/tech/ - Technology

Brought to you by archive.org

Boards | Catalog | Bottom

Check to confirm you're not a robot
Drawing x size canvas

Remember to follow the rules

Max file size: 350.00 MB

Max files: 5

Max message length: 4096

(1.56 MB 156x100 H9IKKoq.gif)
Android phone Anonymous 07/03/2017 (Mon) 20:25:19 [Preview] No. 8831 [Reply] [Last 50 Posts]
What is a good android for under $200?
7 posts and 2 images omitted.

Anonymous 09/12/2017 (Tue) 19:57:33 [Preview] No. 11069 del
(15.73 KB 700x200 replicant.png)
I'm using Replicant right now, with a galaxy s3. Works very well, I use it only for phone and mp3 function (mpd + android mpd client).
Laptop for any other useful stuff.

What do you think about replicant? It's not perfect, but it seems to be the best "libre" choice for a smartphone.
I'm disgusted by all these news "privacy" oriented phone costing an arm.

Anonymous 09/12/2017 (Tue) 21:00:37 [Preview] No. 11070 del
>I'm disgusted by all these news "privacy" oriented phone costing an arm.
Don't use a phone, then. Yes, it's possible.

Anonymous 09/13/2017 (Wed) 22:01:52 [Preview] No. 11077 del
Man, I would, if I could.

Anonymous 09/13/2017 (Wed) 22:41:56 [Preview] No. 11078 del
what do you need a phone for that a pager doesn't provide?

Anonymous 09/13/2017 (Wed) 22:43:23 [Preview] No. 11079 del
Then, buy a pre-2001 phone. If you need to use other "modern" communication protocols, use a laptop.
That's (basically) the only acceptable privacy-oriented approach to this. You can have a modern smartphone, but that would be a change in paradigm on how you think about privacy, since smartphone can be considered a survailance device.

Bluetooth new vulnerability Anonymous 09/13/2017 (Wed) 12:38:29 [Preview] No. 11074 [Reply] [Last 50 Posts]

Anonymous 09/13/2017 (Wed) 12:46:49 [Preview] No. 11075 del
Unfortunately there is little choice nowadays with ever thinner form factors making headphone jacks difficult if not impossible to add and people being stupid enough to think thinner = better. I suppose you could use a silly adapter like the iphone 7 has for usb, but its still silly.

Anonymous 09/13/2017 (Wed) 13:53:06 [Preview] No. 11076 del
Yes. But industry in general should change to other wireless standard, such as DASH7, that is open source and, according to wikipedia, it's "small footprint, low power, long range, and low cost [... than] WiFi or Bluetooth".
What I fear is that industry, instead of switching to something better, simply remove bluetooth, rendering projects like Briar or meshnet-like software, useless.

Crash Firefox on Linux via Notification API Anonymous 09/12/2017 (Tue) 13:34:22 [Preview] No. 11064 [Reply] [Last 50 Posts]

Anonymous 09/12/2017 (Tue) 21:11:49 [Preview] No. 11071 del
firefox crashes very well on its own thank you very much

Anonymous 09/13/2017 (Wed) 02:08:57 [Preview] No. 11073 del

(45.36 KB 2000x770 amd.png)
(((Intel))) is RIP Anonymous 07/09/2017 (Sun) 22:01:37 [Preview] No. 9599 [Reply] [Last 50 Posts]

AMD told us in their AMA on reddit yesterday that they'd consider Coreboot/Libreboot support. We should do something to let them know we're interested, because this would be a game changer.
9 posts omitted.

Anonymous 08/17/2017 (Thu) 06:17:45 [Preview] No. 10781 del

Anonymous 08/17/2017 (Thu) 07:12:41 [Preview] No. 10782 del
Wow, not going to lie, this just got my hopes waaay up.

Anonymous 08/17/2017 (Thu) 07:17:26 [Preview] No. 10783 del
You bumped a 5 week old thread for that no-content comment?

kys, faggot

Anonymous 08/17/2017 (Thu) 07:20:58 [Preview] No. 10784 del
>kiss yourself
thanks, pretty proud.

Anonymous 09/12/2017 (Tue) 23:27:56 [Preview] No. 11072 del

(1.52 MB 640x360 nyan gnu.webm)
Anonymous 09/12/2017 (Tue) 15:52:57 [Preview] No. 11065 [Reply] [Last 50 Posts]
Had to move my desk to the other side of the room and now everything feels cramped, awkward and unergonomic as fuck and my autism is flaring up.

How long will it take me to relearn how to comfortably use my computer?

Anonymous 09/12/2017 (Tue) 16:29:01 [Preview] No. 11066 del
It depends on so many variables, probably no more than 3 months. If you really have some degree of autism or asperger, I suggest you reduce the maximum cognitive effort you can, so you can adapt faster. For example, remove other objects from the desk, put the chair against a wall (so you don't feel as someone is watching you).
You don't just adapt to, but also, in this case, nurture the experience around you. So, besides removing things you don't need, try to maintain the same things from before the change and then gradually change (again), until you adapt to it. It works similarly as "cold turkey" vs "gradual removal" on drugs.
You can also use behaviorism: every time something bothers you, and you can't change it, give some punitive measure to yourself. Read more on behaviorism and create your own protocol.
You can also use hormesis and spaced repetition: every time you feel unconfortable, give it a break, go drink some green tea, look at the trees, then you go back.

Privacy of DNA Testing Anonymous 09/10/2017 (Sun) 00:47:26 [Preview] No. 11061 [Reply] [Last 50 Posts]
Would you do it?

I wouldn't, but seems really interesting for nutrigenomics:

Anonymous 09/10/2017 (Sun) 03:34:33 [Preview] No. 11062 del
(74.51 KB 800x600 143948591274.jpg)
I'm not going to watch the video, but if it's referring to 23-and-me or Ancestry.com and those other DNA testing services, no. Their privacy protections are so flimsy that they're practically nonexistent.

In addition, like the recent Equifax breach reminds us (140 million people's sensitive personal financial info stolen), sensitive data is not safe in the hands of centralized third parties. These big DNA testing providers will be breached, and the DNA information of millions of people will be leaked.

I'm waiting for something like the Bento Lab to become available and reasonably affordable.


By reasonably affordable, I mean in the $500 range. That's not pocket change to me, but I think I know enough people who would be interested in having their DNA tested but also don't trust the big services that I could get them to help subsidize a kit.

I think home biohacking is going to be producing some weird and wild stuff in the next 20 or 30 years, including some pathogens of interest to bioterrorists.

We're in for a wild ride.

Learning the PE Header, Malware Detection with Minimal Domain Knowledge Anonymous 09/06/2017 (Wed) 09:26:44 [Preview] No. 11029 [Reply] [Last 50 Posts]
Many efforts have been made to use various forms of domain knowledge in malware detection. Currently there exist two common approaches to malware detection without domain knowledge, namely byte n-grams and strings. In this work we explore the feasibility of applying neural networks to malware detection and feature learning. We do this by restricting ourselves to a minimal amount of domain knowledge in order to extract a portion of the Portable Executable (PE) header. By doing this we show that neural networks can learn from raw bytes without explicit feature construction, and perform even better than a domain knowledge approach that parses the PE header into explicit features.

An interesting approach to malware detection. For the next McAfee. Hey, when you're down in Guatemala in your jungle mansion, banging supple Latina teenagers, remember me, ok?
9 posts and 3 images omitted.

Anonymous 09/08/2017 (Fri) 01:27:41 [Preview] No. 11048 del
>Breaking apart post by sentence
Perhaps you don't understand the forums' purpose. If you want to discuss wikipedia articles, there are better places that permit you to pretend to be doing something. HN is one such place that might suit you better.

PDF is interesting and adds more evidence to coming age of ML. Fortunately (or unfortunately if you refuse to learn) ML you'll be left behind as a metasploit monkey and etc., if you work in another field. No doubt some of the more wealthy AVs are already testing basic ML instead of regular hashes to check for warez. It seems like a much more efficient process than sandboxing a suspected snippet and running a sim.

Anonymous 09/08/2017 (Fri) 04:09:24 [Preview] No. 11050 del
<Not breaking apart post by sentence
Where exactly I've cited wikipedia? I think you're confused anon.

Anonymous 09/08/2017 (Fri) 06:08:19 [Preview] No. 11051 del
malware detection = enumerating badness

Anonymous 09/08/2017 (Fri) 14:21:11 [Preview] No. 11052 del
>In this work we explore the feasibility of applying neural networks to malware detection and feature learning.
buzz buzz buzzword. why do we care about some minor innovations to goy tech? the single one justification for antivirus to exist is that it purges outbreaks on machines owned by the goy who run outdated software and open untrusted executables (these people will have already have had their info stolen by the time the antivirus is updated to have a signature for such malware). it does not offer any security or any useful attribute to anyone who knows what they're doing. in particular, using NN to "detect malware" is just another heuristic full of false positives and will be once again, trivial to bypass.
PDF is worse than HTML in every way
inb4 >muh typography!11
>Fortunately (or unfortunately if you refuse to learn) ML you'll be left behind as a metasploit monkey and etc
is this what people conclude when they reason on the level of memes?
>AVs check for warez
what did he mean by this
>It seems like a much more efficient process than sandboxing a suspected snippet and running a sim.
confirmed for not having a clue what you're talking about

Anonymous 09/08/2017 (Fri) 18:56:08 [Preview] No. 11059 del
I see you have missed my wordplay. What you're doing is parroting information that brings nothing new to this discussion, but only regurgitations of ideas that can be found directly on the wikipedia articles of these topics.
I would like all peoples from lainchan to please go back and learn from the beginning how to properly form sentences. Thank you. If you would like a serious discussion on my lack of understanding or the paper at hand, please initiate, otherwise you are worse than the boy who still visits and exudes neopets etiquette.

Anonymous 08/07/2017 (Mon) 23:22:13 [Preview] No. 10579 [Reply] [Last 50 Posts]
What do you use for temporary anonymous file hosting? I'd like something like pantsu used to be.

Anonymous 08/08/2017 (Tue) 01:37:26 [Preview] No. 10582 del
Just look up pantsu clones and choose one.

Anonymous 08/08/2017 (Tue) 01:38:12 [Preview] No. 10583 del
I use minfil (dot org) and cocaine (dot ninja):
<can use curl to upload

Anonymous 09/08/2017 (Fri) 00:40:44 [Preview] No. 11045 del
OnionShare https://onionshare.org/
If you want to share some non-zip files, you can easily edit resources/html/index.html to your taste.

Instagram is listening to you Anonymous 08/26/2017 (Sat) 21:44:37 [Preview] No. 10897 [Reply] [Last 50 Posts]

Interesting. I've noticed this too when I see a friend connect to his facebook while we are working. Sometimes I talk about a random subject and minutes later facebook shows an ad about this uncorrelated data.
I don't think they are actually using microphone, but I think it's almost certain that they correlate the data/metadata about the users with such precision, at the point to build a oracle sybil ad system.
Can anyone here understand how this is very dangerous? They can control everything using this.
14 posts and 3 images omitted.

Anonymous 09/03/2017 (Sun) 18:33:31 [Preview] No. 11014 del
>>why does this guy give mic access to instagram?
>Because that's what 99% of the normies is doing.
nevermind, i forgot instagram has videos. i guess you can record yourself and upload a video. they could easily make it so programs only get mic/camera access when they need it, but who really cares? phone security is just completely broken in the first place
>Someone should do reverse engineering on this shit.
i doubt it's hard. dunno what hipsters use these days but back when apple crap used objective C it was especially easy because method names are put all over the source, similar to Java or C# but probably not as much info. AFAIK most phone crap doesn't use heavy obfuscation/protection stuff.
>Does the version of iOS he's running even have fine-grained permission controls?
he has a screenshot showing that instagram has mic access granted
>>also why is the instragram "app" more than a few KLOC?
>We don't know how many lines of code it contains. It's closed source.
given from what they said it's obviously more than a few KLOC
>You're only looking at it from a consumption standpoint.
the client is only for "consumption". the server side shit is on the server. of course they probably use an embedded web browser instead of writing some real software, causing all sorts of complications. inb4 "hurr durr an instragram client is a non-trivial application"

Anonymous 09/03/2017 (Sun) 18:56:52 [Preview] No. 11016 del

>the client is only for "consumption"

No, it's not, you insipid dildo. Repeating your incorrect statement isn't going to make it true.

The Instagram app allows users to manipulate and upload photos and videos. Therefore, it's not just an image viewer that reads comments from a central server, as you incorrectly stated. Editing and sharing content means the app is not solely for consumption, and the extra functionality requires extra code.

Whether you think that functionality is good or necessary has no bearing on whether it exists.

Anonymous 09/04/2017 (Mon) 02:41:16 [Preview] No. 11020 del
i wasn't sure whether your "consumption" meant
1. "consumer", as in: the user
2. viewing images
in any case, image browsing, viewing, uploading, editing have all been done a thousand times and i doubt instagram does anything that requires a lot of code. they should probably just be using a library or calling another program for that shit anyway, and probably are. instagram's "app" should just be some simple CRUD, and same with the 500000 other stupid "apps" like it.

Anonymous 09/07/2017 (Thu) 22:52:23 [Preview] No. 11042 del
One of the comments points to Facebook's official response at https://newsroom.fb.com/news/h/facebook-does-not-use-your-phones-microphone-for-ads-or-news-feed-stories/
>Facebook does not use your phone’s microphone to inform ads or to change what you see in News Feed. Some recent articles have suggested that we must be listening to people’s conversations in order to show them relevant ads. This is not true. We show ads based on people’s interests and other profile information – not what you’re talking out loud about.
>We only access your microphone if you have given our app permission and if you are actively using a specific feature that requires audio. This might include recording a video or using an optional feature we introduced two years ago to include music or other audio in your status updates.

Typical lawyer dodge. They could've clearly stated that they don't record audio in the background without giving visual/audial or any sensible clues to the user. But they didn't.

The first paragraph:
They deny that they they directly inform ads or they change a News Feed according to the content of an ongoing conversation. They don't deny recording, informing themselves about the content of the conversation, and they don't deny Facebook giving you ads regarding the content of the information (which is phrased as "people's interest" in the third sentence).

The second paragraph:
>and if you are actively using a specific feature that requires audio
Like using the telemetry feature.
>This might include
My favorite phrase. Commonly used when you don't want to list all the features.


Message too long. Click here to view full text.

Anonymous 09/08/2017 (Fri) 14:34:00 [Preview] No. 11053 del
i don't mean to defend goybook, but you are hugely speculating. it would be pretty stupid for a company to secretly record your microphone in code that is easy to reverse engineer
>>We only access your microphone if you have given our app permission and if you are actively using a specific feature that requires audio. This might include recording a video or using an optional feature we introduced two years ago to include music or other audio in your status updates.
this vaguness here is normal and always has been in software. companies don't understand security and privacy and don't consider them important. as such they will not carefully explain what their programs do and do not do

(140.84 KB 1024x717 Hard_disk_dismantled.jpg)
How do you store your data/backups? Anonymous 07/20/2017 (Thu) 23:19:37 [Preview] No. 10460 [Reply] [Last 50 Posts]
Hie, I'm trying to find a good solution to never get out of storage on my HDDs, for my backups and my regular use.
What is your data storage solution?
I want, if possible, a solution that is the most freedom compliant.
There is the usb HDDs, 3/4 plugged on a rasp.
There is the NAS with 3.5' HDDs in it.
Maybe a cheap 20$ computer with the HDDs in it with linux installed...

What should be the best? What HDD to buy (there are these backdoors, even though I don't think I can find any without)

Thanks you!
18 posts and 1 image omitted.

Anonymous 08/17/2017 (Thu) 15:27:10 [Preview] No. 10795 del
It's really not too hard to farady cage your data, and you don't have to farady cage your whole computer. What I do is store all my important media/data offline in both DVD and flashdrive mediums, and faraday cage those backups. You can buy static-proof / RF-proof "faraday bags" online for pretty cheap, sometimes you need to double-nestle them to absolutely assure proper EMP prevention.

I also have an old big Creamtex container from a farm that acts as a proper faraday cage (yes, I've tested it out with radios and cell phones, they get no reception when being closed in the container). That I store a perfectly good laptop inside with Linux OS already installed, along with a bunch of other flashdrives and storage mediums to keep them protected.

If there were an EMP, sure my regular computer would be toast, but I'd have a backup laptop & mouse with all my important files double-nestled inside faraday baggies.

Anonymous 08/17/2017 (Thu) 15:38:00 [Preview] No. 10797 del

Another thing preppers look into is actually surviving an EMP, which your faraday cages do NOT provide a solution for. Extra food, extra water / filtration system, extra guns/ammo/mags/rem oil, extra matches/lighters, an alternative source of energy (must be EMP resistant), extra toilet paper / paper towels, extra sanitation products like soap and hand sanitizers, extra toothbrushes/toothpicks/floss... all the essentials would be nearly impossible to get in a crisis scenario such as an EMP event. Where you could get them, they would be heavily rationed and scarce too. After an EMP, there would be no mass transportion so stores would be dried out of supplies within days.

See this great prepping guide, all you need to know: https://archive.fo/dr3NH

Anonymous 08/17/2017 (Thu) 16:35:06 [Preview] No. 10799 del
(107.53 KB 474x249 rations-of-slavery.png)

If you don't have your electronic on, Is it still fried by the EMP?
I would like to keep a watch after an EMP, but I don't know how to protect it.

Anonymous 08/17/2017 (Thu) 20:03:04 [Preview] No. 10810 del
I keep five backup toughbooks inside of a plastic bag that has been heat sealed making it waterproof. I put the laptop inside of a faraday cage which in turn is inside of a metal box made of lead. Why five laptops you may ask? Well, that is if one of them breaks, I can move to another laptop and use that one instead, and if all of my laptops break, I can find the broken parts and use working parts from another to fix it.

Anonymous 09/07/2017 (Thu) 01:02:51 [Preview] No. 11036 del
Block of ice