>IT'S B-BLOATED!!!!1! And you're telling me you can't afford a $200 PC from the past 5 years that will run it seamlessly? Sell your 15 year old Thinkpads that can't even into AVX or non-fixed pipeline GPUs.
>SECURITY RISK!1!!!!1! Have you anything to hide? No one cares about you. You aren't developing anything significant. You aren't a threat to the current ecosystem. You aren't a terrorist/spy/lone-wolf actor. FVEY has better places to spend its resources on. You're already being watched with facial recognition, Low-Earth orbit imagery satellites, and backbone-level deep-packet inspection.
You can disable the telemetry in settings. Go a step further too and get the Enterprise edition with minimal software preinstalled.
>BROKEN AND BUGGY1!!1! In the beginning? Sure, but now its quite stable, and you'll be hardpressed to come across any problems. Linux, on the other hand, presents you with hours of work, ranging from broken audio to missing files to a lack of hardware and application support.
>NON-FREE!11!!1! You're paying for consistent updates and almost full support for any and every application in existence. The user experience and interface is only beaten by Mac OS from Apple, and is lightyears ahead of anything Linux could bring to the table.
You don't take advantage of FOSS. You've never looked into the software to determine how it works.
>MICROSOFT IS SHITTY COMPANY11!!!!!1! And Stallman is a foot-eating pedophile. Separate the art from the artist.
>NON-CUSTOMIZABLE!1!!1! Windows is utilitarian with a focus on getting shit done. It won't waste your time with hundreds of customizable options and features. It just works. Imagine spending 10 minutes writing assembly code every time you wanted to use your microwave. The people who use windows only care about the applications inside of it, not stupid crap like sub-pixel rendering and kernel parameters.
>NORMALFAG1!!!!!11! Your elitism is nothing. "Normal" people are happy, fulfilled, and have their heads on straight. You on the other hand have spent countless hours behind a screen, posting on strictly anonymous websites, angry about the state of the world and how you're so much better than everyone else.
All useds of Botnet 10 and Botnet 11 should just install a Linux distro that has Xfce4 (like Xubuntu), switch the taskbar to the bottom and install Chicago95 gtk theme. Then they need to install Gnome Software (or better Synaptic package manager GUI) and perhaps Wine or Proton. >https://github.com/grassmunk/Chicago95
>>14460 >And you're telling me you can't afford a $200 PC from the past 5 years that will run it seamlessly There is no such thing as free RAM. If you don't use your RAM, it's used for disk cache or may help you in future with holding more software. I've been working with 2+ simultaneous VMs and other memory hungry software (just like parallel/ultra quality compressors), that's why I use my customised Linux installation that gets like 200-300 megabytes of memory (with all the daemons and graphics) on startup instead of MS bloatware that typically eats 1+ GB of RAM nowadays with much less trim down options. While Ubuntu kids who use Electron software squeal for their RAM and ask for more swap, I have all the RAM i can need on every resource-constrained environment I get into.
>Have you anything to hide? Sure, I live in an authoritarian country (come to Russia, China or anything alike, I dare you) that's gonna go full totalitarian any moment. Even if I did live in a free country, a very slim attack surface is a very handy thing. Besides, everyone has their dirty little secrets. Or not so dirty, like that email recovery question or a credit card security code. >You're already being watched with facial recognition, Low-Earth orbit imagery satellites, and backbone-level deep-packet inspection. As long as they can't see my thoughts, it's not a reason to give up all the privacy.
>Sure, but now its quite stable And that's why every nonliteral Windows user asks me to unfuck their PCs fucked up with clogged autorun, lots of shitty Chrome extensions, to make their alt-shift keyboard layout changing combination work with both alts, to unfuck their games not starting and showing cryptic errors due to missing libraries or some other shit and the list goes on and on ending with missing drivers on a typical fresh Windows install. Who could imagine?
