://baszerr.eu/doku.php?id=blog:2016:02:29:opencl_and_c</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;opencl_and_c&quot;&gt;2016-02-29 - OpenCL and C++&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://en.wikipedia.org/wiki/OpenCL&quot; class=&quot;interwiki iw_wp&quot; title=&quot;https://en.wikipedia.org/wiki/OpenCL&quot;&gt;OpenCL&lt;/a&gt; is a very nice initiative. i however only used to support &lt;a href=&quot;https://en.wikipedia.org/wiki/C (programming language)&quot; class=&quot;interwiki iw_wp&quot; title=&quot;https://en.wikipedia.org/wiki/C (programming language)&quot;&gt;C&lt;/a&gt;, when preparing its kernels. the good news is that, since &lt;a href=&quot;https://en.wikipedia.org/wiki/OpenCL#OpenCL_2.1&quot; class=&quot;interwiki iw_wp&quot; title=&quot;https://en.wikipedia.org/wiki/OpenCL#OpenCL_2.1&quot;&gt;since OpenCL 2.1 C++14 support has been provided&lt;/a&gt;. have fun! :)
&lt;/p&gt;

&lt;/div&gt;
</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 15 Jun 2021 20:09:24 +0000</pubDate>
        </item>
        <item>
            <title>remote_console</title>
            <link>https://baszerr.eu/doku.php?id=blog:2016:02:29:remote_console</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;remote_console&quot;&gt;2016-02-29 - remote console&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
recently i was asked to assist with on linux system remotely. there were just few commands to execute, but it is usually time-consuming to explain something like:
&lt;/p&gt;
&lt;pre class=&quot;code bash&quot;&gt;&lt;span class=&quot;kw2&quot;&gt;rm&lt;/span&gt; &lt;span class=&quot;re5&quot;&gt;-rf&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;`&lt;/span&gt;&lt;span class=&quot;kw2&quot;&gt;du&lt;/span&gt; &lt;span class=&quot;re5&quot;&gt;-s&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;/&lt;/span&gt;tmp&lt;span class=&quot;sy0&quot;&gt;/*&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;|&lt;/span&gt; &lt;span class=&quot;kw2&quot;&gt;sort&lt;/span&gt; &lt;span class=&quot;re5&quot;&gt;-n&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;|&lt;/span&gt; &lt;span class=&quot;kw2&quot;&gt;tail&lt;/span&gt; &lt;span class=&quot;re5&quot;&gt;-3&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;|&lt;/span&gt; &lt;span class=&quot;kw2&quot;&gt;awk&lt;/span&gt; &lt;span class=&quot;st_h&quot;&gt;&#039;{ print $2 }&#039;&lt;/span&gt;&lt;span class=&quot;sy0&quot;&gt;`&lt;/span&gt;&lt;/pre&gt;

&lt;p&gt;
over a phone, to a person who is not used to working with a shell on a daily basis.
&lt;/p&gt;

&lt;p&gt;
first i&amp;#039;ve asked for for an ssh access. it was however not possible, since remote computer was behind NAT, on a local network. i had a public IP, i could forward to my SSH on local machine and ask to do a reverse tunnel so that i could connect back to a person&amp;#039;s machine. it did not however felt nice, to give an access to my hardware (just a &lt;a href=&quot;https://baszerr.eu/doku.php?id=blog:2016:02:29:green_light_for_mass-invigilation_in_poland&quot; class=&quot;wikilink1&quot; title=&quot;blog:2016:02:29:green_light_for_mass-invigilation_in_poland&quot; data-wiki-id=&quot;blog:2016:02:29:green_light_for_mass-invigilation_in_poland&quot;&gt;healthy paranoia&lt;/a&gt;). finally i proposed to use netcat for this. on my PC:
&lt;/p&gt;
&lt;pre class=&quot;code bash&quot;&gt;ncat &lt;span class=&quot;re5&quot;&gt;--ssl&lt;/span&gt; &lt;span class=&quot;re5&quot;&gt;-v&lt;/span&gt; &lt;span class=&quot;re5&quot;&gt;-l&lt;/span&gt; 0.0.0.0 &lt;span class=&quot;nu0&quot;&gt;1234&lt;/span&gt;&lt;/pre&gt;

