Take precautions against secret usb implants Anonymous 08/13/2022 (Sat) 08:16 [Preview] No. 15098 [Reply] [Last 50 Posts]
I am using Linux operating system.

My computer is not connected to the internet , I formatted it and changed the bios firmware and hard disk firmware. However, the program opens by itself, the mouse cursor moves by itself, and sometimes the system's default audio service is turned off.

When I examine it with the Wireshark program, an interrupt signal comes from the usb ports, even though there is no device plugged into the usb ports. The interrupt signal comes from linux's default idle hardware.
I have a hidden implant in my computer that looks like the NSA ANT COTTONMOUTH tool.
Wireshark logs https://easyupload.io/eqrfr6

This hidden usb implant can easily bypass all antivirus and security software by introducing itself as a hidden system process by overflowing the kernel, regardless of linux or windows operating system, during computer startup.

On computers that cannot exceed the kernel security, it introduces itself as a different hardware and takes over the control of the system via memory buffer overflow by overloading the interrupt. No antivirus and security software can detect this situation.

This hidden usb implant is not simple usb keyboard like ruber ducky and usb ninja. For this reason, do not recommend simple and useless scripts such as "usb guard". This implant is an advanced usb spying implant similar to NSA COTTONMOUTH.

My request from the linux community is to develop a security module for the linux operating system against hidden usb implants.



Take precautions against secret usb implants Anonymous 08/13/2022 (Sat) 08:12 [Preview] No. 1797 [Reply] [Last 50 Posts]
I am using Linux operating system.

My computer is not connected to the internet. However, I formatted it and changed the bios firmware and hard disk firmware. However, the program opens by itself, the mouse cursor moves by itself, and sometimes the system's default audio service is turned off.

When I examine it with the Wireshark program, an interrupt signal comes from the usb ports, even though there is no device plugged into the usb ports. The interrupt signal comes from linux's default idle hardware.
I have a hidden implant in my computer that looks like the NSA ANT COTTONMOUTH tool.
Wireshark logs https://easyupload.io/eqrfr6


This hidden usb implant can easily bypass all antivirus and security software by introducing itself as a hidden system process by overflowing the kernel, regardless of linux or windows operating system, during computer startup.
On computers that cannot exceed the kernel security, it introduces itself as a different hardware and takes over the control of the system via memory buffer overflow by overloading the interrupt. No antivirus and security software can detect this situation.


This hidden usb implant is not simple usb keyboard like ruber ducky and usb ninja. For this reason, do not recommend simple and useless scripts such as "usb guard". This implant is an advanced usb spying implant similar to NSA COTTONMOUTH.

My request from the linux community is to develop a security module for the linux operating system against hidden usb implants.



(8.67 KB 735x386 deepwebs.jpeg)
Anonymous SSH chat Anonymous 08/13/2022 (Sat) 06:27 [Preview] No. 15097 [Reply] [Last 50 Posts]
Anyone interested to have old school hacker chat anonymously? And I really mean it, truly anonymously. Anonymous deep webs chat using SSH, that's right, no web / js soykaf.
ysdr3c3j7odl3p2zu5vdyaphf5x65l4hc3i2hmuy4vx4svibnxonvsqd on the onion network and port is 1337 protocol SSH as mentioned earlier.



Exploit development with artificial intelligence Anonymous 08/11/2022 (Thu) 16:30 [Preview] No. 15096 [Reply] [Last 50 Posts]
Exploit development with artificial intelligence

Why don't hackers use artificial intelligence to develop exploits ?

It is quite easy to develop exploits with artificial intelligence.

They do not need to use their own computers for this. There are dozens of artificial intelligence services operating online.

A special artificial intelligence algorithm that you will prepare will scan all the vulnerabilities that have come up to date. By making comparisons between the vulnerabilities it scans, it determines the cause and source of the vulnerabilities in a way that a human cannot perceive.

Understands how to develop exploits against vulnerabilities by examining all exploits written.

That's what intelligence agencies do. This is how hackers should do it.

https://security.stackexchange.com/questions/237945/are-there-any-projects-papers-on-approaching-exploit-development-with-ai-automat



Exploit development with artificial intelligence Anonymous 08/11/2022 (Thu) 16:26 [Preview] No. 1796 [Reply] [Last 50 Posts]
Exploit development with artificial intelligence

Why don't hackers use artificial intelligence to develop exploits ?

It is quite easy to develop exploits with artificial intelligence.

They do not need to use their own computers for this. There are dozens of artificial intelligence services operating online.

A special artificial intelligence algorithm that you will prepare will scan all the vulnerabilities that have come up to date. By making comparisons between the vulnerabilities it scans, it determines the cause and source of the vulnerabilities in a way that a human cannot perceive.

Understands how to develop exploits against vulnerabilities by examining all exploits written.

That's what intelligence agencies do. This is how hackers should do it.



