ricing general Anonymous 03/12/2018 (Mon) 04:52:41 [Preview] No. 12459 [Reply] [Last 50 Posts]
I want to start using i3-gaps instead of i3. Anyone try i3-gaps? Thinking about using an alternative to dmenu. Wanna jazz it the fuck up but keep it simple without the bells and whistles.

Pic semi-related. Not my cup of tea but an example of alternative icons.
https://www.reddit.com/r/unixporn/ is a great place to find dotfiles and workflows. ignore the laptop sticker cancer.
7 posts and 1 image omitted.

ricer fuckup 03/15/2018 (Thu) 11:19:48 [Preview] No.12483 del
(513.81 KB 4000x2250 IMG_20180315_053200(1).jpg)
Fuck. I riced to hard guys... no clue which tweak actually did this... working fine now... fuck! Guess I just try to figure out what part of my system is unstable by guessing randomly after th next few crashes. The stop code is Fucking unlisted... also does anyone have a fix for oldNewExplorer not actually updating windows explorer? It up dated the first element and then all the controls quit working. Now even reinstalling it is giving now results. Also, how how likely is it that messing with adding a PATH system variable to MPV's container might have caused that BSoD?

Anonymous 03/15/2018 (Thu) 13:01:53 [Preview] No.12485 del
Thank you for that link. I was wondering why I was seeing so many i3 rices and not i3-gaps. That makes sense the github username is airblader the guy seems edgy. But i have been looking at lightweight window managers and on the 2bwm readme they have a neat little chart of the lightest wm's https://github.com/venam/2bwm. Apparently http://hack.org/mc/hacks/mcwm/ is the lightest on RAM.

I Didn't see that rizonrice link in the installgentoo wiki page on ricing which is all I known of. Unfortunatly /r/unixporn is more up to date than the wiki. But I understand the animosity all of this is vanity.

Anonymous 03/16/2018 (Fri) 08:16:49 [Preview] No.12486 del
Everything's your fault.

Practicality trumps minimal setup. End/tech/ has no affiliation with any of the links posted here.

Anonymous 03/16/2018 (Fri) 12:37:26 [Preview] No.12488 del
I never denied that. ...but i was hoping someone could shed some light on where I most likely fucked up

Anonymous 03/19/2018 (Mon) 22:16:57 [Preview] No.12500 del
i3-gaps, practically the same of i3 except for the... gaps.
The .config is totally compatible.
I've got a nice setup before I get bored of it, now I'm trying awesome wm and I've to say that's very good. If you know lua and if you know C you basically already know it you can do everything. Literally.

(69.66 KB 500x500 email.jpg)
What kid of email do you use? Anonymous 03/09/2018 (Fri) 17:49:28 [Preview] No. 12455 [Reply] [Last 50 Posts]
Hey /tech/,
What kind of email do you use? I've that a lot of anons on technology boards use protonmail, but I've also heard that it's not secure. Any alternatives?
7 posts omitted.

Anonymous 03/13/2018 (Tue) 23:25:01 [Preview] No.12478 del
Considering how many users this board has that's pretty much a raid.

Anonymous 03/16/2018 (Fri) 21:58:05 [Preview] No.12489 del
I pay for Startmail.com. They gave me an early adopter's discount for the second year of service that was nice. I'm in college still so I basically never use that email. I don't like where Ixquick is taking the Startpage service though so I'm considering dropping them.

Anonymous 03/17/2018 (Sat) 16:24:17 [Preview] No.12490 del
(47.49 KB 390x500 antispam21.jpg)
(53.00 KB 303x400 antispam22.jpg)
(57.09 KB 450x740 antispam23.jpg)
(86.67 KB 400x654 antispam24.jpg)
(408.04 KB 635x892 antispam25.jpg)

Anonymous 03/18/2018 (Sun) 01:48:59 [Preview] No.12491 del
Why are you spamming here?

Anonymous 03/19/2018 (Mon) 21:42:32 [Preview] No.12499 del
Is cock.li really all that good. Most people I've seen just use it for throwaways, is it really any good beyond that?

Anonymous 07/09/2017 (Sun) 20:30:39 [Preview] No.9132 del
For what it's worth, there used to be some spam right before that post.

Anonymous 07/09/2017 (Sun) 20:31:31 [Preview] No.9137 del

You samefagging piece of shit.

Anonymous 07/13/2017 (Thu) 16:36:41 [Preview] No. 10371 del

Anonymous 09/03/2017 (Sun) 18:59:34 [Preview] No. 11017 del
Fuck off with your advertising and samefagging, cocksucker.

Test GT HolaBromz 03/19/2018 (Mon) 17:39:06 [Preview] No.12498 del

MOZILLA SELLS OUT! Anonymous 08/16/2017 (Wed) 00:02:50 [Preview] No. 10727 [Reply] [Last 50 Posts]
Mozilla To Build New Browsers That Conform To Internet Censorship


In November of 1737, decades before America officially declared its independence from the king of England, a young Benjamin Franklin published an essay in The Pennsylvania Gazette entitled, “On Freedom of Speech and the Press.” In it, Franklin wrote, “Freedom of speech is a principal pillar of a free government; when this support is taken away, the Constitution of a free society is dissolved, and tyranny is erected on its ruins.” Franklin went on to write, “An evil magistrate entrusted with power to punish for words, would be armed with a weapon the most destructive and terrible.”

Although this was written in an article published more than two and a half centuries ago, Franklin’s words are quite possibly more relevant today than they ever have been. Indeed, there is an ongoing effort by the progressive left and extremists such as George Soros to silence speech that doesn’t align with the liberal agenda. This effort to effectively gut the First Amendment is taking place virtually everywhere you look, from the mainstream media, to Hollywood, to college campuses, and perhaps most frequently, across the Internet.

Recently, the popular Internet web browser Mozilla Firefox announced that it plans on joining the fight against what it considers to be “fake news,” a term that to leftists means nothing more than news that is written by conservatives. Mozilla said that it was “investing in people, programs and projects” in an effort to “disrupt misinformation online.”

The first question that every constitutionalist and liberty-loving American should be asking is as follows: How does Mozilla define “fake news?” Are they only talking about suppressing radical websites such as sites run by white supremacists, or are they talking about any news that comes from conservatives? At the very least, it should worry you that companies like Mozilla are often reluctant to thoroughly define “fake news” – it is highly unlikely that this is unintentional.

Furthermore, what exactly gives Mozilla the right or the authority to determine what is misinformation and what is not? The United States Constitution is the law of the land, and the freedom of speech is an inalienable right from God. The fact that Mozilla thinks it has sweeping authority to select which speech is censored and which speech is not runs contrary to everything that America was founded upon.

With the assault on independent media getting increasingly aggressive, many Internet bloggers and website owners are desperately looking for ways they can continue voicing their opinions without being harassed, suppressed or silenced. If you are one of these people, you may want to consider using “Brave,” a relatively new web browser founded by former Mozilla CEO Brendan Eich.

