diff --git a/.domains b/.domains
old mode 100644
new mode 100755
diff --git a/blog/2022/december/web3-2.html b/blog/2022/december/web3-2.html
index b076dba..8d98acb 100755
--- a/blog/2022/december/web3-2.html
+++ b/blog/2022/december/web3-2.html
@@ -48,11 +48,11 @@ docker run --rm -v ~/Solid:/data -p 3344:3000 -it solidproject/community-server:
After that, I went to try some apps again. I was able to log in with the Solid file manager, but because I had been using the localhost IP when I created my user in the web interface, the file manager kept throwing errors. I had to delete all my data and start over from the beginning. And by delete all my data, I mean running sudo rm -rf ~/Solid/*, deleting the Docker images, and then re-downloading the Docker images. Turns out this is a known problem that the developers don't feel like solving at the moment:
The account system is still quite rudimentary and does not include account deletion yet. To delete the accounts on your server you would have to delete the .internal/accounts/ folder on your disk.
After the full reset, the file manager then worked as intended, and I was able to create folders and upload files.
-
+
I thought about self-hosting the file manager, but I looked at the Git repo, and apparently it's unmaintained:
NOTE: This project has no active maintainer. It may or may not be working, and from time to time stuff will probably get fixed.
As for alternatives, Penny and Solid IDE are actively maintained, and the UI for Penny is nicer. But Penny constantly sends HTTP requests every time you do anything in the window, which could easily overwhelm a server if you have more than a few Pods hosted on it, and the hosted instance of Solid IDE linked in the Solid app listing 404s, so I couldn't test it.
Next on my list of apps to try was Notepod, a notepad application (also with an abandoned Git repo, this time from 2020). But after I entered the URL of my Solid provider (solid.letsdecentralize.org) and clicked "go"... nothing happened. Docker showed a few HTTP requests were being made every time I clicked "go":
And here I was, saying that I wouldn't do free labor for cryptobros... Payment for the editing is welcome, PokedStudio. Fiat only. You know where to contact me.
If you want to do something other than buy expensive images, there are nine projects in the "Social" category. As my patience was starting to wear thin, I decided to try the first one listed: a Reddit clone named DSCVR. But I wanted to be prepared before I dove in, so I went to the "Wallet" category and installed the first one listed, Plug. I mean, if web3 is all about cryptocurrency, then it makes sense that you'd need a wallet, right? I clicked on the extension icon once it popped up by the address bar, and I was immediately met with this sleep paralysis demon:
-
+
(For those not familiar with zoomerspeak, "frfr" is short for "for real, for real".)
It prompted me to create a password, so I gave it a fourteen-word-long passphrase made in KeePassXC. Then it gave me a recovery phrase to backup... and whatever the hell this is:
-
+
I get the feeling that the people at Fleek (the company that made Plug) don't take professionalism very seriously. Which is all good and fine when you're a Broke Dumbass like me who just wants to snark at everything, but when you're a company dealing with financial assets... well, a mascot with a creepy face who swears at you during the onboarding process doesn't exactly reassure the user that the company won't lose all the customer's assets.
Once I'd suffered all the way through the Plug setup, I went back to DSCVR, now ready to sign in. The homepage immediately blasted me with a post where... Christians were arguing over whether Christ had a vagina. (DSCVR also seems quite hostile to being archived by both the Wayback Machine and archive.md.) I was expecting the usual NFT hype to clog every post, but this time I had to actually scroll for it. I'm still not sure if I'd prefer the NFTs or not.
On your first visit, a welcome popup appears offering a site tour. Page one of the tour (there are six in total) is about receiving NFT airdrops... and so is page three. Page five says you can make subreddits "portals", and then paywall them by requiring certain NFTs to visit. I don't have any NFTs, and I don't have any interest in paywalling my content, but I forged ahead to the login page anyway.
Something was wrong with the milk machines at Hell College. Skim milk tasted like literal cow water, and the 2% milk made me want to puke. The chocolate milk dispenser was alright, but since my main source of milk meal-wise during my stay at Hell College was at breakfast for cereal, that would have been too much sugar at once for my poor body.
+
Thankfully, due to the high volume of lactose-intolerant and vegan students on campus, there was a regularly-restocked soy milk dispenser. It was delicious, which is a shame because I don't remember what brand it was and I have yet to find soy milk that tastes just as smooth. The cooks- and even a campus administrator once- ran out of the kitchen multiple times during my year there to yell at me for taking so much. I think once they purposely didn't refill the damn thing until noon because they knew I was coming to drink it all at breakfast. So, just for that morning, I was forced to use the almond milk dispenser instead. Maybe it was starting to go bad, or maybe almond milk just naturally tastes rancid, but I never tried that again.
+
+
Which is why, when I look at the calendar and see that the Year of the Almond Milk is upon us, my hope is that it means this is the year where I close the loopholes that men keep using to cause me pain, just like how I eventually stopped eating cereal at Hell College so the cooks would stop threatening to beat my ass for the crime of... drinking milk. (Have you ever had hash browns covered in hot sauce at six in the morning? Religious experience right there. Highly recommended. Alternatively, get a bunch of noodles in alfredo sauce in a take-out box, put some chicken tenders on top, and let it sit in the fridge overnight. The food is the only thing I really miss about Hell College.)
+
Dammit, I'm digressing again.
+
Wanna know one thing the cooks didn't do? Keep harassing me after I left Hell College. Exactly zero of the cooks stalked me after I left the campus and never returned. Not a single one gave me unsolicited passive-aggressive "career advice". Not a single one sicced their friends on me to leave nasty misogynistic screeds in my inbox, email or IRL, after I got COVID-19. I can't think of a single one who went out of their way to bypass my elaborate server filters just to tell me to kill myself. (I wish Zoho's web admin panel had an actual mobile version. Too much pinching and zooming for my bleary eyes.) I left Hell College, and they forgot about me, and we went our separate ways. Maybe it helped that all the cooks I remember were female. I mean, Ovarit was full of shitty people, but I haven't received even a single peep of harassment from them since I left. I wish I knew exactly what it is about the Y chromosome that makes men Behave Like That.
