/g/ - Technology
install openbsd
[Start a New Thread][Update]/g/ R:30
L:
[D][U][F][S][L][A][C]communication
how to communicate with normalfags?
how you talk with normals and sluts to appoint meeting or fucking?
What technologies, devices, protocols, software, can you use for such purpose?
how you talk with normals and sluts to appoint meeting or fucking?
What technologies, devices, protocols, software, can you use for such purpose?
/g/ R:7
L:
[D][S][L][A][C]Why do people waste their time on reinventing imageboard engines, when they could invest it into developing a decentralised imageboard?
/g/ R:7
L:
[D][U][F][S][L][A][C]VPS
What does /g/ think of VPS's i usually don't trust them enough to host my content, so i self host most of the time.
But a couple of days ago i discovered a service called SporeStack, which is a VPS which supports Tor only nodes, and iirc only supports payment in crypto.
You don't need an account to get a VPS there, you just pay and upload your ssh key, and you can even pay from the terminal.
I don't know is it any good? Do you know of any better VPS?
http://spore64i5sofqlfz5gq2ju4msgzojjwifls7rok2cti624zyq3fcelad.onion/
But a couple of days ago i discovered a service called SporeStack, which is a VPS which supports Tor only nodes, and iirc only supports payment in crypto.
You don't need an account to get a VPS there, you just pay and upload your ssh key, and you can even pay from the terminal.
I don't know is it any good? Do you know of any better VPS?
http://spore64i5sofqlfz5gq2ju4msgzojjwifls7rok2cti624zyq3fcelad.onion/
/g/ R:26
L:
[D][U][F][S][L][A][C]Fight against reCAPTCHA, Save nano-chan
Every day nano-chan tries to browse the internet and on half of the websites she is faced with the dreaded reCAPTCHA just cause she happens to be a tor grill, everytime she sees it her only choice is to cry the pain away, not only she is forced to enable javascript, but she also has to whitelist google's third party spyware servers and if it was not enough she is also discriminated against just cause she happen to be a robot!
This needs to stop, we need to save nano-chan from google.
Joking aside, how do we stop reCAPTCHA? It's literally everywhere, it's literally a spyware botnet, it's being used to train AIs that will be used to enslave us, it's fucking annoying if you block javascript and it's also completely unnecessary.
Why don't websites just make their own captcha or use a self hosted captcha?
It's not a matter of money cause it would not cost anything more.
It's not a matter of usability/convenience cause reCAPTCHA is a pain in the ass to use.
So i just don't get it. Why are webdevs so braindead...
Is there a way to fix this?
This needs to stop, we need to save nano-chan from google.
Joking aside, how do we stop reCAPTCHA? It's literally everywhere, it's literally a spyware botnet, it's being used to train AIs that will be used to enslave us, it's fucking annoying if you block javascript and it's also completely unnecessary.
Why don't websites just make their own captcha or use a self hosted captcha?
It's not a matter of money cause it would not cost anything more.
It's not a matter of usability/convenience cause reCAPTCHA is a pain in the ass to use.
So i just don't get it. Why are webdevs so braindead...
Is there a way to fix this?
/g/ R:19
L:
[D][U][F][S][L][A][C]/g/ how do we make technology more inclusive to all genders, races and religions?
and an we stop already pushing religion in software and instead push even more politically correct in software?
https://github.com/microsoft/vscode/issues/87268
and an we stop already pushing religion in software and instead push even more politically correct in software?
https://github.com/microsoft/vscode/issues/87268
/g/ R:17
L:
[D][U][F][S][L][A][C]ThinkPads
After years of resistance against ThinkPads, I am finally falling for the ThinkPad meme.
I am planning to buy a used one on eBay next year, I am open to any kind of suggestion from the model to what kind of price I should look for as I don't have any experience with ThinkPads.
As the final setup I was thinking of the ThinkPad X60, librebooted, with Parabola, which would make for a fully open source system. I don't really care about having incredible performance cause I have already another laptop for that kind of stuff.
Are ultrabases, extended batteries, battery docking stations memes or should I look into them?
What is some hardware I should change? I heard I have to change the wireless card to make it work with Parabola and that I can put an extra HDD.
Discuss ThinkPads in general I guess.
I am planning to buy a used one on eBay next year, I am open to any kind of suggestion from the model to what kind of price I should look for as I don't have any experience with ThinkPads.
As the final setup I was thinking of the ThinkPad X60, librebooted, with Parabola, which would make for a fully open source system. I don't really care about having incredible performance cause I have already another laptop for that kind of stuff.
Are ultrabases, extended batteries, battery docking stations memes or should I look into them?
What is some hardware I should change? I heard I have to change the wireless card to make it work with Parabola and that I can put an extra HDD.
Discuss ThinkPads in general I guess.
/g/ R:127
L:
[D][U][F][S][L][A][C]unix philosophies are retarded. proof
>unix philosophy of small programs running other programs in chain
>try to use it
>run curl from your software
>try to make multiple requests to same server using keep alive
>not possible, after each request curl process is closed and so are it's TCP connections
>cannot reuse the TCP connection, cannot use keep alive
>have to use library like real programmers instead of unix brain damage
>had to waste my time to learn that unix philosophy is retarded nigger shit
please be smarter than me and never go the unix way
>try to use it
>run curl from your software
>try to make multiple requests to same server using keep alive
>not possible, after each request curl process is closed and so are it's TCP connections
>cannot reuse the TCP connection, cannot use keep alive
>have to use library like real programmers instead of unix brain damage
>had to waste my time to learn that unix philosophy is retarded nigger shit
please be smarter than me and never go the unix way
/g/ R:36
L:
[D][U][F][S][L][A][C]Raspberry Pi
What are some cool things to do with a Raspberry Pi / single board computer / lightweight Linux machine?
I compiled and installed a hardware accelerated version of MPV which I can use to watch and stream video. It's really good, runs incredibly smoothly and CPU usage is very low (I guess because it's using the GPU probably...).
What else can you do with something like this?
I compiled and installed a hardware accelerated version of MPV which I can use to watch and stream video. It's really good, runs incredibly smoothly and CPU usage is very low (I guess because it's using the GPU probably...).
What else can you do with something like this?
/g/ R:40
L:
[D][U][F][S][L][A][C]/Nano/g/config
This thread is supposed to be a repository for custom user-configurations.
Web browsers, operating systems, command line software, whatever else, if it has a config this is the place to share!
This is not only a thread to post your own config but also a place where to peer review other nanons configs and help others.
The purpose of using a dedicated thread instead of /Nano/g/QTDDTOT is to make it lurkable.
I will start with my own Firefox and Tor Browser user.js configuration when i finish reviewing it.
Web browsers, operating systems, command line software, whatever else, if it has a config this is the place to share!
This is not only a thread to post your own config but also a place where to peer review other nanons configs and help others.
The purpose of using a dedicated thread instead of /Nano/g/QTDDTOT is to make it lurkable.
I will start with my own Firefox and Tor Browser user.js configuration when i finish reviewing it.
/g/ R:38
L:
[D][U][F][S][L][A][C]Advent of Code
https://adventofcode.com/2019/about
One last week in November, and then it starts.
Are you competing this year?
What language(s) are you going to use?
Where are you going to talk about the puzzles? nano/g/ maybe?
If you've never participated, from 1Dec to Christmas a Christmas-themed programming puzzle is posted on midnight, and if you solve the puzzle you get a follow-up. The site records how long it takes you to answer both puzzles, and you can stay anonymous on the site. The easiest way to create an account is through linking a github.
The fun of Advent of Code
1. getting the first part done fast
2. adapting your part1 solution to part 2. Part2 tends to punish inefficient solutions and corner-cutting.
3. keeping track of how other people in your private group and on the top100 leaderboard are fairing with what you just did
4. posting your code and comparing it against other solutions. microbenchmarking, smoller-than-thouing
5. learning or getting comfortable with a new language. I've used two Advents this way. By the end of the contest you have the confidence required to embark on any programming task with the language used.
One last week in November, and then it starts.
Are you competing this year?
What language(s) are you going to use?
Where are you going to talk about the puzzles? nano/g/ maybe?
If you've never participated, from 1Dec to Christmas a Christmas-themed programming puzzle is posted on midnight, and if you solve the puzzle you get a follow-up. The site records how long it takes you to answer both puzzles, and you can stay anonymous on the site. The easiest way to create an account is through linking a github.
The fun of Advent of Code
1. getting the first part done fast
2. adapting your part1 solution to part 2. Part2 tends to punish inefficient solutions and corner-cutting.
3. keeping track of how other people in your private group and on the top100 leaderboard are fairing with what you just did
4. posting your code and comparing it against other solutions. microbenchmarking, smoller-than-thouing
5. learning or getting comfortable with a new language. I've used two Advents this way. By the end of the contest you have the confidence required to embark on any programming task with the language used.
/g/ R:49
L:
[D][U][F][S][L][A][C]Secure Communications General
What's the most secure messaging protocol/program? Which one do you use?
Also, what do you think about pic related?
/g/ R:5
L:
[D][S][L][A][C]Libgen like site for ROMs
I possess a few rom collections for multiple consoles. I wanna start and maintain a site thatll be accessible through Tor and allow people to access those roms easily like libgen. Problem is Im poor as shit. I can set up my own server but my hardware is old and also I dont want my home address associated with the site with Nintendo going apeshit and suing everybody. How would you go about doing this?
/g/ R:15
L:
[D][U][F][S][L][A][C]Font Thread
Title says it all. Post about fonts, recommend fonts, recommend font rendering settings.
When it comes to settings, at the very least I recommend you go white on black. Try "#ababab" as your font color, it's greyish and very readable. Make sure your monitor is calibrated so one of the primary colors doesn't pop out, I have found it becomes more obvious when your font isn't straight up white.
Here are some good OTF sans serif fonts:
>San Francisco https://github.com/AppleDesignResources/SanFranciscoFont
Try San Francisco Text Medium.
The Text variant is better than Display in my experience.
>Ubuntu https://design.ubuntu.com/font/
Canonical doesn't distribute it in OTF, you have to compile it yourself.
Condensed is shit, Mono is a shit monospace font, but plain Ubuntu Regular is a great sans serif.
>Source Pro's Sans font, a.k.a Source Sans Pro https://adobe-fonts.github.io/source-sans-pro/
Not very good imo. Weird spacing issues and that disgusting complicated "g"
The font family includes a monospace font, a sans serif font, and a serif font, so if you want everything to be consistent it's the best option.
Here's a few great monospace fonts:
>Office Code Pro
https://github.com/nathco/Office-Code-Pro
Specially good if you like medium thickness and a blocky look.
It's based on Source Code Pro which is the monospace Source Pro font.
>Source Code Pro https://adobe-fonts.github.io/source-code-pro/
Source Code Pro is also quite good, I recommend Source Code Pro Light if you don't like thick fonts, and Source Code Pro Regular if you're in for that medium thickness and Office Code Pro doesn't please you
Here's a serif font:
>Source Serif Pro https://adobe-fonts.github.io/source-serif-pro/
I'm not really a serif guy even though I'm looking for serif fonts, so I don't really know what to say about this one.
When it comes to settings, at the very least I recommend you go white on black. Try "#ababab" as your font color, it's greyish and very readable. Make sure your monitor is calibrated so one of the primary colors doesn't pop out, I have found it becomes more obvious when your font isn't straight up white.
Here are some good OTF sans serif fonts:
>San Francisco https://github.com/AppleDesignResources/SanFranciscoFont
Try San Francisco Text Medium.
The Text variant is better than Display in my experience.
>Ubuntu https://design.ubuntu.com/font/
Canonical doesn't distribute it in OTF, you have to compile it yourself.
Condensed is shit, Mono is a shit monospace font, but plain Ubuntu Regular is a great sans serif.
>Source Pro's Sans font, a.k.a Source Sans Pro https://adobe-fonts.github.io/source-sans-pro/
Not very good imo. Weird spacing issues and that disgusting complicated "g"
The font family includes a monospace font, a sans serif font, and a serif font, so if you want everything to be consistent it's the best option.
Here's a few great monospace fonts:
>Office Code Pro
https://github.com/nathco/Office-Code-Pro
Specially good if you like medium thickness and a blocky look.
It's based on Source Code Pro which is the monospace Source Pro font.
>Source Code Pro https://adobe-fonts.github.io/source-code-pro/
Source Code Pro is also quite good, I recommend Source Code Pro Light if you don't like thick fonts, and Source Code Pro Regular if you're in for that medium thickness and Office Code Pro doesn't please you
Here's a serif font:
>Source Serif Pro https://adobe-fonts.github.io/source-serif-pro/
I'm not really a serif guy even though I'm looking for serif fonts, so I don't really know what to say about this one.
/g/ R:13
L:
[D][U][F][S][L][A][C]Hidden Service Traffic Analysis
Please bear with me: Imagine 10 different Tor Browser users in different parts of the world connected to Nanochan and posted the same message in a given thread at exactly the same time. All 10 users use the exact same OS, TBB version, and settings. What could Nanochan's admin potentially see that might distinguish these 10 connections from one another, however subtle or useless some of these distinctions might be for correlation and traffic analysis? If these 10 users proceeded to repeat this collaborative effort without changing circuits, posting an identical post in another thread at precisely the same time, could each new post be tied to the previous post made over the same connection?
I pose this purely hypothetical scenario because I'm not convinced my understanding of Tor and hidden services is sufficiently complete. Any clarification or insight might help me improve my online opsec.
/g/ R:21
L:
[D][U][F][S][L][A][C]Will i2p ever becoming popular enough to not suck? The main drawback seems to be lack of mass adoption. You'd think it would be more popular if for no other reason than complete privacy for torrenting.
/g/ R:55
L:
[D][U][F][S][L][A][C]IRC and XMPP
Maybe it's cause i am late to the party or maybe i am just a brainlet, but i never really figured out the IRC and XMPP world.
My problem is that i don't really know where to start at this point, so assume that i am a retard and suggest:
Best client.
Good Servers to join.
Security tips.
How to set up with tor properly.
My interests are technology, anime, videogames and piracy
Also just discuss IRC and XMPP and your experiences with these IM technologies i guess.
My problem is that i don't really know where to start at this point, so assume that i am a retard and suggest:
Best client.
Good Servers to join.
Security tips.
How to set up with tor properly.
My interests are technology, anime, videogames and piracy
Also just discuss IRC and XMPP and your experiences with these IM technologies i guess.
/g/ R:3
L:
[D][U][F][S][L][A][C]Just got my first ham licence (technician class) inexpensive, fun and I learned alot def recommend getting one if you haven't. Any other nanons who are HAMS?
/g/ R:75
L:
[D][U][F][S][L][A][C]/g/ humor thread
Post technogically humorous binary files and plaintext ASCII jokes, charlimit charlimit charlimit charlimit charlimit charlimit charlimit charlimit charlimit charlimit just fucking die and let me post faggot
/g/ R:5
L:
[D][U][F][S][L][A][C]What does /g/ think of Matrix?
The protocol not the riot client which is some pajeet tier javascript shit.
Does anyone know of better clients?
Some good servers?
Share your experiences with it.
The protocol not the riot client which is some pajeet tier javascript shit.
Does anyone know of better clients?
Some good servers?
Share your experiences with it.
/g/ R:89
L:
[D][S][L][A][C]Archives
I have in my posession 45 GB of 8chan archives (text+thumbnails) of the following boards (those marked as banned probably contains some cp so I'm going to delete them before publishing, and those marked as actively archived are kept up-to-date):
>/8teen/ (banned from 8chan)
>/a/ (actively archived)
>/animu/ (actively archived)
>/asmr/
>/aus/
>/ausneets/
>/b/ (actively archived)
>/baphomet/
>/boers/
>/christian/
>/co/
>/cow/ (actively archived)
>/creep/ (banned from 8chan)
>/danpu/
>/fascist/
>/fit/
>/g/
>/general/
>/girltalk/
>/greenbreeze/
>/hikki/
>/hwndu/
>/ipfs/
>/japan/
>/k/ (actively archived)
>/lain/
>/lewd/
>/loli/
>/n/ (actively archived)
>/newsplus/ (actively archived)
>/nnc/
>/pdf/
>/pdfs/
>/pol/ (actively archived)
>/polarchive/
>/polk/
>/polmeta/
>/poltech/
>/randamu/
>/redstick/
>/robowaifu/
>/shamedsluts/ (banned from 8chan)
>/soyboys/
>/sudo/
>/tech/ (actively archived)
>/wai/ (banned from 8chan)
>/waifuist/ (banned from 8chan)
>/younglove/ (banned from 8chan)
Anyone interested and how should I serve them? Should I just make a hidden service HTTP server with directory listing enabled? FTP server? There are 45501 files in the collection.
>inb4 make a torrent
No. Torrent exposes my IP.
/g/ R:14
L:
[D][U][F][S][L][A][C]Bear computer
The bear computer is a sofisticated piece of bear technology.
It is a beautiful example of superior japanese manufacturing, it was created by the Japanese company Bandai Namco, while the design of Rilakkuma, the cute bear on the back, was produced by the Japanese company San-X and created by Aki Kondo[1].
It is a neetbook with superior spec and design, such as[2]:
- an Atom CPU
- as much as 1GB of RAM
- the best OS ever made, Windows XP
- and most importantly a bear on the chassis, not just a normal bear, a Rilakkuma bear!
It sells for the modest price of $830 which also includes a yellow carrying case and Rilakkuma wallpapers, games, and features.
ThinkPads utterly BTFO.
Discuss the bear computer and bear technology nanons.
References:
[1] https://en.wikipedia.org/wiki/Rilakkuma
[2] https://www.cnet.com/news/rilakkuma-netbook-the-best-computers-have-bears-on-them/
It is a beautiful example of superior japanese manufacturing, it was created by the Japanese company Bandai Namco, while the design of Rilakkuma, the cute bear on the back, was produced by the Japanese company San-X and created by Aki Kondo[1].
It is a neetbook with superior spec and design, such as[2]:
- an Atom CPU
- as much as 1GB of RAM
- the best OS ever made, Windows XP
- and most importantly a bear on the chassis, not just a normal bear, a Rilakkuma bear!
It sells for the modest price of $830 which also includes a yellow carrying case and Rilakkuma wallpapers, games, and features.
ThinkPads utterly BTFO.
Discuss the bear computer and bear technology nanons.
References:
[1] https://en.wikipedia.org/wiki/Rilakkuma
[2] https://www.cnet.com/news/rilakkuma-netbook-the-best-computers-have-bears-on-them/
/g/ R:5
L:
[D][U][F][S][L][A][C]Hey what's that database / onion service where you enter an email address and it tells you any leaked passwords associated with it?
Where can I find some good leaked databases in general?
Where can I find some good leaked databases in general?
/g/ R:61
L:
[D][U][F][S][L][A][C]TV Jubilee
So, there are a ton of TVs out there. You can spend as much as you want on them (pic related).
8k content does not apparently exist yet, but 8k TVs do (both in price and resolution).
LCDs (and QLED, which is still LCD) hold the majority, with OLED in a distant but quality 2nd (OLED has good ratings).
Source: https://www.techradar.com/news/oled-vs-qled
Plasma's aren't really on the brand new market, obviously nor is CRT.
The god awful privacy-invading "Smart TVs" are everywhere.
Even some people who couldn't care less about privacy, security or anonymity, are not fans of the "Smart" UIs, especially when some of them force you to use them just to change the input!
There are a few that aren't "Smart TVs", aka "dumb TVs", but they have their own share of pros and cons.
Some say that the "Smart TVs" are cheaper because they get to profit off your data.
The worst part about the "dumb TVs" is their scarcity, combined with there is no easy way to search for them.
Only Walmart's (yeah, freaking Walmart!! The company that now says you can't carry in their stores) search engine has an option for "Smart", "Y" or "N".
Searching "not smart" or "dumb" on a regular search engine is of no help.
RCA seems to be the most competitive in this regard, having several for reasonable (in TV terms) prices.
All the others are mostly overpriced "displays".
A few stats to consider:
- Size (how big you want the screen, 75" is as high as the RCAs seem to go)
- Resolution (4k/UHD/2160p/3840x2160, which all mean the same thing, are the standard nowadays, 640x480 aside)
- Price/Value ($250 to $800 for the current RCA range)
- Refresh rate (see below)
On refresh rates or "HZ" (hertz):
So this is kinda complicated. While more is better, they usually lie and use tricks to increase HZ.
The refresh rate is basically how many FPS your TV can do or pretend to do, & has further to with the soap opera effect and blurring.
60hz is usually standard, 120hz is attainable but seemingly only in expensive "Smart TVs" (the RCAs are only 60hz), or maybe uber expensive "displays".
Source:
https://www.cnet.com/news/ultra-hd-4k-tv-refresh-rates/
https://www.cnet.com/news/fake-refresh-rates-is-your-tv-really-120hz/
What I think:
Just get an RCA if you wanna buy new, or really pony up the bucks.
Or buy used and get a whatever strikes your fancy (CRT, Plasma 1080p, LCD 1080p).
Tons of brands exist:
- RCA (been around forever, Radio Corporation of America)
- Panasonic (quality Japanese corp)
- JVC (merged with Kenwood, was once part of RCA, Japanese, also been around forever)
- Phillips (hotel rooms?)
- Skyworth (more like Skynet!)
- Samsung (Korean, good reputation)
- LG (know nothing about them)
- Magnavox (not many offerings)
- Polaroid (only smart TVs)
- Toshiba (nothing catches my eye)
- Sony (used to good, now whatever/I don't know)
- TCL (cheap Chinese newcomer to the market)
- Hisense (what?)
Correct me if I am wrong & add the ones I forgot.
Note that the official sites of most (if not all, I didn't test all) of these business's ABSOLUTELY SUCK!
JavaScript intensive and even with enabled, doesn't really work (especially Panasonic's and RCA's websites).
There is also audio to consider, that's probably for another thread though.
But what do you think, Nanons?
8k content does not apparently exist yet, but 8k TVs do (both in price and resolution).
LCDs (and QLED, which is still LCD) hold the majority, with OLED in a distant but quality 2nd (OLED has good ratings).
Source: https://www.techradar.com/news/oled-vs-qled
Plasma's aren't really on the brand new market, obviously nor is CRT.
The god awful privacy-invading "Smart TVs" are everywhere.
Even some people who couldn't care less about privacy, security or anonymity, are not fans of the "Smart" UIs, especially when some of them force you to use them just to change the input!
There are a few that aren't "Smart TVs", aka "dumb TVs", but they have their own share of pros and cons.
Some say that the "Smart TVs" are cheaper because they get to profit off your data.
The worst part about the "dumb TVs" is their scarcity, combined with there is no easy way to search for them.
Only Walmart's (yeah, freaking Walmart!! The company that now says you can't carry in their stores) search engine has an option for "Smart", "Y" or "N".
Searching "not smart" or "dumb" on a regular search engine is of no help.
RCA seems to be the most competitive in this regard, having several for reasonable (in TV terms) prices.
All the others are mostly overpriced "displays".
A few stats to consider:
- Size (how big you want the screen, 75" is as high as the RCAs seem to go)
- Resolution (4k/UHD/2160p/3840x2160, which all mean the same thing, are the standard nowadays, 640x480 aside)
- Price/Value ($250 to $800 for the current RCA range)
- Refresh rate (see below)
On refresh rates or "HZ" (hertz):
So this is kinda complicated. While more is better, they usually lie and use tricks to increase HZ.
The refresh rate is basically how many FPS your TV can do or pretend to do, & has further to with the soap opera effect and blurring.
60hz is usually standard, 120hz is attainable but seemingly only in expensive "Smart TVs" (the RCAs are only 60hz), or maybe uber expensive "displays".
Source:
https://www.cnet.com/news/ultra-hd-4k-tv-refresh-rates/
https://www.cnet.com/news/fake-refresh-rates-is-your-tv-really-120hz/
What I think:
Just get an RCA if you wanna buy new, or really pony up the bucks.
Or buy used and get a whatever strikes your fancy (CRT, Plasma 1080p, LCD 1080p).
Tons of brands exist:
- RCA (been around forever, Radio Corporation of America)
- Panasonic (quality Japanese corp)
- JVC (merged with Kenwood, was once part of RCA, Japanese, also been around forever)
- Phillips (hotel rooms?)
- Skyworth (more like Skynet!)
- Samsung (Korean, good reputation)
- LG (know nothing about them)
- Magnavox (not many offerings)
- Polaroid (only smart TVs)
- Toshiba (nothing catches my eye)
- Sony (used to good, now whatever/I don't know)
- TCL (cheap Chinese newcomer to the market)
- Hisense (what?)
Correct me if I am wrong & add the ones I forgot.
Note that the official sites of most (if not all, I didn't test all) of these business's ABSOLUTELY SUCK!
JavaScript intensive and even with enabled, doesn't really work (especially Panasonic's and RCA's websites).
There is also audio to consider, that's probably for another thread though.
But what do you think, Nanons?
/g/ R:49
L:
[D][U][F][S][L][A][C]Lokinet
Stop using compromised, US funded Tor and start using secure, fast and independent LOKINET today and browse your favorite shitposting sites!
https://lokinet.org/
https://github.com/loki-project/loki-network
8kun
http://pijdty5otm38tdex6kkh51dkbkegf31dqgryryz3s3tys8wdegxo.loki/
http://s5swbfcf4joom9tzf8w7ss5fptywwpnnfop3pxcf5ebjnz8ioksy.loki/
https://lokinet.org/
https://github.com/loki-project/loki-network
8kun
http://pijdty5otm38tdex6kkh51dkbkegf31dqgryryz3s3tys8wdegxo.loki/
http://s5swbfcf4joom9tzf8w7ss5fptywwpnnfop3pxcf5ebjnz8ioksy.loki/
/g/ R:17
L:
[D][U][F][S][L][A][C]Jewtube will ban Europe
Apparently, Jewtube is going to ban memes in Europe.
>Q: Wait, what would w be the impact if the European Parliament version of Article 13 passes? A:YouTube would be forced to block millions of videos (existing and new ones) in the European Union. It could drastically limit the content that one can upload to the platform in Europe.
Thoughts?
Will imageboards such as 4cucks and 8chode be banned in Europe?
/g/ R:7
L:
[D][S][L][A][C]AMD Versus INTEL
It's time for the real showdown /g/! AMD is on the cutting edge at the moment, but INTEL is too big to fail and has wicked momentum. Which one will win the 2nd CPU War and emerge as the victer? Discoss down below Nanochan!
/g/ R:65
L:
[D][U][F][S][L][A][C]The backdoor is real, jeez:
>Intel discloses remote 'privileges escalation' vulnerability in CSME for non-vPro systems (not having AMT module). That's a precedent breaking well recognized assumptions about remote attacks on CSME
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html
>CVE-2019-0169
>Heap overflow in subsystem in Intel(R) CSME before versions 11.8.70, 11.11.70, 11.22.70, 12.0.45; Intel(R) TXE before versions 3.1.70 and 4.0.20 may allow an unauthenticated user to potentially enable escalation of privileges, information disclosure or denial of service via adjacent access.
>CVE-2019-11131
>Logic issue in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Note these are "unautheticated user" and some of those are "via network access".
This is very scary. Anyone with expertise could have access to your memory content.
I don't think this is purely incompetence from developers.
>Intel discloses remote 'privileges escalation' vulnerability in CSME for non-vPro systems (not having AMT module). That's a precedent breaking well recognized assumptions about remote attacks on CSME
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html
>CVE-2019-0169
>Heap overflow in subsystem in Intel(R) CSME before versions 11.8.70, 11.11.70, 11.22.70, 12.0.45; Intel(R) TXE before versions 3.1.70 and 4.0.20 may allow an unauthenticated user to potentially enable escalation of privileges, information disclosure or denial of service via adjacent access.
>CVE-2019-11131
>Logic issue in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Note these are "unautheticated user" and some of those are "via network access".
This is very scary. Anyone with expertise could have access to your memory content.
I don't think this is purely incompetence from developers.
/g/ R:11
L:
[D][S][L][A][C]gif captcha
maybe it's a stupid idea, but would it be possible to implement a captcha with a gif?
basically a gif image with randoms letters but they appear and disappear and have some other distortions that change with time, done in a way that it loops
would it be harder to crack? is it anti-user or pro-user? is it too much slow to make gifs on server?
basically a gif image with randoms letters but they appear and disappear and have some other distortions that change with time, done in a way that it loops
would it be harder to crack? is it anti-user or pro-user? is it too much slow to make gifs on server?
/g/ R:8
L:
[D][U][F][S][L][A][C]Physical Security
Anyone else interested in physical security, lock or lockpicking?
I watched this talk on DEF CON about how a 3 year old shot himself, because his father was a police officer and the government gave him a shitty safe. Turns out the safe opens once you "bump" it, which is exactly what the kid did and got access to his gun. Highly recommend everyone watch it:
http://axqzx4s6s54s32yentfqojs3x5i7faxza6xo3ehd4bzzsg2ii4fv2iid.onion/watch?v=mu9USTP_0ZQ&nojs=1
So then I started reading chapter 13 of Security Engineering Ross Anderson, and he talks about how locks keep being defeated over and over again:
https://www.cl.cam.ac.uk/~rja14/book.html
Came across also these "Bowley" locks and found it pretty interesting:
http://axqzx4s6s54s32yentfqojs3x5i7faxza6xo3ehd4bzzsg2ii4fv2iid.onion/watch?v=jgekjfwphGc&nojs=1
Forever Lock V2 seems neat too:
http://axqzx4s6s54s32yentfqojs3x5i7faxza6xo3ehd4bzzsg2ii4fv2iid.onion/watch?v=5J2rwawhZWI&nojs=1
What is your thoughts on this topic?
I watched this talk on DEF CON about how a 3 year old shot himself, because his father was a police officer and the government gave him a shitty safe. Turns out the safe opens once you "bump" it, which is exactly what the kid did and got access to his gun. Highly recommend everyone watch it:
http://axqzx4s6s54s32yentfqojs3x5i7faxza6xo3ehd4bzzsg2ii4fv2iid.onion/watch?v=mu9USTP_0ZQ&nojs=1
So then I started reading chapter 13 of Security Engineering Ross Anderson, and he talks about how locks keep being defeated over and over again:
https://www.cl.cam.ac.uk/~rja14/book.html
Came across also these "Bowley" locks and found it pretty interesting:
http://axqzx4s6s54s32yentfqojs3x5i7faxza6xo3ehd4bzzsg2ii4fv2iid.onion/watch?v=jgekjfwphGc&nojs=1
Forever Lock V2 seems neat too:
http://axqzx4s6s54s32yentfqojs3x5i7faxza6xo3ehd4bzzsg2ii4fv2iid.onion/watch?v=5J2rwawhZWI&nojs=1
What is your thoughts on this topic?
/g/ R:44
L:
[D][U][F][S][L][A][C]Gopher General Thread
Didn't notice any other thread about Gopher protocol, so I'll start it myself. Let it be both "what does nanochan think" discussion and link sharing thread.
/g/ R:5
L:
[D][U][F][S][L][A][C]Implementing anonymous data storage
Hey guys,
I'm planning on implementing a ANONYMOUS remote backup server for some other server I have, and I'm asking you for some ideas.
What I'd usually do, is creating my /var/backup directory with rsync, and make encrypted and signed backups with duplicity, which then are be pushed to my backup location via ssh/scp.
I've been thinking about making a hidden service for the SSH, but that's no good. The problem is, that it requires a SSH account on the backup location, which would enable someone who hacked the main server also to get user access to the backup server. And then all it takes would be to do a "ip addr" to get the IP of the backup server. Of course I could come up with a containerized solution, but that's work, and I'd still like something more dedicated for file uploads, because I don't see any reason to grant shell access just to push some files.
Then I thought, that maybe I could use a FTP server like VSFTP. Normally FTP can't be torified because the server starts the data connection to the client, which is impossible, if the client uses tor. But there's also the possibility to let it run in "passive mode", which means, that the client starts both connections. In theory, this could be torified, but I haven't found any discussions regarding its security, and, as we all should know, torifying applications is not trivial.
Do you have any other ideas about how I could implement my data-upload-hidden-service, or otherwise store my encrypted backups anonymously? Is FTP really the best solution to implement some automated file uploads?
I'm planning on implementing a ANONYMOUS remote backup server for some other server I have, and I'm asking you for some ideas.
What I'd usually do, is creating my /var/backup directory with rsync, and make encrypted and signed backups with duplicity, which then are be pushed to my backup location via ssh/scp.
I've been thinking about making a hidden service for the SSH, but that's no good. The problem is, that it requires a SSH account on the backup location, which would enable someone who hacked the main server also to get user access to the backup server. And then all it takes would be to do a "ip addr" to get the IP of the backup server. Of course I could come up with a containerized solution, but that's work, and I'd still like something more dedicated for file uploads, because I don't see any reason to grant shell access just to push some files.
Then I thought, that maybe I could use a FTP server like VSFTP. Normally FTP can't be torified because the server starts the data connection to the client, which is impossible, if the client uses tor. But there's also the possibility to let it run in "passive mode", which means, that the client starts both connections. In theory, this could be torified, but I haven't found any discussions regarding its security, and, as we all should know, torifying applications is not trivial.
Do you have any other ideas about how I could implement my data-upload-hidden-service, or otherwise store my encrypted backups anonymously? Is FTP really the best solution to implement some automated file uploads?
/g/ R:10
L:
[D][S][L][A][C]mlock() and munlock() on Linux
I am writing software in C++ that handles sensitive data that I do not want swapped out to permanent storage.
From what I can tell, mlock(const void *addr, size_t len) locks pages and munlock(const void *addr, size_t len) unlocks them.
The man page says:
munlock() unlocks pages in the address range starting at addr and continuing for len bytes. After this call, all pages that contain a part of the specified memory range can be moved to external swap space again by the kernel.
Suppose I call mlock() on two different buffers, and I want to unlock one of them later in the program.
Is there a chance that both buffers may be unlocked by one call to munlock() if they are both on the same page boundary?
My current design has class constructors calling mlock() with the destructors calling munlock(), but I'm not sure if this is safe.
Any suggestions Nanons?
From what I can tell, mlock(const void *addr, size_t len) locks pages and munlock(const void *addr, size_t len) unlocks them.
The man page says:
munlock() unlocks pages in the address range starting at addr and continuing for len bytes. After this call, all pages that contain a part of the specified memory range can be moved to external swap space again by the kernel.
Suppose I call mlock() on two different buffers, and I want to unlock one of them later in the program.
Is there a chance that both buffers may be unlocked by one call to munlock() if they are both on the same page boundary?
My current design has class constructors calling mlock() with the destructors calling munlock(), but I'm not sure if this is safe.
Any suggestions Nanons?
/g/ R:17
L:
[D][U][F][S][L][A][C]Technological /nano/nymity
Anonymity describes situations where the acting person's name is unknown. Some writers have argued that namelessness, though technically correct, does not capture what is more centrally at stake in contexts of anonymity. The important idea here is that a person be non-identifiable, unreachable, or untrackable.
Security is freedom from, or resilience against, potential harm (or other unwanted coercive change) caused by others. Beneficiaries (technically referents) of security may be of persons and social groups, objects and institutions, ecosystems or any other entity or phenomenon vulnerable to unwanted change.
Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals.
Nanonymity is Anonymity + Security + Privacy, discuss nanonymity, take the /nano/pill.
Security is freedom from, or resilience against, potential harm (or other unwanted coercive change) caused by others. Beneficiaries (technically referents) of security may be of persons and social groups, objects and institutions, ecosystems or any other entity or phenomenon vulnerable to unwanted change.
Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals.
Nanonymity is Anonymity + Security + Privacy, discuss nanonymity, take the /nano/pill.
/g/ R:107
L:
[D][U][F][S][L][A][C]Transhumanism General
This is a thread for discussion and critic about transhumanism and singularitarianism, please keep it civil and on topic :)
Discussion about cyberpunk is permitted as long as it's NOT fiction, larping is NOT permitted, make your own thread for that kinf of thing.
Discussion about technological dystopia is permitted but note that we already have a thread here >>>/g/3342 so you should use that.
Transhumanism(abbreviated as H+ or h+) is an international philosophical movement that advocates for the transformation of the human condition by developing and making widely available sophisticated technologies to greatly enhance human intellect and physiology.
Singularitarianism is a movement defined by the belief that a technological singularity—the creation of superintelligence—will likely happen in the medium future, and that deliberate action ought to be taken to ensure that the singularity benefits humans.
Human enhancement
We already use technology to enhance our ability since millennia, think for example simple tool like a pickaxe, an axe or the plough such technology helped human achieve things that would have never been possible by own mere body alone, transhumanism advocates that we should move to the next step and start enhancing out body and our brain, this is the next step of human evolution we shall become Übermensch.
Freedom from the human condition
Transhumanism aims to free humans from the human condition, living as a human should be a choice(and a right) not something you're forced onto.
Singularity
The unavoidable advancement in artificial intelligence and information technology is soon gonna put humans in an existential crisis, soon a world where humans are not needed anymore is gonna come, transhumanism aims to prepare humans for this future by giving them the tools(enhancement) to stay relevant in a post-human society.
Resources:
H+Pedia - https://hpluspedia.org/wiki/Main_Page
Transhumanism - https://en.wikipedia.org/wiki/Transhumanism
Human enhancement - https://en.wikipedia.org/wiki/Human_enhancement
Human condition - https://en.wikipedia.org/wiki/Human_condition
Singularity - https://en.wikipedia.org/wiki/Technological_singularity
~Let's all love Lain~
/g/ R:67
L:
[D][U][F][S][L][A][C]cancer thread
can we get a cancer thread going?
i often want to show someone a picture of tech cancer but dont have one on hand. this thread will help save you from this problem
i often want to show someone a picture of tech cancer but dont have one on hand. this thread will help save you from this problem
/g/ R:13
L:
[D][S][L][A][C]Who should design UI on the Web?
Its sort of a philosophical question but who should decide how you view and interract with a website? Is it the job of the designer to design a website so they see fit, using JS and CSS to finetune the experience of using the website? Or is it the job of the end user to use userscripts and themes to sculpt the web how they see fit?
/g/ R:103
L:
[D][U][F][S][L][A][C]IT'S HAPPENING
The gaps are closing for RISC-V. This is something I never thought would be possible. We might actually be able to buy fast RISC-V SoC in the next 10 years (fast == comparable speed with more modern ARM processors, such as i.MX6).
>Formal specification is now frozen https://riscv.org/specifications/
https://github.com/rsnikhil/Temporary_TGISA
>More than 60 designs open sourced already and more every day:
https://github.com/riscv/riscv-cores-list
>Not even including secure enclaves and GPU:
https://keystone-enclave.org/
https://libre-riscv.org/simple_v_extension/
>Open software for FPGA designs with Yosys, Symbiflow, Nextpnr and nMigen https://symbiflow.github.io/
>Open hardware for FPGA such as TinyFPGA, Rodiona ULX3S, BlackIce and Fomu
https://twitter.com/ico_TC
https://github.com/emard/ulx3s
>Efforts to use formal methods and increase hardware security by many companies: DARPA's CRASH-SAFE, Draper Labs (DOVER), OneSpin, Bluespec, Axiomise, BAE Systems, etc.