On its website, Brave states that its goal is “to transform the online ad ecosystem with micropayments and a new revenue-sharing solution to give users and publishers a better deal, where fast, safe browsing is the path to a brighter future for the open web.”

Message too long. Click here to view full text.

29 posts and 8 images omitted.

Anonymous 08/29/2017 (Tue) 12:32:34 [Preview] No. 10934 del
He's not talking completely out his ass.
They did come back in 2017 though

Anonymous 08/29/2017 (Tue) 19:18:42 [Preview] No. 10936 del
It was in a video about pwn2Own that I heard that, indeed.

Anonymous 03/18/2018 (Sun) 21:24:12 [Preview] No.12496 del
what's the word on waterfox?

Anonymous 03/18/2018 (Sun) 21:24:33 [Preview] No.12497 del
what about waterfox?

Random Thoughts Anonymous 03/05/2018 (Mon) 01:21:31 [Preview] No. 12441 [Reply] [Last 50 Posts]
It's a shame how inactive this board is. It seems only to be that way because there's about three other chans consolidating the userbase. In the interest of promoting activity, I'll try to make this thread a thread about technology related musings I have (not that I'm important or anything) that could hopefully be used as starting points for discussion.
13 posts and 4 images omitted.

Anonymous 03/12/2018 (Mon) 22:34:34 [Preview] No.12472 del
it would be a shame if people hadn't noted the alternative .net.

Anonymous 03/18/2018 (Sun) 04:38:30 [Preview] No.12492 del
So I had this plan. Go into technology as an entrepreneur, innovate, and make bank as well as the future.
I realized that it would not work in the US. Patent trolls accumulated all the ideas and sue anyone who seemingly comes into conflict with them. Only large and established companies like Microsoft and Google can stave them off and get things done.
But you can't work for those companies because not only will you never get into a position of real decision making, but your position will constantly be in danger due to hiring politics and economics. Of course, that's why entrepreneurship is the answer in the first place.

So the only rational choices are to stay put and do nothing, bow to venture capitalists and risk the integrity of your work, or leave for brighter places. I'm leaning toward the last.

Does anyone have an idea of places in the world with burgeoning technology sectors? Besides the usual suspects, and India, that is.

Anonymous 03/18/2018 (Sun) 05:27:51 [Preview] No.12493 del
Seems like a wet dream than a plan. Work for a small company first. You would need some certificates and sometimes you would also need more than that like a degree. Once you've got more hands on experience, then move on to already existing small tech companies or make your own or work alone. If you're going to make something "new" then avoid China, India (still a horrible bureaucracy), US, and all of Europe under the EPO. Japan might be okay, their antitrust laws are sane, but you need to have lots of credentials to get a job there so it's not really worth it. Where's most of the money at? Webdev. Real boring but practical necessity for any company.

Anonymous 03/18/2018 (Sun) 10:04:30 [Preview] No.12494 del
US is a sinking ship. I don't have anything close to a tech degree, and even CS graduates aren't guaranteed a job. There's no way I am getting a job soon, and there's no way I am going to advance in the career in a speedy amount of time, which I feel is necessary; nor would I be advancing in a reasonable amount of time, given the large amount of workforce that is already in the market, vying for promotion.

The US makes it very difficult for the not well-off and not well-connected to advance, and I am both. There's virtually no opportunity for me if I stay here.

I won't discuss my plans I have right now, but I feel like there's a way out for me if I just focus on accumulating enough wealth here first, in whatever way I can, then seek opportunity elsewhere.

Blogpost, sorry. My main point is that only full-grown adults have a shot at successful tech entrepreneurship in the US. Everyone else must wait decades for their chance, or else go where there are less restrictions on their activity and less barrier for entry. I don't think we have that much time left.

Anonymous 03/18/2018 (Sun) 13:13:10 [Preview] No.12495 del
If you are interested; try this out:
with https://github.com/martanne/abduco
It is a tiling window manager for the console.

Google Unveils 72-Qubit Quantum Computer With Low Error Rates Anonymous 03/14/2018 (Wed) 16:53:47 [Preview] No. 12480 [Reply] [Last 50 Posts]
>Google announced a 72-qubit universal quantum computer that promises the same low error rates the company saw in its first 9-qubit quantum computer. Google believes that this quantum computer, called Bristlecone, will be able to bring us to an age of quantum supremacy.

>Ready For Quantum Supremacy

>Google has teased before that it would build a 49-qubit quantum computer to achieve “quantum supremacy.” This achievement would show that quantum computers can perform some well-defined science problems faster than the fastest supercomputers in the world can.

>In a recent announcement, Google said:

> If a quantum processor can be operated with low enough error, it would be able to outperform a classical supercomputer on a well-defined computer science problem, an achievement known as quantum supremacy. These random circuits must be large in both number of qubits as well as computational length (depth).

> Although no one has achieved this goal yet, we calculate quantum supremacy can be comfortably demonstrated with 49 qubits, a circuit depth exceeding 40, and a two-qubit error below 0.5%. We believe the experimental demonstration of a quantum processor outperforming a supercomputer would be a watershed moment for our field, and remains one of our key objectives.

>Not long after Google started talking about its 49-qubit quantum computer, IBM showed that for some specific quantum applications, 56 qubits or more may be needed to prove quantum supremacy. It seems Google wanted to remove all doubt, so now it’s experimenting with a 72-qubit quantum computer.

>Don’t let the numbers fool you, though. Right now, the most powerful supercomputers can simulate only 46 qubits and for every new qubit that needs to be simulated, the memory requirements typically double (although some system-wide efficiency can be gained with new innovations).

>Therefore, in order for us to simulate a 72-qubit quantum computer, we’d need millions of times more RAM (2^(72-46)). We probably won’t be able to use that much RAM in a supercomputer anytime soon, so if Bristlecone will be able to run any algorithm faster than our most powerful supercomputers, then the quantum supremacy era will have arrived.

Message too long. Click here to view full text.

Anonymous 03/14/2018 (Wed) 16:57:28 [Preview] No.12481 del
Can't post archive link because of the retarded flood system, so fill in the blanks if you are interested.

archive (dot) fo (slash) iOzNq

(42.55 KB 682x394 hp_botnet_edited.png)
HP Botnet Anonymous 02/26/2018 (Mon) 07:24:17 [Preview] No. 12425 [Reply] [Last 50 Posts]
The amount of analysis a fucking printer company is doing is rather disturbing.
1 post and 1 image omitted.

Anonymous 02/27/2018 (Tue) 09:46:17 [Preview] No.12430 del
>job at HebrewPrinting
Notice the 'Imaging and Printing' positions are in shit locations. Fits the job well.
Only if networked, anon.
Open the printer and fix it.
Or build your own libre printer
It should fit 11w sheets so both 8x11 and 11x17 can be printed

Anonymous 02/27/2018 (Tue) 09:49:20 [Preview] No.12431 del
>usage stats
Be sure to "correct" your usage, anon.

