Meteorology
Current weather in Donderskamp SR SA with the infinite power of wttr.in & the grace of lolcat(6) 🏳️🌈 wttr curl(1) & {ba{c{k{z{fi}}}}}sh
Background photograph is a Nature cloud scene composed with FL CIRC_POL and UV filters stacked using a Nikon prime lens
log
$ curl -v wttr.in/donderskamp|lolcat
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
0 0 0 0 0 0 0 0 --:--:-- 0:00:05 --:--:-- 0* Host wttr.in:80 was resolved.
`/"".-. Light rain shower
,_( ). +26(30) °C
/(() ↙ 17 km/h
‘ ‘ ‘ ‘ 10 km
‘ ‘ ‘ ‘ 1.2 mm
Note:
You should repeat the request with an interval of 8 then 60 secs when the server sends and empty response to curl, watch the LOG!
API
https://en.wikipedia.org/wiki/Bash_(Unix_shell)
https://directory.fsf.org/wiki/Bash
https://github.com/busyloop/lolcat
Z
#Weather #wttr #lolcat #curl #bash #csk #ksh #zsh #sh #fish #meteorology #environment #Physics #Chemistry #Mathematics #Lineair #algebra #technology #OpenSource #programming #POSIX
« Don’t trust, verify » by #curl author – must-read!
« Software and digital security should rely on verification, rather than trust. I want to strongly encourage more users and consumers of software to verify curl. And ideally require that you could do at least this level of verification of other software components in your dependency chains. »
🤔 It reminds me « Identifying software » #Guix blog post. 🤩
Check them out!
https://guix.gnu.org/en/blog/2024/identifying-software/
https://daniel.haxx.se/blog/2026/03/26/dont-trust-verify/
Re: https://mastodon.social/@bagder/116294927524710539
The #opensource #curl project is probably doing more in terms of security than most commercial companies.

Software and digital security should rely on verification, rather than trust. I want to strongly encourage more users and consumers of software to verify curl. And ideally require that you could do at least this level of verification of other software components in your dependency chains. Attacks are omnipresent With every source code commit and … Continue reading Don’t trust, verify →

Software and digital security should rely on verification, rather than trust. I want to strongly encourage more users and consumers of software to verify curl. And ideally require that you could do at least this level of verification of other software components in your dependency chains. Attacks are omnipresent With every source code commit and … Continue reading Don’t trust, verify →
Check out this list of development/release practices for #curl.
This is table stakes for being a responsible player in the open-source infrastructure game.
This new page on the curl website explains how you can (should?) verify #curl, and a little what we do to verify what we do.
We can never be 100% safe, but we can try.