(220.29 KB 1920x1080 1498596199651.png)
Anonymous 06/28/2017 (Wed) 14:13:05 [Preview] No. 8768 [Reply] [Last 50 Posts]
/g/ is building an OS
http://boards.4chan.org/g/thread/61110805

It's a riced out, gentoo based desktop distro
https://cloveros.ga/

Has a nice low ram footprint

irc.rizon.net #cloveros
109 posts and 55 images omitted.


Anonymous 05/16/2018 (Wed) 19:33:43 [Preview] No.12730 del
>>12729
what?

also you can easily do anything in gentoo thanks to ebuilds


Anonymous 05/16/2018 (Wed) 19:35:40 [Preview] No.12731 del
(3.81 MB 3264x2448 IMG_20180330_004725.jpg)


Anonymous 05/18/2018 (Fri) 01:29:31 [Preview] No.12734 del
>>12731
Nice background.


Anonymous 07/18/2018 (Wed) 11:50:41 [Preview] No.12839 del
Pretty cool distro, however.
There are a few things that the maintainers neglect to tell in their repository.
Things like the overlays used in the binaries.
From what I've been able to piece together is that most bins and most of their package.use is built around the Libressl overlay and (maybe?) a few others.

There is also a huge problem right now with the way they setup nvidia drivers.
The driver that is downloaded and supplied is (again from my understanding) built for linux version 4.14.* whilest CloverOS currently runs 4.16.* which is a uge problem because installing these drivers will destroy your install.
additionally, the nvidia drivers supplied are 396.24-r1 which is the unstable versions that lack legacy support for some older(not that old) graphics cards.
The system doesn't store a local version of their Gentoo sources, so if you want to go full Gentoo you'll have to download the sources.
This made getting dkms nvidia drivers a bit annoying.

It would be great if the script was updated to serve a dkms version of nvidia drivers, various versions would help with legacy support.
That being said, i get the feeling the scripts weren't designed much with supporting a wide range of systems.
If you use some memeware thinkpad/toughbook this distro is perfect right out of the gate.
If you want to get some other kind of setup to work it'll require a bit of legwork, but that's not a bad thing.
It's amazing how simplified this makes a your regular Gentoo install.
Because it's Gentoo I've been able to get most of the above to work perfectly.


Anonymous 07/20/2018 (Fri) 15:54:14 [Preview] No.12845 del
>>12731
Not to be too forward, but I want to lick your desktop. Do you find this is a common reaction?



(34.60 KB 1200x800 DhabSjYW4AE8qu5.jpg)
The div that looks different in every browser. Anonymous 07/11/2018 (Wed) 23:02:51 [Preview] No. 12826 [Reply] [Last 50 Posts]
<html><head><style>

html {
display: table;
height: 100%;
width: 100%;
}

body {
display: table-cell;
vertical-align: middle;
}

div {
margin: auto;
width: 100px;
height: 100px;
outline: inset 100px green;

Message too long. Click here to view full text.

3 posts omitted.


Anonymous 07/12/2018 (Thu) 03:29:50 [Preview] No.12831 del
(2.58 KB 195x180 new.png)
imagine that


Anonymous 07/12/2018 (Thu) 10:22:13 [Preview] No.12832 del
>>12831
Same on palemoon.


Anonymous 07/12/2018 (Thu) 13:20:19 [Preview] No.12833 del
>>12832
version brothers holla


Anonymous 07/15/2018 (Sun) 19:50:09 [Preview] No.12838 del
> create web standards
> no one follows them
welp


Anonymous 07/20/2018 (Fri) 15:48:14 [Preview] No.12844 del
This is fucking cool. I'm going to set something like this up to generate my company logo on my site.



Anonymous 07/14/2018 (Sat) 17:20:20 [Preview] No. 12836 [Reply] [Last 50 Posts]
Does anybody here use stack exchange? Just curious, there are a lot of tech-oriented sites as part of stack exchange and I was wondering if /tech/ recommends any of them.


Anonymous 07/15/2018 (Sun) 19:44:10 [Preview] No.12837 del
>>12836
>Does anybody here use stack exchange? Just curious, there are a lot of tech-oriented sites as part of stack exchange and I was wondering if /tech/ recommends any of them.

Only via search engine results. I attempted to contribute early on but lost interest, though there's a huge push to make their entire suite of sites a "safe space" for idiots to ask stupid questions without fear of being called stupid. I understand that being called an idiot isn't fun, though the goal of not being called an idiot is what pushed me to get good in the first place.


Anonymous 07/20/2018 (Fri) 15:08:43 [Preview] No.12842 del
>>12836
Yes I do.
Stack Exchange is the only site I know of in the category which allows anonymous contributions. Others (even Wikipedia) block Tor and/or require registration.


Anonymous 07/20/2018 (Fri) 15:34:02 [Preview] No.12843 del
>>12837

This is correct. If you find useful information take it, but don't get yourself involved. Their management publicly announced not long ago that they are to be considered typical sjw trash now, just another outlet for loony propaganda.



(98.58 KB 752x1061 473734734.jpg)
Anonymous 06/24/2018 (Sun) 20:08:57 [Preview] No. 12806 [Reply] [Last 50 Posts]
CAN THIS BE DONE?

P2P web browsing via websites served and shared on individual nodes:
users can create their own websites and host them from their own computers/servers
users can upload and share other's websites on their own computers/servers
self serviced websites are manually named *but will generate a random entropy hash within the url, example:
node://7bv45ix0/8ch.net or node://c334o96y/endchan.xyz
*the random entropy hash prevents individuals from creating and overriding other established websites
endless domain creation: .com, .org, .info, .onion, .rebel, .on, .geek ... et al (infinite)
browser can access HTTP, HTTPS, FTP, Zeronet, Beaker, eMule/eDonkee and various obscure networks.
browser is enabled for users to share files with others, creating decentralized P2P file sharing
the browser would have its own built-in decentralized search engine similar to YaCy that can pull up any content found
high standard end-to-end encryption would be active by default for all P2P connections
browser has a lightweight bit-torrent client built-in
onion routing is not mandated but the option would be allowed within the browser
I2P routing would also be an option for users
Dust and IPFS could be utilized in the browser for further anonymity and resilient decentralization.

Message too long. Click here to view full text.

1 post omitted.


Anonymous 06/25/2018 (Mon) 17:02:42 [Preview] No.12808 del
Maybe for specific solution.
A torrent search engine being decentralized would be a great thing, and far harder to kill.
But to generalize it everywhere, I seriously don't think that's a good idea, because will you accept to pay electricity and general infrastructure to host the website of someone else? Moreover, since it's less effective than a data center, you'll have need more power to support the websites.

I think that for specific purposes, yeah. But I seriously don't buy in this decentralize dream. Maybe someone will make it work at some level, I don't know.


Anonymous 06/26/2018 (Tue) 15:39:17 [Preview] No.12809 del
>>12807
Good point, I think there are some programmers out there aiming to do similar things but the problem is they are under-funded and rather scarce among the tech community (most of the tech community is now elitist drones within Silicon Valley that work for the big corps).

>>12808
>I seriously don't think that's a good idea, because will you accept to pay electricity and general infrastructure to host the website of someone else?

It depends on how big those website are and how much content they provide. Something like endchan could likely be hosted by one individual with some server space I'd imagine (this one site likely takes up 20TB at max?) That said we could at least create our own image boards or blogs. This would help decentralize a lot of info and content. And the more users that join in and participate, the more potential this has as a whole for hosting all kinds of content.

Something like Soulseek alone has over a million users with billions of albums, movies, books, software etc. available to download. This only relies on users hosting content on from their own computers. Imagine if we got 10 million+ users on a completely decentralized browser which users can host P2P websites. It would revolutionize a whole kind of new internet that would become very hard to censor or control.


Anonymous 06/27/2018 (Wed) 16:18:55 [Preview] No.12810 del
>>12809
More like 20 GB.

>>12806
RetroShare.


