Wayland? No wai! Anonymous 07/13/2019 (Sat) 20:34:14 [Preview] No. 13362 [Reply] [Last 50 Posts]
Someone's still hanging around as the Palemoon/NoScript thread attests to.

Wayland is upon upon us.

My preferred windowmanager is Fluxbox. I have not researched this exhaustively, but it appears Fluxbox is not supported under Wayland. So, what do we have as a replacement under Wayland? Minimalist and resource lite is my goal.

Not apropos of anything, but I still miss Blackbox. Eh. Tech moves ever on.
1 post omitted.

Anonymous 07/14/2019 (Sun) 18:25:09 [Preview] No.13364 del
Maybe OP meant that Wayland is been increasingly promoted and pushed on most distros.

Anonymous 07/14/2019 (Sun) 18:26:20 [Preview] No.13365 del
Xorg is still active OP.

Anonymous 07/14/2019 (Sun) 22:58:45 [Preview] No.13366 del
I think there was an openbox clone made for wlroots, not sure how active the development on it is...

Anonymous 07/15/2019 (Mon) 00:02:40 [Preview] No.13367 del
>Maybe OP meant that Wayland is been increasingly promoted and pushed on most distros.

Right. My viewpoint tends to Debian-centric, and Debian is converting over to Wayland in the newest release. However, what I'm trying to imply here is what the second poster said. Like SystemD or—as a much better analogy—as with the push for pulse audio, I see the direction this is going. It's time to prepare.

There is no hurry though. Time was, I'd upgrade a day or so after Debian deployed the new version with little if any issues. Today, I've found Debian has fallen to the Microsoft model of unleashing beta-test quality products on the world. I won't touch their newest release until about six to eight months after. I've much better things to do with my time than Polish mine detecting their IBM Redhat imposed fuckups.

Anyway, ranting aside, I need to keep my employment skills in reasonable sync with Debian. For personal use, Devuan, FreeBSD, etc., is fine as alternatives. I suppose they'll be keeping with xorg for a while yet.

So. Who's taken Wayland for a test drive? Will the Blackbox inspired model of WMs survive the newest Linux distro techno apocalypse?

Anonymous 07/15/2019 (Mon) 04:32:48 [Preview] No.13368 del
>My preferred windowmanager is Fluxbox.
here's a protip for i3
workspace_layout tabbed
hide_edge_borders both

(999.11 KB 360x449 "Et tu, Palemoon?".gif)
Palemoon blacklists NoScript Anonymous 05/12/2018 (Sat) 03:01:36 [Preview] No. 12708 [Reply] [Last 50 Posts]
As the subject says. It's been entered into their custom "bitch at the user with a popup until they disable it" database. To be fair to the developer, he has solid reasons for his stance. I'll try to summarize as there is a lot of misinformation and emotion out there fogging the issue.

1) The Palemoon project does not have enough developer juice to debug other software and addons.
2) Various users: "[website] does not work with Palemoon. Fix your shit, Moonman!"
3) Moonman: "Known issue. Stop being morons and disable NoScript. Thank you, and have a nice day."
4) Various users: "We did. Same problem. Fix your shit."
5) Moonman: "Oh. That's an actual issue with Palemoon then. I'm on it!"
6) Much hacking and cracking and time and talent are expended to no effect. Surprise! NoScript does not follow the standard of letting go of the browser when disabled. It lingers on. It has to be completely uninstalled with an added cache clearing operation on top of that.
7) Moonman: "It's NoScript. Get rid of it. Have a nice day."
8) Various users: "No. FIX YOUR SHIT!"
9) Moonman: "Crush. Kill. DESTROY!"

If you roll with my simplification you can see his point.

I have two observations. First, quite a few sites have a technical support checklist that runs like this: "What browser are you using? Palemoon? Oh good! We have two fixes you may choose from. One, use another browser. Two, go away and do not come back."

My irony sense is tingling.

Message too long. Click here to view full text.

18 posts and 1 image omitted.

Anonymous 10/09/2018 (Tue) 12:07:18 [Preview] No.12904 del
>adnausum situation
What ever happened to that? It was making the rounds awhile back and people just stopped talking about it. I tried using it but it was broken as fuck and wouldn't work on my setup so I forgot about it.

Anonymous 10/24/2018 (Wed) 06:39:43 [Preview] No.12919 del
Reading his thread is enough to not want to use palemoon like ever again

Anonymous 07/09/2019 (Tue) 22:58:40 [Preview] No.13359 del
(22.27 KB 323x248 noscript1.jpg)
(24.06 KB 251x417 noscript2.jpg)
>2018 thread...... sorry
'Member when noscript had a sane UI? Now it's a bubbly UI that forces you to restart after every change. I always used to select my temp permissions then click restart near my address box. Can't do that anymore. It also had many features and settings no longer available in the newer releases. Does anyone know the benefits of using noscript over uMatrix? I know noscript is designed for javascript but uMatrix can block those too.
I'm not saying the old noscript was the best or better than uMatrix. In fact uMatrix is better and its UI is very intuitive and gives you total control, modern noscript does not. What happened?

Anonymous 07/10/2019 (Wed) 22:19:52 [Preview] No.13360 del
(64.37 KB 220x107 NoScript in action.gif)
Saw this flying by the other day on the overboard. Ah, the thread that would not die. May as well stop by. Anyway, original OP here. For what it's worth.

>Does anyone know the benefits of using noscript over uMatrix?
The gist of it is that uMatrix merely blocks items, while NoScript also injects and replaces various classes of problematic functionality. Because of this, NoScript can make certain sites and services work more smoothly and consistently while still blocking the crap with safe(er) replacements.

As detailed in the original post, the problem with this method being NoScript can't really be turned off and will affect how the browser renders a site even while disabled. It's the nature of the beast.

>I'm not saying the old noscript was the best or better than uMatrix.
Yes, of course. But, people seem to have some preconceived notions about how things should work thus driving much of the controversy in choosing which technology one must adopt.

A historical perspective may be of some use here. Giorgio Maone's path being evil at the same time as coeval with the development and deployment of much of the browser and server technology we take for granted today. While he could anticipate and elegantly solve many iffy aspects of web browsing as the scene unfolded, most of his work was devoted to crushing nasty-issue-after-nasty-issue, often mind-bendingly esoteric and unrelated, over and over, one after another. Often this was done in the face of actively hostile web service providers (and not merely site operators) who would (and still do) settle for nothing less than absolute control over the browser, and much more.

The result of this epic evolutionary arms race is what NoScript became. While Mr. Maone deserves all the credit or blame for what he has done, it's not his fault things turned out as they have. That is to say, in a certain very real sense, NoScript was made by the opposition.

What I have found today is our latest generation of the technically inclined have enough trouble coming to grips with all of what is, and making it work. What was, and why, may amuse some at best. When confronted with something like NoScript that violates so much of what they have painfully learned, it's instantly tagged as a problem instead of a solution.

Message too long. Click here to view full text.

Anonymous 07/12/2019 (Fri) 07:50:07 [Preview] No.13361 del
I just hate since I switched to irridium that there is nothing, that I have found comparable to noscript and I'm kind of stuck with umatrix. There's scriptsafe but it's interface is leagues worse than noscript in the ui department and you just end up reloading exponentially more then you ever had to with noscript.

