1 <?xml version=
"1.0" encoding=
"ISO-8859-1"?>
2 <rss version='
2.0' xmlns:lj='http://www.livejournal.org/rss/lj/
1.0/'
>
4 <title>Petter Reinholdtsen - Entries from January
2016</title>
5 <description>Entries from January
2016</description>
6 <link>https://www.hungry.com/~pere/blog/
</link>
10 <title>Creepy, visualise geotagged social media information - nice free software
</title>
11 <link>https://www.hungry.com/~pere/blog/Creepy__visualise_geotagged_social_media_information___nice_free_software.html
</link>
12 <guid isPermaLink=
"true">https://www.hungry.com/~pere/blog/Creepy__visualise_geotagged_social_media_information___nice_free_software.html
</guid>
13 <pubDate>Sun,
24 Jan
2016 10:
50:
00 +
0100</pubDate>
14 <description><p
>Most people seem not to realise that every time they walk around
15 with the computerised radio beacon known as a mobile phone their
16 position is tracked by the phone company and often stored for a long
17 time (like every time a SMS is received or sent). And if their
18 computerised radio beacon is capable of running programs (often called
19 mobile apps) downloaded from the Internet, these programs are often
20 also capable of tracking their location (if the app requested access
21 during installation). And when these programs send out information to
22 central collection points, the location is often included, unless
23 extra care is taken to not send the location. The provided
24 information is used by several entities, for good and bad (what is
25 good and bad, depend on your point of view). What is certain, is that
26 the private sphere and the right to free movement is challenged and
27 perhaps even eradicated for those announcing their location this way,
28 when they share their whereabouts with private and public
31 <p align=
"center
"><img width=
"70%
" src=
"https://people.skolelinux.org/pere/blog/images/
2016-
01-
24-nice-creepy-desktop-window.png
"></p
>
33 <p
>The phone company logs provide a register of locations to check out
34 when one want to figure out what the tracked person was doing. It is
35 unavailable for most of us, but provided to selected government
36 officials, company staff, those illegally buying information from
37 unfaithful servants and crackers stealing the information. But the
38 public information can be collected and analysed, and a free software
39 tool to do so is called
40 <a href=
"http://www.geocreepy.com/
">Creepy or Cree.py
</a
>. I
41 discovered it when I read
42 <a href=
"http://www.aftenposten.no/kultur/Slik-kan-du-bli-overvaket-pa-Twitter-og-Instagram-uten-a-ane-det-
7787884.html
">an
43 article about Creepy
</a
> in the Norwegian newspaper Aftenposten i
44 November
2014, and decided to check if it was available in Debian.
45 The python program was in Debian, but
46 <a href=
"https://tracker.debian.org/pkg/creepy
">the version in
47 Debian
</a
> was completely broken and practically unmaintained. I
48 uploaded a new version which did not work quite right, but did not
49 have time to fix it then. This Christmas I decided to finally try to
50 get Creepy operational in Debian. Now a fixed version is available in
51 Debian unstable and testing, and almost all Debian specific patches
53 <a href=
"https://github.com/jkakavas/creepy
">upstream
</a
>.
</p
>
55 <p
>The Creepy program visualises geolocation information fetched from
56 Twitter, Instagram, Flickr and Google+, and allow one to get a
57 complete picture of every social media message posted recently in a
58 given area, or track the movement of a given individual across all
59 these services. Earlier it was possible to use the search API of at
60 least some of these services without identifying oneself, but these
61 days it is impossible. This mean that to use Creepy, you need to
62 configure it to log in as yourself on these services, and provide
63 information to them about your search interests. This should be taken
64 into account when using Creepy, as it will also share information
65 about yourself with the services.
</p
>
67 <p
>The picture above show the twitter messages sent from (or at least
68 geotagged with a position from) the city centre of Oslo, the capital
69 of Norway. One useful way to use Creepy is to first look at
70 information tagged with an area of interest, and next look at all the
71 information provided by one or more individuals who was in the area.
72 I tested it by checking out which celebrity provide their location in
73 twitter messages by checkout out who sent twitter messages near a
74 Norwegian TV station, and next could track their position over time,
75 making it possible to locate their home and work place, among other
76 things. A similar technique have been
77 <a href=
"http://www.buzzfeed.com/maxseddon/does-this-soldiers-instagram-account-prove-russia-is-covertl
">used
78 to locate Russian soldiers in Ukraine
</a
>, and it is both a powerful
79 tool to discover lying governments, and a useful tool to help people
80 understand the value of the private information they provide to the
83 <p
>The package is not trivial to backport to Debian Stable/Jessie, as
84 it depend on several python modules currently missing in Jessie (at
85 least python-instagram, python-flickrapi and
86 python-requests-toolbelt).