Anonymous 03/01/2018 (Thu) 21:53:46 [Preview] No.12436 del
Also during 2018-2019 massive computer security breaches are expected -more cataclysmic than previously (from forecasts a decade in advance based on tech trends). I suspect it will be due to broken AES. NIST are opening up to PQC already which is a portent of a cryptographic SHTF scenario.
We've already seen indications of these breaches with Meltdown, Spectre, and Wifi in 2017. I'm cutting out those odd accounts hardly/never used that could possibly be part of a leveraged attack on main accounts.
Cloud data users are set to get rained on, hard.

>Open the printer and fix it.
Printers also doxx you on the printout (with the infamous yellow dots on color printers for example). There is also reason to believe there are fingerprinting methods used in monochrome printers. Such devices are a double-ended botnet.

Anonymous 03/14/2018 (Wed) 17:35:20 [Preview] No.12482 del
Just audit the documents and hand type them to airgapped and TEMPEST resistant computers. This is how they do it in nuclear reactors, and presumably at CIA offices with high(est) clearance requirement.

Anonymous 03/15/2018 (Thu) 12:47:11 [Preview] No.12484 del
Well they named the company after HP Lovecraft so analyze that. If you install kubuntu on an HP machine a dream watchdog daemon initializes. And there is no htop for your mind.

Is Signal a threat to Free Software? Anonymous 07/09/2017 (Sun) 19:49:01 [Preview] No. 8917 [Reply] [Last 50 Posts]

My opinion: the guy from LibreSignal was using the Signal servers, consuming their energy, and using their marketing. This is not right.
About the Signal requirement to have google shit, it's very unfortunate. Though, people should just use other thing and stop all this buzz.
16 posts and 1 image omitted.

Anonymous 08/08/2017 (Tue) 11:30:01 [Preview] No. 10602 del
They keep adevertising that end to end encryption but there's like one client that has it and that's the web/electron based on. The rest are useless, and as someone already mentioned in this thread it's not really federated at the moment.

Anonymous 08/08/2017 (Tue) 13:36:31 [Preview] No. 10604 del
>the problem with tox is that anonymity was just an after thought
You're right on that. Tox was initiated on /g/ shortly after Snowden disclosures. It was made to be foss, distributed (so no servers are used) and provide strong encryption but anonymity hadn't been thought. It was added sometime after the project begun though. https://github.com/irungentoo/toxcore/blob/522f90fee138087db660dccc08413c53f388f604/docs/Prevent_Tracking.txt

Anonymous 03/07/2018 (Wed) 03:34:07 [Preview] No.12449 del
Signal is used by the same companies that were part of the PRISM program.

I won't be touching it. Smells funny.

Anonymous 03/07/2018 (Wed) 03:36:55 [Preview] No.12450 del

Just as dumb. Anyone who would name their messenger/protocol RIOT is an idiot. Like the little shit who built a javascript encryption thing and named it Felony.

Anonymous 03/14/2018 (Wed) 16:42:24 [Preview] No.12479 del
Just communicate by vibrating air particles. This is also known as talking face to face. Features include:
-Absolutely no botnet
-Safe from CIAniggers (unless you talk to a CIAnigger)
-Audited and mathematically proven
-Messages are scrubbed the moment they are delivered
-Best security ever

And optional benefits:
-Satisfying the natural, human exposure quota

OPSEC Endwall 08/23/2016 (Tue) 01:08:39 [Preview] No. 357 [Reply] [Last 50 Posts]
Discuss best practices for operational security.
6 posts omitted.

Anonymous 08/26/2016 (Fri) 12:05:12 [Preview] No. 419 del
That's why every sane program on Linux drops root privileges after binding to wanted network interfaces and such.

Local attacker could just download wanted code or use scripting. And I doubt tools attacker would want to bring is X11 apps.

Anonymous 08/26/2016 (Fri) 12:11:06 [Preview] No. 420 del
iptables is great.

There is "owner" module that allows controlling OUTPUT traffic on per user or per group basis. And if you use separate users for every service running just like you should, you can control every service with iptables. For example permit traffic going to internet for tor daemon user and permit only localhost traffic for everything else.

Tails already uses similar iptables setup.

Anonymous 12/24/2017 (Sun) 15:09:42 [Preview] No.1090 del
What about having a fileserver to share anonymously? Like an open directory. How to do this?

Anonymous 02/15/2018 (Thu) 04:33:27 [Preview] No.1128 del
FTP has a default "anon" account, add to that no logging, some hardening, and messing with file and folder permissions, and you're good to go.

Endwall 03/14/2018 (Wed) 05:50:35 [Preview] No.1163 del
Start thinking about older hardware and compartmentalization of different tasks onto different hardware units. If you're doing something that doesn't need speed (writing and sending email, text browsing, low impact web/mail servers) use older hardware, if it needs speed (rendering, gaming, 1080p streaming video, number crunching,) then use something modern but only for that task (and for nothing else).

Also assume that you're being keylogged if you're connected to the internet on a modern operating system (including linux and bsd) on a modern hardware machine (Anything >2005). Just operate as if that is true and weigh the implications of your typing and mouse clicks accordingly in your actions online and "Offline".

Also get an airgap for anything that you wouldn't want to share publicly with your boss, spouse, grandmother, neigbour or law enforcement. Make sure you do volume encryption or full disk encryption if you have sensitive data on the airgap. I consider personal financial information ( like taxes, income, planning, purchases, etc) to be in this category that requires an airgap. Anything to do with planning, inventory or income sources ( what books you have in your personal library, how many "things you own", un-booked travel plans etc...), part time revenue etc, stock picking and purchasing plans, business plans, business ideas etc. Do all of that on an airgap. Mainly I'm thinking of personal spreadsheets, and personal text documents, digital photography and personal digital collections (music, pictures, videos, pdfs, etc). Also be sparing in what you share about this information in conversation with other people. Stick to the weather and sports teams.

Also start thinking about low tech ( pen and pad, mechanical typewriters, rotary dial telephones, mechanical locks) to confound some of the more obvious possible entry points for government or criminal hackers to peer into your residence. Keep your blinds up in your study and maybe tinfoil the windows in your 'study'. Also no cellphones. No smart phones. No Alexea, No Siri, No Google Home, no remote home security (don't be a retard). Buy books and things second hand and try to pay in cash (second hand book stores and electronic recyclers).

Making small todo lists should go in a non online hand writen journal, if its sensitive,then put the journal book in a fireproof mechanical safe inside your study, and shred/burn the contents when it is no longer required to keep track of the information. Low tech can beat high tech in the spy game. You loose convienience but you'll gain personal privacy. Just some ideas, feel free to contribute.

Online Security News Endwall 07/07/2016 (Thu) 06:09:23 [Preview] No. 149 [Reply] [Last 50 Posts]
See a news article or CVE bug report on an emerging computer security issue and want to share it? Post below.

I will also post links to Hak5 Threatwire videos.
Edited last time by Endwall on 07/07/2016 (Thu) 16:22:47.
479 posts and 3 images omitted.