>NoScript is a brutal marine sergeant
this. I remember years ago when a friend recommended noscript to me and I had literally no idea wtf was goin on when I installed it. slowly but surely I grasped it's tenets and embraced the corps. Maybe I should drop my autistic grudge of pale moon and give it another shot, it's been years.

Endwall 07/06/2019 (Sat) 04:37:16 [Preview] No. 1433 [Reply] [Last 50 Posts]
Want to say something off topic about anything?

Have a hot tip about something in the computer security world that doesn't fit into any current thread or category?

Want to chat with your fellow invisible 7 proxy friends?

Want to tell Lt. Gen Michael Hayden, Lt. Gen James Clapper,GEN Keith Alexander, ADM Michael Rogers, GEN Paul Nakasone, GOOGLE, AMAZON, FACEBOOK and Microsoft etc. how you feel?

It's open mic at >>>/os/ , anything goes!!

Put all of your banter here:
1 post omitted.

Endwall 07/06/2019 (Sat) 04:45:39 [Preview] No.1435 del
NSA has a backup right? Hey be a pal...

Endwall 07/06/2019 (Sat) 04:47:54 [Preview] No.1436 del
Oasis - Wonderwall
https://youtube.com/watch?v=bx1Bh8ZvH84 [Embed]
Published : 21 Nov 2013, Duration : 04:38
Music video by Oasis performing Wonderwall. (C) 1995 Big Brother Recordings Limited

Endwall 07/06/2019 (Sat) 04:52:10 [Preview] No.1437 del
Oasis Wonderwall Lyrics
https://youtube.com/watch?v=Y7I1nCcwJP0 [Embed]

Endwall 07/07/2019 (Sun) 22:32:47 [Preview] No.1440 del
Hold me thrill me kiss me kill me
https://youtube.com/watch?v=klzPALQhm-g [Embed]
https://youtube.com/watch?v=iNrQUPeXe2U [Embed]

Endwall 07/12/2019 (Fri) 03:58:34 [Preview] No.1442 del

this is some serious x-files level stuff right here...
Thanks internet archive!

Online Security News Endwall 07/07/2016 (Thu) 06:09:23 [Preview] No. 149 [Reply] [Last 50 Posts]
See a news article or CVE bug report on an emerging computer security issue and want to share it? Post below.

I will also post links to Hak5 Threatwire videos.
Edited last time by Endwall on 07/07/2016 (Thu) 16:22:47.
499 posts and 3 images omitted.

Endwall 07/03/2019 (Wed) 07:53:23 [Preview] No.1428 del
Cities Pay Up After Ransomware Attacks - ThreatWire
https://youtube.com/watch?v=CstOiRBTZic [Embed]
Published : 02 Jul 2019
Duration : 09:09

(71.70 KB 750x750 NGC_1_&_NGC_2.jpg)
Anonymous 12/10/2018 (Mon) 03:53:28 [Preview] No. 13013 [Reply] [Last 50 Posts]
This, to my knowledge, is the best /tech/nology board that exists. 4chan is consumerist gaymer garbage, 8ch/tech/ has been overrun with faggots from /pol/ trying to hide from muh jooz, lainchans data was wiped off the fucking planet when their administrators screwed up, and all of the others are dead.

If this board is to be brought back to a state of prosperity, we need to create and bring forth more educated individuals with a yearning to understand with the motivation and knowledge to pursue their own projects.

Learning 4 Newbs:
C Programming Language (Learn how to make that machine you shitpost with do what you want)
Computer Organization and Design (Learn how that machine you are using to shitpost works)
George Simmons Precalculus In A Nutshell (Will revamp your mathematical knowledge and help you understand deeply)
The Art Of Electronics (Learn how that machine you shitpost on works on the lowest level with electricity!)

Getting Started:
-Look on ebay for old thinkpads (If you are here, you should already have done this)
-Get a small Raspberry Pi (Simple to learn with and a massive community and hundreds of projects done already with firmware support)
-FPGA boards (Big boy electronic design, where you get to psuedodesign your own CPU. Try https://www.nandland.com/ (Xilinx is independent, Altera is Intel owned, so I'm not going to trust them)) LIMITED ONLY BY YOUR IMAGINATION!...
-Some cheapo electronics tools and wires from Amazon or an electronic supply store. Hakko is a japanese-based company and creates some of the best soldering stations and irons for the lowest price, 60/40 solder will get the job done. Don't forget solder wick, or your gonna have a bad time. Avoid working with BGA electonics.
-A multimeter and an Oscilloscope (EXTREMELY IMPORTANT) if you want to dig deeper into your electronics. A variable power supply will also give you more freedom.

Message too long. Click here to view full text.

24 posts and 7 images omitted.

Anonymous 05/24/2019 (Fri) 15:05:53 [Preview] No.13327 del
Oh, u were refering to the old ones. I'm suspicious of everything coming from Lenovo, were those also from them? That company had around 3 outbursts of spyware on their firmware.

I had a LG S425 back in the day, it was an excellent laptop. What is your experience with LG and Acer?

Anonymous 05/25/2019 (Sat) 20:57:55 [Preview] No.13328 del
ooh ya soz i wasn't more specific - pre-Lenovo is the only way to go. HP went cheap and cheesy on manufacturing after they bought them.

Anonymous 06/19/2019 (Wed) 13:59:03 [Preview] No.13351 del
>recommending a laptop

Anonymous 06/30/2019 (Sun) 19:15:34 [Preview] No.13353 del
Yeah, what 13351 said. If you want to go outside, pack your desktop and 21" LCD monitor and Honda generator up in a backpack like everybody else.

Anonymous 07/08/2019 (Mon) 23:01:13 [Preview] No.13358 del
Perhaps we have more luck finding a quality laptop with some small manufacturer.

(30.89 KB 800x800 Sticky.jpg)
Anonymous Board owner 05/09/2018 (Wed) 22:40:59 [Preview] No. 12705 [Reply] [Last 50 Posts]
Welcome to /tech/, a technology board. This board is for general discussion of technology.

Rule 1: Only threads about technology or /tech/ itself are allowed.
Rule 2: NSFW content are only allowed if they are spoilered.
Rule 3: No referral links, asking for cryptocurrencies, advertising or similar.
Rule 4: No spam or posts without meaningful content.

All rules and policies are open for discussion in this thread.

IRC: #/tech/, #InfinityNow and #endchan on irc.rizon.net - https://qchat.rizon.net/
Wiki (OLD): https://wiki.installgentoo.com/

Archived sticky threads:


Message too long. Click here to view full text.

Edited last time by _ on 06/19/2018 (Tue) 02:20:22.
44 posts and 10 images omitted.

Anonymous 06/01/2019 (Sat) 09:55:48 [Preview] No.13339 del
Please, give me infinity row for computing a^x, where a is rational number and x is rational number. In most cases, chas as 5.43^7.3, 25^-8.3

Anonymous 06/15/2019 (Sat) 15:25:00 [Preview] No.13342 del
What is "infinity row"?