+
So, as the first post of the Year of the Almond Milk on this blog, let me remind everyone who this website is really for: on Christmas, instead of pretending to be a Christian, I sat in my grandmother's basement and designed from scratch a uterus pin. There were existing designs already on the Internet, but they were either too simplistic or too oblong and likely to have dangling pieces chip off when actually used as a pin.
+
I don't have a PO box to ship these from, so I currently have no way of safely selling them on Etsy... so apologies if you wanted one Certifiably Made By A Madwoman. As recompense for a crime not committed, here's the pattern. Use the "mini" bead size for these. Good luck, have fun, and may your first womynstruation in the Year of the Almond Milk be light and pain-free.
diff --git a/feed.ass b/feed.ass
index 736b3d4..92609b4 100755
--- a/feed.ass
+++ b/feed.ass
@@ -1,5 +1,7 @@
# MayVaneDay ASS (https://tilde.town/~dzwdz/ass/) feed
+2023-01-01 https://mayvaneday.org/blog/2023/january/UterusPin.html Uterus Pin Perler Bead Pattern
+2023-01-01 https://mayvaneday.org/poetry/z/zircons_beacon.txt ZIRCON'S BEACON
2022-12-07 https://mayvaneday.org/blog/2022/december/web3-2.html Broke Dumbass Attempts To Web3 Again
2022-11-22 https://mayvaneday.org/blog/2022/november/asking.html It's insane, the things you can get simply by asking
2022-11-01 https://mayvaneday.org/blog/2022/november/ld.html Woman who would have been revered prophetess 4,000 years ago now relegated to clicking links, opening tabs
diff --git a/garden/android_root/hltevzw.gmi b/garden/android_root/hltevzw.gmi
deleted file mode 100755
index 0cc3fb8..0000000
--- a/garden/android_root/hltevzw.gmi
+++ /dev/null
@@ -1,33 +0,0 @@
-# Rooting the Samsung Galaxy Note 3 (Verizon) and installing LineageOS
-
-## Stuff you need
-
-=> https://download.lineageos.org/hltetmo The latest LineageOS recovery file
-=> https://download.lineageos.org/hltetmo The latest LineageOS ROM file
-=> https://androidfilehost.com/?fid=4349826312261712202 This very specific version of the Odin image flashing tool
-=> https://developer.samsung.com/android-usb-driver Samsung Android USB Driver
-=> https://ipfs.letsdecentralize.org/ipfs/QmNhEPB2oCAmkwM7rD6bN2EhmXxVTRZKxLckRh7DHAZnNf ArabicToolApp.exe (ignore virus warnings. Of course an Android exploit is going to be classified as "malware")
-=> https://web.archive.org/web/20221010233203/https://forum.xda-developers.com/t/official-note-3-verizon-bootloader-unlock.3359370/ Note 3 Verizon Bootloader Unlock
-
-### If some of the links are broken, try these mirrors
-=> ../../dl/hltevzw/Odin_3.13.1.zip Odin image flashing tool
-=> ipfs://QmaBWnbqJsWMFXS8aDspWsga7s3MtH7Gt3xF5sfKL6qGxr Odin image flashing tool (IPFS)
-=> ipfs://QmaRn2E65XPT1YHFXL5qkMeWdgd7MwnNCtWzmQQtgWguNR Note 3 Verizon Bootloader Unlock script (IPFS)
-=> ipfs://QmNhEPB2oCAmkwM7rD6bN2EhmXxVTRZKxLckRh7DHAZnNf ArabicToolApp.exe (IPFS)
-
-### Also:
-
-* a machine running Windows 10 (a VM will likely not work)
-* the Note 3 has to be running build version "OB6" (not "SEPL")
-* a blank microSD card (the bootloader unlock script will say how big it has to be)
-
-## Instructions
-
-1. Wipe the phone
-2. Downgrade the software to OB6 using Odin (you don't need to do anything fancy to downgrade; just flash the image)
-3. Enable ADB in developer settings
-4. Get root using ArabicToolApp.exe
-5. Follow the instructions on the bootloader unlock page to push the "unlock_n3" binary to the device and run it
-6. Follow these instructions (it says "hltetmo", but it counts for "hltevzw" too):
-
-=> https://wiki.lineageos.org/devices/hltetmo/install Install LineageOS on hltetmo
diff --git a/garden/android_root/nook1.gmi b/garden/android_root/nook1.gmi
deleted file mode 100755
index 401ae3e..0000000
--- a/garden/android_root/nook1.gmi
+++ /dev/null
@@ -1,69 +0,0 @@
-# Rooting the Barnes & Noble Nook 1st Generation
-
-## Stuff you need
-
-=> ../../dl/nook/ Individual files
-=> https://upload.letsdecentralize.org/misc/nook.7z All the files in one .7z pack
-=> ipfs://QmPV9YTCNV3StpfbbXGpcJQWDbxstrato1keqprvBG7Gw9 All the files in one .7z pack (IPFS)
-
-## Instructions
-
-1. Get a server running on port 80 on a machine on the same Wi-Fi network as the Nook.
-
-All the server needs to host is "exploit.html" from the pack linked above. For best results, rename the HTML file to "index.html".
-
-2. Crash your Nook's browser to enable ADB.
-
-Using the Nook's browser, navigate to the web server via its local IPv4 address. The browser should refresh a few times and then crash to the home menu.
-
-3. Connect to the Nook over ADB.
-
-```
-adb connect YOUR_NOOKS_LOCAL_IP_HERE
-```
-
-If ADB refuses to connect, run step 2 repeatedly until ADB manages to connect. It could take between one and one hundred tries.
-
-4. Get and edit "/init.rc".
-
-```
-adb pull /init.rc
-```
-
-Open "init.rc" in your favorite text editor on your local machine. Find the line that says:
-
-```
-service adbd /sbin/adbd
-```
-
-Below that should say "disabled". Change that to "enabled".
-
-5. Get root access.
