/tech/ - Technology

Brought to you by archive.org (again)

Boards | Catalog | Bottom

Check to confirm you're not a robot
Drawing x size canvas

Remember to follow the rules

Max file size: 350.00 MB

Max files: 5

Max message length: 4096

(146.23 KB 800x600 DSCN1845.jpg)
Anonymous 02/04/2018 (Sun) 04:40:31 [Preview] No. 12338 [Reply] [Last 50 Posts]
I must say, I enjoy utilizing old operating systems such as Windows 95/98, the lack of bloat and low resource usage really appeals to me.

What would you like to see me install on a 32-bit 64 Megabyte of RAM machine?

Anonymous 02/04/2018 (Sun) 04:50:34 [Preview] No.12339 del
Windows for Workgroups, 3.11.

Anonymous 02/04/2018 (Sun) 04:53:28 [Preview] No.12340 del

PS: Don't forget Trumpet Winsock!

Anonymous 02/04/2018 (Sun) 19:01:29 [Preview] No.12343 del
Freedos with Win3x on top and some cool dos games. Keen, GTA, Dungeon Keeper and Fallout1 should all play fine.

Anonymous 02/06/2018 (Tue) 22:14:43 [Preview] No.12359 del
Any updates op? I would also like to see it run debian potato.

Anonymous 02/06/2018 (Tue) 22:46:42 [Preview] No.12360 del

Redhat Linux 3.0.3

(292.67 KB 450x399 RMS.png)
/tech/ - Technology Anonymous 01/03/2016 (Sun) 17:52:28 [Preview] No. 125 [Reply] [Last 50 Posts]
Welcome to /tech/, a technology board. This board is for discussion of technology, both software and hardware.

Wiki: https://wiki.installgentoo.com/
IRC: #/tech/, #InfinityNow and #endchan on irc.rizon.net - https://qchat.rizon.net/

NSFW files are only allowed if they are spoilered. Tech support, consumer advice and desktop/ricing threads are all allowed for now.

All rules and policies are open for discussion in this thread.

Related boards:
>>>/cyber/ - Cyberpunk & Science Fiction
>>>/lv/ - Libre Vidya
>>>/markov/ - bot hell
>>>/os/ - Online Security
>>>/t/ - Torrents/trackers
Edited last time by ring on 06/14/2017 (Wed) 23:18:55.
280 posts and 64 images omitted.

betamax Board owner 02/04/2018 (Sun) 20:28:15 [Preview] No.12344 del

Anonymous 02/06/2018 (Tue) 08:57:31 [Preview] No.12353 del
(328.19 KB 500x500 TAD.png)

Anonymous 02/06/2018 (Tue) 09:10:35 [Preview] No.12354 del
I would recommend the lower case omega symbol but it kind of looks like an ass.

Anonymous 02/06/2018 (Tue) 21:01:19 [Preview] No.12355 del
Mod, stop this spam, please >>12345

betamax Board owner 02/06/2018 (Tue) 21:26:47 [Preview] No.12356 del
You were beaten by >>12353 sorry m8.

Use the report function.

Locking this thread, going to make another.

USBGuard Anonymous 01/27/2018 (Sat) 23:42:26 [Preview] No. 12301 [Reply] [Last 50 Posts]
Someone pointed this on OpenBSD-misc list, maybe it could help some linux users in here:

Very interesting. Don't know how effective it is to prevent attacks, though.

Anonymous 01/28/2018 (Sun) 06:54:50 [Preview] No.12302 del
Wow, that's pretty great, thanks. This should be standard software on all distros tbh. It would certainly be of great benefit in an office environment.

Anonymous 02/02/2018 (Fri) 04:51:53 [Preview] No.12334 del
What stops an attacker from disguising malicious device as a legit one with ease if it's just a short UUID string that defines a device purpose and identity, not a cryptographically signed public key.
>broken links on a site

(140.84 KB 1024x717 Hard_disk_dismantled.jpg)
How do you store your data/backups? Anonymous 07/20/2017 (Thu) 23:19:37 [Preview] No. 10460 [Reply] [Last 50 Posts]
Hie, I'm trying to find a good solution to never get out of storage on my HDDs, for my backups and my regular use.
What is your data storage solution?
I want, if possible, a solution that is the most freedom compliant.
There is the usb HDDs, 3/4 plugged on a rasp.
There is the NAS with 3.5' HDDs in it.
Maybe a cheap 20$ computer with the HDDs in it with linux installed...