>Linux, on the other hand, presents you with hours of work Not quite. Every 'work' a casual user would need is to install a non-free driver if the free one's not the thing they want. Or doing the intial customization to suit the needs (which can be eeasily automated by literally copying the dotfiles or /etc/ configuration). And no unfucking routines like these you have on Windows.
>You're paying for consistent updates and almost full support for any and every application in existence. Show me my bills for Linux then.
>>14460 >You don't take advantage of FOSS. I do. All my everyday programs are FOSS, my Linux system has custom scripts and settings for me and I did things that are hard or impossible to do on an everyday Windows PC. Moreover, I'm gonna buy a small cheap ARM computer (and maybe even two) which will have full support of my everyday software. If the future is bright (or not so bright), I might be thinking of changing my computer to a RISC-V or MIPS based one without losing almost any of my software use cases, the switch will be seamless.
>You've never looked into the software to determine how it works. I did. In fact, I do it on a constant basis and even when riddling around with Windows fuckups of others' I use methods I got with my Linux experience (like using strace).
>And Stallman is a foot-eating pedophile. Separate the art from the artist. Stallman being a foot eating pedophile does not interfere with GCC and Emacs being great software since Stallman makes no fools of his code' users, just granting (and not forcing) them fruit of his work. He explicitly states the the user is free to use his code in every way possible if they respect the rights of other users, that's what the 4 freedoms are all about. And here's Gates who sees himself ad a shepherd of the sheeple, always telling the others what to do and restricting their freedoms in one on another way, all while forcing his software through shady agreements, i.e. the school ones. That's what the shittiness of MS (besides managerial bullshit leaving lots of code that matters in unmaintained and unmaintainable state) is, not the public image, but the treatment of the customers.
>Windows is utilitarian with a focus on getting shit done. If Windows would be utilitarian, it would have a decent shell and a whole lot of shell programs, at least boasting a BusyBox alternative. That's how shit is done. And even if it is "utilitarian", these gigabytes of RAM and hard drive storage eaten by Windows have to be explained, since no program that does one thing and does it well eats up that much. The thing is that most Windows parts were (and are) actually customizable (and they are under the hood), but the shepherds of the sheeple restricted most of that or either did a lot of settings no one actually uses, but the manager almighty wants. AFAIR, moving the panel in Windows 11 is now non-negotiable, something that even Windows 95 could do. The very concept of "utilitarian" is intertwined to some extent with the UNIX concept of simple programs that do one thing and do it well. Yet a lot of classic UNIX programs boast configurability in the same package. Most of that configurability is done by the shell, while the other part is dictated by the users who code the software, not managers who use another OS at home and don't really care about their product. Each way UNIX systems win, (yet a simple do one thing and do it well approach is the thing that should be preferred, since there is the common glue - the unix shell).
>Imagine spending 10 minutes writing assembly code Ever written assembly code? I guess you have no idea about the assembly. Why would you mention things you have no idea about?
>and self destructing >privacy It's a fucking scam. Rule of a thumb: you see software that says it's gonna do self-destructing messages - its' owners either don't know what they are doing or are scammers who may trick you into writing everything that can be written to a hard drive with a simple change in the application. Just like Skype's message editing history could be made available with a simple CREATE TRIGGER on its' SQLite database. Besides, telling the other side what to do is a good opportunity to fuck with its' journal.
>>15026 >web-based >>15027 >But what I know they plan to make it open source.
So much for privacy and security. A fucking web honeypot with shitload of JS almost certainly coming from ButtFlare or any other butt storage provider, probably with crucial details going between server and client and, of course, it's centralised so anyone snooping knows your ass was shitposting during the very hour they got the metadata for.
Hak5 7 Year Old Linux Flaw Newly Discovered - ThreatWire https://youtube.com/watch?v=12oSZ3FVXBA [Embed] Jun 15, 2021 "EA Source Code was Stolen, a 7 Year Old Linux Flaw was Discovered, and 1.2 Terabytes of Data was Mysteriously Stolen from millions of Windows pcs!"
