Короче, запустил ебучий skype в docker, глюков нету, аудио работает, видео работает, лагов нету.
Пускаю вот так:
sudo docker run -d -p 55555:22 --device=/dev/video0:/dev/video0 skype:videoperm
Где skype:videoperm это мои REPOSITORY:TAG
docker' в группу video:
sudo docker exec adduser docker video
`Инструкция отсюдова.
CC brw_state_batch.lo
CC brw_state_cache.lo
ПОКАЗАЛОСЬ.
На самом деле понимаю дедфудика, который с таким удовольствием
прошел курс по computational biology и захотел еще. Когда велосипедишь какие-то
алгоритмы, то голова работает по-другому. Соответственно, удовольствие от
выполненых задач тоже другое.
Раньше у меня было правило - перед началом работы быстрокодировать всякие
алгоритмы или порешать матанец около часа. Позволяло разогнать мозг (а не
замедлить чтением редита или бнв).
Пора возраждать хорошие привычки, хуле.
Чтобы пост не был простым высером /r/ (полезные) ритуалов, которые ты юзернейм
выполнешь перед тем, как начать делать что-то обыденно-скучное типа работы.
I am passing this on to you because it definitely worked for me today,
and we all could probably use more calm in our lives.
Some doctor on TV this morning said the way to achieve inner peace is to
finish all the things you have started. So I looked around my house to
see things I'd started and hadn't finished so I have managed to finish
off a bottle of Merlot, a bottle of Chardonnay, a bodle of Baileys, a
butle of wum, a pockage of Prungles, tha mainder of bot Prozic and
Valiuminun scriptins, the res of the chesescke an a box a chocletz. Yu
haf no idr how bludy fablus I feel rite now.
Plaese sned dhis orn to dem yu fee ar in ned ov iennr peaze.
An telum,u blody luvum!!
Шекурный (по заверениям) жабер сервер с зеркалом в tor.
https://securejabber.me/
Из битемаджего [chan] privacy:
Truecrypt certainly is better than notusing encryption at all. If you want whole disk encryption look into dm-crypt, else veracrypt/gostcrypt or GPG will do fine.
If you really are concerned about backdoors that much I like to show you the following:
Ever heard of intrinsics? It's about using hardware-implemented functions. To see what intrinsics your processor supports run "cat /proc/cpuinfo" (on unix-systems).
Intel processer povide intrinsics for AES and if you have a modern computer with an intel cpu, you are sure to have those intrinsics. And openssl happily uses these intrinsics per default. Here is a minor problem:
If you know how AES works, you know that encryption and decryption take the same amount of work. When using the openssl functions for AES encryption (not the ones which use intrinsics!!!) however, encryption can take roughly twice as long as decryption. now let's look at the intrinsic: If you benchmark those functions you'll notice that encryption takes waaayyy too long compared to decryption.
Of course that doesn't proove that there's a backdoor, but if you have sensitive information whiches security is in your hands, you should keep the above information in mind.
If you use veracrypt, you will have options available to disable intrinsics. To my knowledge, dm-crypt uses intrinsics per defualt. Feel free to run cryptsetup benchmark.
If you want to be sure that there is no hardware backdoor, I suggest you use an uncommon cipher such as serpent that have no intrinsics available. Keep in mind that doesn't make https and gpg magically stop using AES. I will yet have to find out myself how to disable intrinsics in dmcrypt and openssl and would be most grateful if someone on BM could post the answer.
KISS:
If you handle very sensitive stuff, make sure you do not use intrinsics. And don't forget to airgap your machine.
For personal use, veracrypt (and in my point of view truecrypt too, correct me if I'm wrong) are most suitable and I enjoy the acceleration provided by intrinsics.
Though to make it harder for NSA to spy on you and learn something new, feel free to do some custom stuff such as a hardware number generator or a seperately encrypted container for your personal keys.
Here are my sources:
http://www.ct.de/cs1403154
https://en.wikipedia.org/wiki/AES_instruction_set
https://wiki.archlinux.org/index.php/Dm-crypt/Device_encryption
[feel free to add more, such as sources direct from openssl]
[maybe someone could provide more details about backdoors in instruction sets]