(31.39 KB 232x100 1571064253512.png)
Literally No Reason To Not Use Windows 10 Anonymous 11/14/2020 (Sat) 02:06 [Preview] No. 14460 [Reply] [Last 50 Posts]
>IT'S B-BLOATED!!!!1!
And you're telling me you can't afford a $200 PC from the past 5 years that will run it seamlessly? Sell your 15 year old Thinkpads that can't even into AVX or non-fixed pipeline GPUs.
>SECURITY RISK!1!!!!1!
Have you anything to hide? No one cares about you. You aren't developing anything significant. You aren't a threat to the current ecosystem. You aren't a terrorist/spy/lone-wolf actor. FVEY has better places to spend its resources on. You're already being watched with facial recognition, Low-Earth orbit imagery satellites, and backbone-level deep-packet inspection.
You can disable the telemetry in settings. Go a step further too and get the Enterprise edition with minimal software preinstalled.
>BROKEN AND BUGGY1!!1!
In the beginning? Sure, but now its quite stable, and you'll be hardpressed to come across any problems. Linux, on the other hand, presents you with hours of work, ranging from broken audio to missing files to a lack of hardware and application support.
>NON-FREE!11!!1!
You're paying for consistent updates and almost full support for any and every application in existence. The user experience and interface is only beaten by Mac OS from Apple, and is lightyears ahead of anything Linux could bring to the table.
You don't take advantage of FOSS. You've never looked into the software to determine how it works.
>MICROSOFT IS SHITTY COMPANY11!!!!!1!
And Stallman is a foot-eating pedophile. Separate the art from the artist.
>NON-CUSTOMIZABLE!1!!1!
Windows is utilitarian with a focus on getting shit done. It won't waste your time with hundreds of customizable options and features. It just works. Imagine spending 10 minutes writing assembly code every time you wanted to use your microwave. The people who use windows only care about the applications inside of it, not stupid crap like sub-pixel rendering and kernel parameters.
>NORMALFAG1!!!!!11!
Your elitism is nothing. "Normal" people are happy, fulfilled, and have their heads on straight. You on the other hand have spent countless hours behind a screen, posting on strictly anonymous websites, angry about the state of the world and how you're so much better than everyone else.
>FUCK YOU!1!!!1!

Message too long. Click here to view full text.

49 posts and 16 images omitted.


Anonymous 05/19/2022 (Thu) 02:23:43 [Preview] No.15056 del
>>15051
>>15052
I mean OP is most likely a troll but you're pretty much right

>There is no reason for me to switch to Windows.

Just use Wine to emulate anything windows related.


Anonymous 07/13/2022 (Wed) 16:43:53 [Preview] No.15074 del
Two years and counting. Jesus. That's some good fucking trolling.

My daily driver is a homebuilt desktop running Ubuntu. There is some very old, very specialized Windows software I use in a hobbyist capacity that just won't work with Wine, but it installs and runs perfectly in Windows XP in Virtualbox.

Also, I am surprised that no one has pointed out yet that Windows 10 is spyware. It takes screenshots several times an hour and phones home to Redmond with them as part of the "user telemetry" that's all enabled by default and which all "accidentally" gets turned back on after every Windows update.


Anonymous 08/06/2022 (Sat) 06:28:27 [Preview] No.15085 del
windows is fucking gay. I don't want any LGBT rainbow flag in my operating system


Anonymous 08/06/2022 (Sat) 23:33:12 [Preview] No.15086 del
Funny that Windows peaked with XP and has become shittier with every release since then. Windows 7 wasn't terrible, but updates backported much of the spy crap into it and now that it is gone, there's no reason to use Windowz. Windows 11 is even shittier than 10, why do people use this crap?


Anonymous 08/11/2022 (Thu) 15:25 [Preview] No.15095 del
>>15086
Fear of change. Lack of executive function. Windows grants a sense of safety to the uninitiated. It is sad, but that's the way it is.



(862.37 KB 1024x768 bz.png)
BZFlag map format desired for ChaosEsque Anthology Anonymous 08/09/2022 (Tue) 03:50 [Preview] No. 15087 [Reply] [Last 50 Posts]
BZFlag map discussion. https://sourceforge.net/p/chaosesqueanthology/discussion/general/thread/e4d95485c9/
Years ago they, when I made BZFlag maps, deleted my textures because they didn't like my views: making my maps unplayable for everyone (all textures were hosted on bzflag webservers and only bzflag webservers).
I want to kill these people.
But what I would like more is for ChaosEsqueAnthology to parse the BZFlag map format.
https://sourceforge.net/p/chaosesqueanthology/discussion/general/thread/e4d95485c9/
2 posts and 2 images omitted.


Anonymous 08/09/2022 (Tue) 04:00 [Preview] No.15090 del
(352.52 KB 891x902 xrctfy_xcity.jpg)


Anonymous 08/09/2022 (Tue) 04:05 [Preview] No.15091 del
>>88065990
>Ur gonna havw to do better than this shit explanation. I cant even tell what it is youre asking. Write it out properly.

1) I like the BZFlag (2.0.3, 2005) map format:
*It is an ASCII format
*It is iterative
>(ie: you can "build" a grouping of meshes, then use that in other groupings of groups of meshes, and then put those anywhere at any rotation and scale)

2) Currently the engine can load Q1BSP and Q3BSP, and OBJ (an ascii format), and alot of other formats (IQM, ZYM, MD3, etc etc).

3) I recently add Wolfenstine:Enemy Territory BSP support aswell. So I've done work in this area

4) I feel burnt out though.

5) I made BZFlag Maps in the past: the format is simple but enjoyable to use

6) The engine allready contains a ASCII model format loader (OBJ).

Message too long. Click here to view full text.



Anonymous 08/09/2022 (Tue) 04:18 [Preview] No.15092 del
(58.79 KB 728x482 afg1630885959702.jpg)
>>390316169
>Sooo you made Loli porn maps in some shitty game?
I made 50 maps for Nexuiz/Xonotic. I've made 100s of models. I've done megabytes of QC code, and C code for the fork of the game.

I also outlined, asked for, and paid in cash for the following to be implemented in Nexuiz:
1) Cryptographic support
2) Warpzones
3) Fakelight

I also made the tuba model for nexuiz.

I've done megabytes of code for my version.

> This stinks of schizo autistic nonsense.
This is our website. Get off of it. Normie faggot.

> This is a basket weaving forum sir. I think you’re lost.

Message too long. Click here to view full text.



Anonymous 08/09/2022 (Tue) 17:16 [Preview] No.15093 del
(172.04 KB 767x432 curvacion.png)
>>15092
Кфтвщь фтщт цфтештп ещ ыфн ерфе Ш дщму нщг Sorry, wrong keyboard. I love you very much, and you are doing the work that this world is valiantly bleeding for. Bless you.


Anonymous 08/09/2022 (Tue) 18:00 [Preview] No.15094 del
(67.06 KB 1125x1396 374.png)
its over for mipscels.



