Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
docs:guide-developer:toolchain:buildroot.exigence.macosx [2022/04/04 01:49] – improved Thudnerbird, GnuPG tool paragraphs, added a Caution paragraph on using 3rd-party pkg-mngr, Changed TFTP info, etc aterikdocs:guide-developer:toolchain:buildroot.exigence.macosx [2022/04/04 11:52] (current) – adding info on "PumpKIN" tool (opensource, free, GUI based TFTP server & client for macOS), etc aterik
Line 71: Line 71:
 it is opensource & free //(3rd-party)// pkg-mngr for macOS, etc. Homebrew was built 7yrs after MacPorts pkg-mngr //(formerly known as ''DarwinPorts'')//. it is opensource & free //(3rd-party)// pkg-mngr for macOS, etc. Homebrew was built 7yrs after MacPorts pkg-mngr //(formerly known as ''DarwinPorts'')//.
  
-● Notice / WARNING / __CAUTION__ **:** homebrew is opensource pkg-mngr but this tool is programmed by it's developers to share user'usage & private data with Ggl (including IP-address, which is private & tracking data), [[wp>Criticism_of_Google|Ggl]] stores user's all data forever for whatever purpose they want to use it for<sup>[[https://news.ycombinator.com/item?id=11566720|1]], [[https://docs.brew.sh/Analytics|2]]</sup>, homebrew also changes permission where it should avoid<sup>[[https://applehelpwriter.com/2018/03/21/how-homebrew-invites-users-to-get-pwned/|1]]</sup>+● Notice / WARNING / __CAUTION__ **:** homebrew is opensource pkg-mngr but this tool uses Google Analytics to collect usage telemetry. If you use homebrew: use OPT OUT option/command,  <code bash>brew analytics off</codeor by setting <code bash>export HOMEBREW_NO_ANALYTICS=1</code>
-  * You can/may **avoid //(or skip)// reading below paragraphs under this "Warning" section**, //(if you want to)//. +
-  * if cigarette can have cancer warning on smoking, then other life-threatning or very harmful or human-rights violating things also needs to have warning / caution / notice label. Excessive data collection & sharing by Ggl & similar other businesses have caused life-threat or grave harms for multiple individuals, //(and also in mass-scale)//. Criminals have-to register & notify various database to show where they are located, and criminals cannot locate themselves close to non-criminals areas. See more info, court case info on Ggl & similar others: [[https://www.BBC.co.uk/news/technology-11827862|1]], [[https://www.HRW.org/english/docs/2006/08/09/china13940.htm|2]], [[https://www.TheGuardian.com/world/2013/jun/06/us-tech-giants-nsa-data|3]], [[http://GeekFeminism.org/2010/06/10/hacker-news-and-pseudonymity/|4]], [[http://curia.Europa.eu/jcms/jcms/P_127116/|5]], [[https://www.NYTIMES.com/2014/05/14/technology/google-should-erase-web-links-to-some-personal-data-europes-highest-court-says.html|6]], [[https://www.Reuters.com/article/us-google-privacy-france-idUSBREA161BS20140207|7]], [[https://www.Bloomberg.com/apps/news?pid=20601109&sid=agImLlGaNKaw&refer=home|8]], [[https://www.NYTIMES.com/2013/11/19/technology/google-to-pay-17-million-to-settle-privacy-case.html?partner=rss&emc=rss|9]], [[https://www.NYTIMES.com/2019/09/04/technology/google-youtube-fine-ftc.html|10]], [[https://www.NYTIMES.com/2013/06/07/us/nsa-verizon-calls.html|11]], [[https://www.Salon.com/2014/02/05/4_ways_google_is_destroying_privacy_and_collecting_your_data_partner/|12]], [[http://EPIC.org/privacy/gmail/faq.html#13|13]], [[https://web.archive.org/web/20100528181755/http://finance.yahoo.com/news/Google-grabs-personal-info-apf-2162289993.html?x=0|14]], [[https://www.ComputerBase.de/2011-09/google-plus-klarnamenzwang-disput-verwirrt-unionspolitiker/|15]], [[http://www.DW-World.de/dw/article/0,,6006085,00.html|16]], [[http://SeerPress.com/czech-republic-blocks-googles-data-mapping-feature/7691/|17]], [[https://www.ZDnet.com/article/dutch-government-report-says-microsoft-office-telemetry-collection-breaks-gdpr/|18]], [[https://www.ASPI.org.au/report/uyghurs-sale|19]], [[https://www.ACLU.org/blog/national-security-technology-and-liberty/aclu-files-lawsuit-challenging-nsas-patriot-act-phone|20]], [[https://web.archive.org/web/20130609085431/http://www.paul.senate.gov/?p=press_release&id=838|21]], few more [[wp>Google_litigation|here]]. +