What should be the best? What HDD to buy (there are these backdoors, even though I don't think I can find any without)

Thanks you!
29 posts and 3 images omitted.

Anonymous 01/27/2018 (Sat) 20:03:26 [Preview] No.12298 del
Quick question:
Is there some kind of file system with scalable fault tolerance/precautions?
Lets say i want to store away 500MB on a DVD and i create an image that fills the whole 4.7GB of a DVD with various redundant blocks of that data, surrounded by check sums and whatnot, as much as i like (scalable).
I hope this way it will be more likely that you can read or recover that data after a long time and you have the convenience of a DVD storage.
A nice tool for easy reading/recovering would be helpful.

EMP thoughts:
Even if you had a box with 2m thick lead walls isolating your machine, if a cable for eg. power supply goes into that box, your machine might not be EMP save.

Anonymous 01/27/2018 (Sat) 20:42:36 [Preview] No.12299 del
You are confused. There's three questions on your reply: filesystems, DVD and EMP safety
>file system with scalable fault tolerance/precautions
>A nice tool for easy reading/recovering would be helpful.
I don't know, but optical storage has only one advantage today, that is, you don't need to trust the micro-controler firmware.
>if a cable for eg. power supply goes into that box, your machine might not be EMP save.
Wrong. The EMP would just stop the conduction of the electrons through the cable temporarily, not destroy the hadware itself (unless it's a pulse so high that the copper goes to melting point). Also, you don't need lead walls, unless you want radioactivity protection. A simple aluminium faraday cage would do the job just as well.

For backup I would say: if it's offline, do a RAID setup. If it's online, use Tahoe-LAFS and distribute the HDD's on different places.

Anonymous 01/29/2018 (Mon) 16:38:45 [Preview] No.12310 del
From what I understand most electronics are vulnerable to electromagnetic pulses. However they have to be hooked up to the grid and/or have battery power to be vulnerable and/or have some kind of active Wifi signal to be vulnerable.

Faraday cages are safe as long as the electonics are NOT hooked up/powered on in any way and are properly sealed within the conductive material so they are not physically touching their conductive surrounding. For example, if you were to Faraday cage a basic cell phone, you would need to remove the batteries from it and then wrap it up with a plastic bag or inside a little cardboard box and then put that into a conductive surrounding (such as an old trash can) and making sure the lid is closed tightly so that no RF/Wifi signal can interfere with that electronic device. Then you have properly faraday'd it.

If the electronic is old and has no battery, no wifi, and is not hooked up to the grid at all it should be safe even if it is not faraday caged. I can't see how an EMP would effect it if its completely off-grid and not activated. (IF I HAPPEN TO BE WRONG ABOUT THAT, CORRECT ME PLEASE!)

Anonymous 02/01/2018 (Thu) 08:51:55 [Preview] No.12331 del
My solution is to avoid having lots of data to worry about. I can pretty much fit everything on a 500 GB USB/portable hard disk. I recently bought another such disk since my backup drive is from 2009, so I'm going to copy all files to new drive. I also backup the most critical things onto CDR. These CDs are marked by date, so it functions like a historical archive.

Anonymous 02/01/2018 (Thu) 09:18:00 [Preview] No.12332 del
You don't need any special filesystem. Use PAR2 to create the redundant data.
By default, it only creates 5% redundancy, but you can set it to 100% if you have room.
If you use this in conjunction with bzip2 and small block sizes, you should be able to recover from almost any error. Or just avoid compression altogether, if you have the room. Of course, many files like images and videos are already compressed, so can't do much about that short of dealing only with lossless formats (I mean the originals, not by stupidly converting MP3 to FLAC or whatever).

(456.73 KB 853x480 1.png)
Realtime chinese surveillance system Anonymous 09/25/2017 (Mon) 18:06:25 [Preview] No. 11291 [Reply] [Last 50 Posts]
Scary shit:

Remember to protect your privacy. Or, you can just keep listening to your Hardvapour/Fashvapour while everyone looses it's mind and... wait, what reality really is? You postmodernist degenerate fuck.
9 posts and 2 images omitted.