ITS OVER FOR MIPSCELS, FUCKING ACCEPT IT



The "hardware antivirus" Anonymous 08/07/2022 (Sun) 07:06:36 [Preview] No. 1794 [Reply] [Last 50 Posts]
Antivirus and cyber security systems used for computers are software-based.
Today, cyber espionage can be done not only with codes and programs, but also on hardware.
It is possible to spy directly on the hardware, bypassing the operating system and antivirus by loading harmful codes into the firmware on the chips of the hardware.
While it is possible to clean the malicious rootkits infecting the UEFI / BIOS firmware and Harddisk firmware of the computer by reinstalling the original firmware of the hardware manufacturer, the firmware of the chips in the other hardware of the computer (keyboard, mouse, mouse, usb controller, camera, microphone, video card, PCI slots and other hardware) It is not possible for ordinary people to detect and clean rootkits infected with the rootkit.
For this reason, a special operating system or special system software is required to detect rootkits that infect the firmware of chips in other hardware.
This system and operating system can detect by examining the signals given by other hardware to the system and by examining the operation of the firmware on the hardware chip, if possible, by examining its digital signature.
You can claim that the Sniffer and Monitor programs on the market can do this function. But these programs can examine as much as the operating system they are running gives them.
Therefore, a different system or operating system is required in this regard. Apart from this, "hardware antivirus" can be developed as an alternative to software antivirus and software cyber security systems.
Security software is usually installed on the operating system, the operating system kernel and, if necessary, the motherboard bios/uefi section. Alternatively, a "hardware antivirus" with a different motherboard and processor can be placed inside the existing computer case, regardless of the computer used.
The difference of this "hardware antivirus" from IDS, IPS and External Firewalls is that it can directly connect to the computer's memory, hard disk and network paths with a physical cable or implant, and physically control the computer system, ensuring the security of the computer regardless of the current operating system and motherboard.
This "hardware antivirus" can physically monitor the computer's input and output ports, stopping hard-to-detect BadUSB and NSA ANT tool attacks.



Endware Endwall 05/03/2016 (Tue) 08:54:28 [Preview] No. 32 [Reply] [Last 50 Posts]
Endware is a suite of programs geared towards internet privacy, security, and anonymity.

Endwall: endwall.sh is an iptables based firewall script designed to be implemented on any linux distribution shipped with iptables. endwall.sh is based on default drop policies, coupled with a novel strategy of passing packets on local host ports only for those enabled by the enduser. It comes with a variety of well used ports enabled with several additional port passing configurations available by uncommenting the script. It provides essential security to a new user.

Endsets: endsets.sh is a script that adds blacklisting and whitelisting functionality to endwall.sh. It depends on the program ipset. It is persistent on reboot if you enable ipset as a service. This is the recommended blacklisting tool for endwall if you are running a server or planning on opening up ports and services to the public and will require daily blacklisting of new incomming IPs.

Endlists: endlists.sh is a traditional text file list based blacklisting and whitelisting script. It has slow performance, and can't be updated on the fly. Good for <1000 ip subnets, very tedious and slow to run for more than that. Blocks the IPs by adding them as individual rules to the iptables ruleset. Works but not recommended for heavy duty on a server. May be useful for workstation use to block ip ranges if you are not opening up ports and services to public clients.

Endtools: endtools are a collection of scripts including alogz.sh, mlogz.sh, spamlogz.sh and iplookup.py. These scripts will help to service an enduser of endwall in adminstering endsets/endlists.

iplookup.py is a geoiplookup script written in python and requires python and pygeoip. It has simmilar functionality to maxmind's geoiplookup program and uses the maxmind *.dat files.

spamlogz.sh is a script that searches through log files to find flagged log entries flagged in endwall.sh, endsets.sh and endlists.sh.

alogz.sh is a daily log reading script designed to read the output of an apache http server's log output.

mlogz.sh is a daily log reading script designed to read the output of a postfix smtp server's log output.

Message too long. Click here to view full text.

Edited last time by Endwall on 02/25/2019 (Mon) 00:18:53.
278 posts omitted.


Endwall 06/23/2022 (Thu) 08:35:13 [Preview] No.1781 del
>>1780

https://github.com/endwall2/endstream/blob/72ff52b8ba7ae363b92182e57ecb8b2bca5d9be1/winstream.bat
Lines: 502, 3695, 3703, 3713, 3721, 3729, 3737, 3745, 3753, 3761, 3769, 3777, 3785, 3793

The file is now visible again, somehow this isn't the latest version of the program, the line numbering is different than in my current master copy. In any event the lines are all links to the news feeds for Global News streams that they publicly distribute in the open at,

https://globalnews.ca/live/national

And you can see these links in your web-browser by going: right click on the page -> inspect -> network , and watching the traffic.

Publicly visible URLs, from their public open access broadcast.

The website and streams are not Geo-Location blocked, are public access, don't use a token or a cookie for authentication, are not behind a username/password log on or a paywall, don't have any DRM and are not encrypted. They publish the link themselves in the browser.

All of these links are visible and freely accessible in any modern web browser (Firefox, Chrome, Edge, etc)
by right clicking the web page -> Inspect -> Network , when watching the publicly broadcast streams available at,

Message too long. Click here to view full text.



Endwall 06/23/2022 (Thu) 09:01:14 [Preview] No.1782 del
In other news, I have created and tested versions of endwall_nft for wifi, I developed this file on Raspbian 11 64 bit on a raspberry pi 4 model B, and then tested the file on Debian 11 on my mom's Dell Latitude laptop. With some minor adjustments to the wifi version, wifi is working. The files are,

endwall_nft_wifi.sh

http://nguipxnkrp3qrzrlduhsatpcpwehnblzmlkc5ifiumxq4z5jlh4lwvid.onion/endware/endwall_nft_wifi.sh

https://raw.githubusercontent.com/endwall2/endware/master/endwall_nft_wifi.sh

endwall_nft_raspi.sh

http://nguipxnkrp3qrzrlduhsatpcpwehnblzmlkc5ifiumxq4z5jlh4lwvid.onion/endware/endwall_nft_raspi.sh

https://raw.githubusercontent.com/endwall2/endware/master/endwall_nft_raspi.sh

Use the raspi version if you're using a raspberry pi on Raspbian 11 32bit or 64 bit. Use and modify the wifi version if you're on Debian 11 on a laptop with wifi, or any other distribution that now uses nft.

