/os/ - Online Security

News, techniques and methods for computer network security.

Boards | Catalog | Bottom

Check to confirm you're not a robot
Name
Email
Subject
Comment
Password
Drawing x size canvas
File(s)

Remember to follow the rules

Max file size: 350.00 MB

Max files: 5

Max message length: 4096


Welcome to Online Security the place for internet and computer security, privacy and anonymity.
If you have some helpful tips please feel free to share your ideas. Start a new thread, or contribute to an existing thread.


Meta Thread Endwall 07/12/2016 (Tue) 12:03:36 [Preview] No. 171 [Reply] [Last 50 Posts]
Post any comments, concerns, or requests for the board in this thread.
Edited last time by Endwall on 07/12/2016 (Tue) 12:15:00.
24 posts and 6 images omitted.


Anonymous 02/11/2018 (Sun) 20:41:09 [Preview] No.1111 del
>>1108
Why do you do it? Considering you have "school," a life to live, why would you sacrifice your resources for all of this?


Endwall 02/12/2018 (Mon) 05:05:49 [Preview] No.1113 del
>>1111

Self defense primarily.

Read these threads the answer is in here:
https://archive.is/INR3l
https://archive.is/bpQXa

Anonymous 02/14/2016 (Sun) 00:10:59 [Preview] No. 1726
About the developer:
I will remain anonymous as best I can.
I am not a professional computer scientist or programmer.
I have other commitments and can't maintain a continuous development cycle, but will work on this project sporadically as I have ideas or as issues emerge.Help and assistance on ideas are welcome. Critique and criticism of my tools are also welcome. Positive and negative reviews of experiences using endwall endset and endtools are also welcome.Point out any bugs that you find in the code and or errors in logic or in style or implementation that you find in the script and I may modify it in a release upon review.

Anonymous 02/13/2016 (Sat) 06:51:33 [Preview] No. 1693
>>1687
1)My hope was to get some help with internet security by starting a thread asking for contributions of techniques and ideas. So far that's worked out pretty well. that ipsets thing has solved a major problem my server was running into. I'm glad I got that tip from here. Thanks >>1652 good work!

Message too long. Click here to view full text.



Endwall 02/12/2018 (Mon) 05:16:08 [Preview] No.1114 del
This entire board >>>/os/ is basically the last 30 mins of Star Trek 2: The Wrath of Khan, with Endwall in the staring roll as Khan, and Admiral Michael Rodgers in the Staring role as Captain James T. Kirk.

Endwall: "I spit my dying last spit at thee Rogers!!"
Admiral Michael Rogers: "ENDWAAAAAAAAALLLLLLLLLLLL!!!!!!!!!!!!!!!!!!!"


Anonymous 02/13/2018 (Tue) 21:59:58 [Preview] No.1118 del
>>1108
There we go.


Endwall 02/18/2018 (Sun) 05:49:07 [Preview] No.1136 del
>>1114

How I thought my computer privacy and security and anonymity was doing:
https://youtube.com/watch?v=e7X01_j_oDA [Embed]

How my computer security privacy and anonymity actually is:
https://youtube.com/watch?v=iPQfwmfRq2s [Embed]
https://youtube.com/watch?v=xrUEjpHbUMM [Embed]
Edited last time by Endwall on 02/18/2018 (Sun) 06:46:54.



Welcome to Online Security: Sticky Thread Endwall 07/13/2016 (Wed) 03:11:01 [Preview] No. 181 [Reply] [Last 50 Posts]
Hello and Welcome to /os/, Online Security. This is a board for the discussion of online security, privacy, anonymity, and news from cybersecurity and privacy world.
RULEZ
1.Follow the global rules
2.No Spam
3.No Classified Documents or leaks of Classified Documents or Files (News articles, or commentary about the documents or files is OK)
4.No Child Exploitation Material
5.Images should be safe for work and relevant to the post or thread, commentary can be NSFW
6.No Advertisements of Hacker Services or Solicitations for Hacking Services
Related Boards
tech >>>/tech/ Hacker >>>/h4x0r/ Security Concepts>>>/sec/ EndSoft >>>/endsoft/
Privacy Guides
https://thetinhat.com/index.html
https://archive.is/zq2Ip
http://crypty22ijtotell.onion/handbook/
http://yuxv6qujajqvmypv.onion
http://deepdot35wvmeyd5.onion/security-tutorials/
Software Recomendations

Message too long. Click here to view full text.

Edited last time by Endwall on 05/11/2018 (Fri) 08:41:05.