>People developing formally verified software for it: Galois, Data61, Hensoldt, Critical Systems, ADA Company
>Firmware already open source, but Coreboot being ported:
https://doc.coreboot.org/mainboard/sifive/hifive-unleashed.html
>Industry partnership with many high-level companies, including Western Digital, Nvidia, Google, Microsoft, between others.
>Industry groups such as OpenHWGroup:
http://openhwgroup.org/
>Support software such as OpenROAD:
https://github.com/The-OpenROAD-Project/alpha-release
>Companies more open to print your custom IP:
https://efabless.com/faq
>Open PCB design software:
http://www.kicad-pcb.org/
>Debian and Clang added support for RISC-V
>Nice community growing educational material every day
FUCK YEAH!
/g/ R:14
L:
[D][U][F][S][L][A][C]Full-disk encryption
hey, /tech/ let's talk about encryption!
I'm acquainted with the likes of cryptsetup, LUKS, VeraCrypt (?TrueCrypt 7.1 is bad somehow?). I understand the risks of full-disk encryption and norman's reaction to encrypted hard drive volumes.
What happens when you are confronted by the police/nwo forces? Vera/Truecrypt has hidden volumes which represent themselves as binary blobs in the system, which have a false key that unencrypts decoy data. Does LUKS achieves that? As far as i'm concerned only 1 volume is encrypted past grub-level machinations. Grub asks passwords to volumes that are basically visible to him. But what if i wish to shrink/extend volume? Where is that metadata stored? LUKS2 setup works horrendously with grub, requiring some tinkering which should not be there in the first place. Does LUKS header get updated when i introduce changes into my drive/volume?
What if there is a boot-level pre-grub solution which asks a password to unencrypt your hard-drive (like most manufacturers provide out of the box), but with several possible hidden volumes and decoy data unencrypted instead. Like:
1) i boot up computer (normal procedure)
2) it asks for a hard-drive pass
3a) i provide it with a real pass that unencrypts real operating volume
3b) i provide it with a pass for decoy to be detected and unencrypted
3c) i provide it with a pass quietly shredding all the valuable data on the hard drive, while leas provide me donuts
4) stop operating, clear cash, swap and ram
5) non-dumb leas check my hard drive capacity is actually twice the size of the volume and crush my nuts in jail
inb4: > lol tor+cp
fbi, get out of your phones! we are living in dystopian world where data hoarding is considered a crime! (Hello, communismus!) I am not afraid of confronting the police on the street, the question is what happens when they blow out your door at 5 A.M.? You can't be always prepared to be that guy "i know those thing look like computers, they are totally not!". DEFCON proved that even physical destruction (using a fucking termite!) still leaves enough hard drive plates/flash memory chip transistors intact, allowing "interested parties" to snoop into your volumes after you have dealt with them. Shredding is the only solution, but it must be queit (as proposed above). Should i just start to write drivers to make my own solution for my notebook or is there an option?
tldr(too much mumble): is there working boot-level full-disk encryption with hidden decoy volumes solution?
I'm acquainted with the likes of cryptsetup, LUKS, VeraCrypt (?TrueCrypt 7.1 is bad somehow?). I understand the risks of full-disk encryption and norman's reaction to encrypted hard drive volumes.
What happens when you are confronted by the police/nwo forces? Vera/Truecrypt has hidden volumes which represent themselves as binary blobs in the system, which have a false key that unencrypts decoy data. Does LUKS achieves that? As far as i'm concerned only 1 volume is encrypted past grub-level machinations. Grub asks passwords to volumes that are basically visible to him. But what if i wish to shrink/extend volume? Where is that metadata stored? LUKS2 setup works horrendously with grub, requiring some tinkering which should not be there in the first place. Does LUKS header get updated when i introduce changes into my drive/volume?
What if there is a boot-level pre-grub solution which asks a password to unencrypt your hard-drive (like most manufacturers provide out of the box), but with several possible hidden volumes and decoy data unencrypted instead. Like:
1) i boot up computer (normal procedure)
2) it asks for a hard-drive pass
3a) i provide it with a real pass that unencrypts real operating volume
3b) i provide it with a pass for decoy to be detected and unencrypted
3c) i provide it with a pass quietly shredding all the valuable data on the hard drive, while leas provide me donuts
4) stop operating, clear cash, swap and ram
5) non-dumb leas check my hard drive capacity is actually twice the size of the volume and crush my nuts in jail
inb4: > lol tor+cp
fbi, get out of your phones! we are living in dystopian world where data hoarding is considered a crime! (Hello, communismus!) I am not afraid of confronting the police on the street, the question is what happens when they blow out your door at 5 A.M.? You can't be always prepared to be that guy "i know those thing look like computers, they are totally not!". DEFCON proved that even physical destruction (using a fucking termite!) still leaves enough hard drive plates/flash memory chip transistors intact, allowing "interested parties" to snoop into your volumes after you have dealt with them. Shredding is the only solution, but it must be queit (as proposed above). Should i just start to write drivers to make my own solution for my notebook or is there an option?
tldr(too much mumble): is there working boot-level full-disk encryption with hidden decoy volumes solution?
/g/ R:27
L:
[D][U][F][S][L][A][C]Tor Relays
Do you care about internet anonymity anon?
Concerned about avoiding the botnet?
Concerned about helping others avoid the botnet?
Why not run a Tor relay at home?
https://trac.torproject.org/projects/tor/wiki/TorRelayGuide
No more speculating that all nodes are run by glowers. Get off your asses and make it better!
Concerned about avoiding the botnet?
Concerned about helping others avoid the botnet?
Why not run a Tor relay at home?
https://trac.torproject.org/projects/tor/wiki/TorRelayGuide
No more speculating that all nodes are run by glowers. Get off your asses and make it better!
/g/ R:126
L:
[D][U][F][S][L][A][C]Anti-JavaScript Crusade
What are some sites that don't use JavaScript (or at least don't require it for full functionality)?
I'm thinking sites/software like:
>SearX (in general, ie searx.info)
>NanoChan (ayyy lmao)
>Elude.in (SquirrelMail)
>Wikipedia/Wiktionary/Encyclopedia Dramatica/InstallGentoo Wiki/Arch Linux Wiki (MediaWiki)
There are addon's to disable JS, see:
>NoScript (not very good)
>uBlock Origin (an adblocker, best to just use it as such)
>uMatrix (the best option, but use in conjunction with uBlock for best results)
What about shopping sites specifically?
Sites like Amazon and Ebay both require you turn on/allow loads of liquid turd in uMatrix before even basic functionality begins to emerge.
Answers like "just use Craigslist" or "just go to a brick and mortar store lmao" don't count.
Keep it real!
I'm thinking sites/software like:
>SearX (in general, ie searx.info)
>NanoChan (ayyy lmao)
>Elude.in (SquirrelMail)
>Wikipedia/Wiktionary/Encyclopedia Dramatica/InstallGentoo Wiki/Arch Linux Wiki (MediaWiki)
There are addon's to disable JS, see:
>NoScript (not very good)
>uBlock Origin (an adblocker, best to just use it as such)
>uMatrix (the best option, but use in conjunction with uBlock for best results)
What about shopping sites specifically?
Sites like Amazon and Ebay both require you turn on/allow loads of liquid turd in uMatrix before even basic functionality begins to emerge.
Answers like "just use Craigslist" or "just go to a brick and mortar store lmao" don't count.
Keep it real!
/g/ R:14
L:
[D][U][F][S][L][A][C] Increasingly, I feel as if I am being pushed away from the browser. The local space, the window headers, the text editors, the ncurses programs, those that render under the control of the user, have taken on a comforting, friendly atmosphere. These are programs that exist to serve the user, that operate under the user's control, and do the user's bidding. Increasingly, I find that websites are fighting against the people who use them. Yes, I'm running adblock, no, I wouldn't like to be berated for not allowing cookies. They load strange styles, in strange fonts, take up obscene amounts of RAM, and scrape as much information as they can to be bundled up and sold to whoever is willing to pay. The assumption that the programmer knows more than the user is never more present than it is online, and it has never been more present than it is now. GNU utils are software, written by programmers, for people who appreciate and understand software. If any piece of software is behaving in a way I don't like, it's easy for me to change that behavior. I've written a small script that creates a text file for X to use as color variables for various programs, from the input of an image. This was a fun exercise, but in doing this the browser has become even more separated in my mind. The browser alone obeys its own rules, renders text its own way, selects its own jarring colors. The browser is an intruder in the space of the user, a stranger. The ability of the browser to connect us to others is invaluable, the "strangeness" of the browser is what gives it utility. However, we should be careful to accept that strangeness as truth, and ensure that the browser itself does not become that truth, and that the user, and the user space, does not become the interloper in our minds.
/g/ R:37
L:
[D][U][F][S][L][A][C]/drg/ Data Retention General
Between the current normiefication of the internet, governments regulating content online more than even and websites getting shut down all the time i finally made the choice to get serious about data hoarding and data retention, my objective is to collect at least 100TB of data that i care about to tramandate it to future generations when the full cyberpunk future i see on the horizon will become reality. In this thread i want to focus on the retention of this data, in the past i often overlooked this aspect and i lost stuff multiple times, i'm don't want to make that mistake ever again, so if you could share your data retention strategies it would help me greatly, feel free to also recommend particular brands or software or general tips.
/g/ R:26
L:
[D][U][F][S][L][A][C]The Final HDD
is it better to have your main data HDD as internal or external drive?
is it better to connect it with SATA, PATA, USB2.0? which doesn't have DMA (Direct Memory Access)?
how to install open source firmware on my botnet HDD?
is it better to connect it with SATA, PATA, USB2.0? which doesn't have DMA (Direct Memory Access)?
how to install open source firmware on my botnet HDD?
/g/ R:25
L:
[D][U][F][S][L][A][C]Github hate
Fuck this shit site. It was always cancer but ever since M$ took over it's on another fucking level.
>have an anonymous account to do shit like report bugs and minor PRs to some small programs/libraries i use
>try to log in after a few weeks
>We sent you an email to verify your account!
>i forgot to write down the unaliased guerilla mail i used for it
>decide to make new account with new guerilla mail
>account flagged
>can't verify guerilla mail accounts
>fuck it, let's make a yandex account just for this shit
>yandex lets you create an account without phone number, but emails are silently rejected unless you add phone
>spend a day waiting for github verification thinking their emails are shit
>turns out it's a yandex problem
>try cock.li instead
>cannot verify domain airmail.cc
There's 10 million github clones that are more featurefull and don't have half the bullshit, when are devs going to wake up already and leave? Why are we even still in the year of our lord CY+3 relying on autocratic, censor-happy companies to host a few kbs of code instead of just running our own? Why is there still after 14 years of git not yet a p2p git distribution network?
>have an anonymous account to do shit like report bugs and minor PRs to some small programs/libraries i use
>try to log in after a few weeks
>We sent you an email to verify your account!
>i forgot to write down the unaliased guerilla mail i used for it
>decide to make new account with new guerilla mail
>account flagged
>can't verify guerilla mail accounts
>fuck it, let's make a yandex account just for this shit
>yandex lets you create an account without phone number, but emails are silently rejected unless you add phone
>spend a day waiting for github verification thinking their emails are shit
>turns out it's a yandex problem
>try cock.li instead
>cannot verify domain airmail.cc
There's 10 million github clones that are more featurefull and don't have half the bullshit, when are devs going to wake up already and leave? Why are we even still in the year of our lord CY+3 relying on autocratic, censor-happy companies to host a few kbs of code instead of just running our own? Why is there still after 14 years of git not yet a p2p git distribution network?
/g/ R:31
L:
[D][U][F][S][L][A][C]Links DNS Leak
https://marc.info/?l=openbsd-ports&m=156832957101047&w=2
Prior to version 2.20.1, the Links web browser leaked DNS when used with Tor. Stop using Links with Tor.
Prior to version 2.20.1, the Links web browser leaked DNS when used with Tor. Stop using Links with Tor.
/g/ R:38
L:
[D][U][F][S][L][A][C]DO NOT USE TORBROWSER 8.x or FF 6X
DO NOT DOWNLOAD TORBROWSER 8.x or FF 6X
they have huge amount of zero-days. THEY ARE COMPROMISED
PROOF: https://darknetlive.com/post/zero-day-company-reveals-vulnerability-in-tor-browser-7-x/
>In a post on Twitter, a company specializing in purchasing zero-day exploits from researchers and selling them to government agencies revealed that several versions of the Tor Browser fail to prevent JavaScript from running even with NoScript on the most secure setting.
>The security company, Zerodium, announced the vulnerability after a new version of the Tor Browser had been released. Tor Browser 8.x is unaffected by the vulnerability, according to their announcement.
A company that earns profit on selling exploits for tor browser is telling you that tbb 7.X in UNSAFE and you need to migrate to SAFE tbb 8. does that sound legit? what is their motivation? how do you think?
if TBB 7 is so insecure, why would they speak about it publicly instead of selling zero-days for it?
the true reason is, because they have a lot of zero-days for TBB8, whereas TBB7 is mature and they won't be able to find much more holes.
THEY ARE A PRIVATE COMPANY that is "specializing in purchasing zero-day exploits from researchers and selling them to government agencies". Your security is not in their interests, their interests is making profit by selling zero-days. If they shill for updating TBB to version 8, that means they will profit from it. How? By selling zero-days for TBB8. They have a lot of them.
>Advisory: Tor Browser 7.x has a serious vuln/bugdoor leading to full bypass of Tor / NoScript ‘Safest’ security level (supposed to block all JS).
The exploit in TBB7 is not in browser code but in NoScript. However, NoScript creators quickly released a fix. You can get it here: https://noscript.net/getit you need the 5.1.9 version for TBB7 and FF ESR <60.
However, those fuckers from Zerodium, they tell you bullshit that you need to update your entire browser. Which is total bullshit. All you need is update NoScript.
Zerodium shill for TBB8 because they have huge amount of exploits for it and they will get rich from it.
Another problem with TBB8 is that it stops spoofing useragent. It lowers your privacy.
https://forums.whonix.org/t/tor-browser-8-and-removal-of-user-agent-spoofing/5930
https://trac.torproject.org/projects/tor/ticket/27495
Tor Project makes changes that lower anonymity of Tor users. Tor Project is compromised by CIA and MOSSAD.
If you have TorBrowser 8 or Firefox 60+ you should quickly downgrade. This is SERIOUS situation.
However, this is not so easy, because Tor Project quickly removed all TorBrowser7.X from their site (https://dist.torproject.org/torbrowser/).
You need to download Tor Browser 7.5.6 from 3rd party websites:
https://archive.org/download/torbrowser-install-7.5.6_en-US_201811/torbrowser-install-7.5.6_en-US.exe
https://torify.me/en/download-tor-browser/download-tor-browser-for-windows.html
after you download you can verify file
SHA1 eb39a62bea0e23816d5376600ad60a1f5ec603b5
SHA-256 475b2207314ddbf28ee79651b5d1154d59699e7b76a3b5081dce3caf97ab941e
SHA384 8f0471f191cf6f4965b5975a2679acf60cd6d1e4b9aac71212ff9ba5532160edc843303ccaab190a53950218ad868d46
SHA-512 6d8af481332ab552cf99a2f03373ed33262fbd8a74b6b082d3a05023c82a978ba0ff757a1d5c25414d419cf45dbd7b54678ea23c77cefff56a916cd48059d0c2
CRC32 cb25f5f0
MD5 886e550598a7328205c430936f4226f5
Size 53 868 664
After you install it, update NoScript, https://noscript.net/getit follow the instructions there and install NoScript 5.1.9.
>Notice: you may need to open about:config and set your xpinstall.signatures.required preference to false in order to install NoScript 5.x, since Mozilla doesn't support signatures for legacy add-ons anymore. If you're using a non ESR Firefox, you may also need this hack.
Your life is at risk. Follow my instructions to be safe. Spread this message to as many people as possible.
tl;dr
Tor Browser 8.x and FF 60+ are totally COMPROMISED. Downgrade to Tor Browser 7 and FF ESR 53 as quickly as possible. Tor Project is compromised by CIA and MOSSAD.
/g/ R:108
L:
[D][U][F][S][L][A][C]OpenBSD 6.6 has been released! Now is the time to give it a shot, Nanons!
characterlimitcharacterlimitcharacterlimitcharacterlimitcharacterlimitcharacterlimitcharacterlimitcharacterlimit
characterlimitcharacterlimitcharacterlimitcharacterlimitcharacterlimitcharacterlimitcharacterlimitcharacterlimit
/g/ R:18
L:
[D][U][F][S][L][A][C]From what I have read, one of the biggest problems with Tor is timing and traffic correlation attacks, and that these attacks cannot be easily mitigated because Tor aims to be low-latency. Tor claims that it cannot prevent analysis by a "global" adversary for this reason.
It seems to me that higher degrees of anonymity and security cannot be achieved without introducing more latency, as a sort of necessary cost.
Tor is described as an "overlay" network over the internet, which adds uncertainty about what network paths you take as you connect through the network. Would it be possible to create a secondary overlay network over the Tor network that would introduce additional noise to the timing and pattern of data flows? Possible routed and mixed by a network of onion services.
It seems to me that higher degrees of anonymity and security cannot be achieved without introducing more latency, as a sort of necessary cost.
Tor is described as an "overlay" network over the internet, which adds uncertainty about what network paths you take as you connect through the network. Would it be possible to create a secondary overlay network over the Tor network that would introduce additional noise to the timing and pattern of data flows? Possible routed and mixed by a network of onion services.
/g/ R:73
L:
[D][U][F][S][L][A][C]no Task Manager on linux
>2019
>my stupid normie linux shit still doesn't have graphical Task Manager that I could run by pressing keyboard buttons or start menu entry
>something that Windows 95 or even 3.11 had
but I guess on linux Task Manager would be useless anyway, because on shit linux when one application hangs or you run out of physical ram, entire PC is locked and the only thing you can do is press restart button on your PC
>my stupid normie linux shit still doesn't have graphical Task Manager that I could run by pressing keyboard buttons or start menu entry
>something that Windows 95 or even 3.11 had
but I guess on linux Task Manager would be useless anyway, because on shit linux when one application hangs or you run out of physical ram, entire PC is locked and the only thing you can do is press restart button on your PC
/g/ R:27
L:
[D][U][F][S][L][A][C]Using laptop outside
how and where to use laptop if I am traveling? I am in another city or country, where can I connect to internet? where should I sit and use the laptop? what kind of antennas should I use? how to avoid cameras? where to buy disposable network cards?
how to prevent your encrypted laptop to be taken from you while it's running and has keys in memory? also, is cold boot real? is it necessary to use DDR3 to prevent it?
how about using it in your car that is locked so you have time before someone gets in? what about other places than car?
how to prevent your encrypted laptop to be taken from you while it's running and has keys in memory? also, is cold boot real? is it necessary to use DDR3 to prevent it?
how about using it in your car that is locked so you have time before someone gets in? what about other places than car?
/g/ R:25
L:
[D][U][F][S][L][A][C]I've heard it said that you can avoid ip leaks from javascript by using a VPN at the router level? Is this true and can it be done by using TOR on the router level as well?
/g/ R:17
L:
[D][U][F][S][L][A][C]Assembly
I was randomly watching some of Terry's videos the other day, i think it was a video about TempleOS kernel or compiler, anyway i couldn't understand much cause i don't know assembly :(
I'd like to fix this deficiency of mine, where do i start?
I'd like to fix this deficiency of mine, where do i start?
/g/ R:27
L:
[D][U][F][S][L][A][C]Pseudonymous Software Development
Have there been any successful open source software projects developed by PGP-verified pseudonymous volunteers? Are there any dedicated platforms for pseudonymously hosting open source software projects?
/g/ R:66
L:
[D][S][L][A][C]HTTP cancer
HTTP is a piece of cancer because its structure and design is against anonymity (User-Agent, cookies). Lots of identifiable metadata is transmitted through the headers.
Imageboards should have their own dedicated protocol for data transfer (perhaps a heavily stripped down version of HTTP).
/g/ R:43
L:
[D][U][F][S][L][A][C]nanochan X
Nanochan X is a userscript that i developed in my free time during the last 2 months, with the purpose of making lurking and posting on nanochan more comfy than ever!
As you may have intuited nanochan X was inpired by the like of 4chanX(https://github.com/ccd0/4chan-x) and OneeChan(https://github.com/KevinParnell/OneeChan), although the codebase is completely original and different design choices were often made.
It was made initially for personal use, but with time it became a really big project and some people expressed mild interest, so i decided to share it to get it peer-reviewed and audited.
I've put quite some effort into this, so i hope it's gonna be useful, feedback of any kind is welcome.
Main features
- Transparent data storage; You get direct access to the JSON configurations objects and any saved data, nothing gets stored behind your back.
- Fully configurable; You can enable or disable each feature and customize most of the script behavior at your own will even without touching the code.
- Ricer-friendy; You can customize theme, navbar and other elements and even inject custom CSS and custom JS on top of the script.
- Modest code size; To put in comparison, 4chanX v1.14.14.4 has 27354 lines of code without blank lines(28054 lines of code with blank lines) and weights 1.07 MiB(1128573 bytes), while nanochan X v1.0.0 has 4442 lines of code without blank lines(5160 lines of code with blank lines) and weights 255 KiB(261983 bytes), that is 83.77% less lines of code and 76.79% less size.
- No third party code or dependencies; The script is 99.9% written by me, the other 0.01% was written by Lain when i was asleep with my face on the keyboard.
- Auditable, fully commented and designed to be expanded; The source code has comments everywhere, no seriously i think i've even put too many, i've even divided the script into sections, this should make it really easy to audit it, so please do.
- Designed with security, privacy and user control in mind; NO user data or anything that could deanonimize the user gets saved in any way, nanochan X does not save visit or post history(this is why there are no (You)s) and i'm not interested in adding features in the future that requires user tracking unless for a good reason and disabled by default, also the choice of putting security and privacy over performance was counsciously made in the design of some parts of the script(see for example how the thread watcher fetches each board at the same time instead of particular boards or threads to avoid possible user fingerprinting).
- Easy on the userscript permissions; nanochan X requires only three extra permissions, "GM_getValue" and "GM_setValue" to save and load the configuration objects and "GM_addStyle" to inject the theme, nothing else.
- No cross-origin fuckery going on; The ONLY domain with which the scripts is gonna interact is the nanochan one, also ALL asynchronous HTTP requests are done with the basic javascript version of "XMLHttpRequest" which is bound by nanochan's Content Security Policies(and NOT the userscript version of it "GM_XMLHttpRequest" which bypasses CSP), effectively making it impossible to get or send any data outside of nanochan.
- Made by a bored hikki with too much free time, coded with lot of autism and animu magic!
- Released under public domain, literally do what you want with it!
Actual full list of features
- Theming; There are a total of 6 themes included with the script, and other than the themes themselves there are also lots of other cosmetic improvements.
-- nanochan theme; Has the same colors of the original nanochan theme, made for the ones that don't like the dark theme.
-- nanochan Dark theme; This is mostly based on my previous userstyle project(>>>/meta/3072) which was kind of the spiritual predecessor to this script, it's a dark theme designed with colorcoding in mind, it's moderately high contrast so you may want to edit some of the colors from the configuration if that's not your cup of tea.
-- Futaba theme; My own attempt at recreating the classic Futaba theme.
-- Burichan theme; My own attempt at recreating the classic Burichan theme.
-- Custom theme; An empty white theme, i've added this as a blank slate to design your own theme, although it's also kind of nice in it's own way, it looks like an ink on paper document, some people may appreciate it.
-- Custom theme 2; Also an empty theme, also acts as a blank slate to design your own theme, this time it's white on black, it kind of looks like an high contrast terminal page, maybe somebody it's into that.
-- You can now hide announcements.
-- Extra space at the end of each page; The default is 1/4 of the page height.
-- Customizable post width.
-- Customizable catalog thread width and height.
-- Notifications, navbar and forms customizable opacity.
-- Responsive theme; In particular the navbar and forms are resized properly if you resize your window or if you use small screens or tablets/smartphones.
-- Custom CSS; In case you want to expand the theme, you can do it directly from the configuration without needing a userstyle extension.
- Keyboard navigation; The following can be done directly with keyboard, note also that you can remap each binding as you prefer.
-- Moving to main, log, stats, recent, overboard and board catalog.
-- Opening the configuration and post form.
-- Watching a thread.
-- Navigating between pages in log and recent.
-- Navigating from post to post in recent and threads.
-- Autofilling name and email.
- Regex filters; Using this script you can filter any post or catalog thread using regular expressions, you can also create different lists of filters per-page, when filtering posts the filters are gonna be matched against the board name(only in recent), the thread number(also only in recent), the subject, the name, the email, the post number, the image name(which mean hash and extension, so you can filter out avatarfags like me! yay) and the post comment, while when filtering catalog threads the filters are gonna be matched against the board name(you can filter entire boards from overboard this way), the thread number, the image name, the thread flag(you can filter all autosaged threads for example), the subject and the catalog thread comment, with a basic understanding of regex this can be really powerful.
- Reference tools; All the following also applies to referees.
-- Reference expansion; By hovering the cursor on a reference you can now see it's content in a floating container.
-- Reference inlining; By clicking on a reference you can now inline it(aka add a copy of it) at the end of the post, recursive inlining is also supported.
-- Hashed references; Since clicking on a reference inlines it, an extra "#" reference link is added before the reference so you can still navigate to the referenced post as usual.
-- Referenced post highlighting; When you hover the cursor on a reference, its own referenced post is gonna get highlighted.
-- Opening post reference highlighting; References that links to the original post are gonna get "(OP)" appended to them.
- File tools.
-- Image and video expansion; Similar to reference expansion, by hovering the cursor on a file thumbnail you can see the original file in a floating container, this works with any image and video comprising transparent pngs, animated gifs, webms and mp4s, available both on threads and on catalogs.
-- Image and video inlining; Similar to reference inlining, By clicking on a file thumbnail you can now inline it, or in other words you substitute the thumbnail with the full size file, this also works with any image and video comprising transparent pngs, animated gifs, webms and mp4s, you can also specify if you want inlined videos to preload, have playback controls, autoplay, loop and start muted.
- Relative time; Makes time elements relative, the absolute timstamp is kept in the tooltip.
- Asynchronous captchas; Did it ever happen to you to lose the contents of an entire post just cause the captcha expired? It happens every fucking time to me cause i write posts that are too long. Did it ever happen to you to get a really unlucky unreadable captcha? Well now you can reload captchas in real-time without any need to reload the page.
- Toggleable mod tools; Right now mod links are hidden in catalogs and visible in threads, which i find really unconsistent and ugly, with the script they are now hidden consintently on all pages, or if you are a mod you can get them back everywhere also on catalog.
- Logging; Pretty much everything that the script does, comprising errors and warning, is logged to the console, you can of course decide the verbosity of the logging and you can suppress all errors and all warnings.
- Notifications; I've included notifications(just basic floating box with a message, nothing fancy) to give visual feedback to the user for some actions or errors and warnings, you can of course suppress notifications depending on their type or just plain disable them.
- Navbar; The design of the navbar didn't change that much, i just tried to make it more readable, added new buttons to the right for the new forms and the countdown to the next page update, the real improvement lies in the list of boards which can now be reordered and riced with any HTML element.
-- Page/board/form highlighting in the navbar; Simply the correlated links in the navbar are gonna be highlighted(with an underline) depending on the current page or board and the current opened forms.
- Interactive forms; All newly added forms can be opened and closed without polluting the url, they can also be hidden so that only the header is visible, multiple forms can stay open at the same time and they can all be set to remember their previous state.
- Configuration form; Although you can modify the configuration directly in your userscript extension's dashboard, i thought that having a way to do it inside the page was comfier, so i made this simple form that let's you edit, save, load and reset the various configurations.
- Post form; This is a part of the script that i'm particularly proud of, i've redesigned the post form from zero and added lot of extra features to it, if you don't like this you can still use the old one ofc.
--Board name and thread number fields; This may seem like two completely new fields, but if you look in the nanochan source they're always been there, they were just hidden, i made them visible so that now you can do stuff like posting from the recent page or making a new thread from anywhere(write 0 for a new thread) and more.
-- Formatting legend; I've added as a placeholder of the post comment textareaa a full formatting legend, manily cause sometime i forgot stuff.
-- File reset button; It is possible now to clear the selected file.
-- File info and preview; When a file is selected, the name, size and type of the file is gonna be displayed, also a file preview of the file is gonna be shown, the file preview works with any image and video comprising transparent pngs, animated gifs, webms and mp4s and audio files, although videos and audio files previews don't work in the main page, overboard, board catalogs and threads cause of different CSPs than the "/Nano" pages where preview works fine with all files.
-- Asynchronous posting; An alternative way of submitting posts that has several advantages compared to the usual synchronous way, such as less interruptions and wasted time caused by the redirection and better error handling, whenever there is a connection error or a server error or you get the captcha wrong instead of being redirected to the error page(possibly losing your post in the process) a notification with the relevant error message will be shown and the captcha will be automatically reloaded, also you can keep reading the thread while post is getting uploaded and you can abort the posting request at any time, finally on successful posting the thread is gonna be updated with your new post added at the end.
-- Post form reset; You can reset the whole post form with a button and also automatically on successful posting...or also not, if you want to repeat same post multiple times(pls don't spam kids).
- Thread watcher; As the name implies, it is a full fledged thread watcher that includes buttons to watch and unwatch a thread(also with keyboard shortcut), mark as read a watched thread and change the order of the watched threads.
- Opening post and reply posts customizable indentation and spacing.
- Automatic focus jumping to first or last post.
- Automatic quote insertion; Really requested feature, it simply adds the quote number in the post comment field at the current cursor position, also if the post form it's close or hidden it will be opened and made fully visible.
- Recent page; I've redesigned it to resemble a normal thread, i also made all references local to also browse it like a normal thread.
- Update; It is possible to update the following parts of the page manually or automatically on a certain interval.
-- Update time; It simply updates the relative times so that they stays relative to now.
-- Update thread; If there are new posts in a thread, they will be added them in real time.
-- Update thread watcher; Exactly as it sounds this keeps updated the thread watcher, also note that this is the only non-manual way for the thread watcher to fetch a watched thread info, like total replies, description, etc.
-- Custom javascript; Let's you add whatever extra javascript code you want, you should use this only for quick hacks though, the "eval" function has lot of performance problems and the "function" constructor can't access any of the variables and functions of nanochan X, so you may as well make your own separate script at this point(or instead submit code to add to nanochan X in this thread *wink* *wink*).
Useless features that i wasted time developing for no reason
- Customizable page titles and board titles and subtitles; Not sure what i was thinking when i was coding this, it's pretty useless, but maybe someone creative can find a use to it.
- Link to the "/audit.log" file in the log page; I made this for you asuka-chan <3 maybe it will save you some time, or maybe you have your own ways of autodownloading that file, anyway that link is there.
- Multipage switcher; Navigating between pages in recent and log it's a pain in the ass, so i added page links to navigate back and fourth between pages inside the page switchers, it's pretty useless as now, but maybe if index view gets implemented it's gonna become useful.
- Visible emails; It makes the email visible by appending it after name, like this for example Nanonymous(sage).
- Opening post highligthing; Opening posts will be highlighted by appending a "(OP)" after the post number, i've added this to make OPs more recognizable in recent.
- Extra view and download file links in catalog threads; Cause why not.
- Faggotry; If you're into that...
-- Default name; Aka namefagging, can be filled manually via keyboard shortcut or autofilled, disabled by default ofc.
-- Default email; Aka sagefagging, can be filled manually via keyboard shortcut or autofilled, disabled by default ofc.
There is probably more stuff that i forgot and minor improvements, read the comments and the code in source file i guess.
Known limitations
- If you disable the theme, notifications and forms are gonna get stuck at the bottom of the page.
- At the moment you can't used any combinations of keys or modifiers to map keyboard shortcuts.
- Keyboard navigation doesn't work inside inlined posts.
- The "highlight_post" function does not work with inlined posts.
- The file preview in the post form doesn't work outside of the "/Nano" pages, cause of CSP.
- Thread watcher's performances and memory usage sucks.
Known bugs
- The "get_configuration" function with the "nested" parameter set to true does not work with arrays. Although this is probably a bug in the "flatten_object" and "unflatten_object" utilities.
- Keyboard navigation will still navigate to filtered posts.
- Reference inlining will break if you inline the same post over different depth and the try to de-inline it and other weirds stuff when recursive inlining.
- The log page breaks if you resize the window(this is more like a nanochan bug though).
Note that i tested the script only on Tor Browser.
Roadmap
- Mascottes(like on OneeChan), accepting suggestions on what waifus should i include.
- Unique post and catalog thread ids(to avoid duplicate ids on recent, bugs with inlined posts and as a base for other future stuff that i have in mind).
- Catalog thread keyboard navigation.
- Different filters lists for each board.
- Recent page update(this depends if admin makes it cached).
- Catalog update.
Anything other that you wish to add, i accept suggestions...
F.F.A.Q
Future frequently asked questions
Or in other words, questions that i know people will ask cause of past experiences, so i may as well preemtively anwer.
>Do i need to unblock javascript to use this script?
Short answer is no, you can still block javascript globally and at the same time run userscripts without any problem.
Long answer is that it depends on how you block javascript and what userscript extension you use, if you block scripts with "about:config -> javascript.enabled = true" or the "NoScript" extension then Tampermonkey will stop working, but Violentmonkey will still work fine, instead if you block scripts using uMatrix both Tampermonkey and Violentmonkey will still work, so just choose the right extension based on your preferred method of script blocking.
>Wait a second, isn't javascript cancer?
If you mean javascript as in the programming language, yes it is cancer and i dislike it, there is no other way of doing something like this in a browser without using it though, so it's a necessary evil to achieve superior comfiness.
If you mean javascript as in a certain stack of technologies that can be used by websites to track and spy users, then this is not the case, userscripts gives lot of control to the user over what is executed on their machine and are subject to many limitations, this script in particular is still bound by nanochan content security policies which means that the script cannot send any information outside of nanochan and since there is also no "auto update" feature included and no code gets downloaded or executed from a server, there is no way to do anything malicious with it.
I'm not trying to say that userscripts are the perfect and that this is the best way of doing things, what i'm saying is that using javascript inside a userscript is a whole different context than just blindly downloading scripts that could be malicious every time you visit a website.
>Are you advocating to add javascript to nanochan?
No, i'm not, i'm fine with nanochan remaining as it is, and if you think about it now that this script exists there is no reason to add javascript in the first place, people that want extra features can use this script instead.
>I think this is bloat, why would i want to use it?
You tell me xD i'm not trying to convince anybody here, nor i gain anything by getting people to use my script, as i see it this script is aimed at a certain kind of people that like me desire to have some extra features on top of the elegant HTML/CSS only base of nanochan, but also care about being in control on the code executed on the machines.
If you're not interested in the features listed above, then just don't use the script, if you are interested just in one feature or some of the features, then just disable the rest of them through the configuration, or fork it and write your own light version of it, choice is yours.
>How did you make this script?
Very simple.
- A simple text editor.
- Tor browser dev tools.
- Animu magic.
That's about it.
>This thread belongs on /meta/ right?(mods pls read)
I know there is a userscript thread on /meta/, but there are specific reasons i made it on /g/, one of my reasons to publish this was to have it and peer-reviewed and audited by fellow nanons, another one is that this is still in active developement and maybe some /g/ autists can help, /meta/ is basically a containment board for drama at this point and i want this thread to be about software development and not drama or meta-talk, so i think i fits better on /g/.
PGP public key
This is the PGP key that i am gonna use from now on to sign the releases and other important posts.
REMEMBER TO ALWAYS VERIFY THE SIGNATURE BEFORE EXECUTING THE SCRIPT FOR THE FIRST TIME OR AFTER AN UPDATE, SINCE IT COULD BE POSTED BY SOMEONE ELSE IMPERSONATING ME AND DISTRIBUTING MALWARE.
-----BEGIN PGP PUBLIC KEY BLOCK-----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=MjfZ
-----END PGP PUBLIC KEY BLOCK-----
Fingerprint: 055119A6E40424E4AA2E474D348C23335D4F9829
Install instructions
During this instructions i'm gonna assume that you are retarded, don't take it personally, i'm also gonna assume that you are using Tor Browser on a UNIX operating system, but you should be able to get it working easily also on other browsers and operating systems.
What you need:
- A text editor; Preferably with javascript syntax highlighting.
- A userscript extension; I officially support two extensions, choose the one you like the most:
-- Tampermonkey(https://www.tampermonkey.net); Proprietary freeware, but with lot of features, surprisingly configurable and with better script injection, not compatible with some kinds of script blocking.
-- Violentmonkey(https://violentmonkey.github.io); Free and open source, minimalistic, not configurable enough imo, compatible with most kinds of script blocking.
- gpg(https://www.gnupg.org).
How to install:
0. Make a directory to hold all the files, from now on this is gonna be called the "working directory", then open a terminal and change directory to the working directory.
1. Import my PGP public key in your gpg keyring; Copy the public key from above, then save in a file named "Nanonimousu.key", then run the following command "gpg --import Nanonimousu.key".
2. Locate the latest nanochan X release post; It should be near the end of this thread.
3. Download the text file included in the release post to your working directory; Name it "nanochanX.asc".
4. Verify the signature of "nanochanX.asc"; Run the following command "gpg -o nanochanX.js --decrypt nanochanX.asc", then check if the firgerprint matches, congratulations you have a legit version of the script.
5. Now that you have a verified version of the script it's a good time to check if the source doesn't contain anything malicious(sometime i don't even trust myself, so you should neither); Open "nanochanX.js" with your preferred text exitor, optionally sintax highlight for javascript, then start start by reviewing the userscript header(also called the metadata block), this is the most important part cause this is where the script can ask for permissions and whitelist third party domains, this is some documentation regarding it: https://sourceforge.net/p/greasemonkey/wiki/Metadata_Block/ https://wiki.greasespot.net/Metadata_Block https://www.tampermonkey.net/documentation.php https://violentmonkey.github.io/api/metadata-block/ now continue with the rest of the script, when you are satisfied proceed onto next step.
6.a. Go to the Tampermonkey dashboard then click on the "+" button, a new tab will open with a blank script, now go back to "nanochanX.js" in your text editor, copy everything and paste it in the new Tampermonkey tab, then press "CTRL+S".
6.b. Go to the Violentmonkey dashboard then click on the "+" button and select "New", the page will switch to a blank script, now go back to "nanochanX.js" in your text editor, copy everything and paste it in the new Violentmonkey page, then press "CTRL+S".