I worked on some of the function translations and will backport them into endwall_nft.sh on the weekend.

Message too long. Click here to view full text.



Endwall 06/25/2022 (Sat) 09:35:37 [Preview] No.1783 del
I have just done some work on endlists.sh, to finish making shell functions for all of the list methods. I then made a translation of endlists into nft, as endlists_nft.sh'

endlists.sh
https://raw.githubusercontent.com/endwall2/endlists/master/endlists.sh

http://nguipxnkrp3qrzrlduhsatpcpwehnblzmlkc5ifiumxq4z5jlh4lwvid.onion/endware/endlists.sh

endlists_nft.sh
https://raw.githubusercontent.com/endwall2/endlists/master/endlists_nft.sh

http://nguipxnkrp3qrzrlduhsatpcpwehnblzmlkc5ifiumxq4z5jlh4lwvid.onion/endware/endlists_nft.sh

I use this script to do all of my /8 bans for regions I have no business with like Asia, Africa, India.
If there is a specific range you want blocked just drop it into blacklist.txt, and then run the file. I've left this section commented out. I should probably uncomment it so that it's available.

Next I'll work on adding verdict maps (vmaps) in nft to replace the functionality of ipset. The next product I'll try to translate is endsets.sh. Once that's done I'll be able to set up my clearnet server hosting using nftables as a replacement for iptables. I'll post an update when I have something to show.


Endwall 06/26/2022 (Sun) 09:08:57 [Preview] No.1784 del
I have completed translating endsets.sh into endsets_nft.sh using the native sets capability in nft. Tested working on Debian 11.

The files are located here:
endsets
https://raw.githubusercontent.com/endwall2/endsets/master/endsets.sh

http://nguipxnkrp3qrzrlduhsatpcpwehnblzmlkc5ifiumxq4z5jlh4lwvid.onion/endware/endsets.sh

endsets_nft
https://raw.githubusercontent.com/endwall2/endsets/master/endsets_nft.sh

http://nguipxnkrp3qrzrlduhsatpcpwehnblzmlkc5ifiumxq4z5jlh4lwvid.onion/endware/endsets_nft.sh

Let me know if the files are working for you.

I also made some minor bug fixes to the following files:
endwall.sh, endwall_nft.sh, endlists.sh, endlists_nft.sh, endsets.sh, endsets_nft.sh. Located in the usual places.

Message too long. Click here to view full text.



Endwall 08/03/2022 (Wed) 06:34:30 [Preview] No.1793 del
I just ported endstream to macOS using a MacMini 2014 model with MacOS 12.5 Monterey. Using the Homebrew package manager you can install youtube-dl, curl, openssl, and mpv, and then the program will run. I've tested this port as working, and have placed it onto the github repository and onto the hidden service.

endstream_macOS.sh

Github
https://raw.githubusercontent.com/endwall2/endstream/master/endstream_macOS.sh
Endware Hidden Service
http://nguipxnkrp3qrzrlduhsatpcpwehnblzmlkc5ifiumxq4z5jlh4lwvid.onion/endware_macOS/endstream_macOS.sh

Now endstream is tested working on the following operating systems : { Linux, OpenBSD, Windows NT, MacOS }. I'm planning on going back and making winstream.bat into a powershell script so that it is fully compatible and can access all of the streams. Right now winstream.bat just uses fixed links and m3u8 playlists and can't access the Youtube live streams or other dynamic playlists. I'll have to learn more about Powershell first which might take a month or two. Its a side project.

My next task with endstream is to fix up the channels on the OpenBSD port and test it, I'll work on that in around two weeks when I have some free time.

Summary: I made a cross platform killer app, and gave it away for free on the internet...



(88.81 KB 1280x720 Signal Chans.jpeg)
Privacy Anonymous 08/01/2022 (Mon) 08:30:26 [Preview] No. 15084 [Reply] [Last 50 Posts]
Signal is dead, they are glow niggers now.
They are closing some of their servers source. Time
to check out some alternatives https://be8.live
no install, no phone, no email, every network request
can be checked because it's a web app.

Join our group to discuss privacy https://be8.live?group=U2FsdGVkX1%2BqyAXTwF0xa7vX9WH9ns1%2BBaH5LSAFtq4%3D



Internet Security General Anonymous 04/16/2016 (Sat) 07:56:30 [Preview] No. 4 [Reply] [Last 50 Posts]
Continuing from >>>/tech/597
https://archive.is/INR3l
This is for non specific, general tips for anonymous web browsing and downloads, tips on browsers and browser configurations for the security concious that you don't want to make a new thread for.
93 posts and 4 images omitted.


IRC Endwall 12/30/2018 (Sun) 15:41:05 [Preview] No.1357 del
IRC Workflow
STEP 0) grab endsh.sh

https://raw.githubusercontent.com/endwall2/endtools/master/endsh.sh

requires torsocks and firejail

STEP 1) Install IRSSI

$ su
# torsocks -i pacman -S irssi
# exit

STEP 2) Modify config file
$ cd ~
$ cd .irssi
$ nano config

Message too long. Click here to view full text.

Edited last time by Endwall on 03/09/2019 (Sat) 06:52:35.


Endwall 12/31/2018 (Mon) 02:26:09 [Preview] No.1360 del
>>1357

You can also set up proxying to 127.0.0.1:9050 in Hexchat. This works when connecting to the .onion addresses.

Settings->Preferences->Network-> Network Setup

Fill in the socks5 proxy information. Then Add the new server in the connection tab using the .onion address and port number. Works.