-
-While still connected to the Nook over ADB, run:
-
-```
-adb push ratc.bin /sqlite_stmt_journals
-adb shell
-cd /sqlite_stmt_journals
-/system/bin/chmod 777 ./ratc.bin
-./ratc.bin
-```
-
-Several lines of output will appear. Do not press anything. A few seconds later, adb will disconnect you.
-
-```
-adb kill-server
-```
-
-6. Push the patched "init.rc" to the Nook.
-
-Repeat step 3 to reconnect to the Nook over ADB. Then run:
-
-```
-adb push init.rc /
-```
-
-After a reboot, your Nook should now be rooted.
-
-The default launcher will not show third-party apps. "ru.mynook.launcher.apk" included in the pack is an alternative launcher that will show all apps installed, including third-party ones.
diff --git a/garden/darknet/tor.gmi b/garden/darknet/tor.gmi
deleted file mode 100755
index b8d704b..0000000
--- a/garden/darknet/tor.gmi
+++ /dev/null
@@ -1,73 +0,0 @@
-# Creating a Tor hidden service using Caddy and Debian 11
-
-1. Install Tor.
-
-```
-sudo apt install tor
-```
-
-2. Install the Caddy web server.
-
-```
-echo "deb [trusted=yes] https://apt.fury.io/caddy/ /" | sudo tee -a /etc/apt/sources.list.d/caddy-fury.list
-sudo apt update; sudo apt install caddy -y
-```
-
-3. Edit "/etc/tor/torrc" to create the hidden service.
-
-Open "/etc/tor/torrc" in your favorite text editor. (Please note that this usually requires root privileges.)
-
-Go to the lines that say:
-
-```
-#HiddenServiceDir /var/lib/tor/hidden_service/
-#HiddenServicePort 80 127.0.0.1:80
-```
-
-Uncomment them by deleting the # mark in front of each line.
-
-If you want, you can change the HiddenServiceDir directory, but you will need to remember it for later. For security purposes, keep the new directory inside of "/var/lib/tor/".
-
-4. Restart the Tor daemon.
-
-```
-sudo systemctl restart tor@default
-```
-
-5. As root, go to the hidden service directory and get the new hidden service's domain.
-
-```
-sudo -i
-cd /var/lib/tor/directory/
-```
-
-Replace "directory" with the actual directory you chose in step 3.
-
-```
-cat hostname
-```
-
-If all is well, you should now see a long string of letters and numbers that ends in ".onion". Copy this somewhere safe. You'll need it next step.
-
-6. Configure Caddy to serve the hidden service.
-
-Open "/etc/caddy/Caddyfile" with your favorite text editor. You should already be root, but if you did "exit" after getting the Tor hostname, just "sudo -i" again.
-
-Type the following in:
-
-```
-http://YourTorHostnameHere.onion {
- root * /your/website/file/path/here
- file_server
- encode gzip
- bind 127.0.0.1
-}
-```
-
-The "http://" in front of the address is important as that tells Caddy to not try to enable HTTPS on that domain. HTTPS is unnecessary for Tor hidden services as all traffic to and from the server is already encrypted in transit. And since Tor hidden services aren't accessible on the normal clearnet, the request for Let's Encrypt to give Caddy a certificate would fail as they wouldn't be able to access the domain.
-
-7. Restart Caddy to apply your changes.
-
-```
-sudo systemctl restart caddy
-```
diff --git a/garden/darknet/yggdrasil.gmi b/garden/darknet/yggdrasil.gmi
deleted file mode 100755
index 3f93966..0000000
--- a/garden/darknet/yggdrasil.gmi
+++ /dev/null
@@ -1,81 +0,0 @@
-# Creating a Yggdrasil website using Caddy and Debian 11
-
-1. Install Yggdrasil.
-
-```
-sudo apt install dirmngr
-gpg --fetch-keys https://neilalexander.s3.dualstack.eu-west-2.amazonaws.com/deb/key.txt
-gpg --export 569130E8CA20FBC4CB3FDE555898470A764B32C9 | sudo apt-key add -
-echo 'deb http://neilalexander.s3.dualstack.eu-west-2.amazonaws.com/deb/ debian yggdrasil' | sudo tee /etc/apt/sources.list.d/yggdrasil.list
-sudo apt update; sudo apt install yggdrasil
-```
-
-2. Install Caddy.
-
-```
-echo "deb [trusted=yes] https://apt.fury.io/caddy/ /" | sudo tee -a /etc/apt/sources.list.d/caddy-fury.list
-sudo apt update; sudo apt install caddy -y
-```
-
-3. Get the IP Yggdrasil generates for you.
-
-```
-sudo systemctl start yggdrasil; sudo systemctl enable yggdrasil
-sudo journalctl -xfe -u yggdrasil
-```
-
-There will be a line that says "Your IPv6 address is". Copy the rest of that line somewhere safe.
-
-Press the Control and C buttons on your keyboard at the same time to exit "journalctl".
-
-4. Configure Caddy to serve the hidden service.
-
-Open "/etc/caddy/Caddyfile" as root with your favorite text editor.
-
-Type the following in:
-
-```
-http://[YGGDRASIL_IP_ADDRESS_HERE] {
- root * /your/website/file/path/here
- file_server
- encode gzip
-}
-```
-
-The "http://" in front of the address is important as that tells Caddy to not try to enable HTTPS for that website. HTTPS is unnecessary for Yggdrasil hidden services as all traffic to and from the server is already encrypted in transit. Besides, Let's Encrypt wouldn't be able to issue a certificate for an IP address anyway.
-
-5. Restart Caddy to apply your changes.
-
-```
-sudo systemctl restart caddy
-```
-
-6. Get some peers for Yggdrasil.
-
-=> https://github.com/yggdrasil-network/public-peers Copy some peers from this page. Try to select ones closest to your geographical location.