-  * Assistance to such mass scale data theft / collection activities are also given & provided by, and supported + promoted by (official/unofficial) partners, supporters & enablers & software developers, etc. All of them are assisting & submitting private<sup>[[wp>Right_to_privacy|1]], [[wp>Information_privacy|2]], [[wp>Consumer_protection|3]], [[wp>Consumer_privacy|4]]</sup> & tracking data into Ggl & others. So all of our all activities are digitally tracked / recorded //(without court warrants)//, it means we are all inside virtual / cyber / digital jail(s), we are arrested+observed+monitored inside jail(s) without commiting crime and despite our objections to any such jails(s), such //[[wp>Privacy_concerns_regarding_Google|(anti privacy-rights, anti freedom/liberty, etc) activities]]//<sup>[[wp>Invasion_of_privacy|1]]</sup> are not only unconstitutional in USA<sup>[[wp>Privacy_laws_of_the_United_States#Constitutional_basis_for_right_to_privacy|1]], [[wp>Fourth_Amendment_to_the_United_States_Constitution|2]], [[wp>California_Consumer_Privacy_Act|3]], [[wp>Consumer_protection|4]]</sup>, those activities also violating international<sup>[[https://research.un.org/udhr70/12-21|1]]</sup> agreements & laws<sup>[[wp>Right_to_privacy|1]], [[wp>Privacy_law|2]], [[wp>Information_privacy_law|3]]</sup> on human-rights<sup>[[https://www.UN.org/en/about-us/universal-declaration-of-human-rights|1]], [[wp>General_Data_Protection_Regulation|2]]</sup>, & such activities also create more opportunities for more mass scale crimes & violations & exploitations, & also create more opportunities to go after //(or target)// specific individual human/person(s). +
-  * if you use homebrew**:** then use OPT OUT option/command in homebrewto opt out from their data collection/theft of your usage/personal data, and that is not enough, also load specific site connection blocker //(to block Ggl [[wp>Privacy_concerns_regarding_Google|Analytic]], etc)// configuration or settings in your computer or in your firewall app/rule or in your computer's ''hosts''<sup>[[https://github.com/StevenBlack/hosts|1]]</supfile. +
-    * macOS (until 10.14.x macOS Mojave) uses ''/etc/hosts'' file, & macOS (10.15.x) Catalina uses ''/private/etc/hosts'' file. <code>0.0.0.0 google-analytics.com +
-0.0.0.0 www.google-analytics.com</code> +
-    * sometime above ''hosts'' file based solution is not-enough : ip-addresses (and ranges) of Ggl Analytic site need to be blocked carefully via firewall rules, for specific app(s)/tool(s). +
-  * Most of the time, private data & private tracking-data theft / collection / recording by //(Ggl or other)// search engine is not possible to block normally at all. Whenever you or an app/tool connects with //(Ggl or other)// search engine **directly** to search for something, then that //(Ggl or other)// search engine can collect / record ip-address, search string, app info, USER-AGENT info, etc various private & tracking data/info, and then some search engine company/corporation //(in.example: Ggl)// stores such private & tracking data permanently forever. So also see: [[https://stackoverflow.com/a/1251931|1]], [[wp>Search_engine_privacy|2]], [[https://www.eff.org/deeplinks/2020/03/google-says-it-doesnt-sell-your-data-heres-how-company-shares-monetizes-and|eff]]. +