Anonymous 02/17/2019 (Sun) 03:15:44 [Preview] No.1369 del
Unless there is a discount for buying a vpn with bitcoin. It is not necessarily an anonymous transaction because you theoretically connect to your raw ip with the bitcoin purchased vpn.


baroque music is played exclusively on modern instruments ShawnWic 03/19/2019 (Tue) 06:22:59 [Preview] No.1382 del
REMOVED
No Spam 5 year ban
Edited last time by Endwall on 03/19/2019 (Tue) 07:15:15.


Anonymous 07/29/2022 (Fri) 10:40:37 [Preview] No.1792 del
What is the search engine that should we use?



Facebook develops exploits to hack into your computer! Anonymous 07/20/2022 (Wed) 10:54:54 [Preview] No. 15079 [Reply] [Last 50 Posts]
The usual products and services, Web trackers and phone apps are not enough for Facebook's infinite greed for spying and data mining. They will even develop exploits to hack into your computer for even more information gathering!

https://www.schneier.com/blog/archives/2020/06/facebook_helped.html


Anonymous 07/24/2022 (Sun) 15:14:34 [Preview] No.15081 del
>>15079
Pretty much everything on FB is an exploit OP. No exceptions


Anonymous 07/29/2022 (Fri) 08:54:41 [Preview] No.15083 del
As usual he will making more exploitative algorithms



Meta Thread Endwall 07/12/2016 (Tue) 12:03:36 [Preview] No. 171 [Reply] [Last 50 Posts]
Post any comments, concerns, or requests for the board in this thread.
Edited last time by Endwall on 07/12/2016 (Tue) 12:15:00.
35 posts and 6 images omitted.


Anonymous 01/20/2022 (Thu) 03:29:04 [Preview] No.1767 del
endwall, how are you? If I remember, you were the guy on 8/tech/ that talked about being stalked in real life and surveillance etc. How did that turn out for you? I've always wondered because you drew a lot of attention (primarily negative attention) and I always hoped you'd get better

If you're the wrong person i'm sorry


Endwall 01/31/2022 (Mon) 06:26:14 [Preview] No.1769 del
>>1767
Yeah I'm the person who posted on 8chan/tech. It turned out poorly. The situation does not appear to be improving. Socially and financially it appears terminal. My computer surveillance problems also remain largely unsolved, even after everything I've learned and implemented. I am under audio surveillance in my home,land line telephone surveillance, computer network surveillance, and man on the street surveillance. My bank accounts are under surveillance and I'm drowning in credit debt, with insufficient income to sustain a positive outcome. I am financially destitute and socially isolated. I can't find work beyond my low end part time job. Every attempt has been interfered with and blocked since around 2014.

Apparently I'm also a public celebrity. The level of the gang-stalking and harassment went full Truman show. It is cross border and probably international. The main instigators of the crime are actually my own family members who are all face rubbing hand waving shit heads. I don't rub my face or scratch my face in counted sequences to communicate with people. I learned about the basics of the issue in 2010 after a massive harassment campaign against me. The problem was going on as far back as 1997 after recollection, but I didn't recognize that it was organized until around 2009.

People I don't even know seem genuinely angry at me for reasons I don't even understand. They jump over themselves to lie about me, impersonate me on some public-private messaging service that I don't have access to, and insert themselves in my path in order to portray that I am either retarded, a moron, a homosexual, a stalker, a skirt chaser, a drunk, a drug abuser etc. All lies.

I'm mostly at home doing my online courses for college these days, so unless I go outside I don't have any issues except for with my mom. My mom stands in front of the door to my room when she gets home from work and does hand signs and gestures and sneers at me and repeats slogans like ("It ain't happening!", "Enough is Enough!" etc.), she's a fucking robot shit head. She's also become a MAGA, Q-ANON, conspiracy follower, and repeats lies to me about these things as if they are facts. I have stopped trying to debate with her about these things as it is a waste of time. Regarding my situation, my mom says platitudes to me like "Pray to God and it will get better!", "It will all work out, you just have to believe.", etc. She's actually part of the problem.

The number of people in society in North America who participate in face rubbing, hand sign waving, and robotic phrase repetition, ("Thank you so much", "This is it", "That is all"), command and control, is around 99% of the population. Democracy is an illusion, we live under totalitarian command and control organized by witch covens, cults, Freemasons, pimps, prostitutes, drug cartels, socialist communists, corporations and fascists. I'm not going to bother calling it freemasonry or some other fancy name. I'll call it what it is, Organized Crime and modern day Slavery. Military Government Totalitarian Slavery. I am 100% not involved in this group it's appendages or its training, but I can see its effects everywhere especially on my own life outcomes.

Due to the surveillance, harassment and public messaging network impersonation and negative public-private marketing against me ( where I assume people gain negative opinions about me), I expect to be financially troubled, and socially isolated for the remainder of my life. I've had around 14 years of continuous decline in my financial and social circumstances due to this campaign against me. We'll see how it goes, but it doesn't look good. My interest in computer network privacy, security and anonymity is directly related to my experiences being harassed and suppressed. I hope that answers your question.


Anonymous 07/12/2022 (Tue) 09:51:41 [Preview] No.1786 del
>>1769
I know you won't listen to this but you are mentally ill and need to seek professional help. You are making up connections where they do not exist because you are paranoid. Please talk to a mental health professional anon.


Endwall 07/24/2022 (Sun) 00:37:34 [Preview] No.1790 del
>>1786
No. None of the above. Organized crime is real. Government surveillance and harassment is real. Computer surveillance and harassment based on computer surveillance is real.

You need to seek an optometrist immediately. Please get help and talk to an optometrist so that you can see clearly.


Endwall 07/24/2022 (Sun) 01:19:59 [Preview] No.1791 del
>>1786
An optometrist just will not due. Please seek professional help from an ophthalmologist. Ophthalmologists are medical doctors that will be able to help you with your vision and eye problems. They are also trained to perform eye surgery if required. This may help to correct your vision, and help you to see the world as it truly is.



