Re: USA 2024 Elections Thread

2023-09-17 Thread grarpamp
Vivek spanks Leftist Liar and Drunk Democrat Apologist Bill Maher with
Election Fraud Truths, Biden Corruption, and more...

https://www.youtube.com/watch?v=p9dl1hDG1k8 Vivek Spills Truth


Re: War re Ukraine: Thread

2023-09-17 Thread grarpamp
While wars play, music marches on...

https://www.youtube.com/watch?v=AvwN-I1nvsA


Re: [spam][crazy][fiction][random] Non-Canon MCBoss Spinoffs

2023-09-17 Thread mailbombbin
—-
Greg has asked me to limit my messages to only a few per hour because
the delivery system is overloaded.

I’m thinking on approaches to enforce this when I’m in a different
state of mind.

….

Honestly the theory that the cypherpunks list is full of advanced
hackers who can handle this stuff is more true on a blockchain than a
conventional networked system at this time. Our grassroots engineers
are experiencing setbacks, and the value of this list is pretty low
when it is mostly these crumpled cognitive sneezes.

But it sounds like it’s ok to send 1 message an hour for sure.


Re: [spam][crazy][fiction][random] Non-Canon MCBoss Spinoffs

2023-09-17 Thread mailbombbin
We’ll use the “save draft” interface feature for now :)

draft saved at 0833

Really, Greg took on this list a number of years ago, when the main
ways of hosting it were falling and a community volunteer hadn’t risen
otherwise.

There’s a gap; people are expected to be running mirrors of it, I
don’t quite remember what they are called, if participating in the
community. Other servers to distribute the work.

draft saved at 0846

Google’s protocol messages say to please review these guidelines:
https://support.google.com/mail/answer/81126?visit_id=638305595509701449-138875993&p=UnsolicitedRateLimitError&rd=1
regarding distributing tens of thousands of repeated unsolicited
messages to user accounts.

email sent at 0901


Re: [ot][spam]gpt-4 completions

2023-09-17 Thread Undescribed Horrific Abuse, One Victim & Survivor of Many
GPT-4

User
Is there a linux script or tool I can use to easily generate an apple
device configuration profile?

ChatGPT
Creating Apple Device Configuration Profiles typically involves
generating XML files with the .mobileconfig extension. These files
define settings and configurations for Apple devices. You can create
these files manually or use Apple's "Apple Configurator 2" on a macOS
machine. However, if you are looking for a way to generate
.mobileconfig files on a Linux machine, you can either manually create
the XML or write a script to generate it for you.

Here's a simple Python script example to generate a .mobileconfig file
for configuring Wi-Fi settings on an Apple device:

python
Copy code
import plistlib
import sys

def create_wifi_profile(ssid, password):
# Create a dictionary to hold our configuration
config = {
'PayloadDisplayName': 'Wi-Fi (Example)',
'PayloadIdentifier': 'com.example.wifi',
'PayloadType': 'Configuration',
'PayloadUUID': '6a9c9f9a-2b61-4d14-94a1-1cde68023fb0',
'PayloadVersion': 1,
'PayloadContent': [
{
'PayloadType': 'com.apple.wifi.managed',
'PayloadVersion': 1,
'PayloadIdentifier': 'com.example.wifi',
'PayloadUUID': '4e6e4a64-e006-4f8e-a7a7-8c0e0e60f4e9',
'PayloadDisplayName': 'Wi-Fi Settings',
'SSID_STR': ssid,
'Password': password,
'EncryptionType': 'WPA',
'IsHiddenNetwork': False
}
]
}

# Generate a .mobileconfig file using plistlib
with open('wifi_profile.mobileconfig', 'wb') as fp:
plistlib.dump(config, fp)

if __name__ == '__main__':
if len(sys.argv) < 3:
print('Usage: python create_wifi_profile.py  ')
else:
create_wifi_profile(sys.argv[1], sys.argv[2])
To use this script, save it in a file (e.g., create_wifi_profile.py)
and run it from the terminal with:

bash
Copy code
python create_wifi_profile.py "YourSSID" "YourPassword"
Replace "YourSSID" and "YourPassword" with your Wi-Fi SSID and
password. This will generate a .mobileconfig file named
wifi_profile.mobileconfig. You can then distribute this to Apple
devices to configure Wi-Fi settings automatically.

Note: The PayloadUUID should be a unique identifier, so you might want
to generate a new one for each profile. The example values used here
are just for demonstration and should not be used as-is in a
production environment.


Re: [ot][spam]gpt-4 completions

2023-09-17 Thread Undescribed Horrific Abuse, One Victim & Survivor of Many
GPT-4

User
I’d like to use a linux machine to configure an ipad to accept a
self-signed certificate. How can I most easily do this?

ChatGPT
Deploying a self-signed certificate on an iPad from a Linux machine
involves generating the certificate, transferring it to the iPad, and
installing it. Here's a high-level overview of the steps:

Step 1: Create a Self-Signed Certificate on Linux
First, generate a self-signed certificate using OpenSSL on your Linux machine:

bash
Copy code
openssl req -x509 -newkey rsa:2048 -keyout key.pem -out cert.pem -days 365
You'll be prompted for information for the certificate and a
passphrase for the private key. Keep these secure.

Step 2: Transfer the Certificate to the iPad
You'll need to transfer the cert.pem file to the iPad. There are
multiple ways to do this:

Email: You can email the certificate to an account configured on the
iPad and open the attachment to install it.
Web Server: If the iPad can access your Linux machine on the same
network, you could briefly run a web server to serve the certificate
file.
To run a simple web server to host the certificate, use Python's
built-in HTTP server:

bash
Copy code
python3 -m http.server 8000
Open Safari on the iPad and navigate to
http://:8000. Download the cert.pem file.

Step 3: Install the Certificate on the iPad
Open the Certificate: Tap the downloaded certificate; this will open a
prompt about installing the profile.
Profile Installation: Go to Settings > Profile Downloaded to initiate
the installation.
Trust the Certificate: After installing the profile, you'll need to
mark the certificate as trusted. Go to Settings > General > About >
Certificate Trust Settings and toggle on the switch for your
certificate.
Step 4: Verify Certificate Installation
You should now be able to connect to your server with the self-signed
certificate. Verify that the service you intended to use with this
certificate works as expected.

Note: Self-signed certificates are not recommended for production use.
They're useful for testing but because they're not issued by a trusted
Certificate Authority, they can pose a security risk.

Disclaimer: Be very careful when handling certificates and make sure
you understand the risks involved in using self-signed certificates.
Misconfiguration could lead to security vulnerabilities. Always make
sure you're in compliance with your organization's security policies.