Sticky Bump Endwall 10/23/2016 (Sun) 18:54:40 [Preview] No. 624 del
TOP BUMP
Additions:
TENS , https://spi.dod.mil/lipose.htm , US Air Force Live CD <-- online banking for mom and dad.
LibertyBSD http://libertybsd.net/ , https://libreboot.org/docs/bsd/openbsd.html
Edited last time by Endwall on 01/02/2017 (Mon) 11:03:40.


Sticky Bump Endwall 04/30/2017 (Sun) 03:29:12 [Preview] No. 894 del
Heads https://heads.dyne.org/ http://fz474h2o46o2u7xj.onion ; Devuan non-systemd version of Tails (Disclaimer: Website/Project uses occult language with communist signals)
Devuan https://www.devuan.org/ http://devuanzuwu3xoqwp.onion
Systemd Free http://systemd-free.org/
Edited last time by Endwall on 10/07/2017 (Sat) 03:03:59.


Endwall 06/01/2017 (Thu) 08:14:41 [Preview] No. 933 del
Mozilla Firefox Hardened Profile
https://github.com/ghacksuserjs/ghacks-user.js



Online Security News Endwall 07/07/2016 (Thu) 06:09:23 [Preview] No. 149 [Reply] [Last 50 Posts]
See a news article or CVE bug report on an emerging computer security issue and want to share it? Post below.

I will also post links to Hak5 Threatwire videos.
Edited last time by Endwall on 07/07/2016 (Thu) 16:22:47.
491 posts and 3 images omitted.


Endwall 04/13/2018 (Fri) 07:32:29 [Preview] No.1201 del
Hak5

Fast and Easy Free VPN from Google - The Open Source OUTLINE - Hak5 2403
Duration : 17:59
https://youtube.com/watch?v=sl_9dAArAzw [Embed]

MyFitnessPal Hacked - ThreatWire
Duration 8:20
https://youtube.com/watch?v=hXtSbRazsQs [Embed]

Stingrays Found in DC?! Best Buy and Delta Hit with Malware - ThreatWire
Duration: 10:57
https://youtube.com/watch?v=7essVRuqwjM [Embed]

How secure is Internet traffic? - Hak5 2405
Duration: 5:15
https://youtube.com/watch?v=LGABCWReYVk [Embed]


Endwall 04/13/2018 (Fri) 07:49:35 [Preview] No.1202 del
Jupiter Broadcasting
Tips from the Top | TechSNAP 363
http://www.jupiterbroadcasting.com/124047/tips-from-the-top-techsnap-363/
Posted on: April 12, 2018
Getting started or getting ahead in IT is a moving target, so we’ve crowd sourced some of the best tips and advice to help. Plus a tricky use of zero-width characters to catch a leaker, a breakdown of the new BranchScope attack, and a full post-mortem of the recent Travis CI outage.
audio
http://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/2f57aaaa-4b64-4c6f-809f-121a3710a543.mp3
video
http://201406.jb-dl.cdn.scaleengine.net/techsnap/2018/techsnap-0363.mp4
youtube
https://youtube.com/watch?v=jJe_NVqCQnU [Embed]

Linux Action News 48
http://www.jupiterbroadcasting.com/123937/linux-action-news-48/
Posted on: April 8, 2018
The Linux kernel gets a spring cleaning, things are going well for RISC-V, and Linux-Libre is clearly prioritizing freedom over security with their recent update. Steam Machines were pronounced dead and then alive this week, we’ll try and clear things up, and Mozilla has a new project.
audio

Message too long. Click here to view full text.



Endwall 04/13/2018 (Fri) 07:55:38 [Preview] No.1203 del
Jupiter Broadcasting
Rebuilding it Better | TechSNAP 362
http://www.jupiterbroadcasting.com/123852/rebuilding-it-better-techsnap-362/
Posted on: April 4, 2018
It’s a TechSNAP introduction to Terraform, a tool for building, changing, and versioning infrastructure safely and efficiently. Plus a recent spat of data leaks suggest a common theme, Microsoft’s self inflicted Total Meltdown flaw, and playing around with DNS Rebinding attacks for fun.
audio
http://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/60c0569a-55b4-446f-bf42-6d017d933f4f.mp3
video
http://201406.jb-dl.cdn.scaleengine.net/techsnap/2018/techsnap-0362.mp4
youtube
https://youtube.com/watch?v=dxy1DJVGPTA [Embed]

The Stallman Directive | LUP 243
http://www.jupiterbroadcasting.com/123817/the-stallman-directive-lup-243/
Posted on: April 3, 2018
Richard Stallman has some practical steps society could take to roll back the rampant and expanding invasion of our privacy. But his suggestions leave us asking some larger questions. Plus the latest on the march to Juno, some fun app picks, a quick look at Qubes OS 4.0, community news, and more.
audio

Message too long. Click here to view full text.