Endwall 02/24/2018 (Sat) 00:56:07 [Preview] No.1142 del
Computer Science > Cryptography and Security
Title: ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields
Authors: Mordechai Guri, Boris Zadov, Andrey Daidakulov, Yuval Elovici (Submitted on 8 Feb 2018)

Abstract: Air-gapped computers are computers which are kept isolated from the Internet, because they store and process sensitive information. When highly sensitive data is involved, an air-gapped computer might also be kept secluded in a Faraday cage. The Faraday cage prevents the leakage of electromagnetic signals emanating from various computer parts, which may be picked up by an eavesdropping adversary remotely. The air-gap separation, coupled with the Faraday shield, provides a high level of isolation, preventing the potential leakage of sensitive data from the system. In this paper, we show how attackers can bypass Faraday cages and air-gaps in order to leak data from highly secure computers. Our method is based on an exploitation of the magnetic field generated by the computer CPU. Unlike electromagnetic radiation (EMR), low frequency magnetic radiation propagates though the air, penetrating metal shielding such as Faraday cages (e.g., compass still works inside Faraday cages). We introduce a malware code-named ODINI that can control the low frequency magnetic fields emitted from the infected computer by regulating the load of the CPU cores. Arbitrary data can be modulated and transmitted on top of the magnetic emission and received by a magnetic receiver (bug) placed nearby. We provide technical background and examine the characteristics of the magnetic fields. We implement a malware prototype and discuss the design


full paper

Endwall 02/24/2018 (Sat) 01:18:49 [Preview] No.1143 del
Jupiter Broadcasting
The Return of Spectre | TechSNAP 357
Posted on: February 22, 2018

New variants, bad patches, busted microcode & devastated performance. It’s a TechSNAP Meltdown & Spectre check up. Plus Tesla gets hit by Monero Cryptojacking & a dating site that matches people based on their bad passwords…. So we gave it a go!

https://youtube.com/watch?v=yZwpwW6WLQg [Embed]

show links

Message too long. Click here to view full text.

Endwall 03/06/2018 (Tue) 05:06:33 [Preview] No.1153 del
Hak 5
Half a Billion! Pwned Passwords V2 Released- Threat Wire
Posted: Feb 27 2018 Duration: 9:40
https://youtube.com/watch?v=CmnMbq3hDu0 [Embed]

AMD Ryzen and EPYC security Endwall 03/14/2018 (Wed) 01:59:50 [Preview] No.1161 del
AMD's Ryzen, Epyc security co-processor and chipset have major flaws, researchers claim It's unknown whether the potential attacks on AMD's Ryzen, with names like Ryzenfall, Masterkey, and Fallout, will prove to be significant.

Researchers say they’ve discovered serious potential vulnerabilities within AMD’s Ryzen and Epyc chip architectures. AMD said it’s taking the reports seriously, though it wasn’t provided sufficient time to investigate or confirm them before their disclosure. CTS-Labs, a security research company which says it specializes in vulnerabilities within ASICs and other chips, has said it’s discovered four potential attacks, code-named Masterkey, Ryzenfall, Fallout, and Chimera. All would require a program running with local access and administrator privileges to exploit them. AMD confirmed it’s been made aware of the potential vulnerabilities. However, the statement AMD provided to PCWorld implied that the company wasn’t given the usual amount of time to investigate the vulnerabilities internally, which is typically about 90 days....


Endwall 03/14/2018 (Wed) 05:15:50 [Preview] No.1162 del

There is speculation (on 8chan and in the final article link) that this is a stock price manipulation attempt against AMD for profit by short sellers. Also Linus Torvalds wrote some skeptical tweets. I'll wait and see what comes out of the research over the next month. I'm skeptical, but its valid news, we'll see how it pans out.

(387.89 KB 600x600 ralp.png)
Anonymous 03/12/2018 (Mon) 08:12:15 [Preview] No. 12464 [Reply] [Last 50 Posts]
i don't trust the data dumps that i've been finding through torch. can anyone point me to an onion site with some good data dumps?

Anonymous 03/12/2018 (Mon) 21:34:19 [Preview] No.12469 del
What kind of data? Specify.

(387.89 KB 600x600 ralp.png)
Anonymous 03/12/2018 (Mon) 08:01:22 [Preview] No. 12463 [Reply] [Last 50 Posts]
anyone have a site where I can look at data dumps? preferably an onion site

Internet Security General Anonymous 04/16/2016 (Sat) 07:56:30 [Preview] No. 4 [Reply] [Last 50 Posts]
Continuing from >>>/tech/597
This is for non specific, general tips for anonymous web browsing and downloads, tips on browsers and browser configurations for the security concious that you don't want to make a new thread for.
76 posts and 6 images omitted.

Anonymous 02/15/2018 (Thu) 06:51:46 [Preview] No.1129 del
I didnt make the image I found it on one of the rebeccablack/tech/ archives. Ghostery I still never was crazy about because it is like noscript if it noscript was bloated and didnt work.
I always try and remember the addons I am missing when configuring a firefox fork and that was a good image to use back a year or 2 ago.
>You can mess with the settings on most apps, repack them, and run them your way instead of having them screw with everything.

That is something I will keep in mind because some addons stop working like "white noise generator" which did what "trackmenot" does but in a seperate window with tabs randomly switching to random webpages.

I have a few suggestions to add to the list
adnausium, dolus, tamperdata and http nowhere

if I did not lock the prefs.js I will use https://jm42.github.io/compare-user.js/ for about:config modifying.

Anonymous 02/15/2018 (Thu) 13:50:29 [Preview] No.1130 del
>if I did not lock the prefs.js
I just read up on this. It seems like locking is temporary and all you need to do to reverse it, is delete the lockfile.
>I will use https://jm42.github.io/compare-user.js/ for about:config modifying.
These might be useful to you:
Full list of all prefs defined in Mozilla's source code for 52. Some of them are hidden/ i.e not set in about:config so there'll be no way to know about them. And: http://kb.mozillazine.org/About:config_entries
Is a nice util for quickly finding out what each does, and available settings.

Anonymous 02/15/2018 (Thu) 14:48:33 [Preview] No.1131 del
And if you're using a beta version or one with a "MOZ_TELEMETRY_ON_BY_DEFAULT", telemetry is perma-on, so be careful.

Anonymous 02/15/2018 (Thu) 18:05:59 [Preview] No.1132 del
Thanks I always got confused about that. But you can never be too sure with firefox even forks have things like


set to true on default.

Anonymous 03/12/2018 (Mon) 02:03:56 [Preview] No.1160 del
I'm pretty sure Ghostery can be analyzed. I saw somewhere recently that they made it open source, so basically you can look through the source code if you want. Might be something worthwhile to do, but isn't necessarily something I would be able to do since I don't know shit about coding.

NIST finally is doing something on PQCrypto Anonymous 12/21/2017 (Thu) 23:41:39 [Preview] No. 12031 [Reply] [Last 50 Posts]
>Round 1 Submissions
> ht tps:// csrc.nist.gov/projects/post-quantum-cryptography/round-1-submissions

Keep looking. This is very important in case non-bullshit "quantum" computing really becomes a thing.