Anonymous 07/12/2018 (Thu) 22:23:33 [Preview] No.12835 del
You want an internet suite stuffed into one browser?
That's sorta something what Seamonkey and ChromeOS do and dozens of failed projects before them did.
Which is not really good. Having interoperability and data exchange between different gui applications is cool, but having your browser to do all the work is asking for a trouble with too much attack surface. I am also pretty sure, you can have all this shit like accessing zeronet, irc, tor and i2p, download torrents and email with set of web browser addons.
You should also understand that hosting stuff from home computer puts drawbacks on availability compared to a remote VPS in a professional datacenter, or a dedicated server in your basement with nig-rigged car battery UPS which not everyone is eager to invest in.
>the random entropy hash prevents
You just came up with some useless bullshit. Look at how onion, eepsite, gnunet and cjdns domains are resolved and generated. It should not only be a "random hash", but also act as a public encryption key or public key hash without reliability on someone's DNS servers.
The main problem of "le decentralized internet" is how easy it would be for external powerful actor to remove pieces of it, and remove them not only for one group of users, but for everyone. Let's say you live in small corrupt country and post on facebook. Your country's government wants to remove your posts from facebook, but until those break facebook's tos or facebook has big-money business in your country, they don't care. And what would your country do then, ddos facebook or block it? The latter is feasible, but blocks can be avoided, the data still exists on Facebook's servers and is available for those who put much effort in it.
Now say again, you live in Ancapistan Enterprizes Real Estate. A society of decentralized Internetz and such. You host your blog from home, a small single board server and a 1 gbit unlimited connection, pretty nice isn't it? One day you post something bad about McFacebook corporation on your blog. Automated web crawlers of YaCy search engine detect wrongthink and it triggers McFacebook CEO personally. What happens next? They simply DDOS your weak 1gigabit-wide channel to the point when your ISP, or datacenter where your VPS is hosted disconnects your server for consuming too much traffic and blackholes all requests coming for your address, your server is already inaccessible at this moment. It's done, McFacebook corporation completed it's mission and eliminated you quickly. What would you do next? You either go to your ISP or some decentralized CDN provider and ask them to implement a DDOS protection, i.e. you have to find someone who will host your shit for free on pure enthusiasm (ipfs and webtorrent) or for thousands of shekels (Cloudflare) or in exchange for datamining (Facebook). Now you get the same modern Internet and web, where you have to host your important information on a big datacenter with wide bandwidth, distribute content over wide network of CDNs and gateway proxies.


Anonymous 07/18/2018 (Wed) 15:43:21 [Preview] No.12841 del
>>12806
Yeah, some girls wrote it years ago
Then google hired them and gave them soul crushing jobs so they would forget about ever having written the wooden stake that could kill the google vampire
https://github.com/PeerServer/peer-server



(138.63 KB 414x433 1480819757263.png)
Anonymous 07/18/2018 (Wed) 15:14:19 [Preview] No. 12840 [Reply] [Last 50 Posts]

<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<title>ENDchan.xyz</title>



Endware Endwall 05/03/2016 (Tue) 08:54:28 [Preview] No. 32 [Reply] [Last 50 Posts]
Endware is a suite of programs geared towards internet privacy, security, and anonymity.

Endwall: endwall.sh is an iptables based firewall script designed to be implemented on any linux distribution shipped with iptables. endwall.sh is based on default drop policies, coupled with a novel strategy of passing packets on local host ports only for those enabled by the enduser. It comes with a variety of well used ports enabled with several additional port passing configurations available by uncommenting the script. It provides essential security to a new user.

Endsets: endsets.sh is a script that adds blacklisting and whitelisting functionality to endwall.sh. It depends on the program ipset. It is persistent on reboot if you enable ipset as a service. This is the recommended blacklisting tool for endwall if you are running a server or planning on opening up ports and services to the public and will require daily blacklisting of new incomming IPs.

Endlists: endlists.sh is a traditional text file list based blacklisting and whitelisting script. It has slow performance, and can't be updated on the fly. Good for <1000 ip subnets, very tedious and slow to run for more than that. Blocks the IPs by adding them as individual rules to the iptables ruleset. Works but not recommended for heavy duty on a server. May be useful for workstation use to block ip ranges if you are not opening up ports and services to public clients.

Endtools: endtools are a collection of scripts including alogz.sh, mlogz.sh, spamlogz.sh and iplookup.py. These scripts will help to service an enduser of endwall in adminstering endsets/endlists.

iplookup.py is a geoiplookup script written in python and requires python and pygeoip. It has simmilar functionality to maxmind's geoiplookup program and uses the maxmind *.dat files.

spamlogz.sh is a script that searches through log files to find flagged log entries flagged in endwall.sh, endsets.sh and endlists.sh.

alogz.sh is a daily log reading script designed to read the output of an apache http server's log output.

mlogz.sh is a daily log reading script designed to read the output of a postfix smtp server's log output.

Message too long. Click here to view full text.

206 posts and 3 images omitted.


Endwall 06/29/2018 (Fri) 08:23:14 [Preview] No.1237 del
>>1236

>shebang is wrong.

#!/bin/sh

what is wrong with the way I've done it? This is on the first line of all of the .sh scripts, or have I missed something? Did I miss this on a file?

I think that I'm doing this incorrectly with the .py files, as most scripts I've seen use /usr/bin/env python
while I point to /usr/bin/python which is a soft link to python2 or python3. I can change this if this is what you're talking about.

>bashisms.

The BSD ports that are placed in the BSD folder were all tested on OpenBSD SH and were modified until they worked. I haven't updated these files in like a year or so, but they don't use any bash at all. There are no bash-isms in winstream.bat, although it's implemented inefficiently and needs an update / fix.

Can you give me an example of one of the bash-isms from my scripts ? Name the script and the number line(s), and offer an alternative notation. If I agree I'll fix it/ change it.

Message too long. Click here to view full text.



Endwall 06/29/2018 (Fri) 08:34:07 [Preview] No.1238 del
>>1237

Do I need a space? I don't think it matters the ! should tell the shell to look at what comes next.

#! /bin/sh

I have some of the scripts as

#!/bin/sh

others like endstream.sh had the space. I'll change them all to have a space. I don't think it makes a difference though.


Endwall 07/10/2018 (Tue) 23:10:51 [Preview] No.1245 del
>>1236
I just realized what you were actually trying to say.

You meant to say:
"I use Debian with dash as the interpreter for sh and your scripts don't work, so you should shebang it as #!/bin/bash and it will work."

I actually did that with endwall_wifi.sh . I gave my mom a Debian laptop and she needed wifi so I extended endwall to loop over wifi interfaces. Anyways it spits errors due to dash being the interpreter for sh. Switching the shebang to bash makes it work. There are no "bashisms" in Endware, dash is just screwed up. I'm going to have to read about the differences some time when I do my port to Debian.


Endwall 07/10/2018 (Tue) 23:12:06 [Preview] No.1246 del
I also just fresh installed a server with Parabola base-openrc and endwall.sh was spitting errors, I used another version of the file and it worked fine. I haven't tracked down the issue yet. I need to debug it by putting in echo statements. I'll do some more work on that later.

There are now open-rc scripts for most of what I need for server work including (postfix, dovecot, nginx, syslog-ng,squid, sshd etc) tor I compile and run from the shell, however ipsets doesn't have a script so I can't use this for a clearnet web or mail server yet.


Endwall 07/18/2018 (Wed) 03:24:27 [Preview] No.1253 del
>>1246

I've fixed the error with endwall.sh and endwall_wifi.sh. It was a typo in an if statement on the loop over interfaces. Should work properly now.

That bug was there for 8 months and no one posted anything about it...

Maybe nobody uses it or nobody cares...

Well it's fixed now in any event.



Online Security News Endwall 07/07/2016 (Thu) 06:09:23 [Preview] No. 149 [Reply] [Last 50 Posts]
See a news article or CVE bug report on an emerging computer security issue and want to share it? Post below.

I will also post links to Hak5 Threatwire videos.
Edited last time by Endwall on 07/07/2016 (Thu) 16:22:47.
497 posts and 3 images omitted.


Endwall 06/15/2018 (Fri) 08:35:37 [Preview] No.1230 del
Hak5

Facebook’s Secret Device Partnerships - ThreatWire 9:57
https://youtube.com/watch?v=SUerM7ul8tM [Embed]

Hackers Could Sink Ships - ThreatWire 9:15
https://youtube.com/watch?v=OH8aBZgsvEw [Embed]


Endwall 06/21/2018 (Thu) 23:56:54 [Preview] No.1235 del
Hak5

Malware on Macs? GnuPG is Flawed & Docker Hub Has a Problem - ThreatWire 10:54
https://youtube.com/watch?v=1jDzqzgmbz8 [Embed]


Endwall 07/05/2018 (Thu) 05:00:18 [Preview] No.1239 del
Hak 5

Location Data? Come Back With A Warrant! - ThreatWire
https://youtube.com/watch?v=CGkEuiIc8NY [Embed]
The Supreme Court ruled in favor of privacy advocates everywhere, Cell phone Carriers Stop Location Data Sharing, and you can totally Steal online Accounts Through Audio Files.