Где Вы ищите свежие новости? Лично я читаю и доверяю газете https://www.ukr.net/. Это единственный источник свежих и независимых новостей. Рекомендую и Вам
Translation to English: Where do you look for the latest news? Personally, I read and trust the newspaper https://www.ukr.net/. It is the only source of fresh and independent news. I recommend it to you
Edited last time by Endwall on 01/18/2022 (Tue) 01:12:51.
>>15029 >freenet Be careful with this one. When using Freenet you are hosting everything that you will ever come across, which means you can easily host CP without even knowing that. All it takes is some troll posting that on perfectly legal site. Depending on the country you can get in trouble for that so it's much better to use Tor or I2P.
I didn't hear much about t420 but thinkpads are best laptops I ever used so you should be fine. I recommend getting T440p or X230 though. Keep in mind that most of them (thinkpads) have BIOS locked so that may be an issue for you depending on how much control you want to have over your machine.
It turns out that MS Windows NT has an 80% market share in the Desktop Operating Systems Market (whatever that is...) So in all likelihood, if you work a job anywhere, you will be forced to sit down and work on one of these machines running this well known gem of an operating system. You probably won't have administrator rights, but that's OK, we'll make do.
In reality there is no Windows security but in this thread we will try to make life a little bit better even if it is just for a placebo effect. Also Windows hackers come and show us how you hack us up real good, and help our poor unprivileged users gain administrator rights without a password, so that they can install Mahjong. Windows Advanced Firewall, Registry Editing, Browsers, etc. Post all the tips and tricks to make Windows NT better than ever.
Whilst setting up one of my development laptops to port some software to Windows I noticed Windows 10 doing crazy things like installing or updating apps and games by default after initial setup. The one I noticed in particular was Candy Crush Soda Saga which for those who don’t know of it is some cheesy little puzzle game originally for consumer devices. I honestly did not want software like this near to a development machine. It has also been reported that Windows 10 now also updates core system software without notifying the user. Surely this destroys any vaguely deterministic behaviour, in my opinion making Windows 10 by default almost useless for development testbeds. Deciding instead to start from scratch but this time to set the inbuilt Windows Firewall to be very restrictive and only allow a few select programs to communicate. In this case all I really needed to be online was Firefox, Subversion and Putty. To my amusement (and astonishment) I found out that the Windows firewall could be modified to give access very easily by programs during installation (usually because this task needs to be done with admin privileges). It also seems that Windows store Apps can change the windows firewall settings at any point. One way to get around this issue could be to install a 3rd party firewall that most software will not have knowledge about and thus not attempt to break through. However the only decent firewall I have used was Sygate Pro which unfortunately is no longer supported by recent operating systems....
Drive Encryption BitLocker I'm currently encrypting my 2TB files drive on D:\ and my 500GB C:\ Drive on windows 10 using Bitlocker. This is for if you have to work from home with "Sensitive Documents" or files from work, or if you travel with a laptop that must have windows 10 due to applications needs or other factors. If you encrypt your device, the damage from theft or loss is much smaller than if left unencrypted. I will post some links to show how to enable Bitlocker without a "Trusted Platform Module" hardware unit. You will use a password. Select a strong password using passgen with around 20-40 characters and write it down and store it in a safe until you can memorize the sequence. Bear in mind that nothing that you do on windows 7,8,10 etc is private. Use this only for work files and documents that you need to protect from physical interdiction, theft or accidental loss that you must use with or in conjunction with Windows or Windows applications.
Go to the search tab and type firewall. Select windows defender firewall. Click on advanced settings. Block all incoming and outgoing traffic by default. Then wipe out all of the policies or click disable, better to click delete and remove them. Then add the policies that you need. Lock them down by application if need be. Play around with the detailed rules and use filters for programs, ports and ip addresses to get the desired effects for your network applications to work. Adding new programs magically changes your firewall settings, but go back and fix them after each new application install. Wipe out and delete all inbound rules. If you need to let inbound come in, then you should know enough about the application to configure it. Block everything and only let out/in what you need to go out/in, specific programs, ports and ip addresses.
