Try again. I set the mail server up on my main desktop (with my gui) as a test. I turn my computer off when I go to school. I was planning on migrating the mail server to a dedicated tor server computer but never got around to it. No one emails me anyways. I'll leave my computer on in text mode tomorrow, so you can send me something. I really think this is the answer, I mean not withstanding all the other security problems with computers.
Air gap with private key and public key ring for recipients-> encode message -> port encrypted message by floppy disc to transmision computer -> Send encrypted mail to tor mail server.
Recieve mail to tor mail server -> port encrypted message by floppy to airgapped decryption computer running in text mode. decrypt message read, in sealed room with multiple locks -> destroy traces of communication (reboot).
I think this would do it. That way you never type on the online computer, and only type and encrypt and decrypt on the air gapped computer. If both counterparties do this it should work.
Unfortunately I'm not currently doing this, my private key is also on my workstation. One day I'll impliment this strategy, probably this summer. If everyone did this protocol that would mess the NSA up big time. It wouldn't matter if your workstation was compromised, they still wouldn't get the message.
What about keeping your master key on an airgapped system and using subkeys instead of using floppy disks back and forth? You could avoid using floppies (an attack vector, albeit an uncommon one) altogether.
You still want to do the decrypts and encrypts on an airgap . Assume any computer connected to the internet has keylogging.
So if you want to use subkeys fine get a third computer. Two air-gapped computers and an online transmission computer. Decrypt and Encrypt on the transmission computer means you may have given the content away. Coppying 100Kb text files back and forth and using jails is more safe than plugging in an RJ45 cable and typing on your keyboard.
Do it my way and you're home free. They'll need physical access to your full disk encrypted system or a virus that exfiltrates bit by bit. If you only copy the encrypted text file to the A:\ drive and write a checksum or some other verification method, and have reasonabley good security on your physical location I think this is the best way.
I have a whole free week on my hands and i want to make most of it by installing a fresh new distro. Since i value /tech/'s opinion, tought i'd ask you guys.
Been using Linux Mint fot a year, but now i want a distro that is clean and not full of software i don't need (like Mint is). Can't decide between Debian or Arch, help me maybe? I kinda have a life, so if Arch is really that high maintenance, it's out of the picture.
>>7687 It's grand and critical, but it's no less grand and critical than the kernel.
You have a Unix-defying kernel, compiler, init system, C standard library, shell (usually), set of Unix utilities, windowing system, bootloader (usually), and then you complain about the init system going the same way?
Do you know the difference between the size of the Linux kernel and the original Unix kernel? Have you ever compared GNU code to Unix code?
Linux and GNU really, truly don't follow the Unix philosophy at all. They make up most of your system. Most other parts you could name (X11, Qt, KDE, OpenSSL, vim) don't follow it either.
>>7876 Sure, Linux has reasons to be larger while sticking to the same philosophy, but not to this extent. It's also much larger because it's so filled with features. Its size is also the result of its very different design philosophy. And I don't think that's a bad thing, but I do think that it invalidates arguments that are just "this one other part of the system doesn't follow the unix philosophy either, therefore it's shit".
if you are not intel employee who can review and compile microcodes DO NOT BUY hardwares that require said microcodes to function properly.
said microcodes DO NOT EXECUTE in kernel privilege and they DO NOT fuck with kernel data structure.
they run INSIDE your shitty hardware. OpenBSD kernel READS said microcode and LOADS it inside your shitty hardware's INTERNAL MEMORY which is then EXECUTED BY your shitty hardware's OWN shitty processor.
non libre LINUX kernel ships with BINARY ONLY drivers that RUNS with KERNEL PRIVILEGE and said microcodes.
OpenBSD kernel DOES NOT ship with BINARY ONLY drivers.
We are i0ne. We are a Security Penetration Team. Our goal is simple, we intend to expose the flaws of modern security procedures within this world of anonymity.
The lies that you have been told about being secured and safe from malicious persons will be revealed. You have been fed with lies...lies like social media and mainstream media websites such as Facebook, YouTube, CNN, and FOX News. These websites and corporations use you for revenue. They lie to you for their own gain.
They lie about Politics, Security, and News overall. This is absolutely despicable, and scummy. Multimillion Dollar Companies have lied to their users for decades, and it will not stop.
Nothing is secure, not even your personal information. We encourage you to believe these blatant lies, only to be proven otherwise.
If you are interested in induction into i0ne, please email us at i0neCONTACT@protonmail.ch
Laptop form factor open source hardware design, built from off the shelf components for DIY, modular, open source computing.
CPU, RAM, graphics: 1x single board computer
FSB, ports: 2x powered USB hub
Battery: 1x USB powerbank, >5000 mAh, >2A
Input: 1x USB keyboard
Input: 1x USB trackpad
Storage: 1x USB flash drive
Network: 1x USB WiFi dongle
Audio: 1x USB sound card/headset
Display: 1x USB powered HDMI monitor
Case: 3D printed or DIY glued wooden case
-Completely modular, customizable, upgradeable and repairable
-User serviceable by all users
-Universal, modular battery and charger. Can swap battery when depleted
>There are several reasons why your device will never be able to use all of this bandwidth. First of all, the USB bus is shared among several users. Even if you are plugged into different ports on the motherboard, you are probably sharing the same host controller as all of the other devices on the bus, so your device is sharing the USB bus bandwidth with all of the other devices.
>Second, USB is a packetized protocol where longer blocks of data are divided into 512-byte packets. Each packet contains a header identifying the packet contents, and a CRC at the end of the packet for data integrity. Each packet also requires an ACK from the other side of the link. Start of Frame (SOF) packets are sent every 125 uSec (microframe) to maintain timing on the bus. The net effect of this is that the theoretical maximum bandwidth of USB is 13 bulk packets per microframe, or 53,248,000 bytes/second. Even this limit is not achievable with current host controllers, which can receive 10 bulk packets/microframe or send 8 bulk packets/microframe.
>500mA – This is the absolute maximum power allowed under the USB spec
There are also x86 SBCs out there. Many of them also have LVDS connector for display, which opens up some options with used panels from laptop PCs (although I'm not sure everything is compatible).
Just look into embedded pico-ITX
I want to build a UMPC with Pentium N 3710 (Braswell) based pico-ITX board. Although this would be relatively expensive it has a much more capable GPU than any of the ARM stuff out there. x86 and real OpenGL/DirectX acceleration should make a lot of neat things simple to achieve.
Also for rapid prototyping of enclosure, forget wood unless you're really good at working with that. Look into Sintra PVC foam board. I've worked with it in the past as enclosures for power supplies and other projects. That was with 6mm thick sheets. Really easy to work with, does not take a lot of tools. You basically would want a T-Square or Triangle and some sharp knife or razor to score with then break it. Anywhere that you need to attach a component through a screw hole you would just drill a very small pilot hole and use a small wood screw. The PVC foam board can be glued together with a wide variety of adhesives but thin cyanoacrylate works better than most. That's just regular super glue.
I'm probably going with 3mm this time considering the UMPC will be small I think that's sufficient, although it will be built in layers that are glued together, thicker than 3mm in many spots.
If done properly this could have excellent results and be achievable without spending a lot of time learning 3D modeling or CAD. Or having to spend all that time designing a 3D model and send it off for printing not quite 100% sure if it's going to all fit together just right.
I'm still looking for a good option for the hinges, friction hinges can be surprisingly expensive.
>>7825 A few companies that manufacture and sell x86 pico-ITX SBCs (and have prices and ordering available on their site):
(Israeli company, but if you're buying Intel that's irrelevant) www.solid-run.com/
(DFI is a Taiwanese company that has always made very high quality motherboards. They used to be famous for excellent gaming motherboards during the socket 939 era, but these days focus on industrial and embedded stuff) www.dfi.com/products/productList.html?id=132
Does anyone here have experience with the Pocket CHIP, or the CHIP in general? As an option for mobile computing it seems much cheaper than things like the Dragonbox Pyra and OpenPandora, but much more powerful/useful than a chroot on an Android touchscreen device. Is it good? Are there similar computers?
>>7842 It's mostly a problem that there's almost no existing worthwhile software for linux that uses OpenGL ES
But yes the GLES acceleration works now, it's pretty much limited to Quake 3 and a few other things. After I bought it I did the research and you would be surprised just how few open source engines and games support GLES (on linux, there are quite a few for android)
>>7852 Actually this thread has me wanting to mess around with the pocket chip some more. It seems to me that a game that I've compiled on the chip before (Cataclysm DDA, SDL) should work automatically with GLES. But it was completely software rendering last time I tried. Unless the MESA libraries in the repos were compiled without the right options.
FuguIta is the Live System which was based on OpenBSD operating system and has following features;
Similar to HDD installation
This Live System is intended to be similar to HDD installation as much as possible.
After bootstrap completed, you can login to the environment like the one which was just installed on HDD.
In this environment, many ordinary files have replaced to symbolic links. So you can replace or modify them by yourself.
You can save your own environment into Floppy Disk and/or USB flashdrive. Then you will be able to retrieve it at next boot time.
Low hardware requirements
Unless you will use X, this Live System requires 48MB of memory to run.
Following stable version
We're trying to track the OpenBSD-stable version, and to apply all errata patches.
I've had great luck with Alpine on my servers. Yeah, binary packages but it's been amazingly stable for me over a few years.
Alpine is getting pretty popular though, for awhile ncopa was threatening to shut down development for lack of time (he couldn't afford to work on it after losing a sponsor). I used to donate to him.
Then suddenly Docker made its announcement regarding Alpine and everything changed. All mentions of a way to donate on the Alpine website disappeared, development surged, and they get major donations of hardware as well. Has me a little bit worried that it could be sold out. Lots of new names on the contributors list on recent versions.
The trouble with Tor is the people treating it like a big truck that you just dump something on, when it is really a series of tubes, and when those tunes get filled your Internet can be delayed. https://youtu.be/_cZC67wXUTs
Endwall guy should keep irrelevant compile instructions in this thread by editing the OP or edit the Sticky thread before purging said irrelevant posts in various threads. Just remind them to compile from source and redirect them to this thread.
I can confirm that bitcoin fog works well, used it from time to time. But be careful, a lot of scam nowadays. You can find original bitcoin fog address on a their twitter https://twitter.com/BitcoinFogg or on bitcointalk.
What's a "chan engine", and how does it relate to technology?
I know what imageboards are, but never heard chan engine before. Is that like some sort of gurl motor that powers cats?
Whatever the hell it is, it doesn't read productive.
>Anonymous wrote on 01/10/2017 (Tue) 01:35:41 >You have been visited by the IPFS wrench of Serendipity > _ > /_ \_____/ _| > | __ |_. (ya thas wrench.. i guess?) > \__/ \/ >
>Post an untracked ipfs hash below and republish the >new contents or be FORCED to rewrite IPFS in Rust >
I'll rewrite it in Rust. Where's the specifications? :^)
What is LynxChan? LynxChan is a chan engine developed with performance, efficiency and flexibility in mind. It powers several chans ( http://lynxhub.com/lynxchan/res/285.html ) and contains a number of community-created front-ends ( https://gitgud.io/LynxChan/LynxChan-ThirdPartyFrontEnds ). It offers a number of features, including: -File deduplication, saving bandwidth, disk space and allowing users to post files without uploading them. -Overboard, aggregating posts from the whole site on a single place so users can browse more easily. -Multi-board, allowing users to aggregate posts from only selected boards. -Extensive anti-spam and anti-flood tools that aim to both impede and reduce damage without inconveniencing users. -Add-on support, which enables features to be added without the need for a fork. -Modular front-end and language pack allows for the site owner to customize it without having to change the actual software.
LynxChan 1.8 main addition is multi-lingual support. This feature allows site owners to specify alternative language packs and front-ends and associate languages to them. When an user visits the site, the engine seamlessly picks an available language from the user and serves content in that language.
This version brings some other minor features so far: -More granular and specific verbose modes. -A terminal command to perform a clean shutdown of the engine.
>>7578 >The pages are not dynamic well, not a surprise, suspected that (and it's ok)
>I don't get it, can you explain it further? Static thread page with posting form, no captcha displayed. Form POSTs to /replyThread.js. What happens to text if it is not embedded into another form in reply page or saved at server? Discarded. Please don't rely on certain browser's ability to store form data. In replyThread.js, if user presented valid bypass cookie or is not subject to captcha check, just store form data as thread reply, put your "post added" in response and do your redirect to thread. If user have to fill captcha ("banned" IP and no cookie), put form data in replyThread.js response page as another form that features captcha. Storing post temporarily in DB and presenting only captcha text plus hidden form field with reference to stored post is fine too. Is that simple enough to implement?
>>7584 https://www.torproject.org/docs/faq.html.en#WhyCalledTor >even though it originally came from an acronym, Tor is not spelled "TOR". Only the first letter is capitalized. In fact, we can usually spot people who haven't read any of our website (and have instead learned everything they know about Tor from news articles) by the fact that they spell it wrong.
How can I anonymously ssh into something? Going through Tor and using a freshly generated key for identification is obvious, but how can I make sure that there is no data leakage above all that? I haven't been able to find any guides on that, even though it seems like something a lot of people might be interested in doing.