7. Now go back to the newly created userscript, then switch to the "Settings" tab and uncheck the checkbox near "Check for updates" or "Allow updates", even though no auto-update link is included in the userscript header in the first place, this way you can be sure it's not gonna auto-update, this is also the place where you can add your user excludes, for example if by any chance you are a mod, you might want to add "https://nanochanqwrwtmamtnhkfwbbcducc4i62ciss4byo6f3an5qdkhjngid.onion/Nano/mod*" to your user excludes.
Ok, that should do it, have fun.
As you may have intuited nanochan X was inpired by the like of 4chanX(https://github.com/ccd0/4chan-x) and OneeChan(https://github.com/KevinParnell/OneeChan), although the codebase is completely original and different design choices were often made.
It was made initially for personal use, but with time it became a really big project and some people expressed mild interest, so i decided to share it to get it peer-reviewed and audited.
I've put quite some effort into this, so i hope it's gonna be useful, feedback of any kind is welcome.
Main features
- Transparent data storage; You get direct access to the JSON configurations objects and any saved data, nothing gets stored behind your back.
- Fully configurable; You can enable or disable each feature and customize most of the script behavior at your own will even without touching the code.
- Ricer-friendy; You can customize theme, navbar and other elements and even inject custom CSS and custom JS on top of the script.
- Modest code size; To put in comparison, 4chanX v1.14.14.4 has 27354 lines of code without blank lines(28054 lines of code with blank lines) and weights 1.07 MiB(1128573 bytes), while nanochan X v1.0.0 has 4442 lines of code without blank lines(5160 lines of code with blank lines) and weights 255 KiB(261983 bytes), that is 83.77% less lines of code and 76.79% less size.
- No third party code or dependencies; The script is 99.9% written by me, the other 0.01% was written by Lain when i was asleep with my face on the keyboard.
- Auditable, fully commented and designed to be expanded; The source code has comments everywhere, no seriously i think i've even put too many, i've even divided the script into sections, this should make it really easy to audit it, so please do.
- Designed with security, privacy and user control in mind; NO user data or anything that could deanonimize the user gets saved in any way, nanochan X does not save visit or post history(this is why there are no (You)s) and i'm not interested in adding features in the future that requires user tracking unless for a good reason and disabled by default, also the choice of putting security and privacy over performance was counsciously made in the design of some parts of the script(see for example how the thread watcher fetches each board at the same time instead of particular boards or threads to avoid possible user fingerprinting).
- Easy on the userscript permissions; nanochan X requires only three extra permissions, "GM_getValue" and "GM_setValue" to save and load the configuration objects and "GM_addStyle" to inject the theme, nothing else.
- No cross-origin fuckery going on; The ONLY domain with which the scripts is gonna interact is the nanochan one, also ALL asynchronous HTTP requests are done with the basic javascript version of "XMLHttpRequest" which is bound by nanochan's Content Security Policies(and NOT the userscript version of it "GM_XMLHttpRequest" which bypasses CSP), effectively making it impossible to get or send any data outside of nanochan.
- Made by a bored hikki with too much free time, coded with lot of autism and animu magic!
- Released under public domain, literally do what you want with it!
Actual full list of features
- Theming; There are a total of 6 themes included with the script, and other than the themes themselves there are also lots of other cosmetic improvements.
-- nanochan theme; Has the same colors of the original nanochan theme, made for the ones that don't like the dark theme.
-- nanochan Dark theme; This is mostly based on my previous userstyle project(>>>/meta/3072) which was kind of the spiritual predecessor to this script, it's a dark theme designed with colorcoding in mind, it's moderately high contrast so you may want to edit some of the colors from the configuration if that's not your cup of tea.
-- Futaba theme; My own attempt at recreating the classic Futaba theme.
-- Burichan theme; My own attempt at recreating the classic Burichan theme.
-- Custom theme; An empty white theme, i've added this as a blank slate to design your own theme, although it's also kind of nice in it's own way, it looks like an ink on paper document, some people may appreciate it.
-- Custom theme 2; Also an empty theme, also acts as a blank slate to design your own theme, this time it's white on black, it kind of looks like an high contrast terminal page, maybe somebody it's into that.
-- You can now hide announcements.
-- Extra space at the end of each page; The default is 1/4 of the page height.
-- Customizable post width.
-- Customizable catalog thread width and height.
-- Notifications, navbar and forms customizable opacity.
-- Responsive theme; In particular the navbar and forms are resized properly if you resize your window or if you use small screens or tablets/smartphones.
-- Custom CSS; In case you want to expand the theme, you can do it directly from the configuration without needing a userstyle extension.
- Keyboard navigation; The following can be done directly with keyboard, note also that you can remap each binding as you prefer.
-- Moving to main, log, stats, recent, overboard and board catalog.
-- Opening the configuration and post form.
-- Watching a thread.
-- Navigating between pages in log and recent.
-- Navigating from post to post in recent and threads.
-- Autofilling name and email.
- Regex filters; Using this script you can filter any post or catalog thread using regular expressions, you can also create different lists of filters per-page, when filtering posts the filters are gonna be matched against the board name(only in recent), the thread number(also only in recent), the subject, the name, the email, the post number, the image name(which mean hash and extension, so you can filter out avatarfags like me! yay) and the post comment, while when filtering catalog threads the filters are gonna be matched against the board name(you can filter entire boards from overboard this way), the thread number, the image name, the thread flag(you can filter all autosaged threads for example), the subject and the catalog thread comment, with a basic understanding of regex this can be really powerful.
- Reference tools; All the following also applies to referees.
-- Reference expansion; By hovering the cursor on a reference you can now see it's content in a floating container.
-- Reference inlining; By clicking on a reference you can now inline it(aka add a copy of it) at the end of the post, recursive inlining is also supported.
-- Hashed references; Since clicking on a reference inlines it, an extra "#" reference link is added before the reference so you can still navigate to the referenced post as usual.
-- Referenced post highlighting; When you hover the cursor on a reference, its own referenced post is gonna get highlighted.
-- Opening post reference highlighting; References that links to the original post are gonna get "(OP)" appended to them.
- File tools.
-- Image and video expansion; Similar to reference expansion, by hovering the cursor on a file thumbnail you can see the original file in a floating container, this works with any image and video comprising transparent pngs, animated gifs, webms and mp4s, available both on threads and on catalogs.
-- Image and video inlining; Similar to reference inlining, By clicking on a file thumbnail you can now inline it, or in other words you substitute the thumbnail with the full size file, this also works with any image and video comprising transparent pngs, animated gifs, webms and mp4s, you can also specify if you want inlined videos to preload, have playback controls, autoplay, loop and start muted.
- Relative time; Makes time elements relative, the absolute timstamp is kept in the tooltip.
- Asynchronous captchas; Did it ever happen to you to lose the contents of an entire post just cause the captcha expired? It happens every fucking time to me cause i write posts that are too long. Did it ever happen to you to get a really unlucky unreadable captcha? Well now you can reload captchas in real-time without any need to reload the page.
- Toggleable mod tools; Right now mod links are hidden in catalogs and visible in threads, which i find really unconsistent and ugly, with the script they are now hidden consintently on all pages, or if you are a mod you can get them back everywhere also on catalog.
- Logging; Pretty much everything that the script does, comprising errors and warning, is logged to the console, you can of course decide the verbosity of the logging and you can suppress all errors and all warnings.
- Notifications; I've included notifications(just basic floating box with a message, nothing fancy) to give visual feedback to the user for some actions or errors and warnings, you can of course suppress notifications depending on their type or just plain disable them.
- Navbar; The design of the navbar didn't change that much, i just tried to make it more readable, added new buttons to the right for the new forms and the countdown to the next page update, the real improvement lies in the list of boards which can now be reordered and riced with any HTML element.
-- Page/board/form highlighting in the navbar; Simply the correlated links in the navbar are gonna be highlighted(with an underline) depending on the current page or board and the current opened forms.
- Interactive forms; All newly added forms can be opened and closed without polluting the url, they can also be hidden so that only the header is visible, multiple forms can stay open at the same time and they can all be set to remember their previous state.
- Configuration form; Although you can modify the configuration directly in your userscript extension's dashboard, i thought that having a way to do it inside the page was comfier, so i made this simple form that let's you edit, save, load and reset the various configurations.
- Post form; This is a part of the script that i'm particularly proud of, i've redesigned the post form from zero and added lot of extra features to it, if you don't like this you can still use the old one ofc.
--Board name and thread number fields; This may seem like two completely new fields, but if you look in the nanochan source they're always been there, they were just hidden, i made them visible so that now you can do stuff like posting from the recent page or making a new thread from anywhere(write 0 for a new thread) and more.
-- Formatting legend; I've added as a placeholder of the post comment textareaa a full formatting legend, manily cause sometime i forgot stuff.
-- File reset button; It is possible now to clear the selected file.
-- File info and preview; When a file is selected, the name, size and type of the file is gonna be displayed, also a file preview of the file is gonna be shown, the file preview works with any image and video comprising transparent pngs, animated gifs, webms and mp4s and audio files, although videos and audio files previews don't work in the main page, overboard, board catalogs and threads cause of different CSPs than the "/Nano" pages where preview works fine with all files.
-- Asynchronous posting; An alternative way of submitting posts that has several advantages compared to the usual synchronous way, such as less interruptions and wasted time caused by the redirection and better error handling, whenever there is a connection error or a server error or you get the captcha wrong instead of being redirected to the error page(possibly losing your post in the process) a notification with the relevant error message will be shown and the captcha will be automatically reloaded, also you can keep reading the thread while post is getting uploaded and you can abort the posting request at any time, finally on successful posting the thread is gonna be updated with your new post added at the end.
-- Post form reset; You can reset the whole post form with a button and also automatically on successful posting...or also not, if you want to repeat same post multiple times(pls don't spam kids).
- Thread watcher; As the name implies, it is a full fledged thread watcher that includes buttons to watch and unwatch a thread(also with keyboard shortcut), mark as read a watched thread and change the order of the watched threads.
- Opening post and reply posts customizable indentation and spacing.
- Automatic focus jumping to first or last post.
- Automatic quote insertion; Really requested feature, it simply adds the quote number in the post comment field at the current cursor position, also if the post form it's close or hidden it will be opened and made fully visible.
- Recent page; I've redesigned it to resemble a normal thread, i also made all references local to also browse it like a normal thread.
- Update; It is possible to update the following parts of the page manually or automatically on a certain interval.
-- Update time; It simply updates the relative times so that they stays relative to now.
-- Update thread; If there are new posts in a thread, they will be added them in real time.
-- Update thread watcher; Exactly as it sounds this keeps updated the thread watcher, also note that this is the only non-manual way for the thread watcher to fetch a watched thread info, like total replies, description, etc.
-- Custom javascript; Let's you add whatever extra javascript code you want, you should use this only for quick hacks though, the "eval" function has lot of performance problems and the "function" constructor can't access any of the variables and functions of nanochan X, so you may as well make your own separate script at this point(or instead submit code to add to nanochan X in this thread *wink* *wink*).
Useless features that i wasted time developing for no reason
- Customizable page titles and board titles and subtitles; Not sure what i was thinking when i was coding this, it's pretty useless, but maybe someone creative can find a use to it.
- Link to the "/audit.log" file in the log page; I made this for you asuka-chan <3 maybe it will save you some time, or maybe you have your own ways of autodownloading that file, anyway that link is there.
- Multipage switcher; Navigating between pages in recent and log it's a pain in the ass, so i added page links to navigate back and fourth between pages inside the page switchers, it's pretty useless as now, but maybe if index view gets implemented it's gonna become useful.
- Visible emails; It makes the email visible by appending it after name, like this for example Nanonymous(sage).
- Opening post highligthing; Opening posts will be highlighted by appending a "(OP)" after the post number, i've added this to make OPs more recognizable in recent.
- Extra view and download file links in catalog threads; Cause why not.
- Faggotry; If you're into that...
-- Default name; Aka namefagging, can be filled manually via keyboard shortcut or autofilled, disabled by default ofc.
-- Default email; Aka sagefagging, can be filled manually via keyboard shortcut or autofilled, disabled by default ofc.
There is probably more stuff that i forgot and minor improvements, read the comments and the code in source file i guess.
Known limitations
- If you disable the theme, notifications and forms are gonna get stuck at the bottom of the page.
- At the moment you can't used any combinations of keys or modifiers to map keyboard shortcuts.
- Keyboard navigation doesn't work inside inlined posts.
- The "highlight_post" function does not work with inlined posts.
- The file preview in the post form doesn't work outside of the "/Nano" pages, cause of CSP.
- Thread watcher's performances and memory usage sucks.
Known bugs
- The "get_configuration" function with the "nested" parameter set to true does not work with arrays. Although this is probably a bug in the "flatten_object" and "unflatten_object" utilities.
- Keyboard navigation will still navigate to filtered posts.
- Reference inlining will break if you inline the same post over different depth and the try to de-inline it and other weirds stuff when recursive inlining.
- The log page breaks if you resize the window(this is more like a nanochan bug though).
Note that i tested the script only on Tor Browser.
Roadmap
- Mascottes(like on OneeChan), accepting suggestions on what waifus should i include.
- Unique post and catalog thread ids(to avoid duplicate ids on recent, bugs with inlined posts and as a base for other future stuff that i have in mind).
- Catalog thread keyboard navigation.
- Different filters lists for each board.
- Recent page update(this depends if admin makes it cached).
- Catalog update.
Anything other that you wish to add, i accept suggestions...
F.F.A.Q
Future frequently asked questions
Or in other words, questions that i know people will ask cause of past experiences, so i may as well preemtively anwer.
>Do i need to unblock javascript to use this script?
Short answer is no, you can still block javascript globally and at the same time run userscripts without any problem.
Long answer is that it depends on how you block javascript and what userscript extension you use, if you block scripts with "about:config -> javascript.enabled = true" or the "NoScript" extension then Tampermonkey will stop working, but Violentmonkey will still work fine, instead if you block scripts using uMatrix both Tampermonkey and Violentmonkey will still work, so just choose the right extension based on your preferred method of script blocking.
>Wait a second, isn't javascript cancer?
If you mean javascript as in the programming language, yes it is cancer and i dislike it, there is no other way of doing something like this in a browser without using it though, so it's a necessary evil to achieve superior comfiness.
If you mean javascript as in a certain stack of technologies that can be used by websites to track and spy users, then this is not the case, userscripts gives lot of control to the user over what is executed on their machine and are subject to many limitations, this script in particular is still bound by nanochan content security policies which means that the script cannot send any information outside of nanochan and since there is also no "auto update" feature included and no code gets downloaded or executed from a server, there is no way to do anything malicious with it.
I'm not trying to say that userscripts are the perfect and that this is the best way of doing things, what i'm saying is that using javascript inside a userscript is a whole different context than just blindly downloading scripts that could be malicious every time you visit a website.
>Are you advocating to add javascript to nanochan?
No, i'm not, i'm fine with nanochan remaining as it is, and if you think about it now that this script exists there is no reason to add javascript in the first place, people that want extra features can use this script instead.
>I think this is bloat, why would i want to use it?
You tell me xD i'm not trying to convince anybody here, nor i gain anything by getting people to use my script, as i see it this script is aimed at a certain kind of people that like me desire to have some extra features on top of the elegant HTML/CSS only base of nanochan, but also care about being in control on the code executed on the machines.
If you're not interested in the features listed above, then just don't use the script, if you are interested just in one feature or some of the features, then just disable the rest of them through the configuration, or fork it and write your own light version of it, choice is yours.
>How did you make this script?
Very simple.
- A simple text editor.
- Tor browser dev tools.
- Animu magic.
That's about it.
>This thread belongs on /meta/ right?(mods pls read)
I know there is a userscript thread on /meta/, but there are specific reasons i made it on /g/, one of my reasons to publish this was to have it and peer-reviewed and audited by fellow nanons, another one is that this is still in active developement and maybe some /g/ autists can help, /meta/ is basically a containment board for drama at this point and i want this thread to be about software development and not drama or meta-talk, so i think i fits better on /g/.
PGP public key
This is the PGP key that i am gonna use from now on to sign the releases and other important posts.
REMEMBER TO ALWAYS VERIFY THE SIGNATURE BEFORE EXECUTING THE SCRIPT FOR THE FIRST TIME OR AFTER AN UPDATE, SINCE IT COULD BE POSTED BY SOMEONE ELSE IMPERSONATING ME AND DISTRIBUTING MALWARE.
-----BEGIN PGP PUBLIC KEY BLOCK-----
mQINBF2n+NsBEACo5hYywF5B3D0ZPzbtBw5q5tu3Wt6daIQh1nUx+wL48LpwVHDP
yfIEwd2SA9J1HLt0XSYoAzYrd9ij8MGXdDEz45lLgQ1XbrdOKyZjaoBHV1pY32dw
WVXJzjilmTQdRiBS8xB0Ndkr1+BiNKjs3lAR2DEJ9tGveqo5/mRV16VBSyg665z+
jJO6mC5Ggoa6TMPblzJsxjNBdrNWuYeZfqWHbx7N/xrOZAR703/7h39UlkZskrTt
GLb+mz9tqTUqMIPZfUkwl3KA5MDKEEAkEFJHEJSXISWlIzRjgXJ9h9q4d0dvVsi0
go8kxu/Xcq82CafPR5yqh5eIdQES8zR46US3S+0gcwdMGu7k1oCNgEhO3V9utD3K
e2t9fE6HqnAynFc4bCWTcu8q7gGRru4FYZNTPSyJx48dlGWujVP2y0RRqlF6RXMj
im89aZnuQ0JaCWXrqXy8l2T0Il3fJ2IspI9wrZCc2DmpWt0UAt3IR/A+iXsDe9Rk
2UQLqPoBey7XrBo8OlyMupohCWljBBfkbH3AJsWJ8u34fGatSOZu9vEu7OmSO7F1
KJ8YrqnuGkt55WPWvkNFReS+hM1etTgE93j+/PiIHfECY+nx3k4uxm7QZwxVTW3B
wujn9ha6Am6rWz4D02R+waBkj9YdYzbsQdz+z1Mfp8wPprr8UgnCKARtTwARAQAB
tCdOYW5vbmltb3VzdSAodXd1KSA8TmFub25pbW91c3VAY29jay5saT6JAk4EEwEI
ADgWIQQFURmm5AQk5KouR000jCMzXU+YKQUCXaf42wIbAwULCQgHAgYVCgkICwIE
FgIDAQIeAQIXgAAKCRA0jCMzXU+YKdz+EACoeegkKhf6j6GwzxW5oYgetQALGKDo
igEArP2V9ULoa+trzAVO9jHlLNtE1t2o2aIan68VyKq/R1zf1yWZ3fOvHS8Xr6vo
JLzHC3WdDRtCpYwKu6/m60hWasuxnJrpYjwgBqxfcLhvcIUsRiR0KYUOEbngPI6Z
B948HDNH3gxa82DYQHakDOrCsUct1lpjeNqDJ9fmZu8yjdBlEGoSTNdDQ3IdTClW
3qMXasLufQGDVXwWYgWS/CbsknmEuVauUcmuwWlimmOb8NxeS5EUv/hG57b3LxlB
orgtazsFh7X2V98Rhg8R2r7DcnNKEPA7U3dEG86HSdERbf5o6hSBuwXiIl3rXeqq
KsUZBSnSTudbgnyNpPzNWZR/miWe77tZxjlMOEtFV20WkhEvZOllvmxp1VnxNR06
5GCdgmBuIQHOU3Tffqo7Xuh9aG+ttLTAbFvcDWKK9p4EypJsJfmfw5xdX6vRcBd3
nEdttrrPlkIpkVH7RfRIE8ckQ9m6OUb08i7WMLThq+ym1RrlxX59NPowJ5iY5sNV
6DbRxo+m/jNlcUygDHbEJrwudRYB8b68sci8wrFrfdEIhSNjmXplTePOhepIdmyt
oeU8IhYBrPJVEpdVCLy9rN0h7nspBPEQFcv4enyxIWH5npOjk4pshoEPx9Op/O/y
tuGDEChANCtxbrkCDQRdp/jbARAA4NdyzQQWc7SJoxfb/8IG//RzqJljrWMXaDe0
e60mvHYnDG4TPX2/OhGNHI1ucbojdE5hbECwxjLAS0oEgTH/XcoCDJAw2l41oTnr
TvcBkE7xjC/kdN3IrCI47MXkJX/ik3pO78st6bOEnicOlELQzUMH7urkrPt5Rl6c
tBlcVlFHxkl5PJWV+pi/j0JacY1For4v6yGICrDQpm3IkVrDnOodKNM6Mr33xMvv
0hldGSEWXp+7AqSphudyGE8dRx3xQuRyWzAz1CaE0R0gH4Ow49EcVH0dIKKqVcxN
BjANu55X5CbCYne+uRZZyS/OH/feMdQKNm4RuefVeRGZ3fXOIYTOC9MEd5CvuaXd
OjZIGWlYw9JKY83DkMdKrcmmG8/un4xUSYQxV+JqWGK2IoQh+wst9CLqqu+BtI02
mfArRSl/MHZ6c9OC6UVq7fFQVvnCDcRTScRlWaOXLtCou9j4jDBXiSQEnqWFv67Q
irtp0zL/kMxx2gNmGyQt+kObNT7BUsv9PiOic0wX3tRasvt5q9jSc2iPK2ck7sbO
hqNZX8txGMUbvOsTGkuICU7PUkmR4OYFP4cU41dBXbfRm/S3oqxfg3ndfkiIHeRw
Lwhez9jzPBQ9TfhVg/SV9dVnH2stHb2iNxcgcXP2BmgKmk0ULQ8/GKSBAZlo7sHj
BxAjgiMAEQEAAYkCNgQYAQgAIBYhBAVRGabkBCTkqi5HTTSMIzNdT5gpBQJdp/jb
AhsMAAoJEDSMIzNdT5gpNwsP/01sv9NMoO4wozy7boP5GfXCKNmUkadwqbU1pXgN
ckkGpFpw+rOxQSnxpkRVitv+Da2dB/rxnQwPmBguGoU4e35s7f3wFQGB4WonJWAO
POwDVS+rNPL2WSHMbfMa23UBIKwzo6msvCMx9KCGFUl0qELbvGLUhKmQREXBeHTA
bKuxY6Hfhnb2MiWJEdoK9Xz4Zdf8dP7oS0srz+rr/i8Dva+22TKA2mW64RkYz7jq
FlDScCnGwHnHdo5J8R4PJ9szdMnBh0rXoCnnzqyo/BJiPqQH95QEta2iAeCmbhjB
BsUSHRu0EjQkePfrTZ8GtSSfLUIGRoI7+/qBPqNUn0QqjtDnV8UqpL4EqPizGHPE
qNP8dnnmtR6vHAb6Pp5+g6ToyvG9fO21NF4oNl4B7h8Rteol+FJvWnxSBdM/aQoa
DGniqVtYPuyZgJ9HTOcKnNky+qvptKCWQAu1v1cE41zupjVMjA0yndd836MbvMwS
ppq/zpIGUQNy/oq1w9S1zPs7DF58jqYHJ+rrQ/qPmFMi41DMjLImP3YEWjN1Grwx
VidOqEYNIhY9fC4Zqdgko2h3FsNGHr/UTAYkGPk/RKllb+p1p4IRx4cwE5ASd2Ku
Cfax4CcqbA5tYToHMNaUUO/rMJ5Gku15huKoITOVZSg+ZWKdWKtOR/fsg2pF8fxw
RTGc
=MjfZ
-----END PGP PUBLIC KEY BLOCK-----
Fingerprint: 055119A6E40424E4AA2E474D348C23335D4F9829
Install instructions
During this instructions i'm gonna assume that you are retarded, don't take it personally, i'm also gonna assume that you are using Tor Browser on a UNIX operating system, but you should be able to get it working easily also on other browsers and operating systems.
What you need:
- A text editor; Preferably with javascript syntax highlighting.
- A userscript extension; I officially support two extensions, choose the one you like the most:
-- Tampermonkey(https://www.tampermonkey.net); Proprietary freeware, but with lot of features, surprisingly configurable and with better script injection, not compatible with some kinds of script blocking.
-- Violentmonkey(https://violentmonkey.github.io); Free and open source, minimalistic, not configurable enough imo, compatible with most kinds of script blocking.
- gpg(https://www.gnupg.org).
How to install:
0. Make a directory to hold all the files, from now on this is gonna be called the "working directory", then open a terminal and change directory to the working directory.
1. Import my PGP public key in your gpg keyring; Copy the public key from above, then save in a file named "Nanonimousu.key", then run the following command "gpg --import Nanonimousu.key".
2. Locate the latest nanochan X release post; It should be near the end of this thread.
3. Download the text file included in the release post to your working directory; Name it "nanochanX.asc".
4. Verify the signature of "nanochanX.asc"; Run the following command "gpg -o nanochanX.js --decrypt nanochanX.asc", then check if the firgerprint matches, congratulations you have a legit version of the script.
5. Now that you have a verified version of the script it's a good time to check if the source doesn't contain anything malicious(sometime i don't even trust myself, so you should neither); Open "nanochanX.js" with your preferred text exitor, optionally sintax highlight for javascript, then start start by reviewing the userscript header(also called the metadata block), this is the most important part cause this is where the script can ask for permissions and whitelist third party domains, this is some documentation regarding it: https://sourceforge.net/p/greasemonkey/wiki/Metadata_Block/ https://wiki.greasespot.net/Metadata_Block https://www.tampermonkey.net/documentation.php https://violentmonkey.github.io/api/metadata-block/ now continue with the rest of the script, when you are satisfied proceed onto next step.
6.a. Go to the Tampermonkey dashboard then click on the "+" button, a new tab will open with a blank script, now go back to "nanochanX.js" in your text editor, copy everything and paste it in the new Tampermonkey tab, then press "CTRL+S".
6.b. Go to the Violentmonkey dashboard then click on the "+" button and select "New", the page will switch to a blank script, now go back to "nanochanX.js" in your text editor, copy everything and paste it in the new Violentmonkey page, then press "CTRL+S".
7. Now go back to the newly created userscript, then switch to the "Settings" tab and uncheck the checkbox near "Check for updates" or "Allow updates", even though no auto-update link is included in the userscript header in the first place, this way you can be sure it's not gonna auto-update, this is also the place where you can add your user excludes, for example if by any chance you are a mod, you might want to add "https://nanochanqwrwtmamtnhkfwbbcducc4i62ciss4byo6f3an5qdkhjngid.onion/Nano/mod*" to your user excludes.
Ok, that should do it, have fun.
/g/ R:15
L:
[D][U][F][S][L][A][C]Android Waifus are Technology
/g/ help me build my own cute android waifu.
Prerequisites:
>Loyal
>Some basic talking
>Feminine
>Open-source
>Open-Hardware
>Upgradable
Questions:
>What OS does she run?
>What processor does she have?
>How to deal with overheating/heat dissipation?
>How to manifacture her in general?
>What material to use for the hair?
>What material to use for the skin?
>How do you self lubricate and clean her vagene/mouth?
Android waifus are the future, Dorothy is best girl.
/g/ R:1
L:
[D][S][L][A][C]Open Hardware Motion Capture
>now you can be a kawaii anime girl on youtube with open hardware/software motion capture
http://chordata.cc
Video:
http://axqzx4s6s54s32yentfqojs3x5i7faxza6xo3ehd4bzzsg2ii4fv2iid.onion/watch?v=e2JR3fgHIGI
http://chordata.cc
Video:
http://axqzx4s6s54s32yentfqojs3x5i7faxza6xo3ehd4bzzsg2ii4fv2iid.onion/watch?v=e2JR3fgHIGI
/g/ R:44
L:
[D][U][F][S][L][A][C]Mentally ill castrato Corey Dale Ehmke (a/k/a "Coraline Ada" Ehmke):
http://archivecaslytosk.onion/LVw0h
strikes again! He has enriched the world of open source software with a new license. Introducing (drum roll, please) the Hippocratic License!
http://archivecaslytosk.onion/UXyAY
>Copyright (YEAR) (COPYRIGHT HOLDER)
>Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
>* The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
>* The software may not be used by individuals, corporations, governments, or other groups for systems or activities that actively and knowingly endanger, harm, or otherwise threaten the physical, mental, economic, or general well-being of individuals or groups in violation of the United Nations Universal Declaration of Human Rights (https://www.un.org/en/universal-declaration-human-rights/).
>THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
>This license is derived from the MIT License, as amended to limit the impact of the unethical use of open source software.
Have you bowed before Corey's powerful neovagina and adopted the Hippocratic License? If not, why not, cis scum?
http://archivecaslytosk.onion/LVw0h
strikes again! He has enriched the world of open source software with a new license. Introducing (drum roll, please) the Hippocratic License!
http://archivecaslytosk.onion/UXyAY
>Copyright (YEAR) (COPYRIGHT HOLDER)
>Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
>* The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
>* The software may not be used by individuals, corporations, governments, or other groups for systems or activities that actively and knowingly endanger, harm, or otherwise threaten the physical, mental, economic, or general well-being of individuals or groups in violation of the United Nations Universal Declaration of Human Rights (https://www.un.org/en/universal-declaration-human-rights/).
>THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
>This license is derived from the MIT License, as amended to limit the impact of the unethical use of open source software.
Have you bowed before Corey's powerful neovagina and adopted the Hippocratic License? If not, why not, cis scum?
/g/ R:24
L:
[D][U][F][S][L][A][C]Hardware and Software recommendation Thread
This thread is for asking for recommendations on hardware to buy or software to use for a specific purpose. We can hopefully give each other some non-shit options.
/g/ R:168
L:
[D][U][F][S][L][A][C]Technological Dystopia General
Discussion thread about the technological dystopia we're getting toward to and everything related to it. Post news/happenings, problems, solutions, resources, organize operations.
/g/ R:1
L:
[D][U][F][S][L][A][C]VR Vore
Looking for tech recommendations for VR Vore. Specifically an endoscope with a 360 degree view that can be streamed to a VR device like the HTC Vive and recorded. Bonus points for audio recording.
What endoscopes would you recommend?
What software would you use for streaming+recording?
What endoscopes would you recommend?
What software would you use for streaming+recording?
/g/ R:25
L:
[D][S][L][A][C]Post useful tor sites
I only have urls of these two onion websites:
http://nxi3veotqvyjpk2a.onion "The Pirate Bay"
http://nanochanxv2lxnqi.onion "Nanochan"
Help me improve my onion list. Pls no bully I'm new.
(Please no CP, gore, or drug sites. Just useful information or pirating sites.)
/g/ R:14
L:
[D][U][F][S][L][A][C]Maximum/Complete Privacy & Anonymity
>but-but you can't achieve that! it's impossiblez!
Right, you cannot achieve 100% privacy, unless you had some kind of privacy minded parents or aren't on government records. What i'm asking for is resources or advice, on how i can achieve the most privacy & anonymity possible.
Also, the following sites do i already know, so there's no need to post them twice:
Privacytools.io
Prism-break
Right, you cannot achieve 100% privacy, unless you had some kind of privacy minded parents or aren't on government records. What i'm asking for is resources or advice, on how i can achieve the most privacy & anonymity possible.
Also, the following sites do i already know, so there's no need to post them twice:
Privacytools.io
Prism-break
/g/ R:56
L:
[D][U][F][S][L][A][C]Linux is obsolete and spyware
>CIA and Mossad wants to spy on goys
>implements backdoors into Windows to spy on goyim
>some goys started developing and using open source Linux or BSD
>no perfect way to insert as many backdoors as in Windows
>decide to implement full hardware backdoors and spyware called Intel ME / AMD PSP
>now linux niggers are fully tracked and controlled, backdoors are OS independent
>linux nigger users don't give a fuck about ME and just buy new goyim hardware
Mossad fully destroyed open source niggers
>implements backdoors into Windows to spy on goyim
>some goys started developing and using open source Linux or BSD
>no perfect way to insert as many backdoors as in Windows
>decide to implement full hardware backdoors and spyware called Intel ME / AMD PSP
>now linux niggers are fully tracked and controlled, backdoors are OS independent
>linux nigger users don't give a fuck about ME and just buy new goyim hardware
Mossad fully destroyed open source niggers
/g/ R:12
L:
[D][U][F][S][L][A][C]Why take the strange decision to reject xul extensions? Why spend money on bullshit projects noone needs or cares about?
It all becomes clear if we take a look at who sponsors whom and who dictates the terms. Microsoft and Google have virtually the same co-owners as of today, and Apple has been part of Microsoft since the 90s. Mozilla Corporation, financially, is part of Google. Google is also the main beneficiary of "telemetry" in Firefox. As of today, all actively developed browser engines, Blink/WebKit and Gecko Quantum are developed by the same cartel. A single, unified coproplatform has be designated for "web apps". You might know it as e.g. "Chromium" or "Electron".
Firefox, whose marked share is around 3%, is basically a prop, a plastic dummy, which Google keeps around to make sure their asses are safe just in case a competition regulator starts having questions for them, and also as a pacifier for stubborn users who wouldn't accept the engine that Google in its grace bestows upon them otherwise.
All that guys at mozilla have to do is follow the orders and get the money.
Also, similar can be said about gnome and kde.
KDE4 is a complete fucking disaster. One obvious trace to name is Microsoft -> Novell -> Kde.
Gnome3, as you may have noticed, is a complete fucking disaster, too. "Stupid" decisions made from this release on are intentional, the intention being to repel users. Also, do take note how quick gnome was to jump into the stallman cancel train.
It all becomes clear if we take a look at who sponsors whom and who dictates the terms. Microsoft and Google have virtually the same co-owners as of today, and Apple has been part of Microsoft since the 90s. Mozilla Corporation, financially, is part of Google. Google is also the main beneficiary of "telemetry" in Firefox. As of today, all actively developed browser engines, Blink/WebKit and Gecko Quantum are developed by the same cartel. A single, unified coproplatform has be designated for "web apps". You might know it as e.g. "Chromium" or "Electron".
Firefox, whose marked share is around 3%, is basically a prop, a plastic dummy, which Google keeps around to make sure their asses are safe just in case a competition regulator starts having questions for them, and also as a pacifier for stubborn users who wouldn't accept the engine that Google in its grace bestows upon them otherwise.
All that guys at mozilla have to do is follow the orders and get the money.
Also, similar can be said about gnome and kde.
KDE4 is a complete fucking disaster. One obvious trace to name is Microsoft -> Novell -> Kde.
Gnome3, as you may have noticed, is a complete fucking disaster, too. "Stupid" decisions made from this release on are intentional, the intention being to repel users. Also, do take note how quick gnome was to jump into the stallman cancel train.
/g/ R:0
L:
[D][U][F][S][L][A][C]stop adding firmware to things.
stop making your product a fucking piece of web software that boots up from an embedded OS
>nignog inc adds firmware to niggermouse 9000
nek minnut:
>niggermouse 9000 scientifically proven to be bullshit
stop making your product a fucking piece of web software that boots up from an embedded OS
>nignog inc adds firmware to niggermouse 9000
nek minnut:
>niggermouse 9000 scientifically proven to be bullshit
/g/ R:5
L:
[D][U][F][S][L][A][C]>be in stacking WM
>hmm what's in the top right corner on workspace #3?
>press meta+tab to switch to next window
>600ms later window is still not rendered [#1]
>what the fuck
>consider throwing CRT through the window, even though its the only good /tech/ in the neigbourhood
>wait another 300ms
>window still not visible. must be the webshit window. press meta+tab
>window renders after 300ms. [#2]
>press meta+tab
>another aeon passes (400ms)
>start thinking about taxes and research on RSI and eye health and stuff
>window appears, looks different than #1 and #2 [#3]
>hit meta+tab twice, webshit browser becomes visible after 2 seconds
>aww yeah that was #1 or whatever
>sheeeit can't remember what #2 was
>restart entire process
>hmm what's in the top right corner on workspace #3?
>press meta+tab to switch to next window
>600ms later window is still not rendered [#1]
>what the fuck
>consider throwing CRT through the window, even though its the only good /tech/ in the neigbourhood
>wait another 300ms
>window still not visible. must be the webshit window. press meta+tab
>window renders after 300ms. [#2]
>press meta+tab
>another aeon passes (400ms)
>start thinking about taxes and research on RSI and eye health and stuff
>window appears, looks different than #1 and #2 [#3]
>hit meta+tab twice, webshit browser becomes visible after 2 seconds
>aww yeah that was #1 or whatever
>sheeeit can't remember what #2 was
>restart entire process
/g/ R:22
L:
[D][U][F][S][L][A][C]TempleOS
Have any of you used this? It seems pointless to use such an insular, esoteric system. However now that it is used have there been any good software developed for the system?
/g/ R:21
L:
[D][S][L][A][C]Dolby 7.1
Can I split the channels of a dolby 7.1 mainboard into stereo channels.
Jews want twice the money for 5.1 so I thought I could just split the fucking channels and have the same effect.
To be more specific: I want to have 2 times stereo from a 7.1 device, so I can connect to stereo speaker pairs.
To me it seems like they're trying to force me into buying their 7.1 certified jew crap instead of connecting anything I want to connect.
Or maybe I can output quad over 7.1 and split that with some sort of cable if that exists?
Has anyone tried?
I also want to avoid additional devices.
Jews want twice the money for 5.1 so I thought I could just split the fucking channels and have the same effect.
To be more specific: I want to have 2 times stereo from a 7.1 device, so I can connect to stereo speaker pairs.
To me it seems like they're trying to force me into buying their 7.1 certified jew crap instead of connecting anything I want to connect.
Or maybe I can output quad over 7.1 and split that with some sort of cable if that exists?
Has anyone tried?
I also want to avoid additional devices.
/g/ R:28
L:
[D][U][F][S][L][A][C]OS thread
Which OS do you use on a daily basis (especially which distro, if Linux)?
>me Linux Mint
characterlimit
>me Linux Mint
characterlimit
/g/ R:19
L:
[D][U][F][S][L][A][C]Anonymized DNS
>DNS encryption was a huge step towards making DNS more secure, preventing intermediaries from recording and tampering with DNS traffic.
>However, one still has to trust non-logging DNS servers for actually doing what they pretend to do. They obviously see the decrypted traffic, but also client IP addresses.
>In order to prevent this, using DNS over Tor or over proxies (HTTP, SOCKS) has become quite common. However, this is slow and unreliable as these mechanisms were not designed to relay DNS traffic.
>A new step towards making DNS more secure has been made. Today, I am thrilled to announce the general availability of Anonymized DNSCrypt, a protocol that prevents servers from learning anything about client IP addresses.
>Available in dnscrypt-proxy now!
https://github.com/DNSCrypt/dnscrypt-protocol/blob/master/ANONYMIZED-DNSCRYPT.txt
https://www.reddit.com/r/dnscrypt/comments/dhoxah/anonymized_dns_is_here/
>However, one still has to trust non-logging DNS servers for actually doing what they pretend to do. They obviously see the decrypted traffic, but also client IP addresses.