Endware is a suite of programs geared towards internet privacy, security, and anonymity.
Endwall: endwall.sh is an iptables based firewall script designed to be implemented on any linux distribution shipped with iptables. endwall.sh is based on default drop policies, coupled with a novel strategy of passing packets on local host ports only for those enabled by the enduser. It comes with a variety of well used ports enabled with several additional port passing configurations available by uncommenting the script. It provides essential security to a new user.
Endsets: endsets.sh is a script that adds blacklisting and whitelisting functionality to endwall.sh. It depends on the program ipset. It is persistent on reboot if you enable ipset as a service. This is the recommended blacklisting tool for endwall if you are running a server or planning on opening up ports and services to the public and will require daily blacklisting of new incomming IPs.
Endlists: endlists.sh is a traditional text file list based blacklisting and whitelisting script. It has slow performance, and can't be updated on the fly. Good for <1000 ip subnets, very tedious and slow to run for more than that. Blocks the IPs by adding them as individual rules to the iptables ruleset. Works but not recommended for heavy duty on a server. May be useful for workstation use to block ip ranges if you are not opening up ports and services to public clients.
Endtools: endtools are a collection of scripts including alogz.sh, mlogz.sh, spamlogz.sh and iplookup.py. These scripts will help to service an enduser of endwall in adminstering endsets/endlists.
iplookup.py is a geoiplookup script written in python and requires python and pygeoip. It has simmilar functionality to maxmind's geoiplookup program and uses the maxmind *.dat files.
spamlogz.sh is a script that searches through log files to find flagged log entries flagged in endwall.sh, endsets.sh and endlists.sh.
alogz.sh is a daily log reading script designed to read the output of an apache http server's log output.
mlogz.sh is a daily log reading script designed to read the output of a postfix smtp server's log output.
>>1750 Which file are you looking at? It could be either or. Probably hasn't been touched since then. Last thing I updated was endstream.sh and winstream.bat last weekend, I think I updated the version #s and dates but I'll have to check. I have to update endstream_bsd.sh to fix the RT streams that switched recently I'll do that after I'm finished my homework, I have stuff due on Monday.
It might also be a typo in the header or maybe I forgot to update the rev date. The rev date for endwall.sh is rev_date="17/07/2018", but it says July 17, 2017 in the header which is a typo. I'll fix that later. Some of the files haven't been touched since they were originally created after a couple of revisions. Some of the files were working in the past and then something changed and now they're not working, but they haven't been updated or fixed ex. proxyload.sh . I work on what I feel like working on when it occurs to me to do something about it.
The things I use the most are endwall.sh, endlists.sh and endsets.sh,alogz.sh, mlogz.sh, spamlogz.sh, iplookup.py, check16.sh ,check8.sh, endfix.cf, and endtorrc for my the torrc on my servers. I also use oldtube.sh, endtube.sh, endget.sh, endcurl.sh and endloads.sh , when downloading stuff frequently. I use endstream.sh, winstream.bat and endstream_bsd.sh a couple times a day to check the news or if I get bored. endtv.sh was the prototype that endstream.sh was built on based on tv channels from filmontv. endradio.sh is an internet radio behind torsocks program. Many of the radio channels have died / switched streams so it needs an update, probably a project for Christmas. pdfclean.sh was a pdf cleaning and PDFA format enforcing script built from instructions posted in >>/tech/ by another user. pdfmerge.sh is a script I used to finish a homework assignment, I felt it might be useful to users so I added it, merging pdfs comes up every once in a while. endnode.sh is a script to determine the final exit node in your tor chain, I use that every now and then to check and see. condense.sh, renum.sh and rmdupes.sh were built from user requests / specifications. endstream.m3u8 was a user request, it needs to be updated badly but I don't have the time right now again maybe over Christmas.