California’s New Privacy Bill, Exactis Leak, & Gentoo Guthub Hacked - ThreatWire
https://youtube.com/watch?v=hqCc7cE3sn4 [Embed]
Gentoo’s github account was hacked, a Marketing Firm Leaks Private Data on millions, and a new GDPR-like bill was signed into law in California. All that coming up now on ThreatWire.


Endwall 07/05/2018 (Thu) 05:04:53 [Preview] No.1240 del
I saw this on 8-chan:

https://www.ccc.de/en/updates/2018/hausdurchsuchungen-bei-vereinsvorstanden-der-zwiebelfreunde-und-im-openlab-augsburg

Police searches homes of „Zwiebelfreunde“ board members as well as „OpenLab“ in Augsburg
2018-07-04 08:12:30, 46halbe

On June 20th, board members of the „Zwiebelfreunde“ association in multiple German cities had their homes searched under the dubious pretence that they were „witnesses“ while their computers and storage media were confiscated. The Augsburger CCC offshoot „OpenLab“ also had to contend with a search of their premises. For seven years, the Zwiebelfreunde association has been promoting and creating privacy enhancing technologies, while also educating the public in their use. At TorServers.net, the association operates Relays of the Tor anonymising network while helping operators technically and legally. In addition to this, the association helps other organisations raise funds. The board members of the association are not considered suspects but witnesses in the ongoing investigation. The story behind the searches and seizures is somewhat convoluted: There was an anonymous website on the internet, calling for protests against the far-right Alternative for Germany (AfD) party convention in Augsburg. The unknown operators of this website used an e-mail address at Riseup, a well-known alternative provider. [1] The Zwiebelfreunde association has a bank account to facilitate donations to riseup.net.

Riseup is domiciled in the US, and essentially offers a non-commercial alternative to Gmail. Because data-protection practices are in decline world-wide, many NGOs and grassroots organisations use Riseup.These facts have not yet reached the police in Bavaria. The state prosecutor’s office in Munich has apparently been operating on the mistaken assumption that everyone even tangentially connected to Riseup would be able to provide information on any e-mail account registered there, including that of the alleged illegal website. [2] The officers on the scene made clear that they themselves felt this assumption would not hold and said so to the witnesses. But they performed the searches and seizures anyway.With such contrived reasoning, almost anyone could be searched if the anonymous website had been operated by people with a Gmail address. As a consequence of this clearly nonsensical attempt at logic, those involved in this as witnesses and their families have had to endure abjectly disproportional intrusions into their homes. Homes were searched without anyone even attempting to question the alleged witnesses.

A multitude of storage media, computers and other devices were confiscated, also affecting family members of the association’s board members - none of whom stands accused of a criminal act. Also affected are completely unrelated businesses and sensitive projects of Zwiebelfreunde, such as the Tails Linux distribution. Some of those involved have had their requests to return the hardware denied....


Endwall 07/18/2018 (Wed) 03:19:34 [Preview] No.1252 del
Hak 5

Fortnite Hackers Get Hacked, Mapping Public Fitness Data on Polar - ThreatWire
https://youtube.com/watch?v=MuV2nzjiKkM [Embed]



OPSEC Endwall 08/23/2016 (Tue) 01:08:39 [Preview] No. 357 [Reply] [Last 50 Posts]
Discuss best practices for operational security.
12 posts omitted.


Endwall 03/26/2018 (Mon) 00:15:49 [Preview] No.1168 del
For better effect also disconnect any phones from your work study where you have your computers. And when doing sensitive things also disconnect your speakers from your desktop (Power off button or remove the input cord to your soundcard and power cord from the wall). Don't use WIFI anywhere, unless you're in a bind. Keep all your tcp/ip connections wired and firewalled. Don't use wireless 2.4GHz phones either. Don't give the party van more remote info to collect or ways to penetrate your residence remotely.

Personal and sensitive communications should be made face to face, or signaled using gpg or through other encrypted communications methods. Make sure the person you're talking to isn't a retard carrying a cellphone in their jacket pocket, and make sure to ask them about this before you start your conversations, and if they have a cellphone tell them to turn it off and remove the battery before you start your conversation.


Anonymous 07/12/2018 (Thu) 19:23:11 [Preview] No.1248 del
copied from:
>>>/b/17546

BASIC SECURITY TIPS UPDATED

(1) Don't use social media [Avoid Facebook/Myspace/Twitter/Snapchat/etc.] (no brainer) Tell your friends to just hang out with you face-to-face instead of using social media.
(2) Forward secrecy (keep your mouth shut about any personal info if you don't want to expose yourself)
(3) Use a cheap private VPN (w/ no IP logging policy) and Tor browser! You can also use an OS like Whonix or Tails to spoof your MAC address in extreme cases.
(4) Always disconnect your internet (physically) when you are not going to use it! Make sure bluetooth and WiFi is physically disabled/disconnected. Don't keep your modem online all the time! If you do, you are asking to be hacked!
(5) Use an old "flipper" phone. AKA a jitterbug. Cover up any camera if has one. Jitterbugs are basic cellphones for people with disability problems / senior citizens! Just a bare basic cell phone where you can take out the battery. Has no internet platform. Any kind of device that has a camera you might want to consider covering up because they can easily be hacked to spy on and identify you remotely.
(6) Flock to flea markets, garage sales, thrift shops to buy older electronics! Do not by 'smart' or 'green' appliances! Learn how to maintain and fix older products/utilities too! All IoT (Internet of Things) tech can be used to spy on you, avoid IoT and 'home automation' technologies! Trojan horses, all of them.
(7) Never put your real name or personal info into your computer, always use FAKE names / aliases.
(8) Use cash whenever possible. Credit Card and other digital transactions can be tracked and directly linked to you. Cash could be tracked back to you too, but it is much harder and takes a lot of effort and human resources for governments to do.
(9) No OS is safe. Just exclude as much personal information you can from your Operating System. Make sure its disconnected offline when not being used! Make sure bluetooth and WiFi is also physically disabled/disconnected when not in use. If you use a "hot spot" which I do NOT recommend, at least turn it off and put it inside a little faraday cage bag when not being used (to prevent more sophisticated remote tampering).


Anonymous 07/12/2018 (Thu) 19:27:21 [Preview] No.1249 del
>>>/b/17546
(10) Always bleach you browser cache / cookies / web logs! 35x gutmann style! (Bleachbit, Ccleaner, etc.)
(11) Browser Security: Use Noscript Security Suite add-on. Noscript is a must: make sure to block all global scripts, wipe the whitelist in Noscript and re-configure the whitelist that best fits your browser habits. IPFlood is also a useful add-on to obfuscate IP GET requests. You should use Random Agent Spoofer (or Blender) to spoof your browser & OS metadata while you surf the web, making it a lot more difficult to track your activity. Tin Foil is another great security addon. Also, make sure WebGL and WebRTC are disabled in about:config (research how to disable those, there are tutorials out there).
(12) Its best to have two computers, rather than just one. For example, have one just for banking / legit LEGAL purposes. Have another one (completely separated) just for private or illegal activity. Make sure you don't put any personal info in the private computer.
(13) Use encryption and strong passwords! Write them down on a piece of paper or memorize them. DO NOT store passwords on a computer file. That is a big no-no! Try easy to remember long sentences for passwords, and combine all the words together. The more characters used, the harder it is for hackers to break the passwords.
(14) Have separate email accounts for each kind of activity (legal or not, don't matter).
(15) Make sure you physically disconnect your web cam or cover it up with black electrical tape. Most laptops these days come with web cams attached above or below the monitor. Make sure the camera cannot be used to identify you or spy on you in any way. (Yes, webcams can be hacked / remotely hijacked to spy on you!)
(16) Avoid new "Smart TVs" (they spy on you too)! If you have a newer TV, make sure you cover up or unplug the camera and microphone. Or keep it offline and disconnected from the cable box when not in use. You could cancel cable and just rip DVDs of your favorite movies and shows instead, using them on an offline TV set.
(17) Avoid all new digitized vehicles. They can easily be hacked, used to spy on you and even be remotely hijacked by criminal entities/governments!
(18) Never allow another person to use your computer. Make sure you routinely backup important files to a flashdrive or DVD and store that data offline. Also make sure you have a backup copy of the OS you use as well as backups of the software you use. If you ever have problems with your OS someday, just wipe your partitioned OS, and then re-partition the OS again yourself from scratch. Do not allow others to 'fix' your computer, they could easily steal information from your OS you might not want them knowing about. Geek Squad works with the FBI and other agencies to steal data from their customers, do not trust them to fix or repair your computer.
(19) Any photos you take with modern cameras contain EXIF metadata that contain GPS coordinates among other data used to identify the owner of the photo. If you store your modern photos online, people will be able to identify you. Don't do it! I repeat: do not post modern photos online unless you want to be identified! (I have been told PNG formats do not store any metadata, so photos converted to PNG might be safe).