Anonymous 06/17/2019 (Mon) 08:48:03 [Preview] No.13344 del
sounds like something you'd get from google translate if asking for infinite sums of power series in another language

Anonymous 06/19/2019 (Wed) 13:56:40 [Preview] No.13349 del
it's kinda like arch except it's not binary
if that's your fancy

Anonymous 07/08/2019 (Mon) 22:53:57 [Preview] No.13357 del

Cryptography Endwall 05/12/2018 (Sat) 20:26:54 [Preview] No. 1211 [Reply] [Last 50 Posts]
In this thread we will discuss cryptography, cryptosystems, crypt-analysis, and tools for cryptography such as gpg and other tools. If you work in this field or hear of some relevant news about this field feel free to contribute. Use hyperlinks and source citations to back up any claims made if necessary.
4 posts omitted.

Endwall 05/13/2018 (Sun) 07:29:29 [Preview] No.1216 del
Why stop there? Pad every paragraph!!

Endwall 07/03/2019 (Wed) 08:10:20 [Preview] No.1430 del
Vernam Cipher (One-Time Pad)
https://youtube.com/watch?v=cpqwp2H0SNo [Embed]
Duration : 11:21 Published : 08 Oct 2018
The Vernam cipher (aka the one-time pad, or Vigenere OTP) is the only encryption algorithm with perfect security, meaning it is unbreakable. The general concept of computational security is explained and also how XOR is used in this cipher. Then I explain the reasons why the Vernam cipher isn't really useable in 'real life'.

Endwall 07/03/2019 (Wed) 08:16:36 [Preview] No.1431 del
Endwall's Comment: This really is usable in the situation where you have limited computational power....like with an 8 bit computer for instance. you could use a floppy disk as the pad, and copy it and give it to your counter party for a year's worth of real time instant messaging over the telephone line. Every used block should be overwritten with a null character or zeroed out so that the program knows were to seek to for the next decryption block. This crypto-system is optimal to use with an 8-bit computer over the telephone lines. The computations are simple. This could be programmed in a weekend. Find or demonstrate working examples of this over the telephone modem on a Commodore 64 and post back here (working code or videos of it working).


"Starting in 1988, the African National Congress (ANC) used disk-based one-time pads as part of a secure communication system between ANC leaders outside South Africa and in-country operatives as part of Operation Vula[28], a successful effort to build a resistance network inside South Africa. Random numbers on the disk were erased after use. A Belgian airline stewardess acted as courier to bring in the pad disks. A regular resupply of new disks was needed as they were used up fairly quickly. One problem with the system was that it could not be used for secure data storage. Later Vula added a stream cipher keyed by book codes to solve this problem.[29]"

Apparently not an original idea, even Africans were smart enough to go to this level...

Endwall 07/07/2019 (Sun) 20:32:05 [Preview] No.1438 del
How To Use One-Time Pads To Send Encrypted Messages, Hak5 1620
https://youtube.com/watch?v=WkgumA5mHoI [Embed]
Published : 02 Jul 2014 Duration : 22:21



Endwall 07/07/2019 (Sun) 20:46:25 [Preview] No.1439 del
Using a DVD with 4.7GB of random bits or random characters from /dev/urandom is probably good enough for most people for a time frame of 5 years worth of communications. People with a necessity for a longer time frame could do this with 10 TB hard disks and have private bi directional or (group based ) conversations with trusted parties for several years like maybe 20 years as long as you don't start sending large files. It should be good for text, pictures, audio and small video clips.

For more serious people getting actual random numbers will be a priority, by building some kind of physical or electronic device that can generate random static to record to disc. A Geiger counter, radio transmissions on a static channel. Maybe take all of these inputs and sum them together and add it to the output from /dev/urandom.

Xonotic vs ChaosEsque:Anthology, Which to chose. A debate on OpenSource FPS's Anonymous 01/23/2019 (Wed) 14:34:13 [Preview] No. 13142 [Reply] [Last 50 Posts]
Xonotic vs ChaosEsque:Anthology, Which to chose. A debate on OpenSource FPS's

>Xonotic over ChaosEsqueAnthology:
Ayyo. Before you make a big mistake in choosing a project or sum shit you gotta be feeling the ways of the both the people. You feel me?

M'fcking Xonotic and dis bullshit is diffrens.

Xonotic devs deeply respect women and their rights and privileges.

Dis Bullshit devs hate women's rights and have been harranging FLOSS femininists fo like a decade. (Citation: http://geekfeminism.wikia.com/wiki/MikeeUSA )

Xonotic Developers contribute to society by working real jobs.

Dis Bullshit is a pack of fucking NEETs who say dey ain't workin fo no enemy.

Xonotic Programmers are attracted to real Women.

Message too long. Click here to view full text.

Anonymous 01/23/2019 (Wed) 14:35:42 [Preview] No.13143 del
What is the future you choose, /g/ at the end of the internet?

Anonymous 01/23/2019 (Wed) 23:53:35 [Preview] No.13146 del

Anonymous 01/28/2019 (Mon) 01:48:29 [Preview] No.13156 del
This. Fix Moon Man Doom and play it in front of John Romero.

Anonymous 01/28/2019 (Mon) 09:00:47 [Preview] No.13157 del
What's to fix? Which version are you using?

Anonymous 07/06/2019 (Sat) 07:06:18 [Preview] No.13356 del

VPN/proxy/TOR general thread Anonymous 04/15/2016 (Fri) 22:12:39 [Preview] No. 2 [Reply] [Last 50 Posts]
Cool board idea.

What's the safest possible way to browse the internet anonymously and safely? There's a thread on /tech/ with the endwall developer talking about proxychains, and that seems pretty cool. Some of the links to proxy lists seem dead, and I have found some online but why should I trust these random 'free' proxies?

What about proxychains over VPN? I'm currently using Mullvad which is alright, and I'm curious about more security if need be. Does a VPN -> proxychain -> TOR connection work? Sounds horribly slow in theory, but I think we all know that privacy comes at a cost in our current world.

I suppose I could call this a 'VPN/proxy/TOR general thread.'
64 posts and 5 images omitted.

Endwall 05/10/2019 (Fri) 17:50:46 [Preview] No.1398 del
So say Joe is an important person and has been placed under surveillance. All of his connections to node A are timestamped and logged. Given that you know Joe connected to Node A, you really only have to look at 5999 C 2 possible paths = 17,991,001, or about 18 million paths. Very tractable.

So from all exit nodes that are monitored from the traffic bursts in that 5 second window, calculate delta t from Joe's connection to node A at t0 to the first burst of data coming from the 1000 exit nodes. From this calculation 100ms<dt_Joe<400ms

Go to the lookup table for Node A connections to those 1000 exit nodes and cross out any paths that have dt A->C < 100ms and dt A->C > 400ms This should bring your 2 million possible paths down to tens of thousands, then rank them by the distance of dt_joe to dt_model. A -> B_j -> C_k dt_model dt_observed From the top 100 closest rankings ( smallest absolute difference | dt_model - dt_model | , examine the connections from Node A to middle Node B_j and see if any of those node A connections match with the top 100 paths. If so you now have the complete path. If not look at the top 200. This would weed the paths from 10^4 down to maybe 100 or so.

Then from these 100 possible connections observe what they do and correlate this to things you already know about Joe and his habits. This should weed the connections down to 2 or 3. If all three of the connections happened inside of the surveillance grid ( pass through listening posts (logged routers) along their path) then all of this analysis could be performed, probably automated and within a day or two.

