Custom queue is disabled as well, so, it took a few attempts at Spike Rush to get to the map.
I like this updated loading screen with all characters in a team.
Also for some reason, Gauntlet Showdown never worked for me. It loads the main show instead.
I have been playing this fantastic game called Among Us in the last few months. It’s a game of deception, where there are two parties working on two tasks.
- Crewmates, who are in charge of completing tasks on the spaceship. Finish all tasks, and you win.
- Impostors, those who fake to be crewmates, but are actually sabotaging actual crewmates’ progress, or attempt killing them. When impostors lead crewmates by one member, they win.
It’s available across iOS, Android and PC/Steam. I mostly play with my friends, but online matches are not that bad either.
I started watching IPL today, and I noticed that Hotstar feed is introducing an ambient background “fan noise”. The idea seems to be that it gives viewers a real match experience.
For some context, matches are happening in UAE, and it’s just the players at the stadium. Fans are not allowed for COVID-19 reasons.
However, the background noise was doing more damage than goodness. Especially as a hard of hearing person, I couldn’t hear any commentary. I found similar comments from other Hotstar users:
I searched a bit more, and I found that it’s not actually a feature from Hotstar, but is coming from their upstream provider.
Krisp to the rescue
Some of my colleagues use Krisp at work. It’s a noise-cancelling app that’s commonly used with Zoom, Hangouts and other communication apps. I was curious to see if it might work with streaming services, and it does!
Krisp’s available as a desktop app, as well as in the form of a browser extension.
I tried the browser extension, but it didn’t work, as it appears Krisp needs the tab to introduce a “microphone stream” to enable noise-cancellation. Hotstar doesn’t require microphone access, which in turn means that noise cancellation cannot work.
Basically, the extension works with any web page that is using a microphone stream. All you need to do is to turn on the “Mute Noise” toggle and Krisp will start working on all the tabs that are currently using a microphone.Source – Krisp help page.
And, the desktop app (Windows in my case) works well! I use Windows 10, and I ran into some issues in marking it as the primary output device on
Sound settings. Marking it as the primary output device didn’t save properly.
Turns out this is intentionally done. I spoke to their support and they pointed me at a workaround, which involves setting app-level output on Windows settings. In my case, I marked Krisp for Brave browser, under Windows sound settings:
It works well!
Update: It’s available now! In my test with Mullvad app, it doesn’t work. Mullvad’s DNS takes precedence. But it works flawless with Wireguard app instead. So, that’s what I am using, with Mullvad-generated config.
With that news, I updated my iPad to iOS 14 public beta 2. This is my first time running a beta build. Going by Twitter, this beta is stable.
I also reached out to NextDNS devs on their Intercom, to know more about this build. They let me know that it’d be announced on their reddit, when Apple approves it.
I have written about my DNS setup in the past, but that setup is a bit outdated that I wanted to write a new post. I continue to use NextDNS as my primary DNS service. On the VPN side of things, I have switched from NordVPN to Mullvad.
I have stopped using Cloudflare Warp as well. It’s not a VPN; they disclose IP to websites hosted on Cloudflare. They do claim it’s not a VPN, and I appreciate that transparency.
On Android, I use NextDNS’ DNS-over-TLS (DOT) address on Android’s private DNS setting. That setting is available on Android 9 and above. Marking my private, secure, encrypted resolver as such ensures that it works even when I am connected to Mullvad.
I use Wireguard Android client to use Mullvad, as I have noticed Mullvad’s official app to disconnect often.
Since I switched from NordVPN (they announced a Wireguard-based implementation as well!) to Mullvad, I started using Mullvad’s Wireguard implementation. It’s as simple as downloading the Wireguard configuration file from their website, and adding it to the Wireguard client app.
Since I run NextDNS CLI, I setup that local resolver address
127.0.0.1 as my choice of DNS on the Wireguard config.
As an additional measure, I use
127.0.0.1 as my resolver on Mac’s network settings as well. This ensures that NextDNS continues to be used when disconnected from Mullvad.
Taking this one step further, I have a Keyboard Maestro macro that periodically ensures that
127.0.0.1 is my Mac’s DNS resolver. This is not a great way to implement DNS leak checks, but it works for me.
Windows was an issue when I was using NordVPN. I could define NextDNS’ IPv4 addresses, but that’s not encrypted DNS. I wanted both encrypted DNS and VPN at the same time, which is when I learned about YogaDNS. It’s network interface-independent and works great with Mullvad. As usual, I use Wireguard Windows client for Mullvad.
iOS is an issue at this time. I can either use NextDNS or Mullvad. The problem is, DNS implementation is done as VPN tunnels, and when NextDNS tunnel is active, Mullvad VPN cannot be. This is changing with iOS 14!
I haven’t shut down my Pi-hole yet. It’s active and running, and serves all guests that connect to my home WiFi.
Look at this shiny new badge on my GitHub profile!
Calypso was probably the first OSS project that I contributed to. I am super grateful for all the feedback that I have received through the years, even though they were minor changes like CSS and copy.
If you haven’t starting contributing to OSS yet, start today! Maintainers are always happy to help. 💛
You can read more about GitHub’s archival program here.
The blog you’re reading at the moment was originally a Tumblr site. I moved it to WordPress when I joined Automattic. That was two years ago.
I was curious to see what has changed recently. Tumblr is very different from what I knew two years ago. I think I’m enjoying the experience so far.
The current blog will continue to exist as my primary site.
This post is composed entirely on WordPress Android with Gutenberg.
Apple announced encrypted DNS (DOH and DOT) for iOS! This is by far my most favorite announcement at WWDC 2020.
Right now, my DNS provider, NextDNS app for iOS, implements their feature as a VPN tunnel, which makes it impossible to use another commercial VPN like NordVPN/Mullvad at the same time.
A similar limitation applies to Cloudflare’s 184.108.40.206 app.
However, with the new encrypted DNS model that Apple is announcing, it looks like NextDNS can be used in conjunction with the other active VPN tunnels.
Their approach is great, covers all bases.— Jer Warren (@nyquildotorg) June 24, 2020
Someone like Firefox can ship a build that uses their CloudFlare partnership.
Someone like CloudFlare can ship an app the makes the entire system use their service.
IT departments can allow their internal domains to work.
I have reached out to the NextDNS developers to hear their thoughts. Future looks exciting for iOS!
I have been thinking a lot about emails and aliases in the last few days.
Emails are the core identity of one’s online presence. They are everywhere, and form the base for any online service.
For years, I have used a Gmail address.
While it’s convenient and free, it isn’t the best choice for a privacy-focussed individual like me. In the last couple of years, I have started reading more about privacy online and opsec. I have gradually made changes to my workflow, including getting a custom domain based on my name.
My address is hosted on ProtonMail with a custom domain. In my opinion, ProtonMail is the safest email can get, thanks to their built-in PGP encryption and published security details.
Having a custom-domain based email also gives me the flexibility of moving to another email host should there be a need. In the event ProtonMail shuts business, I can always move that domain to a new email host and don’t have to update all of friends and family about a new address.
That’s the beauty of owning a domain-based email address — I get to carry that email identity until the end of the internet.
That’s a standard practice that everyone must adopt. However, isn’t always the case due to lack of domain knowledge.
HEY email is Basecamp’s bet in turning that around. They aim to offer a Gmail-like service that’s easy to get started and manage, and respect users’ privacy. Of course, it’s a paid email service.
I managed to secure my preferred address ([email protected]) on day 2, and it has been a little over a week.
So far, their features are okay. I cannot say they are marvelous. There is a learning curve to the product, as it’s not a traditional single-stream inbox. They have three feeds which constantly need to be juggled between. In particular, their
Paper Trail feed doesn’t differentiate read vs unread emails, which is a road blocker, for me.
Most annoying part is probably that there is no way to have a sender’s emails arrive in two different feeds. Right now, all of their logic is based on sender’s email address. Some businesses user the same address for marketing emails and support. In that case, it’s hard to make sense of where to divert the emails –
The founders say all of this likely to improve in the coming months. As with any product, I know this can improve. Time will tell.
ProtonMail on the other hand, at a fraction of HEY’s cost, fares a lot better. Especially considering the fact that HEY does not offer PGP-encryption.
Encryption is one part of opsec.
I came across a tweet from Pieter many months ago.
He mentioned something an idea that was very intriguing:
Seeing emails as security keys too
What this means is that, in the event an email address gets leaked in a breach, it wouldn’t fall prey to credential stuffing attacks.
I briefly toyed with the idea of using a custom domain with random characters, but later discovered SimpleLogin and AnonAddy. Both services are much better implementations than what I was doing with a custom domain.