-
-On your server, open "/etc/yggdrasil.conf" as root with your favorite text editor. At the top of the configuration file will be a section that looks like this:
-
-```
-Peers: []
-```
-
-Pick some peers from the list and add them to that section of the file (one per line) so it now looks something like this:
-
-```
-Peers:
- [
- tls://01.scv.usa.ygg.yt:443
- tls://lax.yuetau.net:6643
- tls://tasty.chowder.land:9001
- tls://supergay.network:9001
- tls://lancis.iscute.moe:49274
- tls://mayvaneday.org:1414
-]
-```
-
-Save the file and close it, then run:
-
-```
-sudo systemctl restart yggdrasil
-```
diff --git a/garden/gpg.gmi b/garden/gpg.gmi
deleted file mode 100755
index f06c4b5..0000000
--- a/garden/gpg.gmi
+++ /dev/null
@@ -1,38 +0,0 @@
-# Quick guide to GPG
-
-## Generate a key
-
-```
-gpg --generate-key
-```
-
-## Import an existing key
-
-```
-gpg --import key.txt
-```
-
-## Export a key
-
-```
-gpg --export -a person@domain.tld public.gpg
-gpg --export-secret-keys -a person@domain.tld
-```
-
-## Encrypt a file using a specific key
-
-```
-gpg --encrypt -a -r person@domain.tld file.ext
-```
-
-## Sign a file using a specific key
-
-```
-gpg --clear-sign -a file.ext
-```
-
-## List all keys in the keyring
-
-```
-gpg --list-keys
-```
diff --git a/garden/index.gmi b/garden/index.gmi
deleted file mode 100755
index d71cb86..0000000
--- a/garden/index.gmi
+++ /dev/null
@@ -1,19 +0,0 @@
-# MayVaneDay Wiki
-
-=> ./vlc.gmi VLC has an ncurses frontend that also supports equalizers
-=> ./gpg.gmi Quick guide to GPG
-=> ./list.gmi List of miscellaneous useful things
-
-## Android rooting
-
-=> ./android_root/hltevzw.gmi Samsung Galaxy Note 3 (Verizon)
-=> ./android_root/nook1.gmi Barnes & Noble Nook 1st Generation
-
-## Darknet setup
-
-=> ./darknet/tor.gmi Tor
-=> ./darknet/yggdrasil.gmi Yggdrasil
-
-## Making operating systems usable
-
-=> ./os/openbsd.gmi (Abandoned) notes for OpenBSD
diff --git a/garden/list.gmi b/garden/list.gmi
deleted file mode 100755
index 4c5d7b1..0000000
--- a/garden/list.gmi
+++ /dev/null
@@ -1,38 +0,0 @@
-# A big list of useful links
-
-## Alternate search engines
-
-=> https://wiby.me Wiby
-=> https://millionshort.com Million Short
-=> https://search.marginalia.nu Marginalia
-=> https://www.seekport.com Seekport
-=> https://teclis.com Teclis
-
-## Obscure site discovery
-
-=> https://theforest.link The Forest
-
-## AI image generation
-
-=> https://huggingface.co/spaces/stabilityai/stable-diffusion Stable Diffusion Demo
-=> https://stabilityai.us.auth0.com/u/login?state=hKFo2SBqWXBRQ25mblJrSGFuZzNIM1l2VGJxNk1SeERKUEdMWqFur3VuaXZlcnNhbC1sb2dpbqN0aWTZIHJvN2huZFA1QWJDOUhfMmNaTHJoQmtNT2xvWUw1bVlyo2NpZNkgS3ZZWkpLU2htVW9PalhwY2xRbEtZVXh1Y0FWZXNsSE4 StabilityAI
-=> https://www.drawanything.app Draw Anything
-=> https://huggingface.co/spaces/hakurei/waifu-diffusion-demo Waifu Diffusion
-=> https://neuralblender.com Neuralblender
-=> https://www.wombo.art/create Dream by WOMBO
-
-## IP anon check
-
-=> https://www.whatismyip.com What Is My IP?
-=> https://myip.wtf WTF is my IP?!?!?!??
-=> https://check.torproject.org Am I using Tor?
-
-## Piracy
-
-=> https://fitgirl-repacks.site FitGirl Repacks
-=> https://piratebayproxy.info List of Pirate Bay proxies
-=> https://gog-games.com GOG Games
-=> https://hshop.erista.me hShop for 3DS
-=> https://archive.org/details/psxgames Console Living Room: Playstation
-=> https://nxbrew.com NXBrew
-=> https://nsw2u.in nsw2u
diff --git a/garden/os/openbsd.md b/garden/os/openbsd.md
deleted file mode 100755
index d5025cb..0000000
--- a/garden/os/openbsd.md
+++ /dev/null
@@ -1,30 +0,0 @@
-## installation
-
-https://www.openbsd.org/faq/faq14.html#softraid
-
-remember to run `ifconfig re0 up` before starting any shell operations
-
-## package manager
-
-https://www.openbsd.org/faq/faq15.html#Intro
-
-apt search | pkg_info -Q
-apt install | pkg_add
-apt remove | pkg_delete
-
-## wifi
-
-run `ifconfig` and get name of wifi interface (for example, mine is `urtwn0`)
-
-make a text file (as root) at `/etc/hostname.InterfaceName` (for example, `/etc/hostname.urtwn0`) with the following contents:
-
-```
-join SSID wpakey WIFIPASSWORD
-inet autoconf
-```
-
-then run `doas sh /etc/netstart`
-
-## misc
-
-there is no `lsblk`. to get a list of all disks connected, run `sysctl hw.disknames`
diff --git a/garden/vlc.gmi b/garden/vlc.gmi
deleted file mode 100755
index 542cdb3..0000000
--- a/garden/vlc.gmi
+++ /dev/null
@@ -1,37 +0,0 @@
-# Using VLC via its ncurses frontend with equalizers
-
-1. Install VLC.
-2. Open VLC and drag some music in.
-3. While playing some music, open the Tools > Effects and Filters menu. Play around with the presets until you find one that sounds good.
-4. Write down the name of the preset you used and then close VLC.
-5. In a terminal, "cd" to where the music you want to play is.
-6. In that terminal, execute this command:
-
-```
-cvlc --equalizer-preset=INSERT_PRESET_NAME_HERE -I ncurses *.ext
-```
-
-".ext" is the file extension of your music files, like ".mp3" or ".flac".
-
-Here is a list of possible presets as of 2020:
-
-* flat
-* classical
-* club
-* dance
-* fullbass
-* fulltreble
-* fullbasstreble
-* headphones
-* largehall
-* live
-* party
-* pop
-* reggae
-* rock
-* ska
-* soft
-* softrock
-* techno
-
-Pressing the "h" key will open the help menu, which will show you the plyer controls.
diff --git a/img/AlmondMilkMeme.jpg b/img/AlmondMilkMeme.jpg
new file mode 100755
index 0000000..f7a6639
Binary files /dev/null and b/img/AlmondMilkMeme.jpg differ
diff --git a/img/UterusPin1.png b/img/UterusPin1.png
new file mode 100755
index 0000000..981fe02
Binary files /dev/null and b/img/UterusPin1.png differ
diff --git a/img/UterusPin2.png b/img/UterusPin2.png
new file mode 100755
index 0000000..6a03d82
Binary files /dev/null and b/img/UterusPin2.png differ
diff --git a/img/UterusPin3.png b/img/UterusPin3.png
new file mode 100755
index 0000000..242e134
Binary files /dev/null and b/img/UterusPin3.png differ
diff --git a/img/jett-Neuralblender.png b/img/jett-Neuralblender.png
deleted file mode 100755
index 7fe014f..0000000
Binary files a/img/jett-Neuralblender.png and /dev/null differ
diff --git a/img/jett-StableDiffusion.jpeg b/img/jett-StableDiffusion.jpeg
deleted file mode 100755
index 97063cd..0000000
Binary files a/img/jett-StableDiffusion.jpeg and /dev/null differ
diff --git a/img/jett-WOMBO-analogue.jpg b/img/jett-WOMBO-analogue.jpg
deleted file mode 100755
index eca5ff6..0000000
Binary files a/img/jett-WOMBO-analogue.jpg and /dev/null differ
diff --git a/img/jett-WOMBO-nostyle.jpg b/img/jett-WOMBO-nostyle.jpg
deleted file mode 100755
index cd3d34f..0000000
Binary files a/img/jett-WOMBO-nostyle.jpg and /dev/null differ
diff --git a/index.html b/index.html
index 96bae5e..3e06d61 100755
--- a/index.html
+++ b/index.html
@@ -17,7 +17,7 @@
diff --git a/poetry/a/airborne.txt b/poetry/a/airborne.txt
index aa54304..ee6909a 100755
--- a/poetry/a/airborne.txt
+++ b/poetry/a/airborne.txt
@@ -42,7 +42,7 @@ you'd live together with her until the cessation of time?
dear child, you remembered your wings and recalled how to fly
but you're being chased to a cliff and the edge looms nearby:
-will you prostate yourself and live in self-scorn?
+will you prostrate yourself and live in self-scorn?
or jump off the edge and trust you'll become airborne?
***
diff --git a/poetry/index.html b/poetry/index.html
index 9f01cc1..afca683 100755
--- a/poetry/index.html
+++ b/poetry/index.html
@@ -187,13 +187,15 @@
│ ├── wip.txt
│ ├── withering.txt
│ └── wme.txt
- └── y
- └── YOU-NEED-TO-KNOW.txt
+ ├── y
+ │ └── YOU-NEED-TO-KNOW.txt
+ └── z
+ └── zircons_beacon.txt
diff --git a/poetry/z/zircons_beacon.txt b/poetry/z/zircons_beacon.txt
new file mode 100755
index 0000000..45bf4a7
--- /dev/null
+++ b/poetry/z/zircons_beacon.txt
@@ -0,0 +1,42 @@
+ZIRCON'S BEACON
+2023-01-01
+
+***
+
+before, in your grief, you sigh with a tear
+"it would be better for everyone if I disappeared"
+just remember every person who's ever held you dear
+
+with faces erased and memories decayed
+who recall your actions if not your own name:
+"She brightened, even if only for a moment, my days."
+
+but these last six months, you've in bed languished
+as all the things you counted on from you slipped:
+the promise of employment, the hope of safety,
+the Outside-bound ticket messless and pain-free
+
+you jumped from the cliff as exhorted last Oracle
+and unfurled your wings to catch all the wind you could hold
+but while has deepened the bond with your wife
+this is not true flight but only slow glide
+
+gradual realization that in life you lost
+while the destination grows anything but soft:
+the climate beats harsher, economy bereft,
+hordes at the gates demanding your own death
+
+wings too weak to your body elevate
+but is there strength to turn elsewhere you'll less hate?
+one of these days you'll be free again
+can you find a way to survive until then?
+
+I hold this zircon gem up to the sky
+in hopes it'll catch the fading sunset light
+and scatter to fire, diamond-like rainbow:
+my beacon follow to know where to go
+
+***
+
+
+CC BY-NC-SA 4.0 (c) Vane Vander
diff --git a/style.css b/style.css
index dc1c286..a96edbf 100755
--- a/style.css
+++ b/style.css
@@ -73,7 +73,7 @@ i, em {
}
img.big {
- width: 100%;
+ max-width: 100%;
height: auto;
}
diff --git a/tutorials/gemini-tor.html b/tutorials/gemini-tor.html
deleted file mode 100755
index 08e60f6..0000000
--- a/tutorials/gemini-tor.html
+++ /dev/null
@@ -1,49 +0,0 @@
-
-
-
-
- How to virtualhost on Gemini using Tor - Archive - MayVaneDay Studios
-
-
-
-
-
-
-
-
How to virtualhost on Gemini using Tor
-
published: 2020-11-14
-
-
-
-
This guide will assume you are using a Debian-based system.
-
-
Install Tor and Jetforce, a Gemini server.
-
-
sudo -H pip3 install jetforce; sudo apt install tor
-
-
Set up a Tor hidden service.
-
-
Add the following lines to /etc/tor/torrc, adjusting as necessary:
1965 is Gemini's default port and the one clients will expect the server to be listening on. 1966 will be the actual port the second server instance is running on. This will allow the server serving the clearnet version to use the default port. Do not worry about the port numbers not matching; Tor will redirect Tor traffic on 1966 to the proper server to look like it is also running on 1965.