Endwall 05/08/2018 (Tue) 04:11:48 [Preview] No.1208 del
Hak5

Can DNS speed up your Internet connection? - Hak5
https://youtube.com/watch?v=G4LWhwp7gXA [Embed]

WTF IS GDPR?! Facebook and Apples New Privacy
https://youtube.com/watch?v=JnS9YqXwj50 [Embed]

Amazon Echos Can Spy On Users - ThreatWire
https://youtube.com/watch?v=rG977uxXipw [Embed]


Endwall 05/20/2018 (Sun) 22:17:42 [Preview] No.1218 del
Hak 5
An Unfixable Android Hardware Issue - ThreatWire
https://youtube.com/watch?v=6fuckgu8PAc [Embed]

PGP IS ON FIRE! Or Is It? - ThreatWire
https://youtube.com/watch?v=dPTNfkMuUu0 [Embed]



Endware Endwall 05/03/2016 (Tue) 08:54:28 [Preview] No. 32 [Reply] [Last 50 Posts]
Endware is a suite of programs geared towards internet privacy, security, and anonymity.

Endwall: endwall.sh is an iptables based firewall script designed to be implemented on any linux distribution shipped with iptables. endwall.sh is based on default drop policies, coupled with a novel strategy of passing packets on local host ports only for those enabled by the enduser. It comes with a variety of well used ports enabled with several additional port passing configurations available by uncommenting the script. It provides essential security to a new user.

Endsets: endsets.sh is a script that adds blacklisting and whitelisting functionality to endwall.sh. It depends on the program ipset. It is persistent on reboot if you enable ipset as a service. This is the recommended blacklisting tool for endwall if you are running a server or planning on opening up ports and services to the public and will require daily blacklisting of new incomming IPs.

Endlists: endlists.sh is a traditional text file list based blacklisting and whitelisting script. It has slow performance, and can't be updated on the fly. Good for <1000 ip subnets, very tedious and slow to run for more than that. Blocks the IPs by adding them as individual rules to the iptables ruleset. Works but not recommended for heavy duty on a server. May be useful for workstation use to block ip ranges if you are not opening up ports and services to public clients.

Endtools: endtools are a collection of scripts including alogz.sh, mlogz.sh, spamlogz.sh and iplookup.py. These scripts will help to service an enduser of endwall in adminstering endsets/endlists.

iplookup.py is a geoiplookup script written in python and requires python and pygeoip. It has simmilar functionality to maxmind's geoiplookup program and uses the maxmind *.dat files.

spamlogz.sh is a script that searches through log files to find flagged log entries flagged in endwall.sh, endsets.sh and endlists.sh.

alogz.sh is a daily log reading script designed to read the output of an apache http server's log output.

mlogz.sh is a daily log reading script designed to read the output of a postfix smtp server's log output.

Message too long. Click here to view full text.

199 posts and 3 images omitted.


Anonymous 02/21/2018 (Wed) 21:22:28 [Preview] No.1138 del
bastille linux
deep-6'd by the deepstate


Anonymous 02/22/2018 (Thu) 17:39:29 [Preview] No.1139 del
>>1138
Info?


Endwall 02/22/2018 (Thu) 21:09:07 [Preview] No.1140 del
>>1138
Please keep the commentary in this thread to Endware discussion. As this note might be falsely attributed to Endwall. I didn't write it.

I don't know anything about this information. I assumed it may have been a recommendation for me to try the Bastille Linux script or a notice about its status... I looked around and didn't find anything in the news about any status changes or problems with it... I'm not sure what this is about.

Please post information and notifications of this type in Online Security News, or in the Internet Security General. And possibly follow up with a link or source backing up the information. Thanks.


Update Endwall 05/10/2018 (Thu) 08:03:33 [Preview] No.1209 del
endstream.sh
- I've added about 200 livestream.com channels mostly of local news from USA. I have to organize this into a coherent framework and also move foreign language channels into language groups. Other than organizational stuff, I'm more or less done working on this product for the next couple of months, it should be static. I want to slowly replace the youtube streams with other alternatives whenever available. It's too much of a hassle repairing the keywords every once and a while, or checking to see if the provider has stopped providing content.

endtv.sh
- I replaced the engine with the endstream engine and added some more channels from the website. I have to find and remove all the dead channels. That process should take place incrementally over the next couple of months.

endradio.sh
- I've added a couple radio stations, ABC AU, and some Russian stations, not much but some minor adjustments.

