Hacker Newsnew | past | comments | ask | show | jobs | submit | melle's commentslogin

Logo - though nice - is too limited for my needs.

If anyone wants to use logo, you can 'import turtle' in Python and start right away ;)

See https://docs.python.org/3.6/library/turtle.html


Thanks for the pointer, I'm looking for something a bit more interactive though. I might run a few tests to see how quick it responds.

Ideally in the program I'm looking for I can perform editing operations on the image/drawing/diagram with a few key-strokes.


This looks interesting. Maybe with some effort I can manage to couple the commands in a logical manner to a few keystrokes / chords. Thanks.


Thanks for the suggestion. I'm looking for something that is more interactive though. Ideally it should be like a love child of MS visio / LibreOffice Draw and vim ;)


Just my two cents: for formal diagrams I find code is often faster than interactivity but feels slower because the output is indirect and so it doesn't quite feel like I am doing as much.


For me this is the case as well if I know what I'm drawing. If I need to find a way to 'put things on paper', I'd rather have some interactive options, preferably speedy ones ;)


If you like this, be sure to check out Qubes OS[1], which uses Whonix as a VM to route all traffic over Tor.

[1]: http://www.qubes-os.org/


Qubes does not use Whonix for anything. Whonix can use Qubes, though.

Qubes and Whonix are fundamentally different. They attempt to solve two different issues.

Whonix solves privacy via obfuscation, Qubes solves security through virtualization / compartmentalization and specifically does not believe in security by obfuscation. You do not have to choose between the two if you run Whonix inside of Qubes, but I have a feeling most users who think they want privacy really want security, and it would be a hassle to constantly use Whonix.

I highly recommend Qubes, if you aren't already using it. It isn't for the faint of heart, however, and there are a long list of bugs to squash and features to add. Things are coming along nicely though, and this year they plan to test-drive corporate support for Qubes OS as a business platform, which if successful should give them quite a bit of capital for expansion and auditing of essential code.


> Qubes does not use Whonix for anything. Whonix can use Qubes, though.

Qubes comes with Whonix gateway and workstation templates preloaded. How is that not "using Whonix"?


Important distinction in terminology. Qubes _runs_ Whonix, Whonix can _use_ Qubes as a host. And the Whonix workstation is an optional addition that a lot of users find no need for. It does not come preloaded, you must enable it during installation. But Qubes does not use Whonix anymore than Windows uses Firefox when you run the firefox process.

In software, when you say something "uses" something, you are implying it uses it as a backend or API. But Qubes does not communicate with nor expose any information to Whonix, and especially does not utilize it for any sort of functionality.


sounds like a distinction without a significant difference. "To improve your privacy and anonymity on the internet, you can install the Whonix Template on your Qubes machine." https://www.qubes-os.org/doc/whonix/ to me that makes it sound like the quebes-os people use whonix to improve privacy


Why do you think an operator of a computer is called a user?

I use Qubes and do not use Whonix, and most users don't either. Qubes is security-focused, offering increased privacy in the process, but Whonix is for the privacy-focused and has separate use-cases. I'm not a journalist in some 3rd world dictatorship so using Whonix would just degrade my user experience.

But that's the thing. As users, we can use a piece of software, but our operating system is not using anything. And it is erroneous and misguiding to say that Qubes OS "uses" Whonix, because again, that implies special meaning, such as using it as a backend for main internet access. This isn't some trivial distinction. It is a very basic, important distinction when you are talking about software.


You may not personally launch Xfce Terminal either but it doesn't mean Qubes doesn't use it as a terminal emulator. Qubes uses Whonix for anonymous VMs. It's bizarre that you're so set on making this distinction that not even the creators attempt to make.


Oh? Can you provide context where they say that Qubes uses Whonix? Under their doc file for Whonix they just mention that, if you want to use Tor, Qubes can make use of Whonix as a ProxyVM. That is the correct usage of the term "use". But not only is that not the same thing as using Whonix for a general backend for operation, many users forgo installing Whonix altogether.

This whole thing devolved from me just trying to make a distinction for other HN users so that they wouldn't get the wrong idea and not try out Qubes because they might think the systems are coupled and are worried of, say, being hacked by the FBI and put on more lists for using Tor.


>>Which uses Whonix as a VM [...]

Sorry to nitpick, but I believe you meant to say something along the lines of "Whonix runs on top of Qubes as a VM (virtual machine), just like any other typical OS does in Qubes."[1]

[1] https://www.whonix.org/wiki/Qubes


Also, you don't have to route traffic over tor in Qubes.


Not only are you not required to route traffic over Tor, but you can create arbitrary tree network topologies for all VMs.

For example, see the screenshot on https://github.com/kbrn/qubes-app-print-vm-status. VMs can access the 'net through "sys-firewall" (i.e. in the clear); or through "[redacted]-vpn", which has firewall rules enforced by "sys-firewall" that reject any traffic not to the designated VPN endpoint; or through "sys-whonix", which obviously routes all traffic over Tor.

Another great feature afforded by combining Qubes and Whonix is that it's trivial to use Whonix as a disposable VM, so you can really be sure one browser instance (say, for porn) can never affect another browser instance (say, for Facebook, or for leaking the next tranche of NSA docs).


The Choo framework looks promising! https://github.com/yoshuawuyts/choo



Depending on the type of UI, you could also give Kivy a try. https://kivy.org/

It's python based, and really easy to get going. It does have it's quirks, but overall I found it a joy to use.


I've had some hard times porting Kivy to the Raspberry PI 3 on Raspbian. It is a decent toolkit, but I'm not so sure on the ease of cross-platform.



Another example of steganography can be found in songs by Aphex Twin, e.g. Windowlicker (https://en.wikipedia.org/wiki/Windowlicker)


He also put his own face into one song.

http://www.bastwood.com/?page_id=10


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: