Tech drama. GNU/Linux & BSD user.

Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say. – Kev Quirk

While web browsers such as Google Chrome and Mozilla Firefox are undoubtedly popular, there are numerous other choices on the market, many of which offer superior features in terms of security, rendering and customization. One of these browsers is qutebrowser, a keyboard-driven web browser that’s intended to be used exclusively with the keyboard, without any need for a mouse. Based on key mappings similar to the Vim text editor, the workflow is easy to learn, making many common web browsing tasks exponentially faster than other available browsers. This blog post will give a background on the browser, its features, and how you can get started using it today.


Originally the sole project of Belgian developer Florian Bruhin, the GNU open-source and cross-platform qutebrowser now boasts over 200 contributors who actively maintain it. One of Bruhin’s main motivations for creating qutebrowser was the common issue of many popular web browsers taking a long time to implement the latest versions of WebKit and other web browser engines, resulting in greater security risks and a lag in implementing support for bleeding-edge technology updates, particularly in JavaScript. Additionally, qutebrowser uses DuckDuckGo as its default search engine, ensuring the best defense from tracking of personal information.


qutebrowser is a cross-platform browser, available for Windows, Mac OS X and numerous distributions of Linux. You can download the latest pre-built binaries from their GitHub releases pages, as well as find detailed installation instructions in their official documentation.

If you are on Mac OS X and have Homebrew Cask installed, the easiest way to get started is just by running the following command in your terminal:

brew cask install qutebrowser

Common Commands and Getting Around

Once you open qutebrowser for the first time, you’ll see the DuckDuckGo homepage, set as the default.

To open a URL, hit the 'o key, followed by the URL, then hit enter.

You can also run a search by typing search terms instead of a URL after the o key, which will then pull up search results in DuckDuckGo.

But how do you click on any links without the mouse? This is where qutebrowser starts to shine. Hit the f key, which then displays a highlighted combination of keys on top of every link visible on the page:

In the example above, we can quickly get back to the offical GitHub page by typing gh.

Navigating up, down, left and right is done via the h, j, k, and l keys, just like in Vim. To go back to previous pages in your history, type H (capital H) and L to go forward.

Pressing the colon : will pull up qutebrowser's command line, which includes an extensive list of commands for various functions of browser navigation and management. qutebrowser will display the list of commands and descriptions for each, and as you start typing keys it will narrow the search results for a command that best matches what you've typed.

Here's a complete cheat sheet with available command supported by qutebrowser.


We’ve just scratched the surface of what qutebrowser can offer, but I hope we’ve demonstrated some of the basic features of this very flexible, customizable and efficient web browser. Going through the documentation, learning the commands, and setting up preferences in the configuration file can vastly speed up your time using a browser, helping you to find the information that you need.

I am using the awesome service at openbsd.amsterdam for various BSD explorations and teaching myself the whole ecosystem.

Now the 6.5 version has been released into the wild I decided to upgrade my vm on openbsd.amsterdam. Here's the guide to upgrade your vm.

Hope this helps!

Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say. — Edward Snowden

I have been translating Tusky to Swedish for a couple of months now. It is a great and fuzzy feeling when there is a great FOSS-project we all can contribute to.

The last weeks the head developer @ConnyDuck@chaos.social(https://chaos.social/@ConnyDuck) has tested a couple of different translation projects, like Crowdin(https://crowdin.com/) and now lately Weblate(https://weblate.org/), we both prefer the latter since it is open source and possible to host on your own infrastructure.

I've just donated $12 to Tusky. Consider donating too, every little helps! https://opencollective.com/tusky?referral=32452

Spleen is the new default font in OpenBSD, thanks to Frederic Cambus.

Monospaced bitmap fonts for consoles, terminals, and code editors.

available in 5 sizes: 1. 5x8 2. 8x16 3. 12x24 4. 16x32 5. 32x64

I personally installed the fonts on both Mac OS X and Arch Linux without any issues. The fonts are looking really great.

As seen on reddit. CloudFlare's public DNS manually manipulates the .org zone for its users, setting a scary precedent.

This is a list I wrote about a year ago, but it's still accurate:

  • It's not really free. It's like a drug dealer “First ones free”.
  • Shared SSL certificates
  • Forced to use Comodo for SSL. Comodo's CEO is a sleazebag.
  • Can't use Let's Encrypt for SSL
  • Can't use your own SSL
  • Decrypts SSL traffic, breaking End-To-End Encryption.
  • Cooperates with tyrannical governments
  • Provides services to terrorists, child pornographers, and so on
  • Has no “vetting” process for new customers
  • Does not protect your website from hacking
  • Doesn't provide any value to 99% of websites
  • Cloudflare's CEO is an ego-maniac who believes he controls the entire internet.

More details on SSL decryption:

Keyless SSL requires that Cloudflare decrypt, inspect and re-encrypt traffic > for transmission back to a customer’s origin.''

Source: https://www.cloudflare.com/ssl/keyless-ssl/

By doing that, Cloudflare is violating the trust between users and server operators and making the SSL certificate itself worthless. A website cannot be considered “Secure” if the traffic is decrypted by a man in the middle.

This was something just introduced into Mastodon 2.6 I believe. Quite interesting. Here's my mastodon account.

I usually use Vultr, my referral link to host my cloud images for misc purposes. I also got a couple of VPS running OpenBSD.

I used Romans awesome guide for upgrading it to 6.4.