I use endstream.sh a lot so it usually will get an update within a day or two if a channel breaks. I usually have 2-4 deliverables due each week for school, so that takes precedence, and Endware is hobby-ware for the weekend.
This software (script) collection was an attempt to automate some of my (and other people's) ideas about best practices for performing downloads and stuff anonymously using tor or with obfuscation (proxies, randomized download timing, and user-agents). Endstream is accidental software that isn't really related to the project goals, and doesn't provide viewership anonymity, but I use it daily so I added it to the collection.
What's there is what's there. If I have an idea I'll try to make something. I think that for messaging endfix.cf and endmail.sh can take you far. The mail address posted on the hidden service hasn't been up for a couple of years and I should probably remove that from the html. I'll put a new hidden mail service up when I have some time, again probably over Christmas. Until then just use the protomail address, or post something here to get my attention. The hidden service website is hosted under my desk in my room at home. My power has been shut off in sequence multiple times, and my identity is known to the Government(s).
I have a very dark view about the future of computer privacy, and anonymity. It's a completely solvable problem (theoretically), but it won't get solved for the masses because of convenience and inertia. And most of the people who think they have it solved are delusional.
endwall_raspi.sh I set up a rapberry pi 4 model B on Raspbian 11. I modified endwall_wifi.sh, and got it working. I have uploaded the iptables configuration that works for the raspberry pi on Raspbian 11 Bullseye and called it endwall_raspi.sh.
I tested endstream.sh from wifi and it works well. The audio works as well through HDMI. This will make a good multimedia streaming device.
Also Debian 11 bullseye switched their firewall system from iptables to nftables, so I'll be looking into translating endwall_wifi.sh into nft,sometime in the future, probably over the summer if I have time.
endwall_nft.sh I have just completed a preliminary translation of endwall.sh from iptables into nftables syntax. It is tested working on Debian 11. I'll work on a translation of endwall_raspi.sh into nft later when i set up the raspberry pie on raspbian 64 bit. I'll do that later maybe in July.
I have some more shell functions to translate and test but I'll do that work later on. The translation was fairly straight forward, and it seems to be working as of right now. Test it out and let me know if it works for you.
Hello friends and family! I am looking for an image of a diagram/chart of all the imageboard software. It was originally posted on 8chan's tech board in 2019: http://web.archive.org/web/20190622041930/https://8ch.net/tech/res/1059807.html Sadly archive.org has blacklisted the media files domain for 8chan and it's not on archive.today either. So if any oldfag here has the image, it would be much appreciated.
Alright, could anyone give me a basic bitch primer on dark web for little babbies? My knowledge at the moment is limited to Tor, and the onion addresses for the hidden wiki, and the onion address for Endchan. I'm starting to realize given how every site I liked has been shut down, switched domains, DDOSed, put on watchlists, or made 'registration only' on clearnet channels (a sidenote: I would have thought this would have happen to the porn sites I visit, but oddly enough, those are A-OK on clearnet) that I need to go ahead and plan for the future and just move whole-hog to Dark Web. To those who wil say I'm a little late to figuring this out: you're right. Here's what I would like if anyone can supply it:
- What are all the darkweb channels? Tor, I2P, Zeronet, Freenet....am I missing any?
- Any basic tips on general usage/quickstarts for each channel. Pros/cons of each.
- Good starter websites for each. I'm particularly interested in news/forums, and any libertarian websites.
Project Summary by Varun Chandrashekhar: "I have designed and developed a speech interfaced for the paralyzed, which they can use to communicate without speaking. This device detects speech-related electrical signals from the throat and converts them into letters or words that we recognize using machine learning models."