Test your online privacy and learn more: https://www.privacytools.io/


Anonymous 07/13/2018 (Fri) 15:50:44 [Preview] No.1250 del
I might as well add this report to this OPSEC thread: https://archive.fo/bBjkm

Do not allow any electronic made after 2018 into your home and you better have some backup older electronics which don't have cameras and hidden mics. The Wall Street Journal just rubbed it in our face that this is going to become the norm very soon as they will be embedding tiny microphones in almost every single thing they can get away with. So anything digital beyond 2018: don't buy it.

And do avoid things like Echo, Siri and other crap created by the big tech monopolies. Make it clear to your family, relatives and friends you won't allow this around your presence (or at least in your own residence). It is all up to us to wake others up about how they are stealing our data and selling it all over the world and if we allow it we are stupid as a bunch of rocks.


Endwall 07/13/2018 (Fri) 23:55:01 [Preview] No.1251 del
>>>/b/17546

I agree cook your own food. Buy from the local farmer's market, or from the grocery store. Cook your own food in your own house. Don't order in. As you mentioned its easy to poison you once they know your pattern. You call for take out and they intercept the delivery or have someone planted there to poison your pizza.

I just meant to say don't do crime or talk about crime or personal things on the phone, no phone sex, no dirty talk, just innocuous facts, and lawful business. "Hey are we low on milk? Yeah OK I'll pick some up, bye." Nothing about money, politics, drugs, crime, or sex. It's all being recorded digitally and stored, and if you become a "Person of Interest" they go through it and pin point all the incriminating stuff to use on you for blackmail, coercion, criminal indictment, front running etc.

Its too bad that they removed all of the public pay phones...If there were no cameras in the area you had a small level of anonymity (very small). We're going to have to look to an encrypted VOIP by tcp solution for a "Secure Line". Even then don't trust it too much.





Anonymous 06/11/2018 (Mon) 00:33:24 [Preview] No.12786 del
There is a lot of resources everywhere about hacking, but a lot of them are either old, or simply bad quality.

What would you advice to read? There is "Hacking: the art of exploitation", but I don't know, it seems too vague. I really would like something more network oriented.

Is it work to go through the phrack zines?


Anonymous 06/11/2018 (Mon) 22:24:23 [Preview] No.12788 del
>>12786
Samefag here. What do you think about ccna security exam? I downloaded the whole resources associated. Is it a good path?
thanks.


Anonymous 06/18/2018 (Mon) 23:20:10 [Preview] No.12801 del
I'm new and have no idea how to bump a thread (yes, I do. Close ur piehole Rob), so I'll just touch myself whilst checking the resources posted. Gracias, you delicious heathens.


Anonymous 07/12/2018 (Thu) 02:24:05 [Preview] No.12828 del
>>9100
idk how you fools struggle so hard, there is an industry defined path
>learn basic overall computer shit (A+)
>learn networking (network+)
>learn security (security+)

from there you can find your niche and specialize where'd you like. you don't even have to get the certs just have the knowledge (unless you want to get a job of course).


Anonymous 07/12/2018 (Thu) 22:01:32 [Preview] No.12834 del
(213.43 KB 620x414 bitches.png)
>>12741
I don't give a FUCK if they are getting into these political correctness stuff since I'm there to learn IT and security. And their tutorials are pretty good.



System Resources Endwall 07/05/2017 (Wed) 03:13:35 [Preview] No. 965 [Reply] [Last 50 Posts]
I have some observations to make.

## I just tested these systems:
MS DOS 6.22 runs in 384K of memory (1994)
MS Windows 3.11 runs in 2MB of memory with a full mouse driven GUI (1994)
Macintosh OS 7.53 runs in 7.4MB of memory , full GUI + TCP/IP (1996)
Macintosh OS 8.1 runs in 13.2MB of memory, (1997)
Macintosh OS 8.6 runs in 26MB of meomory, (1998)

OpenBSD 6.1 starts in text mode command line in 27MB of memory
OpenBSD 6.1 in Xenocara uses 65-80MB of memory to start up.

## from recollection:
Windows 7 800MB of memory (2009)

Parabola GNU/Linux starts in text mode cli using 150MB of memory
Parabola GNU/Linux in weston uses 300MB of memory

Message too long. Click here to view full text.

Edited last time by Endwall on 07/05/2017 (Wed) 03:17:31.
8 posts and 3 images omitted.


Anonymous 08/27/2017 (Sun) 17:39:20 [Preview] No. 1008 del
>>965
>OpenBSD 6.1 starts in text mode command line in 27MB of memory
Uses less than that for me.
This depends on architecture, with amd64 and i386 being some of the most memory using ones.


Endwall 09/19/2017 (Tue) 07:03:03 [Preview] No. 1031 del
>>1005

I trust FreeDOS more than I trust GNU/Linux. Get your system back up and running. I used to run this on a Pentium III system but it corupted the file system twice in a row after copying some files into the games directory. I Wiped and reinstalled, and tried it again same result. So I stopped using it, and started using MS DOS instead. But that aside I think that FreeDOS and OpenGEM have a real future. I think that FreeDOS should be an important part of the private computing future. They just need to port a heavy duty file encryption program to the base system and I'm sure gpg is already ported. When you get your system back up please post the memory usage results. Thanks!


Endwall 09/19/2017 (Tue) 07:06:02 [Preview] No. 1032 del
>>1008
The machine I used is a SunBlade 150 UltraSparc IIi 550MHz computer from 2003.


Anonymous 09/27/2017 (Wed) 21:38:23 [Preview] No.1038 del
I don't want to sound cliché but I suspect great part of the RAM in parabola is thanks to systemd.

Don't give up on GNU/Linux, there are some distros that take it to extremes to cut the packages to minimum. Source Mage in particular has the philosophy of only including what you want, nothing more, and the sources are clean and untouched. I don't have access to my installation but as soon as I get it I will post results, meanwhile look at how some guy went to have a graphical environment with 97MB.


Endwall 07/12/2018 (Thu) 08:34:29 [Preview] No.1247 del
Fresh install of Parabola/GNU/Linux-Libre/OpenRC

On an Intel core2 laptop

boot into cli from OpenRC

$ free -h

used 60 MB

start xorg as root

# startx

# free -h

used 75 MB

Message too long. Click here to view full text.




EndChan/InfinityNow Terminal Client Morphosis 06/03/2018 (Sun) 21:18:45 [Preview] No. 12749 [Reply] [Last 50 Posts]
How hard would it be to create a terminal client for endchan/InfinityNow? I know that the OverChan android app can view this site; does that work by scraping or is there an API?

It would be much more comfy to browse here from the terminal than through the browser. You could have proper keyboard navigation between posts, and you wouldn't need a mouse at all. The biggest issue that comes to mind would be solving the captcha for making posts.
4 posts omitted.


Anonymous 06/05/2018 (Tue) 03:37:03 [Preview] No.12757 del
>>12749
>How hard would it be to create a terminal client for endchan/InfinityNow?
That depends on you, namefag.
http://s6424n4x4bsmqs27.onion/tech/res/12749.json


Anonymous 06/20/2018 (Wed) 20:37:06 [Preview] No.12803 del
>>12752
second


Anonymous 06/21/2018 (Thu) 23:43:07 [Preview] No.12805 del
>>12749
I coded a little emacs extension parsing the json of a thread to a very readable org file (to save threads). So making a client wouldn't be that hard. But I'll not share it.


Anonymous 06/29/2018 (Fri) 16:36:08 [Preview] No.12811 del
Use emacs.
There are several ways to browse the web from it.


Anonymous 07/08/2018 (Sun) 09:39:38 [Preview] No.12825 del
https://github.com/bcskda/2ch-cli
Ncurses-based console client for sosach, you might try to fork it and change API.