Anonymous 10/01/2017 (Sun) 23:42:46 [Preview] No. 11444 del

I saw the video featuring this pic (I don't remember when it's from). But it's not that serious.
You should be 2 hundreds time more concerned about US/Europe surveillance than China. Because China is doing the same mistake than communism: brute-force the problem.
Western system is far better engineered: they want to destroy the "questionable" content directly in your head. They want to create an anarchic bubble of chaotic information, so complicated that the common with little time can't detached the truth from the false. Moreover, they're stopping you to do effective research, by enclosing your view into a bubble as I said, who never challenge your believe.
One practical exemple, if you discovered the MK Ultra program, and other "complotist" thesis, you'll be direct to bullshit complotist theory, like Flat earth, or alien life (or other bullshit injected in the chaos of information). You'll be shamed by medias, even your families, see that there is no consequence to your act, so you'll drop the thing by yourself, or enclose you in ignorance (or view through the problem, but it takes time and books).
That's a far better system, because you don't know what is the problem. In China, everything that is banned is the problem. And at least, you know there is something wrong. Here, the mass, even though they have the feeling there is a lot of bullshit, don't even have the imagination or even just time/capabilities (the bubble) to swim in the anarchic internet infos.

Who cares about camera recognition in China. It's already here. And it's pretty irrelevant. The analysis of your whole internet history, will tell pretty accurately where you're heading. You search on your local train website to make itinerary? You search about vacation places? You have your phone on you?
These infos are available since a shit tone of time. Palantir (in-q-tel funded) process them.

I mean, it's like you never encountered /tech/nologies or got interested in modern surveillance.

Anonymous 10/01/2017 (Sun) 23:55:06 [Preview] No. 11445 del
You make AI image pattern recognition stronger every time you solve captcha. This is just the tip of the iceberg. Try mind reading and silent sound weaponry.

Mind encryption now (or this is the end).

Anonymous 10/02/2017 (Mon) 17:39:58 [Preview] No. 11479 del
>look guys here I am, going through the city with IR blasters on my face blinding all those cameras all day, totally not suspicious rite
>what are those handcuffs for, officer?
>awww shit don't beat me I'm not a terrorist aah ah

Anonymous 01/31/2018 (Wed) 06:54:31 [Preview] No.12324 del
>Sesame credits for everyone
>National blockade firewall
>Chinese IDF everywhere
>Shittiest Malware Ads
Feels good being in Hong Kong. That shit sucks.

Anonymous 02/01/2018 (Thu) 08:34:59 [Preview] No.12330 del
That doesn't work with me, since I am an anarchist (and I don't mean any political party by that name, I just value true individuality above all else). Their bullshit propaganda stands out, without even thinking about it. The patterns are pretty obvious: they try to set down "rules" to play by, try to make you think or behave in certain ways. They use the same shitty emotional tactics as in public schools to get people to conform. If you don't know wtf I'm talking about, then watch some of the videos or read the books by John Taylor Gatto.

(80.99 KB 824x464 fsb_dpi.png)
Russian government doing deep packet inspection Anonymous 01/28/2018 (Sun) 20:59:07 [Preview] No. 12304 [Reply] [Last 50 Posts]
Thought it would be worth sharing: a document from WikiLeaks explaining the tatics Russian Federal Security Service (FSB) is using to get intel. This is not new, but there's some information on how they operate (assuming WikiLeaks is trustworthy):
>Russian subscribers of mobile operators [...] expose valuable metadata, including phone and message records, device identifiers (IMEI, MAC addresses), network identifiers (IP addresses), cell tower information and much more.
>The Traffic Data Mart is a system that records and monitors IP traffic for all mobile devices registered with the operator. [...] identified by IMEI/TAC, brand, model
>National stacks of DPI / BigData / DataMining technologies and solutions for collection and analysis of information, as well as means of predicting social and business trends - the key to digital and financial sovereignty of the state and business in the XXI century


Anonymous 01/29/2018 (Mon) 16:22:40 [Preview] No.12309 del
>assuming WikiLeaks is trustworthy

only if it applies to Russian leaks I presume, right?