-
If you need multiple hidden services, copy these lines again, changing the HiddenServiceDir path to a different one and changing 1966 to a different port not in use.
The "http://" in front of the address is important as that tells Caddy to not try to enable HTTPS for that website. HTTPS is unnecessary for I2P eepsites as all traffic to and from the server is already encrypted in transit. And since I2P eepsites aren't accessible on the normal clearnet, the request for Let's Encrypt to give Caddy a certificate would fail as they wouldn't be able to access the domain.
I have a Kobo Libra H2O. It's a little e-ink tablet-like device. While the specs aren't great, it does run Linux, which means theoretically one can run whatever programs they want on it! ...As long as those programs are line-based command-line or written for Kobo's special flavor of Qt.
-
-
-
-
Getting shell access to your Kobo
-
The first step is getting KOReader on the Kobo. Not only is it a much better reading app than the Kobo's built-in Nickel, it also includes a terminal emulator, a text editor, and a SSH server. The install instructions are on the KOReader wiki. I personally recommend using the NickelMenu installation method halfway down the page.
-
After you have KOReader set up, plug your Kobo into a computer with a USB cable.
-
cd /path/to/your/kobo/
-
cd ./.adds/koreader/settings/SSH/
-
ssh-keygen -trsa -b 2048 -f ~/.ssh/kobo
-
cp ~/.ssh/kobo.pub ./authorized_keys
-
Safely disconnect your Kobo from your computer. Go into KOReader, then tap the gear icon on the top of the screen. Tap "Network". Connect to the same WiFi network your computer is on, then tap on "SSH server" and then "Start SSH server".
The first three we will install on your Kobo. The last one will go on the server that runs your Gemini site.
-
I specifically picked programs written in Golang because they compile to a single binary. This means no trying to manually resolve dependencies, since the Kobo doesn't have a package manager installed (that I could see). However, they still must be compiled for ARM. I compiled them on my Raspberry Pi 4 (which is also an ARM device) and copied the resulting binaries to my computer. If you want to cross-compile on your local computer instead, you're on your own.
-
The config file for dave needs to go in ~/.swd/config.yaml on the remote server. It should look something like this:
-
-address: "domain.tld" # the bind address
-port: "7778" # the listening port
-dir: "/path/to/your/gemsite/files" # the provided base dir
-prefix: "/" # the url-prefix of the original url
-users:
-# user: # with password 'foo' and jailed access to '/home/webdav/user'
-# password: "HASHED_PASSWORD"
-# subdir: "/user"
- YOURUSERNAME: # with password 'foo' and access to '/home/webdav'
- password: "HASHED_PASSWORD"
-tls:
- keyFile: gemini.key
- certFile: gemini.crt
-
-
You can make a HASHED_PASSWORD by running davecli passwd and following the prompts.
-
After that, you need to get TLS certificates so kurly doesn't shit its pants complain about having no certificates.
This will put all the certificates installed on your computer onto your Kobo. If this is too much for you, you can instead just upload the public key you used for your WebDAV server above (Gemini uses TOFU for its TLS and thus doesn't require a certificate store). Just change the extension to .pem first before uploading.
-
Put your binary program files in /bin/.
-
At this point, you should be all set up. You can disconnect from the SFTP server and turn the SSH server on your Kobo off.
-
-
-
The fun commands
-
Next to the gear icon at the top of the KOReader menu is a tool icon. Press it and then press "More tools". There's a terminal emulator!
-
Except it's not interactive, only processing one command at a time, and it doesn't save the state of the terminal in between sessions. While vi is installed, curiously, it's really only for debugging over SSH and isn't usable here. Best case scenario, it'll only print a bunch of terminal control characters and then exit without letting you do anything.
-
To look at an HTTP/S site: /bin/kurly http://example.com | /bin/godown | grep -v -e '^$'
-
To look at a Gemini site: /bin/gemget -o - gemini://domain.tld
-
To upload a text file: /bin/kurly -T /path/to/file.txt -u 'username:password' "https://domain.tld:port/"
-
These are quite a lot to type every time. I recommend saving them as shortcuts so you only have to change the domain or the file path every time instead of retyping everything.
-
-
-
diff --git a/tutorials/kristall-haiku.html b/tutorials/kristall-haiku.html
deleted file mode 100755
index 088f852..0000000
--- a/tutorials/kristall-haiku.html
+++ /dev/null
@@ -1,42 +0,0 @@
-
-
-
-
- How to install the Kristall browser in Haiku - Archive - MayVaneDay Studios
-
-
-
-
-
-
-
-
How to install the Kristall browser in Haiku
-
published: 2020-06-09
-
-
-
-
Disclaimer: This was tested with Haiku nightly hrev54304. You may have to install more or different dependencies if you are using the r1beta2 release instead.
Edit .config/default.yml with your terminal editor of choice.
-
url should be the URL of your server.
-
Assuming you don’t know what you’re doing, which is probably true if you’re reading this, uncomment the line that says port: 443. This will make Misskey start its own web server on port 443 (the HTTPS port).
-
Uncomment the key: and cert: lines. Replace example.tld in the file path with the same URL as you used above, omitting the https:// at the beginning.
-
Under the user: postgres line, there should be a password line. Make sure it is uncommented and put in the password that you set up earlier.
-
Uncomment the autoAdmin: true line. This will make the first user registrated on the instance the admin of the instance. Hopefully this is you!
-
-
Set up PostgreSQL:
-
-
exit
-
su - postgres
-
You are now logged in as the postgres user. Type in psql and press enter. A different command prompt should show up. Type in CREATE DATABASE misskey; and follow whatever instructions it gives you.
-
-
-
Set up SSL:
-
-
exit
-
certbot certonly -d example.tld
-
example.tld should be the URL you previously configured in the Misskey config file. Make sure that your DNS is properly set up to point to your server’s IP address.
-
Follow the instructions Certbot gives you.