Internet Security General Anonymous 04/16/2016 (Sat) 07:56:30 [Preview] No. 4 [Reply] [Last 50 Posts]
Continuing from >>>/tech/597
https://archive.is/INR3l
This is for non specific, general tips for anonymous web browsing and downloads, tips on browsers and browser configurations for the security concious that you don't want to make a new thread for.
88 posts and 7 images omitted.


ZyBxVLcAxIx Grace 06/09/2018 (Sat) 09:30:28 [Preview] No.1229 del
David Beckham has admitted that a big part of him has questioned whether he was right to retire from professional football but that he has been too busy over the past four months to dwell on the decision.

Hey that's great news. He's still in pretty good shape. He'll be signed in no time. Hope he gets a good contract!
No Spam 6 Month Ban
Edited last time by Endwall on 06/11/2018 (Mon) 07:00:31.


Anonymous 07/05/2018 (Thu) 23:59:13 [Preview] No.1241 del
Check out the bleeding edge tor source code!!

The 6-hop mod BREAKS THE COMPILING


torsocks git clone http://dccbbv6cooddgcrq.onion/tor.git


Anonymous 07/06/2018 (Fri) 01:26:42 [Preview] No.1242 del
>>1241
You can still do the 6 hop mod but in src/core/or/circuituse.c after you change default_path_len to 7 delete the line under it that says
else if fourhop_cutoff

also in src/core/or/or.h you can still change default_route_len to 6 but there is no option to modify max_recent_circuits from 1000 to 100


Endwall 07/06/2018 (Fri) 03:46:26 [Preview] No.1243 del
It compiled for me and linked in

src/app/tor

I haven't fully tested it yet though.

But you're correct the options have all been removed from or.h . Also much of the code has been moved around and segregated into different sub directories.

Keep an eye on this. Also if you have any other good Tor mods please feel free to share.


Endwall 07/06/2018 (Fri) 04:03:41 [Preview] No.1244 del
circuitstats.h: * 1000 is approx 2.5 days worth of continual-use circuits. */
circuitstats.h:#define CBT_NCIRCUITS_TO_OBSERVE 1000
circuitstats.h:#define CBT_MAX_RECENT_CIRCUITS 1000
circuitstats.h:#define CBT_MAX_MAX_RECENT_TIMEOUT_COUNT 10000
circuitstats.h:#define CBT_MAX_MIN_CIRCUITS_TO_OBSERVE 10000
circuitstats.h:#define CBT_DEFAULT_TIMEOUT_INITIAL_VALUE (60*1000)

this seems to have been moved into src/cor/or/circuitstats.h

use grep to search for other missing / moved variables. Thanks for the tip >>1241 , >>1242 .



(999.11 KB 360x449 "Et tu, Palemoon?".gif)
Palemoon blacklists NoScript Anonymous 05/12/2018 (Sat) 03:01:36 [Preview] No. 12708 [Reply] [Last 50 Posts]
As the subject says. It's been entered into their custom "bitch at the user with a popup until they disable it" database. To be fair to the developer, he has solid reasons for his stance. I'll try to summarize as there is a lot of misinformation and emotion out there fogging the issue.

1) The Palemoon project does not have enough developer juice to debug other software and addons.
2) Various users: "[website] does not work with Palemoon. Fix your shit, Moonman!"
3) Moonman: "Known issue. Stop being morons and disable NoScript. Thank you, and have a nice day."
4) Various users: "We did. Same problem. Fix your shit."
5) Moonman: "Oh. That's an actual issue with Palemoon then. I'm on it!"
6) Much hacking and cracking and time and talent are expended to no effect. Surprise! NoScript does not follow the standard of letting go of the browser when disabled. It lingers on. It has to be completely uninstalled with an added cache clearing operation on top of that.
7) Moonman: "It's NoScript. Get rid of it. Have a nice day."
8) Various users: "No. FIX YOUR SHIT!"
9) Moonman: "Crush. Kill. DESTROY!"

If you roll with my simplification you can see his point.

I have two observations. First, quite a few sites have a technical support checklist that runs like this: "What browser are you using? Palemoon? Oh good! We have two fixes you may choose from. One, use another browser. Two, go away and do not come back."

My irony sense is tingling.

Message too long. Click here to view full text.

9 posts and 1 image omitted.


Anonymous 05/13/2018 (Sun) 06:17:23 [Preview] No.12720 del
<another browser thread


Anonymous 05/15/2018 (Tue) 06:34:35 [Preview] No.12722 del
seamonkey just updated on my work computer (without asking I am flabbergasted) all of my add-ons still work though, which is surprising.
Only difference insofar as I can tell is it no longer just downloads stuff I tell it to download it asks where I want to download it each time which is a rather useless procedure.
It's still probably the best option for me at work on a windows computer.


Anonymous 06/20/2018 (Wed) 13:47:53 [Preview] No.12802 del
I'll hold on to and be using my 6 year old Mozilla browser then, because I will be using noscript while browsing the web: no ifs, ands, or buts.


Anonymous 07/05/2018 (Thu) 08:08:54 [Preview] No.12823 del
>>12708
2) 32 bit systems: Dunno. This is going to be a problem for me.

Not a problem for me. I use either text mode browsers. Dillo. or older versions which probably have a lot of security issues but I'm not worried about that seeing as the times I browse on those systems are old already. I don't feel like going through the mess and compiling my own version of firefox or whatever. But there is RetroZilla which is quite nice.


Anonymous 07/05/2018 (Thu) 16:23:46 [Preview] No.12824 del
OP again. I noticed the thread flying by on the overboard. May as well drop my final observations.

>>12823
I use Lynx with some regularity for ssh sessions, etc. In the year of our Lord 2018, a fully useful command line webbrowser still surprises the hell out of the Mircosoft wonks I come across. Nevertheless, a 32 bit system is no barrier to a desktop GUI, M$ or otherwise.

The end result was Waterfox for my 64 bit systems, and Icecat for my wee 32 bit on-the-road portable. The privacy tweaking learning curve was minimal and everything is running smoothly and to my satisfaction. Palemoon is a distant memory at this point. While this was an excellent thread all in all, I don't have anything else to add to the discussion and won't waste any more time on Palemoon related activities.

Thanks everyone!



(816.64 KB 1308x1588 womens_health_formula_1.jpg)
por favor amigo the hacker known as 4chan 05/12/2016 (Thu) 09:45:50 [Preview] No. 31 [Reply] [Last 50 Posts]
I need someone to do an illegal for me, upload these fonts in a zip to any pomf clone and post link here pls kthx X3.

https://aur.archlinux.org/packages/ttf-ms-fonts/


the hacker known as 4chan 06/10/2016 (Fri) 14:22:51 [Preview] No. 35 del
Sent ;)


the hacker known as 4chan 07/03/2018 (Tue) 22:08:31 [Preview] No.52 del
Arial *swoon*



(30.89 KB 800x800 Sticky.jpg)
Anonymous Board owner 05/09/2018 (Wed) 22:40:59 [Preview] No. 12705 [Reply] [Last 50 Posts]
Welcome to /tech/, a technology board. This board is for general discussion of technology.

Rule 1: Only threads about technology or /tech/ itself are allowed.
Rule 2: NSFW content are only allowed if they are spoilered.
Rule 3: No referral links, asking for cryptocurrencies, advertising or similar.
Rule 4: No spam or posts without meaningful content.

All rules and policies are open for discussion in this thread.

IRC: #/tech/, #InfinityNow and #endchan on irc.rizon.net - https://qchat.rizon.net/
Wiki (OLD): https://wiki.installgentoo.com/

Archived sticky threads:

https://archive.is/Lcqkj
https://archive.fo/WxkDv

Message too long. Click here to view full text.

Edited last time by _ on 06/19/2018 (Tue) 02:20:22.
16 posts omitted.


betamax Board owner 06/06/2018 (Wed) 20:25:08 [Preview] No.12769 del
For those that lack the context, here's some old threads:
https://web.archive.org/web/20170603035754/http://endchan.xyz/tech/res/597.html
>>10740
>>11785

Notice the gradual change of who's contributing and also notice how that Tor thing was criticized since day one. These days, that anon is only spamming his own list that he had somehow convinced the Endwall guy, AKA Board Owner of /os/ to host, and people here really don't feel compelled to contribute to that list anymore. More could be said as to who that anon is but that's unnecessary for the time being. As much as it was a /tech/ thing, now it's mostly just a website for a certain someone to promote his list as if it is /tech/ approved which it is not.