TOR IRC Anonymous 06/30/2022 (Thu) 02:27:16 [Preview] No. 15069 [Reply] [Last 50 Posts]
I want to join IRC channels but i cannot do it without using TOR, i2p currently not a choice. any solutions except for VPN or local proxy?

are there any cypherpunk, tech IRCs which allow TOR adresses. prob, just private ones eh? but thei rhard to get in.


Anonymous 07/04/2022 (Mon) 14:10:24 [Preview] No.15070 del
>>15069
No it's not possible OP


Anonymous 07/13/2022 (Wed) 22:19:08 [Preview] No.15075 del
there are bro
the problem is the people on them
https://gitlab.torproject.org/legacy/trac/-/wikis/doc/BlockingIrc


Anonymous 07/18/2022 (Mon) 21:10:34 [Preview] No.15078 del
cringe ngl fam cap



tillidieo Anonymous 07/15/2022 (Fri) 05:05:17 [Preview] No. 15077 [Reply] [Last 50 Posts]
https://www.freetopblogger.com
A man was going to the house of some rich person. As he went along the road, he saw a box of good apples at the side of the road. He said, "I do not want to eat those apples; for the rich man will give me much food; he will give me very nice food to eat." Then he took the apples and threw them away into the dust.
He went on and came to a river. The river had become very big; so he could not go over it. He waited for some time; then he said, "I cannot go to the rich man's house today, for I cannot get over the river."
He began to go home. He had eaten no food that day. He began to want food. He came to the apples, and he was glad to take them out of the dust and eat them.



VPN/proxy/TOR general thread Anonymous 04/15/2016 (Fri) 22:12:39 [Preview] No. 2 [Reply] [Last 50 Posts]
Cool board idea.

What's the safest possible way to browse the internet anonymously and safely? There's a thread on /tech/ with the endwall developer talking about proxychains, and that seems pretty cool. Some of the links to proxy lists seem dead, and I have found some online but why should I trust these random 'free' proxies?

What about proxychains over VPN? I'm currently using Mullvad which is alright, and I'm curious about more security if need be. Does a VPN -> proxychain -> TOR connection work? Sounds horribly slow in theory, but I think we all know that privacy comes at a cost in our current world.

I suppose I could call this a 'VPN/proxy/TOR general thread.'
84 posts and 5 images omitted.


Endwall 06/27/2020 (Sat) 20:15:07 [Preview] No.1543 del
Use Digital Research DR DOS if you don't like Microsoft. I have retail copies of MS DOS 5.0 on 5.25" floppies from 1991, and MS DOS 6.22 on 3.5" floppies retail from 1994. NSA\CIA\FBI etc don't have a time machine and can't time travel and insert malware into the base system retroactively.

DOS is a Single Tasking 16 bit Operating System programmed in x86 assembly; only 1 process on the top of the stack at a time. No keyloggers, runs in 384 KB of memory.

You'll have to audit 2-3 pieces of software ( a driver for a 3com or Intel NIC, and links 2 browser ) and compile using Borland Turbo C, or get a GCC compiler for DOS.
www.delorie.com/djgpp

Get a 486, or 386 with 16MB RAM install DR DOS or MS DOS, a NIC, a packet driver and the binary for Links, or compile it your self, set it to route through port 9050 on your tor router (running on Linux/UNIX). With that you'll be free to post whatever you want, nobody will know what you're doing on your computer, and if tor (or whatever comes next) works properly, then you'll be anonymous.

Free to read what you want from the internet, and post what you want to the internet.

>But but it's not FREE software,
> It's not GNU.
Precisely, I don't get copyright (legal) freedom, but I get actual (physical) freedom in the real world.
> But you could download an exploit; your system isn't secure.

Don't download and run anything from the internet on the DOS computer if you want it to remain with integrity. Just text reading and posting. Use it as a communications tool. Build a different computer for DOS gaming or use DOS Box on Linux/UNIX.

Message too long. Click here to view full text.

Edited last time by Endwall on 07/04/2020 (Sat) 23:37:49.


Endwall 06/28/2020 (Sun) 06:06:55 [Preview] No.1546 del
The ultimate step is to build an 8-bit computer with a soldering iron (RC2014), launch a browser in a community audited version of CP/M, connect by socks 5 proxy to a unix computer running tor with 12-15 hops, and use a text browser for the web and and irc client in text mode. Proxy out to Tor or I2P or whatever the next super duper anonymity router is. In the mean time do this with DOS. This won't be a solution for the everyman or for the newbie, but it will be a solution for the serious thinking man.


Endwall 06/28/2020 (Sun) 06:16:36 [Preview] No.1547 del
>>1541
Anything you can do to isolate the tor daemon from the system or its running processes will help. I'm running it as a user with a custom torrc. If you can first run firejail or bubble wrap, or chroot it and get the tor daemon to still function it might help. I consider the linux/unix environment potentially hostile to the user and a potential source of packet inspection. Basically linux can be used to keylog the users and destroy the anonimity factor in real time or in post analysis. If there is key logging with an output beacon on your machine, you don't have privacy, and Tor Browser isn't going to help you with anonymity. If there is malware that can mess with the tor daemon as it's running, then it might be wise to try to isolate the process, so yeah probably a good idea. I'll try running it with firejail it probably won't work. If you get a setup like that and find it beneficial, please post the steps and instructions here. Thanks.


Anonymous 12/15/2020 (Tue) 07:36:25 [Preview] No.1588 del
I am big fan of Minecraft and like to watch different minecraft video on Youtube.But for watching I use https://veepn.com/vpn-apps/vpn-for-firefox/ because I can not log itnto my youtube channels.



I for one welcome our new overlord Anonymous 07/07/2016 (Thu) 17:44:13 [Preview] No. 152 [Reply] [Last 50 Posts]
I was about to claim this board, but seems like Endwall guy claimed it. Please disable captcha for replies. Also, guess this is a meta thread.
7 posts omitted.