Anonymous 01/29/2018 (Mon) 23:06:46 [Preview] No.12314 del
SORM, what it does and general situation with surveillance/censorship in Russia is no longer secret for anons and these documents might be true, haven't checked them yet.
However, there are more than one company developing DPI and monitoring solutions in Russia, some of them publish corporate blogs, and even one of such devices got into hands of habrahabr user, revealing poor quality of your average subcontractor who usually hires a CS student for food and launders 1,5 million dollars for his work:
City transport companies buy data off mobile operators to plan their routes, Yandex owns all big city taxis and is the sole provider for official bus/metro/commute train navigation apps. The fun thing, you can find all this info on habrahabr, both in corporate blogs and ordinary IT guy's blogs busting these apps shitty security and excessive datamining.
Another example, cities like Moscow have a centralized network of surveillance cameras, on roads, in apartment buildings and streets, in metro, every train and bus. It is also known that they use automatic face and walking posture recognition already for APBs. There is a website anyone can visit, register with their state ID and start snooping on people in real time.
Biggest russian "anonymous" imageboard 2ch handed itself to Mail.ru corporation in late 2016. It's pretty damn /cyber/ life here in Russia, more soykaf than schway though.
Not all network operators implement SORM properly, and sometimes it doesn't work. But most of them are bought out by state corporation Rostelecom. Mobile network operators are the worst since they clearly break the "net neutrality" principle and don't try to hide it. Limited data plans since lat year, "social networking" data plans and so on, traffic throttling aka QoS, DPI and http request filtering are in common knowledge and people are trying to bypass them. For example, simple shadowsocks is throttled by Yota operator, but when you add obfuscation and spoof headers as "vk.com", the speed goes back to advertised.
Source, this thread:

Anonymous 01/30/2018 (Tue) 01:07:44 [Preview] No.12319 del
Thanks for your anecdote, fellow anon.
Have you guys tested this thing? Here:

How does Tor work in russia? Only through bridges? Is VPN traffic normal or they reduce the speed too? Maybe tunneling TCP traffic to UDP could work, see here:

Also, have anyone thought about doing a meshnet in Moscow? Like the Freifunk project, but using B.A.T.M.A.N, or simply connecting with Briar Project through Bluetooth:

Check also the other links here:

Anonymous 01/30/2018 (Tue) 03:38:20 [Preview] No.12321 del
Not really. Assange is getting more and more on in politics, I wouldn't be choked if he is now a government contractor.
Now, of course, Wikileaks is more than Assange. But I do think they use it as a weapon (governments "leaking" information purposefully, to affect economic tradings or whatever).

The people at Cryptome seem more radical, at the point that I see it as very difficult that they got corrupted by the "system power", as they would say.

Let's not forget that both Assange and Young (from Cryptome) used to be cypherpunks. And, for those who don't know, the cypherpunks was basically the most important mailing list for privacy and security computing. From there, they released PGP, the EFF, Tor and stopped multiple attempts from NSA (such as the backdoors on VPNs and the "clipper chip").

Anonymous 01/29/2018 (Mon) 15:43:04 [Preview] No. 12307 [Reply] [Last 50 Posts]
/tech/ is this good or bad news? What will this mean and how would this effect us?

White House Is Planning To Nationalize 5G Network


In a stunning - if accurate - report published Sunday night, Axios claims that White House national security officials are considering an unprecedented federal takeover of a portion of the nation’s mobile spectrum/network to protect against Chinese attacks, in what may well be a pre-emptive shot, hinting at upcoming trade wars between the two superpowers.

Axios got its hands on PowerPoint deck and a memo, both of which were purportedly produced by a senior National Security Council official, which were presented to other senior officials at other agencies during a recent meeting. The documents argue that America needs a centralized nationwide 5G network within three years. There'll be a fierce debate inside the Trump administration, and an outcry from the industry over the next 6-8 months over how such a network is going to be built and paid for.


Anonymous 01/29/2018 (Mon) 15:45:51 [Preview] No.12308 del
I still use a wired modem, hope that I won't be needing to use this shit just to go online anytime soon.

Anonymous 01/29/2018 (Mon) 23:09:54 [Preview] No.12315 del
5G nationalized ISP
4 Unit rack
3 letter agency
2 party system
and your segfaulting code in C

Anonymous 01/29/2018 (Mon) 23:12:06 [Preview] No.12316 del
on the 6th day of parole, i got from my ISP:

Anonymous 01/30/2018 (Tue) 00:50:42 [Preview] No.12318 del
If it's true, that's probably a retaliation against AT&T and Verizon monopoly.
It's not as they don't already see everything, but now they can have all mobile data for them, without asking (again, if it's true).
Imagine not having to ask Akamai, Google and Amazon for data. Imagine they doing traffic shaping all they want, with no limits.

They will probably use the "action i favor of net neutrality and the good of the people" argument next months... we will see.

Proxy daemons? Anonymous 01/26/2018 (Fri) 03:37:00 [Preview] No. 12293 [Reply] [Last 50 Posts]
Looking to setup a socks4/5 proxy for testing and experimentation. Looking to see if anyone has any preferences or recommendations.