>In order to prevent this, using DNS over Tor or over proxies (HTTP, SOCKS) has become quite common. However, this is slow and unreliable as these mechanisms were not designed to relay DNS traffic.
>A new step towards making DNS more secure has been made. Today, I am thrilled to announce the general availability of Anonymized DNSCrypt, a protocol that prevents servers from learning anything about client IP addresses.
>Available in dnscrypt-proxy now!
https://github.com/DNSCrypt/dnscrypt-protocol/blob/master/ANONYMIZED-DNSCRYPT.txt
https://www.reddit.com/r/dnscrypt/comments/dhoxah/anonymized_dns_is_here/
/g/ R:20
L:
[D][U][F][S][L][A][C]White Noise / Counter-Surveillance Technologies
I am interested in countering limited targeted surveillance.
A light amount of research on the topic seems to indicate that white noise generators can counter some methods of audio surveillance, but specific details are scarce. Do any nanons know anything useful on this topic?
A light amount of research on the topic seems to indicate that white noise generators can counter some methods of audio surveillance, but specific details are scarce. Do any nanons know anything useful on this topic?
/g/ R:12
L:
[D][U][F][S][L][A][C]What should security be?
>Seeing "Botnet" this and "Botnet" that everywhere
Kind of sick of it. It's like a never ending game of speculation and smug elitism. So I'll ask /g/ a question, as a caveman that just does a lot of reading but with very little programming expertise. I'll let the focus of this thread answer what relationship should humans have with their machines (Dichotomy: demanding relationship computer like a human GF OR "just wurks" machine), and obviously the following questions.
Now I'm not a computer programmer. I don't want to waste my time trying to create unattainable perfect security. However, I understand that I should have steps to do that, and obviously good hardware. I want to be able to have my contacts and personal info remain confidential. I have good opsec but is there any Software that just handles the best configuration out of the box and that has no backdoors? I shouldn't have to learn all this nerd shit to have something the machine should already be doing. I mean computers should work , and not having us constantly work on them. I don't want to make the computer my life. I also don't want to be in expert in something that will just be outdated in a couple years or the skill won't be relevant anymore. Is there something that "just wurks". And no, not fucking windows or Ubuntu (analytic spying and paying globalists).
I have heard BSD is a good standard for security and is pretty usable but doesn't have the amount software you would get in a Linux OS like binary packages for Debian or even source builds on Gentoo. (Spare me, waiting to build tons of source code and reading every line of code to securely verify unless you waste years trying to understand it) Then again, what software would you possibly want? Quality over quantity. I guess just building from source what I would need just suffices, but then again why use computers if you don't use them for useful shit. I guess BSD seems good but not as fast as Gentoo :(
Maybe I'll just airgap with Qubes/Whonix and pray no persistent malware is present. Use Snailmail with encrypted SD cards. Maybe just plain old learn how to broadcast radio.
I just think we should stop wasting our lives impossibly building and maintaining a 'near perfect' machine to avoid a botnet. The real botnet is irl making us into niggercattle. Many young people are getting sucked into a corporate internet that they have no chance of competing in or having very little say about it. Either that, or they are fooled into a fake alternative known as the Open Source or FSF purity spiral cannibalism that rots their social lives and very communities away. They have it backwards thinking that interacting with machines will give them more freedom than rather interacting with fellow man (not sub-mans). Humans for now, control the damn machines. You need to confront the master, not the spawn.
>ur just a cavenigger
True. I however have wrote basic C++ and python programs before (then immediately forgot because skills rust and irrelevant brain memory). It's not like I couldn't throw away my club and spear and learn in depth. It's just that it would be a waste of time. I'm not saying computers serve no purpose. I'm just saying that our computers (phones included) are starting to own us. This bickering our speculative things is a distraction of the real issue. Why is there no balance? Hence, why there is no real security today.
>when ever disagreements arise in /g/
Who to even trust? I also see snobby elitism quite frequently with no explanation.
I applaud you Tor negros that make these onions work. If it were me I would probably just austically do it by the books while never understanding the underlying mechanisms of why it works, which is a recipe for disaster.
SHORT: What OS? What hardware? What network? What society? What is your mindset on security and privacy in 2020? What is the perfect balance between security and no life? What can anyone possibly do without wasting their life learning?
Kind of sick of it. It's like a never ending game of speculation and smug elitism. So I'll ask /g/ a question, as a caveman that just does a lot of reading but with very little programming expertise. I'll let the focus of this thread answer what relationship should humans have with their machines (Dichotomy: demanding relationship computer like a human GF OR "just wurks" machine), and obviously the following questions.
Now I'm not a computer programmer. I don't want to waste my time trying to create unattainable perfect security. However, I understand that I should have steps to do that, and obviously good hardware. I want to be able to have my contacts and personal info remain confidential. I have good opsec but is there any Software that just handles the best configuration out of the box and that has no backdoors? I shouldn't have to learn all this nerd shit to have something the machine should already be doing. I mean computers should work , and not having us constantly work on them. I don't want to make the computer my life. I also don't want to be in expert in something that will just be outdated in a couple years or the skill won't be relevant anymore. Is there something that "just wurks". And no, not fucking windows or Ubuntu (analytic spying and paying globalists).
I have heard BSD is a good standard for security and is pretty usable but doesn't have the amount software you would get in a Linux OS like binary packages for Debian or even source builds on Gentoo. (Spare me, waiting to build tons of source code and reading every line of code to securely verify unless you waste years trying to understand it) Then again, what software would you possibly want? Quality over quantity. I guess just building from source what I would need just suffices, but then again why use computers if you don't use them for useful shit. I guess BSD seems good but not as fast as Gentoo :(
Maybe I'll just airgap with Qubes/Whonix and pray no persistent malware is present. Use Snailmail with encrypted SD cards. Maybe just plain old learn how to broadcast radio.
I just think we should stop wasting our lives impossibly building and maintaining a 'near perfect' machine to avoid a botnet. The real botnet is irl making us into niggercattle. Many young people are getting sucked into a corporate internet that they have no chance of competing in or having very little say about it. Either that, or they are fooled into a fake alternative known as the Open Source or FSF purity spiral cannibalism that rots their social lives and very communities away. They have it backwards thinking that interacting with machines will give them more freedom than rather interacting with fellow man (not sub-mans). Humans for now, control the damn machines. You need to confront the master, not the spawn.
>ur just a cavenigger
True. I however have wrote basic C++ and python programs before (then immediately forgot because skills rust and irrelevant brain memory). It's not like I couldn't throw away my club and spear and learn in depth. It's just that it would be a waste of time. I'm not saying computers serve no purpose. I'm just saying that our computers (phones included) are starting to own us. This bickering our speculative things is a distraction of the real issue. Why is there no balance? Hence, why there is no real security today.
>when ever disagreements arise in /g/
Who to even trust? I also see snobby elitism quite frequently with no explanation.
I applaud you Tor negros that make these onions work. If it were me I would probably just austically do it by the books while never understanding the underlying mechanisms of why it works, which is a recipe for disaster.
SHORT: What OS? What hardware? What network? What society? What is your mindset on security and privacy in 2020? What is the perfect balance between security and no life? What can anyone possibly do without wasting their life learning?
/g/ R:6
L:
[D][S][L][A][C]Best privacy focused Mail and VPN providers
So what are the best of the best?
Concerning:
- Encryption
- Logging policy
- Payment method
- Torrenting
- where the provider is based
Concerning:
- Encryption
- Logging policy
- Payment method
- Torrenting
- where the provider is based
/g/ R:36
L:
[D][U][F][S][L][A][C]A thread for discussing all matters decentralized and privacy-friendly networks. Filesharing, websites, services, anything going through them.
We're already browsing this website through tor. I'm certain all of you have at least touched torrents.
What else is out there? What else do you use?
Personally, in addition to browsing tor websites and torrenting regularly, I'm also on I2p, IPFS, and GNUnet
We're already browsing this website through tor. I'm certain all of you have at least touched torrents.
What else is out there? What else do you use?
Personally, in addition to browsing tor websites and torrenting regularly, I'm also on I2p, IPFS, and GNUnet
/g/ R:66
L:
[D][U][F][S][L][A][C]The Wiki thread: Towards a Nanonymous Wiki
The Wiki thread: Towards a Nanonymous Wiki
What are some options or tools for passing on learnt/known information to others in the Wiki format?
What are some cool Wikis that you like, heard of, read or contribute to?
Here are a few:
>Arch Wiki
>InstallGentoo Wiki (not to be confused with the Gentoo Wiki)
>Wikipedia (duh)
>EncyclopediaDramatica (4chan: the Wiki)
>TheHiddenWiki (existence disputed, lame)
Wikipedia's list of Wikis:
https://en.wikipedia.org/wiki/List_of_wikis
Now, what if you wanted to create one?
Ideal hosting specs:
- No cost ($)
- Clearnet, Onion, I2P and Gopher addresses available
- Static (or dynamic, though much less likely considering free) web hosting/content publishing (that does not require use of JavaScript at any point preferably)
- Ability to make profit (donations, optional crypto miners, ads)
- Federated
>inb4 keep on dreaming
I'm not sure how much JavaScript they require to use (probably a lot), but the following services/methods exist, that cover some of those specs:
#1 https://pages.github.com/ (Microsoft owned)
#2 https://docs.gitlab.com/ee/user/project/pages/ (#1 minus Microsoft)
#3 https://neocities.org/ (Remake of GeoCities)
#4 https://mroystonward.github.io/non-anonymous-tor-hidden-service-using-google-cloud/
#5 https://community.fandom.com/wiki/Special:CreateNewWiki (AKA Wikia, used as host for numerous fictional Wikis such as Wookiepedia)
There's also WordPress, Blogger and Google Sites and Amazon Free Tier memes.
The first three are obviously the most feature full, being literal free static hosting.
>inb4 LMFAO YOU CAN'T RUN A WIKI ON STATIC HOSTING YOU IMBECILE
You could have a directory of Wiki-style formatted pages doing this, without JS.
Better suggestions?
>But this leaves one great big problem, requiring a Lmao Zedong Great Leap Forward!
Non of those that I know of have .Onion, only Clearnet addresses, unless you blow your anonymity like in #4.
So what do, Nanons? Pay money over Monero and just get a VPS? What if you are poor? Also, security risks of running it yourself!
>inb4 use NeoCities plus SourceHut (people can contribute to Wiki on SourceHut via version control and it gets 'committed' to NeoCities)
SourceHut is a paid ($) service.
>inb4 Steemit
Lot's of JavaScript, and can't really into Wiki afaik, unless some D-Tube equivalent Steemit based Wiki.
There are two Steemit Wikis, one is dead the other is for Steemit related help pages only.
src: https://steemit.com/steemit/@webosfritos/a-full-indexed-list-of-all-steemit-apps
>inb4 Contribute to existing Wiki dumb ass! XKCD 927!!!!
>https://xkcd.com/927/
Weird rules, usually anti-Tor and different goals.
>inb4 self/home host
Can you say s e c u r i t y r i s c c ?
What do you do for protecting against people posting illegal content? Are captchas and registrations enough?
>inb4 Wikis are a terrible format
What do you think is superior then?
>inb4 catch-all thread
Sad face.
DISCUSS! REEEEEEEEEEEEEEEEE
What are some options or tools for passing on learnt/known information to others in the Wiki format?
What are some cool Wikis that you like, heard of, read or contribute to?
Here are a few:
>Arch Wiki
>InstallGentoo Wiki (not to be confused with the Gentoo Wiki)
>Wikipedia (duh)
>EncyclopediaDramatica (4chan: the Wiki)
>TheHiddenWiki (existence disputed, lame)
Wikipedia's list of Wikis:
https://en.wikipedia.org/wiki/List_of_wikis
Now, what if you wanted to create one?
Ideal hosting specs:
- No cost ($)
- Clearnet, Onion, I2P and Gopher addresses available
- Static (or dynamic, though much less likely considering free) web hosting/content publishing (that does not require use of JavaScript at any point preferably)
- Ability to make profit (donations, optional crypto miners, ads)
- Federated
>inb4 keep on dreaming
I'm not sure how much JavaScript they require to use (probably a lot), but the following services/methods exist, that cover some of those specs:
#1 https://pages.github.com/ (Microsoft owned)
#2 https://docs.gitlab.com/ee/user/project/pages/ (#1 minus Microsoft)
#3 https://neocities.org/ (Remake of GeoCities)
#4 https://mroystonward.github.io/non-anonymous-tor-hidden-service-using-google-cloud/
#5 https://community.fandom.com/wiki/Special:CreateNewWiki (AKA Wikia, used as host for numerous fictional Wikis such as Wookiepedia)
There's also WordPress, Blogger and Google Sites and Amazon Free Tier memes.
The first three are obviously the most feature full, being literal free static hosting.
>inb4 LMFAO YOU CAN'T RUN A WIKI ON STATIC HOSTING YOU IMBECILE
You could have a directory of Wiki-style formatted pages doing this, without JS.
Better suggestions?
>But this leaves one great big problem, requiring a Lmao Zedong Great Leap Forward!
Non of those that I know of have .Onion, only Clearnet addresses, unless you blow your anonymity like in #4.
So what do, Nanons? Pay money over Monero and just get a VPS? What if you are poor? Also, security risks of running it yourself!
>inb4 use NeoCities plus SourceHut (people can contribute to Wiki on SourceHut via version control and it gets 'committed' to NeoCities)
SourceHut is a paid ($) service.
>inb4 Steemit
Lot's of JavaScript, and can't really into Wiki afaik, unless some D-Tube equivalent Steemit based Wiki.
There are two Steemit Wikis, one is dead the other is for Steemit related help pages only.
src: https://steemit.com/steemit/@webosfritos/a-full-indexed-list-of-all-steemit-apps
>inb4 Contribute to existing Wiki dumb ass! XKCD 927!!!!
>https://xkcd.com/927/
Weird rules, usually anti-Tor and different goals.
>inb4 self/home host
Can you say s e c u r i t y r i s c c ?
What do you do for protecting against people posting illegal content? Are captchas and registrations enough?
>inb4 Wikis are a terrible format
What do you think is superior then?
>inb4 catch-all thread
Sad face.
DISCUSS! REEEEEEEEEEEEEEEEE
/g/ R:137
L:
[D][S][L][A][C]Browser thread
What's the best browser for Windows?
>Edge
kek
>Firefox
Pozzed
>Chrome
Pozz king
>Ungoogled chrome
Outdated
>Waterfox and Palemoon
Shitty version of Firefox. Pretty sure one of them was caught phoning home and other has Jewish ties
Seems Firefox with the pozzed bits cut off seems to be the only option right now
>Edge
kek
>Firefox
Pozzed
>Chrome
Pozz king
>Ungoogled chrome
Outdated
>Waterfox and Palemoon
Shitty version of Firefox. Pretty sure one of them was caught phoning home and other has Jewish ties
Seems Firefox with the pozzed bits cut off seems to be the only option right now
/g/ R:30
L:
[D][U][F][S][L][A][C]Piracy
I assume that none of you use torrents for obvious reasons, soo, do you pirate your stuff, and if so, how?
/g/ R:61
L:
[D][U][F][S][L][A][C]What does does /g/ think about OnionShare 2?
https://blog.torproject.org/new-release-onionshare-2
>OnionShare is an open source tool for securely and anonymously sending and receiving files using Tor onion services. It works by starting a web server directly on your computer and making it accessible as an unguessable Tor web address that others can load in Tor Browser to download files from you, or upload files to you. It doesn't require setting up a separate server, using a third party file-sharing service, or even logging into an account.
As far as I can tell, this isn't doing anything new. It's just simplifying the process of creating a hidden web server, encrypting a file, and the receiving end decrypting it.
Do you think it is secure? Would you use this? What kind of files would you send or use to securely receive?
/g/ R:82
L:
[D][U][F][S][L][A][C]Tor transparent proxy on OpenBSD
A anon asked about Whonix security on other thread and I suggested OpenBSD instead. I thought this might be useful for other people, so here's how to make it route all trafic through Tor:
- Install Tor:
# pkg_add tor--
- Disable ICMP timestamps:
# echo "net.inet.icmp.tstamprepl=0" >> /etc/sysctl.conf
- Create a new loopback interface:
# ifconfig lo1 create up 127.0.0.2
# echo "inet 127.0.0.2" > /etc/hostname.lo1
- Make dns resolve to localhost:
# echo "supersede domain-name-servers 127.0.0.1;" > /etc/dhclient.conf
- Add this to /etc/tor/torrc:
AutomapHostsOnResolve 1
TransProxyType pf-divert
TransPort 9040 IsolateClientProtocol IsolateDestPort IsolateDestAddr
SocksPort 9050 IsolateClientProtocol IsolateDestPort IsolateDestAddr
DNSPort 53 IsolateClientProtocol IsolateDestPort IsolateDestAddr
Schedulers KISTLite
- Create a new /etc/pf.conf using these rules:
block all
non_tor = "{ 192.168.1.0/24 192.168.0.0/24 }"
match all scrub (no-df random-id reassemble tcp)
antispoof for egress inet
block return log on egress all
pass in quick on lo1 inet proto tcp all flags S/SA modulate state divert-to 127.0.0.1 port 9040
pass in quick on lo1 inet proto udp to port domain divert-to 127.0.0.1 port domain
pass quick on { lo0 lo1 }
block return in on ! lo0 proto tcp to port 6000:6010
pass out quick inet proto tcp user _tor flags S/SA modulate state
pass out quick inet proto udp to port domain route-to lo1
pass out quick inet to $non_tor
pass out inet proto tcp all route-to lo1
- Done. The next reboot it should already be working. If you use public wifi, don't forget to write "lladdr random" on your interface config to spoof mac address (read the hostname.if(5) man page). Don't forget disk encryption (read the FAQ about softraid-crypto). Also, you can raise securelevel and make the transparent proxy "permanent":
# echo "kern.securelevel=2" >> /etc/sysctl.conf
/g/ R:112
L:
[D][U][F][S][L][A][C]Recent events have lead to increased scrutiny of imageboards and other freedom/free speech focused forums. Major news articles from multiple outlets (http://archivecaslytosk.onion/l7o4d http://archivecaslytosk.onion/HBCZj http://archivecaslytosk.onion/Xnx6e) have portrayed sites similar to ours in a negative light, claiming that they are "a place for white supremacists to indoctrinate others—mostly young white men—into bigoted ideologies". (this is obviously false at least on this imageboard, as demonstrated through our rightful declaration of hapa supremacy)
Over time, the consequences of this kind of exposure will worsen. Some imageboards adopt a much more strict moderation policy, and cease to espouse freedom and free speech. They bend to the will of corporations and governments, who they perceive as invincible opponents with the power to crush them at any moment if they do not toe the line. Imageboards and forums that adopt this approach become a mockery of their former selves, the users being either ignorant of the control being placed over them, or choosing to adopt defeatist attitudes, surrender their freedom willingly.
Other imageboards/forums initially resist the corporations and governments, and find themselves increasingly in the spotlight/subject to "sanctions" from major powers. Cloudflare recently terminated their service of 8chan (http://archivecaslytosk.onion/jibT9) claiming that platforms like 8chan "directly inspire tragic events and are lawless by design". Cloudflare's objection to 8chan is that it is "uniquely lawless" - they (or whoever is putting pressure on them) see this lawlessness as a threat. This is despite repeated statements from Cloudflare claiming that they do not want to become content police (http://archivecaslytosk.onion/EeuCJ).
Cloudflare is a major player in terms of the internet - in that same article from 2017 they claim to handle 10% of internet requests. However, there is no reason to believe that the attempts to shut down freedom and free speech on the internet will end there. ISPs, ICANN (who administer DNS), and Certificate Authorities (through TLS) all control and administer the technologies that most would consider The Internet. However, all of these either are or are influenced by corporations and governments. Governments essentially control Internet Service Providers. Some countries have mandatory metadata retention (http://archivecaslytosk.onion/RDQIM) which require ISPs to hold metadata for years while giving government agencies warrantless access. ICANN delegates the distribution and sale of names to other businesses and agencies, all of which can be pressured by corporations and governments. """Trusted""" certificate authorities are companies which gather """trust""" from even larger companies, and from time to time they break that trust (http://archivecaslytosk.onion/S8Irj http://archivecaslytosk.onion/z2FqG). The CA system is designed to make it difficult for individuals and small groups to create their own widely used certificate authority - """trust""" must first be earned from the major powers.
ISPs, ICANN, the CA system, Cloudflare, VPS/datacenters, all are symptoms of centralization, enemies of freedom and free speech on the internet. They are the system which aims to control communication. The very idea of moderation is a restriction on how you can express yourself, which is a way to control how you think to force you to conform. This "lawlessness" which is despised by the major powers is precisely what must be preserved. The question is - how do we accomplish this?
I think we must begin by discarding the core forms of administration of The Internet. We must free ourselves from the tyranny of the few.
Even datacenters are a centralization of computers, giving few control over many. I believe it is important that the infrastructure of whatever we create is distributed.
What level do we aim to control? Should we aim to create a new network (not The Internet) free from the control of ISPs, governments, and corporations?
Should we be content with operating over-the-top of current protocols and systems, doing our best to circumvent their problems? (e.g. through Tor)
We can already create hidden services on Tor that are difficult to connect to irl locations and identities. However, such services are still a single point of failure. If a single computer is seized, a single person arrested, or a single power/internet connection is cut, the service fails.
"Federation" allows multiple separate systems to communicate and cooperate over a shared protocol to deliver a unified service. E.g. Email, IRC. More recently, many different applications have used a shared protocol (ActivityPub) to create "The Fediverse", a connected network of social web services. Federation allows for a service that is much more resistant to censorship and control.
Could we combine federation and hidden services to produce an imageboard/other forum that has all of the advantages of both of these systems, without being dependent on the technologies which allow corporations and governments to exert control over the mainstream internet?
Over time, the consequences of this kind of exposure will worsen. Some imageboards adopt a much more strict moderation policy, and cease to espouse freedom and free speech. They bend to the will of corporations and governments, who they perceive as invincible opponents with the power to crush them at any moment if they do not toe the line. Imageboards and forums that adopt this approach become a mockery of their former selves, the users being either ignorant of the control being placed over them, or choosing to adopt defeatist attitudes, surrender their freedom willingly.
Other imageboards/forums initially resist the corporations and governments, and find themselves increasingly in the spotlight/subject to "sanctions" from major powers. Cloudflare recently terminated their service of 8chan (http://archivecaslytosk.onion/jibT9) claiming that platforms like 8chan "directly inspire tragic events and are lawless by design". Cloudflare's objection to 8chan is that it is "uniquely lawless" - they (or whoever is putting pressure on them) see this lawlessness as a threat. This is despite repeated statements from Cloudflare claiming that they do not want to become content police (http://archivecaslytosk.onion/EeuCJ).
Cloudflare is a major player in terms of the internet - in that same article from 2017 they claim to handle 10% of internet requests. However, there is no reason to believe that the attempts to shut down freedom and free speech on the internet will end there. ISPs, ICANN (who administer DNS), and Certificate Authorities (through TLS) all control and administer the technologies that most would consider The Internet. However, all of these either are or are influenced by corporations and governments. Governments essentially control Internet Service Providers. Some countries have mandatory metadata retention (http://archivecaslytosk.onion/RDQIM) which require ISPs to hold metadata for years while giving government agencies warrantless access. ICANN delegates the distribution and sale of names to other businesses and agencies, all of which can be pressured by corporations and governments. """Trusted""" certificate authorities are companies which gather """trust""" from even larger companies, and from time to time they break that trust (http://archivecaslytosk.onion/S8Irj http://archivecaslytosk.onion/z2FqG). The CA system is designed to make it difficult for individuals and small groups to create their own widely used certificate authority - """trust""" must first be earned from the major powers.
ISPs, ICANN, the CA system, Cloudflare, VPS/datacenters, all are symptoms of centralization, enemies of freedom and free speech on the internet. They are the system which aims to control communication. The very idea of moderation is a restriction on how you can express yourself, which is a way to control how you think to force you to conform. This "lawlessness" which is despised by the major powers is precisely what must be preserved. The question is - how do we accomplish this?
I think we must begin by discarding the core forms of administration of The Internet. We must free ourselves from the tyranny of the few.
Even datacenters are a centralization of computers, giving few control over many. I believe it is important that the infrastructure of whatever we create is distributed.
What level do we aim to control? Should we aim to create a new network (not The Internet) free from the control of ISPs, governments, and corporations?
Should we be content with operating over-the-top of current protocols and systems, doing our best to circumvent their problems? (e.g. through Tor)
We can already create hidden services on Tor that are difficult to connect to irl locations and identities. However, such services are still a single point of failure. If a single computer is seized, a single person arrested, or a single power/internet connection is cut, the service fails.
"Federation" allows multiple separate systems to communicate and cooperate over a shared protocol to deliver a unified service. E.g. Email, IRC. More recently, many different applications have used a shared protocol (ActivityPub) to create "The Fediverse", a connected network of social web services. Federation allows for a service that is much more resistant to censorship and control.
Could we combine federation and hidden services to produce an imageboard/other forum that has all of the advantages of both of these systems, without being dependent on the technologies which allow corporations and governments to exert control over the mainstream internet?
/g/ R:15
L:
[D][U][F][S][L][A][C]Crawlers/Scrapers Thread
Discuss web crawlers and web scrapers technology.
There is a booru-like website that i want to archive, how do i crawl all pages and scrape the images?
There are some youtube channels that i want to follow, how do i periodically get a list of videos made by a channel and then automatically download new uploaded videos?
There are some imageboards that i want to archive, how do i periodically crawl a board and download threads and images?
Do i just scrape the HTML, parse it, and then download the images/videos?
Best way to do it programmatically? Best practices? Advices?
There is a booru-like website that i want to archive, how do i crawl all pages and scrape the images?
There are some youtube channels that i want to follow, how do i periodically get a list of videos made by a channel and then automatically download new uploaded videos?
There are some imageboards that i want to archive, how do i periodically crawl a board and download threads and images?
Do i just scrape the HTML, parse it, and then download the images/videos?
Best way to do it programmatically? Best practices? Advices?
/g/ R:49
L:
[D][U][F][S][L][A][C]Tor is no protection if your enemy is the United States government (i.e. if you're a White Nationalist or pro-BDS, two political positions the USA has already partially criminalized).
In 2014 as part of his research for his book on big tech and government surveillance, Yasha Levine wrote an article critical of tor's funding sources and flaws. The article can be read here:
https://yashalevine.com/articles/tor-spooks
In it he shows that the claim that "tor used to be funded by the US government but is now independent" is false thanks to organizations like the BBG, a previous CIA front group that worked to project USA policy by shaping propaganda.
In 2015 Levine acquired 2500 pages of correspondence between tor and the us government through the FOIA. The full documents are here: https://www.documentcloud.org/public/search/projectid:37206-The-Tor-Files-Transparency-for-the-Dark-Web
We're talking monthly training and planning sessions between the CIA, NSA, DOJ, FBI and so on. Levin's article with further links to his findings in the FOIA documents via the Tor: Fact Check series is here:
https://surveillancevalley.com/blog/fact-checking-the-tor-projects-government-ties
Here is further reporting in RT:
https://www.rt.com/usa/420584-tor-bbg-fbi-doj/
What is it all for? Levine and people like Bill Binney make the case that the tor project is a method to provide privacy to radicals in nations the USA wants to destabilize (Iran, Venezuela) but in a way that would not work against the USA due to their vast surveillance capabilities. In other words, "tor only works if you're trying to subvert a government the US hates."
The only defense I've encountered is the smug "huehue the Tor devs themselves say Tor is no defense against a 'global passive observer' lelelel!1" But if that's true, then what is the point of tor in the first place? From the viewpoint of a white nationalist worried about being slapped with "domestic terrorism" charges just for saying mean things on the internet (see: Johnny Logan Spencer who did prison time for writing a poem about shooting Obama) tor seems worthless.
Read over the FOIA documents yourself and tear my argument apart. I'd love to keep using a supposedly unbreakable and independent tool, especially considering where I live. But it's not looking good.
In 2014 as part of his research for his book on big tech and government surveillance, Yasha Levine wrote an article critical of tor's funding sources and flaws. The article can be read here:
https://yashalevine.com/articles/tor-spooks
In it he shows that the claim that "tor used to be funded by the US government but is now independent" is false thanks to organizations like the BBG, a previous CIA front group that worked to project USA policy by shaping propaganda.
In 2015 Levine acquired 2500 pages of correspondence between tor and the us government through the FOIA. The full documents are here: https://www.documentcloud.org/public/search/projectid:37206-The-Tor-Files-Transparency-for-the-Dark-Web
We're talking monthly training and planning sessions between the CIA, NSA, DOJ, FBI and so on. Levin's article with further links to his findings in the FOIA documents via the Tor: Fact Check series is here:
https://surveillancevalley.com/blog/fact-checking-the-tor-projects-government-ties
Here is further reporting in RT:
https://www.rt.com/usa/420584-tor-bbg-fbi-doj/
What is it all for? Levine and people like Bill Binney make the case that the tor project is a method to provide privacy to radicals in nations the USA wants to destabilize (Iran, Venezuela) but in a way that would not work against the USA due to their vast surveillance capabilities. In other words, "tor only works if you're trying to subvert a government the US hates."
The only defense I've encountered is the smug "huehue the Tor devs themselves say Tor is no defense against a 'global passive observer' lelelel!1" But if that's true, then what is the point of tor in the first place? From the viewpoint of a white nationalist worried about being slapped with "domestic terrorism" charges just for saying mean things on the internet (see: Johnny Logan Spencer who did prison time for writing a poem about shooting Obama) tor seems worthless.
Read over the FOIA documents yourself and tear my argument apart. I'd love to keep using a supposedly unbreakable and independent tool, especially considering where I live. But it's not looking good.
L:
[D][U][F][S][L][A][C]Here is a demonstration instance of picochan-1.2 (nanochan rewrite).
This will go down in a few days, so don't use it for anything besides testing.
http://picochanrpzlemllkdr46tilw7b4q3bv5ipetkmty37fuqq4hjfnhwad.onion:81
The source code is available from http://picochanrpzlemllkdr46tilw7b4q3bv5ipetkmty37fuqq4hjfnhwad.onion/picochan-1.2.tar.gz
Remember fagmin, imitation is the highest form of flattery.
HAPAS ARE SUPERIOR TO WHITES
This will go down in a few days, so don't use it for anything besides testing.
http://picochanrpzlemllkdr46tilw7b4q3bv5ipetkmty37fuqq4hjfnhwad.onion:81
The source code is available from http://picochanrpzlemllkdr46tilw7b4q3bv5ipetkmty37fuqq4hjfnhwad.onion/picochan-1.2.tar.gz
Remember fagmin, imitation is the highest form of flattery.
HAPAS ARE SUPERIOR TO WHITES
/g/ R:97
L:
[D][U][F][S][L][A][C]Why does anyone still support this fat autistic foot-eating jewish pedophiliac piece of shit?
- Richard Stallman once had a massive autistic meltdown in public when he was speaking in Brazil and people couldn't understand his bad Spanish (MUST WATCH!) http://axqzx4s6s54s32yentfqojs3x5i7faxza6xo3ehd4bzzsg2ii4fv2iid.onion/watch?v=jskq3-lpQnE
- Richard Stallman doesn't know how to install Linux. http://axqzx4s6s54s32yentfqojs3x5i7faxza6xo3ehd4bzzsg2ii4fv2iid.onion/watch?v=umQL37AC_YM
- Richard Stallman eats slime off his feet in public right in the middle of a lecture. http://axqzx4s6s54s32yentfqojs3x5i7faxza6xo3ehd4bzzsg2ii4fv2iid.onion/watch?v=I25UeVXrEHQ
- Richard Stallman thinks that pedophilia "does not harm children" as long as it is voluntary. https://www.stallman.org/archives/2006-may-aug.html#05%20June%202006%20%28Dutch%20paedophiles%20form%20political%20party%29
- Richard Stallman is jewish.
- Richard Stallman is obese.
- Richard Stallman's software is unnecessarily complicated. See: GNU echo, true, cat.
- Richard Stallman's software licenses are cancerous.
If Richard Stallkike had just died of a car accident or heart attack or something, we could have the year of the OpenBSD desktop. Instead, we have GNU/Tranny and Wangblows.
DEATH TO THE STALLKIKE
UNIN-STALLMAN
- Richard Stallman once had a massive autistic meltdown in public when he was speaking in Brazil and people couldn't understand his bad Spanish (MUST WATCH!) http://axqzx4s6s54s32yentfqojs3x5i7faxza6xo3ehd4bzzsg2ii4fv2iid.onion/watch?v=jskq3-lpQnE
- Richard Stallman doesn't know how to install Linux. http://axqzx4s6s54s32yentfqojs3x5i7faxza6xo3ehd4bzzsg2ii4fv2iid.onion/watch?v=umQL37AC_YM
- Richard Stallman eats slime off his feet in public right in the middle of a lecture. http://axqzx4s6s54s32yentfqojs3x5i7faxza6xo3ehd4bzzsg2ii4fv2iid.onion/watch?v=I25UeVXrEHQ
- Richard Stallman thinks that pedophilia "does not harm children" as long as it is voluntary. https://www.stallman.org/archives/2006-may-aug.html#05%20June%202006%20%28Dutch%20paedophiles%20form%20political%20party%29
- Richard Stallman is jewish.
- Richard Stallman is obese.
- Richard Stallman's software is unnecessarily complicated. See: GNU echo, true, cat.
- Richard Stallman's software licenses are cancerous.
If Richard Stallkike had just died of a car accident or heart attack or something, we could have the year of the OpenBSD desktop. Instead, we have GNU/Tranny and Wangblows.
DEATH TO THE STALLKIKE
UNIN-STALLMAN
/g/ R:39
L:
[D][U][F][S][L][A][C]Future of Laptops/Computers
You're all holding on to your old Thinkpads and PowerPC due to having slightly lower exploits. At some point the industry might kill any use it has. Firefox gets more and more bloated over time, new codec's are more difficult to run real time without lots of complex FP units or a hardware decoder. Heck, even encryption will start to be a burden as filesizes AND stronger encryption standards are neccecairy due to bigger supercomputers. Risk-v and Elbrus are still so far away from consumers and still haven't fixed or improved fundamental security issues that powerPC and Thinkpads are suffering from. Like how FP units almost always exclusively leak enough information for power analysis to work. Then we have projects like selinux and other microkernels failing to reduce complexity in order to be usefull for everything from realtime applications to desktops and servers. Their threat model also doesn't include all manners of operation. Denial of Service is still an issue.
There is no hardware in sight to fix this. There is no software to limit all theoretically preventable computing issues. Software that does, is most likely too complex to give guarantees. We've moved the industry forward based on risk taking without knowing wether a doomsday can happen. Secure CPU's should have stayed with integer operations. floating points are clearly too advanced for our weak brained species still.
What is the Final Solution?
/g/ R:43
L:
[D][U][F][S][L][A][C]GCC is bloat, malware, backdoor
I updated gcc compiler
why the fuck when I compile something, release binary is now 2.5 times bigger compared to old GCC? what backdoors and bloat are included?
how can a simple code be so big in binary? what is hidden there? how can I trust it?
should I downgrade to old GCC?
why the fuck when I compile something, release binary is now 2.5 times bigger compared to old GCC? what backdoors and bloat are included?
how can a simple code be so big in binary? what is hidden there? how can I trust it?
should I downgrade to old GCC?
/g/ R:19
L:
[D][S][L][A][C]config file vs command line params
config file as config
vs
command line params as config
which one to use and why
the second has the advantage that you can have single executable but multiple files that run it with different params. you could achieve similar thing with config files, if config file path was passed as command line parameter. but what's the point of separate config file then?
config file could be more comfortable if you have really big config with comments and multi line stuff
inb4 GUI. you can have GUI for configuration both if you use config files or command line params
but config file and command line params are needed anyway if you want to automate or call from another app
also designing and developing GUI is often overkill for small shit app
vs
command line params as config
which one to use and why
the second has the advantage that you can have single executable but multiple files that run it with different params. you could achieve similar thing with config files, if config file path was passed as command line parameter. but what's the point of separate config file then?
config file could be more comfortable if you have really big config with comments and multi line stuff
inb4 GUI. you can have GUI for configuration both if you use config files or command line params
but config file and command line params are needed anyway if you want to automate or call from another app
also designing and developing GUI is often overkill for small shit app
/g/ R:11
L:
[D][S][L][A][C]is new protocol QUIC/HTTP3 a botnet or similar to HTTP2?
https://www.howtogeek.com/442047/how-http3-and-quic-will-speed-up-your-web-browsing/
http://archivecaslytosk.onion/cWArc
https://www.howtogeek.com/442047/how-http3-and-quic-will-speed-up-your-web-browsing/
http://archivecaslytosk.onion/cWArc
/g/ R:23
L:
[D][S][L][A][C]>be me
>C programmer
>fucking around with function pointers and functions that take a struct with several addresses of all types (including of other structs)
>finish writing my opus magnum
>gcc has a mental breakdown due to the sheer amount of errors
>I may or may not be putting structs inside other struct that will only be defined later
>cant really change it, both structs have pointers to one another
>replace all pointer types with void*
>can't derreference void*
>fair enough
>create lots of placeholder structs that only have void* fields (and are otherwise identical to the original structs)
>struct foo0, struct foo1, ... you get the idea
>make several casts like:
>struct foo0 temp = {address0, address1, address2};
>ActualStruct actualData = (ActualStruct) (temp);
>should work, since they all are made of pointers
>it doesnt work
>gcc whines "error: conversion to non-scalar type requested" and "error: type of formal parameter 1 is incomplete"
C needs to fucking die already.
>C programmer
>fucking around with function pointers and functions that take a struct with several addresses of all types (including of other structs)
>finish writing my opus magnum
>gcc has a mental breakdown due to the sheer amount of errors
>I may or may not be putting structs inside other struct that will only be defined later
>cant really change it, both structs have pointers to one another
>replace all pointer types with void*
>can't derreference void*
>fair enough
>create lots of placeholder structs that only have void* fields (and are otherwise identical to the original structs)
>struct foo0, struct foo1, ... you get the idea
>make several casts like:
>struct foo0 temp = {address0, address1, address2};
>ActualStruct actualData = (ActualStruct) (temp);
>should work, since they all are made of pointers
>it doesnt work
>gcc whines "error: conversion to non-scalar type requested" and "error: type of formal parameter 1 is incomplete"
C needs to fucking die already.
/g/ R:4
L:
[D][U][F][S][L][A][C]Have you ever been a victim of cybercrime?
I'm curious how it happened.
Tell your stories. Heres mine:
Girl in an online game took all my items. I had her number so it really was a girl and we had a lot of fun for some weeks, but one day she just took all my assets. Oh Well.