Endwall 05/10/2019 (Fri) 17:59:58 [Preview] No.1399 del
But now since you only observed 1000 exit nodes making traffic and you know node A was used by Joe, you only have to search 5999*1000 = 5,999,0000 possible paths from C observed to B possible middle nodes. So you only need to do 6 million delta t travel time comparisons.

| dt_model - dt_observed | where dt_model is from the lookup table of values containing node A and C, and dt_observed are the actual calculated dt values from Joe's first connection to the first output burst at those 1000 exit nodes.

And this is why you want two things :
1. Intractable amount of possible paths.
2. Entire path not under a single surveillance grid.

Which can be achieved by. 1. Making the path length longer than 3 hops. 2. Chosing each node far away from each other outside of the supervision and jurisdiction of a single monitoring authority.

US relays 6676/8 = 834.5 ~ 835
US Exits 908/5 = 181.6~182

So if all 3 nodes in your path stay in the United States, you have 835 C2 * 182 possible paths. this is 63,371,490 or 64 million. If you are under surveillance as mentioned then only 835*182 = 151,970 possible paths need to be investigated. This is now an extremely tractable problem.

150,000 dt_model constructed by sending ping packets through all 64 million 3 node USA only paths.

Message too long. Click here to view full text.

Anonymous 05/26/2019 (Sun) 20:02:01 [Preview] No.1405 del
Given the need for increased hops the mod for 6 hops in the tor source code along with endrc 14 eyes exclusion helps 1 and 2. Now you say using exit nodes for clearnet resources.Does all clearnet resources seem the same or would say using proxy-chains with multiple or single proxies over be roughly the same thing?

Endwall 06/13/2019 (Thu) 05:18:51 [Preview] No.1412 del
Cross correlation on bit rate as a selector would be a cheaper and faster way to de-anonymize Tor users, and it would work most of the time.

Going through 3 high anonymous proxies after jumping out of tor before hitting your target would be helpful in my opinion. Anything to make it harder for them to pin point where you're coming from is helpful. Once you're not coming from the Tor network certain things open up, and you may just avoid detection by not coming from the tor network when you touch your target. Try different things / combinations. Proxychains is helpful for using high anonymous ssl and socks5 proxies after exiting tor. It might be helpful. That's just my opinion, I'm not an expert.

Anonymous 07/03/2019 (Wed) 08:53:46 [Preview] No.1432 del
very good info thanks. Good rule of thumb.

Meta Thread Endwall 07/12/2016 (Tue) 12:03:36 [Preview] No. 171 [Reply] [Last 50 Posts]
Post any comments, concerns, or requests for the board in this thread.
Edited last time by Endwall on 07/12/2016 (Tue) 12:15:00.
28 posts and 6 images omitted.

Endwall 02/18/2018 (Sun) 05:49:07 [Preview] No.1136 del

How I thought my computer privacy and security and anonymity was doing:
https://youtube.com/watch?v=e7X01_j_oDA [Embed]

How my computer security privacy and anonymity actually is:
https://youtube.com/watch?v=iPQfwmfRq2s [Embed]
https://youtube.com/watch?v=xrUEjpHbUMM [Embed]
Edited last time by Endwall on 02/18/2018 (Sun) 06:46:54.

>banner Anonymous 10/07/2018 (Sun) 17:27:20 [Preview] No.1326 del
I see this banner as: oops, your penis has been encrypted!

Endwall 12/01/2018 (Sat) 12:18:33 [Preview] No.1347 del

Rogers...? Is that you my old friend...?

You should always encrypt your dick when in public...

It is very cold in cyberspace

Endwall 12/30/2018 (Sun) 16:55:44 [Preview] No.1358 del
https://youtube.com/watch?v=5vwHLMs04XA [Embed]
https://youtube.com/watch?v=7MFJ7ie_yGU [Embed]

Endwall 07/03/2019 (Wed) 07:55:36 [Preview] No.1429 del
I can't seem to access the Discussion Thread It's 404-ing. Anyone know what this is about?

Warning All Microsoft Users: You May Need To Switch To Linux or an Other Alternative OS Soon... READ WHY Anonymous 04/10/2018 (Tue) 16:00:02 [Preview] No. 12580 [Reply] [Last 50 Posts]

"Microsoft have changed their terms of service so that they can monitor any of your personal content, including the files on your PC, while using their products or services and if they deem it offensive they can take that content and their products/services away from you and ban you! If you happen to have an Xbox or have bought PC games from the Microsoft Store and are logged into your Microsoft account on any device while committing your "crime" you can be banned from Xbox Live and have all your downloaded games and any credit that's still in your account taken away!

But it gets worse. This applies to all Microsoft products and services. So therefore Windows itself! I think I have already been a victim, probably due to posting here, as recently my Windows 10 key was revoked out of the blue. I contacted Microsoft and they told me my key was no longer valid but outright refused to tell me why. So I had to buy Windows 10 again. I didn't buy it direct from them of course. Please post if this has happened to you very recently too.

I'm pretty scared about what's coming. They want us off the internet and I think this is how they're going to get many people. They're going to just shutdown our Windows on the basis of us breaking their new terms of service. What if ISPs are next?"

OP comment:

First off, no one should be using Windows 10. If you like Windows get an older one like Windows 2000, Vista or XP and make sure you turn OFF all automatic updates in the settings. Make sure you do not leave it online 24/7 either (leaving the OS online when not in use makes it much more vulnerable). There are also programs out there you can install that will completely remove all auto-updates for Windows if you are too lazy to change the settings.

If you want to switch to Linux you can install "Wine" and run Windows executives right from your Linux OS. Depending on which OS you partition (such as Q4OS) this will mimick an older version of Windows. Q4OS is what I recommend because you can install Wine and the OS replicates Windows XP, looking almost exactly the same!

Second, which is VERY important, users should be using a private VPN service in this day and age. No reason not to. Get off your lazy ass, buy a cheap private VPN (these can cost as low as $30 PER YEAR), and shield yourself by encrypting your communications and spoofing your IPs. Its easy and even us boomers can learn how to do it, I did.

Third: always have physical offline backups of any of your important files (this includes ISOs of the OS you use, software you may use and any media or other files you deem valuable).

Message too long. Click here to view full text.

9 posts and 1 image omitted.

Anonymous 04/07/2019 (Sun) 02:37:22 [Preview] No.13263 del
Might be a good idea to not install the Windows OS on bare metal and instead, only use it inside virtual machines. It's likely Windows fingerprints the system hardware so putting it in a metaphorical condom might help keep the actual hardware safe. This should also help prevent it from contaminating any sort of firmware on the machine, although it's not a guarantee.

Anonymous 04/07/2019 (Sun) 02:46:50 [Preview] No.13264 del
Also remember, glow niggers like to cast wide nets when buying/developing exploits, so using obscure stuff that normies do use might help you. This won't help you if you're a high value target, for whatever reason, in which case they will allocate as many resources as possible to get you. If that's the case, then you shouldn't even be on any sort of computer.

Anonymous 04/07/2019 (Sun) 02:54:31 [Preview] No.13265 del
Many of those virus scanners include functionality that checks the hash result of each scanned file against a database of file hashes, so that could be used to identify specific files. For example, if you downloaded one of the NZ shooting videos and have it stored on your drive, in an unaltered state.