DjB submitted the "McEliece" and SPHINCS together with other academics:
> ht tps:// classic.mceliece.org/
> ht tps:// sphincs.org/

Inria (that developed Coq and others) worked on Big Quake:
> ht tps:// bigquake.inria.fr/

<can't paste links, shitty system detect as flood

Anonymous 12/22/2017 (Fri) 01:06:50 [Preview] No.12032 del
Protocol should be implied

Anonymous 02/28/2018 (Wed) 04:13:16 [Preview] No.12435 del
The same NIST that "allowed" the NOBUS EC backdoor.

The same NIST that concluded WTC Building Seven collapsed in < 5 seconds from an office fire.

Anonymous 03/05/2018 (Mon) 01:05:54 [Preview] No.12440 del
(20.33 KB 603x572 1519504859455.jpg)
Honeypot. The US Government reserves the right to blackbox any patent its office labels as "significant"; consequently, I wouldn't trust contests they sponsor to design critical technologies if I was such a developer, especially not when the host doesn't believe in the technology being usable for everyone.

>in case non-bullshit "quantum" computing really becomes a thing.
It already is a thing. It just requires specialized facilities so needs to be used over the cloud.

https://youtube.com/watch?v=nQvTLgveUs8 [Embed]

Anonymous 03/07/2018 (Wed) 02:49:28 [Preview] No.12448 del
(1.79 MB 255x106 stop_it.gif)
>the cloud

(328.19 KB 500x500 TAD.png)
/tech/ - Technology Anonymous 02/06/2018 (Tue) 21:45:11 [Preview] No. 12357 [Reply] [Last 50 Posts]
Welcome to /tech/, a technology board. This board is for discussion of computer technology, both software and hardware.

Previous thread: https://archive.fo/WxkDv

NSFW files are only allowed if they are spoilered.
All rules and policies are open for discussion in this thread.

IRC: #/tech/, #InfinityNow and #endchan on irc.rizon.net - https://qchat.rizon.net/
Secure Computing Practices Links: http://hjvx7xg3n4ejezmh.onion/
Wiki (OLD): https://wiki.installgentoo.com/
9 posts and 2 images omitted.

Anonymous 02/21/2018 (Wed) 17:56:51 [Preview] No.12416 del
You do understand license shitposters want to take over this board and making you remove stallman is just the beginning right?

betamax Board owner 02/21/2018 (Wed) 19:17:00 [Preview] No.12417 del
You do understand there's no license to shitpost in The End℠ right?

There is no true objective winner in the license wars, every public or private license has its own purpose. Having Stallman or Terry won't change how people will always be triggered. If anything, people like you want to take over this board.

Provide me a competent image and have someone else here to agree with you in its implementation and do it ASAP but don't make me wait too long. However, this is really truly a non issue, but the real issue is that I will only allow just one more sticky image change. Get it right this time or I'll remind you all it's your guys' fault and I'll make a new sticky without any OP image and make it an official rule to not bitch about the sticky thread image posthumorously when there's no sticky image to even complain about.

Again, grow up, and if you think Terryposting is spam, report it.

Anonymous 02/21/2018 (Wed) 21:58:39 [Preview] No.12418 del
brainlet detected
there's more than to the debate than "hurr share your code without making other people share durr"
nobody is saying this

Anonymous 03/03/2018 (Sat) 08:56:39 [Preview] No.12438 del
(27.75 KB 328x225 start.gif)

just thought this was interesting.

betamax Board owner 03/03/2018 (Sat) 20:22:26 [Preview] No.12439 del
Please "blog" in your own thread.

(28.29 KB 235x140 1491770426346.png)
Anonymous 12/10/2017 (Sun) 02:20:58 [Preview] No. 11890 [Reply] [Last 50 Posts]
Hi tech, i'm tired of windows.

I will go to linux, but I need know which linux i will usage.

I am in doubt between the backbox and Kali Linux, if you have more recommendations, I accept (debian priorizer).

I have a 4GB pendrive, is it enough to change the operating system?
21 posts and 1 image omitted.

Anonymous 02/15/2018 (Thu) 22:35:53 [Preview] No.12403 del
OP might like parrotOS or Lionsec. Parrot has an everyday suite and is a pentesting distro. Same thing with Lionsec it is ubuntu with a shitload of tools.

Anonymous 02/16/2018 (Fri) 02:49:30 [Preview] No.12404 del
Get void linux

Anonymous 02/19/2018 (Mon) 06:18:36 [Preview] No.12407 del
Install gentoo. It's definetely worth the effort.

Anonymous 02/19/2018 (Mon) 16:57:10 [Preview] No.12410 del
For anonymisation I suggest whonix
For penitration testing I suggest Backtrack 5r3
For personal use I suggest mint linux or arch linux
For linix hardware, if you want to leave microsoft i suggest System76
Or raspberry pi, pitop or piseed

Anonymous 03/01/2018 (Thu) 21:59:19 [Preview] No.12437 del
Try the Live CD version of many distros without installing, until you find one you're happiest with.
Some distros are only 11Mb, others are larger than 4Gb so is case dependent whether it will fit a 4Gb USB drive.

Windows Security Thread Endwall 02/24/2018 (Sat) 02:29:59 [Preview] No. 1147 [Reply] [Last 50 Posts]
WINDOWS NT Security Thread

It turns out that MS Windows NT has an 80% market share in the Desktop Operating Systems Market (whatever that is...) So in all likelihood, if you work a job anywhere, you will be forced to sit down and work on one of these machines running this well known gem of an operating system. You probably won't have administrator rights, but that's OK, we'll make do.

In reality there is no Windows security but in this thread we will try to make life a little bit better even if it is just for a placebo effect. Also Windows hackers come and show us how you hack us up real good, and help our poor unprivileged users gain administrator rights without a password, so that they can install Mahjong. Windows Advanced Firewall, Registry Editing, Browsers, etc. Post all the tips and tricks to make Windows NT better than ever.

Anonymous 02/26/2018 (Mon) 15:20:14 [Preview] No.1150 del

>help our poor unprivileged users gain administrator rights without a password
Quick and dirty hack with backing up and replacing utilman.exe with cmd.exe from anything able to access NTFS without breaking it too much would work well (will give you SYSTEM-privileged command line prompt). But at this point you probably should just use GNU/Linux.

Endwall 02/28/2018 (Wed) 04:14:07 [Preview] No.1151 del
(92.06 KB 1024x768 blue-screen-of-death.jpg)

I uploaded a Blue Screen of Death as the the photo for the thread but it didn't upload with the thread...I'm not sure why that is happening. I put a unique files filter on the board but that might be comparing it to a global (board wide) database. I might disable that setting.

The original text read "Turd" but then I read it back and said "That's harsh" and changed it to gem (satire to go with the Blue Screen picture that didn't upload). As for the operating system itself, it works...its semi stable... many people use it.

