(46.14 KB 887x272 masterTheorem.jpg)
Discord is shit Anonymous 10/22/2018 (Mon) 02:28:19 [Preview] No. 12909 [Reply] [Last 50 Posts]
Is there a Libre version of Discord that isn't so shit? It needs stuff like this:
>voice chat
>text chat
>Youtube and image embeds in text chat
>Free Software (Libre)
>you can host it on your own server
>permissions
>you can make bots for it
>uses actual good encryption
>has a web interface and mobile app
>you don't have to have a mobile phone to register an account
31 posts and 3 images omitted.


Anonymous 04/10/2019 (Wed) 02:20:03 [Preview] No.13267 del
>>12989
Wire isn't federated though, right?

108a784baabbc9405b7f3a65ee771e3b34d7aa49
549071
549563


Anonymous 04/12/2019 (Fri) 00:10:18 [Preview] No.13269 del


Anonymous 04/18/2019 (Thu) 05:52:35 [Preview] No.13287 del
>>12912
>Teamspeak is proprietary.
There's mumble for that.


Anonymous 04/18/2019 (Thu) 17:46:13 [Preview] No.13288 del
>>13287
IP leaks ain't fun. Use Matrix


Anonymous 04/18/2019 (Thu) 18:39:32 [Preview] No.13289 del
>>13288
>matrix
>no ip leaks
lmao i have bad news for you my dude, matrix.org got pwnd af



Torpedo bullying Anonymous 04/17/2019 (Wed) 20:58:44 [Preview] No. 13276 [Reply] [Last 50 Posts]
So, the shit BO of 8ch's /tech/ has finally joined the plague of faggots bullying Tor. When will it end, anons? When are we going to just make our own meshnet already?


Anonymous 04/17/2019 (Wed) 21:12:17 [Preview] No.13277 del
(37.39 KB 770x540 banning tor.png)
Forgot my image, fuck.


Anonymous 04/17/2019 (Wed) 21:25:49 [Preview] No.13278 del
To much anonymity
We can't have that on a board that is dedicated to shill for the jews

Pigchan is much like Cuckchan, expect mandatory registration for posting there.


Anonymous 04/18/2019 (Thu) 00:16:18 [Preview] No.13279 del
>>13278
And there's always people like this defending it. Why? Is it sour grapes because they're too retarded to download TBB?


Anonymous 04/18/2019 (Thu) 00:29:03 [Preview] No.13281 del
>>13277
what does that have to do with tor?


Anonymous 04/18/2019 (Thu) 05:31:32 [Preview] No.13286 del
>>13281
Some faggot "spammed" /tech/ with that last night. Supposedly he did it from Tor and BO's solution was to IP ban all Tor users.

Wouldn't even call it spamming, all he did was necro like a dozen threads.



Warning All Microsoft Users: You May Need To Switch To Linux or an Other Alternative OS Soon... READ WHY Anonymous 04/10/2018 (Tue) 16:00:02 [Preview] No. 12580 [Reply] [Last 50 Posts]
COPIED FROM FAGCHAN, BUT THIS SOUNDS IMPORTANT!

"Microsoft have changed their terms of service so that they can monitor any of your personal content, including the files on your PC, while using their products or services and if they deem it offensive they can take that content and their products/services away from you and ban you! If you happen to have an Xbox or have bought PC games from the Microsoft Store and are logged into your Microsoft account on any device while committing your "crime" you can be banned from Xbox Live and have all your downloaded games and any credit that's still in your account taken away!

But it gets worse. This applies to all Microsoft products and services. So therefore Windows itself! I think I have already been a victim, probably due to posting here, as recently my Windows 10 key was revoked out of the blue. I contacted Microsoft and they told me my key was no longer valid but outright refused to tell me why. So I had to buy Windows 10 again. I didn't buy it direct from them of course. Please post if this has happened to you very recently too.

I'm pretty scared about what's coming. They want us off the internet and I think this is how they're going to get many people. They're going to just shutdown our Windows on the basis of us breaking their new terms of service. What if ISPs are next?"

OP comment:

First off, no one should be using Windows 10. If you like Windows get an older one like Windows 2000, Vista or XP and make sure you turn OFF all automatic updates in the settings. Make sure you do not leave it online 24/7 either (leaving the OS online when not in use makes it much more vulnerable). There are also programs out there you can install that will completely remove all auto-updates for Windows if you are too lazy to change the settings.

If you want to switch to Linux you can install "Wine" and run Windows executives right from your Linux OS. Depending on which OS you partition (such as Q4OS) this will mimick an older version of Windows. Q4OS is what I recommend because you can install Wine and the OS replicates Windows XP, looking almost exactly the same!

Second, which is VERY important, users should be using a private VPN service in this day and age. No reason not to. Get off your lazy ass, buy a cheap private VPN (these can cost as low as $30 PER YEAR), and shield yourself by encrypting your communications and spoofing your IPs. Its easy and even us boomers can learn how to do it, I did.

Third: always have physical offline backups of any of your important files (this includes ISOs of the OS you use, software you may use and any media or other files you deem valuable).

Message too long. Click here to view full text.

8 posts and 1 image omitted.


Anonymous 04/04/2019 (Thu) 18:43:42 [Preview] No.13262 del
There are some actions which can only be completed on windows (Unless you are willing to spend many hours porting software over to linux.). Don't be a faggot and use separate computers, a Linux machine and a Windows machine (Or just separate hard drives, but DON'T use multiple OSes on a single drive, windows WILL see that.)


Anonymous 04/07/2019 (Sun) 02:37:22 [Preview] No.13263 del
Might be a good idea to not install the Windows OS on bare metal and instead, only use it inside virtual machines. It's likely Windows fingerprints the system hardware so putting it in a metaphorical condom might help keep the actual hardware safe. This should also help prevent it from contaminating any sort of firmware on the machine, although it's not a guarantee.


Anonymous 04/07/2019 (Sun) 02:46:50 [Preview] No.13264 del
Also remember, glow niggers like to cast wide nets when buying/developing exploits, so using obscure stuff that normies do use might help you. This won't help you if you're a high value target, for whatever reason, in which case they will allocate as many resources as possible to get you. If that's the case, then you shouldn't even be on any sort of computer.


Anonymous 04/07/2019 (Sun) 02:54:31 [Preview] No.13265 del
>>12590
Many of those virus scanners include functionality that checks the hash result of each scanned file against a database of file hashes, so that could be used to identify specific files. For example, if you downloaded one of the NZ shooting videos and have it stored on your drive, in an unaltered state.


Anonymous 04/18/2019 (Thu) 04:53:26 [Preview] No.13285 del
>>13262
>There are some actions which can only be completed on windows (Unless you are willing to spend many hours porting software over to linux.)
What are you doing that requires Wangblows only? After Effects or something?



Why are you still running systemd? Anonymous 10/24/2018 (Wed) 07:43:56 [Preview] No. 12921 [Reply] [Last 50 Posts]
Serious question, not sure what else to add.
22 posts and 2 images omitted.


SystemDeezNuts BenBoi 12/29/2018 (Sat) 10:25:39 [Preview] No.13055 del
>>12984

I am a Fedora user and Fedora is top kek. So I guess I'd have to get used to using systemd not that I really ever used an init system ever, until recently getting into to adminning stuff.