My comment about the project: easily replicable by anyone with computer science knowledge, different from what is being done with the silicon trojans in the 3G/4G/5G equipment only on it needing physical probes. Anyone doing research on this area be cautious of sabotage when using US designed CPUs (AMD/INTEL/QUALCOMM/APPLE/ARM), as the microcode, SMM and firmware of your system may be manipulated to mess up your computations. Ask your own Nation to stop trusting Silicon Valley and make your own silicon supply chain and tech services. Meanwhile, mitigate this situation by moving to an area away from any cell radio transmitter (check coverage on OpenCellID.org) and shielding yourself and your devices from electromagnetic eavesdropping and interference.
Cool proyect. Does it need to have a Mega? What would be the problem using a Uno? I was just thinking the Mega is too bulky and the Uno is smaller. And as far as I know the ARM is UK based, so no naughty US surveilance. Can't remember what band the XBee uses but I'm sure you could write some encryption for it, because I remember it being like wifi, just try not to send unencrypted thing on the air unless you want to.
Hello! My name is Agustin Cruz. I'm making a 3D Metal Printer for making parts with titanium and other metals. Is a low cost, Open source project, so everyone can make their own 3D Metal Printer.
The goal is to make 3D Metal Printing more affordable to the general public, hospitals, small institutions, organizations and companies around the world. Specifically for developing and low income countries. This project fills a gap that no open hardware successfully fills. 3D Metal Printing is an impactful tool. Making it more accessible will democratize science, engineering and empower people. This low-cost hardware will be able to accelerate innovations in and lower barriers to scientific research.
This printer uses an electron beam to selectively melt each layer of metal powder, causing the powder particles to fuse together. After one layer is complete, the build platform is moved down one layer in height. The re-coater comes in again with a fresh layer of powder, and the electron beam starts to induce the fusion of powder particles, causing the new layer to form. This process is repeated until the entire part is finished, making a solid metal part.
This is what I do fulltime. Doing all this takes a lot of time and effort. Now the project is opening to the community inside a crowdfunding model. The design, tests, updates, will be shared so I can receive some support and continue working 100% in this project
## I just tested these systems: MS DOS 6.22 runs in 384K of memory (1994) MS Windows 3.11 runs in 2MB of memory with a full mouse driven GUI (1994) Macintosh OS 7.53 runs in 7.4MB of memory , full GUI + TCP/IP (1996) Macintosh OS 8.1 runs in 13.2MB of memory, (1997) Macintosh OS 8.6 runs in 26MB of meomory, (1998)
OpenBSD 6.1 starts in text mode command line in 27MB of memory OpenBSD 6.1 in Xenocara uses 65-80MB of memory to start up.
## from recollection: Windows 7 800MB of memory (2009)
Parabola GNU/Linux starts in text mode cli using 150MB of memory Parabola GNU/Linux in weston uses 300MB of memory
I don't want to sound cliché but I suspect great part of the RAM in parabola is thanks to systemd.
Don't give up on GNU/Linux, there are some distros that take it to extremes to cut the packages to minimum. Source Mage in particular has the philosophy of only including what you want, nothing more, and the sources are clean and untouched. I don't have access to my installation but as soon as I get it I will post results, meanwhile look at how some guy went to have a graphical environment with 97MB.
Hyperbola with linux-libre-lts on OpenRC is similar to parabola. Boots into user account in command line in at around 100MB xorg adds another 20MB ontop to around 120MB. Booting into a user shell seems to be more memory expensive than starting as root.
I want to boot to command line in no more than 20MB with a GUI that brings me up to no more than 40-50MB of memory usage. Any more than that and there is too much going on.
Gentoo Linux (2021) Gentoo Hardened 10.3.0-r2 Linux/x86 5.13.10-gentoo Kernel
text mode: 51 MiB
Fresh install running with Btrfs on LVM on LUKS. Hardened Gentoo amd64 no-multilib stage 3,70 packages emerged. Running dm-crypt, iptables, lvm and bash. Could probably trim it down to 40MiB with some other choices (shell, daemons etc). I think this is going to be as good as it gets for Linux (for me) without changing things drastically. Maybe I'll switch my shell to ksh or dash or something else and see how it performs.