Anonymous 07/16/2016 (Sat) 19:52:18 [Preview] No. 196 del
This looks like a related board:

https://masterchan.org/nsa/


Anonymous 08/26/2016 (Fri) 20:22:48 [Preview] No. 427 del
>>196
>no Tor hidden service
>suggests deanoning self via logging in to "Anon ID"
>while suggesting stronger way of deanon than cookies, they claim to not store IP
>just made post with Tor Browser with no JS, cookies only, no "anon id" crap
>post shows up as by "Outlander", suggesting that majority of users there deanon self across sessions
Gee, I wonder why people call it honeypot


Anonymous 08/26/2016 (Fri) 20:39:19 [Preview] No. 428 del
Wanted to join their IRC
OFTC is a bunch of rulecucks. While they allow Tor access, they limit amount of connections per Tor exit node. I had to rotate circuit 11 times to connect.
>#masterchan Illegal channel name
Looks like "identified anon's" message on that imageboard is truth
>Why is someone possibly IRCOP banning users right and left in #masterchan?

Why the hell Tor Project uses this cucked network?


Anonymous 08/30/2016 (Tue) 03:19:37 [Preview] No. 461 del


Anonymous 07/13/2022 (Wed) 19:56:35 [Preview] No.1788 del
https://youtube.com/watch?v=qtqP_gA0rXA [Embed]
Spam 2 year ban



Obrigado, + Anonymous 07/11/2022 (Mon) 23:57:46 [Preview] No. 15073 [Reply] [Last 50 Posts]
Obrigado pelo post
_____
apostas de tГЄnis todos os dias - https://kazinorules.site casino slot vegas online



System Resources Endwall 07/05/2017 (Wed) 03:13:35 [Preview] No. 965 [Reply] [Last 50 Posts]
I have some observations to make.

## I just tested these systems:
MS DOS 6.22 runs in 384K of memory (1994)
MS Windows 3.11 runs in 2MB of memory with a full mouse driven GUI (1994)
Macintosh OS 7.53 runs in 7.4MB of memory , full GUI + TCP/IP (1996)
Macintosh OS 8.1 runs in 13.2MB of memory, (1997)
Macintosh OS 8.6 runs in 26MB of meomory, (1998)

OpenBSD 6.1 starts in text mode command line in 27MB of memory
OpenBSD 6.1 in Xenocara uses 65-80MB of memory to start up.

## from recollection:
Windows 7 800MB of memory (2009)

Parabola GNU/Linux starts in text mode cli using 150MB of memory
Parabola GNU/Linux in weston uses 300MB of memory

Message too long. Click here to view full text.

Edited last time by Endwall on 07/05/2017 (Wed) 03:17:31.
12 posts omitted.


Endwall 07/12/2018 (Thu) 08:34:29 [Preview] No.1247 del
Fresh install of Parabola/GNU/Linux-Libre/OpenRC

On an Intel core2 laptop

boot into cli from OpenRC

$ free -h

used 60 MB

start xorg as root

# startx

# free -h

used 75 MB

Message too long. Click here to view full text.



Endwall 08/20/2018 (Mon) 23:04:48 [Preview] No.1274 del
Alpine Linux on OpenRC
Fresh install on encrypted lvm with the services it said to start in the wiki guide. In command line on busybox.
$ free -m
120MB.

I couldn't get X org to start, but it would probably add another 20MB on top of that.


Endwall 08/20/2018 (Mon) 23:11:21 [Preview] No.1275 del
Hyperbola with linux-libre-lts on OpenRC is similar to parabola. Boots into user account in command line in at around 100MB xorg adds another 20MB ontop to around 120MB. Booting into a user shell seems to be more memory expensive than starting as root.

I want to boot to command line in no more than 20MB with a GUI that brings me up to no more than 40-50MB of memory usage. Any more than that and there is too much going on.


Endwall 08/15/2021 (Sun) 04:30:05 [Preview] No.1738 del
Gentoo Linux (2021)
Gentoo Hardened 10.3.0-r2
Linux/x86 5.13.10-gentoo Kernel

text mode: 51 MiB

Fresh install running with Btrfs on LVM on LUKS. Hardened Gentoo amd64 no-multilib stage 3,70 packages emerged. Running dm-crypt, iptables, lvm and bash. Could probably trim it down to 40MiB with some other choices (shell, daemons etc). I think this is going to be as good as it gets for Linux (for me) without changing things drastically. Maybe I'll switch my shell to ksh or dash or something else and see how it performs.


Endwall 07/10/2022 (Sun) 18:48:11 [Preview] No.1785 del
MacOS HighSierra (2017)

Installed on a MacMini 2011 with 16GB RAM, fresh install:

PhysMem: 4981M used (1945M wired)

The system needs at least 5GB to run properly, and uses up to 10-14GB of RAM when using applications. The memory usage is similar on Monterey.



(29.65 KB 520x318 nuclear_1024x627.jpg)
Anonymous 03/08/2017 (Wed) 04:01:56 [Preview] No. 325 [Reply] [Last 50 Posts]
Holy shitsake I didn't know you doods had pdf of classic 2600 issues, you sly dogs@!


Anonymous 03/08/2017 (Wed) 04:12:14 [Preview] No. 326 del
(26.16 KB 500x360 Green10.jpg)
I feel all the time like we will go back to NT 3.51 and Novell days. So many great times. Glad to see the board here, I would claim it if I felt qualified, but I most certainly am not. Even basic voltage levels in POTS phones is a chore for me but I find that, workspace n terms of soldering and electronics, has a lot to do with this.

I am also not the best solderist as my gear is the clumsy 110 one-temperature design. I have had several nice irons but moving and so forth, and always it seems I wish I could magnify or improve the frame in which I am soldering. For example my gal's kindle fire had the designed power usb port problem. I busted that chunk open and resoldered the power jack in a totally shitty manner. Truly a mess of glob. But guess what, that damned kindle fired up and has worked for year +. turns out the fine engineering was all for show. A glob of solder and their design flaw is trumped. Hah! Solder is power my friends! Bring this board to the fore , for the goblins are massing.