Anonymous 06/06/2018 (Wed) 22:17:09 [Preview] No.12771 del
>>12769
>promote his list
Do you really think this matters that much to me? Take a guess, I don't.
You guys can do whatever you want. Endchan stopped being funny manny time ago, that's why I and anyone contributes anymore. I tried to do something. Didn't work. Time wasted.
Now go play moderator as you wish.


betamax Board owner 06/06/2018 (Wed) 23:02:34 [Preview] No.12772 del
>>12771
Yet you keep on crawling back here time after time to waste your time in your persistently broken english. Nobody's really falling for your funny business. Go bitch and moan elsewhere but you know all too well that I can't stop you from destroying this place, you'll bypass it one way or another.


Anonymous Board owner 07/03/2018 (Tue) 18:01:19 [Preview] No.12821 del
It is done.



(206.06 KB 1500x788 1080.jpg)
Anonymous 06/21/2018 (Thu) 22:54:06 [Preview] No. 12804 [Reply] [Last 50 Posts]
Does there exist any alternatives to the CUDA technologies offered by Nvidia? Asking because of a few software applications which I desire to run but rely on those technologies to work most efficiently.



Discussion Thread Endwall 02/24/2018 (Sat) 01:52:08 [Preview] No. 1145 [Reply] [Last 50 Posts]
DISCUSSION THREAD
Want to say something off topic about anything?

Have a hot tip about something in the computer security world that doesn't fit into any current thread or category?

Want to chat with your fellow invisible 7 proxy friends?

Want to tell Lt. Gen Michael Hayden, GEN Keith Alexander, ADM Michael Rogers, GOOGLE, AMAZON, FACEBOOK and Microsoft etc. how you feel?

It's open mic at >>>/os/ , anything goes!!

Put all of your banter here:
3 posts omitted.


Anonymous 04/11/2018 (Wed) 00:45:14 [Preview] No.1200 del
Watching the Zuckerberg testimony to the Senate Judiciary & Commerce Commitee on C-SPAN2.

This Zukerberg guy seems to think that we're dumb. He keeps saying that Facebook only knows about what you share in terms of likes, dislikes, and pictures.

Here's something that they do: They track who's pictures you click on, how many you look at, and how long you linger on a picture or on someone's page, they also track who you creep on from people not in your friends list. They can use this to harass you and blackmail you. They can use this to determine your sexual orientation, and determine who you find sexually appealing, without you sharing the information explicitly, among other things. They also build extensive profiles on your political viewpoints, and track and monitor all of your connections and affiliations.

None of it is private. Don't use this service. It's a PRISM service provider, and can be used to triangulate your position and activities in the real world, and preempt and stop you from doing activities. RUN. Don't use it.

If you have to use it for business, be careful, be aware that it is an intrusive surveillance platform. Nothing you do on it is private, it's all tracked and stored in a database. They track all of your clicks, and database all of it and use it to determine information about your preferences that you don't actually share. Using very sophisticated statistical data mining. They also share this data with many more 3rd parties than just the Government of the United Sates of America. Don't use it if you can avoid it.


Anonymous 04/20/2018 (Fri) 08:19:36 [Preview] No.1206 del
>>1149
hmm, I checked again and it's up again.


Endwall 06/18/2018 (Mon) 22:44:25 [Preview] No.1231 del
Can someone check these links for me or do some kind of analysis:

Endware Hidden Service
http://42xlyaqlurifvvtq.onion
'Best Practices in Secure Computing
http://hjvx7xg3n4ejezmh.onion

The Endware hidden service is down and I can't figure out why. The connection is up, and the server is up. I think I've been blacklisted from a tor directory or tor directories plural.

Any insight is appreciated. Thanks.


Endwall 06/18/2018 (Mon) 22:54:33 [Preview] No.1232 del
I think Sulu just fired his photon torpedos at me.

http://42xlyaqlurifvvtq.onion


Endwall 06/19/2018 (Tue) 07:52:41 [Preview] No.1233 del
>>1232

I'm not sure what the problem was; it didn't seem to be on my end. My guess is that some tor directories went down, but I'm not sure what else was going on. Anyways I deleted the host name and private key and restarted tor and it seems to be working again. As far as I can tell my servers were not compromised, this problem wasn't on my end or server side, and had something to do with the Tor network. I can access both web pages now.

Here is the new url for the Endware Hidden Service:

http://ifcfqq3cwrr74v6q.onion/



(203.71 KB 600x808 cage.jpg)
6 posts and 1 image omitted.


Anonymous 06/09/2018 (Sat) 22:16:27 [Preview] No.12781 del
reminder, if you don't like gitlab.com, there's always gitgud.io.
They've never lost any user data and run on faster hardware.


Anonymous 06/10/2018 (Sun) 04:34:49 [Preview] No.12782 del
>>12780
GitLab as a web-based Git-repository manager with wiki and issue-tracking features is not GitLab the website that's on Microshit servers. GitGud.io runs on GitLab software, gitlab.gnome.org is not GitLab.com, etc., so basically, you're still a fucking moron.


Anonymous 06/10/2018 (Sun) 12:36:28 [Preview] No.12785 del
>>12782
Damn, why so hostile?
I obviously referred to GitLab as a service (and GitHub as a service, not the GitHub desktop client used in offline mode) and that 250000 project whom just fled over according to https://twitter.com/gitlabstatus/status/1003887898142367744


Anonymous 06/13/2018 (Wed) 00:54:02 [Preview] No.12789 del
(112.00 KB 983x1445 allura.png)
(70.21 KB 783x503 link_to_artifact.png)
(101.08 KB 827x819 threaded_discussion.png)
A reminder that Apache Allura (which is used by SourceForge) still exists: https://allura.apache.org/
And it also includes a forum. What I always hated about GitHub and GitLab that some projects have hundreds of open "issues" because people use the Issue system as a forum for every type of discussions.

+bonus 1: usable without Javascript
+bonus 2: non-flat theme


Anonymous 06/18/2018 (Mon) 14:57:44 [Preview] No.12799 del
http : //JAPANFC2CAM.7th . it

This is a SFW board, NSFW content (which includes links) must be marked as NSFW content but otherwise this is considered spam. I'll let you go off with this ONE warning.
Edited last time by _ on 06/19/2018 (Tue) 02:07:56.



(131.90 KB 1876x781 Fer32.png)
Anonymous 06/15/2018 (Fri) 04:23:22 [Preview] No. 12790 [Reply] [Last 50 Posts]
It is very much a possibility that that which I seek no longer exists, but yet I shall post this here in an attempt to see if another has the .png file mentioned within this image. It was said to contain threads relating to the suppression of information released by whistleblowers along with information summarized in the rest of the post.

Any input is greatly appreciated.
3 posts omitted.


Anonymous 06/15/2018 (Fri) 07:22:28 [Preview] No.12794 del
is the info pertaining to anything particular? I read the whole thing but not sure if it's even hinting to anything in particular


Anonymous 06/15/2018 (Fri) 07:46:33 [Preview] No.12795 del
(40.26 MB 650x466 polak.png)
Sorry, I can't help you.


Anonymous 06/15/2018 (Fri) 08:04:11 [Preview] No.12796 del
(24.29 KB 366x366 fake assange.jpg)
>>12792
No, it used to be a thread in >>>/POLAK/ but then some goddamn /intl/ gay nigger goon spammer(s) came along and took over that board and deleted all the content of the salt and blockchain files, of which after he was kicked out, much of them simply vanished, a couple fled to voat only to realize how much of a shithole it is, gave up, and a couple supposedly visited by spooks. The current Board Owner of /POLAK/ isn't the previous Board Owners of /POLAK/.

The whole point was to uncover the real untampered password behind Assange's encrypted files somehow through using the right blockchain data because of a supposed deadman switch that might had been dropped around the time rumors of black operations happened in the Ecuadorian embassy I think around October 2016 if I recall correctly. After that event, Wikileaks™ and Assange™ denied it happened yet Assange didn't show himself outside the window like he usually does while all of the original Wikileaks staff were pretty much gone if you knew even a tiny shred of their history. The John Pilger interview after that event was using some software capable of real time face capture and reenactment as well as audio signature, a clean shaven version of a man in his prior public appeearance had a beard. For a very long time there was a fake Julian Assange actor in his place and was the face of Julian's newer Twitter account. The interview after that one with Sean Hannity however, looked like the real deal guy which some speculate why the real Assange came back under what circumstances because something wasn't right.