Espionagem Eletromagnética e Mandantes de Adélio Bispo
Quando o Presidente diz que "5G é usado para espionagem" e que "urnas são passível de fraude", ele está correto mas não sabe como apontar evidência. Eu sei e fornecerei um método experimental para que a Polícia Federal possa se convencer disso. Porém, não somente urnas, mas todos os computadores e celulares (os da União inclusos) são passíveis de interferência e não é apenas o 5G que é responsável por espionagem eletromagnética, mas silicon trojans implantados nas torres desde o 2G. Isso permite não só controlar os silicon trojans nós processadores, mas também é usado para causar a Síndrome de Havana que atinge pessoas pelo mundo.
O modo de espionagem sendo usado para manipular pessoas como o Adélio Bispo a cometer crimes é usado no Brasil por um grupo também responsável por sites de ódio como "Dogolachan" e mercados de drogas como "Nightmare Market". Porém eles são apenas usuários do sistema de espionagem, que também é usado internacionalmente. A tecnologia é americana mas não governamental. Como os dados obtidos com essa espionagem também abastece serviços automatizados de recomendação de propagandas e conteúdo (outro método de gerar dinheiro para eles), há uma abertura para demonstrar que sistemas não conectados a internet estão vazando informações através dessa espionagem eletromagnética.
Quando uma empresa como o NSO Group oferece o Pegasus, eles fazem uma demonstração para que fique claro que conseguem acessar dispositivos celulares. O que estou oferecendo é um modo de demonstrar a ocorrência de espionagem eletromagnética que obtém dados de todos os computadores de modo contínuo. Uma vez evidenciado isso, indícios dos crimes facilitados por essa espionagem ficarão crediveis.
Privacy Redirect is a pretty solid addon for automatically using those lightweight open source front ends like nitter (twitter) and invidious(youtube) as well as many others.
As far as search engines go, I really like Searx. Its great at what it does, has lots of customization, and is open source. Being able to host your own instance is important to tech schitzos with tinfoil hats at least 5 layers deep.YACY is a true decentralized p2p search engine and I like it conceptually but as far as disseminating information its not anywhere nearly on par with the centralized ones.
https://encyclopedia.marginalia.nu Is a high-readability wikipedia mirror I prefer using and https://search.marginalia.nu/ is a cute alternative search engine designed to help discover older and more obscure websites you wouldn't otherwise find in a typical google search.
>>14354 That's because most tech boards are memes, idiots, and people who ask how to get their web browser working on their Walmart-bought Computer. That and games. Endchan /tech/ has potential as it is the last /tech/ board after 8chan died (>inb4 8kun).
>>14356 I am a global vol but I could supervise this board for you. The problem appears to be that it's inactive. I don't think a lot of people still know about endchan and /tech/ now-a-days. My initial advice is to try to make your own threads as stickies to spur activity, and potentially advertise in banners on other sites. (Please note my advice is not an invitation to raid other sites, or spam other sites, or spam other boards or individuals).
>>14388 >it's hard to say where everyone is Back when 8chan died I tried looking for alternatives and there was this danknet one that was fully peer to peer which was a really cool idea but it didn't last long, and just was a pain in the ass to use. Every other place I've tried to visit were either bunkers for other boards (/v/ and the like) or just plain dead. I occasionally browse lainchan but otherwise just stay off of tech-related chans, and keep to the more niche boards on 4chins. I grew to hate tech culture more during this time.
>>14995 >Back when 8chan died I tried looking for alternatives
>and there was this danknet one that was fully peer to peer See most people aren't going to through all the trouble to do that. Imageboards work best because 1) no registration required 2) you can write, post, see updates almost instantly instead of waiting for TOR to load up
That's what I think at least
>I grew to hate tech culture more during this time. Just take a break from things, even things you enjoy. You should be getting your energy and spirits up afterwards