All the files are available in the usual places.

Moving forward I plan on working more on the BSD ports and updating them to the current GNU/Linux equivalent. I also plan on making a reference version of Endware for Debian, by setting up a Debian box and testing the scripts and modifying them until they work under that environment. Some of the broken scripts will be looked at again to see what can be done if anything to repair them. I'll also update the license and do some license revisions as mentioned in the EULA thread. There is nothing really revolutionary on the horizon in terms of new software for Endware.

Any bug reports, software requests, feature requests, etc. post below. Thanks.



Cryptography Endwall 05/12/2018 (Sat) 20:26:54 [Preview] No. 1211 [Reply] [Last 50 Posts]
In this thread we will discuss cryptography, cryptosystems, crypt-analysis, and tools for cryptography such as gpg and other tools. If you work in this field or hear of some relevant news about this field feel free to contribute. Use hyperlinks and source citations to back up any claims made if necessary.


Endwall 05/12/2018 (Sat) 20:33:48 [Preview] No.1212 del
Some introductory questions:

1) What are some good books on this subject both mathematical and practical?

2) What are some good methods to defeat crypt-analysis like frequency analysis to include when doing standard encryption methods like RSA using gpg? Would padding the plain text message before encryption with arbitrary random ASCII on both ends help or hinder this process?

3) Why is the trend for modern crypto to move away from using prime numbers towards elliptic curves? Speed? Security? Lower computation time?

Feel free to ask your own questions or to answer any that you see if you are knowledgeable on the subject field.


Endwall 05/13/2018 (Sun) 07:18:05 [Preview] No.1213 del
>>1212
2)
I'm suggesting to pad your messages with passgen.sh as I think that it might be helpful.

$ passgen >> message.txt
$ nano message.txt

/BwZ1X7Xe3YgJhlWtxjmjweodhiKm5Dg2mkuyEyTRTQCFL2AajWTTxGl2TW1/tSztDoz2Ci0YveM

This is the message. Have a nice day!

^X

$ passgen >> message.txt

$ gpg --list-keys | more
$ gpg -e -a -r Endwall message.txt

Message too long. Click here to view full text.



Endwall 05/13/2018 (Sun) 07:24:32 [Preview] No.1214 del
Of course do this on your air gap and shuttle the messages and replies by floppy disk to your transmission workstation. Do encryption and decryption on an air-gap, and move the messages by floppy disk message sneaker net FDMSN . That should mess them up really good. If they can still get to your messages after that then re-evaluate the trustworthiness of the counter-party correspondent.


Endwall 05/13/2018 (Sun) 07:25:53 [Preview] No.1215 del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This is the message

R+dVRSBw7ZHS0SxB19SpSr5tcHNHIU2Nea9LKIgD9rRQYLbxPqaD4GQJtSM3sUniM1uforqxc9VE
3H0/Fe3o1JJDh1xnfWwiscnpb9OcSdOJAH9+Lz5C+1Pgoh2ZYtwwhCxp2wtNfsmZWR6V7RKZMkO/
lGUrlL/P4pXTq+z0co7GOI1W6PNI5E2+0E91UOv7Id4iBUa8FFEyPv7TGDJ7ZWSnCCops4cmZXYF

Message too long. Click here to view full text.



Endwall 05/13/2018 (Sun) 07:29:29 [Preview] No.1216 del
>>1215
Why stop there? Pad every paragraph!!



Hardware Endwall 09/18/2016 (Sun) 18:31:31 [Preview] No. 580 [Reply] [Last 50 Posts]
Discuss hardware and alternative hardware concepts to increase computer and online privacy and security.
Edited last time by Endwall on 09/18/2016 (Sun) 18:50:04.
8 posts and 1 image omitted.


Anonymous 08/21/2017 (Mon) 22:34:40 [Preview] No. 1002 del
>Minifree isn't recommend or trusted anymore
>a shop owned by Libreboot main developer is not trusted anymore
Okay, shill. Take your overpriced garbage list and go back to reddit. You really added nothing new to value. instead of pointing to actual hardware with libre support like wireless chipsets with ath9k firmware or marvell-chipset based routers with 802.11ac support or mediatek-based NAS that runs fully free software you posted some Libre© TecnoPenguin™ overpriced jew shit.


also
>Libre Tea Computer Card
>still not FSF approved after 2 years of screeching
>absolutely harmful hardware lifecycle model
>le 3d printed laptop meme, 1366x768 15" screen
>not knowing about Neo900 and Openmoko


Endwall 09/03/2017 (Sun) 23:52:30 [Preview] No. 1011 del
RC2014
http://rc2014.co.uk/

RC2014 is a simple 8 bit Z80 based modular computer originally built to run Microsoft BASIC. It is inspired by the home built computers of the late 70s and computer revolution of the early 80s. It is not a clone of anything specific, but there are suggestions of the ZX81, UK101, S100, Superboard II and Apple I in here. It nominally has 8K ROM, 32K RAM, runs at 7.3728MHz and communicates over serial at 115,200 baud.

RC2014 is available in kit form for you to solder together.  Through-hole components are used throughout, making soldering easy, even for those with limited soldering experience.  Along with a selection of modules to extend functionality, such as serial terminals with HDMI output, digital input modules or, simple keyboard, the RC2014 is a very adaptable computer.

Assembly guides can be found here:
http://rc2014.co.uk/assembly-guides/

Module information including schematic diagrams and technical descriptions can be found here:
http://rc2014.co.uk/modules/

GitHub repository can be found here:
https://github.com/RC2014Z80/RC2014

Google Group for RC2014 owners can be found here:

Message too long. Click here to view full text.



Endwall 09/04/2017 (Mon) 00:33:49 [Preview] No. 1012 del
RC2014
http://rc2014.co.uk/
As soon as you turn RC2014 on you can start programming in Microsoft BASIC.  This is very easy to get started with and some very complex programs can be written.  To get right down to the metal, though, you can write your programs in Z80 machine code.

Development of the RC2014 has lead to a more powerful machine with pageable ROM, 64k RAM, compact flash storage and a whole range of expansion peripherals.  With the right modules, it’s now possible to run CP/M, which opens the RC2014 up to a wide range of software.

RC2014 can be bought from Tindie:
https://www.tindie.com/stores/Semachthemonkey/


Endwall 09/06/2017 (Wed) 21:07:20 [Preview] No. 1016 del
RC2014

Z80 Retrocomputing 18 - Z180 CPU board for RC2014
https://youtube.com/watch?v=D9u9hhNjcEY [Embed]
Dr. Scott M. Baker
In this video, I build and try out a Z180 CPU board to replace the Z80 CPU in my RC2014 retrocomputer. Aside from simply being faster than the Z80 that I'm currently using, the Z180 offers a lot of on-board peripherals (serial IO, timers, interrupt controller, mmu, dma, etc). I benchmark the 20 Mhz Z180 against my 7.3728 Mhz Z80. I'm saving exploration of the onboard peripherals for a future video. For more retrocomputing projects, see http://www.smbaker.com/

YM2149/ AY-3-8910 Sound Card for the RC2014 computer
https://youtube.com/watch?v=-iLwi9FagFE [Embed]

rc2014-ym2149 Designed by Ed Brindley
Demonstration of my sound card for the RC2014 computer. The board is Open Hardware and was produced entirely with Open Source Software (as was this video) PCB now available on Tindie:
https://www.tindie.com/products/edbrindley/ymay-sound-card-pcb-for-the-rc2014-computer/
Schematics and Gerbers for the board are available here:
https://github.com/electrified/rc2014-ym2149
Edited last time by Endwall on 09/06/2017 (Wed) 21:07:58.



Discussion Thread Endwall 02/24/2018 (Sat) 01:52:08 [Preview] No. 1145 [Reply] [Last 50 Posts]
DISCUSSION THREAD
Want to say something off topic about anything?

Have a hot tip about something in the computer security world that doesn't fit into any current thread or category?

Want to chat with your fellow invisible 7 proxy friends?

Want to tell Lt. Gen Michael Hayden, GEN Keith Alexander, ADM Michael Rogers, GOOGLE, AMAZON, FACEBOOK and Microsoft etc. how you feel?

It's open mic at >>>/os/ , anything goes!!

Put all of your banter here:


Anonymous 02/24/2018 (Sat) 02:00:58 [Preview] No.1146 del
I thought this was Operating Systems.

Where my Gentoo bros at?


Endwall 02/24/2018 (Sat) 02:34:06 [Preview] No.1148 del
>>1146
It will be Operating Systems when I'm done with it...


Anonymous 02/26/2018 (Mon) 00:14:21 [Preview] No.1149 del
https://searxes.danwin1210.me/
seems like he took down the clearnet searxes thing.


Anonymous 04/11/2018 (Wed) 00:45:14 [Preview] No.1200 del
Watching the Zuckerberg testimony to the Senate Judiciary & Commerce Commitee on C-SPAN2.

This Zukerberg guy seems to think that we're dumb. He keeps saying that Facebook only knows about what you share in terms of likes, dislikes, and pictures.

Here's something that they do: They track who's pictures you click on, how many you look at, and how long you linger on a picture or on someone's page, they also track who you creep on from people not in your friends list. They can use this to harass you and blackmail you. They can use this to determine your sexual orientation, and determine who you find sexually appealing, without you sharing the information explicitly, among other things. They also build extensive profiles on your political viewpoints, and track and monitor all of your connections and affiliations.

None of it is private. Don't use this service. It's a PRISM service provider, and can be used to triangulate your position and activities in the real world, and preempt and stop you from doing activities. RUN. Don't use it.

If you have to use it for business, be careful, be aware that it is an intrusive surveillance platform. Nothing you do on it is private, it's all tracked and stored in a database. They track all of your clicks, and database all of it and use it to determine information about your preferences that you don't actually share. Using very sophisticated statistical data mining. They also share this data with many more 3rd parties than just the Government of the United Sates of America. Don't use it if you can avoid it.


Anonymous 04/20/2018 (Fri) 08:19:36 [Preview] No.1206 del
>>1149
hmm, I checked again and it's up again.



Internet Security General Anonymous 04/16/2016 (Sat) 07:56:30 [Preview] No. 4 [Reply] [Last 50 Posts]
Continuing from >>>/tech/597
https://archive.is/INR3l
This is for non specific, general tips for anonymous web browsing and downloads, tips on browsers and browser configurations for the security concious that you don't want to make a new thread for.
76 posts and 6 images omitted.


Anonymous 02/15/2018 (Thu) 06:51:46 [Preview] No.1129 del
>>1126
I didnt make the image I found it on one of the rebeccablack/tech/ archives. Ghostery I still never was crazy about because it is like noscript if it noscript was bloated and didnt work.
I always try and remember the addons I am missing when configuring a firefox fork and that was a good image to use back a year or 2 ago.
>You can mess with the settings on most apps, repack them, and run them your way instead of having them screw with everything.

That is something I will keep in mind because some addons stop working like "white noise generator" which did what "trackmenot" does but in a seperate window with tabs randomly switching to random webpages.

I have a few suggestions to add to the list
adnausium, dolus, tamperdata and http nowhere

if I did not lock the prefs.js I will use https://jm42.github.io/compare-user.js/ for about:config modifying.


Anonymous 02/15/2018 (Thu) 13:50:29 [Preview] No.1130 del
>>1129
>if I did not lock the prefs.js
I just read up on this. It seems like locking is temporary and all you need to do to reverse it, is delete the lockfile.
>I will use https://jm42.github.io/compare-user.js/ for about:config modifying.
These might be useful to you:
https://pastebin.com/pdEbeX1m
Full list of all prefs defined in Mozilla's source code for 52. Some of them are hidden/ i.e not set in about:config so there'll be no way to know about them. And: http://kb.mozillazine.org/About:config_entries
Is a nice util for quickly finding out what each does, and available settings.


Anonymous 02/15/2018 (Thu) 14:48:33 [Preview] No.1131 del
>>1129
And if you're using a beta version or one with a "MOZ_TELEMETRY_ON_BY_DEFAULT", telemetry is perma-on, so be careful.
firefox-52.0esr/modules/libpref/preferences.cpp


Anonymous 02/15/2018 (Thu) 18:05:59 [Preview] No.1132 del
>>1130
>>1131
Thanks I always got confused about that. But you can never be too sure with firefox even forks have things like

camera.control.face_detection.enabled

set to true on default.


Anonymous 03/12/2018 (Mon) 02:03:56 [Preview] No.1160 del
I'm pretty sure Ghostery can be analyzed. I saw somewhere recently that they made it open source, so basically you can look through the source code if you want. Might be something worthwhile to do, but isn't necessarily something I would be able to do since I don't know shit about coding.



Endware EULA Anonymous 03/29/2018 (Thu) 04:43:38 [Preview] No. 1171 [Reply] [Last 50 Posts]
The Endware EULA is one of the most insanely idiotic things I have ever read. At no point in your rambling, incoherent license were you even close to anything that could be considered a rational thought. Everyone in the open source movement is now dumber for it having been written. I award you no points, and may God have mercy on your soul.

Also, btw, it's probably not meaningfully enforceable. A halfway competent lawyer would tear it to shreds in a court of law.

You should really consider changing it to one of the standard OSI or FSF approved licenses, most of which have been vetted by lawyers, some of which have actually been tested in court and (almost?) none of which are insane garbage like the Endware EULA.
14 posts and 2 images omitted.


Endwall 04/07/2018 (Sat) 03:52:37 [Preview] No.1195 del
> The enumerations presented were examples and are not meant to be exhaustive, however they were meant to be funny.
> For your own sake, and the public's, don't quit your day job to pursue a career in comedy writing.

The part I get a chuckle out of every time I read it is the solar system and space transport vehicles part, I picture Elon Musk reading the license and saying "This is a great license for our project", and then I get a mental image of astronauts on the International Space Station flipping channels on endstream and endtv to pass the time. The rest was meant to be serious.

> What constitutes a "neighbor"? That's not a term with a defined legal meaning, and to the extent that it has one, it's not what you seem to think it means. I can't share the code with someone in another country? They're not my neighbor. Or do you mean it in a metaphorical sense? Legal documents are probably a bad place for metaphors.

This is a valid complaint. I'll change the word neighbor to recipient .

> You say modify AND improve, not modify OR improve. I can only modify it if I improve it? What if you think my changes make it worse? Who decides? You? I guess I'm in violation of the license, then.

This is a valid complaint. I'll remove the word improve. You can freely modify the code and run and distribute the modified code. Improvements are not required, and I won't be the judge. I'll only be the judge of what is released by Endware.

###########

I'm going to make 2 licenses, the first will attempt to rectify some of the complaints by adding and deleting words, and the second will be a simplified license where I delete everything that is redundant and attempt complete generality on the first line of every category.

Message too long. Click here to view full text.



Endwall 04/07/2018 (Sat) 04:07:10 [Preview] No.1196 del
I included government, and legislators to specifically point out that they should protect themselves from unlawful surveillance by the military (NSA, FBI, CIA etc) and corporations (GOOGLE, AMAZON, FACEBOOK, etc) in order to avoid blackmail and coercion, and to focus on strengthening the core institutions of western democratic society (Legislative, Executive, and Judicial branches of government) from attacks by hackers, foreign and domestic military intelligence services, etc.

But to be realistic they probably have proper high end security software and don't need Endware, but maybe they don't, I don't know... I'm sure they have something better. But just in case...


Endwall 04/07/2018 (Sat) 04:12:05 [Preview] No.1197 del
>Any user of this program is granted the freedom to run this code on any computer of their choice.
> I can run it on other people's computers without their permission!? Nice!

Can I run iOS on an Android Phone? or MacOS on regular arbitrary x86 gear?

You can run Endware on any computer architecture you want, and on any hardware device you want to. Including on other people's machines, but you might be breaking the computer misuse laws in doing so, not my copyright license grant.


Endwall 04/07/2018 (Sat) 04:36:06 [Preview] No.1198 del
ME:
1) I grant that the letters A,B,C,D and H have property ZINGER
2) I grant that all roman alphabet letters both upper case and lowercase have property ZINGER

YOU:
But what about L,M,N,O,P, do they have property ZINGER? You must have omitted these for some reason they must Not have property ZINGER!

SOLUTION:

{ A, B, C, D, H } Union (Roman Alphabet) = Roman Alphabet.

L,M,N,O,P are letters in the set Roman Alphabet and hence also have property ZINGER.

QED.


Endwall 04/07/2018 (Sat) 04:51:03 [Preview] No.1199 del
>but if you ever have the chance to run it by a lawyer, you should. After he gets done laughing, explain that it's not a joke. At this point, you'll need to ignore the look of pity on his face and explain that you're not mentally retarded, either. Then you can let him explain why your license is such a piece of shit.

I'm going to bring an HD digital video camera to the meeting and zoom in slowly so that I can catch the moment that the facial expression changes from mirth to sadness then to pity. I'll upload it as a webm onto Endchan or perhaps as an animated gif.



Windows Security Thread Endwall 02/24/2018 (Sat) 02:29:59 [Preview] No. 1147 [Reply] [Last 50 Posts]
WINDOWS NT Security Thread

It turns out that MS Windows NT has an 80% market share in the Desktop Operating Systems Market (whatever that is...) So in all likelihood, if you work a job anywhere, you will be forced to sit down and work on one of these machines running this well known gem of an operating system. You probably won't have administrator rights, but that's OK, we'll make do.

In reality there is no Windows security but in this thread we will try to make life a little bit better even if it is just for a placebo effect. Also Windows hackers come and show us how you hack us up real good, and help our poor unprivileged users gain administrator rights without a password, so that they can install Mahjong. Windows Advanced Firewall, Registry Editing, Browsers, etc. Post all the tips and tricks to make Windows NT better than ever.


Anonymous 02/26/2018 (Mon) 15:20:14 [Preview] No.1150 del
>gem
huh?

>help our poor unprivileged users gain administrator rights without a password
Quick and dirty hack with backing up and replacing utilman.exe with cmd.exe from anything able to access NTFS without breaking it too much would work well (will give you SYSTEM-privileged command line prompt). But at this point you probably should just use GNU/Linux.


Endwall 02/28/2018 (Wed) 04:14:07 [Preview] No.1151 del
(92.06 KB 1024x768 blue-screen-of-death.jpg)
>>1150

I uploaded a Blue Screen of Death as the the photo for the thread but it didn't upload with the thread...I'm not sure why that is happening. I put a unique files filter on the board but that might be comparing it to a global (board wide) database. I might disable that setting.

The original text read "Turd" but then I read it back and said "That's harsh" and changed it to gem (satire to go with the Blue Screen picture that didn't upload). As for the operating system itself, it works...its semi stable... many people use it.

It's proprietary and Closed source, and the company are known NSA collaborators. So it's probably not a good Idea to run this OS anywhere at all. That said I'm going to make a board for MacOS security later as well, when I setup a Mac OS 10.7 Computer to play around with, I also don't trust MacOS but I'm approaching it from the same philosophy.

I had a very negative experience with using Windows 7 from 2009-2011, when I quit windows due to heavy invasive spying and related harassment. Which is why I full time switched to Linux. I don't recommend Windows at all. But it's everywhere and if you've got lemons make lemonade... I still have to do some things on windows for school... it's sad but true.

So my thinking is, we might as well try to increase the number of people using Tor and firewalling their computers, locking down processes, you can do some of that on Windows, so that at least if people start thinking about security, it it will be easier to transition in the future. Also GnuWin32 and Cygwin are worth mentioning and describing their use and setup.

I certainly don't recommend using windows for anything security sensitive, at all. This thread is more for people to bring them up to power user level, and to help me to learn how how to become a "power user" on Windows and to see what we can do to "lock down" Windows. This thread might be better suited for >>>/h4x0r/. We'll see where it goes.


Endwall 02/28/2018 (Wed) 04:27:01 [Preview] No.1152 del
>>1151

Also this thread can include information for securing and running ReactOS, which might suit some people's needs as well. I'll set up threads for other operating systems and how to set them up (IllumOS, DOS, etc) , as I bring them online to test a play around with. This will happen over summer, I'm jam packed with school stuff until spring.

Again such boards might go better in >>>/h4x0r/. I'll think about the best way to present the info. Again the focus will be on tip sharing for poweruser stuff (scripting, settings etc) and security (Crypto, filesystems, firewalls, etc) and network communications on each of the operating systems.


Endwall 03/30/2018 (Fri) 23:29:08 [Preview] No.1182 del
Preventing Windows 10 and untrusted software from having full access to the internet using OpenBSD

https://www.ibm.com/developerworks/community/blogs/karsten/entry/Preventing_Windows_10_and_untrusted_software_from_having_full_access_to_the_internet?lang=en

Whilst setting up one of my development laptops to port some software to Windows I noticed Windows 10 doing crazy things like installing or updating apps and games by default after initial setup. The one I noticed in particular was Candy Crush Soda Saga which for those who don’t know of it is some cheesy little puzzle game originally for consumer devices. I honestly did not want software like this near to a development machine. It has also been reported that Windows 10 now also updates core system software without notifying the user. Surely this destroys any vaguely deterministic behaviour, in my opinion making Windows 10 by default almost useless for development testbeds. Deciding instead to start from scratch but this time to set the inbuilt Windows Firewall to be very restrictive and only allow a few select programs to communicate. In this case all I really needed to be online was Firefox, Subversion and Putty. To my amusement (and astonishment) I found out that the Windows firewall could be modified to give access very easily by programs during installation (usually because this task needs to be done with admin privileges). It also seems that Windows store Apps can change the windows firewall settings at any point. One way to get around this issue could be to install a 3rd party firewall that most software will not have knowledge about and thus not attempt to break through. However the only decent firewall I have used was Sygate Pro which unfortunately is no longer supported by recent operating systems....