This will be for a low user count (2-3), private setup. I don't mind dropping in some enterprise level monster meant for handling T-carrier levels of activity, but I ain't gonna be stressing it anywhere like that.

Current choices boiled down to dante or haproxy. I'm still open to suggestions.

OS: Debian Stretch.

What I'm not looking for: ssh tunneling, iptables forwarding. Yes, I can do either as a quick and simple fix. No, I'm not interested.

Anonymous 01/27/2018 (Sat) 13:10:45 [Preview] No.12296 del
Maybe WireGuard. They have SOCKS5 proxies... but I don't know if they will be suitable for what you want to do.

Anonymous 01/27/2018 (Sat) 15:40:37 [Preview] No.12297 del
>Makum wit VPN shenanigans!

Looking into it, WireGuard fits the bill with socks/5 integration. The other features are interesting, although I wasn't looking to offer VPN services. This does tempt me with ideas for a future project though. Maybe, I can put one of my idling cloud hosts to better use? Something to look into.

The current setup is a Debian Squid3 proxy/various other services/firewall/gateway. The immediate problem is certain peers bitching at me about being forced to use browser based webmail, instead of Outlook/Thunderbird. I can allow them to punch through the firewall, but this is an opportunity to dive into the world of socks proxying. Aside from Imap access, pairing them with a socks proxy will give me a more consistent and controllable setup for what I see coming down the road.

Another aside, Squid apparently does socks on an experimental basis with recompiling. Not interested.

Anonymous 01/29/2018 (Mon) 18:52:19 [Preview] No.12311 del
In case anyone was interested, Dante was the winner. It required no additional dependencies beyond what was already installed.

As far as I'm concerned this may as well now be a proxy general thread. Off topic commentary welcome.

Next Generation of spyPhone Cameras, Worse Than Your Nightmares, But REAL Anonymous 01/25/2018 (Thu) 16:00:02 [Preview] No. 12284 [Reply] [Last 50 Posts]
This is an article posted on /news/ but this is a tech-related article and its the SCARIEST FUCKING SHIT EVER!


1. New iPhone cameras will be see through fog, walls, anything covering them up.
2. Users will be able to take pictures of your naked body, they can see through clothing too! No matter what your age, who you are, whether you approve or not.
3. Users could spy through bathroom walls. Spy through their neighbors' apartments. This can be used for blackmail too, no doubt. ABSOLUTE DEATH OF PRIVACY.
3 posts omitted.

Anonymous 01/25/2018 (Thu) 16:45:51 [Preview] No.12288 del
Realistically speaking, that's fucking impractical, they don't need to use a goddamn iPhone to do that.

Anonymous 01/25/2018 (Thu) 16:48:09 [Preview] No.12289 del
Oh we all know the military is at least 20 years advanced than what is slowly released out to the public. So yah, intelligence agencies likely have been using this for a while.

That's hard to believe a group of hackers have access to a military satellite, but I bet a State-actor could do such a thing.

Anonymous 01/26/2018 (Fri) 01:40:45 [Preview] No.12290 del
(1.45 MB 255x192 faggot.gif)
>quantum imaging technologies
Are you kidding me?
Stop spreading this clickbait shit here.
>little time to fully develop
There's not even a start to it. We (humanity) know nothing about this thing.
Speculation only.
<<original article from alphr
<<not even linking to original source
>Lytro camera
>Light L16
These cameras have absolutely nothing to do with this. They just use stack focus techniques, they don't see "through walls" using it.
>work at wavelengths of light
>take photos through fog or thick falling snow.
Nope. Not exactly. Infra-red could only allow thermal imaging, not to look thourgh it, because of Tyndall effect. So, we could see if a animal is there, but not "through fog".
>article linked
>"image is accurately reconstructed through the light fluctuations measured by a single-pixel detector"

Message too long. Click here to view full text.

Anonymous 01/26/2018 (Fri) 02:00:18 [Preview] No.12292 del
pcauthority.com.au is not clickbait

military has had this tech for years

Anonymous Board owner 01/26/2018 (Fri) 05:46:00 [Preview] No.12294 del
>a animal
>he didn't use the report function

The tech described in the original article https://theconversation.com/the-next-generation-of-cameras-might-see-behind-walls-90258 is nothing new, just sensationalized, while your mistaken interpretation cannot be extracted from the article you've posted which is a copy paste job of another article that also copy and pasted another article. Everything you've said is based on a misunderstanding of the actual use of the technology used. If you just copy pasted the actual contents of the article, I probably wouldn't lock this thread because you have some problems understanding it and had failed to give out a real breakdown, replaced "smartphones" with iPhone (but it's about camera tech, not next gen smartphones) and the stupid clothing remover nonsense while your third point is partially true but it's absolutely not at the level as you've described. I'm locking this thread as a reminder for you to spend some time to digest and think about what you're sharing. This isn't really newsworthy. Make a bad OP again and I'll just delete that thread since I know you use a VPN. Don't be so disrespectful to our users' input. If you have any honor, please don't act so dishonorable.