</p
>
88 <p
>(I have uploaded
89 <a href=
"https://screenshots.debian.net/package/creepy
">the image to
90 screenshots.debian.net
</a
> and licensed it under the same terms as the
91 Creepy program in Debian.)
</p
>
96 <title>Always download Debian packages using Tor - the simple recipe
</title>
97 <link>https://www.hungry.com/~pere/blog/Always_download_Debian_packages_using_Tor___the_simple_recipe.html
</link>
98 <guid isPermaLink=
"true">https://www.hungry.com/~pere/blog/Always_download_Debian_packages_using_Tor___the_simple_recipe.html
</guid>
99 <pubDate>Fri,
15 Jan
2016 00:
30:
00 +
0100</pubDate>
100 <description><p
>During his DebConf15 keynote, Jacob Appelbaum
101 <a href=
"https://summit.debconf.org/debconf15/meeting/
331/what-is-to-be-done/
">observed
102 that those listening on the Internet lines would have good reason to
103 believe a computer have a given security hole
</a
> if it download a
104 security fix from a Debian mirror. This is a good reason to always
105 use encrypted connections to the Debian mirror, to make sure those
106 listening do not know which IP address to attack. In August, Richard
107 Hartmann observed that encryption was not enough, when it was possible
108 to interfere download size to security patches or the fact that
109 download took place shortly after a security fix was released, and
110 <a href=
"http://richardhartmann.de/blog/posts/
2015/
08/
24-Tor-enabled_Debian_mirror/
">proposed
111 to always use Tor to download packages from the Debian mirror
</a
>. He
112 was not the first to propose this, as the
113 <tt
><a href=
"https://tracker.debian.org/pkg/apt-transport-tor
">apt-transport-tor
</a
></tt
>
114 package by Tim Retout already existed to make it easy to convince apt
115 to use
<a href=
"https://www.torproject.org/
">Tor
</a
>, but I was not
116 aware of that package when I read the blog post from Richard.
</p
>
118 <p
>Richard discussed the idea with Peter Palfrader, one of the Debian
119 sysadmins, and he set up a Tor hidden service on one of the central
120 Debian mirrors using the address vwakviie2ienjx6t.onion, thus making
121 it possible to download packages directly between two tor nodes,
122 making sure the network traffic always were encrypted.
</p
>
124 <p
>Here is a short recipe for enabling this on your machine, by
125 installing
<tt
>apt-transport-tor
</tt
> and replacing http and https
126 urls with tor+http and tor+https, and using the hidden service instead
127 of the official Debian mirror site. I recommend installing
128 <tt
>etckeeper
</tt
> before you start to have a history of the changes
129 done in /etc/.
</p
>
131 <blockquote
><pre
>
132 apt install apt-transport-tor
133 sed -i
's% http://ftp.debian.org/% tor+http://vwakviie2ienjx6t.onion/%
' /etc/apt/sources.list
134 sed -i
's% http% tor+http%
' /etc/apt/sources.list
135 </pre
></blockquote
>
137 <p
>If you have more sources listed in /etc/apt/sources.list.d/, run
138 the sed commands for these too. The sed command is assuming your are
139 using the ftp.debian.org Debian mirror. Adjust the command (or just
140 edit the file manually) to match your mirror.
</p
>
142 <p
>This work in Debian Jessie and later. Note that tools like
143 <tt
>apt-file
</tt
> only recently started using the apt transport
144 system, and do not work with these tor+http URLs. For
145 <tt
>apt-file
</tt
> you need the version currently in experimental,
146 which need a recent apt version currently only in unstable. So if you
147 need a working
<tt
>apt-file
</tt
>, this is not for you.
</p
>
149 <p
>Another advantage from this change is that your machine will start
150 using Tor regularly and at fairly random intervals (every time you
151 update the package lists or upgrade or install a new package), thus
152 masking other Tor traffic done from the same machine. Using Tor will
153 become normal for the machine in question.
</p
>
155 <p
>On
<a href=
"https://wiki.debian.org/FreedomBox
">Freedombox
</a
>, APT
156 is set up by default to use
<tt
>apt-transport-tor
</tt
> when Tor is
157 enabled. It would be great if it was the default on any Debian
163 <title>Nedlasting fra NRK, som Matroska med undertekster
</title>
164 <link>https://www.hungry.com/~pere/blog/Nedlasting_fra_NRK__som_Matroska_med_undertekster.html
</link>
165 <guid isPermaLink=
"true">https://www.hungry.com/~pere/blog/Nedlasting_fra_NRK__som_Matroska_med_undertekster.html
</guid>
166 <pubDate>Sat,
2 Jan
2016 13:
50:
00 +
0100</pubDate>
167 <description><p
>Det kommer stadig nye løsninger for å ta lagre unna innslag fra NRK
168 for å se på det senere. For en stund tilbake kom jeg over et script
169 nrkopptak laget av Ingvar Hagelund. Han fjernet riktignok sitt script
170 etter forespørsel fra Erik Bolstad i NRK, men noen tok heldigvis og
171 gjorde det
<a href=
"https://github.com/liangqi/nrkopptak
">tilgjengelig
172 via github
</a
>.
</p
>
174 <p
>Scriptet kan lagre som MPEG4 eller Matroska, og bake inn
175 undertekster i fila på et vis som blant annet VLC forstår. For å
176 bruke scriptet, kopier ned git-arkivet og kjør
</p
>
179 nrkopptak/bin/nrk-opptak k
<ahref=
"https://tv.nrk.no/serie/bmi-turne/MUHH45000115/sesong-
1/episode-
1">https://tv.nrk.no/serie/bmi-turne/MUHH45000115/sesong-
1/episode-
1</a
>
180 </pre
></p
>
182 <p
>URL-eksemplet er dagens toppsak på tv.nrk.no. Argument
'k
' ber
183 scriptet laste ned og lagre som Matroska. Det finnes en rekke andre
184 muligheter for valg av kvalitet og format.
</p
>
186 <p
>Jeg foretrekker dette scriptet fremfor youtube-dl, som
187 <a href=
"https://people.skolelinux.org/pere/blog/Hvordan_enkelt_laste_ned_filmer_fra_NRK_med_den__nye__l_sningen.html
">
188 nevnt i
2014 støtter NRK
</a
> og en rekke andre videokilder, på grunn
189 av at nrkopptak samler undertekster og video i en enkelt fil, hvilket
190 gjør håndtering enklere på disk.
</p
>