-
-
Compile Misskey:
-
-
su - misskey
-
cd misskey
-
NODE_ENV=production npm run build
-
Sit back for a hot minute while it compiles. If you have 2 GB or less of RAM, pick a god and pray. If you have less than 1 GB of RAM and you’ve somehow made it this far, nuke your server and give up now.
-
After that’s done, run npm run init to set up the Misskey database.
-
-
Run Misskey:
-
-
cd ~
-
byobu
-
You are now in Byobu. This is a window manager for the command line. This will allow you to daemonize Misskey (run it in the background) without using systemd, which is an absolute pain in the ass to diagnose and fix.
-
cd misskey
-
sudo NODE_ENV=production npm start
-
If everything looks good (there are no fatal error messages), open your configured URL in a web browser and complete setup from the web interface.
-
When you want to close the terminal, press Ctrl and A at the same time. Pick the first option for whatever Byobu nags you about. Press Ctrl and A again, and then press D. You should get a “detached from session” message. Log out of the misskey user and then the root user until the terminal disconnects from the server.
-
If Misskey ever locks up or it uses more than 70% of the server’s CPU, either:
-
-
log in as root, run systemctl reboot now to reboot the server, then log in as root, su - misskey, and repeat step 10 to get Misskey running again.
-
use your VPS provider’s dashboard to reboot the server, then log in as root, su - misskey, and repeat step 10 to get Misskey running again.
At the very least, you need the launcher APK, ratc.bin, and exploit.html. These files should also be accesible on this XDA Forums thread.
-
Rename exploit.html to index.html.
-
Setup the crash server.
-
Run sudo python3 -m http.server --bind YOUR_COMPUTERS_LOCAL_IP_HERE 80 in the directory with the index.html file in it.
-
Crash your Nook's browser to enable ADB.
-
Open http://YOUR_COMPUTERS_LOCAL_IP_HERE in your Nook's built-in web browser (make sure that your computer and Nook are on the same network). The browser should refresh a few times and then crash to the home menu.
-
Connect to your Nook over ADB.
-
adb connect YOUR_NOOKS_LOCAL_IP_HERE
-
If ADB refuses to connect, run step 3 again until it connects. This might take one try; this might take a hundred tries.
-
Get and edit /init.rc.
-
adb pull /init.rc
-
Open /init.rc in your favorite text editor.
-
Find the line that says service adbd /sbin/adbd.
-
Below that should say disabled. Change that to enabled.
-
Get root access.
-
Repeat step 4 to connect to the Nook. Once connected:
-
adb push ratc.bin /sqlite_stmt_journals
-
adb shell
-
cd /sqlite_stmt_journals
-
/system/bin/chmod 777 ./ratc.bin
-
./ratc.bin
-
Several lines of output will appear. Do not press anything. A few seconds later, adb will disconnect you.
-
adb kill-server
-
Push the patched init.rc to the Nook.
-
Repeat step 4, as usual.
-
adb push init.rc /
-
If all goes well, your Nook should now be rooted with adbd running on reboot.
-
Go to the source link on the top of these instructions and install whatever apps you want. You must install, at the very minimum, ru.mynook.launcher.apk in order to access any of the other third-party apps installed.
-
-
-
diff --git a/tutorials/oasis.html b/tutorials/oasis.html
deleted file mode 100755
index ecfc6ff..0000000
--- a/tutorials/oasis.html
+++ /dev/null
@@ -1,80 +0,0 @@
-
-
-
-
- How to run Oasis, a Secure Scuttlebutt client, on a remote server - Archive - MayVaneDay Studios
-
-
-
-
-
-
-
-
How to run Oasis, a Secure Scuttlebutt client, on a remote server
-
published: 2021-11-13
-
-
-
-
This tutorial assumes you already have a functioning Node.js and Caddy installation.
-
-
Install Oasis.
-
- git clone https://github.com/fraction/oasis.git cd oasis npm install
-
Test the installation by running node . (yes, including the period).
-
-
If the output stops after a few lines and isn't an obvious Node error, hit Control and C at the same time to exit; you're ready for the systemd file.
-
If you get an error about port 3000 already being in use, use the command node . --port PORTNUMBER instead, where PORTNUMBER is any open port you want.
EXTREMELYLONGCADDYHASHHERE is used instead of an actual password so you don't have cleartext credentials hanging around. Generate this with caddy hash-password. Make sure you save your actual password in a password manager, as you can't reverse a hash!
-
The header_up lines are there to trick Oasis into thinking it is running on a local machine, as it (very aggressively) wants to be. Normally this would be true, as Secure Scuttlebutt is peer-to-peer and intended to be run on a personal device that may see intermittent internet connectivity. However, if you're looking at this tutorial, you probably want to host a public peer as an actually functioning alternative to a pub or room.
Uncomment them by deleting the # mark in front of each line.
-
If you want, you can change the HiddenServiceDir directory, but you will need to remember it for later. For security purposes, keep the new directory inside of /var/lib/tor/.
-
-
Restart the Tor service.
-
-
sudo systemctl restart tor@default
-
-
As root, go to the hidden service directory and get the new hidden service's domain.
-
-
sudo -i
-
cd /var/lib/tor/directory/
-
Replace "directory" with the actual directory you chose in step 3.
-
cat hostname
-
If all is well, you should now see a long string of letters and numbers that ends in ".onion". Copy this somewhere safe. You'll need it next step.
-
-
Configure Caddy to serve the hidden service.
-
-
Open /etc/caddy/Caddyfile with your favorite text editor. You should already be root, but if you did exit after getting the Tor hostname, just sudo -i again.
The "http://" in front of the address is important as that tells Caddy to not try to enable HTTPS on that domain. HTTPS is unnecessary for Tor hidden services as all traffic to and from the server is already encrypted in transit. And since Tor hidden services aren't accessible on the normal clearnet, the request for Let's Encrypt to give Caddy a certificate would fail as they wouldn't be able to access the domain.
-
-
-
diff --git a/tutorials/playlist-clip.html b/tutorials/playlist-clip.html
deleted file mode 100755
index 4ed1d1c..0000000
--- a/tutorials/playlist-clip.html
+++ /dev/null
@@ -1,44 +0,0 @@
-
-
-
-
- How to make playlists on the SanDisk Clip Sport on Linux - Archive - MayVaneDay Studios
-
-
-
-
-
-
-
-
How to make playlists on the SanDisk Clip Sport on Linux
-
published: 2019-08-13
-
-
-
-
-
Make a playlist with the songs you want in VLC.