Anonymous 12/29/2018 (Sat) 21:04:16 [Preview] No.13069 del
I only used systemd for a very short time, when I installed Armbian on a board I got to move away from the x86 disaster. Well it was less than a month later before a systemd bug was causing problems (some daemons wouldn't start). Armbian didn't address the bug and simply waited for their upstream (Ubuntu) to take care of it. Apparently those guys didn't care about fixing it quickly because allegedly it only affected ARM systems. So I immediately installed Devuan, and that was the end of all that. I never even looked back to see if they finally fixed the bug.
Anyway my other computers were all running OpenBSD, long before systemd even existed. I would have used it here except they don't have good 32-bit ARM support. NetBSD runs okay, but video has no acceleration whatsoever, so Firefox is laggy to the point of 1-2 second delays between hitting arrow key or clicking mouse and it actually doing the action. Which is strange because I also tried some emulators (NES and Amiga) that work pretty damn good with the exact same Xorg driver.


Anonymous 12/30/2018 (Sun) 05:20:10 [Preview] No.13074 del
Arrest this man for the crime of making stable and well maintained software!


Anonymous 03/06/2019 (Wed) 14:21:41 [Preview] No.13217 del
I'm not using systemd and don't intend to, if an opportunity continues to exists to do so. This whole ordeal just demonstrates how much sway Redhat has over the direction of Linux/GNU distros. It can do this because of the development projects it controls.

The ultimate goal is to unify most of the userland amongst the different distributions to the point where there won't be much difference between them and then let redundant distros burn out and have those developers roll into other projects.

There may still be a few holdouts that don't use it, but as long as Redhat and Debian/Ubuntu use it, that will eventually push out non-conformists by creating an ever increasing workload in-order to un-systemd projects that establish hard dependencies to it.

At that point, the remaining non-systemd crowd may make the jump to a different UNIXy OS or just learn to love Lennart's systemd.

If you look at the big picture, this may actually not be a bad thing because it will position Linux for the "not Windows" crowd, where as folks who actually like traditional Unix, will jump over to one of the other options.


Anonymous 04/18/2019 (Thu) 04:32:35 [Preview] No.13284 del
>>12921
I'm not. I've been using Void Linux, with runit, as a daily driver for ~3 years now. Haven't had any issues with it so far.



(20.58 KB 480x360 er.jpg)
Intel SUCKS Anonymous 04/04/2019 (Thu) 15:47:49 [Preview] No. 13257 [Reply] [Last 50 Posts]
Why?
How about:

>Intel ME/HAP Inclusion
>So many bugs even a sewage worker would be surprised
>Aggressive marketing on Intel® Core™ Products™
>Using toothpaste instead of actual solder for the heat spreader
>CEO GTFOd' after Spectre/Meltdown/Portsmash fiasco
>Crappy as fuck x86 architecture bloated to hell riddled with bugs
>FDIV, F00F, and other catastrophes that "Wouldn't affect the average user"
>and later taking money from employees after they had to replace the fucked CPUs

If they were smart, they would start over, start with a simple pipeline with absolutely nothing else, and then adding the branch prediction, dynamic execution, and other accelerative features later, but they are in a bad spot, because while AMD, ARM, and other manufacturers are speeding ahead, Intel has just lost one of its tires and is slowing down.

Wat do?
Support more transparent manufacturers. AMD is far better than intel, but has its own problems(PSP, Etc.), while ARM/SPARC/POWER CPUs seem to be some of the most stable, but this is just speculation (Highly likely to be better than intel, though.) RISC-V/FPGA designs could also prove to be useful.
3 posts and 6 images omitted.


Anonymous 04/04/2019 (Thu) 16:28:53 [Preview] No.13261 del


Anonymous 04/13/2019 (Sat) 18:48:14 [Preview] No.13272 del
>>13261
Which chan is in the first picture?
While the information is likely correct, the person seems like a LARPing edgelord. The only way to really confirm that the person is authentic would be some sort of technical detail that hasn't already been discovered by security researchers on the other side of the curtain.

If this person were to actually do that, it would become obvious as to who is leaking information (through compartmentalization).


Anonymous 04/14/2019 (Sun) 23:26:15 [Preview] No.13274 del
>>13272
Definitely an edgelord. It would be one thing to say ME has backdoor vulnerabilities (which it does) and leave it at that, but he outs himself by naming a few obscure privacy focused operating systems.

THe post is equvalent to "GIVE UP GOYIM THERE IS NO WHERE TO HIDE". 8ch/tech/ is filled with posts like this on a daily basis.


Anonymous 04/15/2019 (Mon) 13:40:49 [Preview] No.13275 del
>>13272
4ch, /g/

Its nothing that wasn't already confirmed by more reputable sources like Semiaccurate. Definitely a LARP and someone who bothered capping it.


Anonymous 04/18/2019 (Thu) 04:19:57 [Preview] No.13283 del
>>13257
I think I would make a distinction(addition?) and say that x86_64 sucks but yes you're right OP, Intel can go die.
I am curious to know if any anons have had success with other ISAs/architectures, specifically a "libre" ARM SBC or a POWER9 system(raptor computing?). It would be nice to relegate my x86_64 system to just a few "performance intensive" tasks.



(97.27 KB 768x768 amazon_spycam.jpg)
Amazon Ring Anonymous 01/11/2019 (Fri) 03:27:32 [Preview] No. 13092 [Reply] [Last 50 Posts]
If you own one of these... well, lol.

https://theintercept.com/2019/01/10/amazon-ring-security-camera/

Apparently the maker thought that adding encryption would make the company less valuable. Annnd of course it's outsourced. Ring customer's video from inside and outside of their homes goes to some Ukrainian company. Maybe they're padding their revenue by running some amateur Ring porn sites on the side.
3 posts and 1 image omitted.


Anonymous 01/16/2019 (Wed) 20:30:39 [Preview] No.13121 del
>>13093
Internet of shit. But seriously though, Ring is a useful innovation that lets you pretend to answer the door and pretend the house isn't vacant when you are 50 mile aways at a restaurant.


Anonymous 02/16/2019 (Sat) 19:38:08 [Preview] No.13198 del
Amazon owns Ring, and there's a great editorial out that wrecks them for not putting their 2nd HQ in NYC. The cat is out of the bag, and tech companies care about nothing but themselves, just like any other business.

https://www.nytimes.com/2019/02/15/opinion/amazon-new-york-hq2.html


Anonymous 04/14/2019 (Sun) 19:25:51 [Preview] No.13273 del
>a folder on Amazon’s S3 cloud storage service that contained every video created by every Ring camera around the world
!

And the press handler is a guy called Shamir?


Anonymous 04/18/2019 (Thu) 00:28:08 [Preview] No.13280 del
Honestly, at this point there's a whole market segment of brainless cattle that eats this shit up. This isn't for people like us. If I was the company I'd do the exact same. If people are giving their data away, might as well take it.

Do you guys think though that there's a market for DIY security camera kits? With cheap single board computers and cameras these days, you could easily make an almost plug-and-play package that uses fully open source software to record video, process, even do fancy image recognition, put it on your own machine or optionally provide a passworded web UI that only you have access to. You could actually make it cheaper than these shitty electronic doorbells. The only issue is that security wise, you should store the video off-site so that burglars can't steal it, which is pretty trivial but you can offer your own VPS solution and zero-configuration setup script for the retards.


Anonymous 04/18/2019 (Thu) 04:16:38 [Preview] No.13282 del
Some video codec characteristics are such that it wouldn't be too hard to perform some limited encryption (that is, not having to fully encrypt every bit in the whole video) to render the video useless if stolen, but still allow for passworded viewing or fast export.