&lt;p&gt;
i&amp;#039;ve tested remote end with help of &lt;a href=&quot;https://en.wikipedia.org/wiki/TOR&quot; class=&quot;interwiki iw_wp&quot; title=&quot;https://en.wikipedia.org/wiki/TOR&quot;&gt;TOR&lt;/a&gt;&lt;sup&gt;&lt;a href=&quot;#fn__1&quot; id=&quot;fnt__1&quot; class=&quot;fn_top&quot;&gt;1)&lt;/a&gt;&lt;/sup&gt;:
&lt;/p&gt;
&lt;pre class=&quot;code bash&quot;&gt;torify ncat &lt;span class=&quot;re5&quot;&gt;--ssl&lt;/span&gt; &lt;span class=&quot;re5&quot;&gt;-v&lt;/span&gt; &lt;span class=&quot;re5&quot;&gt;-e&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;/&lt;/span&gt;bin&lt;span class=&quot;sy0&quot;&gt;/&lt;/span&gt;&lt;span class=&quot;kw2&quot;&gt;bash&lt;/span&gt; my.remote.address &lt;span class=&quot;nu0&quot;&gt;1234&lt;/span&gt;&lt;/pre&gt;

&lt;p&gt;
and confirmed i have a console to work with. then i&amp;#039;ve asked remote end to join, by typing this on his console:
&lt;/p&gt;
&lt;pre class=&quot;code bash&quot;&gt;ncat &lt;span class=&quot;re5&quot;&gt;--ssl&lt;/span&gt; &lt;span class=&quot;re5&quot;&gt;-v&lt;/span&gt; &lt;span class=&quot;re5&quot;&gt;-e&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;/&lt;/span&gt;bin&lt;span class=&quot;sy0&quot;&gt;/&lt;/span&gt;&lt;span class=&quot;kw2&quot;&gt;bash&lt;/span&gt; my.remote.address &lt;span class=&quot;nu0&quot;&gt;1234&lt;/span&gt;&lt;/pre&gt;

&lt;p&gt;
and voila! remote shell to play around. :) it was far from SSH, in terms of usability, but to execute few commands it was just fine.
&lt;/p&gt;

&lt;p&gt;
later on it turned out we&amp;#039;d need to do &lt;a href=&quot;https://en.wikipedia.org/wiki/X11&quot; class=&quot;interwiki iw_wp&quot; title=&quot;https://en.wikipedia.org/wiki/X11&quot;&gt;X forwarding&lt;/a&gt; to continue, so the day ended using &lt;a href=&quot;http://www.teamviewer.com&quot; class=&quot;urlextern&quot; title=&quot;http://www.teamviewer.com&quot; rel=&quot;ugc nofollow&quot;&gt;teamviewer&lt;/a&gt; from inside VM&lt;sup&gt;&lt;a href=&quot;#fn__2&quot; id=&quot;fnt__2&quot; class=&quot;fn_top&quot;&gt;2)&lt;/a&gt;&lt;/sup&gt;. i&amp;#039;m still thinking about a better solution for non-public IP scenario…
&lt;/p&gt;

&lt;/div&gt;
&lt;div class=&quot;footnotes&quot;&gt;
&lt;div class=&quot;fn&quot;&gt;&lt;sup&gt;&lt;a href=&quot;#fnt__1&quot; id=&quot;fn__1&quot; class=&quot;fn_bot&quot;&gt;1)&lt;/a&gt;&lt;/sup&gt; 
&lt;div class=&quot;content&quot;&gt;creative use for TOR, to check if all the port forwardings do work fine&lt;/div&gt;&lt;/div&gt;
&lt;div class=&quot;fn&quot;&gt;&lt;sup&gt;&lt;a href=&quot;#fnt__2&quot; id=&quot;fn__2&quot; class=&quot;fn_bot&quot;&gt;2)&lt;/a&gt;&lt;/sup&gt; 
&lt;div class=&quot;content&quot;&gt;zero trust for closed-source apps! :P&lt;/div&gt;&lt;/div&gt;
&lt;/div&gt;
</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 15 Jun 2021 20:09:24 +0000</pubDate>
        </item>
    </channel>
</rss>