-
Save said playlist as an .m3u file. (Other playlist file types will not work.)
-
Make a copy of said playlist file. Open it up in a text editor of your choice.
-
Remove all the lines that start with "#EXTINF".
-
Using the find-replace function, change the following strings:
-
-
Whatever the path to your main music folder on your computer is, starting with "file:///", to "\Music". For example, the path to my main music library is file:///mnt/Hell3/Music/Music Archive/Popular. (My music is sorted into "Popular", "Soundtrack", and "Vaporwave".)
-
"%20" to " " (that is, a space).
-
"/" to "\".
-
-
Change the end-of-line markers to the DOS/Windows version.
-
-
Open a terminal and cd to the directory you saved the copy of your playlist in, then type the following:
-
unix2dos playlist-copy.m3u
-
-
Plug in your Clip Sport player. Make sure it is mounted properly (ie. not as a read-only device) before proceeding.
-
Copy the playlist you just converted in step 6 to the "Playlists" folder, and your music to the "Music" folder.
Create a persistent volume in Tails. If you already have a persistent volume configured with Additional Software, Dotfiles, and Personal Data enabled, skip to step 2.
-
-
After your first boot, go to the Applications menu in the top left corner. Open the Tails menu, and then select “Configure persistent volume”. Follow the on-screen instructions. At the very least, enable Additional Software, Dotfiles, and Personal Data. When the on-screen instructions tell you to reboot, do so.
On boot, go to the advanced settings button in Tails Greeter (the first window that pops up, before you go to the desktop). Click on the plus button, then select Administration Password. Type in a password of your choice and click Add.
-
-
Install Syncthing.
-
-
sudo apt install syncthing
-
-
Configure Syncthing to use Tails’ SOCKS5 proxy and use your Persistent folder for its configuration.
-
-
Open ~/.bashrc in your favorite text editor. At the end of the file, add the following lines:
-
export all_proxy=socks5://127.0.0.1:9150
-
alias sta=‘syncthing --home=/home/amnesia/Persistent/.config/syncthing’
-
Save and close the file. Copy it into your persistent Dotfiles folder, usually at /live/persistence/TailsData_unlocked/dotfiles/.
-
-
Initialize and start Syncthing.
-
-
Reboot and unlock your persistent volume. Once on the desktop, open a terminal and type sta.
-
-
Configure Tor Browser to connect to the Syncthing web interface.
-
-
Open Tor Browser (obviously). Open the hamburger menu and click on Preferences. At the very bottom, click on “Settings” next to “Configure how Tor Browser connects to the internet”. In the “no proxy for” box, type in “127.0.0.1” without the quotes.
-
Click the OK box and exit Preferences. Open another terminal and type:
This will dump each individual 8x8 tile into its own separate BMP file. Please be warned: this may generate more than a hundred files in that folder! Best to keep each separate chrXXX.bmp file in its own folder to keep everything organized.
The "http://" in front of the address is important as that tells Caddy to not try to enable HTTPS for that website. HTTPS is unnecessary for Yggdrasil hidden services as all traffic to and from the server is already encrypted in transit. Besides, Let's Encrypt wouldn't be able to issue a certificate for an IP address anyway.
-
-
Restart Caddy to apply your changes.
-
-
sudo systemctl restart caddy
-
-
Get some peers for Yggdrasil.
-
-
Open this page in a new tab on your browser. On your server, open /etc/yggdrasil.conf as root with your favorite text editor.
-
At the top of the configuration file will be a section that looks like this:
-
Peers: []
-
Pick some peers from the list and add them to that section of the file (one per line) so it now looks something like this:
-
-
-
diff --git a/tutorials/zeronet.html b/tutorials/zeronet.html
deleted file mode 100755
index d57dfc4..0000000
--- a/tutorials/zeronet.html
+++ /dev/null
@@ -1,103 +0,0 @@
-
-
-
-
- How to set up a detached and encrypted ZeroNet seedbox on a Raspberry Pi - Archive - MayVaneDay Studios
-
-
-
-
-
-
-
-
How to set up a detached and encrypted ZeroNet seedbox on a Raspberry Pi
-
published: 2019-11-06
-
-
-
-
-
Format a USB stick with LUKS:
-
-
sudo apt install gnome-disk-utility cryptsetup
-
If you're running a different distro on your server, the package name will likely vary: it's usually some form of gnome-disks. cryptsetup is required for LUKS, and for some reason, apt doesn't install it by default.
-
Once it installs, make sure your USB stick is plugged in, open a terminal, and run sudo gnome-disks.
-
Hit the gear icon below the partition table and choose Format Partition, then choose LUKS. Enter a strong password (that you'll remember, of course). In the "Volume Label" section, enter "zeronet" just to make this guide a little easier.
-
-
Mount the USB stick:
-
-
sudo nano -$ /etc/fstab
-
Put the following line on the bottom:
-
/dev/disk/by-label/zeronet /mnt/zeronet auto user,nosuid,nodev,nofail,x-gvfs-show 0 0
-
Reboot your server.
-
If /mnt/zeronet isn't accessible by non-root users, execute the following command to fix that:
-
sudo chmod -R 777 /mnt/zeronet
-
Please note that 777 isn't the safest of permissions; if you know your username and group, a chown instead is safer:
-
sudo chown -R username:group /mnt/zeronet
-
-
Download and install the latest version of ZeroNet:
-
-
cd /mnt/zeronet
-
git clone https://github.com/HelloZeroNet/ZeroNet
-
cd ZeroNet
-
sudo -H pip3 install -r requirements.txt
-
Enable the UiPassword plugin, and remove the Multiuser plugin to avoid future issues:
-
mv plugins/disabled-UiPassword plugins/UiPassword
-
rm -rf plugins/disabled-Multiuser
-
Then configure it to be accessible over the network: