/tech/ - Technology

Brought to you by archive.org

Boards | Catalog | Bottom

Check to confirm you're not a robot
Drawing x size canvas

Remember to follow the rules

Max file size: 350.00 MB

Max files: 5

Max message length: 4096

(101.97 KB 350x350 WLST-350x250.jpg)
Anonymous 08/08/2017 (Tue) 13:05:04 [Preview] No. 10603 [Reply] [Last 50 Posts]
There seem to be a lot of privacy conscious people on this board.
Provided we can actually find a way to communicate, would anyone be interested in making our own alternative to privacytools.io ?
53 posts and 17 images omitted.

Anonymous 08/15/2017 (Tue) 02:37:30 [Preview] No. 10721 del
why does it have to be a website? properly formatted text files work wonders on pastebin, and if you're even more paranoid than that, you can self host a pastebin clone using a variety of software.

you can easily spread images that contain stenographically embedded lists or files, even html/mhtml/maff/arc or plain old 7z/zip/tar.gz

the most abstract way to spread a list could be using copypasta

of course this isn't very much like privacytools.io, but why imitate bloated web 2.0 css dogshit when this is aimed towards imageboard users and other reclusive hikkomori?

Anonymous 08/15/2017 (Tue) 03:21:23 [Preview] No. 10724 del
(3.01 MB 720x404 knifegame.webm)

>I'm what you call "unangstfag" and also who 'designed' the html and all the information in it,

Well, like I said, it's an improvement over the previous version. It looks nice. Good job.

>since no one here is interested in contribute but, instead, talk shit.

Sometimes talking shit _is_ contributing. It is when I do it, anyway; my shit talking is (almost) never pointless.

Nonetheless, as a gesture of goodwill, I will read over the list again and attempt to make a more traditional contribution to the list.


>why does it have to be a website?

I can't speak for the guy who started it or for Unangstfag, but I would suggest the following:

Message too long. Click here to view full text.

Anonymous 08/15/2017 (Tue) 06:20:37 [Preview] No. 10726 del
good point
>.html is just .txt with markup
>hosting pastebin is just bloat over .txt
Oh. I really should have known that. Maybe I shouldn't be an Ideas Guy™ if I'm not a webdev person and I haven't slept much. I'll be off to check my ego.

Anonymous 08/16/2017 (Wed) 05:05:59 [Preview] No. 10738 del
>>10713 (me)
The Endwall folk is out? I wanted to start the flamewar on other imageboards already...
Any alternatives on how we can host it? Maybe ask odilitime to create a /tech/tools.html ?

(9.07 KB 261x202 annoyed_tom.jpg)
FLOSS and licensing Anonymous 07/31/2017 (Mon) 16:22:43 [Preview] No. 10510 [Reply] [Last 50 Posts]
Hello /tech/,

I'm not so familiar with software licenses so I started reading about the subject. At one point the question 'How does one profit from floss software?' popped in my head and these are some articles I came upon (quite outdated, but they still have a point). So GPL prevents companies from making proprietary software with your piece of software. BSD, on the other hand, does not (that's the case with Apple's kernel). Turns out the only way a company can profit from GPL license is by donations, offering support, teaching or dual licensing. Dual licensing seems like the most used option.


>But there is a net effect on software development. Who makes money off GPL code? We go back to Novell and Red Hat, who test and package this software. And we see a trend–GPL code helps software testers make money. It helps QA people. It helps the people who answer the support phones. It helps everybody except software developers. Oh, maybe Google will pay them a salary as a goodwill gesture. But it’s really, really hard to make money from developing FOSS. You can make money supporting it. You can make money testing it. But no money developing it.

So my question is - does free software actually benefit the developer?
7 posts omitted.

Anonymous 08/02/2017 (Wed) 14:59:10 [Preview] No. 10536 del
Those are actualy fair points which answer my question. Thanks, anons

Anonymous 08/07/2017 (Mon) 03:39:38 [Preview] No. 10576 del
Stop spreading lies. You can sell GPL software, you just have to also provide source code. https://www.gnu.org/licenses/gpl-faq.html#DoesTheGPLAllowMoney

Anonymous 08/07/2017 (Mon) 10:04:44 [Preview] No. 10577 del
Much more importantly, you also have to grant the right to redistribute it all. The GPL makes it harder to make money. That shouldn't be controversial.
He never said it doesn't allow selling software.

Anonymous 08/07/2017 (Mon) 16:17:27 [Preview] No. 10578 del
>The GPL makes it harder to make money.

That seems a little like saying that you're going to be hungrier because mom added a side of broccoli to dinner. The existence of GPL software adds to the options that you have if you are developing software and want to make money. I don't think it makes anything harder.

Perhaps the core idea there is that the GPL doesn't make it as easy to make money as a license that allows you to take someone's code and resell it as your own does. I agree with that. For example, the zlib license is easier to make money with than the GPL license because you can use it in a commercial product and not release the source. That doesn't seem like a reason for me to complain about GPL software that benefits me and sometimes does what I want in other ways though.

What's the bottom line beef here anyway? If you are opposed to GPL licensed code and, like me, don't include in your development projects when you don't want to release under GPL, then don't use it. Problem solved. I use it when it makes sense and I want to give code that keeps on giving away and I don't use it when it doesn't.

Anonymous 08/16/2017 (Wed) 01:29:12 [Preview] No. 10731 del
If making FLOSS software meant helping actual competent and interesting programmers and computer engineers/scientists, then I would disregard money for the most part. I don't believe individuals/groups make FLOSS software for profits in the first place, if they wanted profits, it would be more efficient to write proprietary closed-source software for large companies or massive groups of computer users.

There are plenty of benefits of being a FLOSS software developer:
>You are more likely to be recognized by FLOSS communities which tend to be populated with highly intelligent and competent individuals.
>You are helping fight proprietary, non-free, and closed-source software by distributing and creating FLOSS software.
>You can very easily use your own software to your advantage and have an extra highly strong layer of security by using your own software that wrote.
>Your software has a higher chance of being used in OS distributions and software bundles (Look at Chrome OS). If you don't like your software being used against your will, maybe it shouldn't be free and open-source in the first place.
>You are seen as a trustworthy person and will be useful in the fight against surveillance and unwanted data-collection.

It also seems to be a misconception that once can only program either FLOSS or proprietary software and not both. You can make some of your software FLOSS and other software proprietary.

Communication best practices Anonymous 07/31/2017 (Mon) 02:09:16 [Preview] No. 10507 [Reply] [Last 50 Posts]
I would like to open this thread to discuss the best practices of communication, essentially the three forms: archive sharing, text/image and voip (video conference).

The software has to be:
- Decentralized or distributed
- End to End encrypted
- Open Source

Prefered if:
- Audited / Formal methods (proof/verification)
- Anonymous
- Don't leak much matadata
- Good coding practices (privsep, sandboxing, etc).

For archive sharing:
- Retroshare
- Tahoe-LAFS

Message too long. Click here to view full text.

49 posts and 7 images omitted.

Anonymous 08/13/2017 (Sun) 20:29:46 [Preview] No. 10711 del
- Simple code. No bloat. Do one thing and do it right (unix philosophy)
- Good security practices (no unnecessary permissions)
- Uses libsodium, a modern and stable crypto lib with well revised code. Uses AES-256.
- Leaks less metadata on pubkey
- Smaller pubkey.

I think they also have added pledge(2) to the reop ports on openbsd.

- No support for GUI tools, like for Thunderbird
- No support anywhere, really
- It's not maintained anymore (not exactly a problem, because the code is considered "done" by the author. No bugs found)
- Not audited by third-party

Message too long. Click here to view full text.

Anonymous 08/13/2017 (Sun) 21:18:57 [Preview] No. 10712 del
Ohh cool. Thanks for making a summary.

Anonymous 08/14/2017 (Mon) 15:19:03 [Preview] No. 10715 del
(595.36 KB 1306x1691 1491460607843.jpg)

>So why is reop better again ?

It's not. It's abandonware that nobody gives a shit about. Nobody uses the public-key functionality of reop, and the AES-256 functionality is redundant. There are plenty of options for AES-256 encryption on common operating systems that are either already available, or can be readily installed without having to compile from scratch (unlike reop).

The one person on this board (and on the planet) shilling reop was challenged to demonstrate the superiority of reop's AES-256 functionality against other implementations by referencing the relevant source code, but he failed to do so.

Anonymous 08/15/2017 (Tue) 02:52:42 [Preview] No. 10723 del
(736.54 KB 1280x640 1471700571618.png)

There's nothing in that list about the gnupg implementation of AES-256 file encryption or the reop implementation of AES-256 file encryption.

The one person on this board (and on the planet) shilling reop was challenged to demonstrate the superiority of reop's AES-256 functionality against other implementations by referencing the relevant source code, but he failed to do so. Again.

If you are having difficulty locating the source code in question, I would be happy to provide you with a link. Just say the word!

Also, although it doesn't matter, because that link demonstrates absolutely nothing that's relevant to this discussion, I would note that that list goes back 11 years and has only one critical (remote) bug.

I'd call that "Only one remote hole in the default install, in a heck of a long time!" Hmm, that sounds familiar.

(53.86 KB 730x595 tx1200xe.jpg)
Improving software and security Anonymous 08/11/2017 (Fri) 20:29:06 [Preview] No. 10688 [Reply] [Last 50 Posts]
Hello my good fellows!

It is evident that the majority of mainstream software programs are shit, and while audits and the creators of a specific software program can tell one much about the quality of said software, audits can be fabricated and the user should look at the program itself instead of looking at who made it and where it came from. If more individuals studied computer engineering/science and programming and were able to audit programs, we would become stronger, and one could rest assured that their computer was tested to perfection. I have begun to notice that a major problem with auditing code is the fact that some software programs are massive and require teams to finish in a practical amount of time (Or one individual with ultimate dedication...), and this can be fixed by advocating for single purpose programs with lean code and minimal features with room for the user to build and add to it. Computers are amazing machines, and every individual with a laptop and a great mind can achieve amazing feats! One could build a self driving car with the power of programming and advanced mathematics, one can program a self-learning AI that they can interact with, one can program drones or small satellites to take pictures of the earth and predict weather patterns, and the list goes on and on.
I am here to encourage you to begin making your own single purpose programs by yourself or with close friends and a passion to teach others about programming and auditing simple software programs. I don't believe there is a government plan to keep us all down and steal our data to destroy us, but your information is worth money, and data mining allows companies to look at the big picture and advertise products.

Free(Possibly) and open source software with a single defined purpose made as minimal as possible with space to allow for building onto it and improving it.
16 posts and 7 images omitted.

Anonymous 08/13/2017 (Sun) 14:58:07 [Preview] No. 10709 del
Extremely intelligent and dedicated trolls are funny as fuck and actually achieve what they desire and do it with a passion, the massive majority of trolls are idiots who think that wasting someones time and pissing them off for a few minutes is trolling.

Based on my observations, it seems that the majority of "idiots" are incapable of learning or becoming more intelligent in life, those who appeared to be idiots and later became highly intelligent may have never been idiots in the first place, just victims to peer influence and a blurry outlook on life and their purpose. I never understand why people try so very hard to prove themselves correct when their arguments are easily refuted with better alternatives to their recommendations (Better at performing the original softwares job). Is it a fear of being proven wrong? Is it egotism at work not allowing the individual to accept defeat and the fact that they were wrong for once? Is it a sad attempt at trolling that was flipped to target the original troll?

A large part of intelligence and "evolving" or becoming "enlightened" is to not allow egoism to consume you and striving to remain open minded (There are no levels of open-mindedness, you either are or aren't). People need to throw out their old beliefs if new better ones are acknowledged, even if an individual dedicated large amounts of mental power and time into the old beliefs.

I openly welcome any individuals on here to refute the points I have made in this post and to correct me if I have made any incorrect or false claims.

Anonymous 08/14/2017 (Mon) 15:07:28 [Preview] No. 10714 del
(80.40 KB 588x437 fuckhornleghorn.jpg)

Unangstfag status: blown the fuck out.


>That means that everything encrypted with the regular encryption algo can be broken by quantum algo

You have no idea what you're talking about. Go read up on:

Public-key encryption
Symmetric encryption
The integer factorization problem
The discrete logarithm problem
Shor's algorithm
Grover's algorithm

Anonymous 08/14/2017 (Mon) 21:48:40 [Preview] No. 10718 del

If regular encryption is not dead, why every rich coutries use quantum computing to secure their com?

Anonymous 08/15/2017 (Tue) 02:50:32 [Preview] No. 10722 del
""""""""""""""""""""""FUTURE PROOFING""""""""""""
(aka the lockmart strategy, buzzwords and vertical integration mixed with government contracts is an easy way to build wealth, i.e. stable investment or money laundering)

Anonymous 08/15/2017 (Tue) 04:10:59 [Preview] No. 10725 del

You have no idea what you're talking about. Go read up on:

Public-key encryption
Symmetric encryption
The integer factorization problem
The discrete logarithm problem
Shor's algorithm
Grover's algorithm

Visual cryptography Anonymous 08/10/2017 (Thu) 12:05:58 [Preview] No. 10676 [Reply] [Last 50 Posts]
This is pretty cool. Wish I had e a program that could help me print things that can only be decoded with another transparent layer.

Anonymous 08/10/2017 (Thu) 12:21:45 [Preview] No. 10678 del

Anonymous 08/11/2017 (Fri) 22:39:26 [Preview] No. 10691 del

Hey. Can you make it work with multiple images?

Like. Aline it to the left. Get one logo. Aline it 3/4s right get another?

Anonymous 08/12/2017 (Sat) 16:57:02 [Preview] No. 10697 del
Sure, it's just a simple equation. In the pictured image it's a mere (g.field) sum. To have multiple resulting plaintexts you would add another equation to the system.

Say A and B are the images, x and y the ciphertext and keystream (in F(2^n)), then the pictured example is just a trivial:

A = x + y

To also have B, you would add another constraint, say:

B = (x << t) + (y % 2^(n-t))

Where t is the offset for ("3/4 to the right").

Strictly speaking this would not exactly describe the pictured example, because there the displacement is not linear but 2-dimensional, but we can sidestep that by instead considering A(i) and B(i) (and x(i) and y(i)) for each "i" pixel row in the images.

If you keep adding constraints you might eventually make the system unsolvable, but for two offset images it's pretty much trivial.

(51.41 KB 768x960 hie.jpg)
About fake social media accounts Anonymous 08/09/2017 (Wed) 17:44:15 [Preview] No. 10645 [Reply] [Last 50 Posts]
Should you not use any social media or use a faked, sanitized social media accounts?

I ask this question as I look at these new predictive algorithm. They analyse your facebook account, and gives some score to the police, to help them take a decision. There is plenty of different methods, and different means using that. Social media analysis is pretty much widespread.

I personaly don't use any social media, even though I have to say that I used them a little bit when I was younger (I quickly removed them though, nothing more than 2/3 years).

The problem with these kind of algorithm, or simple human verification (because it's pretty much automatic today to go verify your social media account, even in case of getting a job), is that it's gonna automatically mark you as suspect, since just a few don't use them.

So what do you think, should you try to fake out an account, with the risk of actually giving too much even though you try to fake it out (or if you use a bot, to be easely spotted), or should you simply go full boycott?
Soon, we'll be forced to pay with our smartphone, and so use a recent one with the app who allows you to pay. Now, there are people not getting hired because they don't have any social media account... I'm mostly afraid of the latter.


PS: Maybe is it too much effort, since your ISP by looking at the keywords you enter in the search engine, can know everything about you... I don't trust https.
I'm more and more afraid that without an enormous effort from your part, and huge technical capabilities, you can't do shit.
1 post omitted.

Anonymous 08/09/2017 (Wed) 21:39:05 [Preview] No. 10649 del
Pretty much this, for the most part any communications platform that proclaims to be free uses you as the product being sold and profited from via metadata collection. All being legal due to bullshit ELA legal loopholes that makes you complicit to such bullshit by just visiting the website.

Anonymous 08/09/2017 (Wed) 22:18:42 [Preview] No. 10651 del
(77.12 KB 960x496 1497231851821.jpg)

>(because it's pretty much automatic today to go verify your social media account, even in case of getting a job)
>there are people not getting hired because they don't have any social media account

This is a myth that has been going around for years. Unless you're applying for a job that involves social media, like being the social media coordinator or PR person for a company, most companies aren't going to give a shit about your Facegram and Instatweet accounts, and aren't going to check.

In many larger organizations, HR is explicitly prohibited from searching for the social media accounts of applicants, because it could be a source of information on the applicant like race, marital status, etc. and the company doesn't want to be accused of (and sued for) not hiring on the basis of having known this about the candidate.

I boycott social media, except for a bogus Twitter account that I use to follow certain accounts I like to keep track of. I work in a public-facing role, so there's already basic information about me (name, a photo, work phone and email) on the company's website, so if I thought it were necessary to have social media accounts, I would make them with no more information than is already available online.

I don't see any point in doing that, though, and to be honest, if someone looking to hire you is such a turbo-normie that they care if you have social media accounts, they're probably going to be freaked out if you don't have lots of friends and activity on your account.

>Maybe is it too much effort, since your ISP by looking at the keywords you enter in the search engine, can know everything about you... I don't trust https.

There's no evidence that ISPs can compromise https without using a very obvious MITM attack that would require a user to manually accept a bogus cert.

Anonymous 08/10/2017 (Thu) 12:11:00 [Preview] No. 10677 del
I used to have multiple facebook accounts and one of them was just for normies. All the people I didn't know well got added to that one and in fact I tried to get it up to a few hundred people so I could point to it and look normal and fairly popular if I ever needed to, or for networking, and I made it less private overall.

My other account was for people I trusted. That was before I just decided to get rid of all social media.

Anonymous 08/10/2017 (Thu) 18:19:46 [Preview] No. 10680 del
Thanks you for all your answer.

Anonymous 08/10/2017 (Thu) 18:38:42 [Preview] No. 10681 del
The less people using this system of data mining the better. That way they will be the outcasts. The problem here is with their bots. A lot of bots account for youtube views for followers etc. That may be the only lucritive thing about making fake social media accounts. Using bots for profit. That is still validating social media though.

(293.02 KB 984x939 vdlFWYR.png)
Anonymous 07/13/2017 (Thu) 15:57:23 [Preview] No. 10365 [Reply] [Last 50 Posts]
13 posts omitted.

Anonymous 07/15/2017 (Sat) 09:10:57 [Preview] No. 10399 del
Applebaulm was tossed out for a reason

Anonymous 07/15/2017 (Sat) 09:17:23 [Preview] No. 10401 del
Yeah, some SJW decided that they consider courtship a form of sexual abuse, that's why he was "tossed out". Jacob barely did any code on this side, he has nothing to do with this shit.

Anonymous 07/16/2017 (Sun) 01:54:22 [Preview] No. 10408 del
extensions.getAddons.showPane ;false

Hide pane and don't use it. Tracking problem solved.

Anonymous 08/08/2017 (Tue) 19:50:41 [Preview] No. 10616 del
um guys:
> --keyserver pool.sks-keyservers.net --recv-keys 0x4E2C6E8793298290
>The certificate expired on 2016-06-13 14:30. The current time is 2017-08-08 15:39.
>2014-12-15 Old key
>EF6E 286D DA85 EA2A 4BA7 DE68 4E2C 6E87 9329 8290
Version: GnuPG v2


Message too long. Click here to view full text.

Anonymous 08/17/2017 (Thu) 22:00:36 [Preview] No. 10819 del
gpg --list-key 0x4E2C6E8793298290

pub 4096R/0x4E2C6E8793298290 2014-12-15 [expires: 2020-08-24]
Key fingerprint = EF6E 286D DA85 EA2A 4BA7 DE68 4E2C 6E87 9329 8290
uid [ unknown] Tor Browser Developers (signing key) <torbrowser@torproject.org>
sub 4096R/0x7017ADCEF65C2036 2014-12-15 [expires: 2017-08-25]
sub 4096R/0x2E1AC68ED40814E0 2014-12-15 [expires: 2017-08-25]
sub 4096R/0xD1483FA6C3C07136 2016-08-24 [expires: 2018-08-24]

Is Signal a threat to Free Software? Anonymous 07/09/2017 (Sun) 19:49:01 [Preview] No. 8917 [Reply] [Last 50 Posts]

My opinion: the guy from LibreSignal was using the Signal servers, consuming their energy, and using their marketing. This is not right.
About the Signal requirement to have google shit, it's very unfortunate. Though, people should just use other thing and stop all this buzz.
13 posts and 1 image omitted.

Anonymous 07/09/2017 (Sun) 19:51:59 [Preview] No. 8932 del
no decent cli option, tox through tor is still the best for me

Anonymous 08/08/2017 (Tue) 03:16:01 [Preview] No. 10588 del

Anonymous 08/08/2017 (Tue) 11:30:01 [Preview] No. 10602 del
They keep adevertising that end to end encryption but there's like one client that has it and that's the web/electron based on. The rest are useless, and as someone already mentioned in this thread it's not really federated at the moment.

Anonymous 08/08/2017 (Tue) 13:36:31 [Preview] No. 10604 del
>the problem with tox is that anonymity was just an after thought
You're right on that. Tox was initiated on /g/ shortly after Snowden disclosures. It was made to be foss, distributed (so no servers are used) and provide strong encryption but anonymity hadn't been thought. It was added sometime after the project begun though. https://github.com/irungentoo/toxcore/blob/522f90fee138087db660dccc08413c53f388f604/docs/Prevent_Tracking.txt

Suddenly Bruce Perens doesn't want to talk to me. Anonymous 07/15/2017 (Sat) 06:38:30 [Preview] No. 10386 [Reply] [Last 50 Posts]
Suddenly Bruce Perens doesn't want to talk to me.

What happened? This was out of the blue:


>OK, I apologize to all who were involved in this conversation. I will block further emails from "aconcernedfossdev" and no longer encourage him.
> Bruce
70 posts and 18 images omitted.

Anonymous 08/05/2017 (Sat) 18:45:04 [Preview] No. 10570 del

Michael T. McAllister 60 Centre StreetNew York, NY 10007 Phones: (212) 608-0700
People Attorneys McAllister, Michael T. Office Information
Address 60 Centre StreetNew York, NY 10007
Phone (212) 608-0700


NEW YORK COUNTY COURTS (MANHATTAN) - N.Y. State Courts 60 Centre St New York, NY 10007.Manhattan Treatment Court. 60 Lafayette Street New York, NY 10013.

Supreme, Civil Term 60 Centre St New York, NY 10007 80 Centre St New York, NY 10013 111 Centre St New York, NY 10013 71 Thomas Street New York, NY 10013 Phone: 646-386-3600 Fax: 212-374-3326 Hours: 9 a.m. - 5 p.m. Parking: Metered parking across from 100 Centre St. Private lots in area.

Anonymous 08/06/2017 (Sun) 11:17:32 [Preview] No. 10572 del

>Proud White American Man, boldly making the world safe for Adult Consenting White Women are not looked on fondly by those writings it seems...
>see, I think ahead: something you white men don't do: your only thoughts are "how do I serve muh white woman better" "oh shit I need muney..."
>Notice that the retarded old white man has no response.

>And yes, I am an attorney. Yes I am trained in this area of study. Yes I know more about it than you even if you are a Proud American White Man Programmer and know everything there is to know since birth.

>Both left and right white men totally support women's rights and oppose child marriage of girls to men. What is that which both "sides" have in common? White Proud American Men.

>Oh, you have no argument. Just an angry, red-in-the-face, white male animal (who opposes his own interests (such as taking young girls as brides as is allowed in Deuteronomy 22, 28-29, hebrew) and advances the interests of the white woman as his one and only purpose in life).

>Oh, the standard white man "I can defeat ANYONE. So here's my info. COME AT ME BRUUHHH!!!"

>White man makes false claims, gets called out, doesn't respond

Message too long. Click here to view full text.

Anonymous 08/06/2017 (Sun) 11:34:31 [Preview] No. 10573 del
Hypocrite \Hyp"o*crite\, n. [F., fr. L. hypocrita, Gr. ? one who
plays a part on the stage, a dissembler, feigner. See
One who plays a part; especially, one who, for the purpose of
winning approbation of favor, puts on a fair outside seeming;
'''one who feigns to be other and better than he is; a false
pretender to virtue or piety; one who simulates virtue or
[1913 Webster]

The hypocrite's hope shall perish. --Job viii. 13.

-->English explanatory dictionary (synonyms)

[ˈhɪpəkrɪt] n. deceiver, double-dealer, quack, charlatan, impostor or imposter, mountebank, confidence man or trickster, faker, pretender, liar, Pharisee, whited sepulchre, Tartuffe, flimflammer, Colloq phoney or US also phony, con man, flimflam man or artist, two-face:

Message too long. Click here to view full text.

Anonymous 08/06/2017 (Sun) 11:37:13 [Preview] No. 10574 del
I am an attorney. Yes I am trained in this area of study.

-Proud American Irish Roman Catholic White Man Programmer

Anonymous 08/06/2017 (Sun) 12:54:01 [Preview] No. 10575 del
MikeeUSA New Member
Joined: May 25, 2000
Messages: 102
Likes Received: 0
Name: Michael McAllister
Age: 14
Nick Names: MikeeUSA, Mikee, Drew Armon
Occupation: Skool, Computers.
Location: Islip, NY, USA
Likes: Computers, discussing theorems, discussing psychology, Linux, Infiltration, GNU, UT, Learning rights to anyone, Corporate Propaganda, Useful Material, guns, level design, artwork, the good things people do.
MikeeUSA, Nov 23, 2004

If he posted this in 2004 that would actually make Mr. Michael McAllister 27 years old at the current time.
The average age for passing the bar is 27 and the pass rate is 66% in New York State.
Based on that I highly doubt that he's passed the bar exam. You're looking for a Law Student approximately 27-31 years of age, a white male. He might be attending Columbia Law School. Here are some other possible options:

Albany Law School (Albany, NY)

Message too long. Click here to view full text.

Anonymous 07/10/2017 (Mon) 00:16:41 [Preview] No. 10283 [Reply] [Last 50 Posts]
Why is there still a 8/tech and no one is here? I thought your group were smart and cared about privacy.
16 posts omitted.

Anonymous 07/23/2017 (Sun) 08:48:05 [Preview] No. 10470 del
its the chan cycle like kali yuga.

refugee from 4chan to 8chan to diaspora now i guess. i've been trying all of the chans i know but they have small userbases compared to 4chan and 8chan. i've heard good things about nntpchan but haven't tried it. and blazechan has innovative features.

8/tech/ users are 95%+ larpers who never code. i remember back 2014 - 2015 it was completely different. there were groups legitimately trying to help anons gitgud but nothing came of it.

it's sad and very frustrating the cycle of the chans.

i used both /pol/ and /tech/ on 8chan. 2014 there were a lot of crossposters. but they coded and didn't use the board for shitposting. there was an effort to help interested anons on /pol/ gitgud with self-improvement threads. blame it on the mods when they started banning self-improvement threads they drove out core users leaving only idiots who spread to and degrade board quality on all boards. when new users come to /pol/ they see these idiots and learn to act like them.

8/prog/ maybe is still worth something.

we should start monthly library threads here (or, tri-monthly since the board is slow). work with a new library every month and compete to see who comes up with the best shit. 8/tech/ did this early 2015 and then it died out. but they were some of the threads i enjoyed most. we should restart it. be the change you want to see.

Anonymous 07/23/2017 (Sun) 20:35:30 [Preview] No. 10472 del
What do you mean by library thread ?

Anonymous 07/24/2017 (Mon) 08:53:54 [Preview] No. 10475 del
we used to do threads where we'd focus on using 1 new library a month. for example, sfml or libpng or zlib. 1 month seems to short it'd be better as 2 - 3 months.

Anonymous 07/24/2017 (Mon) 11:51:27 [Preview] No. 10476 del
Ahh that kind of library thread.I was thinking of books all the time. Sounds nice, will probably participate.

Anonymous 08/05/2017 (Sat) 04:09:35 [Preview] No. 10548 del
there's always the issue of good content vs active posters. IMO the reason why a lot of boards decline in quality is that a certain amount of activity is needed for people to be engaged and without engaged posters a board is easily taken over. A high quality board can die due to lack of content and then easily have its skin worn by nu poasters