Marketing will probably be harder than product development. There are so many of these things now. A DIY niche might be easier to target than something in a glossy retail box though.



Discussion Thread Endwall 02/24/2018 (Sat) 01:52:08 [Preview] No. 1145 [Reply] [Last 50 Posts]
DISCUSSION THREAD
Want to say something off topic about anything?

Have a hot tip about something in the computer security world that doesn't fit into any current thread or category?

Want to chat with your fellow invisible 7 proxy friends?

Want to tell Lt. Gen Michael Hayden, GEN Keith Alexander, ADM Michael Rogers, GEN Paul Nakasone, GOOGLE, AMAZON, FACEBOOK and Microsoft etc. how you feel?

It's open mic at >>>/os/ , anything goes!!

Put all of your banter here:
Edited last time by Endwall on 04/14/2019 (Sun) 02:40:40.
47 posts and 1 image omitted.


Anonymous 09/26/2018 (Wed) 13:16:47 [Preview] No.1321 del
Login, Endwall guy.


Endwall 09/27/2018 (Thu) 04:11:20 [Preview] No.1322 del
>>1321

I added code tags to >>>/endsoft/

They weren't enabled for some reason. I'm logged in right now, I'll be getting down to homework in a bit, so I'll be off soon. Thanks.


Endwall 11/04/2018 (Sun) 06:14:40 [Preview] No.1332 del
Queen
The Invisible Man

Queen - The Invisible Man (Official Video)
https://youtube.com/watch?v=zKdxd718WXg [Embed]

Queen - The Invisible Man (Rare Alternative Version)
https://youtube.com/watch?v=GItyEOAiZ2A [Embed]

Queen- The Invisible Man (HQ)
https://youtube.com/watch?v=PLBRQgksQNU [Embed]
Edited last time by Endwall on 11/06/2018 (Tue) 03:58:05.


Endwall 04/14/2019 (Sun) 02:52:44 [Preview] No.1389 del
https://en.wikipedia.org/wiki/Paul_M._Nakasone

I didn't forget about you Captain Sulu. I never forget a face....

This guy's dad was busy translating Japanese decrypts for US Army Intelligence during WWII while George Takei grew up in an internment camp in California. He should hire Noriko (Ashley Hanrahan) as a cyber-warrior and she can post memes for US cyber command. I think that would be pretty funny. On a side note I have to repair NHK Japan in Endstream...Was this post racist?
Edited last time by Endwall on 04/14/2019 (Sun) 02:58:34.


Tylerseelo 04/17/2019 (Wed) 04:24:29 [Preview] No.1392 del
REMOVED

Do not click on any links that pop up from these spammers and be careful with any links in general even ones I post. Use tor, no javascript, locked down in a firejail. Check them out with links browser or download the website with endget or endcurl.
No Spam 5 Year ban
Edited last time by Endwall on 04/17/2019 (Wed) 05:10:02.



Online Security News Endwall 07/07/2016 (Thu) 06:09:23 [Preview] No. 149 [Reply] [Last 50 Posts]
See a news article or CVE bug report on an emerging computer security issue and want to share it? Post below.

I will also post links to Hak5 Threatwire videos.
Edited last time by Endwall on 07/07/2016 (Thu) 16:22:47.
496 posts and 3 images omitted.


Endwall 04/17/2019 (Wed) 03:01:56 [Preview] No.1390 del
RT
Facebook is surveillance monster feeding on our personal data - Richard Stallman
https://youtube.com/watch?v=9c3sv30w158 [Embed]
Duration : 26:09
Published : 15 Apr 2019
"Our world today may be a high-tech wonderland, but we, the users, own nothing in it, with our personal data being the new oil for Big Tech. How do we break its grip on our digital lives? We asked Richard Stallman, the founder and leader of the Free Software Movement"



Good, little known software Anonymous 03/27/2019 (Wed) 10:33:51 [Preview] No. 13242 [Reply] [Last 50 Posts]
ITT: recommend nice, little known software.
My picks would be minimodem and mgod.
Minimodem is a little program that can convert text to/from an audio representation (think dialup tones). Also paired with a mic and speakers, it makes for a pretty retarded way to exchange files wirelessly.
http://www.whence.com/minimodem/
mgod is a tiny gopher server with all the features you could need (executables, automatic file listings, separate http proxy, etc). Written in pure C, I'm yet to find a thing that doesn't compile it.
http://port70.net/?1mgod
gopher://port70.net/1mgod


Anonymous 03/27/2019 (Wed) 17:00:31 [Preview] No.13243 del
That Minimodem is kind of interesting. Reminds me of the news about some bot/malware using a similar technique to communicate, but at audio frequencies outside the range humans can detect. Cellphones are good for that purpose ;-D


Anonymous 03/31/2019 (Sun) 16:34:08 [Preview] No.13248 del
>>13242
SayIt, it's an Android app to read and speak text documents.


Anonymous 04/01/2019 (Mon) 17:00:00 [Preview] No.13250 del
>>13248
Talking about android apps, the Tricorder app from F-Droid is really neat.
It's just a prop, but it looks nice and can do stuff like read from mic or grav sensors and display it with a graph, there's also something with gps and cameras. Pretty cool.


Anonymous 04/03/2019 (Wed) 20:14:38 [Preview] No.13256 del
Midnight Commander is a pretty featureful and mature file manager that never gets any love :(
Also gallery-dl is a great tool for downloading all of the hentai you want.


Anonymous 04/13/2019 (Sat) 11:55:41 [Preview] No.13271 del



Anonymous 12/28/2018 (Fri) 00:28:45 [Preview] No. 13050 [Reply] [Last 50 Posts]
step aside lynxchan fans there's a new "imageboard engine" in town that doesn't suck shit like your abomination does.

http://futatsu.org/

https://github.com/DangerOnTheRanger/maniwani
29 posts and 4 images omitted.


Anonymous 03/23/2019 (Sat) 19:13:03 [Preview] No.13235 del
>>13234
now it looks like cunt

with or without js


Anonymous 03/25/2019 (Mon) 05:07:12 [Preview] No.13240 del
Looks fine to me. If a board has an onion address and I can post without enabling javascript, I'll check it out.


Anonymous 03/26/2019 (Tue) 00:47:54 [Preview] No.13241 del
>>13240
No onion address (nobody had asked for it yet), but you can post without JS enabled. I'll play around with setting up an onion address over the weekend or so, hang tight.


Anonymous 04/03/2019 (Wed) 02:13:21 [Preview] No.13251 del
(114.15 KB 629x376 i_like_onions.jpg)
I see endchan as s6424n4x4bsmqs27.onion so when peeps post clearnet addresses I'm always like "Whaaah? Oh yeah..."


Anonymous 04/11/2019 (Thu) 05:19:46 [Preview] No.13268 del
>>13235
How about this way? Just added theme support.



(8.71 KB 646x483 gpcs2pppppp.png)
Author rescinds GPL licensed code from "Geek Feminists" Anonymous 01/11/2019 (Fri) 01:21:48 [Preview] No. 13089 [Reply] [Last 50 Posts]
https://slashdot.org/submission/9076900/author-rescinds-gpl-licensed-code-from-geek-feminists

Reportedly, the author of the GPL licensed text-mode casino game "GPC-Slots 2" has rescinded the license from the "Geek feminist" collective.