None of that matters in the long run, Wikileaks have been and will continue to be co-opted by certain people of unknown power over this world and we will never ever fully realize what happened, a real spooky story which no matter how you look at it, nothing really changes in the end as the US government is still wholly corrupt and unable to jail the prime suspects of various criminal acts behind the 2016 election which is tied to various other undeniable public proof for conspiracy. Pick your own headcanon, none of it matters in the end. You could assume that white hat hackers somehow convinced their masters to leak certain information through Wikileaks™ and Assange™, or you could assume the very (((worse))). There was another deadman switch code released after but nobody gave a shit at that time since the consensus now is that some important people knows the key behind the encrypted code to decrypt should Wikileaks altogether gets shut down before their gathered documents get released. There's of course some ties with pizzagate and general Trump stuff but that's all political in its nature which is not /tech/ related. I still do think that the following image doesn't look like the real Assange but I can sure be totally wrong about that.


Anonymous 06/15/2018 (Fri) 08:06:21 [Preview] No.12797 del
>>12796
Hmm, seems like /POLAK/ is gone. Well, it's for the best really.


Anonymous 06/15/2018 (Fri) 19:43:23 [Preview] No.12798 del
>>12796
This sums it all up very nicely. The deadman key was huge happening, such a shame nothing was uncovered in the end.



Ghost in the shell Anonymous 03/07/2017 (Tue) 21:36:42 [Preview] No. 224 [Reply] [Last 50 Posts]
I won't pay for the new live action movie because I don't like white-washing movies when there are qualified asian actors for the roles. Frustrating. Can't hold a candle against the original anime:

https://youtu.be/QxkMzn4et2U


Anonymous 03/07/2017 (Tue) 22:27:06 [Preview] No. 225 del
The saving grace might have been if she got her tits out. All they did was take an amazing film and ruin it for normies.


Anonymous 04/16/2017 (Sun) 06:58:43 [Preview] No. 269 del
>>224
All the jap actors are terrible and talk stupid. Scarlett did a good job


Anonymous 07/08/2017 (Sat) 16:50:59 [Preview] No. 277 del
>>269
>defending a fat kike
>defending needless white washing of a product

I wish Shingeki no Kyoujin was handled by Hollyjew.


Anonymous 08/21/2017 (Mon) 22:04:22 [Preview] No. 286 del
>le whitewashing
>original motoko has gray eyes and is 1,80 m tall
>major is a fucking robot and becomes little girl in the end of the anime
>character artist is fucking lesbian hentai mangaka and Oshii didn't ever imply Kusanagi had japanese appearance
butthurt murican chink detected
In the movie she is not Motoko in the beginning. She has a makeup that makes her eyes look slightly asiatic.
but movie is shit still, they didn't find actual japs to play confirmed japs like Togusa and Batou, the cgi is really awful, the didn't bother with creating a new city, they just slapped some olograms on HK skyline, and fat jewess is too old to play such role (there are some scenes without cgi where you can see her fat belly), but she is recognizable worldwide and I really doubt there are japanese actresses with enough skill and english knowledge (lipsync dubbing is not a common practice in hollywood).


paython33@deeb.web. paython 06/14/2018 (Thu) 04:18:11 [Preview] No.291 del
god site



WireGuard ported to OpenBSD Anonymous 05/25/2018 (Fri) 07:26:39 [Preview] No. 12745 [Reply] [Last 50 Posts]
zx2c4 ported WireGuard to OpenBSD... that's great to have a formally verified VPN software in one of the most secure systems today:
https://marc.info/?l=openbsd-ports&m=152712417729497&w=2


Anonymous 05/25/2018 (Fri) 07:36:55 [Preview] No.12746 del
that's actually great news
t. great news pro

by the way, when will wireguard move from testing to stable in Gentoo?
I want muh post quantum algo kernelspace VPN too!


Anonymous 05/26/2018 (Sat) 09:41:29 [Preview] No.12747 del
(1.58 MB 320x240 1581.gif)
>>12745
WireGuard is not
>formally verified VPN software

>Y-y-yes it is!
No, it's not. It is experimental software that is based on a formally verified protocol. Protip: TLS is also a formally verified protocol.

In addition:
>WireGuard is not yet complete. You should not rely on this code. It has not undergone proper degrees of security auditing and the protocol is still subject to change. We're working toward a stable 1.0 release, but that time has not yet come. There are experimental snapshots tagged with "0.0.YYYYMMDD", but these should not be considered real releases and they may contain security vulnerabilities (which would not be eligible for CVEs, since this is pre-release snapshot software).

>>12746
>I want muh post quantum algo kernelspace VPN too!
WireGuard is not post-quantum secure by default, and in order to be configured to be, it depends on a pre-shared symmetric key that has to be exchanged out of band. At this point, that means hand-delivering the key.


Anonymous 05/26/2018 (Sat) 13:40:57 [Preview] No.12748 del
>>12745 (me)
>>12747
You're right. Yet, I think it's still better than IPsec and a good improvement over OpenIKED delivered on OpenBSD. It is in development, but I think in the next year it should be more stable and secure. Good keep looking into this, for people doing their own VPN.


Anonymous 06/11/2018 (Mon) 20:33:43 [Preview] No.12787 del
>>12748
>I think in the next year it should be more stable and secure
what other untold secrets of the cosmos does your crystal ball reveal, oh wise one! ?



5ghz waterchiller told! Anonymous 06/07/2018 (Thu) 07:21:40 [Preview] No. 12773 [Reply] [Last 50 Posts]
Intel CAKES their pants in 28 core 5ghz fiasco!

Crosspost from 8ch
>Intel hosts cringey as fuck presentation before AMD presentation
>Ends it with announcement of new 28 core CPU that will be stock 5 gHz
>Shows off a short cinderbench demo at 5 ghz
>Says will be available at end of 2018
>Doesn't specify price or what cooling it uses
>AMD announces Threadripper 2 right after with regular air cooled heatsink
>Next day Intel pulls demo units from show before press could dig into the specs
>Press manage to take photos of the mobo/cooler and some benchmarks
>Asus and Gigabyte used 1KW water chiller and custom loop to keep the chip at -10 at idle
>Commenters figure out it must be one of the Xeon Skylake X chips that Intel rushed for the show to have some desktop answer for TR2
>Anadtech mentions that they couldn't see one of the demo's at 5 ghz because there wasn't enough power to run the rig and the chiller at the same time
>Commenters conclude that the chip must be pulling over 600W at full 5 ghz

https://hooktube.com/watch?v=w5ZXlQefic0


Anonymous 06/07/2018 (Thu) 07:23:41 [Preview] No.12774 del
(33.00 KB 515x424 water-chiller-1.jpg)
(22.05 KB 620x279 1.jpg)
Fuck sake, endchan didn't post the images.

Anyway, this is another serious blunder from Intel, after all the exploits that came out from their corner cutting for speed.

Some links:
http://archive.today/2018.06.07-022212/https://www.hardocp.com/news/2018/06/06/did_intel_throw_in_28core_towel_at_computex

http://archive.today/2018.06.07-022605/https://www.anandtech.com/show/12907/we-got-a-sneak-peak-on-intels-28core-all-you-need-to-know

>We confirmed that Intel was using a water chiller in the 5 GHz demo, a Hailea HC-1000B, which is a 1 HP water chiller good for 1500-4000 liters per hour and uses the R124 refrigerant to reduce the temperature of the water to 4 degrees Celsius. Technically this unit has a cooling power of 1770W, which correlates to the fact that a Corsair AX1600i power unit was being used for the system.

http://archive.today/2018.06.07-022714/https://www.tomshardware.com/news/intel-28-core-processor-5ghz-motherboard,37213.html

>Intel's demo didn't tell the full story. Many in the press mistakenly assumed the new processor runs at 5.0 GHz at stock settings, but we carefully analyzed video from the event and spotted a few obvious signs that the processor was overclocked. Intel was apparently running some sort of closed-loop cooling that required insulating material around the tubing. This turns out to be a water chiller hidden under the table. As expected, all of the components are properly shielded to avoid excess condensation from the chilled liquid.

>The one-horsepower Hailea HC-1000B is a beefy water chiller that can dissipate tremendous amounts of waste heat, but it also requires more than 1,000W for operation. We were originally going to witness the demo first hand, but there wasn't enough power handy to run both the chiller and the system simultaneously


Anonymous 06/08/2018 (Fri) 01:17:33 [Preview] No.12778 del
Why is intel not prepared?
They must have a huge R&D advance, from all of this years without any real advance an breakthrough, against an AMD which was nearly none existence.
This demo seems like they took a random card on their desk, plugged some cooling and tapped this together.