It's proprietary and Closed source, and the company are known NSA collaborators. So it's probably not a good Idea to run this OS anywhere at all. That said I'm going to make a board for MacOS security later as well, when I setup a Mac OS 10.7 Computer to play around with, I also don't trust MacOS but I'm approaching it from the same philosophy.

I had a very negative experience with using Windows 7 from 2009-2011, when I quit windows due to heavy invasive spying and related harassment. Which is why I full time switched to Linux. I don't recommend Windows at all. But it's everywhere and if you've got lemons make lemonade... I still have to do some things on windows for school... it's sad but true.

So my thinking is, we might as well try to increase the number of people using Tor and firewalling their computers, locking down processes, you can do some of that on Windows, so that at least if people start thinking about security, it it will be easier to transition in the future. Also GnuWin32 and Cygwin are worth mentioning and describing their use and setup.

I certainly don't recommend using windows for anything security sensitive, at all. This thread is more for people to bring them up to power user level, and to help me to learn how how to become a "power user" on Windows and to see what we can do to "lock down" Windows. This thread might be better suited for >>>/h4x0r/. We'll see where it goes.

Endwall 02/28/2018 (Wed) 04:27:01 [Preview] No.1152 del

Also this thread can include information for securing and running ReactOS, which might suit some people's needs as well. I'll set up threads for other operating systems and how to set them up (IllumOS, DOS, etc) , as I bring them online to test a play around with. This will happen over summer, I'm jam packed with school stuff until spring.

Again such boards might go better in >>>/h4x0r/. I'll think about the best way to present the info. Again the focus will be on tip sharing for poweruser stuff (scripting, settings etc) and security (Crypto, filesystems, firewalls, etc) and network communications on each of the operating systems.

Facebook new VPN shows what people do on their phones beyond suite of firm's apps Anonymous 02/15/2018 (Thu) 00:10:22 [Preview] No. 12399 [Reply] [Last 50 Posts]
>Facebook acquisition of Israeli mobile-analytics company Onavo (a VPN service)
>data show in detail how the social-media giant employs it to measure what people do on their phones beyond Facebook's own suite of apps.
>"Websites and apps have used market-research services for years," the spokesman said
>has been downloaded an estimated 24 million times

Oh heyyyy!

Anonymous 02/26/2018 (Mon) 12:26:03 [Preview] No.12428 del
How can you achieve any privacy while using facebook, or smartphone in the first place. I mean, talking about privacy on any mobile device is very very stupid. There is a real problem towards ignorance here. How can anyone promote privacy as a quality of an app, when it's impossible to verify, and when the phone itself must be infected by other apps to the bone?

Too bad, that the market actually take advantage of the laziness to know and research of comfort of peoples, ready to give up their privacy for the compangy "they trust".

About monstruous company that gained trust and is seen as "friend", steam is the perfect exemple.

Anonymous 02/27/2018 (Tue) 01:45:15 [Preview] No.12429 del
>talking about privacy on any mobile device is very very stupid
We all know it here. Nonetheless, it still sad so see the cancer spreading even more powerfully.

Anonymous 02/28/2018 (Wed) 02:45:51 [Preview] No.12434 del
Has anyone researched, in-depth, the Facebook, et al., "SHARE" inserts put on web content by third parties? That is, the "Like Button" and other social media embedded services.

I remember Stallman pointing out that Facebook is able to collect metrics from these anytime, ANYONE, Facebook user or not, visits a site. For the sake of a basic example, logging the IP while performing the GET request for the "LIKE" icon.

I know the concept makes it possible but there is some heavy Java Script behind all this and would be very curious to understand how exactly all that works.

(9.07 KB 261x202 annoyed_tom.jpg)
FLOSS and licensing Anonymous 07/31/2017 (Mon) 16:22:43 [Preview] No. 10510 [Reply] [Last 50 Posts]
Hello /tech/,

I'm not so familiar with software licenses so I started reading about the subject. At one point the question 'How does one profit from floss software?' popped in my head and these are some articles I came upon (quite outdated, but they still have a point). So GPL prevents companies from making proprietary software with your piece of software. BSD, on the other hand, does not (that's the case with Apple's kernel). Turns out the only way a company can profit from GPL license is by donations, offering support, teaching or dual licensing. Dual licensing seems like the most used option.


>But there is a net effect on software development. Who makes money off GPL code? We go back to Novell and Red Hat, who test and package this software. And we see a trend–GPL code helps software testers make money. It helps QA people. It helps the people who answer the support phones. It helps everybody except software developers. Oh, maybe Google will pay them a salary as a goodwill gesture. But it’s really, really hard to make money from developing FOSS. You can make money supporting it. You can make money testing it. But no money developing it.

So my question is - does free software actually benefit the developer?
13 posts omitted.

Anonymous 02/20/2018 (Tue) 05:01:03 [Preview] No.12413 del
>I'm not so familiar with software licenses so I started reading about the subject. At one point the question 'How does one profit from floss software?' popped in my head and these are some articles I came upon (quite outdated, but they still have a point).
I had similar concerns and so I did my own research on the matter. I found this one guy's 2006 blog who btfo GPL as far as I'm concerned.


>So my question is - does free software actually benefit the developer?
No. All of the suggested business models are pathetic and won't work long-term.


It's as you say: you must provide support or dual license. What the FSF and OSI get wrong is that proprietary does not automatically mean closed source, and 'proprietary' is not inherently wrong. Here's a quote from Richard Stallman that shows a flaw in the design of GPL for making money.

>With free software, users don't have to pay the distribution fee in order to use the software. They can copy the program from a friend who has a copy, or with the help of a friend who has network access. Or several users can join together, split the price of one CD-ROM, then each in turn can install the software. A high CD-ROM price is not a major obstacle when the software is free.


Message too long. Click here to view full text.

Anonymous 02/20/2018 (Tue) 21:21:28 [Preview] No.12415 del
why should i pay for adobe products we have seen i.e. flash they cant code for shitttttttttttttttttttttttttttttttt

Anonymous 02/26/2018 (Mon) 12:18:57 [Preview] No.12427 del
Don't forget project orchestra.
> Play GPL vs BSD card

I'm in favor of GPL, because I find it scandalous that some companies will take free works to make money.

But seriously, don't lose your time on these kind of issue. Licencing can't be general but have to be thought case by case. That's it.
Some people might use this to make everyone lose time, and to deceive.

Anonymous 02/27/2018 (Tue) 10:34:32 [Preview] No.12432 del
(57.43 KB 654x374 itteration.jpg)
>no money developing
Your snip is full of shit, anon.
Software "Freedom" is about assurance
as are all experiences. Everything else follows.
Nothing is stoping developers from selling their libre/floss++ warez.

Essential Property Rights:
0. Use it (Redundancy)
1. Study it (Assurance)
2. Change it (Ownership)
3. Share it (Liberty)

In this order, you can offer more and more control to the person using a product or service. The 'use' of a product or service is redundant; without 'use', there is no experience to "benefit" from. Studying how a product or service functions is essential to providing assurance that a product or service is fucntioning as advertised; without 'study', there is no knowledge, only trust. Changing or altering a product or service encourages and further establishes ownership; 'change' is the only thing that stays the same and, without it, there is only the nothing. Sharing a product or service reinforces the product or service's value through its continued usefulness; without 'share', communities would never form and civilization would die out.