Anonymous 04/18/2019 (Thu) 04:53:26 [Preview] No.13285 del
>There are some actions which can only be completed on windows (Unless you are willing to spend many hours porting software over to linux.)
What are you doing that requires Wangblows only? After Effects or something?

Anonymous 07/02/2019 (Tue) 11:39:02 [Preview] No.13355 del
>If there were any good novice systemd-free distributions, I'd recommend them, but I didn't see anything worth installing.
Try Devuan. Installation is n00b friendly, stable as stable was old Debian, huge repo, actively maintained.

Discussion Thread Endwall 02/24/2018 (Sat) 01:52:08 [Preview] No. 1145 [Reply] [Last 50 Posts]
Want to say something off topic about anything?

Have a hot tip about something in the computer security world that doesn't fit into any current thread or category?

Want to chat with your fellow invisible 7 proxy friends?

Want to tell Lt. Gen Michael Hayden, GEN Keith Alexander, ADM Michael Rogers, GEN Paul Nakasone, GOOGLE, AMAZON, FACEBOOK and Microsoft etc. how you feel?

It's open mic at >>>/os/ , anything goes!!

Put all of your banter here:
Edited last time by Endwall on 04/14/2019 (Sun) 02:40:40.
55 posts and 1 image omitted.

Endwall 06/13/2019 (Thu) 04:47:49 [Preview] No.1411 del
https://youtube.com/watch?v=9v7jLibv4lU [Embed]

good audio...

Endwall 06/17/2019 (Mon) 05:07:46 [Preview] No.1413 del
The Beatles
The End - Abbey Road
https://youtube.com/watch?v=oV8PSj-hQvw [Embed]

The End -Alternate
https://youtube.com/watch?v=YA_sK86sX5I [Embed]

Endwall 06/30/2019 (Sun) 07:48:56 [Preview] No.1425 del
Just watching the Kim, Moon,Trump impromptu meeting.

When Kim comes to America, President Trump should take him to go watch the Chicago Bulls play a match live, court-side at the United Center, with Dennis Rodman, and Billy Corgan... Michael Jordan should come along too. Afterwards they should go get burgers, fries and hotdogs, and then fly in the presidential helicopter back to the White House for talks. Trump would get re-elected in a landslide. I'd pee myself laughing, and I'm looking forward to it.

Endwall 06/30/2019 (Sun) 07:57:05 [Preview] No.1426 del
Gotta let him have a free throw or do a layup at half time too!

No wait... he should setup a pass to Jordan to do to do an Alley-oop slam dunk at half time. Then Kim could wave at the crowd and smile then go back to his box to watch the second half. Trump and Kushner would give a standing ovation. That would be awesome don't you think ?

Endwall 06/30/2019 (Sun) 08:05:02 [Preview] No.1427 del
We need Rodman in there too! Chairman Kim dribbles at center court, then he passes to Rodman. Rodman does some moves, sets up the Alley oop for Jordan. Jordan Hangs on the rim after the dunk. I'd be on the floor. Make my dreams come true...Just do it.
Edited last time by Endwall on 07/02/2019 (Tue) 03:26:36.

Endware Endwall 05/03/2016 (Tue) 08:54:28 [Preview] No. 32 [Reply] [Last 50 Posts]
Endware is a suite of programs geared towards internet privacy, security, and anonymity.

Endwall: endwall.sh is an iptables based firewall script designed to be implemented on any linux distribution shipped with iptables. endwall.sh is based on default drop policies, coupled with a novel strategy of passing packets on local host ports only for those enabled by the enduser. It comes with a variety of well used ports enabled with several additional port passing configurations available by uncommenting the script. It provides essential security to a new user.

Endsets: endsets.sh is a script that adds blacklisting and whitelisting functionality to endwall.sh. It depends on the program ipset. It is persistent on reboot if you enable ipset as a service. This is the recommended blacklisting tool for endwall if you are running a server or planning on opening up ports and services to the public and will require daily blacklisting of new incomming IPs.

Endlists: endlists.sh is a traditional text file list based blacklisting and whitelisting script. It has slow performance, and can't be updated on the fly. Good for <1000 ip subnets, very tedious and slow to run for more than that. Blocks the IPs by adding them as individual rules to the iptables ruleset. Works but not recommended for heavy duty on a server. May be useful for workstation use to block ip ranges if you are not opening up ports and services to public clients.

Endtools: endtools are a collection of scripts including alogz.sh, mlogz.sh, spamlogz.sh and iplookup.py. These scripts will help to service an enduser of endwall in adminstering endsets/endlists.

iplookup.py is a geoiplookup script written in python and requires python and pygeoip. It has simmilar functionality to maxmind's geoiplookup program and uses the maxmind *.dat files.

spamlogz.sh is a script that searches through log files to find flagged log entries flagged in endwall.sh, endsets.sh and endlists.sh.

alogz.sh is a daily log reading script designed to read the output of an apache http server's log output.

mlogz.sh is a daily log reading script designed to read the output of a postfix smtp server's log output.

Message too long. Click here to view full text.

Edited last time by Endwall on 02/25/2019 (Mon) 00:18:53.
245 posts and 3 images omitted.

Endwall 06/27/2019 (Thu) 05:24:56 [Preview] No.1419 del
Here you go: that took around 6 hours to produce and test. Mainly by the tedious task of copying, pasting and deleting with backspace. I have a bunch of other streams still to add to the list, but I'll do that later when I feel like it.


I've placed these onto the hidden service .onion repository as well. This is cool and all, it removes pressing 3 keys from the channel up procedure (q + enter) to just shift > or shift <, loading is faster, saves about 1.5 seconds between channels. I still like being able to stop and go back 10 channels by keying in the number, but this is useful for a lazy channel climb or as an iptv package.

$ mpv --fullscreen --no-resume-playback endstream.m3u8

Load it up in your KODI player and let us know if its working. Thanks.

Endwall 06/27/2019 (Thu) 05:29:27 [Preview] No.1420 del
Wasn't someone on this board (endchan) complaining about wanting to hack a satellite broadcast to drop truth bombs or something... way easier to set up a stream. I'll add it to endstream if it's any good. In fact I expect post 1488 to be a post in this thread that links to this truth bomb stream. You have exactly 68 posts left to set it up and test it...get cracking.

Endwall 06/27/2019 (Thu) 06:04:44 [Preview] No.1421 del
Hey Adolf, I'll place this new channel of yours right between Newsmax and Freespeech TV, so like on channel 26. It should be called TruthMax or something else equally nifty like polTV or something. Get on it, hire your best H4x0rs to get it up and running, then run 24/7 truth streams in 720p...then shill the endstream playlist everywhere and people will tune in for sure...

On a side note, I totally watched Fiddler on the Roof the other day on BYUTV, and I wondered if they were sending that out for us here at Endchan... I watched the whole thing too, Tradition! Tradition! Tradition! The Papa!! The Mamma! Tradition!...When Tavia's second daughter (Hodel) ran off with the gay commie guy I was like "Tavia lock that bitch up, hand cuff her to her bed", but Tavia was all like "I like him he is a good man..." and let his daughter go to Siberia to be with the gay commie guy. But then when his young redhead daughter wanted to go with the blond haired masculine German/Ukrainian gentile guy Tavia blew a fit, and I was like "No Tavia, this is good for your gene pool...", but Tavia was having none of it and disowned is daughter...a tragedy really...very sad...

Endwall 06/27/2019 (Thu) 08:07:27 [Preview] No.1422 del
I'm literally watching this black dude on MNN2 dropping some truth bombs and drinking sun kissed grape flavor purple drank. This could be you...

Earlier I watched some nasty fat black girls grinding and booty shaking to rap music naked on MNN 3. Clearly whatever you have to say couldn't be more edgy or offensive than that...

Stream through twitch, or set up something independent , wear a mask and connect through a VPN, or get a proxy to host the show. I think channel 26 is too close to the top, but definitely there's a spot for this kind of content/ info right after MNN. Channel 66 is all yours. Make it happen. Rally your top talent, set up some kind of proxying, and connect the proxies to twitch or to something self hosted and stream it, with Power Point presentations, readings from Mein Kampf etc., whatever you want. Tape a 5 hour show 3 times a week and put it in a continuous loop. I'm pro free speech on the internet. Make it happen, post the link and I'll add it as a channel in endstream.

Anonymous 06/29/2019 (Sat) 13:28:35 [Preview] No.1424 del
6 hours, jesus christ. Thanks a lot man, you're a godsend.

Anonymous 05/12/2019 (Sun) 12:44:33 [Preview] No. 13318 [Reply] [Last 50 Posts]
God is dead
This board is dead
Join this
1 post and 1 image omitted.

Anonymous 06/17/2019 (Mon) 13:15:31 [Preview] No.13345 del
blame darmor
join the mumble

Anonymous 06/17/2019 (Mon) 13:17:51 [Preview] No.13346 del
maek gtk mumlbe ples

Anonymous 06/17/2019 (Mon) 13:37:18 [Preview] No.13347 del

Anonymous 06/19/2019 (Wed) 13:57:13 [Preview] No.13350 del

Anonymous 06/19/2019 (Wed) 15:38:38 [Preview] No.13352 del
why is this being dumped here?

(90.61 KB 1024x767 cvm.jpg)
A website where people control an online computer Anonymous 06/19/2019 (Wed) 02:42:01 [Preview] No. 13348 [Reply] [Last 50 Posts]

Terry Davis memorial compilation webm Anonymous 09/30/2018 (Sun) 09:33:39 [Preview] No. 12898 [Reply] [Last 50 Posts]
I want to make a memorial compilation of all his best moments in memorium. This needs to go here, the file size limit on 8ch make this more difficult to do there.

Lets upload and link content here to go into the compilation and let me know what you think the sequence should be and what if any background track.
3 posts and 7 images omitted.

Anonymous 09/30/2018 (Sun) 10:28:46 [Preview] No.12902 del

Anonymous 10/09/2018 (Tue) 21:12:45 [Preview] No.12905 del

Anonymous 10/09/2018 (Tue) 22:52:20 [Preview] No.12906 del
Is there a youtube channel to youtube-dl? Stream sites he used? need more source material maybe even video of templeos in action .

Anonymous 10/10/2018 (Wed) 19:39:40 [Preview] No.12907 del
Terry had humor not sure if he realized that.

QTDDTOT Anonymous 05/26/2019 (Sun) 04:36:45 [Preview] No. 13329 [Reply] [Last 50 Posts]
Mod please sticky this.

I have Tor Browser which runs its own Tor instance. I also have Tor explicitly installed on my Linux system. Should I start up and run the Tor service in addition to using the Tor Browser, even though I technically don't need to? Is this more secure and robust and, if so, why?
2 posts omitted.

Anonymous 05/26/2019 (Sun) 20:08:34 [Preview] No.13333 del
in the tor browser bundle there is an executable file called tor which is a stable build of the tor daemon. In the case of using the tor browser you do not need to run a separate tor instance.

Anonymous 05/27/2019 (Mon) 04:32:23 [Preview] No.13334 del
But what about using Tor with Zeronet? I think it needs to be configured in such a way that it requires the Tor service to be running as a separate instance. I don't think simply accessing zites through the Tor browser is enough in that particular case, but I'm not sure.

Anonymous 05/27/2019 (Mon) 06:42:06 [Preview] No.13335 del
I am not that familiar with zeronet. It uses a port with like tor so you might be right. However I have noticed if you load a zeronet page regular it loads the same speed as if you run it over tor which could mean it is not binded to torsocks or whatever. Or it could be how zeronet distributes content in chunks instead of flow based on speed of connection. I am not sure. I know that you can run i2pd over tor if you use a proxy in between with proxychains. But you can't use i2pd with torsocks directly. So you might have to research more right off the bat i think zeronet and its based on fucking javascritpt which explains the speed because its just bypassing tor with whatever internal java components make it work. That is my theory its probably way off.

Anonymous 06/01/2019 (Sat) 08:05:58 [Preview] No.13338 del
Which chan has the most active /tech/ board? This board is slow as fuck, even though I like the site, overall.

Anonymous 06/10/2019 (Mon) 19:41:50 [Preview] No.13341 del

Internet Security General Anonymous 04/16/2016 (Sat) 07:56:30 [Preview] No. 4 [Reply] [Last 50 Posts]
Continuing from >>>/tech/597
This is for non specific, general tips for anonymous web browsing and downloads, tips on browsers and browser configurations for the security concious that you don't want to make a new thread for.
93 posts and 7 images omitted.

IRC Endwall 12/30/2018 (Sun) 15:41:05 [Preview] No.1357 del
IRC Workflow
STEP 0) grab endsh.sh


requires torsocks and firejail

STEP 1) Install IRSSI

$ su
# torsocks -i pacman -S irssi
# exit

STEP 2) Modify config file
$ cd ~
$ cd .irssi
$ nano config

Message too long. Click here to view full text.

Edited last time by Endwall on 03/09/2019 (Sat) 06:52:35.

Endwall 12/31/2018 (Mon) 02:26:09 [Preview] No.1360 del

You can also set up proxying to in Hexchat. This works when connecting to the .onion addresses.

Settings->Preferences->Network-> Network Setup

Fill in the socks5 proxy information. Then Add the new server in the connection tab using the .onion address and port number. Works.

Anonymous 02/17/2019 (Sun) 03:15:44 [Preview] No.1369 del
Unless there is a discount for buying a vpn with bitcoin. It is not necessarily an anonymous transaction because you theoretically connect to your raw ip with the bitcoin purchased vpn.

baroque music is played exclusively on modern instruments ShawnWic 03/19/2019 (Tue) 06:22:59 [Preview] No.1382 del
No Spam 5 year ban
Edited last time by Endwall on 03/19/2019 (Tue) 07:15:15.

Купить НормаФит недорого. Цены, отзывы. Закажите НормаФит сейчас! Davidbland 06/07/2019 (Fri) 23:08:21 [Preview] No.1406 del
No Spam 5 year ban
Edited last time by Endwall on 06/13/2019 (Thu) 04:38:26.

Anonymous 05/30/2019 (Thu) 07:59:10 [Preview] No.13337 del
money goes to maintain his mechanical parts, lubes, energy sources whatever his reactor is using. c'mon, the kike needs care too. americans love to hatch and overfeed fat sniny tech kikes.