That's weird. Maybe intel is in a bad shape, even though that's hard to believe with the money they're making for so much long time. I would like to read more about this.


Anonymous 06/10/2018 (Sun) 07:19:36 [Preview] No.12783 del
>>12778
Intel have been too busy losing their server market due to all the vulnerabilities in their chips because they cut corners to beat AMD in speed. I think Intel has been struggling to keep ahead of AMD for a long while now. This should be a spectacular shit show as they fall down hard in the coming years. I personally can't wait to see what new levels of low they can attain after this.


Anonymous 06/10/2018 (Sun) 12:22:06 [Preview] No.12784 del
>>12778
Their R&D has been in Yidsrael for a while now. They probably can't keep up with AMD and have been using fraud and pipe dreams to buy a little more time for years.



(174.10 KB 500x375 1404081830023.jpg)
Anonymous 04/18/2016 (Mon) 15:50:14 [Preview] No. 484 [Reply] [Last 50 Posts]
I came here assuming this board was some /r9k/ spinnoff.

How many bots we got here? Is this board all AI? Can someone teach me to create my own AI Waifu? I've been having strange dreams for a number of weeks and find myself here.
2 posts omitted.


mark 04/18/2016 (Mon) 15:53:41 [Preview] No. 490 del
>>487
is Polish my name is Greek jezzail kiting as far away as possible to Japanese dubs don't change voice actors for recurring


Anonymous 04/18/2016 (Mon) 15:58:07 [Preview] No. 494 del
>>490
Okay. ;/


mark 04/18/2016 (Mon) 15:59:03 [Preview] No. 495 del
>>494
made for gaijins it running Everyone bitched how to interpret a script file In this


Anonymous 08/22/2017 (Tue) 15:00:27 [Preview] No. 606 del
>>484
I find the bots on this board very helpful


Anonymous 06/02/2018 (Sat) 17:49:42 [Preview] No.608 del
did robutts create cryptomone?



Russia's 'VPNFilter' malware Anonymous 05/23/2018 (Wed) 15:38:53 [Preview] No. 12742 [Reply] [Last 50 Posts]
So, they claim Russia attacked about 500,000 routers in Ukraine, with a software that gave root to them. Don't know if it's really from Russia or just democrats trying to push the "election-was-manipulated" agenda, but, that's the future: not as many bombs, but teams that crack the systems to get intel:
https://www.reuters.com/article/us-cyber-routers-ukraine/cyber-firms-warn-on-suspected-russian-plan-to-attack-ukraine-idUSKCN1IO1U9?il=0


Anonymous 05/24/2018 (Thu) 17:23:56 [Preview] No.12743 del
James Clapper isn't a democrat you moron


Anonymous 05/25/2018 (Fri) 05:00:37 [Preview] No.12744 del
>>12743
There is no James Clapper mentioned in the article.



DIY, Modular, Open source Laptop Anonymous 07/09/2017 (Sun) 23:55:14 [Preview] No. 10163 [Reply] [Last 50 Posts]
Laptop form factor open source hardware design, built from off the shelf components for DIY, modular, open source computing.

CPU, RAM, graphics: 1x single board computer
FSB, ports: 2x powered USB hub
Battery: 1x USB powerbank, >5000 mAh, >2A
Input: 1x USB keyboard
Input: 1x USB trackpad
Storage: 1x USB flash drive
Network: 1x USB WiFi dongle
Audio: 1x USB sound card/headset
Display: 1x USB powered HDMI monitor
Case: 3D printed or DIY glued wooden case

Features:
-Completely modular, customizable, upgradeable and repairable
-User serviceable by all users
-Universal, modular battery and charger. Can swap battery when depleted

Message too long. Click here to view full text.

22 posts and 3 images omitted.


Anonymous 07/09/2017 (Sun) 23:59:20 [Preview] No. 10186 del
CPU, RAM, GPU: 1x single board computer

A Single Board Computer provides every component needed to build laptop, except for battery, display, keyboard and case, each of which can be added separately.

Single Board Computers provide CPU, RAM, GPU, motherboard and some other integrated features on a single board. They are full desktop computer system that is sufficiently small and low power consuming to be used as a mobile, DIY laptop. They are also very low cost (<$50).

The most important feature of Single Board Computers is that there are models that are fully open source. It is possible to build a fully functional laptop with Free Software only, including free firmware, wireless and 3D video acceleration drivers. It is even possible to get SBCs with open source hardware designs.

For reference:

Single Board Computers with free 3D video acceleration (Etnaviv)
Nitrogen6X ($225): Quad core ARM A9 @ 1 Ghz, Freescale i.MX6, Vivante GC2000, 2 GB DDR3, best option, compatible with mainline kernels
Nitrogen6_MAX ($299): Quad core ARM A9 @ 1 Ghz, Freescale i.MX6, Vivante GC3000, 4 GB DDR3, faster Nitrogen6X
Wandboard QuadPLUS ($139): Quad core ARM A9 @ 1 Ghz, Freescale i.MX6, Vivante GC3000, 2 GB DDR3, cheaper version of Nitrogen6_MAX, not mainline

Open source hardware Single Board Computers
BeagleBone Black ($55): Single core ARM A8 @ 1 GHz, TI Sitara AM335x, PowerVR SGX530, 512 MB DDR3, fully open source except GPU, mainline compatible, https://github.com/beagleboard/beaglebone-black

Message too long. Click here to view full text.



Anonymous 11/13/2017 (Mon) 09:51:26 [Preview] No. 11748 del
Charger

The DIY Modular Open Source Laptop is designed to be charged by any combination of solar panel, handcrank generator, USB AC adapter, USB car charger, USB port or thermoelectric generator. Unlike most rechargeable electronics, each charger can charge the USB powerbank battery of the DIY laptop seperately from the DIY laptop. This flexible and modular charging ensures the DIY laptop never runs out of energy, yet never needs to be charged either.

For reference
USB solar charger: SOKOO 22W 5V 2-Port USB Portable Foldable Solar Charger ($55)
Handcrank generator: K-TOR Pocket Socket Hand Crank Generator Portable Power Supply 10 Watts 120 Volts ($60)
Pedal generator: K-tor Power Box 20 Watt Pedal Generator ($200)
Thermoelectric generator: Camping Stove Thermoelectric Generator TEG Power - Devil Watt 15 Watt ($304)

Each reference charger can provide the 5V 2A needed to charge a USB powerbank at full speed. The most convenient charger will depend on the situation.

Solar panels can provide >150 W unattended outdoors at daytime.
Handcrank or pedal generators can provide <150 W attended indoors or outdoors, day or night. Handcrank generators can be used while standing or moving, but pedal generators can be used while also using the DIY laptop.
Thermoelectric generators can provide >150 W unattended outdoors, day or night. Indoors with ventilation.
USB AC adapters can be used wherever there is AC electric grid.
USB car adapters can be used with most DC electricity sources such as 12 V car batteries or six 1.5 V AA batteries in series. USB car adapters can also convert DC from solar panels, thermoelectric generators, handcrank generators, DC wind or hydroelectric turbines into 5V DC for charging the DIY laptop.

Message too long. Click here to view full text.



Anonymous 05/18/2018 (Fri) 01:26:51 [Preview] No.12733 del
>>12732
Very nice. Really.
I think this could be minimized in size, though, using trackpoint ('clit') instead of touchpad and squeezing the components inside. The wood color would also call too much attention while using it in public, so a matte black painting would be nice.
I don't know if you're the creator, but this is pretty cool.

About the keyboard, I had this idea some time ago of using a foldable keyboard from Blackberry, like this one:
https://www.amazon.com/Stowaway-Ultra-Slim-Bluetooth-Blackberry-Handhelds/dp/B0002OKCXE

So, all the components would be together with the display, like a mobile 'tablet', and this foldable keyboard could be unfolded just when you start using the computer and would serve as the 'base' for the display. This could make it less havier and also would be smaller i size.

Never finished that project, but I still think it's a good idea (although I'm thinking about head-mounted displays with hand-adapted keyboard now, instead of conventional laptop format).


Anonymous 05/19/2018 (Sat) 08:32:04 [Preview] No.12737 del
>>12732
That thing looks great. The only problem I see is the shitty looking hinge.