Create your own licence.

Anonymous 02/27/2018 (Tue) 10:37:44 [Preview] No.12433 del
(57.43 KB 654x374 itteration.jpg)
>no money developing
Your snip is full of shit, anon.
Software "Freedom" is about assurance
as are all experiences. Everything else follows.
Nothing is stopping developers from selling their libre/floss++ warez.

Essential Property Rights:
0. Use it (Redundancy)
1. Study it (Assurance)
2. Change it (Ownership)
3. Share it (Liberty)

In this order, you can offer more and more control to the person using a product or service. The 'use' of a product or service is redundant; without 'use', there is no experience to "benefit" from. Studying how a product or service functions is essential to providing assurance that a product or service is functioning as advertised; without 'study', there is no knowledge, only trust. Changing or altering a product or service encourages and further establishes ownership; 'change' is the only thing that stays the same and, without it, there is only the nothing. Sharing a product or service reinforces the product or service's value through its continued usefulness; without 'share', communities would never form and civilization would die out.

Create your own license.
Fixed for typos

Discussion Thread Endwall 02/24/2018 (Sat) 01:52:08 [Preview] No. 1145 [Reply] [Last 50 Posts]
Want to say something off topic about anything?

Have a hot tip about something in the computer security world that doesn't fit into any current thread or category?

Want to chat with your fellow invisible 7 proxy friends?

Want to tell Lt. Gen Michael Hayden, GEN Keith Alexander, ADM Michael Rogers, GOOGLE, AMAZON, FACEBOOK and Microsoft etc. how you feel?

It's open mic at >>>/os/ , anything goes!!

Put all of your banter here:

Anonymous 02/24/2018 (Sat) 02:00:58 [Preview] No.1146 del
I thought this was Operating Systems.

Where my Gentoo bros at?

Endwall 02/24/2018 (Sat) 02:34:06 [Preview] No.1148 del
It will be Operating Systems when I'm done with it...

Anonymous 02/26/2018 (Mon) 00:14:21 [Preview] No.1149 del
seems like he took down the clearnet searxes thing.

Meltdown fix committed to OpenBSD Anonymous 02/23/2018 (Fri) 01:58:09 [Preview] No. 12419 [Reply] [Last 50 Posts]
>Meltdown mitigation is coming to OpenBSD. Philip Guenther (guenther@) has just committed a diff that implements a new mitigation technique to OpenBSD: Separation of page tables for kernel and userland. This fixes the Meltdown problems that affect most CPUs from Intel.
>When a syscall, trap, or interrupt takes a CPU from userspace to kernel the trampoline code switches page tables, switches stacks to the thread's real kernel stack, then copies over the necessary bits from the trampoline stack

Very good news. Let's see the performance impact. As undeadly contributor said, help test the snapshots from 22 february. Here (check the SHA256, please - use install62.fs for usb stick or install62.iso for CD-ROM):

Anonymous 02/23/2018 (Fri) 02:22:24 [Preview] No.12420 del
>linux patches in a day
>bsd patches in a month

Anonymous 02/23/2018 (Fri) 22:54:11 [Preview] No.12421 del
>linux does any crap diff because is employed on too many servers
>the diff reduces 50% of the performance, making servers owners waste much more money on energy
>bsd makes it simple, clean and secure. Take time, but it's did not messed too much with the kernel and is pretty verifiable for possible bugs/exploits.
>So far, no notice of performance impact, from what I know

You see, your argument is not so valid. Linux and BSD are different and users have different needs.

Anonymous 02/24/2018 (Sat) 00:53:38 [Preview] No.12422 del
Linux had a lot more forewarning of the bugs than the BSDs so patches were already in the works.

Anonymous 02/25/2018 (Sun) 11:39:37 [Preview] No.12424 del
(359.52 KB 500x599 me.png)
There's no performance impact because nobody fucking uses theoBSD.
probably this

Non x86 laptops Anonymous 12/16/2017 (Sat) 18:16:13 [Preview] No. 11954 [Reply] [Last 50 Posts]
What is there available in the non-x86 laptops? I only know the old PPC macintosh laptops.

Anonymous 12/16/2017 (Sat) 18:23:54 [Preview] No.11955 del
There is that MIPS lemote laptop but it's fucking expensive.

Anonymous 12/16/2017 (Sat) 23:45:57 [Preview] No.11962 del

Anonymous 12/17/2017 (Sun) 10:20:08 [Preview] No.11971 del
DIY Modular Open Source Laptop >>10163

Anonymous 12/22/2017 (Fri) 11:30:14 [Preview] No.12034 del
On that note, where can I buy Novena with a battery/charger board? I mean today, IIRC they did their crowdfunding thing and that was it.

Anonymous 02/24/2018 (Sat) 02:31:33 [Preview] No.12423 del
Samsung Chromebook Plus
Asus C101PA Chromebook
Acer R13 Chromebook

VPN/proxy/TOR general thread Anonymous 04/15/2016 (Fri) 22:12:39 [Preview] No. 2 [Reply] [Last 50 Posts]
Cool board idea.

What's the safest possible way to browse the internet anonymously and safely? There's a thread on /tech/ with the endwall developer talking about proxychains, and that seems pretty cool. Some of the links to proxy lists seem dead, and I have found some online but why should I trust these random 'free' proxies?

What about proxychains over VPN? I'm currently using Mullvad which is alright, and I'm curious about more security if need be. Does a VPN -> proxychain -> TOR connection work? Sounds horribly slow in theory, but I think we all know that privacy comes at a cost in our current world.

I suppose I could call this a 'VPN/proxy/TOR general thread.'
53 posts and 5 images omitted.

Anonymous 02/14/2018 (Wed) 14:25:42 [Preview] No.1120 del
One thing people will notice but never say is that normies WANT TO USE VPNS THEY THINK THEY CAN USE ONE ON A PHONE.

Look at android and itunes top apps paid and free. Those lists are LITTERED with BULLSHIT VPN apps that DO NOTHING for privacy. Hypocrites. Anyone who says "lets microchip everyone I aint got nothing to hide" They do they are hiding behind that talking point instead of an actual opinion. Somehow the media has convinced the people to want to ban vpns while the top apps for mobile are vpn apps aside from games and shit like tinder.

These cucks want all they microchips laws to go through. They think hola free vpn .apk is going to hide them as they downvote something they are supposed to downvote. Look at chrome extentions firefox extensions. All browser fingerprint spoofing.Look at the most torrented proprietary software. All virus protection programs like mcaffe and norton antivirus.
they think that they are not supposed to use vpns or shit that actually works. A bunch of incognitos pretending they dont need privacy. They dont need privacy now that being a pathetic homosexual that does nothing but pout about liberal nonsense is the ideal citizen.