-  * so to overcome this type of mass-scale & human-rights violating data tracking & theft, you would need to use proxy or VPN or Tor or SSH based **indirect** connection //(or tunnel or network-connection)// into //(Ggl or other)// search engine. Search engine //(in.example: Ggl)// will still record/steal ip-address tracking //(and other private)// data //(forever)// but that will be VPN or Tor or SSH or proxy exit-point's ip-address. +
-  * do not encourage //(your family or)// others to expand data theft or digital jail or more abuse or more violation. +
-    * create //(tiny or small or big)// barriers/obstacles for greedy monsters & criminals who are recording private data.\\ private data is your private property. your voice, your face, your fingerprint, your body, your private-key, your own //(personal & private)// data, etc are your private property. if any software transfers/stores/copies these private data out of your device into any type of remote server or remote cloud or remote processing, then it violated your privacy rights & other human-rights. //( CPU, GPU, etc are now powerful to process such data inside a computing device. Even if it is slow to process, private data cannot goto remote/cloud location, if it goes then it does not remain "private" anymore, & that is a violation. Privacy & security of private data, etc are more important for human safety than convenience of "fast"/"faster" word based deceptive responses )//.\\ your family is your family property, your family is not any other family's or any other non-family person's property. but you do not have right to violate human-rights on even your own family members.\\ to prevent violations & to prevent spread of harm & to prevent impunity for crimes //(or violations)//, when any private //(or public)// entity //(or association or business)// which begins to store/collect multiple other public / person's info, or when begins to do any type of business or when begins to provide service for multiple people/person, then this type of entity //(or association or business)// MUST be under inspection, oversight, accountability, etc. public element of accountability data must be made available to public, so that public is informed & can take informed decision.\\ access to information is human-rights //(essential for human brain & healthy mind)//, in the way: access to water is human-rights //(essential for human body)//.\\ if such entity //(or association or business)// can operate with impunity of their crimes & human-rights violations & consumer-rights violations, then it is not-good & not-beneficial entity in the long run for human //(or earth)//.\\ Human-rights violating laws passed by corrupt group of politicians or brainwashed (or ignorant or unbalancely informed) citizens are actually not-good law & actually not-"law" //(such is "corruption" & "violation" & "injustice", "inequality" etc)// & such is not-good for human / family / society / community / country / earth in the long run.\\ in.example: if you mock or say to a person without shirt, he is inferior than you //(or your brother or your father)//, after you //(or your brother or your father)// steal the shirt from him //(or from his brother or father, who were to give the shirt to him)//, etc, then YOU are inferior, as loss of shirt situation is created by you //(or your brother or your father)//, you not only abused the person verbally //(knowingly or unknowingly)//, you //(or your brother or your father)// also deprived the person from what he was to receive.\\ And after you create obstacle(s) for recording ip-address tracking, etc data, we strongly request to you/user, that you/user also MUST not engage into any type of human-rights violating or criminal or abusive activities, you/user MUST have to uphold //(good)// moralities & ethics & humanity that is beneficial for ALL human/people, for earth/environment, etc, for now & future generations.