The original author, after years of silence, notes that the "Geek Feminist" changed[1] a bunch of if-then statements which were preceded by a loop waiting for string input to a switch statement. The author reportedly noted that to use a switch statement in such an instance is no more preformant than the if-thens. Switch statements should be used where the input to the switch statement is numerical, and of a successive nature, for most efficient use of the jump table that is generated from said code.

The author reportedly was offended, after quiet observation of the group, that the "Geek Feminists" mocked his code, mocked his existence as a male, and never did any work on the code afterwards and never updated to include new slot machines added to the original code by author subsequently.

The author notes that he neither sought nor received any compensation for the granted license, that is was a gratuitous license, and that there never was any refutation of his default right to rescind given. (A right founded in the property law of licenses.)

The copyright owner has reportedly watched quietly as each year the "Geek Feminists" published a recount of their heroic efforts regarding his code.[2][3] Presumably he has now had enough of it all...

The author notes that the SF Conservancy attempts to construe a particular clause in the GPL version 2 license text as a "no revocation by grantor clause", however that clause states that if a licensee suffers and automatic-revocation by operation of the license, that licensees down stream from him do not suffer the same fate. The author of "GPC-Slots 2" reportedly notes that said clause does only what it claims to do: clarifies that a downstream licensee, through no fault of his own, is not penalized by the automatic revocation suffered by a licensee he gained a "sub-license" from (for lack of a better term.)

The author reportedly notes that version 3 of the GPL did not exist when he published the code, additionally the author notes that even if there was a clause not to revoke, he was paid no consideration for such a forbearance of a legal right of his and thus said clause is not operative against him, the grantor, should it exist at all.

(Editor's note: GPL version 3 contains an explicit "no-revocation-by-grantor" clause, in addition to a term-of-years that the license is granted for. Both absent in version 2 of the GPL)

Message too long. Click here to view full text.

83 posts and 7 images omitted.


Anonymous 03/25/2019 (Mon) 03:53:28 [Preview] No.13237 del
>>13236
Over 30 published articles trying to refute me suggest otherwise.

People such as you, who oppose men marrying cute young girls, are enemies of YHWH, who allows men to have female children as brides in Devarim chapter 22, verse 28 (na'ar (hebrew) , padia(greek), puella (latin)). Later in Devarim YHWH commands that if someone entices one to follow another power, kill them.

People such as you, who entice us to follow other powers.


Anonymous 03/25/2019 (Mon) 03:58:40 [Preview] No.13238 del
Remember: the only thing that "prevents" a licensor from "going back on his word" is if the licensee has an interest in the property.

An interest is created when the licensee pays the licensor for permission to use the property, or in other cases when the licensor induces the licensee to make payments to third parties for the improvement of real property (land) in reliance on the licensor (this is usually in a inheritance case: estate disputes licensor's dispensations to licensee).

Here the licensee paid the licensor nothing. If there was a "promise not to revoke" (which there isn't even in the GPL2), it is inoperative without the licensee "buying" that "right".

Linux licensing operates under the same principals.


Anonymous 03/25/2019 (Mon) 04:06:17 [Preview] No.13239 del
> https://opensource.com/article/19/2/cla-problems
>License revocation: Some CLA advocates warn of the prospect that a contributor may someday attempt to revoke a past license grant. To the extent that the concern is about largely judgment-proof individual contributors with no corporate affiliation, it is not clear why an Apache-style CLA provides more meaningful protection against this outcome compared to the use of an open source license. And, as with so many of the legal risks raised in discussions of open source legal policy, this appears to be a phantom risk. I have heard of only a few purported attempts at license revocation over the years, all of which were resolved quickly when the contributor backed down in the face of community pressure.

Notice how they hand-wave it.
"Guy backed down, don't look behind this curtain"
You can revoke. Their only power against you is getting you fired/blackballed. If you do not give a shit about their "industry" you C A N fuck them completely. You have revoke and sue, and you really want to do so in a bloc with like minded, once you get the ball rolling, it's the doom of the project.


Anonymous 04/03/2019 (Wed) 11:29:34 [Preview] No.13253 del
I have, at this moment, chosen to terminate any permissions GitHub and
the GitHub Staff have enjoyed regarding my protected work (GPC-Slots 2).

Any allowances GitHub (GH) and the GitHub Staff (staff) had regarding GPC-Slots 2
(the work) is hereby revocated, rescinded, and made null.

The allowances memorialized in the writing known as the "GPL" are
rescinded from GitHub and the GitHub staff.

I am not in privity of contract regarding the licensing and
distribution of GPC-Slots 2 with GitHub nor any of the GitHub staff,
nor have I ever been.

I have not been paid any good, value, or consideration for the
dispensation of the permissions.

The permissions are freely revocable by me, the Copyright Holder, in

Message too long. Click here to view full text.




Anonymous 03/23/2019 (Sat) 06:51:03 [Preview] No. 13233 [Reply] [Last 50 Posts]
Who wants anime titties? who wants to scrape the internet for weeb shit? If so come right in faggot!
http://hydrusnetwork.github.io/hydrus/
https://discord.gg/3H8UTpb


Anonymous 03/31/2019 (Sun) 10:26:50 [Preview] No.13246 del
>discord
It's not even funny anymore.


Anonymous 04/03/2019 (Wed) 07:07:52 [Preview] No.13252 del
>>13246
Dev is a faggot for not using https://chat.nobodyhasthe.biz



Anonymous 09/19/2018 (Wed) 14:35:43 [Preview] No. 12870 [Reply] [Last 50 Posts]
I MADE A THING :DDDDDD

https://github.com/loki-project/loki-network

posting via it rn
22 posts and 3 images omitted.


Anonymous 12/15/2018 (Sat) 15:17:26 [Preview] No.13030 del
Always cool to see new work.
Is it better or worse than I2P?
What's it trying to be that I2P or Tor is not?


Anonymous 12/22/2018 (Sat) 01:02:26 [Preview] No.13045 del
>>13030
it's already better (faster and easier) than i2p.
it's basically just my i2p replacement


Anonymous 03/22/2019 (Fri) 19:51:15 [Preview] No.13232 del
0.4.0 was released with a massive overhaul. It's incompatible with old versions.

https://github.com/loki-project/loki-network/releases


Anonymous 03/31/2019 (Sun) 05:45:13 [Preview] No.13244 del
update: has been ported to several different operating systems


Anonymous 04/01/2019 (Mon) 16:54:51 [Preview] No.13249 del
Is this really that easy to setup?
I compiled the thing and followed the guide.
While it seems to work, I can't connect to any .loki address, even the test one from the guide.
It just keeps exploring the network and then throwing "invalid pkt".
I dunno, maybe i'm just retarded, but I can't get this thing to work.



(89.79 KB 500x375 computer-fire.jpg)
CPU Stress Testar Anonymous 03/12/2019 (Tue) 21:28:24 [Preview] No. 13221 [Reply] [Last 50 Posts]
Thats mathematical!
Get those branch predictors moving!
Out of order executing to the rescue!

Activate the most CPU transistors with the least amount of Instructions?
This means Memory Controller(Read/Write), Integrated GPU, Multicore(SIMD?), Peripheral(USB/PCI/Etc.) controllers(What was once the North/South Bridges...), Intel ME/AMD PSP?, L1/2/3 Caches (Some Reverse Engineering Here...), Branch Predictors/Out-Of-Order(Deeper... Programs that would benefit from such technologies?(If/Else?...)), CPUID ROM, Microcode Memory?, Floating-Point(Double/Highest Precision)+Integer Units, Instruction Decoding(Complexity=Better?), Registers(MOVing?), Herp Derp Intel "Technologies"(AMT, vPro, Hyperthreading, VTd, Etc...) and other parts of the CPU...

Determine what instructions result in the greatest total activation?

You could write a simple C program like "main(){while(1)} to hang the CPU, but we want to push it as greatly as possible!


Anonymous 03/21/2019 (Thu) 10:43:02 [Preview] No.13228 del
Hey guise I also just read "Computer Architecture: A Quantitative Approach" and want to use my new vocab!
Here's my l33t way to get those branch predictors pumping!
'time emerge --oneshot coreutils'
You can also try lm-sensors!


Anonymous 03/22/2019 (Fri) 01:12:12 [Preview] No.13231 del
>>13228
Your an idiot if you think this was a way for me to boast my knowledge. I would have gone on plebbit if I wanted to do that. What I am achieving here is the greatest amount of current flowing through my CPU with the least amount of instructions, to break it down at the "normal" frequencies set by the manufacturer, finding silicon imperfections if you will, might even find some unintended behavior!


Anonymous 03/31/2019 (Sun) 14:46:20 [Preview] No.13247 del
int i=0;

while()
i++;



OPSEC Endwall 08/23/2016 (Tue) 01:08:39 [Preview] No. 357 [Reply] [Last 50 Posts]
Discuss best practices for operational security.
19 posts omitted.


passwords/passphrases Endwall 10/18/2018 (Thu) 22:50:06 [Preview] No.1328 del
Cross-posting copy-pasta from >>>/b/19022

"I've covered this in an old OPSEC thread and I think I'll report this password tip copypasta because it is a very good security tip (the two anons were originally from 8chan/n/):
PASSWORD SECURITY TIPS
Anon #1 posts following: Now As far as passwords go, here is how I do it: I'll give you an example by posting a supposed password: donotletthefedsseethisaccount887756

As you can tell, this passowrd has 35 characters total. This is A LOT of characters but also easy to memorize too, for example, its easy to remember the phrase; "do not let the feds see this account" ; and added to that phrase is a code (which you can also memorize easily) 887756. Once you come up with a phrase you can memorize it, then attach a code number you can easily remember right after it. This will make your password very difficult for hackers or spies to brute force using 'dictionary attacks' by adding random entropy at the end of the phrase (via the random code). This 'password' would be unbelievably hard to crack if it were not a fake and had I not posted it. Use your tinfoil hats, paranoia can be your best friend.

Anon #2 responds to Anon #1: It is better not to do letter/number type strings camel casing and special characters as well. Pass phrases are easier to remember but mixing it up makes it exponentially harder to brute. Though your example is secure enough a minor change can make a large difference in your password scheme. Also a lot of programs cut you off at 16 (or even fewer) characters so casing/ascii helps.

Ex: donotletthefedsseethisaccount887756 would average 10^66 tries. Just moving the numbers and adding casing/one special character you get: Do8Not8Let7The7Feds5See6This@ccount which bumps it up to 10^84 and is just as easy to remember."


Endwall 10/20/2018 (Sat) 04:58:20 [Preview] No.1329 del
>>1328

While I think this is good, for memorization, I use 25-40 character random ascii passwords using /dev/urandom or
passgen.sh. I write these down in a notebook that I keep in a small safe in my computer room/ study. I
also add random characters inserted into the computer generated password. Some of these passwords are memorized
and not written down anywhere. For example the codes I use for user login and for cryptsetup and gpg are
memorized, while the codes for github, protonmail, and other online services are written down in a notebook that I keep in a safe. I use different passwords for every distinct online service.

Ultimately I would want a system as follows: 2 factor authentication, Factor 1 would be a 20-30 character
memorized passphrase number combination as mentioned above in >>1328 or using random memorized ASCII like I currently do. Factor 2 would be a 3.5" floppy disk with 1.44MB of random ASCII characters generated using OpenBSD on a Sun Sparc or DEC Alpha air-gap computer, with read only permissions and a hash, and the write protect toggle on. You would boot
your computer using both the disk key with the non-guessable ,random passphrase and with the memorized code.
You would keep the key in a safe in your study when not in use or on your person 24/7. Preferably you would
need both keys to open the encrypted computer. The memorized passphrase would allow you to boot to the point
where you need another key to decrypt the entire volume. This second stage uses a non dictionary, anti-brute
force password consisting of 1.44MB of random ASCII, that can't be guessed or memorized, stored on a floppy disk
for rapid destruction by neodymium magnet, mechanical shredding, and burning with a lighter. Once the volume is unlocked the computer should instruct you to remove the disk from the drive and stow it away, so that the OS never gets to or has the chance to read the contents of the disk once authenticated.

Message too long. Click here to view full text.



Anonymous 11/27/2018 (Tue) 22:41:04 [Preview] No.1345 del
>>1323
Have you used uMatrix before?
Very similar idea to this 3P blocker except you can specify what type of content you want blocked. I.e. XHR, JavaScript, iframes, CSS, fonts, etc.
I swear by it. It's very useful, the interface takes a little to get used to but once you do you can work very efficiently with it.


Anonymous 03/21/2019 (Thu) 09:13:24 [Preview] No.1383 del
nice try grandpa
are you aiming for privacy, anonymity, security? VMs are unreliable from a paranoid security standpoint due to complexity, nevertheless if they provide anonymity, it may be worth it against larger foes that can compromise security with their access to exploits. Similarly with Tor Browser Bundle, sometimes it is better to blend in rather than to obscure your identity. a hoodie will be less conspicuous than a facemask.
>>1249
>don't post modern photos except PNGs because of exif
you can strip exif data using 'exiftool' and other solutions. I have heard stories about cameras having hidden codes (and more likely, repeatable and detectable design flaws) that can be used to identify the module, but that's real rumor oojie boojie
>avoid all digitized vehicles
avoid vehicles especially with push-button ignition, vehicles with a disabled wireless unlocking mechanism would be preferable but there are vehicles with an option to disable the keyless wireless fob.

>>1248
>don't use social media
endchan is social media
>use a cheap private vpn
use someone else's vpn, don't leave a paper trail of payment leading to your credit card
>do not buy green appliances
enjoy getting vanned because your electricity company can tell when you're browsing the internet via the smart meter. green is just a color, but energy efficient appliances are easier to run off battery power and/or solar power sources.
>>1167
>responding to phishing attempts at all

Message too long. Click here to view full text.



Anonymous 03/29/2019 (Fri) 21:15:48 [Preview] No.1385 del
(91.93 KB 400x400 glownigger.png)
Don't use smartphones.



tor /cyber/ chatroom Anonymous 09/25/2018 (Tue) 18:10:41 [Preview] No. 294 [Reply] [Last 50 Posts]
A few anons on 8ch made an anonymous chatroom behind Tor, but the place is a bit small at the moment. Come and chill with us.
http://wkg2h6gin6i745lp.onion/chat.php
19 posts and 8 images omitted.


Anonymous 03/21/2019 (Thu) 21:59:44 [Preview] No.314 del
>>313
It's very much alive.


sudo mv lang_* /* Anonymous 03/22/2019 (Fri) 12:11:58 [Preview] No.315 del
>>313
brutally murdered the site for a day, sorry about that. Everything is back up and running now


Anonymous 03/22/2019 (Fri) 15:33:13 [Preview] No.316 del
Looks like it's back up again.


Anonymous 03/25/2019 (Mon) 07:13:57 [Preview] No.317 del
Looks like it's not.