Anonymous 02/14/2018 (Wed) 15:20:36 [Preview] No.1122 del
Perhaps the most loud are the most unaware. I would bet my money the ones who care know anything about VPNs aren't dumb enough to yell and scream about muh terrorists or such. Or atleast there may be a little overlap.

Anonymous 02/14/2018 (Wed) 21:49:40 [Preview] No.1124 del
Yes I am a sec beginner so I am loud in my observation of this lol.Any politicizing of technology is dangerous. Also proprietary companies like google are a threat too.

Anonymous 02/15/2018 (Thu) 01:24:08 [Preview] No.1125 del
Ah mate, I'm on your side, there's been some miscommunication. What I meant was the age old "vocal minority" being the loudest, while the majority quietly enjoys their lot, with a slyly opportunistic smirk.

Endware Endwall 05/03/2016 (Tue) 08:54:28 [Preview] No. 32 [Reply] [Last 50 Posts]
Endware is a suite of programs geared towards internet privacy, security, and anonymity.

Endwall: endwall.sh is an iptables based firewall script designed to be implemented on any linux distribution shipped with iptables. endwall.sh is based on default drop policies, coupled with a novel strategy of passing packets on local host ports only for those enabled by the enduser. It comes with a variety of well used ports enabled with several additional port passing configurations available by uncommenting the script. It provides essential security to a new user.

Endsets: endsets.sh is a script that adds blacklisting and whitelisting functionality to endwall.sh. It depends on the program ipset. It is persistent on reboot if you enable ipset as a service. This is the recommended blacklisting tool for endwall if you are running a server or planning on opening up ports and services to the public and will require daily blacklisting of new incomming IPs.

Endlists: endlists.sh is a traditional text file list based blacklisting and whitelisting script. It has slow performance, and can't be updated on the fly. Good for <1000 ip subnets, very tedious and slow to run for more than that. Blocks the IPs by adding them as individual rules to the iptables ruleset. Works but not recommended for heavy duty on a server. May be useful for workstation use to block ip ranges if you are not opening up ports and services to public clients.

Endtools: endtools are a collection of scripts including alogz.sh, mlogz.sh, spamlogz.sh and iplookup.py. These scripts will help to service an enduser of endwall in adminstering endsets/endlists.

iplookup.py is a geoiplookup script written in python and requires python and pygeoip. It has simmilar functionality to maxmind's geoiplookup program and uses the maxmind *.dat files.

spamlogz.sh is a script that searches through log files to find flagged log entries flagged in endwall.sh, endsets.sh and endlists.sh.

alogz.sh is a daily log reading script designed to read the output of an apache http server's log output.

mlogz.sh is a daily log reading script designed to read the output of a postfix smtp server's log output.

Message too long. Click here to view full text.

197 posts and 3 images omitted.

Endwall 01/22/2018 (Mon) 07:36:07 [Preview] No.1103 del

Go here for the latest files:


$ wget https://dist.torproject.org/tor-
$ wget https://dist.torproject.org/tor-

The Tor developers change their keys periodically so if this happens after you type

$ gpg --verify tor-

Can't verify because
blah blah no key for key ID #######

$ gpg --recv-key #######

Message too long. Click here to view full text.

Update Endwall 02/08/2018 (Thu) 05:09:51 [Preview] No.1106 del
Proxyload is down again (I noticed this 2 weeks ago). They changed something with the website. I'll look at this next weekend.

I fixed some channels in endstream and added some stuff to endradio.

I spruced up rmpac-files so that the user just needs to capture the error output of pacman -Su, but doesn't need to edit the file as it will jump to the proper line automatically. It now asks you for deletion confirmation.

I also made a windows version of endstream called winstream as a batch file it's in prototype stage and works with the windows version of youtube-dl and mpv, it needs some sprucing up, but it's low priority. I made this to play news at school on the windows computers with the projector screens, it works well enough.


I'm bogged down with homework, so it might be a month or so before I do any more work on the products. Just thought I'd write something about the suite status.

Any product requests, complaints, bug reports comment below. Thanks.

Anonymous 02/21/2018 (Wed) 21:22:28 [Preview] No.1138 del
bastille linux
deep-6'd by the deepstate

Anonymous 02/22/2018 (Thu) 17:39:29 [Preview] No.1139 del

Endwall 02/22/2018 (Thu) 21:09:07 [Preview] No.1140 del
Please keep the commentary in this thread to Endware discussion. As this note might be falsely attributed to Endwall. I didn't write it.

I don't know anything about this information. I assumed it may have been a recommendation for me to try the Bastille Linux script or a notice about its status... I looked around and didn't find anything in the news about any status changes or problems with it... I'm not sure what this is about.

Please post information and notifications of this type in Online Security News, or in the Internet Security General. And possibly follow up with a link or source backing up the information. Thanks.

(26.35 KB 570x409 chip.png)
lowRISC: another year bites the dust? Anonymous 10/18/2017 (Wed) 05:41:40 [Preview] No. 11571 [Reply] [Last 50 Posts]

>When can I buy a lowRISC SoC?
>As with most tech projects, the most accurate answer is “When it’s ready”.
>We are expecting to crowdfund an initial instantiation of the lowRISC platform during the course of 2017.

I'm pretty sure the lowRISC FAQ said 2016 last year. It didn't happen, obviously, and it was changed to 2017, but we're running out of that, too. Ten weeks left, boys. Is a lowRISC SoC vaporware for another year?

At what point do we start looking to the J-x processors based on Hitachi's SuperH architecture? The last SH-4 patents are expiring this year.

8 posts and 6 images omitted.

Anonymous 02/05/2018 (Mon) 04:21:48 [Preview] No.12347 del
HiFive or whatever it was called released a dev board yesterday for $1000 dollars.

Anonymous 02/05/2018 (Mon) 07:59:14 [Preview] No.12350 del
That's a dev board though, that's an investment for businesses looking to use the technology, not for enthusiasts.

I wonder, does anyone know why RISC chips always run so fucking hot? The heatsinks on the Talos machine are insane. How is it that x86 has gotten around this?

Anonymous 02/08/2018 (Thu) 22:01:56 [Preview] No.12365 del
>why RISC chips always run so fucking hot
ARM is RISC and run really cold. I don't think that a issue is RISC. Power was constructed primarilly for servers, so it will have more cores running, more L1 cache entries, so on.
>How is it that x86 has gotten around this?
From what I know, adaptative methods. For example, the clock and voltage adapts to the need of the user.

Anonymous 02/09/2018 (Fri) 19:52:57 [Preview] No.12377 del
That was a great reply, thank you.

Anonymous 02/20/2018 (Tue) 05:10:54 [Preview] No.12414 del
(130.38 KB 640x763 1517051241857.jpg)
>dev board
>not for enthusiasts
it's exactly for enthusiasts, unless by enthusiasts, you mean the kind of enthusiast artist that buys Crayola instead of watercolor. HiFive is offering a modern computer, on an entirely new, unexploited platform, for us to program, all for a measly grand. The opportunity here is huge, and poorfags are gonna dismiss it just cuz it's not China cheap and includes proprietary parts.