Anyone following the Intel vulnerability? Anonymous 01/05/2018 (Fri) 00:57:21 [Preview] No. 12159 [Reply] [Last 50 Posts]
The "Meltdown" and "Spectre" thing. Here:

Does it have any connection with the Sandsifter research?
22 posts and 6 images omitted.

Anonymous 01/23/2018 (Tue) 03:04:40 [Preview] No.12270 del
>Me is on a separate CPU
From what I know it's just microcode running minix, there's no physical separation.

You should not trust a random anon. It's most probably fake, although it's true that most of the hardware today is backdoored. I personally think Meltdown is a backdoor. I imagine how many others is there, looking to be discovered and being used now to crack into China/Russia billionary transactions and watch Putin drinking a good vodka with NK military agents.

>your computer is your enemy
It's not. People are the enemy, not a machine.

You forgot to add that internet itself is also fucked. The billions the spend on submarine cables now companies owned by CenturyLink, Verizon, GCX and Zayo Group is not free from charges. IBM, DXC (HP) and Atos Origin are doing deep packet inspection on all connections these days.
Amazon, Akamai and Alphabet owns the first level interation (where the information is extracted) and then it's analysed by the companies above.

It's sad the capacity humans have to destroy beautiful things.

Anonymous 01/23/2018 (Tue) 18:42:38 [Preview] No.12271 del
If that turns image out to be true, I will get my ribs removed and suck my won dick.

Although Linus makes a good point here, something is very off here, they either aren't coming clean that this is worse than they make out or this is actually a huge fucking backdoor.

Anonymous 01/23/2018 (Tue) 18:47:20 [Preview] No.12272 del
We knew that Intel imbedded 3G in their processors since 2011. Any computer you use that has been manufactures post 2011 has built-in WiFi (which you CANNOT takeout) and cannot be air-gapped properly. This was mandated by the govt, supposedly, because they did not want "criminals" air-gapping their systems.

Anonymous 01/23/2018 (Tue) 19:01:30 [Preview] No.12273 del
(60.73 KB 630x473 WE WATCH YOU.jpg)
>It's not. People are the enemy, not a machine.

True. But these evil creeps have compromised the machines we use and therefore we are stuck with enemy-compromised machinery (unless we build our own from scratch).

That said, yes the whole internet is completely unsecure. To simply air-gap a computer now you need to still be using a computer tower built from the '90s with a physical modem and ethernet connection. You need to physically remove (or cover up) cameras and microphones that are built-in. You should always be using a private encrypted VPN service, with browser safety features like spoofing the browser agent string with blender, using noscript to block third parties, routinely wiping out browser history/cookies (now all stored in sqlite db), HTTPS only, disabling all the other unsecure chrome features in about:config and so an and so forth... disc encryption to forward secrecy.

This is the only way we can defeat this today unless we can build our own machines, and then obfuscate / encrypt the communications which would take a lot of tech savvy work, time and money.

If you use a newer machine, anything new, expect to be compromised right off the bat.

Anonymous 01/24/2018 (Wed) 02:15:50 [Preview] No.12276 del
>Intel imbedded 3G in their processors since 2011
No, they don't. The AMT and vPRO system documents says it can only *access* the 3G device, it does not have an receptor inside the processor, at least from what I know there's proof of it. Also, the IHS is made of cooper, they would not be able to receive the signal as a normal smartphone does.
tl;dr citation needed. You're not in 8ch to spread these false news fearmongering here.

>other unsecure chrome features
Are you kidding, right? I hope so.
Also, if your browser has support to javascript you're already fucked.
>private encrypted VPN service
You mean your own VPN using OpenIKED on a secure server, right? If you don't control the VPN, then it's not private.
>routinely wiping out browser history/cookies
You should not have those too.
>HTTPS only
Not needed for sites you only do GET requests, if you're already using IPsec and DNScrypt or Tor (with TorDNS enabled).
>disc encryption to forward secrecy

Message too long. Click here to view full text.