Anonymous 06/04/2019 (Tue) 16:23:17 [Preview] No.13340 del
(35.13 KB 1280x800 screen.png)
just kidding

Blatent honeypots Anonymous 05/10/2019 (Fri) 07:43:37 [Preview] No. 13316 [Reply] [Last 50 Posts]
I stumbled across some chans while casually browsing and fapping by just following a few forum links. They are actually full on hardcore kid fucker sites, on the open web. Needless to say they are blatant honeypots. I've seen similar here spammed, the links are to obscure file upload sites which enforce google captcha.

I'm wondering, who is behind this shit? No pedo, except perhaps a literal retard, would be browsing bare ip with js enabled and fill out a google captcha to download that content so I doubt highly the links are legit. Whoever it is though is hosting that shit and uploading those images/clips. That's certainly illegal for the eye agencies. Russians maybe? I remember reading mentions of this on 8ch months back so they've been at it for a long while.

Anonymous 05/29/2019 (Wed) 14:00:11 [Preview] No.13336 del
Could be some literal retard, but I wouldn't be one bit surprised if it was some kind of agency. I know 180chan (and its deratives) was hosted by some sketchy hosting company in Amsterdam (Novogara, IIRC) and I believe it's offline now. So not all honeypots, but most of them are.

Also you'd be surprised how many pedo's browse this shit unsecured. Hell, they sometimes even use their work/personal e-mail to sign up for some forum.

(46.14 KB 887x272 masterTheorem.jpg)
Discord is shit Anonymous 10/22/2018 (Mon) 02:28:19 [Preview] No. 12909 [Reply] [Last 50 Posts]
Is there a Libre version of Discord that isn't so shit? It needs stuff like this:
>voice chat
>text chat
>Youtube and image embeds in text chat
>Free Software (Libre)
>you can host it on your own server
>you can make bots for it
>uses actual good encryption
>has a web interface and mobile app
>you don't have to have a mobile phone to register an account
33 posts and 3 images omitted.

Anonymous 04/18/2019 (Thu) 05:52:35 [Preview] No.13287 del
>Teamspeak is proprietary.
There's mumble for that.

Anonymous 04/18/2019 (Thu) 17:46:13 [Preview] No.13288 del
IP leaks ain't fun. Use Matrix

Anonymous 04/18/2019 (Thu) 18:39:32 [Preview] No.13289 del
>no ip leaks
lmao i have bad news for you my dude, matrix.org got pwnd af

Anonymous 04/30/2019 (Tue) 17:55:11 [Preview] No.13305 del
Use Tor (bad latency, though).

Anonymous 05/21/2019 (Tue) 05:12:55 [Preview] No.13323 del
What are you, a pedo?

Get in ere

(162.95 KB 800x800 random.jpg)
Anonymous 10/29/2018 (Mon) 14:30:31 [Preview] No. 12952 [Reply] [Last 50 Posts]
What do you think about Suckless ideology?
12 posts omitted.

Anonymous 12/22/2018 (Sat) 10:29:58 [Preview] No.13046 del
I only use dwm and surf-right-now, but I love the way they maintain their code.

Anonymous 12/22/2018 (Sat) 13:49:46 [Preview] No.13047 del
their motto is less is more by adding more

Anonymous 12/30/2018 (Sun) 09:13:24 [Preview] No.13079 del
dwm is crap use awesome

Anonymous 12/30/2018 (Sun) 09:18:27 [Preview] No.13080 del
best st colours coming through

/* Terminal colors (16 first used in escape sequence) */
static const char *colorname[] = {

/* 8 normal colors */
[0] = "#2d2d2d", /* black */
[1] = "#f2777a", /* red */
[2] = "#99cc99", /* green */
[3] = "#ffcc66", /* yellow */
[4] = "#6699cc", /* blue */
[5] = "#cc99cc", /* magenta */
[6] = "#66cccc", /* cyan */
[7] = "#d3d0c8", /* white */

/* 8 bright colors */
[8] = "#747369", /* black */

Message too long. Click here to view full text.

Anonymous 05/20/2019 (Mon) 00:04:45 [Preview] No.13322 del

He3* 0e Anonymous 05/06/2019 (Mon) 18:20:05 [Preview] No. 13308 [Reply] [Last 50 Posts]
5 need s60e he3*, 0y 2eyb6ard n6 36nger w6r2s and n6w 5t 5s st4c2 ty*5ng 352e th5s and 5 can't ret4rn 5t t6 n6r0a3. 5 ca0e here beca4se 6f y64r g4ys c60*4ter s2533s and 5 d6n't tr4st g66g3e f6r a sec6nd w5th 0y 3a*t6*.
D6es any6ne 2n6w h6w t6 f5x th5s+

Anonymous 05/06/2019 (Mon) 19:16:36 [Preview] No.13309 del
d5d y64 try 25335ng y64rse3f+

Anonymous 05/07/2019 (Tue) 03:43:57 [Preview] No.13310 del
F4C2 Y64 FAGG6T, TH5S F4C25NG SER564S 5 HAVE W6R2 T606RR6W 4N352E Y64 5D56TS, 5 NEED T6 ST6* TH5S. H6W D6 Y64 T4RN TH5S SH5T 6FF+++

Anonymous 05/16/2019 (Thu) 11:45:11 [Preview] No.13320 del

(8.71 KB 646x483 gpcs2pppppp.png)
Author rescinds GPL licensed code from "Geek Feminists" Anonymous 01/11/2019 (Fri) 01:21:48 [Preview] No. 13089 [Reply] [Last 50 Posts]

Reportedly, the author of the GPL licensed text-mode casino game "GPC-Slots 2" has rescinded the license from the "Geek feminist" collective.

The original author, after years of silence, notes that the "Geek Feminist" changed[1] a bunch of if-then statements which were preceded by a loop waiting for string input to a switch statement. The author reportedly noted that to use a switch statement in such an instance is no more preformant than the if-thens. Switch statements should be used where the input to the switch statement is numerical, and of a successive nature, for most efficient use of the jump table that is generated from said code.

The author reportedly was offended, after quiet observation of the group, that the "Geek Feminists" mocked his code, mocked his existence as a male, and never did any work on the code afterwards and never updated to include new slot machines added to the original code by author subsequently.

The author notes that he neither sought nor received any compensation for the granted license, that is was a gratuitous license, and that there never was any refutation of his default right to rescind given. (A right founded in the property law of licenses.)

The copyright owner has reportedly watched quietly as each year the "Geek Feminists" published a recount of their heroic efforts regarding his code.[2][3] Presumably he has now had enough of it all...

The author notes that the SF Conservancy attempts to construe a particular clause in the GPL version 2 license text as a "no revocation by grantor clause", however that clause states that if a licensee suffers and automatic-revocation by operation of the license, that licensees down stream from him do not suffer the same fate. The author of "GPC-Slots 2" reportedly notes that said clause does only what it claims to do: clarifies that a downstream licensee, through no fault of his own, is not penalized by the automatic revocation suffered by a licensee he gained a "sub-license" from (for lack of a better term.)

The author reportedly notes that version 3 of the GPL did not exist when he published the code, additionally the author notes that even if there was a clause not to revoke, he was paid no consideration for such a forbearance of a legal right of his and thus said clause is not operative against him, the grantor, should it exist at all.

(Editor's note: GPL version 3 contains an explicit "no-revocation-by-grantor" clause, in addition to a term-of-years that the license is granted for. Both absent in version 2 of the GPL)

Message too long. Click here to view full text.