Lost the domain of my mothers company to some domain squatting idiot, but it was like <10 visitors a months so .. ok. We just got another one. Bet he is now making mad advertising money from this (tip: he isn't).
Thats about it and I know it's nothing serious. Domain squatters still suck though. I'd like to burn the dudes car or so while imaging his fuckface.
Tell your stories. Heres mine:
Girl in an online game took all my items. I had her number so it really was a girl and we had a lot of fun for some weeks, but one day she just took all my assets. Oh Well.
Lost the domain of my mothers company to some domain squatting idiot, but it was like <10 visitors a months so .. ok. We just got another one. Bet he is now making mad advertising money from this (tip: he isn't).
Thats about it and I know it's nothing serious. Domain squatters still suck though. I'd like to burn the dudes car or so while imaging his fuckface.
/g/ R:24
L:
[D][U][F][S][L][A][C]Future tech trends
was posting this to 8cuck but gave up after their captcha code kept crashing and made me solve 15 captchas
-captcha to open folders on your computer
-navigating through one folder and then to its subfolder all within 1 second causes rate limiter to kick in
-if you try to name a folder anything with "nig" as a substring, a yellow exclamation mark appears and tells you the OS prevented you from using a problematic word
-software update when you want to type more than two capital letters in a row
-every user input and even mic sent over telemetry. but bug count is still that of 1990, because software now is super advanced and uncomparable to that of 1990, for instance now we have an animation when you put the mouse over a tab
-when putting a new file into a folder, you need to reboot to see it
-typing less than symbol instead of < crashes the entire OS
-typing "' or" dispatches police to your house
-every IP packet tagged and cryptographically signed with government ID which is tied to public social credit system. the crypto is flawed of course and we can impersonate someone downloading/uploading CP
-10 seconds input latency. it's just 10 seconds that's nothing
-pasting a string into the terminal requires running it through 3 programs to sanitize it, typing a command in the terminal to enable a mode, pasting, then typing a command to disable that mode. then you need to double escape it for 2 different languages
/g/ R:13
L:
[D][U][F][S][L][A][C]This is why we need distributed meshnets.
B.A.T.M.A.N (Better Approach To Mobile Ad-hoc Networking) and Netsukuku never succeeded. It's time to recreate this.
http://axqzx4s6s54s32yentfqojs3x5i7faxza6xo3ehd4bzzsg2ii4fv2iid.onion/watch?v=kXvMlh4-zh0
B.A.T.M.A.N (Better Approach To Mobile Ad-hoc Networking) and Netsukuku never succeeded. It's time to recreate this.
http://axqzx4s6s54s32yentfqojs3x5i7faxza6xo3ehd4bzzsg2ii4fv2iid.onion/watch?v=kXvMlh4-zh0
L:
[D][S][L][A][C]installing nanochan/picochan
How do I install nanochan or picochan on my server? I want to make a chan site for my community (sorry don't want to give away too many details here).
Which one is better and why?
What OS/browsers I am requiring?
Any different themes available?
Which one is better and why?
What OS/browsers I am requiring?
Any different themes available?
/g/ R:2
L:
[D][U][F][S][L][A][C]Curious. The admin of this imageboard is always advocating OpenBSD. Are you an OpenBSD commiter? A port maintainer maybe?
/g/ R:10
L:
[D][U][F][S][L][A][C]>>>>>>minimal
>$ wc -l *.c *.h
>20280 total
static void
mousepad_window_create_root_warning (MousepadWindow *window)
{
/* check if we need to add the root warning */
if (G_UNLIKELY (geteuid () 0))
{
GtkWidget *ebox, *label, *separator;
/* In GTK3, gtkrc is deprecated */
#if GTK_CHECK_VERSION(3, 0, 0) && (GNUC > 4 || GNUC 4 && GNUC_MINOR > 2)
# pragma GCC diagnostic push
# pragma GCC diagnostic ignored "-Wdeprecated-declarations"
#endif
/* install default settings for the root warning text box */
gtk_rc_parse_string ("style\"mousepad-window-root-style\"\n"
"{\n"
"bg[NORMAL]=\"#b4254b\"\n"
"fg[NORMAL]=\"#fefefe\"\n"
"}\n"
"widget\"MousepadWindow.*.root-warning\"style\"mousepad-window-root-style\"\n"
"widget\"MousepadWindow.*.root-warning.GtkLabel\"style\"mousepad-window-root-style\"\n");
#if GTK_CHECK_VERSION(3, 0, 0) && (GNUC > 4 || GNUC == 4 && GNUC_MINOR > 2)
# pragma GCC diagnostic pop
#endif
/* add the box for the root warning */
ebox = gtk_event_box_new ();
gtk_widget_set_name (ebox, "root-warning");
gtk_box_pack_start (GTK_BOX (window->box), ebox, FALSE, FALSE, 0);
gtk_widget_show (ebox);
/* add the label with the root warning */
label = gtk_label_new (_("Warning, you are using the root account, you may harm your system."));
gtk_misc_set_padding (GTK_MISC (label), 6, 3);
gtk_container_add (GTK_CONTAINER (ebox), label);
gtk_widget_show (label);
separator = gtk_separator_new (GTK_ORIENTATION_HORIZONTAL);
gtk_box_pack_start (GTK_BOX (window->box), separator, FALSE, FALSE, 0);
gtk_widget_show (separator);
}
}
>$ wc -l *.c *.h
>20280 total
static void
mousepad_window_create_root_warning (MousepadWindow *window)
{
/* check if we need to add the root warning */
if (G_UNLIKELY (geteuid () 0))
{
GtkWidget *ebox, *label, *separator;
/* In GTK3, gtkrc is deprecated */
#if GTK_CHECK_VERSION(3, 0, 0) && (GNUC > 4 || GNUC 4 && GNUC_MINOR > 2)
# pragma GCC diagnostic push
# pragma GCC diagnostic ignored "-Wdeprecated-declarations"
#endif
/* install default settings for the root warning text box */
gtk_rc_parse_string ("style\"mousepad-window-root-style\"\n"
"{\n"
"bg[NORMAL]=\"#b4254b\"\n"
"fg[NORMAL]=\"#fefefe\"\n"
"}\n"
"widget\"MousepadWindow.*.root-warning\"style\"mousepad-window-root-style\"\n"
"widget\"MousepadWindow.*.root-warning.GtkLabel\"style\"mousepad-window-root-style\"\n");
#if GTK_CHECK_VERSION(3, 0, 0) && (GNUC > 4 || GNUC == 4 && GNUC_MINOR > 2)
# pragma GCC diagnostic pop
#endif
/* add the box for the root warning */
ebox = gtk_event_box_new ();
gtk_widget_set_name (ebox, "root-warning");
gtk_box_pack_start (GTK_BOX (window->box), ebox, FALSE, FALSE, 0);
gtk_widget_show (ebox);
/* add the label with the root warning */
label = gtk_label_new (_("Warning, you are using the root account, you may harm your system."));
gtk_misc_set_padding (GTK_MISC (label), 6, 3);
gtk_container_add (GTK_CONTAINER (ebox), label);
gtk_widget_show (label);
separator = gtk_separator_new (GTK_ORIENTATION_HORIZONTAL);
gtk_box_pack_start (GTK_BOX (window->box), separator, FALSE, FALSE, 0);
gtk_widget_show (separator);
}
}
/g/ R:22
L:
[D][U][F][S][L][A][C]Lighting technology
post everything about lighting technology, light bulbs
light bulb types:
-incandescent
-halogen
-LED
-arc
Many (((governments))) ban sale of incandescent, even though they offer highest color quality.
light bulb types:
-incandescent
-halogen
-LED
-arc
Many (((governments))) ban sale of incandescent, even though they offer highest color quality.
/g/ R:5
L:
[D][U][F][S][L][A][C]Reselling dirty fundus?
I've stumbled upon a vendor on empire selling invite codes for coindirex at 200$. The site appears to have vendors selling dirty bitcoins at 75% or lower. Is buying, mixing and reselling these bitcoins a viable strategy?
How risky would that be?
Do you think it's a scam?
How risky would that be?
Do you think it's a scam?
/g/ R:9
L:
[D][U][F][S][L][A][C]Image alt text
What's with web shotters still adding alt text to images? Why would anyone need this when every website now is basically a program that only runs in the latest patch of their Big Four browser and breaks if you press any sequence of buttons not thought of by the newgrad developer? You can't actually browse any modern bullshit without the most bloated possible browser, let alone one without images.
example:
<img class="aligncenter wp-image-10370 size-large" title="This General Tso's Tofu recipe is from Chloe Coscarelli's new cookbook Chloe Flavor. It's crispy, spicy, sticky-sweet and full of umami flavor. ">
Yeah I know the authors of articles aren't necessarily the ones doing this, but someone somewhere in every "stack" is choosing to still support alt, and every single blog, "journal", and news website is still using this shit.
example:
<img class="aligncenter wp-image-10370 size-large" title="This General Tso's Tofu recipe is from Chloe Coscarelli's new cookbook Chloe Flavor. It's crispy, spicy, sticky-sweet and full of umami flavor. ">
Yeah I know the authors of articles aren't necessarily the ones doing this, but someone somewhere in every "stack" is choosing to still support alt, and every single blog, "journal", and news website is still using this shit.
/g/ R:8
L:
[D][U][F][S][L][A][C]RFID
How hard would it be for stores to modify their anti-theft scanners at the doors to track credit card RFIDs? Then they could know who entered and exiting even with no cell phone.
/g/ R:13
L:
[D][U][F][S][L][A][C]If you were to go back even 30 years from now, you would have a hard time convincing anyone that in the future we would all be carrying around personal surveillance devices at all times. It is too late to convince the public to stop, and it is but another step on the road to absolute tyranny of the human race through technology.
In the future, all human beings will be physically networked. There will not be a single moment, a single breathe, a single thought had that will not be catalogued in detail.
Human beings have very short spans of attention; even shorter when they are in groups. People are more than willing to trade away their own freedom and agency in exchange for "features", for eyecandy, because that is what the pack is doing. If you were offered to have medical sensors installed into your body for the purposes of ensuring your own health, would you do it? Any personal objections you might have to this are a product of our era. Future humans will be willing to stand for ever less, and less of their own agency.
Economic systems of control have been outmoded. Political systems of control have been overthrown, or modified. There is no such solution to the technological systems of control that we face now. The personal weaknesses of your fellows, and the innate human compulsion to seek ever increasing convenience will inevitably lead to this future. Just as now there are companies that will refuse to hire a candidate with no social media accounts to review, so too will future Orwellian technologies become de facto necessary to survive.
The few who will not allow themselves to be controlled and exploited will mean nothing in the face of the lemming masses, who will drive the final nail into the coffin of human freedom and remove any illusion that any one person can positively change anything; for every socially unacceptable detail, every socially unacceptable action, even every socially unacceptable thought of every human being will be held by the powers that be.
Even now with technologies like Tor, the age of the free internet has ended. Almost all power over it has been centralized in the hands of a few american companies in bed with the american government, and all the nations powerful enough to exist outside that sphere of control have their own spheres of control that serve the same nefarious purposes.
The modern man still has control over certain details of his life, but not of his own destiny. What before was left to his discretion because of the technological inability to micromanage him is now being taken from him, piece by piece. His control over his financial security is at risk because of automation (including automation of traditionally intellectual jobs); his control over his familial security is at risk because of the legal incentivization of divorce and the technologically-driven ease of cheating; his control over his own mind is at risk as he is constantly bombarded with disinformation and distractions to quell his growing discontent to the point that fact cannot be determined from fiction in an endless sea of muddied waters, as controlled opposition factions pretend to wrestle control from each other; his nation's borders are intentionally left porous to sew ethnic and national divisions, making it even easier to exploit him, his fellows, and the migrants all at once.
Even one that manages to dodge all these pitfalls and avoid dependence upon this sytem cannot avoid associating himself with those that care not. Even if you would not personally use a one-night-stand app, its mere existence reduces the quality of a large majority of the potential partners that you have. Even if you do not personally carry a mobile tracking device, associating with one who does may negate whatever privacy you were seeking to gain. Your own personal choice to reject any one or more of these things that seek to exploit and control you is not enough to avoid the control and exploitation. The only solution is destruction of this system, but the system cannot be destroyed; organizing to try and destroy it cannot be accomplished using modern backdoored technology, which future humans will be ever more reliant upon.
In the future, all human beings will be physically networked. There will not be a single moment, a single breathe, a single thought had that will not be catalogued in detail.
Human beings have very short spans of attention; even shorter when they are in groups. People are more than willing to trade away their own freedom and agency in exchange for "features", for eyecandy, because that is what the pack is doing. If you were offered to have medical sensors installed into your body for the purposes of ensuring your own health, would you do it? Any personal objections you might have to this are a product of our era. Future humans will be willing to stand for ever less, and less of their own agency.
Economic systems of control have been outmoded. Political systems of control have been overthrown, or modified. There is no such solution to the technological systems of control that we face now. The personal weaknesses of your fellows, and the innate human compulsion to seek ever increasing convenience will inevitably lead to this future. Just as now there are companies that will refuse to hire a candidate with no social media accounts to review, so too will future Orwellian technologies become de facto necessary to survive.
The few who will not allow themselves to be controlled and exploited will mean nothing in the face of the lemming masses, who will drive the final nail into the coffin of human freedom and remove any illusion that any one person can positively change anything; for every socially unacceptable detail, every socially unacceptable action, even every socially unacceptable thought of every human being will be held by the powers that be.
Even now with technologies like Tor, the age of the free internet has ended. Almost all power over it has been centralized in the hands of a few american companies in bed with the american government, and all the nations powerful enough to exist outside that sphere of control have their own spheres of control that serve the same nefarious purposes.
The modern man still has control over certain details of his life, but not of his own destiny. What before was left to his discretion because of the technological inability to micromanage him is now being taken from him, piece by piece. His control over his financial security is at risk because of automation (including automation of traditionally intellectual jobs); his control over his familial security is at risk because of the legal incentivization of divorce and the technologically-driven ease of cheating; his control over his own mind is at risk as he is constantly bombarded with disinformation and distractions to quell his growing discontent to the point that fact cannot be determined from fiction in an endless sea of muddied waters, as controlled opposition factions pretend to wrestle control from each other; his nation's borders are intentionally left porous to sew ethnic and national divisions, making it even easier to exploit him, his fellows, and the migrants all at once.
Even one that manages to dodge all these pitfalls and avoid dependence upon this sytem cannot avoid associating himself with those that care not. Even if you would not personally use a one-night-stand app, its mere existence reduces the quality of a large majority of the potential partners that you have. Even if you do not personally carry a mobile tracking device, associating with one who does may negate whatever privacy you were seeking to gain. Your own personal choice to reject any one or more of these things that seek to exploit and control you is not enough to avoid the control and exploitation. The only solution is destruction of this system, but the system cannot be destroyed; organizing to try and destroy it cannot be accomplished using modern backdoored technology, which future humans will be ever more reliant upon.
L:
[D][U][F][S][L][A][C]Groomer Security
>20 pgp keys
>tor browser
>no cellphone
>libreboot
>encrypted disks
>containers
>vms
>faraday cages
>access monitoring via camera
>OSINT close call detector
What else?
>tor browser
>no cellphone
>libreboot
>encrypted disks
>containers
>vms
>faraday cages
>access monitoring via camera
>OSINT close call detector
What else?
/g/ R:53
L:
[D][U][F][S][L][A][C]Private Email
What is the most secure email, and why is it Disroot?
Here we are defining secure as "even if I'm a scary nigger-hating nazi, the email host doesn't know and if the feds come knocking all they have to turn over is a bunch of encrypted data with no password."
It's inevitable that all email is insecure. A good example is protonmail using its Switzerland location as a marketing gimmick. In truth, Switzerland has a legal agreement with the US and will gladly hand over data if they're "asked." Services hiding behind "court orders" are equally worthless, since it's trivial for governments to draft up a quick court order. And these are just some of the many issues.
The only solution then, is Plausible Deniability. A service that operates on a zero information policy. When the feds come knocking, all they'll have are worthless encrypted files. This forces the feds to compromise the user's end, and if you're playing light on your feet rather than trying to be the big macho hackerman you'll be able to avoid them for the most part.
Along these lines, I propose Disroot. Discuss and disagree.
https://disroot.org/en/
/g/ R:39
L:
[D][U][F][S][L][A][C]Dailystormer.name DOWN?
The Daily Stormer's clearnet site seems to be down? Anyone who has any news on this?
the tor site is still online at:
http://dstormer6em3i4km.onion/
the tor site is still online at:
http://dstormer6em3i4km.onion/
/g/ R:13
L:
[D][U][F][S][L][A][C]What are some good methods for recording/taking pictures of people or things in public secretly? Either with a full sized smart phone or even a dedicated "spy" camera made for just that. I think there are sunglasses that have a camera in the center of them but that's a little bit over the top I feel. I was thinking of maybe some sort of jacket front pocket with a case like slot inside of it and a cut out for the camera lens of a smart phone. Though you would probably need to premeditate the encounter in that case a little bit to starting recording, then place it in the pocket.
I find the idea of having the body equivalent of a dash cam interesting. The problem is smart phones run hot and you'll drain your battery, maybe some sort of compact micro camera might be worth looking into. I welcome any brain storming on this topic since I'm out of my depth when it comes to cameras and even smart phones.
I find the idea of having the body equivalent of a dash cam interesting. The problem is smart phones run hot and you'll drain your battery, maybe some sort of compact micro camera might be worth looking into. I welcome any brain storming on this topic since I'm out of my depth when it comes to cameras and even smart phones.
/g/ R:13
L:
[D][S][L][A][C]Easy way to archive Nanochan?
Obviously we won't be able to go on archive.is to archive posts here. Is some kind of archiving functionality planned? Ideally I'd love to have for example a button in the top of the page that downloads a gzipped folder containing the html of the thread, the css and the files uploaded. I've never programmed an image board before so I don't know how hard it is to implement but there should be a way to easily archive things here.
/g/ R:9
L:
[D][U][F][S][L][A][C]DDoS attacks and DDoS mitigation
Hi everyone.
Let's talk about DDoS attacks and mitigation, primarily for Web sites.
Say, my knowledge about those mostly stops with the SYN flood attack. The attacker, most probably through a botnet, creates a gazillion half-open TCP connections to a webserver (HTTP uses TCP, DUH), probably spoofs IP (I dunno about that actually), whatever.
I feel like at some point, regardless of the server configuration, it's going to stop serving if not for OS TCP structure place being filled up, then because of bandwidth being used up for DDoS. So, it is a nasty attack overall.
So, the question is basically what can the owner do at all? I heard people even do redirects of DDoS, basically hiding the server behind proxies, is this the best option? Keep in mind the worst case scenario of maybe several gigabits coming our way.
Thanks for your interest.
Let's talk about DDoS attacks and mitigation, primarily for Web sites.
Say, my knowledge about those mostly stops with the SYN flood attack. The attacker, most probably through a botnet, creates a gazillion half-open TCP connections to a webserver (HTTP uses TCP, DUH), probably spoofs IP (I dunno about that actually), whatever.
I feel like at some point, regardless of the server configuration, it's going to stop serving if not for OS TCP structure place being filled up, then because of bandwidth being used up for DDoS. So, it is a nasty attack overall.
So, the question is basically what can the owner do at all? I heard people even do redirects of DDoS, basically hiding the server behind proxies, is this the best option? Keep in mind the worst case scenario of maybe several gigabits coming our way.
Thanks for your interest.
/g/ R:32
L:
[D][U][F][S][L][A][C]What is the point of Tor when most nodes reside in nations that have mandatory data retention laws? Then the trail leading directly back to you may be followed months after you use a specific Tor circuit.
/g/ R:14
L:
[D][U][F][S][L][A][C]The Website Obesity Crisis
In conversations with web performance advocates, I sometimes feel like a hippie talking to SUV owners about fuel economy.
They have all kinds of weirdly specific tricks to improve mileage. Deflate the front left tire a little bit. Put a magnet on the gas cap. Fold in the side mirrors.
Most of the talk about web performance is similarly technical, involving compression, asynchronous loading, sequencing assets, batching HTTP requests, pipelining, and minification.
All of it obscures a simpler solution.
If you're only going to the corner store, ride a bicycle.
If you're only displaying five sentences of text, use vanilla HTML. Hell, serve a textfile! Then you won't need compression hacks, integral signs, or elaborate Gantt charts of what assets load in what order.
Browsers are really, really good at rendering vanilla HTML.
We have the technology.
Nutritionists used to be big on this concept of a food pyramid. I think we need one for the web, to remind ourselves of what a healthy site should look like.
Here is what I recommend for a balanced website in 2015:
- A solid base of text worth reading, formatted with a healthy dose of markup.
- Some images, in moderation, to illustrate and punch up the visual design.
- A dollop of CSS.
- And then, very sparingly and only if you need it, JavaScript.
Instead, here is the web pyramid as we observe it in the wild:
- A base layer of HTML
- A huge pile of crap
- On top of it all, a whole mess of surveillance scripts.
full article:
http://archivecaslytosk.onion/Gt8AU
https://idlewords.com/talks/website_obesity.htm
my email:
maciej@ceglowski.com
They have all kinds of weirdly specific tricks to improve mileage. Deflate the front left tire a little bit. Put a magnet on the gas cap. Fold in the side mirrors.
Most of the talk about web performance is similarly technical, involving compression, asynchronous loading, sequencing assets, batching HTTP requests, pipelining, and minification.
All of it obscures a simpler solution.
If you're only going to the corner store, ride a bicycle.
If you're only displaying five sentences of text, use vanilla HTML. Hell, serve a textfile! Then you won't need compression hacks, integral signs, or elaborate Gantt charts of what assets load in what order.
Browsers are really, really good at rendering vanilla HTML.
We have the technology.
Nutritionists used to be big on this concept of a food pyramid. I think we need one for the web, to remind ourselves of what a healthy site should look like.
Here is what I recommend for a balanced website in 2015:
- A solid base of text worth reading, formatted with a healthy dose of markup.
- Some images, in moderation, to illustrate and punch up the visual design.
- A dollop of CSS.
- And then, very sparingly and only if you need it, JavaScript.
Instead, here is the web pyramid as we observe it in the wild:
- A base layer of HTML
- A huge pile of crap
- On top of it all, a whole mess of surveillance scripts.
full article:
http://archivecaslytosk.onion/Gt8AU
https://idlewords.com/talks/website_obesity.htm
my email:
maciej@ceglowski.com
/g/ R:8
L:
[D][U][F][S][L][A][C]Is it possible to get an RSS feed from an imageboards catalog or a specified thread? I've only recently started exploring RSS and it's made my life mountains easier. Post general RSS tips ITT.
/g/ R:48
L:
[D][U][F][S][L][A][C]Secure smartphone
How would you go about making a smartphone secure/anonymous? There's of course no way to make a phone completely secure but what would you do to at least make it harder for ZOG to track my mobile activities, and to pin your phone to your identity?
/g/ R:58
L:
[D][U][F][S][L][A][C]GUI/TUI construction
Let's say I consider the meme about FOSS programs having perplexingly retarded visual interfaces true. Are there any resources out there to learn the ropes of good design then? Something between "just fork it and make it better" and "we design UX with love, not UI" so it's actually productive. I know there is the Nielsen Norman Group for the web, but that's only one resource.
/g/ R:42
L:
[D][U][F][S][L][A][C]Read only bootloader, encryption
what is the point of Full Disk Encryption if your bootloader is not encrypted and can be modified to send or save your password in plaintext?
how to achieve read-only bootloader?
also, your bios or uefi can just read the keys you type when entering a password
how to achieve read-only bootloader?
also, your bios or uefi can just read the keys you type when entering a password
/g/ R:0
L:
[D][S][L][A][C]Qualcomm Forehorse Files
Someone knows where we can found Qualcomm Firehorse files?
Several devices have it leaked.
Toolboxes like Octoplus has somes files but it is closed.
Several devices have it leaked.
Toolboxes like Octoplus has somes files but it is closed.
/g/ R:17
L:
[D][S][L][A][C]What would be the best web crawler algorithm for tor?
I thought about just bruteforcing every .onion address but I realised that was a bad idea after looking up the number of all possible v2 addresses. I don't think following links will get you really far on tor because almost no sites (that I've been on) have links to external sites besides link dumps.
/g/ R:58
L:
[D][U][F][S][L][A][C]WHAT IN THE NAME OF FUCK WHAT IS THIS JESUS H. CHRIST
https://stallman.org/archives/2019-jul-oct.html#16_September_2019_(Resignation)
> To the MIT community,
>I am resigning effective immediately from my position in CSAIL at MIT. I am doing this due to pressure on MIT and me over a series of misunderstandings and mischaracterizations.
>Richard Stallman
https://www.fsf.org/news/richard-m-stallman-resigns
> On September 16, 2019, Richard M. Stallman, founder and president of the Free Software Foundation, resigned as president and from its board of directors.
>The board will be conducting a search for a new president, beginning immediately. Further details of the search will be published on fsf.org.
>For questions, contact FSF executive director John Sullivan at johns@fsf.org.
BACKGROUND:
A giant and a freedom-fighter like RMS taken down by a single article by a Negro-Chink who literally claims she's a polymath, and completly (and perhaps deliberatly) mischaracterizing the entire conversation chain. This probable-LEO that no one has ever heard of takes the conversation, claims that it is RMS supporting Epstein (which, if you read it, you can tell that no it is not in any form), then leaks it in an incredibly poorly-made PDF to Vice, a known CIA front organization.
From there, a three-day long smeer campaign starts in which multiple news outlets (failing to reproduce the conversation, and only linking to the Vice article) all say along the lines "Top MIT Professor Richard Stallman claims support for Jeffery Epstein".
Now, due to this slander campaign, RMS has decided to resign not only from CSAIL-MIT, but also FSF-GNU. It's another Jaccob Applebaum.
https://stallman.org/archives/2019-jul-oct.html#16_September_2019_(Resignation)
> To the MIT community,
>I am resigning effective immediately from my position in CSAIL at MIT. I am doing this due to pressure on MIT and me over a series of misunderstandings and mischaracterizations.
>Richard Stallman
https://www.fsf.org/news/richard-m-stallman-resigns
> On September 16, 2019, Richard M. Stallman, founder and president of the Free Software Foundation, resigned as president and from its board of directors.
>The board will be conducting a search for a new president, beginning immediately. Further details of the search will be published on fsf.org.
>For questions, contact FSF executive director John Sullivan at johns@fsf.org.
BACKGROUND:
A giant and a freedom-fighter like RMS taken down by a single article by a Negro-Chink who literally claims she's a polymath, and completly (and perhaps deliberatly) mischaracterizing the entire conversation chain. This probable-LEO that no one has ever heard of takes the conversation, claims that it is RMS supporting Epstein (which, if you read it, you can tell that no it is not in any form), then leaks it in an incredibly poorly-made PDF to Vice, a known CIA front organization.
From there, a three-day long smeer campaign starts in which multiple news outlets (failing to reproduce the conversation, and only linking to the Vice article) all say along the lines "Top MIT Professor Richard Stallman claims support for Jeffery Epstein".
Now, due to this slander campaign, RMS has decided to resign not only from CSAIL-MIT, but also FSF-GNU. It's another Jaccob Applebaum.
/g/ R:21
L:
[D][U][F][S][L][A][C]What do you think of my setup /g/?
Because I do not want to give every process on my laptop access to the Internet I block all Internet connectivity with a Firewall on my laptop and I block all Internet access for that laptop on my router as well.
Now to get access to the internet I allow only access to port 22 (SSH) and my router IP, then I run this command if I want to connect to the Internet:
ssh root@192.168.1.1 -D 9000
Which sets up a SOCKS5 proxy which allows you to use the Internet connection of the router, processes can be configured to use that SOCKS5 proxy (TCP only) if you want these processes to connect to the Internet.
For the router I'm using a commercial router with OpenWrt, though I rather have a bit more trustworthy hardware and software ...
/g/ R:42
L:
[D][U][F][S][L][A][C]Is p2p the ultimate future of the www?
With the increasing censorship of the clearnet people will eventually migrate to hidden services like TOR. Given enough traffic, TOR may get compromised as well (there's an ongoing debate, as I'm sure you're aware, that it's already a honeypot, but that's not the topic I want to discuss today).
If and when TOR becomes a honeypot, do you think p2p services like Freenet and i2p (or whatever the best option is at the time) will be the go-to networks for hosting freedom-of-speech websites, such as imageboards like this one, and if so, do you see any effective way of p2p networks being either compromesed, or somehow shut down?
If and when TOR becomes a honeypot, do you think p2p services like Freenet and i2p (or whatever the best option is at the time) will be the go-to networks for hosting freedom-of-speech websites, such as imageboards like this one, and if so, do you see any effective way of p2p networks being either compromesed, or somehow shut down?
/g/ R:18
L:
[D][S][L][A][C]What's the best strategy for discretely procuring your FBI file?
Does the FBI or CIA or some other alphabet soup agency have a file on you?
You may not think they do because, you're not doing anything illegal, right? But you still may have traveled to "suspicious" countries, met or communicated with people you didn't know were part of an investigation or surveillance operation, bought some peculiar, though legal items, visited websites which were on government watchlists, etc. There could be a million different reasons why the FBI or some other spook agency might be keeping tabs on you.
From the little research I've done so far, it's advised to fill out a FOIA form and attach a notarized form which proves you are who you say you are and send it to the FBI. Then in weeks or months, you supposedly get a full copy of your file, assuming that they are keeping one on you, free of charge.
I was thinking that whether you do or don't have a file with the FBI, just requesting your own file might be a red flag to them in and of itself.
>Why is this anon so paranoid to think we've been watching them? Hmmmm...better have a closer look at this guy.
Maybe it's better to have some third party request your file instead, to make it appear as if you had nothing to do with it?
Does anyone have any good advice about any of this? I'm not even sure if this is the best board to post this thread on, but /g/ are presumably the best OPSec anons here, so if you don't know the best strategy for forcing the feds to show their hand, no one does.
/g/ R:13
L:
[D][U][F][S][L][A][C]Clear Linux
Have you tried out Clear Linux? You can try the kernel out on arch with the linux-clear package (AUR).
Boot time reduced from ~3 seconds to ~300ms.
No AMD/Intel shitflinging allowed ITT.
Boot time reduced from ~3 seconds to ~300ms.
No AMD/Intel shitflinging allowed ITT.
/g/ R:32
L:
[D][U][F][S][L][A][C]lets talk about nimlang!!
does it have a chance against golang or will it forever remain as a niche language??
/g/ R:64
L:
[D][U][F][S][L][A][C]Alternative internet thread
Cease the "muh dystopia" faggotry. Let's fucking do something about it.
No bitching in this thread.
Let's share experiences and guides and try to actually work something out.
Here are some of my experiences.
= TOR =
I use tor all of the time.
It's like a shitty condom. Good enough for now, but I wouldn't want to rely on it. Setup is very simple (download tor, run it in the background, configure your browser to use localhost:9050 as the SOCKS proxy).
= Anonet =
I've tried Anonet today. It's some kind of a community based VPN and they even have their own DNS with their own TLDs. I couldn't get this to work. OpenVPN kept failing due to some kind of problem with one of their certificates. It's important to mention that I've tried it on a Fedora laptop I've had laying around. I may try it on my main OpenBSD machine later, and, if so, I'll update later.
= I2P and Freenet =
I will make absolutely no attempt to run any program written in Java, and neither should you. I'm a bit of a C fanatic, but other people have other choices and if a good program is written in C++ or Go or Rust or whatever, I'm fine with that. Java, however, is where I draw the fucking line. It's right up there with Microsoft's Dot Net framework.
= I2Pd =
I've tried I2Pd, an I2P client written in C++, on both OpenBSD and Void Linux, and had no luck on both of them. I've tried loading some I2P pages that I could find, but they all lead to some kind of index/home page bundled with I2Pd.
= Gopher =
I've gotten Gopher to work on an Arch machine a while ago (but you can probably get it to work anywhere). It's very minimal and tailored to be text only, which I like, but isn't very security/anonymity oriented. Sure, it may be text only but I'm sure that if it gets enough attention (((they))) will figure out a way to fuck things up. Yeah, you can use TOR on top of Gopher, but that seems to me like redundant suck-n'-fucking.
Currently I don't have much free time, but I plan on trying to develop some kind of an alternative network based on satellite dishes or antennas that people can build easily at home and built as a mesh network where encryption is mandatory. Maybe one day.
/g/ R:6
L:
[D][S][L][A][C]Obfuscating VBA macros in Microsoft Word
Hey Does anyone here know how properly obfuscate VBA macros in a microsoft word document to execute a powershell command or download a dropper.vbs. The latest methods I was able to find were at these two Github links and they both get flagged by windows defender.
https://github.com/bonnetn/vba-obfuscator
https://github.com/sevagas/macro_pack
https://github.com/bonnetn/vba-obfuscator
https://github.com/sevagas/macro_pack
/g/ R:97
L:
[D][U][F][S][L][A][C]Alternative Operating Systems
As a Linux user, I can't think of any moral or technical reason that I would stop using Linux in favor of a BSD operating system. My technical needs are met, I'm not forced to use systemd, and I'm familiar with the userland tools. Why should I use anything but Linux?
/g/ R:67
L:
[D][U][F][S][L][A][C]Upper precancer period
Nevar forget. Post upper precancer period tech
/g/ R:16
L:
[D][U][F][S][L][A][C]Am I the only one getting "This video is unavailable." on all youtube videos? 'Cause I am!
Anyway, another curious discovery: if you rely on youtube-dl for your youtube needs while using invidious instances to hide your ass, be aware that youtube extractor (which WILL be used for those links, well, the ones recognized by the extractor anyway) is hardcoded to download webpages from youtube.com. I kid you not, it's true. Not that it's a major risk if you're using Tor with ytdl anyway, just FYI.
Thanks for your support.
Anyway, another curious discovery: if you rely on youtube-dl for your youtube needs while using invidious instances to hide your ass, be aware that youtube extractor (which WILL be used for those links, well, the ones recognized by the extractor anyway) is hardcoded to download webpages from youtube.com. I kid you not, it's true. Not that it's a major risk if you're using Tor with ytdl anyway, just FYI.
Thanks for your support.
/g/ R:47
L:
[D][U][F][S][L][A][C]What are some decent VPN services? Obviously TOR remains superior for anonymity, but for general purpose and high speed internet usage what's your best bet? I've been using mullvad for a few years and while it's consistent, it's consistently mediocre. It will often drop the connection briefly once every hour or so which can be quite a bother if streaming videos.
/g/ R:57
L:
[D][U][F][S][L][A][C]Secure VOICE Communications General
The topic of programs offering optimum privacy in communication is a common topic on many tech forum. Similarly common are their conclusions. Any sensible persons come to the conclusion that XMPP plus OMEMO encryption beats anything else by miles. I agree that XMPP is king for text communication.
Except... a factor is often inexplicably ignored in this consensus.
Voice calling. Especially group voice calling.
So, with that, what is *the only competent* /g/'s sentiment on privacy focused protocols/programs offering voice chat functionality?
/g/ R:18
L:
[D][U][F][S][L][A][C]Naming General
Naming is always been a fundamental part of information technology, from naming server and devices, to naming variables and functions, to naming directories and files and organizing data, identifying information is an important part of modern technology.
How do you name things nanons? Discuss also best practices in general.
Personally i name devices as animu grills, i name variables all undercase with underscores like this "nanochan_g" cause i am lazy and i don't have a specific method for file and folders. Judge me.
How do you name things nanons? Discuss also best practices in general.
Personally i name devices as animu grills, i name variables all undercase with underscores like this "nanochan_g" cause i am lazy and i don't have a specific method for file and folders. Judge me.
/g/ R:5
L:
[D][U][F][S][L][A][C]Another nail in the hg coffin
"Senior Product Marketing Manager" (lol) and Atlassian spokeschink Denise Chan recently announced that Bitbucket will be sunsetting Mercurial support, with Mercurial features and repos being removed from Bitbucket on June 1, 2020.
Though struggling to see her monitor through her squinty eyes, she manages to type enough to characterize git as "the default system, helping teams of all sizes work faster as they become more distributed."
Bitbucket wasn't the only non-self-hosting option for hosting hg repos, but it was probably the biggest. Juicy little geisha Denise Chan isn't the first to essentially declare the victory of git over other DVCSs.
Is this the beginning of the end for Mercurial?
Though struggling to see her monitor through her squinty eyes, she manages to type enough to characterize git as "the default system, helping teams of all sizes work faster as they become more distributed."
Bitbucket wasn't the only non-self-hosting option for hosting hg repos, but it was probably the biggest. Juicy little geisha Denise Chan isn't the first to essentially declare the victory of git over other DVCSs.
Is this the beginning of the end for Mercurial?
/g/ R:31
L:
[D][U][F][S][L][A][C]Ublock origin stopped working on tor again. Why do the retards to this to me. I demand to know why, I demand this work, I demand tendies and plug and play applications. How do I even fix this retard shit from happening again, like it happened now and a few months ago
/g/ R:55
L:
[D][S][L][A][C]Encryption
Which tools do you use to encrypt your data?Do you encrypt entire storage medium or just particular files?
L:
[D][S][L][A][C]anonymous
are anonymous still active?
how do we communicate with them/ join?
any information will be appreciated.
anyone going to million mask london?
how do we communicate with them/ join?
any information will be appreciated.
anyone going to million mask london?
/g/ R:36
L:
[D][U][F][S][L][A][C]The whole fucking GIMP project got forked just because someone didn't like the name.
This has to be the dumbest reason to fork.
https://www.minicreo.com/news/glimpse-image-editor.html
This has to be the dumbest reason to fork.
https://www.minicreo.com/news/glimpse-image-editor.html
/g/ R:14
L:
[D][U][F][S][L][A][C]UNIX is just web now
Webshoters are showing ads in the terminal now. 😂 U+1F602 FACE WITH TEARS OF JOY
http://archive.is/2019.08.30-144411/https://www.zdnet.com/article/npm-bans-terminal-ads/
>One developer went as far as creating the first-ever terminal ad blocker.
😂 U+1F602 FACE WITH TEARS OF JOY
This is the final destination for the shit turing-tarpit OS. We'll see this shit coming to C and the core libs soon.
http://archive.is/2019.08.30-144411/https://www.zdnet.com/article/npm-bans-terminal-ads/
>One developer went as far as creating the first-ever terminal ad blocker.
😂 U+1F602 FACE WITH TEARS OF JOY
This is the final destination for the shit turing-tarpit OS. We'll see this shit coming to C and the core libs soon.
/g/ R:4
L:
[D][U][F][S][L][A][C]NeetBSD gets new Wine and GPU accel in the linux compat layer. And also there's tremendous progress in getting Wayland to work.
https://www.phoronix.com/scan.php?page=news_item&px=NetBSD-Wayland-First-App
https://blog.netbsd.org/tnf/entry/gsoc_2019_report_implementation_of
https://blog.netbsd.org/tnf/entry/porting_wine_to_amd64_on1
Maybe nothing groundbreaking, but still I'm really excited.
https://www.phoronix.com/scan.php?page=news_item&px=NetBSD-Wayland-First-App
https://blog.netbsd.org/tnf/entry/gsoc_2019_report_implementation_of
https://blog.netbsd.org/tnf/entry/porting_wine_to_amd64_on1
Maybe nothing groundbreaking, but still I'm really excited.
/g/ R:20
L:
[D][U][F][S][L][A][C]Physical storage technology
where to store stuff that you collect?
-your house or land
police, mossad, thieves can go there and steal your stuff or plant something on it
if you change place of live or sell the house, you have to move all your stuff
-rent a storage box or something similar
police, mossad, can go there and steal your stuff or plant something on it. or can you rent storage box under fake name?
they have cameras and record when you access stuff
-put under ground of someone's land or your land
complicated and a lot of effort to access it
someone can see it and steal your stuff later or call police
-in your car's trunk
police, mossad, thieves can go there and steal your stuff or plant something on it
limited space
any other options or opinion on the options that I presented?
-your house or land
police, mossad, thieves can go there and steal your stuff or plant something on it
if you change place of live or sell the house, you have to move all your stuff
-rent a storage box or something similar
police, mossad, can go there and steal your stuff or plant something on it. or can you rent storage box under fake name?
they have cameras and record when you access stuff
-put under ground of someone's land or your land
complicated and a lot of effort to access it
someone can see it and steal your stuff later or call police
-in your car's trunk
police, mossad, thieves can go there and steal your stuff or plant something on it
limited space
any other options or opinion on the options that I presented?
/g/ R:18
L:
[D][S][L][A][C]how to steal VPS
where to steal free VPS like a nigger? without giving your real credit card.
I do have money but it's not easy to buy VPS anonymously.
are free VPS a trial only for few days, then they kill it?
is there a way to go to public place with a computer, install your malware/VPS software and use it as VPS?
or hack someone's PC online to use it as VPS?
I need minimum hardware, minimum internet bandwidth, doesn't matter.
L:
[D][U][F][S][L][A][C]I made a site.
I made a site so that you will never get lonely. And it doesn't use JS!
https://myanee7lkwzxkhupjxvu2sxtkuf57lkvr3wutf3vfvnhkxuei7h3xbad.onion/neverlonely/
https://myanee7lkwzxkhupjxvu2sxtkuf57lkvr3wutf3vfvnhkxuei7h3xbad.onion/neverlonely/
/g/ R:19
L:
[D][U][F][S][L][A][C]Why is this allowed?
Yandex cannot be allowed to continue this agenda of hate, please do everything in your power to prevent the Russians from corrupting our children, they can't be allowed to get away with this!
/g/ R:8
L:
[D][U][F][S][L][A][C]I found a cool Assembler library
Say something nice about it
https://2ton.com.au/HeavyThing/
>Feature Highlights
GPLv3 licensed, commercial support available
Easy to use, loads of examples
Builtin code profiler w/ user interface
Native VDSO support
Full Unicode support
Native 32 bit or 16 bit strings
Correct double to string and vs. handling
Very fast user-friendly epoll implementation
Very fast big integers
Full text user interface components and effects
Very fast zlib implementation
Very fast TLS 1.2 client/server implementation
Very fast SSH2 client/server implementation
Software and hardware AES
SHA3/Keccak,SHA512,SHA384,SHA256,SHA160,MD5
HMAC, PBKDF2, scrypt, HMAC_DRBG, Poly1305
Curve25519/Ed25519
libsodium/NaCl crypto_box compatibility
Very fast web client/server implementation
ABI compliant
Say something nice about it
https://2ton.com.au/HeavyThing/
>Feature Highlights
GPLv3 licensed, commercial support available
Easy to use, loads of examples
Builtin code profiler w/ user interface
Native VDSO support
Full Unicode support
Native 32 bit or 16 bit strings
Correct double to string and vs. handling
Very fast user-friendly epoll implementation
Very fast big integers
Full text user interface components and effects
Very fast zlib implementation
Very fast TLS 1.2 client/server implementation
Very fast SSH2 client/server implementation
Software and hardware AES
SHA3/Keccak,SHA512,SHA384,SHA256,SHA160,MD5
HMAC, PBKDF2, scrypt, HMAC_DRBG, Poly1305
Curve25519/Ed25519
libsodium/NaCl crypto_box compatibility
Very fast web client/server implementation
ABI compliant
/g/ R:67
L:
[D][U][F][S][L][A][C]Facebook reveals Libra cryptocurrency
>The social networking giant has linked with 28 partners including Mastercard, PayPal and Uber to form Libra Association, a Geneva-based entity governing the new digital coin
>To facilitate transactions, Facebook also created Calibra, a subsidiary that will offer digital wallets to save, send and spend Libras. Calibra will be connected to Facebook messaging platforms Messenger and WhatsApp.
>The whole system is scheduled to launch in the first half of 2020.
>The name "Libra" comes from Roman weight measurements, the astrological sign for justice and the French word for freedom, said David Marcus, who heads the project for Facebook.
>French word for "freedom"
https://www.reuters.com/article/us-facebook-crypto/facebook-reveals-libra-cryptocurrency-sparking-new-privacy-concerns-idUSKCN1TJ0TN
/g/ R:11
L:
[D][U][F][S][L][A][C]USE Flags on OpenBSD
I want Gentoo's USE flags on OpenBSD. I tried fucking around with Gentoo Prefix to get it to work under OBSD, but no dice. Is this feature available somehow in pkgsrc? The only thing preventing me from using OpenBSD exclusively is its god fucking awful ports collection.
Reposted from QTDDTOT.
/g/ R:76
L:
[D][U][F][S][L][A][C]LUA. What can you tell me about it and which learning resources do you recommend? Is it relatively popular?
/g/ R:8
L:
[D][U][F][S][L][A][C] What would be a good strategy for building a home-made, non-standard data archive system? Clearly, you can't just build some 8TB H2-filled drive in your garage, but some sort of home-made contraption to store data seems fascinating to me. For instance, I could imagine a system where a pinhead passes over a metal surface and taps marks into the surface or, in an even more esoteric system, tiny strings could be woven in certain patterns and read using a camera.
Have people built systems like this before? Was there any real-world use for them?
Have people built systems like this before? Was there any real-world use for them?
/g/ R:28
L:
[D][U][F][S][L][A][C]Hax General
This thread is for everything related to other people's computers, there's a lot of those on tor and even more on the clearnet. post ur
>scripts
>creds
>dox
>shells
>defacements
>targets
>favorite tools
and tips and tricks ofc. I will answer questions if they aren't too dumb. No whitehatfags allowed. No glowinthedarks allowed.
LINKS
new feshonions http://vps7nsnlz3n4ckiie5evi5oz2znes7p57gmrvundbmgat22luzd4z2id.onion/ (not crawling for some reason)
doxbin http://doxbinjs77uawbbl.onion/
archive http://archivecaslytosk.onion/
0day http://mvfjfugdwgc5uwho.onion/
webshells http://z2huz7tsxluvnxoc.onion
whonix http://kkkkkkkkkk63ava6.onion/
qubes http://qubesos4rrrrz6n4.onion/
cuckcuckgo http://3g2upl4pq6kufc4m.onion
searx http://ulrn6sryqaifefld.onion/
There are more good links i will post later
/g/ R:34
L:
[D][U][F][S][L][A][C]OneRNG
http://onerng.info/
>OneRNG is an entropy source / hardware random number generator (HWRNG), designed to be connected via USB to your computer.
>Entropy is collected from an avalanche diode circuit and optionally an RF circuit, whitened and presented over a USB/Serial connection.
>The provision of entropy to your computer system is critical for any software security system to be effective. There are many potential sources of entropy, but the majority of them are susceptible to biases & attacks that can result in the subversion of your privacy & security. Many of these attacks are undetectable in normal working conditions.
>In order to address these problems, we present OneRNG. This is deliberately a simple device, which means that instead of having to blindly trust the hardware you are attaching to your computer, you have the ability to verify that the software and hardware of this device is to your standards.
>We are not aware of any other equivalent device that promotes this essential feature of security for you, the user.
TLDR: hardware level random number generator which is better than default because CPUs in a post NSA world have backdoors to make predictable encryption keys.
Worth it or naw?
/g/ R:12
L:
[D][U][F][S][L][A][C]Facial recognition
I'm interested in the best ways to avoid facial recognition. All the ways I've come across make you look less than inconspicuous, to say the least. Wearing a suit over your entire body, having crazy hairstyles and looking like a clown isn't really what you'd want to do every time you went to the store to buy groceries, don't you think?
Though I've heard about a method where you cover your eyebrows which allegedly confuses the FR software, looking at how the sophisticated said software is I'd think the method wouldn't be very successful. So I've come to you today to ask you about some subtle ways to at least semi-reliably dodge FR.
Though I've heard about a method where you cover your eyebrows which allegedly confuses the FR software, looking at how the sophisticated said software is I'd think the method wouldn't be very successful. So I've come to you today to ask you about some subtle ways to at least semi-reliably dodge FR.
/g/ R:11
L:
[D][U][F][S][L][A][C]USB's/External storage
Does anyone have experience with "micro" or "low profile" USB's? I'm looking for something reliable and cheap to have in various sizes for live CD's, password management, backups, etc. I've had USB's brick themselves in the past and lost some data so I'm even more skeptical of the micro USB's reliability since some reviews of them have said they bricked themselves eventually.
/g/ R:4
L:
[D][U][F][S][L][A][C]I've been trying to find a decent technology board to post on since 8gag went down and I think I finally found it.
I'm thinking of building a little homebrew computer. I want to make a stack machine. Pic related is my first draft of a microarchitecture. R8, h8, masturb8, and point any any issues. errors, or possible improvements.
I'm thinking of building a little homebrew computer. I want to make a stack machine. Pic related is my first draft of a microarchitecture. R8, h8, masturb8, and point any any issues. errors, or possible improvements.
/g/ R:36
L:
[D][U][F][S][L][A][C]the truth about unix niggers and their shit C language
https://news.ycombinator.com/item?id=10917414
>The price of commercial compilers wasn't the only issue with Ada. It never had any friends in the UNIX culture.
>UNIX culture always ignored safer system programming languages from the 60 and 70's.
>If the hacker culture bashes Java for being verbose, what would they say about Algol languages like Ada?
https://www.blaisepascalmagazine.eu/academy/programming-in-c-or-pascal-english/
>Of course, the poor legibility of C is a direct consequence of the use of special characters. Here you can see that the authors just did not have the experience that Wirth had, as many operators are poorly chosen. The symbol ^ for differencing in Pascal reproduces the nature of a pointer much better than the star, which is also used as a multiplication sign. It has done better with the “->”, with which composite components can be addressed. And I have never understood why == and != is used for comparisons, instead of = and <>. I often have the impression that the sole aim of C syntax is to be different from Algol or Pascal, and not more easily comprehensible.
>Perhaps the original aim was to save space, but this means that C programs have to be commented much more, which wins you nothing. The partially cryptic nature of C actually attracts some programmers who love this; there are even programming competitions in C such as “Obfusticated C”. Here programs that no one can read win prizes. In this example the need to avoid a buffer overflow and append the binary zero makes the C program even longer than the Pascal program
now it all makes sense
unix niggers choosen C as their language because it is unreadable and they can pretend to be evil dark hackers that type strange symbols into computer. same like when they claim that CLI is better than GUI, in reality they prefer CLI because they can memorize some nigger commands from manual and then feel like DARK HACKERS that control computers with strange letters and stuff
unix niggers care about how they are perceived, they don't care about productivity or software safety and quality. so unix niggers are similar to objective-c apple gay starbucks soy devs, they are just from different team, both teams hate each other but in reality both teams are bunch of dumb niggers
hacker/unix culture = dumb shit niggers that want to show off that they memorized some cryptic magic commands and they are DARK HACKERS.
>The price of commercial compilers wasn't the only issue with Ada. It never had any friends in the UNIX culture.
>UNIX culture always ignored safer system programming languages from the 60 and 70's.
>If the hacker culture bashes Java for being verbose, what would they say about Algol languages like Ada?
https://www.blaisepascalmagazine.eu/academy/programming-in-c-or-pascal-english/
>Of course, the poor legibility of C is a direct consequence of the use of special characters. Here you can see that the authors just did not have the experience that Wirth had, as many operators are poorly chosen. The symbol ^ for differencing in Pascal reproduces the nature of a pointer much better than the star, which is also used as a multiplication sign. It has done better with the “->”, with which composite components can be addressed. And I have never understood why == and != is used for comparisons, instead of = and <>. I often have the impression that the sole aim of C syntax is to be different from Algol or Pascal, and not more easily comprehensible.
>Perhaps the original aim was to save space, but this means that C programs have to be commented much more, which wins you nothing. The partially cryptic nature of C actually attracts some programmers who love this; there are even programming competitions in C such as “Obfusticated C”. Here programs that no one can read win prizes. In this example the need to avoid a buffer overflow and append the binary zero makes the C program even longer than the Pascal program
now it all makes sense
unix niggers choosen C as their language because it is unreadable and they can pretend to be evil dark hackers that type strange symbols into computer. same like when they claim that CLI is better than GUI, in reality they prefer CLI because they can memorize some nigger commands from manual and then feel like DARK HACKERS that control computers with strange letters and stuff
unix niggers care about how they are perceived, they don't care about productivity or software safety and quality. so unix niggers are similar to objective-c apple gay starbucks soy devs, they are just from different team, both teams hate each other but in reality both teams are bunch of dumb niggers
hacker/unix culture = dumb shit niggers that want to show off that they memorized some cryptic magic commands and they are DARK HACKERS.
/g/ R:21
L:
[D][U][F][S][L][A][C]examples of a beautiful software
What would you consider as a beautiful software or system
/g/ R:88
L:
[D][U][F][S][L][A][C]Anti-Bloatware Thread
Anti-bloatware threads on other imageboards often result in people saying that anything TUI = gud, but that's clearly untrue; for example, the following I consider bloatware:
>ncurses (supports 30 year old hardware which doesn't exist)
>network managers (hundreds of thousands of lines of code to do something which can be done with a simple script)
>apache (giant blob of modules and extensions)
>emacs (includes everything by default)
>vim (hundreds of thousands of lines of code...)
Discuss ITT the alternatives to these pieces of bloatware. I'm genuinely curious to see what you guys come up with.
/g/ R:19
L:
[D][U][F][S][L][A][C]Operating system
How hard would it be to make a basic OS that lacks networking and other fancy functions? Something light weight comparable to Raspbian OS for raspberry pi. Which programming language would be best suited for such task and where can I learn the basics of OS making? Could you recommend any book?
/g/ R:28
L:
[D][U][F][S][L][A][C]List software you always need to install.
>$ pkg_info -mz
>aria2--
>i3--
>links+--
>mpv--
>mupdf--
>newsboat--
>p7zip-rar--
>py3-pip-- (for youtube-dl and subliminal)
>slock--
>spleen--
>tor--
>torsocks--
>xbanish--
>xclip--
>st (compiled from source, because vanilla is shit)
/g/ R:82
L:
[D][U][F][S][L][A][C]Search engines | Why you should not trust DuckDuckGo
- It is hosted on Amazon Web Services (which has a $600 million contract with the CIA)
- Gabriel Weinberg, the creator and owner formerly ran a site called NamesDatabase which encouraged people to provide valid personal details and to refer other people to give their information
- "We also save searches, but again, not in a personally identifiable way, as we do not store IP addresses or unique User agent strings. We use aggregate, non-personal search data to improve things like misspellings." [1]
- Despite bangs simply referring to another search engine, "Bang" queries are still send to and stored by DuckDuckGo (this could be solved with Javascript is enabled, or in one of its extensions/apps)
- DuckDuckGo knows whether you're scrolling down on the page since website icons are lazy loaded
- On the Hidden Service website icons are still fetched from duckduckgo.com
- DNS registration information is protected by WhoisGuard
- Google has released the Duck.com domain name for DuckDuckGo in 2018
- Apple (in 2014) and Mozilla (in 2018) have added DuckDuckGo as an search engine option
- DuckDuckGo used to set cookies even though they said they didn't [2]
- DuckDuckGo used to submit the URL you're clicking on to DuckDuckGo's servers
[1]: https://duckduckgo.com/privacy
[2]: http://www.alexanderhanff.com/duckduckgone
---
A few alternatives:
- Searx [3]
-Qwant [4]
- StartPage [5]
[3]: https://github.com/asciimoo/searx/wiki/Searx-instances
[4]: https://www.qwant.com/
[5]: https://www.startpage.com/
/g/ R:10
L:
[D][S][L][A][C]E-Mail encryption options
Right now the most popular way to encrypt your mail is with PGP. However, it's a one-time key exchange system. So if some CIA niggers manage to break the encryption, the entirety of the conversation is decrypted. Are there any layers to be added onto this? For non-throwaway exchanges, I was thinking of something ratchet-based - like the encryption instant messengers use. Their one-on-one conversations aren't different from e-mail anyway. For example, you'd keep the PGP layer, but exchange the initial keys for the ratchet as well, deleting the first email from the server or using another/throwaway address for it. That way, the entire dialogue can be read only if you got your hands on the letter with the keys. But I'm sure there are better ways.
/g/ R:10
L:
[D][U][F][S][L][A][C]what can you archive on HDD?
jews make goyim store everything in (((cloud))) so jews can shut it down and know what they have
post things that you can archive on your HDD to defeat jews
-software, operating systems, video games
-porn, child porn, animal porn, erotica
-books, tutorials, recipes (what kind of?)
-websites, articles (about what?)
-terrorist materials, how to make bombs guns, how to kill people and regime, how to destroy earth and humans
-music, videos, movies
-pedo guides, tutorial, how to fuck a child in real life and make it pregnant
what else?
also, HDD alternatives for archival? optical discs etc
post things that you can archive on your HDD to defeat jews
-software, operating systems, video games
-porn, child porn, animal porn, erotica
-books, tutorials, recipes (what kind of?)
-websites, articles (about what?)
-terrorist materials, how to make bombs guns, how to kill people and regime, how to destroy earth and humans
-music, videos, movies
-pedo guides, tutorial, how to fuck a child in real life and make it pregnant
what else?
also, HDD alternatives for archival? optical discs etc
/g/ R:15
L:
[D][S][L][A][C]F-Droid wa mou shindeiru
>In the past week, a controversy around F-Droid took place at its forum and in the fediverse. We feel like we have to put out a public statement to clear F-Droid’s position on it.
>To recap the situation: a website joined the fediverse only half a month ago that is well known to be a “free speech zone”, meaning it claims to tolerate all opinions. While in theory this might seem to be a good concept, it has serious consequences: things like racism, sexism, verbal abuse, violent nationalist propaganda, discrimination against gender and sexual minorities, antisemitism and a lot more things become popular on such instances. For good reasons, all these things are prohibited on the clear majority of instances in the fediverse. Because of this, yet even before mentioned website joined the fediverse, most instances already blocked it.
>The developers of Tusky, one of the most popular app to access the fediverse on Android devices, decided to go a step further by implementing a mechanism that doesn’t allow to log into mentioned website. Fedilab on the other hand decided not to implement such a mechanism, stating that it’s ineffective (more on this below) and that a tool’s developer should not decide which people are allowed to use it.
>F-Droid as a project soon celebrates its 9th birthday. In these 9 years, F-Droid’s mission was and is to create a place where people could download software they can trust – meaning only free, libre and open source software is available on its flagship repository. As a project, it tried to stay neutral all the time. But sometimes, staying neutral isn’t an option but instead will lead to the uprise of previously mentioned oppression and harassment against marginalized groups. We don’t want and won’t support that. F-Droid is taking a political stance here.
>F-Droid won’t tolerate oppression or harassment against marginalized groups. Because of this, it won’t package nor distribute apps that promote any of these things. This includes that it won’t distribute an app that promotes the usage of previously mentioned website, by either its branding, its pre-filled instance domain or any other direct promotion. This also means F-Droid won’t allow oppression or harassment to happen at its communication channels, including its forum. In the past week, we failed to fulfill this goal on the forum, and we want to apologize for that.
>We believe platforms like F-Droid’s repository or fediverse instances must be moderated in order to prevent oppression and harassment to flourish. We think, however, that one needs to differentiate between platforms and tools. By its very nature, free software by definition allows users “to study how the program works, and change it so it does your computing as you wish”. Because of this, any restriction implemented in free software is basically ineffective, because people can modify the source code and remove those restrictions. We respect Tusky’s decision to block mentioned website; it’s their right to introduce restrictions like these into their software. We also respect Fedilab’s decision not to hardcode a login block; instead they are actively working on making it easier to block certain domains in the app itself and thus giving users more power to moderate which content they’ll see. If people disagree with F-Droid’s decision not to flag Fedilab, a idea is to develop a decentralized tag system based on package IDs which allow third-party servers to share their own warnings with their community.
https://f-droid.org/en/2019/07/16/statement.html
Cumskins ruin every project they touch. They are willing slaves to the jew. I guarantee that everyone who had a major say in this decision was a white male.
/g/ R:23
L:
[D][U][F][S][L][A][C]Version Control System and Issue Tracking
What is the ultimate way for VCS and Issue Tracking?
Is Version Control System useful for personal projects developed by one person?
I tried some program but I did not like that it cloned my project files into another place. It also produced some folders. Which VCS is simplest in folder structure?
Also, what to do if I have project A, B, C. and those three project share some code between them? How to edit and commit that code? where should it belong? should the shared code be a separate project?
How about issue tracking? Is that needed in one man project? What software should I use for it?
How about using VCS for non-programming projects? What do you think?
Is Version Control System useful for personal projects developed by one person?
I tried some program but I did not like that it cloned my project files into another place. It also produced some folders. Which VCS is simplest in folder structure?
Also, what to do if I have project A, B, C. and those three project share some code between them? How to edit and commit that code? where should it belong? should the shared code be a separate project?
How about issue tracking? Is that needed in one man project? What software should I use for it?
How about using VCS for non-programming projects? What do you think?
/g/ R:4
L:
[D][S][L][A][C]Capital One Hacked
>Capital One Financial Corp (COF.N) said on Monday that personal information including names and addresses of about 100 million individuals in the United States and 6 million people in Canada were obtained by a hacker who has been arrested.
>[Paige] Thompson posted information from her hack, which occurred between March 12 and July 17, on coding platform GitHub. Another user saw the post and notified Capital One of the breach.
>hacker was able to gain access to the data through a misconfigured web application firewall, the U.S. Attorney's office said.
https://www.reuters.com/article/us-capital-one-fin-cyber/capital-one-says-information-of-over-100-million-individuals-in-u-s-canada-hacked-idUSKCN1UO2EB
>[Paige] Thompson posted information from her hack, which occurred between March 12 and July 17, on coding platform GitHub. Another user saw the post and notified Capital One of the breach.
>hacker was able to gain access to the data through a misconfigured web application firewall, the U.S. Attorney's office said.
https://www.reuters.com/article/us-capital-one-fin-cyber/capital-one-says-information-of-over-100-million-individuals-in-u-s-canada-hacked-idUSKCN1UO2EB
/g/ R:21
L:
[D][U][F][S][L][A][C]German state bans Office 365, Apple and Google
Based Germans. Will Nordic countries like Norway, Denmark and Sweden wake the fuck up already?
>A data authority in the German State of Hesse has warned Microsoft's Office 365 cannot be used in schools.
>[...] the standard Office 365 configuration creates privacy issues.
>data [is] stored in the cloud by the productivity suite could be accessed in the United States. Specifically, personal information from teachers and students would be in the cloud. Ronellenfitsch says even if the data was held in centers in Europe, it is still "exposed to possible access by US authorities".
>Furthermore, the Federal Office for Information Security (BSI) added that Windows 10 also transmits "a wealth of telemetry data to Microsoft".
>"What is true for Microsoft is also true for the Google and Apple cloud solutions. The cloud solutions of these providers have so far not been transparent and comprehensibly set out. Therefore, it is also true that for schools the privacy-compliant use is currently not possible".
Source:
https://arstechnica.com/information-technology/2019/07/germany-threatens-to-break-up-with-microsoft-office-again/
Original source:
https://datenschutz.hessen.de/pressemitteilungen/stellungnahme-des-hessischen-beauftragten-f%C3%BCr-datenschutz-und
/g/ R:35
L:
[D][U][F][S][L][A][C]Superior Software
Post software that hold such a superiority to its competition that it's dumbfounding.
I'll start with uMatrix
>MUCH less bloated than most *standalone* script blockers and *standalone* ad blockers
>superior features
>superior user control
>increases performance while most of its competition does the opposite
>only unusable to """tech-illiterates""" who can't handle more than one shiny button at a time
/g/ R:4
L:
[D][U][F][S][L][A][C]OpenWRT Security
I currently use OpenWRT router. How can I make it more secure and private?
Removed most of bloat packages (IPv6, PPP), removed HTTP server (connecting through SSH). What else can I do?
inb4 install openbsd
no, it's not possible
Removed most of bloat packages (IPv6, PPP), removed HTTP server (connecting through SSH). What else can I do?
inb4 install openbsd
no, it's not possible
/g/ R:16
L:
[D][U][F][S][L][A][C]Terminal Tor Browser
Firefox was a terrible choice for a "privacy and security oriented" web
browser to support. All the arguments in favor of it regarding usability and
use familiarity are moot when Firefox is so anathema to privacy and security.
What's the point in meticulously writing Tor itself in C if the browser you
ship is going to be a giant disgusting monster like Firefox anyways?
People will tell you not to use Tor with any other browsers because your
circuit doesn't change when you connect to new domains, but how hard would this
really be to implement for a simpler browser like Lynx?
/g/ R:13
L:
[D][U][F][S][L][A][C]>near 2020
>no making your own food with open hardware yet
http://axqzx4s6s54s32yentfqojs3x5i7faxza6xo3ehd4bzzsg2ii4fv2iid.onion/watch?v=-J1DNp4M_1k
Also:
>plants
>not arthrospira platensis
/g/ R:7
L:
[D][U][F][S][L][A][C]The Death of References
Of course shills are everywhere and it's becoming much more difficult to get away from them, but this is still a topic worth visiting from time to time. We live in a world where your average user is assaulted with ads disguised as legitimate information pretty much everywhere.
If I'm trying to direct a typical person toward information, is there anywhere to go that isn't bending the knee to the dollar? Misinformation is everywhere, but there have to be sources out there somewhere, right?
If I'm trying to direct a typical person toward information, is there anywhere to go that isn't bending the knee to the dollar? Misinformation is everywhere, but there have to be sources out there somewhere, right?
/g/ R:25
L:
[D][U][F][S][L][A][C]Anonymous Speech
How would nanochan anonymize a spoken recording of someone in a way completely resistant to analysis from glow in the dark adversaries? I imagine that even if you fucked with the pitch of the voice and all that you could still be identified your general cadence and style of phrasing.
All I can think of is something like speech to text > anonymouth > text to speech which should be pretty secure but would be potentially error prone and probably would have a fairly significant delay. Can any nanons think of something better?
What's the best privacy respecting text to speech option?
The nanochan internet radio thread got me interested in whether or not we could have a functional anonymous DJ. Having an actual girl as the host doesn't seem very on brand to me but having a female digital voice seems cyberpunk as fuck.
/g/ R:21
L:
[D][U][F][S][L][A][C]"Isis Agora Lovecruft" (powerword: Sarah Michelle Reichwein) has been going around for several years accusing people prominent in the technology and cryptography communities of sexual harassment and even rape. Now she's being sued for libel.
https://www.courtlistener.com/docket/14868600/todd-v-reichwein/
You may remember when this insane Jew slut accused Jacob Appelbaum of all kinds of sexual misbehavior and got him booted from the Tor Project. They (yes, they caught the gender theory bug and now identifies as "nonbinary") then went after several other people, including Nadim Kobeissi (of CryptoCat fame) and, apparently, Peter Todd, the guy who's suing her (yeah, I'm not actually going to play the retarded pronoun game).
It's interesting because some of the affidavits submitted form a veritable who's-who of modern crypto. Appelbaum submitted one, and so did Daniel J. Bernstein, and Nadim Kobeissi. The court documents and affidavits are interesting to read; Appelbaum refers to Reichwein as "they" throughout, respecting her prounouns, so he's still a faggot cuck even after these crazy twitter trannies tried to destroy his life.
Because it's a lawsuit being filed in California, almost everyone mentioned in it is either Jewish or Asian, of course. Reichwein, Appelbaum, Rosenfeld, Bernstein, Ryu, Kwun. It's going to be Jews jewing Jews under the supervision of Asians.
|
|>
|
|₪
|_
https://www.courtlistener.com/docket/14868600/todd-v-reichwein/
You may remember when this insane Jew slut accused Jacob Appelbaum of all kinds of sexual misbehavior and got him booted from the Tor Project. They (yes, they caught the gender theory bug and now identifies as "nonbinary") then went after several other people, including Nadim Kobeissi (of CryptoCat fame) and, apparently, Peter Todd, the guy who's suing her (yeah, I'm not actually going to play the retarded pronoun game).
It's interesting because some of the affidavits submitted form a veritable who's-who of modern crypto. Appelbaum submitted one, and so did Daniel J. Bernstein, and Nadim Kobeissi. The court documents and affidavits are interesting to read; Appelbaum refers to Reichwein as "they" throughout, respecting her prounouns, so he's still a faggot cuck even after these crazy twitter trannies tried to destroy his life.
Because it's a lawsuit being filed in California, almost everyone mentioned in it is either Jewish or Asian, of course. Reichwein, Appelbaum, Rosenfeld, Bernstein, Ryu, Kwun. It's going to be Jews jewing Jews under the supervision of Asians.
|
|>
|
|₪
|_
/g/ R:2
L:
[D][U][F][S][L][A][C]Who was your best AI companion in vidya, who talk, explore and may be even don't stand on your way?
/g/ R:38
L:
[D][U][F][S][L][A][C]Dangers of compromised hardware in mass surveillance
Assuming all proprietary computer hardware is compromised by the NSA, how potentially damaging is that for a security minded user?
Is it possible for a machine running fully free and open source software to send undetectable glow in the dark surveillance data if the user is able to monitor network traffic? From a telemetry perspective, something like IME/PSP wouldn't be able to frequently upload data without it being noticeable, and it wouldn't be able to secretly store data long term right?
What exactly are the most dangerous theoretical privacy/security risks posed be having secretly compromised hardware?
/g/ R:32
L:
[D][S][L][A][C]Optimism in tech
>compsci at university
>lecture on securely writing web applications
>suddenly lecturer says "running javascript on webpages is not normal. the modern internet is horrible with everyone being taught to use these frameworks and fill pages with tonnes of javascript. Do you know what they are running on your computer?" and rants about JS
>asks how many people disable JS in some form
>more than three people raise their hand
That is the closest I have come to ejaculating on campus
/g/ R:22
L:
[D][U][F][S][L][A][C]Loudspeakers and audio general
Hey, let's talk about loudspeakers and audio reproduction in general (and save our comrades from audiofoolery). Headphone fags not allowed.
Obligatory links to get up to speed:
* https://numeralnine.wordpress.com/2013/10/09/a-brief-guide-to-audio-for-the-skeptical-consumer/
* http://sound.whsites.net/articles.htm
The tl;dr is:
* Active speakers have been the future for decades already; don't bother with passive stuff.
* Forget non professional (studio) stuff unless you're a faggot.
* Generally, the more measurements the brand produces, the more trusty it is: Neumann and Genelec are the top dogs here. You can also look at ATC's SCM50ASL or PMC's IB2S-AII when you feel like your bank account has way too many digits.
* Start with Yamaha's HS5/HS7 or Presonus's Eris E5/E8. The Behringer B2030A is also quite interesting (a Genelec monitor clone).
* Forget subwoofers, they're almost always inferior to 3 ways (room correction nightmare, 2 ways' woofers aren't proper midrange drivers, trip to THDland unless you spend quite a lot).
Question: has anyone here actually heard the priciest stuff like the aforementioned ATC, PMC or pic related (Genelec 8260A)?
/g/ R:4
L:
[D][U][F][S][L][A][C]>coinbase jews me out with their transfer fees
>say I owe them more money than I bought because a transaction failed
Are there any exchanges without this gay aids? I want to switch to Kraken but I'm not sure if things will be any better or less gay.
/g/ R:1
L:
[D][S][L][A][C]Twitter to RSS
TwitRSS is not working. Does anyone know a alternative?
>minimum characters of 100, wow
https://github.com/ciderpunx/twitrssme
>minimum characters of 100, wow
https://github.com/ciderpunx/twitrssme
/g/ R:5
L:
[D][U][F][S][L][A][C]Exploit using HEVC video
>near 2020
>exploited by a video file
Software sucks.
>CVE-2019-2107
>In ihevcd_parse_pps of ihevcd_parse_headers.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android.
https://nvd.nist.gov/vuln/detail/CVE-2019-2107
PoC:
https://github.com/marcinguy/CVE-2019-2107
/g/ R:6
L:
[D][U][F][S][L][A][C]Chat platforms
I've tried out a deluge of chat apps and always one thing or another that makes them trash or hard to us. Take retroshare for instance with it's dogshit UI and unusable feature bloat, or things like qtox or xmpp clients that can't create groups without spazing out with their retardation. Is there anything worth investing in getting?
/g/ R:10
L:
[D][U][F][S][L][A][C]servers
Bear with me...
I looked at servers and they basically look like computers, but with more space for hard drives.
Questions:
What is the difference between [distro] and [distro] Server?
Can I use GUI like on normal computer to configure stuff?
How do I make it home server/hidden service/seedbox? Briefly, no need to get in details.
If I configure to only allow Tor connections then I'm safe?
What are some interesting uses in home other than what I mentioned?
I know this sounds stupid, but I genuinely don't know.
/g/ R:24
L:
[D][U][F][S][L][A][C]torrents
I use private trackers exclusively and I feel embarrassed looking what public sites have to offer, they have so fucking poor collection of things in the worst possible quality or no stuff at all. DDL sites will be behind ads and file sharing sites resembling early 2000s when speed was slowed down at purpose to buy premium account. Torrents are shit or have no seeds. The only exception is rutracker that is considered by me to be private tracker by quality of content. When my trackers are gone sure, I'll use rutracker. But when even this goes gets busted, I'm fucked content wise. With so much internet users, tons of sites and speeds faster than anytime in internet history why s piracy a big joke? Oonly elitist circle-jerks walled gardens are worth attention but it can be hard and time consuming joining them.
How do you pirate, excluding weebs? nyaa is shit compared to weeb private tracker but yeah for most it will fit the bill (and xdcc).
/g/ R:12
L:
[D][U][F][S][L][A][C]Superoptimization
How do I get started with superoptimization /g/? I hear it's this magic way to make (very short) pieces of code as fast as possible by trying huge numbers of instructions. Is it actually useful or is it just a meme? For example, if I wanted to superoptimize a strlen() function, how long would it take?
/g/ R:9
L:
[D][U][F][S][L][A][C]Raspberry Pi 4 Announcment
>two USB 3.0 ports
>two USB 2.0 ports
>gigabit ethernet port
>two Micro HDMI ports (with 4K dual monitor support)
>USB-C port for power
>Broadcom BCM2711 SoC with four 1.5GHZ Cortex A72 CPU cores
>Three variants with different RAM amounts
>$35 model with 1GB of RAM
>$45 model with 2GB of RAM
>$55 model with 4GB of RAM
>also some $120 combo that comes with the Pi 4 with 4GB of RAM and a keyboard, a mouse, a USB-C power supply, a computer case, a guidebook, a 32GB microSD card pre-loaded with NOOBS and Raspbian, and two Micro HDMI to Standard HDMI cables
/g/ R:15
L:
[D][U][F][S][L][A][C]Meet Grin - the private & lightweight mimblewimble blockchain
What's Grin?
>Electronic transactions for all. Without censorship or restrictions.
>Grin empowers anyone to transact or save modern money without the fear of external control or oppression. Grin is designed for the decades to come, not just tomorrow. Grin wants to be usable by everyone, regardless of borders, culture, skills or access.
Private
>Grin has no amounts and no addresses. Transactions can be trivially aggregated. To hide where a newly created transaction comes from, it gets relayed privately (a "random walk") among peers before it is publicly announced.
Scalable
>MimbleWimble leverages cryptography to allow most of the past transaction data to be removed. This guarantees Grin won't crumble under its own weight in the long term.
Open
>Grin is developed openly, by developers distributed all over the world. It's not controlled by any company, foundation or individual. The coin distribution is designed to be as fair (but not gratis) as is known to be possible.
>Grin is under development. Launch planned for Jan. 15th 2019.
/g/ R:14
L:
[D][U][F][S][L][A][C]video codec without decoding
cameras that record in cinema DNG produce files with bitrates 6-20 times the max DCP standard used in cinemas. However real-time playback of such files requires computers with specs quite a ways beyond typical cinema server specs, and beyond what is affordable for most humans at the moment. Most people don't buy higher-TDP laptops nowadays, either, and few buy laptops with quadros and radeon pros which would be needed for 10-bit color playback or theoretical RGBCYM colorspaces fitting within those 30 bits (maybe there is extra room in the alpha channel(s); am not expert in this).
while i certainly don't mind producing great footage and films for a small number of computers and downressing for more-mainstream devices, i feel another solution exists.
if we sequence the pixel values of completely-uncompressed frames such that we can copy straight to the framebuffer, wouldn't we only be limited by the SSD read speeds and interface (including interface traffic on mobo controllers)? I have thought about loading video clips into RAM for ultra-high-bitrate video but that feels like more of a (potentially useful) magic trick rather than something pragmatic for most film/video production and distribution. The financial costs of distributing films/videos via SSD are not trivial, yet I feel this leap in image fidelity may be important for us getting naturalistic art noticed amidst a sea of commercial films. I say this because great films do appear periodically and don't typically penetrate mainstream consciousness, despite their virtues and transcendental accomplishments. They certainly have profound ripple-effects, yet I feel it might be good to have some forthcoming films make obvious and pronounced waves partially by leapfrogging all the big-budget stuff on a technical level (technical in terms of audiovisual fidelity, anyway).
are there resources to consult to program something like this? i tend toward C++. alternatively, is anyone here interested in designing a codec or codec set based on the principle of minimal-to-no-decoding? a tool for transcoding and debayering (ideally for many display subpixel layout types) from cinema DNG would be most helpful for low-budget filmmakers, with transcoding from the open arri raw format being potentially desirable for ~600 MBps alexa 65 footage (i don't recall the precise bitrate). personally i don't feel i will often film beyond the 272 MBps of the blackmagic pocket cinema camera 4k, but perhaps we and/or others will imagine cases that call for an alexa 65 or future cameras from other manufacturers. one of the out-of-production kinefinity cameras had a bitrate in the 300s (i think it was the first-gen Terra) but it hardly seems worth tracking down for a modest bump in bitrate; for some that camera is perhaps a dream camera though and it is worth looking into. one of the DJI cameras records a similar bitrate yet i don't know much about filming with it and whether it has a practical form factor when not mounted to a drone. anyway BMPCC cameras have been $1k and a bit more kitted with good memory cards and batteries and such, and the first BMPCC once saled for $500. we can get a lot of amazing footage from people who would not have been able to afford cinematography in the past. even iPods film above the 30 MBps DCP standard so we can totally start projects that will have a baseline fidelity above that of other contemporaneous cinema.
thank you for reading and for your interest and consideration
/g/ R:12
L:
[D][U][F][S][L][A][C]Why idea of adding simple artificial personalities (independent, private and offline) to household appliances is so strange for normies? I can't find almost any researches or projects and not sure how to explain why I want to start one.
/g/ R:24
L:
[D][U][F][S][L][A][C]Images and privacy
It's relatively easy to track down who somebody can be just by the images they upload, especially if they're on a close environment with a relatively small pool of users. Every time you repeatedly post an image you will always be showing a part of yourself, and if you use it even more frequently, not only are you lowering the quality of the board by repeating content, but you're also making yourself easier to target.
To which I'd like to ask, how do you defend yourself from being tracked down through images, if you have a small amount of them? Only two ways to fix that would be to either massively start saving whatever you see, or making original content, which even then can be tracked down to you. There must be even more alternatives, one can attempt to change the names of the files every so often, but even then, if there is a pattern of images that's being posted that guy can still be easy to track down
/g/ R:6
L:
[D][U][F][S][L][A][C]How Linux / GNU / UNIX File System Function Works Tutorial Part1
Hellyo users from Nano Chan. Todday I warite a post about how FILE SYSTEM work in LINUX/UNIX/GNU system (after 1990) in order to educat yourself and me/myself and also educate I/myself about file system function working functionalities.
In root direcotory is called / there is following folder directories (box in which to store file) which directory is also a folder. / directory folder is specifal so that it is root (ROOT) / #1 directory folder in directory folder fiunction structure.
/bin is folder for BINARY file. Binary file is a file made of 1 and 0 like computer file. It is more space efficient way to store file than normal so to move all system file such as execute file and program file in here to save space. /bin has executable file generatly. But because it is more spece efficiency way to store file you can also put Recycle items in here to save the enviroment. This is /bin/ like Recycling bin is how i remembered.
/boot is folder for boot item. It is used to store and protect all item for boot usage. Such as the boot required files and boot system file.
/dev is used for devices. Devices such as Hardened Disk Drive (HDD) and newer technology Solid Storage Disk (SDD) uis stored and used inside of this directory folder /dev. It also maybe used for in order to store the developer development files and file required for developer to develop. Mainly but however it use to store DEV files.
/etc is used for ETC files such as not important files. Usually it made for text and writing file. I think this /etc/ directory folder just used for not important file. Normally I am moving all /ETC file to /Bin to save more space. Except for System D file which is very impotant for system's function and operate.
/home is used for home/domestical usage INTERNET OF THINGS (IoT) device setting. It is most important Directory folder in LINUX/GNU/UNUIX systems.
I will post next Episode of this tutorials on file linux system UNIX hierarty and structures of GNU/LINUX/UNIX system. Tmoroow. Thank you sir.
/g/ R:6
L:
[D][U][F][S][L][A][C]Utopia beta test
We are looking for the best beta testers to take part in closed testing of a new decentralized peer-to-peer network. The network is supported by users and offers high-quality features as well as a smooth user interface. The main functions are confidential communication and secure financial transactions. All information is impossible to steal, and all conversations stay private. With our ecosystem, you will be able to send instant text and voice messages, exchange files, create group chats and channels, view news feeds, conduct private discussions. Moreover, our network has an inbuilt browser , API and financial functionality. Join us https://beta.u.is/
/g/ R:3
L:
[D][S][L][A][C]open bsd on tegra and power pc
hi there! am interested in developing computers and would like to design hardware for open bsd. i feel going with tegra X1 onward and power 9 onward is the cpu path i would like to focus on. may i receive some gentle guidance from more experienced tech enthusiasts? i feel i know a lot about tech; been immersed in it deeply since the early 90s and am pretty good with engineering projects, physics, math, et cetera (being aware of the limits of these fields in how they describe things and aid/hinder engineering). but there are a lot of things i don't understand and it is challenging to do feasibility assessments on designing new computers for modest-scale manufacturing.
are there good books to read on motherboard design and sample manufacturing? or should i focus more on component and feature selection and then approach supermicro or gigabyte or toshiba or someone to design the motherboards to spec? i can write up design documents and 3D model computer designs and such yet i imagine there will need to be a base of enthusiasts into these projects and support from the open bsd team before anyone commits engineering resources and substantive funding to such projects. before reaching out to many software authors for potential ports of great software from other architectures i would like to have some nice design PDFs ready. will work on 3D modeling some hardware concepts in the coming weeks as i tinker with a new modular mobile computing setup. lots of hardware varieties could come later but i would like to focus on making a few computer styles that are not offered by the windows, mac/ios, linux, and android hardware manufacturers. where to go beyond that would be up to the people committed to the initial projects. for transparency, i do think a bit like nintendo and sega and prefer to focus attention on a few iterative concepts at a time. it is good to conceptualize a lot of hardware designs, yet if we have clear goals with software design then a few computers would emerge from that design phase and attention would then turn toward refining those so that software designers can plan to utilize the full feature sets of the console-computers
/g/ R:35
L:
[D][U][F][S][L][A][C]Saying it is a Honeypot doesn't make it one
>don't use X service it's a honeypot
>trusting x, an actual honeypot
>is X a honeypot
Unless there is proof that whatever your saying is actually a trap (what honeypots are) then the claim is equivalent to saying that an unmeasured object exists.
If you are actually worried if service or application X is a honeypot do your own research and see if there were any examples if that service being used to prosecute someone.
Also if your going to claim something is a honeypot it would be more constructive to say what would make you trust service X as not a honeypot like it being opensource or something.
Seriously getting really annoyed how everyone is getting super paranoid over anything including opensource projects.
/g/ R:7
L:
[D][S][L][A][C]Florida fucked up by ramsonware
Damn, apparently everything stopped working, even 911 calls, and they are considering just paying the money (they are asking for $600.000):
http://axqzx4s6s54s32yentfqojs3x5i7faxza6xo3ehd4bzzsg2ii4fv2iid.onion/watch?v=75OsPTe-Glc
/g/ R:7
L:
[D][S][L][A][C]Action required by citizen
Greeting Nanon, i'am here to inform you about the recent changes regarding the recent development in the handling of your digital rights, we are proud to present you your new government mandated social media account and your new government mandated pocket cloud terminal, as by stated by the new law to combat extremism and pedophilia you are obliged to keep you pocket cloud terminal always with you for identification, note that interaction data, voice data and location data will be collected and stored in government controlled servers and used to calculate your social score which will affect the availability of the citizen services you may use, note also that you also need to surrend every non government approved device in your possession.
You have 2 weeks to conform, after the grace period your social score will be slashed every week and after one month your bank account will be frozen and agents may be dispatched.
The cost of the government mandated terminal will be of 499 Libras and will be automatically detracted from you next salary accredit, you don't need to take any action here, this will be done automatically through your government issued Calibra wallet.
Thanks for your collaboration.
digitally signed J. Glowenstein ## Ministry of digital wellbeing
/g/ R:19
L:
[D][U][F][S][L][A][C]Using SD cards for secure "air-gapped" file transfer
Using USB sticks to transfer files across multiple computers is certainly not secure since the USB bus allows for Direct Memory Access and an USB device can pretend to be anything by changing its firmware/software.
Now, SD cards are far more limited as to what they are allowed to access on the host computer and offer only an SPI interface to write to and read files from it. Now, what do you think is it reasonably secure using an SD card to transfer files or not?
<Just use CD/DVDs
That's an option though it is quite bulky and quite wasteful (for write-once CD/DVDs)
/g/ R:12
L:
[D][U][F][S][L][A][C]Any notable sources of useful, salvageable tech that normal niggers throw away because they're either too stupid to fix or don't care? Not talking about sources of meth metal or shithole scrappers.
If you do any sort of hardware projects, there are many reusable, serialized parts, that you can pull from such things that won't be associated with your purchasing history.
One such item that is commonly overlooked are the wifi modules used in smart TVs and wireless printers. Bluetooth modules are also used in some other devices, these can probably be salvaged as well. Most will have datasheets online so you can find out how to integrate them into your project.
http://archivecaslytosk.onion/7zPs3
https://alexkaltsas.wordpress.com/2014/07/22/hacking-a-printerss-wifi-module/
/g/ R:9
L:
[D][U][F][S][L][A][C]What's going on in Iran?
https://metrics.torproject.org/userstats-relay-table.html?start=2019-06-01&end=2019-06-19
Iran 982925 (31.93 %)
Russia 399279 (12.97 %)
United States 397622 (12.92 %)
Germany 167448 (5.44 %)
France 130288 (4.23 %)
United Kingdom 75470 (2.45 %)
Ukraine 64393 (2.09 %)
Indonesia 64070 (2.08 %)
India 53115 (1.73 %)
Netherlands 52308 (1.70 %)
Compare to last month
Russia 380274 (18.35 %)
United States 379891 (18.33 %)
Germany 165657 (7.99 %)
France 110393 (5.33 %)
Indonesia 95484 (4.61 %)
United Kingdom 73322 (3.54 %)
Ukraine 68498 (3.30 %)
India 53256 (2.57 %)
Iran 52986 (2.56 %)
Netherlands 47673 (2.30 %)
https://metrics.torproject.org/userstats-relay-table.html?start=2019-05-01&end=2019-05-19
/g/ R:3
L:
[D][U][F][S][L][A][C]Starlink
ignoring all the other times Elon Musk's promises failed and were forgotten. He claimed that Starlink would have no cost other than the device that connects to it. Although it is counter intuitive for something to not be capitalized on immediately, I don't see how it can easily identify someone and if they are paying for the service without slowing down the system severely. Prove me wrong.
/g/ R:0
L:
[D][S][L][A][C]Yubikey Reduced initial randomness on FIPS keys
>This could allow an attacker who gains access to several signatures to reconstruct the private key.
https://www.yubico.com/support/security-advisories/ysa-2019-02/
Reminder to use Nitrokey instead folks:
https://www.nitrokey.com/
Don't forget to compile and update the build-in firmware:
https://github.com/Nitrokey/nitrokey-storage-firmware/
https://www.nitrokey.com/en/documentation/firmware-update-storage
/g/ R:1
L:
[D][U][F][S][L][A][C]Let's play the systemd game
https://github.com/reyk/systemd-openbsd
>Run everything except rc as PID 1.
>Randomly delete files (systemd-file)
>Randomly kill processes (systemd-proc)
>The file /systemd-score.txt got corrupted. You won.
>The file /sbin/init got corrupted. You won
/g/ R:3
L:
[D][S][L][A][C]local-wireless shared & synced music streaming
greetings! ^_^ it may be interesting to develop a cross-platform mobile app that let multiple people listen to audio from the host device with perhaps a short buffer and time-dilation to keep devices synced. many like to DJ and i feel the path out from the sketchy clubs and into more wholesome environments (whether they be naturalistic, adventure sports venues, or cyberpunk clubs with great food rather than excessive innebriants, or whatever else-- just better than the places DJs usually get hired at the moment) would be to generate loud sound volumes through modular sound emission rather than large high-electricity speakers. dovetailing this would be innovations with low-electricity and portable sound tech. some are here, some are incoming from established and also new audio tech engineers. environmental acoustics are a part of the discussion also, but i am personally focusing a bit more on the sound emitters at the moment.
would anyone here be interested in collaborating on such an app? it can grow to incorporate the features people want who are working on it and/or following along with its development. would like to say this is a paid coding gig yet i will have to advocate on your behalf for funding as i am without money at the moment. am about to meet up with a legendary DJ tomorrow though so it is quite plausible we can find funding for you quickly or relatively quickly. i have free time to co-engineer this and, i suppose, quite a bit of relevant knowledge aside from the actual programming and API stuff specific to iOS, Android, Mac OS, Windows, Linux, game console OSs, etc . Platforms would be your choice if you want to promote certain OSs over others. i do insist on iOS as the exquisite music programs, inter-app audio, and stuff like iConnectivity devices makes iPod and the more-expensive devices very nice musical instruments for creation and sharing. am typing this on android on tor and utilize a lot of OSs though; will follow programmers on what they would prefer to prioritize.
thanks for reading and thank you for your consideration. i check nanochan a few times weekly, will answer questions and write about my experiments with cheap and low-electricity sound emission. for events with few mobile receivers an assumption is perhaps to be made that we will multiply the audible volume somewhat with cases, fruits, flowers, nuts, rubber, transducers, crystals, environmental acoustics, headphones, speaker proximity to ears, environmental quietness, adjustments to air for acoustics, consuming foods and entheogenic plants for increased sonic acuity, et cetera et alia. i do feel some quick tweaks to the electrical audio tech bits, like a new portable speaker design, could yield a surprising jump in volume for lightweight battery-powered devices.
okay, more soon. take good care! ^_^
/g/ R:57
L:
[D][U][F][S][L][A][C]Is there good hardware? I tried PC, smartphones, Raspberry pi and orange pi and all this is shit. Especially smartphones. I heard that STM32 is good. For it there is Linux config.
But I can't find any capasitive displays, resistive only. Why those chiness nigger can't make handy physical interfaces? Wires is too thin.
Also, can I use PCI operating memory with STM32?
What interfaces can replace shitful USB?
How to use ugly HDMI with STM32?
/g/ R:7
L:
[D][U][F][S][L][A][C]Future of money and finance
Your OS is libre.
So is your web-browser.
This website is libre.
But you continue to use proprietary payment networks like VISA, PayPal, and even banks.
The powers that be want to eliminate hard cash and will probably get their wish. But the future of money is bifurcated.
On one hand - proprietary payment networks. Financial censorship and hardship await your arrival.
On the other - cryptocurrency, decentralized finance and an open programmable ecosystem of money. It is not just Bitcoin. A lot has been happening but the information is confined - certainly available but you won't see it covered on the news. There is an underlying trend. If you dismiss any mention of crypto you won't see it.
/g/ R:12
L:
[D][U][F][S][L][A][C]Myanee Host
I've created the first iteration of my darknet hosting site. Right now it's a little limited in that all sites are hosted in folders off the main domain. It works like this due to the fact that the box that it is currently being hosted on has no direct access to the internet, meaning the box that hosts the tor hidden service is not on the same machine as the registration, scp / sftp, and web server. In the future I plan on having some mechanism for syncing between them. Also right now it is just for static sites only, and you have a quota of 100MiB. In the future I could open it up to running dynamic stuff considering the box isn't exposed to the internet meaning you can't intentionally figure out the actually ip of the server.
Anyways, if you want to register an account you can just telnet into the hidden service, or netcat in on port 23. After setting up an account you can use your credentials to scp / sftp files onto your site. I'm looking forward to any feedback you Nanons have about my project.
https://myanee7lkwzxkhupjxvu2sxtkuf57lkvr3wutf3vfvnhkxuei7h3xbad.onion/
/g/ R:14
L:
[D][U][F][S][L][A][C]Lossy Audio Codecs / Ignorance of Codec Obsolescence
>need to deal with using lossy audio rather than lossless audio for whatever reason
>mfw its codec isn't opus
Why do the VAST majority of niggers use any lossy codec over opus? I can't think of anything aac, speex, (god forbid) mp3, etc. offer over it. It's not like, say, h264 vs. h265 where the superiority of h265 over h264 is not entirely linear; h265 requires about 10x the cpu power to decode compared to h264, for example.
There are no trade-offs with opus like there are in the world of lossy video codecs. It's just flat out superior and technically obsoletes all other lossy audio formats. A quick run down of why opus is best:
>lowest latency (lower than codecs designed specifically for latency at the cost of quality and bit rate range
>highest quality per bit (higher than proprietary codecs like aac)
>abnormally large bitrate range (no other lossy codec besides maybe vorbis even remotely competes)
I could go on. Alas, what do nanons think about ignorance of codec obsolescence? Why do so many people have trouble recognizing something as objectively superior?
/g/ R:3
L:
[D][S][L][A][C]robin hood tech
hello, hope everyone is well. =)
without going into long stories, i will simply say that i would like to be like robin hood. i have pulled off many amazing accomplishments and rich people fear me as a result, which is not what i had anticipated. i have a lot of friends, mentors, and heroes who are struggling financially and i wish to get money for them. i am not the sort of person who acts like it is bad to want money. there are innumerable ways to help regenerate our world that involve monetary exchanges along the way.
there is an arbitrarily large and increasing money supply that is horded, devaluing the savings of the proletariat. peasants everywhere cannot save in the way they did in inflation-free societies.
does anyone have any ideas how to steal money effectively from places that wouldn't notice the loss? or any evil targets that are incapable of responding aggressively?
is there tech and know-how for this? if i am on my own i will probably just flee to wilderness as i don't have l33t hacker skills. my artistic technological skills are quite good, so maybe i could seduce lonely rich ladies or something if anyone knows where to find them. i have sort of been trying that though and it is not going as hoped.
i am up for stealing cash i suppose but that does seem super nerve-wracking. i am only interested in taking money from corrupt people and those types seem to be paranoid about theft.
i refuse to believe we are being oppressed to the degree where noble theft is implausible. and yet, it does seem surprisingly difficult. i feel nanochan is a great place to brainstorm about this. if one wishes to hire me for a heist i am quite skilled, but would need basic travel funding if it is a physical thing.
suggestions for normalized ways of making quick money also welcome. i am trying to raise a few thousand dollars in a week or so though so the methodology would have to be a sure thing, more or less.
general venting about anything also welcome. i will lament with you and help shoulder the burdens of perspicacity ^_^
/g/ R:37
L:
[D][U][F][S][L][A][C]Why Windows is undebatably better than Linux
Open a text editor and hold "a","s", and "d" at the same time. On Windows this will correctly output:
asdasdasdasdasdasdasdasdasdasd
while on linux:
asdddddddddddddddddddddddddddd
It can't be fixed, it's a fundamental issue with X11. Linux is fucked
/g/ R:21
L:
[D][S][L][A][C]Creating a Tor bridge
Hey /g/, I'm trying to write a guide to set up a Tor bridge and run it off a "trusted friend's" network but I'm having diffuclty intalling it myself. I have posted what I have so far of the guide to the pastebin link https://pastebin.com/KniDPavg. I'm having problems when I get to step 6 in my guide and type apt update and apt install tor deb.torproject.org-keyring. I keep getting these error messages https://pastebin.com/AjduWKxB. Once this guild is fully completed and troubleshooted it would be good to put in the board sticky thread or on a wiki if we have one. Also this can be a Tor disscusion genral I guess.
/g/ R:5
L:
[D][S][L][A][C]Forking Linux and I don't Like OpenBSD
Call me a nigger loving Jew fag money hungry ass licking donkey fucking shill, but I don't like OpenBSD.
I like what OpenBSD stands for. I think it's noble how seriously they take security and code cleanliness. I respect practitioners of wise, old traditions. But god damn, using OpenBSD feels to me like a punishment.
Here are some critiques:
- They download firmware on the first boot without asking you (yeah, I know it can be removed using fw_update -da, fuck you.).
- Their package manager is dog shit. Seriously, even Debian's Aptitude is better than OpenBSD's package management tools.
- Their console is fucked. They've tried to implement Latin diacritics into it(probably because it's built in Canada and they want to type in French) and it makes using the console a fucking pain in the ass.
- Their audio system is pretty weird. I couldn't get it to work properly on my X200, and on other computers it would play sound from all available outputs at once. Granted, I was too fucking lazy/stupid to try and configure it, but still.
- Their compilers complain if you use C's basic string functions instead of their safer replacements. I understand where they're coming from and this isn't even an issue, but god damn, shut the fuck up.
- They include GCC by default. Yeah, they don't _use_ it by default and it's the (((industry standard))) (although this argument doesn't even make sense since they don't include gmake, which is required to execute some Makefiles designed by assholes), but I'd like to avoid using that shit if I'm not on Linux.
- OpenBSD is pretty fucking slow. I don't know if it is because their kernel is still biglocked or whatever other reason they may have, but I was struggling to run a simple dwm setup on my X200 under OpenBSD while a Fedora livecd I've had laying around absolutely flied with GNOME and Firefox and all that kikery.
I've got mad respect for OpenBSD because they do a lot of shit quite well (using a simple MAKEDEV script rather than implementing something like Udev, their minimal bootloader, their clean philosophy and style of code and their overall conservative attitude are just a few examples), but it's just not that usable for me when I want to just get shit done.
My ultimate setup currently consists of a simple Gentoo with all kikery (SystemD, GNOME, etc) disabled in the USE flags. A simple dwm workflow with st and a few essential programs. I use tcc to compile all of the programs that I write (and it more than suffices), and for web browsing I run Icecat over TOR through a Void chroot. I always use Linux 4.9 as it works well on all of my hardware. I'd really like to clean the code, remove many things, audit for any kike backdoor that may have been implemented and maybe one day even get the whole thing to compile under tcc. Currently I don't know much about kernel development and I work on many other projects, but with all the people you've had a while back crying "fork" at the then newly CoCed Linux, I've decided to go ahead and do it. I've decided to call it Buttox and host it on NotABug.org.
https://notabug.org/ae/buttox
I don't want to innovate anything, just minimalise and remove as many things as possible. I'd prefer doing things myself rather than making this another gay ass open source community project, so please refer me to books on Linux development and kernel development in general, make suggestions or just call me a faggot.
/g/ R:16
L:
[D][U][F][S][L][A][C]How to live off the grid and fight the power
Is free software the answer? I believe that anti-surveillance techniques will be the best and most meaningful way to achieve liberty on the internet.
/g/ R:15
L:
[D][U][F][S][L][A][C]The Headphone/Speaker Tuning Variation Question
What do you think about the unification of the audio frequencies of electromechanical devices which produce sound? Do you believe that music and sound in general could be further optimized by such a standard? Or do you question the viability of this prospect due to believing the only genres of music that sound bad with flatter frequency curves are normnigger trash anyway; and thus made solely for normnigger, v-shaped frequency curve audio equipment? If everything had a frequency curve like pic related (Status CB-1), would it be a good thing?
Can explain what I mean more if it doesn't make sense.
/g/ R:3
L:
[D][U][F][S][L][A][C]Rulecuck "programmers"
Why can't a rulecuck into formalism? Why can't they follow a simple API acording to its rules? Literally 20 of the Java or C# "programmers" in the world know about the memory model, and the rest are spewing latent concurrency/compilation induced bugs everywhere - for example not marking variables as "volatile" where needed. Because they're lazy incompetent fucks. Look up any man page and find explicit examples of pitfalls they describe, and you'll find 99.999% of code that exists falls for them. For example:
>A successful return from write() does not make any guarantee that data has been committed to disk.
>If a write() is interrupted by a signal handler before any bytes are written, then the call fails with the error EINTR
Even something as simple as these two. The rulecuck may do some of them right but the majority of his code will ignore every single detail of the API and publish his code as long as it sounds right at a syntactic level
this is how he reads or writes code:
>write(username_fd,username,username_len);
>oh obviously that line writes a username to the file designated by username_fd, next line
>crossing the street is illegal
>gets mad when someone crosses the street which is empty for 300 meters
>proudly restates the rationale for the rule at any given opportunity
>knows 30,000 of these rules
<i didnt know that was a rule
>THATS NO EXCUSE FUCKO
But as soon as he starts programming, it's just "PROGRAMMING IS HARD!", and "it's just a minor issue, the market doesn't care, we'll just fix it after they complain". Their code is literally just composed of this. The primitives of what they use to build a product are an invalid API call and an invalid construct of the programming language.
/g/ R:47
L:
[D][U][F][S][L][A][C]Poz://a just remotely disabled millions of addons
I opened Tor Browser earlier and immediately got a yellow banner across the top saying that some of my addons had been disabled. NoScript, in this case.
I opened regular Firefox, and found that all of my addons were disabled, with no option to re-enable.
Note that I had updated neither Tor Browser or Firefox: apparently Pozilla's ability to remotely JUST your fucking addons is built in to the current versions of the browser.
https://www.reddit.com/r/firefox/comments/bkfg00/also_had_all_my_addons_disabled_and_cant/
Yeah, yeah, I know, reddit. But that's the only place I can find talking about it.
/g/ R:22
L:
[D][U][F][S][L][A][C]What hashing algorithm to use?
I'm writing a program that stores files addressed by their hash digest, now I'm wondering what hashing algorithm to use.
I was inclined to go with BLAKE2b because of its speed an security but it isn't used much and I'd rather use something that is more commonly used so I can possibly deduplicate without having to hash the same file twice.
I'm guessing SHA256 is the most commonly (8chan and Nanochan uses this) used and still secure enough (though not against length extension attacks)
But it is also twice as slow as BLAKE2b ... so what should I do use something that almost no one uses but is more secure and faster or use something that is less secure and slower but more commonly used so I can use it more often to deduplicate without having to hash a file twice.
Or should I simply hash the file multiple times... (which kind of defeats the performance gains of BLAKE2b)
Sorry, I'm having trouble with making decisions
/g/ R:24
L:
[D][U][F][S][L][A][C]Mah Software
Hello, my name is Icchimarin Raspitrik from Deus-One-No State of ███████ and ████ ████, I'm 15 aged minicraft dev, miniDF-ni dev, in future minifactorio-ni dev, but It's thread not about this.
It's about open (free almost) software that I distribute and develope sometimes.
My soft:
0. https://gitlab.com/Ninikaita/nnaamapeiko nnaamapeiko — map visualising instrument. For now it is being refactoring, and this version supports only tile planeting. I stoled many shots from g00gle mapS and watch it sometimes. Maybe I will make low-zoom Earth map from some resources as example. Next step to visualize maps is add OSM support. I know about Marble, I don't like it.
Nnaamapeiko is made by some components:
libnnaamapeiko.so — main lib for drawing and accessing content.
TilePlanet.so — module for loading and displaying tile planets. Has major bug, because of which I not implemented threaded tile loading yet.
nnaamap — C written SDL2 map.
pynaska (future) — Python written Qt application.
nnaamap and pynaska has differing GUIs.
1. https://gitlab.com/Ninikaita/jdavabrav/ Jdavabrav — modular web-browser writtent on Python with PyQt5. Has GET and POST-operations (without files). Has options for each tab. Inconvenient yet.
This 2 softs is useless, but in future maybe, usable.
2. [deleted] mctagfs — an application, that mounts tagged filesystem to directory from data directory and list. It was profitful for me, but thereat I found out about hard links and become gloomy. Maybe it will be resurrected at someday.
3. [future] ████████ — compiler-interpreter for █████ programming language. I made it for 20%, at end of May will be released plus website plus some libraries for this PL.
static typed, compilable, parallel-and-cluster-computable with multivalue operations.
4. [future] a launcher for freedesktoped programs and own launchers. Main feature is huge icons and grid-layout. I wanted mature application, but not found. It's simple Qt launcher, I want it use on i3 and go to i3. If you know such program, let me know.
5. [future] GUI, my own GUI. Neither Qt, nor GTK, nor EFL I like.
bytes Stream based, so can be used from files, MCUs, networks and other applications as modular GUI. Backends may be OpenGL, Vulkan and own rasterizer.
6. [future] File Manager. I would contribute to existing file manager, but I want make it with my GUI. Somewhen I tried a file manager for android and opened a directory with images, it was beatiful, this big images, that I see, I want to repeat but on GNU/Linux (No, I mean free system where all made of modular components such as Linux kernel, user libraries and applications)
7. [future] document ML like HTML.
IIIIIIII HHHHHHHAAAAAAAAAAATTTTTTTEEEEEEEEEEEEE WEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEB. I make Jdavabrav because of this, but I still hate JS + some other web technologies. HTML and CSS also isn't good things for me, so I want to make my own hypertext document ML based on my GUI.
7. [future] My own raytracing rasterizer. I want make this. I don't like OpenGL becuase it don't support curves (yes?) and I want raytracing for better 3D without "shaders" or what it is. I know that OpenGL is standart, supported by a lot of hardware facturers, but with █████ and OpenCL (maybe) I can speed up computations of rendering.
Are you thinking I want only make my own software? No, I would contribute to some existing software, such as a text editor, but I don't have so, that I would like. If find, maybe get.
And LLVM, but I don't know the architecture well, and Don't like C++, and don't know what kind of objectives there is.
Tesseract OCR is also good program, but I don't know sources also and objectives too.
In this blog I will write about my software, updates and other things.
L:
[D][S][L][A][C]Best way to deanonymize bits of information
I keep getting spam calls and would like to figure out who is behind the numbers. What is the easiest way to do this without paying websites for subscriptions?
/g/ R:23
L:
[D][U][F][S][L][A][C]I make a math library for my own programming language. I want know what functions there should be, but I don't know math.
The library contain sin, asin, sinh, asinh and other trigonometic functions, log/ln/lg/lb, sigmoid, transpose. Also I going to add interpolation and other functions to image/tensor processing. Also I would like to know, if is there application to integration and differentiation of functions. In my language is callable objects, so I can easly replace sin() function to same object, that calls as sin(), and has deriviative and antiderivative functions. I also want know functions to process tensors, such as transpose and interpolation of images, Ghaus what.
Also I want to know about optimizations. At some day I got knowledge how to compute Fibonachi by matrixes, but I didn't understand yet. Also I think about memoization, caching of results.
What do you think?
/g/ R:32
L:
[D][U][F][S][L][A][C]Security OS general
>get Qubes for convenient online identity separation and sane attitude to security
[one imageboard later]
>realize Fedora (dom0) is bloated fuck with strong commercial influence
>realize Linux is just a hobbyist kernel with poor overall design partly due to being so old
>[spoiler]realize OpenBSD is probably just as vulnerable as Linux kernel due to lack of devs, and the other alternatives are even more dead and with less creator integrity[/spoiler].
L:
[D][S][L][A][C]Hoe do websites know you are using Tor?
Is there a master list of Tor exit nodes somewhere? And how can the Tor project fix this?
/g/ R:68
L:
[D][U][F][S][L][A][C]Linux Distributions with no systemdicks
https://distrowatch.com
The following distributions match your criteria (sorted by popularity):
Please note: Some distributions, such as Linux Mint, offer multiple editions with different init systems.
1. PCLinuxOS (20)
PCLinuxOS is a user-friendly Linux distribution with out-of-the-box support for many popular graphics and sound cards, as well as other peripheral devices. The bootable live DVD provides an easy-to-use graphical installer and the distribution sports a wide range of popular applications for the typical desktop user, including browser plugins and full multimedia playback. The intuitive system configuration tools include Synaptic for package management, Addlocale to add support to many languages and Mylivecd to create a customised live CD.
2. Slackware Linux (32)
The Official Release of Slackware Linux by Patrick Volkerding is an advanced Linux operating system, designed with the twin goals of ease of use and stability as top priorities. Including the latest popular software while retaining a sense of tradition, providing simplicity and ease of use alongside flexibility and power, Slackware brings the best of all worlds to the table. Originally developed by Linus Torvalds in 1991, the UNIX-like Linux operating system now benefits from the contributions of millions of users and developers around the world. Slackware Linux provides new and experienced users alike with a fully-featured system, equipped to serve in any capacity from desktop workstation to machine-room server. Web, ftp, and email servers are ready to go out of the box, as are a wide selection of popular desktop environments. A full range of development tools, editors, and current libraries is included for users who wish to develop or compile additional software.
3. Android-x86 (48)
Android-x86 is an unofficial initiative to port Google's Android mobile operating system to run on devices powered by Intel and AMD x86 processors, rather than RISC-based ARM chips. The project began as a series of patches to the Android source code to enable Android to run on various netbooks and ultra-mobile PCs, particularly the ASUS Eee PC.
4. Gentoo Linux (51)
Gentoo Linux is a versatile and fast, completely free Linux distribution geared towards developers and network professionals. Unlike other distros, Gentoo Linux has an advanced package management system called Portage. Portage is a true ports system in the tradition of BSD ports, but is Python-based and sports a number of advanced features including dependencies, fine-grained package management, "fake" (OpenBSD-style) installs, safe unmerging, system profiles, virtual packages, config file management, and more.
5. Tiny Core Linux (88)
Tiny Core Linux is a 12 MB graphical Linux desktop. It is based on a recent Linux kernel, BusyBox, Tiny X, Fltk, and Flwm. The core runs entirely in memory and boots very quickly. The user has complete control over which applications and/or additional hardware to have supported, be it for a desktop, a nettop, an appliance or server; selectable from the project's online repository.
6. Absolute Linux (105)
Absolute Linux is a light-weight modification of Slackware Linux. It includes several utilities that make configuration and maintenance easier and it has many common desktop and Internet applications installed and configured with tight integration of menus, applications and MIME types. Absolute Linux uses IceWM and ROX for its window and file managers.
7. Star (113)
Star is a desktop-oriented Linux distribution based on Devuan GNU/Linux. Star is available in a range of editions, each featuring a lightweight desktop environment. Star is small enough to fit on a CD and uses SysV init software.
8. Guix System Distribution (126)
Guix System Distribution (GuixSD) is a Linux-based, stateless operating system that is built around the GNU Guix package manager. The operating system provides advanced package management features such as transactional upgrades and roll-backs, reproducible build environments, unprivileged package management, and per-user profiles. It uses low-level mechanisms from the Nix package manager, but packages are defined as native Guile modules, using extensions to the Scheme language.
9. heads (170)
heads is a privacy-focused Linux distribution designed to make it easy for users to access the Internet anonymously using the Tor network. heads is based on Devuan and features only free (libre) software. The Linux kernel has had non-free blobs removed.
10. Funtoo Linux (175)
Funtoo Linux is a Gentoo-based distribution developed by Daniel Robbins (the founder and former project leader of Gentoo Linux) and a core team of developers, built around a basic vision of improving the core technologies in Gentoo Linux. Funtoo Linux features native UTF-8 support enabled by default, a git-based, distributed Portage tree and Funtoo overlay, an enhanced Portage with more compact mini-manifest tree, automated imports of new Gentoo changes every 12 hours, GPT/GUID boot support and streamlined boot configuration, enhanced network configuration, up-to-date stable and current Funtoo stages - all built using Funtoo's Metro build tool.
11. RancherOS (176)
RancherOS is a tiny Linux distribution that runs the entire operating system as Docker containers. This includes system services, such as udev and rsyslog. RancherOS includes only the bare minimum amount of software needed to run Docker. This keeps the binary download of RancherOS very small. Everything else can be pulled in dynamically through Docker.
12. Refracta (185)
Refracta is a Linux distribution based on Devuan GNU+Linux (a systemd-free fork of Debian), designed primarily for home computer users and also for use as a system rescue and recovery disk. It provides a simple and familiar layout using the Xfce desktop. Other desktop environments and additional software packages are available from the Devuan package repository. Besides providing a Linux distribution on a live CD, the project also develops useful tools, such as refractainstaller, refractasnapshot and refracta2usb which allow users to customize the installation and create custom live CD or live USB images.
13. CloudReady (197)
CloudReady is an operating system built and maintained by Neverware. Based on Google’s open source Chromium OS, CloudReady uses web apps and cloud storage instead of traditional software and local storage. The CloudReady distribution is available in free and commercially supported versions.
14. Lunar Linux (198)
Lunar is a source based Linux distribution with a unique package management system which builds each software package, or module, for the machine it is being installed on. Though it can take a while to do a complete Lunar installation it's worth it as it tends to be quite fast, once installed! In the beginning Lunar was a fork of Sorcerer GNU Linux (SGL). The fork occurred in late January to early February of 2002 and was originally made up of a small group of people who wanted to collaboratively develop and extend the Sorcerer technology. The original name for the project was Lunar-Penguin but the group decided to re-christen it Lunar Linux while the Lunar-Penguin name has become a sort of umbrella which the team could use if they decide to collaboratively develop something besides Lunar Linux.
15. Parted Magic (199)
Parted Magic is a small live CD/USB/PXE with its elemental purpose being to partition hard drives. Although GParted and Parted are the main programs, the CD/USB also offers other applications, such as Partition Image, TestDisk, fdisk, sfdisk, dd, ddrescue, etc. In August 2013 the distribution became a commercial product and is no longer available as a free download.
16. Trusted End Node Security (213)
Trusted End Node Security (TENS), previously called Lightweight Portable Security (LPS), is a Linux-based live CD with a goal of allowing users to work on a computer without the risk of exposing their credentials and private data to malware, key loggers and other Internet-era ills. It includes a minimal set of applications and utilities, such as the Firefox web browser or an encryption wizard for encrypting and decrypting personal files. The live CD is a product produced by the United States of America's Department of Defence and is part of that organization's Software Protection Initiative.
17. Fatdog64 Linux (221)
Fatdog64 Linux is a small, desktop, 64-bit Linux distribution. Originally created as a derivative of Puppy Linux with additional applications, Fatdog64 has grown to become an independent Linux distribution while still keeping the style of Puppy Linux.
18. Cucumber Linux (243)
Cucumber Linux aims to provide a Linux distribution that is usable as an every day, general purpose operating system. It aims to this in as minimalistic a way as possible and in a way that follows the Unix Philosophy. Cucumber Linux favors simplicity and modularity of design over simplicity of use. While developed independently, Cucumber's design is heavily influenced by Slackware Linux.
19. Source Mage GNU/Linux (247)
Sourcemage is a source-based GNU/Linux distribution based on a Sorcery metaphor of 'casting' and 'dispelling' programs, which we refer to as 'spells'.
20. RasPlex (266)
RasPlex lets you turn your TV into a Smart TV. Similar to the AppleTV, but running on a Raspberry Pi computer and completely free and open source, RasPlex is basically a set-top box that lets you play content from your computer or smart phone to your TV. RasPlex currently uses LibreELEC as its base OS.
/g/ R:11
L:
[D][U][F][S][L][A][C]Monitor Comfort
Purely from a comfort standpoint, which would you rather have: a high resolution, color accurate, [insert adjectives benefiting screen image quality] monitor with a max refresh rate of 60hz, or a low still-quality monitor with a max refresh rate higher than 60hz? Why? What pains your eyes less, low fidelity or low fluidity?
/g/ R:28
L:
[D][U][F][S][L][A][C]What is the most optimal way for a complete tech noob to get as anonymous as possible? I ask this because recently I've gotten really paranoid redpilled about everything tech-related stuff, but I'm quite literally as unknowledgeable about it as someone posting on site can be. But this also interests me on a purely hypothetical level.
So let's first assume Linux is not an option for OS: even if I was capable of learning how to use it with intense enough autism, your average normie wouldn't. So what would one go for? Get some old Windows OS like XP onto a laptop you obviously never use for non-anonymous posting/messaging? Or is there another option? Surely the older OS's aren't as riddled with backdoors etc. as the newer ones right? What about e-mail, is something like ProtonMail the most optimal, even despite it not being actually that anomymous in specific situations? Duckduckgoy for browser, or is there something better a tech noob could use with some effort?
Of course it can be debated what is the most effort one should have to put into it with it still being "tech noob -friendly". That would probably depend on the goals: if it's anonymity for anonymity's sake, not too much effort would make sense.
/g/ R:53
L:
[D][U][F][S][L][A][C]Creating Chaos
How do you spread chaos and deception?
I can see you have an understanding of OPSEC. You may know that hiding is not enough for most. The solution is chaos. Noise. False data. False information. Deception.
This works against AI. It even works against most humans too.
You ask if I use google? Yes. I abuse google. I never use google as a service. One time a week I go to google just to tell it lies. Same with other services and search engines. When their databases get stolen, all they get is fake information. If any real information exists from years ago, it is an outlier to be ignored.
What are your methods of chaos? What are advanced methods?
Teams of people can create very good chaos as mentioned in the paranoid's big book of deception. Maybe indian clickfarms will lie for me if I pay them to! More fun then google robot tests.
/g/ R:6
L:
[D][U][F][S][L][A][C]I stripped these components out of a broken washing machine (and the motor, drum etc.). What can be done with them, if anything? From top left to bottom right:
>bearing housing
>splined gear
>splined shaft with bearing surface and gear
>spring-thing used as a sort of clutch
>three spur gears
>splined square thing
>bearing races and balls
/g/ R:7
L:
[D][U][F][S][L][A][C]Intel-Aviv
fuck intel-aviv
my high-end 4 core laptop is now just a 2 core shitter with no power because of intel-aviv
and openbsd disables (((hyperthreading)))
fuck jewtel
/g/ R:9
L:
[D][U][F][S][L][A][C]I got a job in tech
I'm an old hand at computer repair. A little too old. I just got a job in tech support and computer repair. Where are some tutorials aimed at lower level (as in more detailed) technical people for Windows 7, Windows 8, Windows 10, and newer Linuxes?
What's new in X, new command line arguments, and so forth
pic unrelated
/g/ R:19
L:
[D][S][L][A][C]Fixing tech
How could we fix the problems within the tech industry? Which threats should be prioritized? Digital threats can usually be worked around with enough programmers, but physical threats require much more effort to mitigate. Physical threats include DNA recording, anti-tor policies, CCTV, and ISP control. So far, the best plan I've thought of would be educating more people so that they vote better people into power. Should a revolution break out, we'd need people to support the revolution and resist suppression.
/g/ R:16
L:
[D][S][L][A][C]Hacknet
we search hackers and programmers or persons who want to learn this art
http://y3qsbrsy7lhmi2uvkakp6o5rq37hc67ysbj6sqadlh4czm7mp6fv5uid.onion/Hacknet/Hacknet.html
/g/ R:48
L:
[D][U][F][S][L][A][C]Rust
Is it actually good or just another SJW language? Should I bother learning it, or focus on getting better at C?
/g/ R:21
L:
[D][U][F][S][L][A][C]EU Puts An End To The Open Internet: Link Taxes And Filters Appr
>EU Puts An End To The Open Internet: Link Taxes And Filters Approved By Just 5 Votes
> Well, it was a nice run while it lasted, but the EU Parliament has just put an end to the open internet. By the incredibly thin margin of just five votes, the Parliament voted to approve the EU Copyright Directive, including the terrible versions of both Article 11 and 13. This is an inauspicious day and one that the EU will almost certainly come to regret. While we now need to see how each of the member states will implement the actual laws put forth in the Directive (meaning the damage in some states may be more mitigatable than in others), on the whole the EU Copyright Directive requires laws that effectively end the open internet as an open communications medium. Sites that previously allowed content creators to freely publish content will now be forced to make impossible choices: license all content (which is literally impossible), filter all content (expensive and failure-prone), or shut down. Sites that used to send traffic to news sources may now need to reconsider, as doing so will inexplicably require payment.
>At best, the EU--for all its complaints about Google and Facebook--has just locked both companies into a dominant position. They can afford this. Others cannot. And, the legacy gatekeepers in the media and entertainment business will quickly pivot to seeking to export this model elsewhere.
>The MEPs who voted for this are up for election in two months, and hopefully the EU shows them the door, but in the meantime, today is a sad day for the open internet. I am sure that some will be celebrating on the false belief that this will magically "help artists." It will not. You just handed more power to giant companies, and took it away from creators. In time, one hopes, those who mocked the protesters and activists and actual experts will come to realize just how much they destroyed today.
https://www.techdirt.com/articles/20190326/05584741869/eu-puts-end-to-open-internet-link-taxes-filters-approved-just-5-votes.shtml
/g/ R:10
L:
[D][U][F][S][L][A][C]>$ uptime
> 7:31AM up 69 days, 21:19, 5 users, load averages: 0.35, 0.40, 0.39
What's the longest you've gone without rebooting? My previous high-score was 43 days.
Change the timestamp in the output of uptime to avoid deanonymization.
L:
[D][S][L][A][C]Git Host
Is there a Git host willing to host white nationalist content? On the plain net? GitGud is not working for me. They don't respond to support requests either.
/g/ R:40
L:
[D][U][F][S][L][A][C]Is ProtonMail a honeypot?
>no option to run without pajeetscript
>puts your private key on (((their))) server so you can access it anywhere (but so could they)
>Created scientists from CERN and MIT and got funding from 12 states
>Israel became CERN's 21st Member State on 6 January 2014
>Israel and MIT: Celebrating eight years of growth at the Institute
>no POP3 support
>offers Proton Bridge as alternative
>only available for paid ProtonMail users
>not available on Linux
So /g/ should we use a .onion email service or host our own servers locally for privacy?
/g/ R:34
L:
[D][U][F][S][L][A][C]Technological fuckups
I have two stories. One of them is slightly modified in order to avoid giving out ident info.
>be me, a total unix noob
>learn about an os called uboontoo
>look in the root directory out of curiosity
>see a folder called /bin
>hmm... why is it full?
>the recycle bin should be empty right?
>delete everything in it, click through all gksudo warnings like a wincuck
>mfw system won't boot
second one
>be me, working at a shitty company
>all scheduling information and medical information about customers held in web based database written in php
>it's possible to upload arbitrary files into the server through the shitty javascript ajax text editor
>upload .php file for shits and giggles
>it runs
>mfw
I never reported that last one to IT people. Couldn't give two shits if they were hacked, PHPniggers deserve it.
L:
[D][U][F][S][L][A][C]Is MongoDB still trash? I formed that opinion after using it for a few months, but that was like 7 years ago.
/g/ R:9
L:
[D][U][F][S][L][A][C]Lavabit Disappointment
I'll admit I've been looking forward to the re-launch of Lavabit. Viable USA-based email is scarce, and it's easy to understand why. The founder clearly has some integrity, though, risking his personal freedom and his business for his principles. But if the price didn't put me off, a quick review of the new Lavabit's privacy pledge would: http://archivecaslytosk.onion/IE5rM
>On a final note, the Lavabit e-mail servers do record the IP address used to send an outgoing message in the header of an outgoing e-mail. Because of this, it is possible for the recipient of a message to identify what IP was used to send a message. We record this information in the message header so that law enforcement officials in possession of a message that violates the law can identify the original sender. Lavabit does not retain this information.
This is a deal-breaker for me. The current crop of private German providers strip IP addresses from outgoing messages, as does cock.li. There seems no excuse for this today. Although depending on the outcome of a recent case with one provider, the end may be neigh for German providers, too: http://archivecaslytosk.onion/iWgtk
/g/ R:2
L:
[D][S][L][A][C]watching TV like a goy
if you wanted to watch TV, what would you choose:
USB dongle VS set top box
USB dongle
+cheaper
+allows you to record TV out of the box
+very small
+can be used to receive other types of radio (SDR)
-requires some drivers and software, possible chinese backdoor and botnet
-uses your CPU a lot, can be expensive (power usage) and slow down other things on your PC
-soykaf quality, could be unreliable, destroy your PC, or just die
Set-top-box
+can be connected to any monitor, TV, etc you don't need a PC for it to work
+is isolated, you just connect output signal to monitor or PC, cannot hack your PC
+doesn't use your CPU power, it has it's own CPU, takes power from wall plug
+reliable, good quality, won't harm your PC
-more expensive
-if you want to record you need some additional device
-bigger, heavier
-cannot be used to receive other types of radio than the ones implemented
/g/ R:41
L:
[D][U][F][S][L][A][C]Cock.li down
https://cock.li or http://cockmailwwfvrtqj.onion/ was down due to a raid by the glow in the dark people.
Do you still trust cock.li nano/g/?
/g/ R:35
L:
[D][U][F][S][L][A][C]Hello friends
I made this http://heyuri.cf/index.php
How should I improve it?
And how do I get a deep web link for it?
plz don't bully >~<
/g/ R:2
L:
[D][U][F][S][L][A][C]What does /g/ think about iMule?
>iMule is based on the aMule source code and uses the Kademlia algorithm and the I2P network.[2] The eDonkey network used in eMule and aMule, which connects through servers, has been dropped. iMule downloads and shares files without revealing the IP addresses and identity of its users.
>Like aMule, iMule aims to be portable over multiple platforms with the use of the wxWidgets library. Supported systems include Linux, Mac OS X, various BSD-derived operating systems, Windows and Solaris.
>Due to BitTorrent popularity and lack of censorship, the necessity to install the software I2P in order to configure the I2P router with proxy 127.0.0.1 port 4444 before going download iMule from the eepsite http://echelon.i2p and download the file nodes.dat, the software failed to gain popularity.
L:
[D][U][F][S][L][A][C]>tfw there are things like onionshare that allow you to share files through tor but you are too scared because you can't be sure if files are safe
Damn, trust is a difficult thing.
/g/ R:11
L:
[D][U][F][S][L][A][C]Is tor vunerable to Stegosploit tecnique?
https://thehackernews.com/2015/06/Stegosploit-malware.html
>TLDR
>Malicious code or exploit is encoded inside the image’s pixels, which is then decoded using an HTML 5 Canvas element that allows for dynamic, scriptable rendering of images.
>The malicious code, dubbed IMAJS, is a combination of both image code as well as JavaScript hidden into a JPG or PNG image file. Shah hides the malicious code within the image’s pixels, and unless somebody zoom a lot into it, the image looks just fine from the outside.
>fucking javashit
Is this even patchable? It seems like 90% of the exploits in tor come from javascript.
Only solution I can think of would be if the browser reformated the images before displaying them. But that sounds resource intensive.
/g/ R:24
L:
[D][U][F][S][L][A][C]GUI 101
GUI programming is easy as fuck. You just need to not be an obvlivious lazy shithead
Format:
>How it should be
<What actually happens
>The user operates in milliseconds. Not hundreds-thousands of milliseconds. 20ms or less
<Hurr durr your system is slow just get a new computer bruh
<t. fag who thinks he has a fast computer because a hamburger menu only takes 1000ms to open
>Have hotkeys for pretty much everything
<Hamburger menu and shit that has no hotkeys and makes you wait 3 seconds before showing the contents of the menu
>Don't have shithead surprise functionality
<Booting bloated grub3 in library
<Have "nigger" as one of the boot entries
<spam enter key so niggers behind me don't see it
<system speaker beeps 5 times
>Opening a new window should happen instantly. The window will be grey box until the program loads and paints to it (needs WM support). If you can actually see the box it means the program is shit
<You click the button to open your shitty bloated file or web browser and nothing happens, so you continue working in your text editor while waiting for it to load, then the window you requested finally opens while you're typing and gets fucked up
>Don't have a single program instance if you can't even fucking do it right
<Firecuck stays open in the background after you close it. If you try to reopen firecuck in this situation, it will make you wait a few seconds, then show a popup saying "firecuck is already open". WELL THANKS FOR NOTHING SHITHEAD
>If your disk really is as fucking slow as modern software makes it look, stuff like the text editor, image viewer, and file browser (all of which should be tiny) should be in memory at all times
<Takes 30 seconds to start any "minimal" file browser after boot
<Windows superfetch bullshit doesn't work because it tries to be smart instead of having an explicit list of programs to be cached, and they're all bloated and either waste entire RAM or knock each other out
>LCD screens are incapable of displaying animations. There is literally no way to show animated content in a non-retarded way for 99.9999% of users. Stop fucking trying
<Slide tabs across the screen, which become blurry, juddery, and unreadable
<Bonus points to every program which has one or more of the following: no vsync, input lag, judder, user is not allowed to press buttons while waiting for the animation to end
>It's completely unacceptable for a GUI to freeze for over a second. If you need disk access or something else that's slow as fuck, it should be done in motherfucking parallel
<Program freezes for multiple seconds while loading some retarded shit from disk or IPC. even just to open a menu (it's 2019 after all)
Webshit
>I don't fucking care if your website has cookies. I already knew it did in 1990. Fuck your privacy policy, I don't give a shit about your claims, don't waste 1/3 of the page telling me all this bullshit. Fuck your popups
<"CONCENT FORM". really...
<https://www.popsci.com/consent.php?redirect=https%3a%2f%2fwww.popsci.com%2fheavy-metals-baby-food
<needs JS to load the "consent" button
<I don't care if your manager or some retarded regulator asked you to put this here. Punch them in the face
>Don't be a retard fuck
<Firecuck makes you wait for a round trip to the server before letting you choose where to save the file
<Firecuck had a "disable popups" option that never fucking worked, and they finally removed it after 15-20 years
Omitting JS points because everyone already hates it
L:
[D][U][F][S][L][A][C]/sqt/ - Stupid Questions Thread
hey! i have a stupid question and figured i'd start a general since it seems there isn't any.
i'm trying to launch source of nanochan on an ubuntu vm but i get the following error:
[code]/bin/sh: 3: Syntax error: "(" unexpected[/code]
it seems that the script is using haserl and i have that installed and changed up shebang to where binaries of it are located on my machine but it still does not work. any ideads of what the issue might be, bros?
/g/ R:36
L:
[D][U][F][S][L][A][C]Federation networks
are you using any ActivityPub software? Pleroma? Mastodon? Peertube?
discuss ActivityPub in general
https://fediverse.party/
https://fediverse.network/
https://blog.soykaf.com/post/what-is-pleroma/
https://git.pleroma.social/pleroma/pleroma
https://github.com/Chocobozzz/PeerTube
https://github.com/syuilo/misskey
L:
[D][S][L][A][C]South Korea Censorship
South Korea government started to censor to foreign https websites. But it's similar to China, not North Korea.
https://www.reddit.com/r/privacy/comments/apfvod/south_korea_starts_censoring_illegal_https/
/g/ R:17
L:
[D][U][F][S][L][A][C]Article 13 and the EU Copyright Directive has been finalized
What’s in the EU Copyright Directive
>Hot off the press, take a look at the final wording of Article 11 and Article 13. Here’s my summary:
Article 13: Upload filters
>Parliament negotiator Axel Voss accepted the deal between France and Germany I laid out in a recent blog post:
> Commercial sites and apps where users can post material must make “best efforts” to preemptively buy licences for anything that users may possibly upload – that is: all copyrighted content in the world. An impossible feat.
> In addition, all but very few sites (those both tiny and very new) will need to do everything in their power to prevent anything from ever going online that may be an unauthorised copy of a work that a rightsholder has registered with the platform. They will have no choice but to deploy upload filters, which are by their nature both expensive and error-prone.
> Should a court ever find their licensing or filtering efforts not fierce enough, sites are directly liable for infringements as if they had committed them themselves. This massive threat will lead platforms to over-comply with these rules to stay on the safe side, further worsening the impact on our freedom of speech.
Article 11: The “link tax”
>The final version of this extra copyright for news sites closely resembles the version that already failed in Germany – only this time not limited to search engines and news aggregators, meaning it will do damage to a lot more websites.
> Reproducing more than “single words or very short extracts” of news stories will require a licence. That will likely cover many of the snippets commonly shown alongside links today in order to give you an idea of what they lead to. We will have to wait and see how courts interpret what “very short” means in practice – until then, hyperlinking (with snippets) will be mired in legal uncertainty.
> No exceptions are made even for services run by individuals, small companies or non-profits, which probably includes any monetised blogs or websites.
L:
[D][S][L][A][C]C++ is cancer
I am currently compiling a C++ program, and even with 8GB of RAM + 8GB swapspace, the compilation fails due to an out of memory error. What abomination of a programming language is this?
Can somebody honestly explain to me, in which situations would C++ have any advantage over C?
Autosaging my own thread because it's a bit of a rant.
/g/ R:3
L:
[D][U][F][S][L][A][C]Retroshare thread
CQEGAcOWxsFNBFxYr1sBEADB9fDFLr4IJQg1OFEC27XoClHykd3BNdgfIrqAja7G
K102hwY2TXncMoEPLulvl+VE0IWiL0sd6YaErcaz31xCHyCktacW/f+5wBFotbS9
lPQ7p6Wha9acB+tH7QO/qvWQHwX6zEpyAJs7g0l3CnwzsgJYFJ3URBSLH6+JgjEl
tgRrvqOH/H0+MdnrUifCGh+GLLiuQreTRGGBXDxpc3kkQp9QgyTLt+ZoXhw5xQc4
tPN2dKThL8j85GohkH55q4ha2ntdyESn7ZpOpD2gAT7JswqSIyXZa7HlSRAkmuYH
Gjt/ORME4OOzYFI2dLB3+oz6u19CCFPM+jAalUkWZg85M282qVI+r2ylq6iHhDli
Jv+QBBOzC14nGo3vwTDzTNOfYdw7wOLLrbS3WhqLii00Jnt98x7NomLRtTK4zacX
WuyBgXTPdDWMhYzRu+emNOVmY0AjGYgZrsl7LKwzS+nWBkY8YHZoBmZdBqhscOc4
fRkGEAAi9zf8+34vYoodR+m2KQ4u7hgtHt/eJO66YcswB/jNtUC7P09ku2HUdRBt
Z5UXXPmA7gowU2fv+ukqUaxlKtHIwFuzEKw0JmeBEtnjAXHZsl56wO14wn7rd1fR
NVL/Zp65rILUMJh/hV+ZMw5ChX64VPZYuuSmeEHeSTCGv0ey3F/9pc0XINuzjEfA
WwARAQABzSJwZW5ueSAoR2VuZXJhdGVkIGJ5IFJldHJvU2hhcmUpIDw+wsFfBBMB
AgATBQJcWK9bCRAPJwqmVxAMKwIZAQAAeeAQAINBCbkN+Kn+mL9xQHQep0LTJMVy
hBrbE4uzxQ2+DBHwV/KqlNErBfFXs7hXANBXp3iAmdm5Ji0rSqHrHy1if8c3SIfE
/WLRp8umUeM1LYttJ0lLq+Fqs/uk1gUUlCtJNfWjFGMZq+NXF+4H17U2xKVI87Ik
jr+Ym1h2f821MCCxObaoVDM6mQ9tdhRl1o+3eQEOKkS4KHkF8Fc8kMfup7RO+g9l
HyLlzCBakGKMg7IPa8hV/7ABC5tpm7ulJ/bj2no31+Ru/BotVh4Va+7vPQQb1AkL
/c1sxmUzEJ5G7GCjPuNVI907OQG9ZtlMBuVppD6I0gq0yFHaL/EgR4rGZ9JqbmZX
C3/bzP6aFalWQB9uagL1BPXehiptL8unxtAYPbUeiqNI4FIMPShD2XU9sBWN0eUZ
hNTFSmlDZlwW2Nc0hAGloLzuL8ULVlwbfXGv0GeI4/EQToeDpU7pXfktkh4gApsC
5OeT/xKDm6FYww6kvInnLWZ+IeLylwfDHwyPGaLa6PS98bXX2hlqNObRhcQwiD/C
EE8681OvaE5HtvMZNHmuP09UxuN6UmDuRH9sOiXB5TrJI2sQWNaRZIBCvpHck4PP
Hd4sR9PGOSyCfJsoDCW79yvex2mUHiVxuUMr6TKGcQwmhNYZY55sGwS3glPtXFtr
6B3oNRIykXJFUEOmCBtwZW5ueWplbW9xNjY3am94Lm9uaW86MzQ1NTEGC015IGNv
bXB1dGVyBRCI3fOP2s6dwXDxU4hLLREwBwONJmk=
/g/ R:11
L:
[D][U][F][S][L][A][C]Muh trade secrets
Boomers are always saying shit like "don't give away your ideas". This doesn't matter, the software industry is too fucking incompetent to implement your ideas.
-Results of Zooko's Triangle:
-Mailing system where you give out one unguessable address per person who wants to contact you
-Cryptographic hash of public key as a domain name (Tor has this but the hash is too small. They recently added newer hashes but I haven't read about it yet to decide whether it's also BS)
-etc
-Capability security model
-Memory safety (my OS is still not memory safe, and I can't find a memory-safe OS for doing simple computations like chat and browsing static web pages)
-Functional programming (there's still nothing as good as SML being used in practice)
-Fixed framerate=tickrate game, synchronized to the server's clock to minimize latency, as well as having the monitor synchronized to the game (by adjusting pixel clock or just using VRR)
-Beam racing (like gsync/freesync but better and works on any monitor, merely requires program to be able to render on time. trivial to implement for 2D applications)
-A programming language where every identifer is a GUID and signed by the author
-An imageboard viewer where a thread is a DAG layed out vertically having every post below whatever posts are older than it, with good zooming functionality and navigation controls
-<video> tags for the web (ignoring format BS, every implementation of this is _still_ fucking garbage. seeking sucks monkey dick and even clicking somewhere on the video it feels like if you click the wrong thing the browser is going to crash)
/g/ R:1
L:
[D][U][F][S][L][A][C]How do I develop an ASCII AI that would represent herself as an anime girl? Do I gain shekels from it? I miss talking with Mistuku, now she doesn't exist anymore.
L:
[D][S][L][A][C]How to locate/decrypt a .xmzx file or .json
When I download a file, I get the email telling me that I have succesfully downloaded my .xmzx file. But no matter how hard I search, I cannot find the file! Upon some search, it seems that the .xmzx file is hidden in a .json file. I do not know what to do next. Can someone either help me to find and open the .xmzx file or help me open the .json file to see if I can find the hidden .xmzx file inside?
/g/ R:19
L:
[D][U][F][S][L][A][C]Clearnet sites that need .onion address
>Wikipedia and other projects
>Official Archive.org there is unofficial
pic unrelated
/g/ R:19
L:
[D][U][F][S][L][A][C]Intelligent atheist white man seeks sweetie
>Richard (((Stallman))) looks for gf on craigslist
Just stumbled upon this.
Daily reminder that the GNU project shits out bloated code on a daily basis. Daily reminder that Stallman is a jew (and not "white" like he says).
>fedora.jpg
ITT: Discuss alternatives to common GNU software which are superior.
>glibc
musl, uclibc
>bash
ash, or fish if you want muh features
>gcc
clang or tcc -- clang can give smaller code size and better compiler warnings, and TCC is even faster but the code generated is suboptimal and TCC only targets x86
>coreutils
busybox, or the (Open|Net)BSD userland tools (although the bsd tools also have some bloat)
/g/ R:3
L:
[D][S][L][A][C]Which language is the best for building a strategy browser game?
If anyone has heard about Travian it is built using PHP.
/g/ R:9
L:
[D][U][F][S][L][A][C]Jewgle gets a dose of its own medicine
>Hundreds of Google engineers and other company workers worldwide, including in Canada, walked off the job Thursday to protest the company's handling of executives accused of sexual misconduct, as well as workplace harassment and inequality.
>Walkouts were planned for 11:10 a.m. across different time zones, beginning in Asian countries. Protesters and supporters were posting photos and messages under the hashtag "googlewalkout."
http://archivecaslytosk.onion/2F2PZ
https://www.cbc.ca/news/technology/google-employee-walkout-1.4887064
/g/ R:21
L:
[D][U][F][S][L][A][C]Is there any currently supported way of making your security slider for TBB in tails persistent? The fact that it defaults to allowing JS in fucking tails, an entire OS designed around security and anonymity is completely retarded. Are there are decent alternatives to tails if there's no simple way of forcing it to default to blocking JS?
/g/ R:14
L:
[D][U][F][S][L][A][C]C pointer dereferencing
As we all know (hopefully), pointer dereferencing in C can be done in one of three ways.
*ptr or 0[ptr]
ptr[9]
ptr->elem
Why can't we just unify those three methods into one, using brackets just like in (nasm syntax) assembly? It would be just like if the 0 in 0[ptr] could be omitted by default. The dot syntax for struct field access could be replaced by -> (just because it looks better imo). So those three operations could be written as:
[ptr]
[ptr+9]
[ptr]->elem
Anyone have a problem with this?
/g/ R:20
L:
[D][U][F][S][L][A][C]Simple album playlist based music player
Hey faggots, I just made this to replace cmus with something simple and more UNIXy. Roast me.
https://repo.or.cz/mus.git
/g/ R:3
L:
[D][U][F][S][L][A][C]Where can I get some good OpenCV pre-trained classifier xml files? I know that https://github.com/opencv/opencv/tree/master/data/haarcascades exists, but they're all old and of poor quality. I don't really care what they're trained for.
/g/ R:5
L:
[D][U][F][S][L][A][C]DIY Devices
You have one week to make a trustworthy computer from off-the-shelf/ordered components (not including shipping delay).
Trustworthy will mean that the firmware and everything below can be in a known good state (within reason), and this state can be maintained so long as you are not a direct threat to FIVE EYES, Russia or China. No passive botnet.
Physical alterations & firmware alterations are acceptable if you can actually do it yourself.
Entry-level:general use desktop computer
Mid-range:portable laptop
God-mode:internet enabled phone
/g/ R:6
L:
[D][S][L][A][C]* pretends to be shocked *
see what happens when you let your init system handle {logging, user logins, networking, time, devices, ...}
3 new exploits with local root access!
https://seclists.org/oss-sec/2019/q1/54
/g/ R:9
L:
[D][U][F][S][L][A][C]How do I become /g/?
I've always been interested in tech but I've never really followed through in studying it. Where do I start to become a computer wizard?
I have some woman-tier Java and C++ knowledge but I want to learn more, like how to create an OS or a programming language.
What resources should I study? How do I become /g/?
/g/ R:5
L:
[D][U][F][S][L][A][C]Data Dumps General
A thread for sharing data dumps, below are some dumps to get the thread going:
4chan/pol/ 2013-2019 (18 GB for posts; 42.4 GB for thumbnails)
https://archive.org/details/4plebs-org-data-dump-2019-01
https://archive.org/details/4plebs-org-thumbnail-dump-2019-01
Reddit 2006-2018 (446 GB for comments; 145 GB for submissions)
https://files.pushshift.io/reddit/
Gab.ai 2016-2018 (4.06 GB)
https://files.pushshift.io/gab/
Hacker News 2006-2018 (2.04 GB)
https://files.pushshift.io/hackernews/
Google Books Ngrams 1505-2008 (lots of GB if you want 3+ Ngrams)
https://storage.googleapis.com/books/ngrams/books/datasetsv2.html
Stack Exchange till 2018-12 (~59 GB)
https://archive.org/details/stackexchange
GB != GiB
/g/ R:16
L:
[D][S][L][A][C]Code signing
Is most code not signed? I can download e.g. linux sources tarball with a signature, but what the gcc site recommends(?) is svn checkout, is that at the very least done over https or something?
/g/ R:5
L:
[D][S][L][A][C]Which 3D modeling/animation software would you recommend? I recently started using blender and i was wondering if there is a less confusing program to use.
/g/ R:15
L:
[D][S][L][A][C]Deniable encryption with OpenBSD
How?
On linux we have plain dm-crypt and luks (given that we can safely conceal the header).
And on OpenBSD?
/g/ R:7
L:
[D][U][F][S][L][A][C]Could non-botnet pneumatic computers be built?
Pic related, is a schematic for an air-powered transistor which I found online.
I suppose the solid layer (the grey material) could be transparent plastic or glass (for ease of debugging) or metal. The flexible layer (black material) could be cling film or equivalent.
If those materials could be used, and the transistor actually worked, this would be really easy to do at home.
/g/ R:5
L:
[D][U][F][S][L][A][C]Happy New Year /g/
A bit late, but Happy New Year /g/
Hope we can make this a better place than cuck-, or pigchan. That's all.
/g/ R:1
L:
[D][U][F][S][L][A][C]Katzenpost (Mix network) - Traffic analysis resistant messaging
>Goals
> to prevent a sufficiently global passive adversary from learning who is communicating with whom
> to detect active attacks against the network infrastructure
> hide message content from participating providers, hide recipient identity from the sender’s provider, and the sender identity from the recipient’s provider
> reliable out of order delivery
> support for various “message based” use cases like ‘instant messaging’, ‘e-mail’, and ‘crypto currency’ anonymization
https://katzenpost.mixnetworks.org/
https://github.com/katzenpost
https://github.com/katzenpost/docs
Has anyone tried a mix network before and this one in particular? I think this should be looked into much more than it currently is, because low-latency networks such as Tor or I2P are not protecting you from people who can see incoming and outgoing traffic.
/g/ R:11
L:
[D][U][F][S][L][A][C]"Tor, I2P, and VPN" are no problem for the NSA
Pic very related, partially transcribed below:
>[...]
>2. The success we have had with Tor, I2P and VPN cannot be replicated with those currencies that do not rely on nodes. There is a growing trend in the employment of Stealth address and ring signatures that will require additional R&D. Please reference the weekly SITREP and SIPR for more details regarding the TTPs involved.
>3. BLUF: In order to put the CPT back on track we need to identify and employ additional personell who are familiar with the CryptoNote code available for use in anonymous currencies.
L:
[D][U][F][S][L][A][C]tech in pedo
>not using technology to get little naked girls without feds throwing you to jail
why you even learn computers if you don't use them for good purposes
why wont you just watch those girl out of curiosity? you dont need to go do that in real life, just watch on computer to see it, how it looks
also share what tools do you use when being pedo on the internet and computer
-file encryption
-anonymity
Do you think that technology and open source helps pedos? They use open source tools like Tor and TrueCrypt. It allows them to do more pedo stuff.
inb4 I glow
/g/ R:1
L:
[D][S][L][A][C]PCI sound card conversion to DAC/ADC
I've got a PCI sound card which has quite a few input and output channels. I'm interested in trying to rig up a simple interface for connecting to LEDs and shit, like what one would do with a raspberry pi GPIO. Here are the inputs and outputs available on that PCI sound card:
* line in and mic (*2/stereo for 4 total input channels)
* front out, rear out, center out (*2/stereo for 6 total output channels)
However, the problem is that if I set a 1Hz signal to be output on one of the output channels, the signal decays over time. If I rip off/desolder all the capacitors near the output connectors, will this fix the problem? I heard that these capacitors stop very low frequencies from getting through.
/g/ R:3
L:
[D][U][F][S][L][A][C]Free artist/album database?
Hey, I'm doing a music recommendation software (and learning TCL in the process) but I want to filter the submissions to avoid garbage. Anyone knows a way to do so? The filtering function would take an artist/album couple and check if it exists. Would be better if it could be done locally, but I somehow doubt it's possible to get such a free database.
/g/ R:40
L:
[D][U][F][S][L][A][C]PDF thread.
Old one got accidentally nuked while I was cleaning up spam.
/g/ R:0
L:
[D][U][F][S][L][A][C]Tie tracker to imageboard usage
Most share threads seem to use mega or use pre existing services which of course leaves them at the mercy of those continuing to operate. Wouldn't it be a better idea to somehow tie a tracker to the usage of that imageboard or even thread? Being that it would reduce the likely exposure to do-gooders and save you the trouble of working around any restrictions those other services might have.
/g/ R:27
L:
[D][U][F][S][L][A][C]Startpage "blocking" tor
Since 2 or 3 days, startpage gives me "no results" for any search when using Tor through qutebrowser. Am I alone?
/g/ R:20
L:
[D][U][F][S][L][A][C]OpenBSD or NetBSD
I want to move from Linux onto a BSD system, and after some digging I ended up with these two.
As much as I like pkgsrc, TRIM (running on a SSD), the portability aspect and the Linux compat layer (need it for DAWs/trackers and maybe some games), I also want better security, docs, support and more ports provided by OpenBSD.
Can you anons share your experiences with those BSDs?
>inb4 board subtitle
/g/ R:9
L:
[D][S][L][A][C]C question
Is this the best way of making sure that all characters in a string are members of a specified character set? Or is there an even simpler method?
#include <string.h>
int valid(const char *str, const char *set)
{
return (strspn(str, set) == strlen(str));
}
/g/ R:9
L:
[D][S][L][A][C]The age of tor and VPN's is fast approaching, this much is blatantly clear to anyone posting here. The real question is how can we compress image and video files as much as possible to make browsing online with lower bandwidth a better experience. Everyday I see niggers posting giant ass 5mb picture files. It's time we set a standard for compressing this shit and achieved true media minimalism, especially when it comes to things like webms which are so consistently poorly made.
/g/ R:20
L:
[D][S][L][A][C]"IT'S JUST GOOD MANNERS, GOY!"
What's next? What will be the next defense of the cucked Poo-in-the-Loonuxers?
>In seeking to comply with the Linux kernel's new Code of Conduct enacted by the recent 4.19 release, a patch series has been sent out today replacing profane kernel code comments with "hugs".
>Like with most complex codebases -- especially ones developed over the course of many years by many different developers -- the Linux kernel has its share of colorful words within code comments left by developers. With a set of 15 patches sent out today by Jarkko Sakkinen of Intel, the kernel has no more fucks but instead only hugs. "In order to comply with the CoC, replace with a hug."
>Some of the revised code comments now include "IOC3 is hugging hugged beyond belief", "Only Sun can take such nice parts and hug up the programming interface like this. Good job guys...", "Hugging broken ABI", "avoid hugging up the memory controller (somehow)", and "Hug, we are miserable poor guys..."
>Surprisingly, at least with this initial patch series, it's just 33 lines of changed comments out of 3.3+ million lines of code comments within the kernel source tree but we'll see what other words may get cleaned up next for making the Linux kernel more inviting to all. Linus Torvalds has also cleaned up his colorful language and refrained from any outbursts on the mailing list since his brief retreat during the 4.19 cycle.
https://www.phoronix.com/scan.php?page=news_item&px=Linux-Kernel-Hugs
/g/ R:18
L:
[D][S][L][A][C]C89 Best Language?
Is c89 really better than any other language ever? Or should I go with c99?
/g/ R:11
L:
[D][U][F][S][L][A][C]PHP niggers
Reminder that PHP is one of the shittiest programming languages in common use.
Reminder that PHP was developed in (((Israel))) and contains error messages in Hebrew to this day. (pic related)
Reminder that the default PHP/Apache configuration is hideously insecure (I've personally broken into several servers with such configuration without really having to try hard).
Reminder that PHP's function names are an inconsistent mess (especially in the string library, str_... vs str...)
Props to hakase for developing his software in Lua and not (((PHP))).
/g/ R:3
L:
[D][U][F][S][L][A][C]Xk3ysc0re exists and isn't even
Probably half as sofisticated as what the N/S/A's developed now. Theres no such thing as privacy on the internet no matter what you do.
JK
Lets have a info dumb for security and anonimimty on the the internet.
/g/ R:4
L:
[D][U][F][S][L][A][C]Hey chummers,
Is there any way to explore mathematics in a completely different way or perspective when compared to traditional/mainstream math..
Do you have any idea..
Feel free to rant about it..
/g/ R:25
L:
[D][U][F][S][L][A][C]Good Web Design Thread
Share sites that are actually designed well (pic related) unlike the majority of these garbage (((modern))) websites. Bounus points if it's not pedoshit, like on 8/tech/
pic related
/g/ R:7
L:
[D][S][L][A][C]cancer language
So today I was fiddling around with my toy lisp-like implementation and I came up with this shitty program to add an arbitrary number of numbers together.
#! /usr/bin/env ns
<= n 1
<= l 1
<- "Enter number of numbers: "
<= nn [->]
>: [? [> [=> nn] 1] a [#!]]
<- "Number of numbers must be greater than one.\n"
>: e
<: a
<- "Enter number #" [=> n] ": "
<= [=> n] [->]
<= n [+ [=> n] 1]
>: [? [> [=> n] [=> nn]] c a]
<: c
<= r [=> [=> l]]
<: l
<= l [+ [=> l] 1]
<= r [+ [=> r] [=> [=> l]]]
>: [? [== [=> l] [- [=> n] 1]] f l]
<: f
<- "The result is " [=> r] "\n"
<: e
#! End of program
Tell me, is this pajeet shit, or it is white man's artwork?
/g/ R:14
L:
[D][U][F][S][L][A][C]Don't be a keyboard fanatic!
Mouse or keyboard? BOTH obviously! each are good at different things.
>But you can use programs/extensions with hints like vimfx, surfingkeys, qutebrowser, vim easymotion etc and be just as fast as mouse without moving your hand away!
Yes but the implementation of the mouse is much simpler.
With hints there is no clear standard how it is done: what letters to use for hints? What about different keyboard layouts? How are they combined and prioritized? For selecting text do you use hints for every letter? word? what kind of word? Does the program even have the ability to distinguish words? What about keybindings consistency? What about the extra features that will be needed like switching scroll areas, using text selection hints or link following hints, which come naturally with the mouse?
And if you do drop the complexity for something simpler like vim without easymotion or navigating using navigation keys links/w3m style you end up either being slower or being very roundabout.
>But I still save time not moving my hand!
You save very little time if any at all; you save more time doing automations or making task specialized tools/interfaces.
The mouse is standard, simple and easy to learn and good tool for handling medium to large amounts of unstructured data, don't be afraid to use it.
/g/ R:1
L:
[D][S][L][A][C]Talos OpenBMC pozz
The POWER9 machines Raptor makes look really good, but OpenBMC doesn't:
* Badly engineered (systemd, dbus, python, etc...).
* Is supposed to always be connected.
* Has notoriously malicious companies on its technical committee (Google,
Facebook, Microsoft, Intel).
My questions are:
* Is there a more minimalist solution than this (maybe with less features)?
* Can its network access be disabled completely without having to trust OpenBMC
itself (I don't want an Apple/Google style button to "disable" snooping)?
/g/ R:1
L:
[D][U][F][S][L][A][C]Need advice
Hi nanons, could you recommend me one/two books you consider the best about:
A) Operating Systems
B) Programming Languages Design
C) Compilers
Thread dedicated to Questions That Don't Deserve Their Own Thread
(but are worth asking)