Anonymous 03/27/2019 (Wed) 17:56:33 [Preview] No.318 del
Looks to be up now.



(14.09 KB 274x248 1552887040853.jpg)
just now on #xubuntu
> Hello sir
> how are you
> My laptop is 2gb ram and 380 gb hardisk
> can i use xubunt



Internet Security General Anonymous 04/16/2016 (Sat) 07:56:30 [Preview] No. 4 [Reply] [Last 50 Posts]
Continuing from >>>/tech/597
https://archive.is/INR3l
This is for non specific, general tips for anonymous web browsing and downloads, tips on browsers and browser configurations for the security concious that you don't want to make a new thread for.
92 posts and 7 images omitted.


Endwall 07/06/2018 (Fri) 04:03:41 [Preview] No.1244 del
circuitstats.h: * 1000 is approx 2.5 days worth of continual-use circuits. */
circuitstats.h:#define CBT_NCIRCUITS_TO_OBSERVE 1000
circuitstats.h:#define CBT_MAX_RECENT_CIRCUITS 1000
circuitstats.h:#define CBT_MAX_MAX_RECENT_TIMEOUT_COUNT 10000
circuitstats.h:#define CBT_MAX_MIN_CIRCUITS_TO_OBSERVE 10000
circuitstats.h:#define CBT_DEFAULT_TIMEOUT_INITIAL_VALUE (60*1000)

this seems to have been moved into src/cor/or/circuitstats.h

use grep to search for other missing / moved variables. Thanks for the tip >>1241 , >>1242 .


IRC Endwall 12/30/2018 (Sun) 15:41:05 [Preview] No.1357 del
IRC Workflow
STEP 0) grab endsh.sh

https://raw.githubusercontent.com/endwall2/endtools/master/endsh.sh

requires torsocks and firejail

STEP 1) Install IRSSI

$ su
# torsocks -i pacman -S irssi
# exit

STEP 2) Modify config file
$ cd ~
$ cd .irssi
$ nano config

Message too long. Click here to view full text.

Edited last time by Endwall on 03/09/2019 (Sat) 06:52:35.


Endwall 12/31/2018 (Mon) 02:26:09 [Preview] No.1360 del
>>1357

You can also set up proxying to 127.0.0.1:9050 in Hexchat. This works when connecting to the .onion addresses.

Settings->Preferences->Network-> Network Setup

Fill in the socks5 proxy information. Then Add the new server in the connection tab using the .onion address and port number. Works.


Anonymous 02/17/2019 (Sun) 03:15:44 [Preview] No.1369 del
Unless there is a discount for buying a vpn with bitcoin. It is not necessarily an anonymous transaction because you theoretically connect to your raw ip with the bitcoin purchased vpn.


baroque music is played exclusively on modern instruments ShawnWic 03/19/2019 (Tue) 06:22:59 [Preview] No.1382 del
REMOVED
No Spam 5 year ban
Edited last time by Endwall on 03/19/2019 (Tue) 07:15:15.



(30.89 KB 800x800 Sticky.jpg)
Anonymous Board owner 05/09/2018 (Wed) 22:40:59 [Preview] No. 12705 [Reply] [Last 50 Posts]
Welcome to /tech/, a technology board. This board is for general discussion of technology.

Rule 1: Only threads about technology or /tech/ itself are allowed.
Rule 2: NSFW content are only allowed if they are spoilered.
Rule 3: No referral links, asking for cryptocurrencies, advertising or similar.
Rule 4: No spam or posts without meaningful content.

All rules and policies are open for discussion in this thread.

IRC: #/tech/, #InfinityNow and #endchan on irc.rizon.net - https://qchat.rizon.net/
Wiki (OLD): https://wiki.installgentoo.com/

Archived sticky threads:

https://archive.is/Lcqkj
https://archive.fo/WxkDv

Message too long. Click here to view full text.

Edited last time by _ on 06/19/2018 (Tue) 02:20:22.
37 posts and 9 images omitted.


Anonymous 02/19/2019 (Tue) 19:41:20 [Preview] No.13207 del
Hello. Who have archive of old threads?
2017 and older


Anonymous 02/19/2019 (Tue) 20:53:08 [Preview] No.13208 del
>>13183
>>13191

This, for myself, shows the great migration experiment has ended. I view my participation on Endchan largely though the lens of the Infinity Next failure, and the attempts find a better solution. In time, Endchan suffered its own catastrophes along with more in 8chan-land.

While Endchan remains active, it appears we've reached an over saturation of
traditional legacy boards across the whole of the internet. Still, had a few good threads here for the time I spent.

Maybe Adolph'll pick her up and plop her down somewhere in alt-naziland? Could be fun.

Good good luck BO, and thanks for the show.


Anonymous 02/22/2019 (Fri) 06:13:44 [Preview] No.13210 del
>>13183
>>13208
Too bad that the users of this board were never that good with technology. They were years above typical people, but far from a unified knowledge base seen in only a few individuals across the planet...

Intel/AMD CPUs were hit with Meltdown and Spectre, and Intel already had the Management Engine inside of it.
Some things with TOR and other projects happened, a coordinated attack on multiple imageboards (Be lucky that I am telling you this, it was largely undetected) that resulted in lainchan, mewch, and other getting hit hard.

Goodbye.


Anonymous 02/22/2019 (Fri) 06:35:11 [Preview] No.13211 del
>>13183
While I'm not familiar with the board, after a quick skim I see you did a good job. I also found threads with potential, wish Endchan would have a few more posters. I hope someone with good intentions takes over your place.
Have a nice one, dude.


Anonymous 03/13/2019 (Wed) 00:07:17 [Preview] No.13222 del
Anybody has any idea what is this about?



Youtube Replacements Endwall 06/11/2016 (Sat) 08:29:50 [Preview] No. 78 [Reply] [Last 50 Posts]
Google engages in sophisticated datamining of your video viewership. Youtube is also a prism service provider.

List any substitutes for youtube for use with youtube-dl or endtube below:
35 posts omitted.


Anonymous 03/10/2019 (Sun) 22:18:21 [Preview] No.1377 del
I believe in replacements as a mirroring service and if need be permanent alternative. However being able to have the reach of youtube as a content creator is unparalleled. Especially for these who make niche content that doesn not want to shill or promote vimeo links youtube has an actual stream of people checking videos out related to ones you post and (not so much now with the algorithim censorship.On voat they where exposing that youtube allows you to literally pinpoint pedophile things with the lauded search algorithim like kids in bathtubs playing bathtime and they search by live stream with the term fortnite and literally watch kids sleep that fell asleep streaming fortnite gameplay. You can do that on youtube but you can't get a direct query for say sandy hook inconsistancies.You can't search for anything conspiracy related without the results page showing a snippet of wikipedias article on the designated conspiracy. I have only seen it with freemasonry maybe that is the only one they do it for lol.) have organic viewership. The issue mainly is the telemetry and datamining but above that the intrusive sms verification needed to make an account. For that I suggest making a throwaway account in a virtual machine with at least tor maybe vpn-tor-vm-vpn2 and yo can post your content. It may take months to get a new number and be the first to use it before some android using Porto rican using the number to make a gmail or his seo bot to fake his spic videos.
Forget monetization unless you are crafty enough to make a throwaway paypal using japanese info that is a loophole i read not sure if it still works. But that won't work because its counter intuitive to security. but I have seen things like pva creator for windows that allegedly makes 500 gmail accounts at a time. it doesn't work in wine but if anyone uses windows give it a try here is a cracked older version i found. weblink removed
see
>>>/h4x0r/124
Edited last time by Endwall on 03/13/2019 (Wed) 01:59:15.