87 posts and 7 images omitted.

Anonymous 04/24/2019 (Wed) 04:50:20 [Preview] No.13295 del

Anonymous 05/05/2019 (Sun) 04:58:12 [Preview] No.13307 del
Are you actually posting 4/g/ threads to the LKML? lol, you fucking nutter, as if people didn't already totally disregard you for being an obnoxious wackjob.
Here's an idea, fake lawyer. Actually make a contribution to the Linux kernel, then rescind it, if you want to try to prove your point. Because nobody gives a shit about your little casino script, you pathetic eunuch.

Anonymous 05/13/2019 (Mon) 04:07:00 [Preview] No.13319 del
Got a legal argument?

Tor Hidden Service Mail Server Endwall 08/08/2017 (Tue) 03:16:04 [Preview] No. 992 [Reply] [Last 50 Posts]
############### BEGINNING OF GUIDE ##########################

In this thread I document and revise how to set up a tor hidden service email server, you may substitute the servers that you are most comfortable with.

STEP 0) Collect the relevent files from The Endware Hidden Service
Set up a tor mail server using postfix or OpenSMTPd, with dovecot for imap or pop.

You may contact me anonymously at endwall@zvdcyrpole74oo24gqkx2wh6rmrthrhexzik5dm6xf7ewtiekxmvqwqd.onion
Use endmail.sh to send mail to this account.

Encrypt with pgp and send messages and files by email on a tor hidden mail service on port 25.

Everyone should do this. Then just share your hidden service address and handle.


Message too long. Click here to view full text.

Edited last time by Endwall on 03/09/2019 (Sat) 06:20:10.
3 posts omitted.

Endwall 08/09/2017 (Wed) 02:08:23 [Preview] No. 996 del

This name is juvenile

I'm renaming it to:

Maximum Security Electronic Mail Communications Protocol (MSEMCP)

That's more descriptive of what it is. Its a standard now. Email me with endmail.sh if you set up a server after you test it.

The great thing about this system is that it is opensource, distributed, anonymous, transport layer encrypted, and the message is RSA 4096 encrypted by gpg. Currently you do not have to have a working server to submit mail to a server. So if you were part of a 10 man spy ring with a central node the field agents only need to learn how to use gpg to encrypt and to install swaks, tor, torsocks and use a variant of endmail.sh to report back to central command. Of course it can be used for server to server anonymous communications as well. Since it uses gpg several recipients can be addressed to one anon@hiddenserver.onion and then central command can distribute the messages to their intended recipients after the first decryption. So you could encrypt with a general wrapper that contains the meta data (to: field ) that central command uses to distribute the message to the person it is intended for, and then put the from: and subject: in the targeted encryption for that person that central command/dispatch can't read. So you'd have two gpg keys one public key for central command and then a public key for the intended recipient. The field agent would perform 2 encryptions the first for the recipient with the subject: and from: field in the plain text, and then the second encryption with the to: field in the plain text of of the encrypted file.

Anyways I'm now calling it the:

Maximum Security Electronic Mail Communications Protocol (MSEMCP)
Edited last time by Endwall on 08/09/2017 (Wed) 02:17:45.

Endwall 08/09/2017 (Wed) 22:02:09 [Preview] No. 997 del
Maximum Security Electronic Mail Communications Protocol (MSEMCP)


Maximum Security Encrypted Message Communication Protocol(MSEMCP)
Edited last time by Endwall on 08/09/2017 (Wed) 22:20:51.

Endwall 08/09/2017 (Wed) 22:17:11 [Preview] No. 998 del
Maximum Security Encrypted Message Communication Protocol (MSEMCP)

Author: Endwall from the Endware Development Team
Creation Date: August 8, 2017
Copyright: The Endware Development Team (c) 2017
License: You are Free to Study, Reproduce, Copy, Modify, Implement, Test, and Use this protocol as described below, in the spirit of the Endware End User License Version 1.15.


This protocol MSEMCP provides:
1. Message security through physical isolation of the encryption station by a read only Floppy Disk Message Sneaker Net (FDMSN)
2. Strong Public Key Cryptography using RSA 4096 bit.
3. Transmission and reception anonymity through Tor with 12 hops.
4. Trust and Verification through TLS 1.2 with RSA 4096 bit, and Self Signed Server Certificates to compare repeated server connections.

All of which can be implimented with 4 tools:
1) A Base install of a *nix BSD or GNU operating system in text mode.

Message too long. Click here to view full text.

Edited last time by Endwall on 08/09/2017 (Wed) 22:39:39.

Endwall 05/10/2019 (Fri) 17:20:38 [Preview] No.1394 del
Also after writing the encrypted message onto the floppy disk, eject it and then flip the write protect tab on the floppy. So that you only read encrypted.asc and sha256sum.txt from the floppy on your transmission work station when sending the file.

In general you can improve this protocol by having 2 air-gaped computers, that share your private key. One for decrypting messages, the other for encrypting messages. That way information never flows back and forth between your air-gap stations and the transmission computer.

READ ONLY Floppy 1 computer 1

computer 2
Floppy 2 READ ONLY

The transmission station has the tor mail server (postfix) with tor and endmail. The Encrypt and Decrypt station are separate computers that share your private key for pgp (not necessary if you're not signing anything, since you encrypt with the counterparty's public key only) . Both are air gaped / full disk encrypted running OpenBSD, and floating on a battery backup (off the power grid). Basically unplug your UPS from the wall for 15-20 mins while you do this operation, shutdown the computer then plug the APC back in to recharge the batteries. If malware flows in to the decrypt station, it can't return to the transmission station or jump across to the encrypt station. Nothing ever flows in to the Encrypt station only out.

If malware flows in to the decrypt station, it can't return to the transmission station or jump to the encrypt station. Nothing ever flows in to the Encrypt station only out. Nothing flows out of the decrypt station only in.

Message too long. Click here to view full text.

Endwall 05/10/2019 (Fri) 17:28:17 [Preview] No.1395 del
Nothing should flow into the encryption station, but I guess you have to get the public keys for your recipients onto the encryption station somehow, so you can make an exception for that, or do it during installation if you have a small consistent set of people that you communicate with. Or just risk bringing in a new public key by floppy disk. It's a very small attack surface.

The point is to assume that the transmission computer can or will get compromised by a keylogger, or by other malware, since it is internet connected, and to shield the messages by encrypting on the air gap.

You might need to jump new public keys onto the encryption station but aside from that nothing comes in, only messages go out on it. With the decryption station nothing comes out, only encrypted messages go in.

1.44MB is enough to have a book's worth of text. That should be enough for passing messages.
The King James bible is 4.3MB uncompressed 1.3MB compressed with gzip. So 2 floppy disks should be sufficient to shuttle messages back and forth for a couple of years.

If both message counter-parties did this protocol, it would be pretty secure. If your messages were leaked at that point and you discovered it by some means, you could safely assume that the person that you are communicating with is a rat,snitch,traitor, etc., who forwarded the decrypts along to your adversaries / enemies.

Its not unbeatable, for instance someone could install a camera in your room...and point it at your decrypt / encrypt station monitors,or keyboard, or have switched your keyboard for your encrypt station with a keyboard with RF signalling by physical access, which is why physical security is also important.