Anonymous 07/10/2022 (Sun) 04:56:45 [Preview] No.327 del
(769.11 KB 600x1000 123123141212.png)



Darkweb Intro Anonymous 08/15/2019 (Thu) 12:03:20 [Preview] No. 13454 [Reply] [Last 50 Posts]
Alright, could anyone give me a basic bitch primer on dark web for little babbies? My knowledge at the moment is limited to Tor, and the onion addresses for the hidden wiki, and the onion address for Endchan. I'm starting to realize given how every site I liked has been shut down, switched domains, DDOSed, put on watchlists, or made 'registration only' on clearnet channels (a sidenote: I would have thought this would have happen to the porn sites I visit, but oddly enough, those are A-OK on clearnet) that I need to go ahead and plan for the future and just move whole-hog to Dark Web. To those who wil say I'm a little late to figuring this out: you're right. Here's what I would like if anyone can supply it:

- What are all the darkweb channels? Tor, I2P, Zeronet, Freenet....am I missing any?
- Any basic tips on general usage/quickstarts for each channel. Pros/cons of each.
- Good starter websites for each. I'm particularly interested in news/forums, and any libertarian websites.

Thank you very much m(_ _)m
14 posts and 2 images omitted.



(164.35 KB 1600x1200 hlasdhfsadfdsaf.jpeg)
Lenovo t420 Anonymous 01/10/2021 (Sun) 21:55:26 [Preview] No. 14566 [Reply] [Last 50 Posts]
am i making a good choice? just need something reliable and not fancy at all.
12 posts and 1 image omitted.


Anonymous 05/01/2022 (Sun) 15:25:19 [Preview] No.15037 del
>>14980
whatever you do, never buy aplel products


Anonymous 05/05/2022 (Thu) 02:14:01 [Preview] No.15038 del
>>15037
You can just dual boot Mac OS or Hackingtosh into your computer if you want it so bad though

Maybe building your own PC is better than that OP


Anonymous 05/11/2022 (Wed) 11:20:11 [Preview] No.15039 del
I didn't hear much about t420 but thinkpads are best laptops I ever used so you should be fine. I recommend getting T440p or X230 though. Keep in mind that most of them (thinkpads) have BIOS locked so that may be an issue for you depending on how much control you want to have over your machine.


Anonymous 06/29/2022 (Wed) 00:53:10 [Preview] No.15068 del
>>14566
1. They should be free, corporate surplus, etc. I have literally over 100 sitting in storage, that I haven't had time to go through - Unusually I dump 10-15 in a box and bring it with me when I fly overseas. They go for about $100-150 easily.

2. The LCD's really suck, and sure you can get in the moneypit of replacing LCD and more, but it isn't worth it.

3. Reliable? Every laptop nowadays is reliable hardware wise.

4. Safe, good question anon, what is safe. Lenovo stuff, Dell Stuff and Apple stuff are relativelt safe, you can lock down the bios/efi and make it hard for most people outside of state enterprise to break in. They all have TPM, and you can do "secureboot" via EFI and disable the legacy shit - the TPM chip on the t420 is easily physically dumpable though with a buspirate or such. I've done it.

Wifi support cards also are eh, you need to change it out - once again not a big deal but money sink for 10yr old laptop.

Intel Management Engine - yeah, it can be stripped too.

Resale value: Nominal, 5yr old macbooks are going to be steady for year 6-8. Personally I'm on the other side where I buy new macbooks and sell in 3 years for 70-80% of value, but it is different from "reliable." No, this is not saying buy a macbook, but financial side, and support side, it does make it easy.

tl;dr t420 good for it's time, but between a new SSD, max out the ram, replace wifi card if going to go loonix/arch puts you in over $300. If you go w/ a new LCD, yeah it goes overboard quick. Didn't even cover battery, and chinese shit.

Message too long. Click here to view full text.



Anonymous 07/04/2022 (Mon) 14:13:13 [Preview] No.15071 del
>>15068
>>15068
Well there you go. Hope that answers everything OP

>Touchpad is also shit.
Just use a wireless mouse



(55.38 KB 781x1687 login.png)
New privacy messenger Anonymous 04/11/2022 (Mon) 14:35:57 [Preview] No. 15023 [Reply] [Last 50 Posts]
I found a new messenger. Real E2EE and self destructing. What do you think about that?

https://be8.live
5 posts omitted.


Anonymous 05/11/2022 (Wed) 11:33:54 [Preview] No.15043 del
>>15033
How did you guess? It doesn't look like honeypot at all /s


Anonymous 05/11/2022 (Wed) 11:35:06 [Preview] No.15044 del
>>15032
I'm sure OP is throwing a dice every time you are sending a message so it has to be truly secure. Are you happy now? /s


Anonymous 05/17/2022 (Tue) 02:19:52 [Preview] No.15048 del
>and self destructing
>privacy
It's a fucking scam.
Rule of a thumb: you see software that says it's gonna do self-destructing messages - its' owners either don't know what they are doing or are scammers who may trick you into writing everything that can be written to a hard drive with a simple change in the application. Just like Skype's message editing history could be made available with a simple CREATE TRIGGER on its' SQLite database. Besides, telling the other side what to do is a good opportunity to fuck with its' journal.


Anonymous 05/17/2022 (Tue) 02:30:03 [Preview] No.15049 del
>>15026
>web-based
>>15027
>But what I know they plan to make it open source.

So much for privacy and security. A fucking web honeypot with shitload of JS almost certainly coming from ButtFlare or any other butt storage provider, probably with crucial details going between server and client and, of course, it's centralised so anyone snooping knows your ass was shitposting during the very hour they got the metadata for.


Anonymous 06/28/2022 (Tue) 01:27:14 [Preview] No.15067 del
>What do you think about that?

>in browser
>cuckies

seriously