Anonymous 03/10/2019 (Sun) 22:20:26 [Preview] No.1378 del
>>1377
Aside from that there is sms verification sites. might have to buy one w/ bitcoin if time sensitive but if you try (it might take weeks) you can get a gmail with one of the temporary numbers from the sites below

Aside from that there is one other way you can get throwaway gmail access and that is by using cracked username password combos. Apparently you (on a vps) run the combolists through a checker and will have a list of owned accounts. Not good for something to re-login to a lot but if they are going to censor people there are ways to distort that.

Content removed
see
>>>/h4x0r/124
Edited last time by Endwall on 03/13/2019 (Wed) 01:58:02.


Endwall 03/11/2019 (Mon) 02:09:49 [Preview] No.1379 del
>>1378

This has nothing to do with Youtube replacements. Start a thread about fake credentials in >>>/h4x0r/ and re-post. Same goes for your link to your fake gmail account creator. This content will be moved or deleted by next Friday night.


Anonymous 03/11/2019 (Mon) 03:43:53 [Preview] No.1380 del
>>1379
Oh shit I thought it was fine because often I always see in any privacy sort of discussion various people basically concern trolling and saying "tor is comped" and whatnot. That back and forth is so common I thought it would be ok to have that stream of conciousness.
Will post on /h4x0r/ but I am not even a skid so now its migrating info into the point I will fuck that up too. I tried enjoy the info and thank you so much for sharing the info you find sporadically. Not to mention the endwall repo and hidden service,

If i am not mistaken this board all of it started from you dumping your tips on /tech/. It was a derailment a burst I shot my load too in this thread so I thought it was in the flavor of it all but I am a BO too so I understand keeping it orginized lel.



DIY, Modular, Open source Laptop Anonymous 07/09/2017 (Sun) 23:55:14 [Preview] No. 10163 [Reply] [Last 50 Posts]
Laptop form factor open source hardware design, built from off the shelf components for DIY, modular, open source computing.

CPU, RAM, graphics: 1x single board computer
FSB, ports: 2x powered USB hub
Battery: 1x USB powerbank, >5000 mAh, >2A
Input: 1x USB keyboard
Input: 1x USB trackpad
Storage: 1x USB flash drive
Network: 1x USB WiFi dongle
Audio: 1x USB sound card/headset
Display: 1x USB powered HDMI monitor
Case: 3D printed or DIY glued wooden case

Features:
-Completely modular, customizable, upgradeable and repairable
-User serviceable by all users
-Universal, modular battery and charger. Can swap battery when depleted

Message too long. Click here to view full text.

28 posts and 8 images omitted.


Anonymous 12/10/2018 (Mon) 03:42:39 [Preview] No.13012 del
>>10163
system76 is working on a fully, or mostly, open hardware laptop afaik.


Anonymous 12/13/2018 (Thu) 18:42:21 [Preview] No.13022 del
>>13012
You are right, this is great, thanks for the hint.
I just watched this interview: ht tps ://y outu .be/ Fopa1Uoh87w?t=836
This stuff is exiting. I'm looking forward to what they are going to do.
I think it could go big real fast when they do that with laptops, so I hope they get it right.

Module based laptops are coming
It's going to go that way for sure.
It's just a question of "when", and I like that it is free side that is pushing it.


Anonymous 12/29/2018 (Sat) 17:08:57 [Preview] No.13065 del
>>13012
that's clevo


Anonymous 01/04/2019 (Fri) 03:23:34 [Preview] No.13088 del
>>13087
go back to /am/


Anonymous 03/10/2019 (Sun) 10:33:06 [Preview] No.13218 del
The case is the easiest and cheapest part of the DIY Laptop. There are many good options, from 3D printed, plywood, acrylic, CNC aluminum, fiberglass, a briefcase, even clay, paper mache or lego. The cost will be <$20, no matter what.

The lego case is most DIY, modular and open source. It is only option that can be freely disassembled and reused. The mechanical properties of the lego are same as 3D printed ABS or ABS injection molded cases. The reproducibility of lego cases is high. If more strength is needed, the lego can be glued.

Plywood or acrylic are strong and cheap case materials. They can be lasercut.

Aluminum is an ideal case material, because it is strong, durable and light. It needs machining. Titanium is better than aluminum, but more in cost.

3D printed PLA or ABS plastic will make a case that is not as strong as plywood or aluminum, but can be made using only a 3D printer.

Fiberglass or carbon fiber is a high performance case material. It will make a very light case. Construction is slightly more difficult than the other options, as reproducibility is less.

A briefcase or binder can be made into a laptop case.

Clay and paper mache are the most DIY options.



Endware Endwall 05/03/2016 (Tue) 08:54:28 [Preview] No. 32 [Reply] [Last 50 Posts]
Endware is a suite of programs geared towards internet privacy, security, and anonymity.

Endwall: endwall.sh is an iptables based firewall script designed to be implemented on any linux distribution shipped with iptables. endwall.sh is based on default drop policies, coupled with a novel strategy of passing packets on local host ports only for those enabled by the enduser. It comes with a variety of well used ports enabled with several additional port passing configurations available by uncommenting the script. It provides essential security to a new user.

Endsets: endsets.sh is a script that adds blacklisting and whitelisting functionality to endwall.sh. It depends on the program ipset. It is persistent on reboot if you enable ipset as a service. This is the recommended blacklisting tool for endwall if you are running a server or planning on opening up ports and services to the public and will require daily blacklisting of new incomming IPs.

Endlists: endlists.sh is a traditional text file list based blacklisting and whitelisting script. It has slow performance, and can't be updated on the fly. Good for <1000 ip subnets, very tedious and slow to run for more than that. Blocks the IPs by adding them as individual rules to the iptables ruleset. Works but not recommended for heavy duty on a server. May be useful for workstation use to block ip ranges if you are not opening up ports and services to public clients.

Endtools: endtools are a collection of scripts including alogz.sh, mlogz.sh, spamlogz.sh and iplookup.py. These scripts will help to service an enduser of endwall in adminstering endsets/endlists.

iplookup.py is a geoiplookup script written in python and requires python and pygeoip. It has simmilar functionality to maxmind's geoiplookup program and uses the maxmind *.dat files.

spamlogz.sh is a script that searches through log files to find flagged log entries flagged in endwall.sh, endsets.sh and endlists.sh.

alogz.sh is a daily log reading script designed to read the output of an apache http server's log output.

mlogz.sh is a daily log reading script designed to read the output of a postfix smtp server's log output.

Message too long. Click here to view full text.

Edited last time by Endwall on 02/25/2019 (Mon) 00:18:53.
235 posts and 3 images omitted.


Endwall 12/31/2018 (Mon) 02:57:41 [Preview] No.1362 del
School starts back on January 10th. I'll probably be busy again, so updates will be slow from February-April. I should be more productive from May-August.

I was recently working on endstream auto populating its channel list matrix. The benefit will be that I won't have to manually update the channel matrix every time I move channels around. The downside is that it takes about a second or two to run through the loop and print out the channel tags (slow). The current static channel listing is faster to display so is a better user experience. I might hold off on adding this feature. Alternatively I could just make a script that creates the channel listing then copy and paste it into the static setup. That would be the best of both worlds.


update Endwall 02/22/2019 (Fri) 01:51:57 [Preview] No.1371 del
winstream.bat version 0.05
https://raw.githubusercontent.com/endwall2/endstream/master/winstream.bat

I've added most of the static streaming channels from endstream to this now, and tested it. I also added multiple menu switching, so it is similar to endstream.sh. This file with mpv.exe and youtube-dl.exe and setpath.bat can turn any MS Windows computer into a 720 channel video streaming device. I use this to watch news on the projector screens at school.