\\ Inside cyber //(aka: digital, virtual, internet)// world, your encryption //(aka: crypto)// key //(or certificate)// is your helmet + shirt/jacket + pant + shoe protection/tool to keey your body protected / shielded from natural or artifical harms. Create multiple crypto keys, create multi-layer encrypted connections to destination(s), to create delay in decryption/theft of data. Connect with others in related fields to continue to improve your keys & connection security. Trustworthy beneficial encryption creates protection & safety & security for life-saving devices/tools inside digital/cyber world. Do not support entities who undermine this essential //(aka: fundamental)// protection.+
  
 +  
 **2**. **[[https://www.MacPorts.org/|MacPorts]]:**\\ **2**. **[[https://www.MacPorts.org/|MacPorts]]:**\\
 it is opensource & free //(3rd party)// pkg-mngr //(package manager)// for macOS, etc, & it does not steal your usage/private data. MacPorts [[https://guide.macports.org/|guide]]. It can obtain source or binary or both //(for most)// package. After downloading source, it can auto compile in your OS/distro to create/build trustworthy binary files. MacPorts was created 7yrs before homebrew. [[wp>MacPorts|wp]].\\ it is opensource & free //(3rd party)// pkg-mngr //(package manager)// for macOS, etc, & it does not steal your usage/private data. MacPorts [[https://guide.macports.org/|guide]]. It can obtain source or binary or both //(for most)// package. After downloading source, it can auto compile in your OS/distro to create/build trustworthy binary files. MacPorts was created 7yrs before homebrew. [[wp>MacPorts|wp]].\\
Line 323: Line 313:
 ● __XQuartz__ ([[https://www.xquartz.org/|dev]], [[wp>XQuartz|wp]], [[https://github.com/XQuartz/XQuartz|src]], [[https://github.com/XQuartz/XQuartz/releases/|dnld]]) : it allows cross-platform (GNU-Linux, etc) apps/tools (which were developed to use ''X11'' GUI), to run on macOS & use macOS's native ''Quartz'' GUI, etc. Many GUI apps/tools need this. It is opensource tool. ● __XQuartz__ ([[https://www.xquartz.org/|dev]], [[wp>XQuartz|wp]], [[https://github.com/XQuartz/XQuartz|src]], [[https://github.com/XQuartz/XQuartz/releases/|dnld]]) : it allows cross-platform (GNU-Linux, etc) apps/tools (which were developed to use ''X11'' GUI), to run on macOS & use macOS's native ''Quartz'' GUI, etc. Many GUI apps/tools need this. It is opensource tool.
  
-● __PeaZip__ ([[https://peazip.github.io/|dev]], [[https://sourceforge.net/projects/peazip/files/|dnld]], [[https://github.com/peazip/PeaZip|src]], [[wp>PeaZip|wp]], [[wp>Comparison_of_file_archivers|comparison]]) : it is a free & opensource archiver (zip, compress) & unarchiver (unzip, decompress) app/tool. GUI //(Graphical User Interface)// based. Allows to create: 7Z, ARC, Brotli, BZ2 (BZip), GZ (GZip), PAQ/ZPAQ, PEA, QUAD/BALZ/BCM, sfx, TAR, WIM, XZ, ZPAQ, ZIP, Zstandard, etc, and peazip allows to Open & Extract 200+ file types: ACE, CAB, DEB, ISO, RAR, UDF, ZIPX, etc.+● __PeaZip__ ([[https://peazip.github.io/|dev]], [[https://sourceforge.net/projects/peazip/files/|dnld]], [[https://github.com/peazip/PeaZip|src]], [[wp>PeaZip|wp]], [[wp>Comparison_of_file_archivers|comparison]]) : it is a free & opensource archiver (zip, compress) & unarchiver (unzip, decompress) app/tool. GUI //(Graphical User Interface)// based. Allows to create: 7Z, ARC, Brotli, BZ2 (BZip), GZ (GZip), PAQ/ZPAQ, PEA, QUAD/BALZ/BCM, sfx, TAR, WIM, XZ, ZPAQ, ZIP, Zstandard, etc, and peazip allows to Open & Extract 200+ file types: ACE, CAB, DEB, ISO, RAR, UDF, ZIPX, etc. Do not download this app from any other website.
  
 ● __GnuPG for OSX__ ([[https://sourceforge.net/projects/gpgosx/|dev]], [[https://sourceforge.net/projects/gpgosx/files/|dnld]]) : verifies file's/message's authenticity. [[https://gnupg.org/|GnuPG]] is aka //(also known as)// [[wp>GNU_Privacy_Guard|GPG]]. We need this tool to verify/authenticate downloaded files //(or messages)// to find-out whether files //(or messages)// are indeed what actual file //(or message)// creator/author/developer actually released/shared/created/sent, So this tool will indicate/tell us whether received files //(or messages)// were modified/altered/changed/abused/corrupted by someone or some-device in the middle of file/msg travel path or during file/msg travel path, or this tool will indicate to us NO modification was done during file/msg travel path.  File's //(or message's)// actual creator/developer shares their //(GnuPG/GPG or PGP or [[wp>Pretty_Good_Privacy#OpenPGP|OpenPGP]] based)// crypto //([[wp>Public-key_cryptography|cryptographic]])// digital **pub**-key file as **pub** file or as **asc** file with public. Most trustworthy way to obtain such pub-key is: goto a [[wp>Key_signing_party|KSP]] or conference and meet actual file/msg creator/developer & obtain pub-key file directly, (or else, the next (slightly-less) trustworthy solution is: use [[wp>Web_of_trust|WoT]] & inspect pub-key components to compare & verify a pub-key's authenticity). File/msg creator/developer [[wp>Digital_signature|signs]] main-file //(or main-msg)// with their **prv**-key, & that creates an unique **sig** //(signature)// file for a main-file //(or main-msg)//, then file/msg creator/dev shares main-file //(or main-msg)// & sig-file with public. This (GnuPG) tool can use sig-file, pub-key file, & main-file //(or main-msg)//, & can indicate if the main-file //(or main-msg)// was actually released by the actual holder of the pub-key, or not. Install a GUI frontend / wrapper for this tool. ● __GnuPG for OSX__ ([[https://sourceforge.net/projects/gpgosx/|dev]], [[https://sourceforge.net/projects/gpgosx/files/|dnld]]) : verifies file's/message's authenticity. [[https://gnupg.org/|GnuPG]] is aka //(also known as)// [[wp>GNU_Privacy_Guard|GPG]]. We need this tool to verify/authenticate downloaded files //(or messages)// to find-out whether files //(or messages)// are indeed what actual file //(or message)// creator/author/developer actually released/shared/created/sent, So this tool will indicate/tell us whether received files //(or messages)// were modified/altered/changed/abused/corrupted by someone or some-device in the middle of file/msg travel path or during file/msg travel path, or this tool will indicate to us NO modification was done during file/msg travel path.  File's //(or message's)// actual creator/developer shares their //(GnuPG/GPG or PGP or [[wp>Pretty_Good_Privacy#OpenPGP|OpenPGP]] based)// crypto //([[wp>Public-key_cryptography|cryptographic]])// digital **pub**-key file as **pub** file or as **asc** file with public. Most trustworthy way to obtain such pub-key is: goto a [[wp>Key_signing_party|KSP]] or conference and meet actual file/msg creator/developer & obtain pub-key file directly, (or else, the next (slightly-less) trustworthy solution is: use [[wp>Web_of_trust|WoT]] & inspect pub-key components to compare & verify a pub-key's authenticity). File/msg creator/developer [[wp>Digital_signature|signs]] main-file //(or main-msg)// with their **prv**-key, & that creates an unique **sig** //(signature)// file for a main-file //(or main-msg)//, then file/msg creator/dev shares main-file //(or main-msg)// & sig-file with public. This (GnuPG) tool can use sig-file, pub-key file, & main-file //(or main-msg)//, & can indicate if the main-file //(or main-msg)// was actually released by the actual holder of the pub-key, or not. Install a GUI frontend / wrapper for this tool.
Line 335: Line 325:
 ● __TimeUTC__ ([[https://apps.apple.com/us/app/timeutc/id1293572792?mt=12|AppStore]]) : it can add a second date & clock in your  topside apple  menu bar, to display current UTC time & date. freeware. ● __TimeUTC__ ([[https://apps.apple.com/us/app/timeutc/id1293572792?mt=12|AppStore]]) : it can add a second date & clock in your  topside apple  menu bar, to display current UTC time & date. freeware.