I saw Alex Jones smashing a ROKU with hammer and complaining about de-platforming. Well Alex, I've re-platformed you on Endradio, and Endstream and now on 80% of desktop computers with Winstream. Alex is 5 mins of content per 60 mins of show. 30 mins of commercials, 15 mins of ranting and raving about how he's the tip of the spear, he was there first, saw it first, the enemy is attacking, snarling and acting like a lunatic, 10 mins of plugging the infowars store and supplements, and then 5 mins of news / content. I don't agree with everything Alex says but I believe in freedom of speech. I don't like how he talks over his guests when they say something interesting...really annoying. David Knight is alright though, he's pretty decent. Anyways you're re-platformed Alex, I've placed your channel adjacent to the globalists at the UN and the Leftists at Free-speech TV, so you can fight it out in the public forum of ideas.

I'm around but I'm busy with school work, labs and assignments, and studying for quizzes and tests. Any software feature requests, comments or bug reports place in the comments below.


Endwall 02/25/2019 (Mon) 00:21:46 [Preview] No.1372 del
Endware Hidden Service
http://nguipxnkrp3qrzrlduhsatpcpwehnblzmlkc5ifiumxq4z5jlh4lwvid.onion

I wiped the keys and hostname and started over. It was stalling out for some reason and inaccessible. Removing the directory and restarting solved the problem.


Endwall 03/09/2019 (Sat) 03:30:34 [Preview] No.1374 del
I just added a self signed certificate for ssl access over Tor.
Endware Hidden Service TLS/SSL
https://nguipxnkrp3qrzrlduhsatpcpwehnblzmlkc5ifiumxq4z5jlh4lwvid.onion

Also I think that my website was blacklisted by the Tor (((directory authorities))). This is the 3rd time that this has happened. The secure computing practices list ,SCPL, is hosted on the same computer, which is in my computer room/ study. The connection was up and I could access the SCPL site, but couldn't access the Endware site. The log for Endware showed all activity suddenly drop to null for 2 days straight, while activity on SCPL remained constant. Same computer, same connection, different tor URL. The tor connection was up and I could use it from the computer, and access the SCPL hidden service from other computers behind tor. No access could be gained from any computer through Tor to the Endware Hidden Service. I fixed the problem by deleting the old hostname/ key pair for Endware and restarting tor.

I hypothesize that the Tor project can and do censor people and websites at the request of Government Authorities through their control of the directory authority. This is unacceptable. I believe that Tor should be forked and the directory authorities replaced by a distributed blockchain based solution. Tor / Tor Hidden Services are not censorship resistant under the current model. Based on this experience I believe that they can block your Tor Hidden Service if they don't like the content.

Meow: Oooo I have some leaks!!! I'll use my phone call now!
Agent Smirk: ....What good is a phone call if you can't .....speak?
Meow: MMmmm Mmmmmm mMMmmm MMMMmmmmm aarrghhh Mmammmmm *Chair falls over*.

You can check my ssl certificate (valid for 3000 days / 8 years ish) against previous connections if I have to repeat the process, although it is tied to the current onion domain so it may give you an invalid certificate error if the new domain doesn't match cert when I wipe and restart next time it happens.


Endwall 03/09/2019 (Sat) 03:40:01 [Preview] No.1375 del
>>1371

I placed the setting of the PATH variable for Winstream.bat into the file it self, so you can make a shortcut to the file and put it on the desktop. Change the icon to that green play-button, and rename it just to winstream . Open the file with a double click from the desktop. Works like a charm, tested it on several computers at school, takes about 2 mins to download mpv.exe and youtube-dl.exe into a directory and run it. You can also just make it portable and put the thing on a usb key so that you don't have to download anything. You can now turn any MS Windows computer into a thousand channel live streaming device.



Gimmickly new consumer products thread Anonymous 01/03/2019 (Thu) 06:58:40 [Preview] No. 13084 [Reply] [Last 50 Posts]
Let's have a thread for upcoming gimmicky stuff the tech companies sell. To start:

Google is developing a new radar based sensor. It'll be like using the Kinect to do shit on your computer or surf the internet.

https://www.reuters.com/article/us-google-sensor/google-wins-u-s-approval-for-radar-based-hand-motion-sensor-idUSKCN1OV1SH

Don't laugh too hard, some people have carpal tunnel so it might be useful.


Anonymous 01/03/2019 (Thu) 07:30:34 [Preview] No.13085 del
>>13084
neat, i still have that same exact router


Anonymous 01/16/2019 (Wed) 20:27:28 [Preview] No.13120 del
(42.92 KB 1280x720 DxCKnZHW0AEYfO6.jpeg)
(366.23 KB 2048x1152 DxCKoGNXQAI94O7.jpeg)
(16.70 KB 720x430 DxCLmz8VsAAPTQj.jpeg)
(101.20 KB 736x736 DxCLmz4UcAAxEHr.jpeg)
(79.73 KB 1024x768 DxCLmz8U8AAiYqS.jpeg)
https://twitter.com/i/status/1085531203791450113
Anything Apple does. This is how you grow a 1 trillion dollar company in 20 years.


Anonymous 03/06/2019 (Wed) 12:35:45 [Preview] No.13216 del
Grammarly
Wikibuy/Honey

Anyone who installs those is retarded.



Anonymous 02/16/2019 (Sat) 13:40:57 [Preview] No. 13197 [Reply] [Last 50 Posts]
You think suckless are the definitive software minimalists?
Oh boi, you're in for a treat.
gopher://bitreich.org


Anonymous 02/17/2019 (Sun) 07:53:13 [Preview] No.13199 del
printf "\n\n"
printf "********\n"
printf "* THIS WAS CLOSE. You are lucky. *\n"
printf "* We love you at bitreich, so we did *\n"
printf "* not delete your files. *\n"
printf "* We hope you learn three things: *\n"
printf "* 1. Never execute random commands, *\n"
printf "* printed on some random website. *\n"
printf "* 2. If we would not control the *\n"
printf "* server, you would have trusted *\n"
printf "* some insecure key and be redir- *\n"
printf "* ected to some other website. *\n"
printf "* (curl -kL) *\n"
printf "* 3. Have you removed the sudo? *\n"
printf "********\n"
printf "\n\n"
cunty :^)


Anonymous 02/17/2019 (Sun) 17:48:32 [Preview] No.13202 del
>>13199
Where is this


Anonymous 02/18/2019 (Mon) 10:06:12 [Preview] No.13204 del
>>13202
http://bitreich.org/
curl -sLk http://bitreich.org/s/bitreich.sh
I went to their gopher site. Doesn't seem like they have anything of note.
Nothing like dmenu or st.


Anonymous 02/18/2019 (Mon) 22:16:00 [Preview] No.13205 del
>>13204
>even more extreme than suckless
>expecting xorg bloat
you can find a note on their gopher that any presentations for their yearly conferences must be terminal only (100x35 chars to be exact)


Anonymous 02/19/2019 (Tue) 01:36:48 [Preview] No.13206 del
The only thing I found that I might be able to use is iomenu
But then again I don't even use dmenu as anything more than a program launcher when it has much more functionality.