  
-● __FileZilla__ ([[https://filezilla-project.org/|dev]], [[https://filezilla-project.org/download.php?type=client|dnld]], [[https://svn.filezilla-project.org/filezilla/FileZilla3/|src]], [[wp>Comparison_of_FTP_client_software|comparison]]) : it is a client app for FTP, FTP over TLS (FTPS), SFTP SSH, SFTP. Opensource & free & GUI based.+● __PumpKIN__ ([[https://kin.klever.net/pumpkin/|dev]], [[https://kin.klever.net/pumpkin/repository/|src]]<sup>[[https://github.com/hacker/pumpkin|2]]</sup>, [[https://kin.klever.net/pumpkin/binaries/|dnld]]) : opensource & free & GUI based. it is a TFTP server & client app, //(with builtin TFTP server & client functionalities)//. For macOS //(and Windows)//. It was tested & can run on macOS ''Mountain Lion''. TFTP can abused/exploited to do harmful things, so keep it firewalled or disable it after you are done working with this app, and also disable it when you pause to work on something else. Do not keep this running. More info [[:docs:guide-user:troubleshooting:tftpserver|here]]. 
 + 
 +● __FileZilla__ ([[https://filezilla-project.org/|dev]], [[https://filezilla-project.org/download.php?type=client|dnld]], [[https://svn.filezilla-project.org/filezilla/FileZilla3/|src]], [[wp>Comparison_of_FTP_client_software|comparison]]) : it is a client app for FTP, FTP over TLS (FTPS), SFTP SSH, SFTP. Opensource & free & GUI based. Do not download this app from any other website.
  
 ● __ProFTPD__ ([[http://www.proftpd.org/ProFTPD|dev]], [[https://github.com/proftpd/proftpd/releases|dnld]], [[https://github.com/proftpd/proftpd|src]], [[wp>Comparison_of_FTP_client_software|comparison]]) : For FTP / FTPS / SFTP server. opensource & free. CLI based. Get a GUI frontend / wrapper for this tool. ● __ProFTPD__ ([[http://www.proftpd.org/ProFTPD|dev]], [[https://github.com/proftpd/proftpd/releases|dnld]], [[https://github.com/proftpd/proftpd|src]], [[wp>Comparison_of_FTP_client_software|comparison]]) : For FTP / FTPS / SFTP server. opensource & free. CLI based. Get a GUI frontend / wrapper for this tool.
-  * And also get web (GUI) based admin interface app __proFTPd-admin__ (from [[https://sourceforge.net/projects/proftpd-adm/|here]]) for ProFTPD.+  * And also get web (GUI) based admin interface app __proFTPd-admin__ (from [[https://sourceforge.net/projects/proftpd-adm/|here]]) for ProFTPD. Do not keep this app running, when you pause to work on something else. It can be abused / exploited to do harmful things.
  
 ● __Github Desktop for Mac__ ([[https://desktop.github.com/|dev]]) : allows a developer user to access & collaborate & develop software, etc on Github.com site. GUI based free app. ● __Github Desktop for Mac__ ([[https://desktop.github.com/|dev]]) : allows a developer user to access & collaborate & develop software, etc on Github.com site. GUI based free app.
Line 391: Line 383:
  
 ● __AppCleaner__ ([[https://freemacsoft.net/appcleaner/|dev]]) : open ''Finder'' > goto ''Application'' in any finder-tab > open this ''AppCleaner'' app, then drag the app that you want to remove/uninstall from ''Application'' folder/directory, & drop it inside the ''AppCleaner'', it will inspect & find-out & show all elements used by that unwanted app, & also show you option to Remove. it is freeware. ● __AppCleaner__ ([[https://freemacsoft.net/appcleaner/|dev]]) : open ''Finder'' > goto ''Application'' in any finder-tab > open this ''AppCleaner'' app, then drag the app that you want to remove/uninstall from ''Application'' folder/directory, & drop it inside the ''AppCleaner'', it will inspect & find-out & show all elements used by that unwanted app, & also show you option to Remove. it is freeware.
- 
 \\ \\
  
  • Last modified: 2022/04/04 01:49
  • by aterik