Meta Thread Endwall 07/12/2016 (Tue) 12:03:36 [Preview] No. 171 [Reply]
Post any comments, concerns, or requests for the board in this thread.
Edited last time by Endwall on 07/12/2016 (Tue) 12:15:00.
11 posts omitted.

Anonymous 03/21/2017 (Tue) 02:50:26 [Preview] No. 859 del
Useful to use before because it is much faster like seconds for a thousand proxies. But is still useful because it weeds out the proxies that give certificate errors in the google or youtube check.

Endwall 05/23/2017 (Tue) 03:33:49 [Preview] No. 925 del

Good catch. OK thats definite masonic lingo there. Not sure about the logo, it looks like the doppler effect. Just because the website has masonic references doesn't mean that the software doesn't work. I haven't tried it personally, but I liked the advertised anti-systemd approach. I think a disclaimer is in order, rather than a removal of the link. What are your thoughts?

Anonymous 06/22/2017 (Thu) 19:04:55 [Preview] No. 944 del
It already is a disclaimer of sorts but I am pleased you added it to the post where it was linked. (completely not neccisary) I actually trust this more because they are more forthcoming to the vidion of the project. You look at CISCO's logo it is not only the golden gate bridge it is the markings like you see on a ruler. Why is CISCO using ruler indentations as its logo? You look at GNU its baal. Heads tells you they are insiders in the first sentence. This could prove to make it not compromised as it could be using the reputation of this proffesional mens club to vet itself. Or it could mean there is a backdoor of some kind. An eye in the iso. I would check it out but not immediatly choose this os as something to use in a time of elites ruthlessly vying for power.

Anonymous 06/22/2017 (Thu) 19:12:15 [Preview] No. 945 del

Anonymous 06/19/2017 (Mon) 14:18:39 [Preview] No. 8567 [Reply]
>tor browser now only plays sound if you have pulseaudio installed


First, Tails depends on systemd based Debian, now the Tor Browser depends on PulseAudio.

Pottering is killing anonymity.

Anonymous 06/21/2017 (Wed) 03:10:30 [Preview] No. 8572 del
Why would you want a browser to play sound?

Anonymous 06/21/2017 (Wed) 05:27:16 [Preview] No. 8573 del
>decide to tinker around with linux audio tools for music production.
>please configure your jack server
>connect to the jack server
>everything is muted
>eventually nigger rig the ability to use the midi keyboard with a synthesizer
>realize its easier to use flstudio on playonlinux instead of trying to hear an output with this.
>broke my sound configuration and have to sync up video with video track playing in mpv and the audio playing on audacious
>can only play sound in audacious because it allows you to specify the alsa and oss drivers
>only choice to reset this is to re-install os or get frustrated learning how to set sound devices
>just reinstalled os and have the configuration to a usable level
>distribution upgrade makes it so I can only hear things in audacious again

this is the feats of madness.

Anonymous 06/21/2017 (Wed) 06:53:53 [Preview] No. 8575 del
there's some devuan base distro tail call heads or something
but I think QubesOS and Whonix also uses systemd/potterware so...

(141.70 KB 476x484 1496961004875.png)
can't download files to disk from sankakucomplex Anonymous 06/12/2017 (Mon) 17:08:17 [Preview] No. 8550 [Reply]
Kind /tech/nologists

A week or so ago I can't download images with the Tor Browser from sankakucomplex.

How is this even possible?

I can load the full size image in my browser, so it is in the memory, but when I try to download it to disk, it just creates a ~5.5kB broken file. Is this some new Firefox browser feature? How can the server owner have the right what I do with data that's already in my RAM? Is this some kind of new DRM? Please enlighten me. You can be as technical as you want to be, I'm a gentooman, I'm just not up to date about browser technology.

I await your answers with interest and a held beck REE if my worst fears prove to be right.

p.s.: on a second thought is this a Cloudlare-wide thing?

p.s.2: I can still download images from other Cloudflared sites like 4chan, 8ch
7 posts and 2 images omitted.

Anonymous 06/14/2017 (Wed) 04:34:19 [Preview] No. 8558 del
use proxy-chains to bypass cloud-flare.

Anonymous 06/14/2017 (Wed) 18:29:10 [Preview] No. 8559 del
Works for me with tor browser on linux with js disabled.
I just pressed Ctrl + S

Anonymous 06/14/2017 (Wed) 23:58:01 [Preview] No. 8560 del
and reduce your anonymity set to 0

Anonymous 06/19/2017 (Mon) 20:57:02 [Preview] No. 8569 del
I use to access sankakucomplex with Tor... it just works.
I don't know the answer for your question, but I have no problem with links2 on this site.

off-topic: check out kitten_sophie tag.

Anonymous 06/21/2017 (Wed) 06:52:09 [Preview] No. 8574 del
source for that loli OP?
She's from some visual novel right?

(106.69 KB 350x350 R-10183023.jpg)
irc Anonymous 06/19/2017 (Mon) 20:56:16 [Preview] No. 8568 [Reply]
Why are there no good irc channels for tech and general banter on tor ? i2p has #salt.

Anonymous 06/19/2017 (Mon) 21:50:57 [Preview] No. 8570 del
What? You mean an onion irc address? You can just use regular irc with tor.

Anonymous 06/20/2017 (Tue) 00:38:59 [Preview] No. 8571 del
Well, specifically a irc channel on a tor only irc network.

(38.29 KB 800x470 1.jpg)
ffmpeg help Anonymous 06/17/2017 (Sat) 12:24:13 [Preview] No. 8561 [Reply]
Hey guys, with Adventure Time coming to an end I would like to create a web-dl complete torrent of all seasons.

I like what tinymp4 did here:
These are the 720p episodes with the intro and outtro cut out.

What I want to do is maybe write a script or use bash tools to rename the episodes in a uniform way to cut out the extra stuff in file names, then use something like ffmpeg to cut the beginning and the end off each file but leave the rest as is.

Any ideas how I should go about this?

Anonymous 06/19/2017 (Mon) 01:17:09 [Preview] No. 8562 del
ffmpeg stuff isn't so hard.
You would probably need something like ffprobe to get the length of the episode

 flen=$( ffprobe -i "$filename" -show_entries format=duration -v quiet -of csv="p=0" ) 

Then just work out the start and stop times from that.

 ffmpeg -ss [start] -i in.mp4 -t [duration] 

I think a few episodes of that show had cold opens would need to work out what those are and give them special treatment.

off topic Anonymous 06/19/2017 (Mon) 01:27:41 [Preview] No. 8563 del
>with Adventure Time coming to an end

Due to plot reasons or the cash cow/creative passion is now dry? Hell did an overarching plot ever develop for it to have a proper ending with character resolution plus closure and the like?

Anonymous 06/19/2017 (Mon) 02:10:40 [Preview] No. 8564 del
Original creator fucked off years ago.

So I'm sure it's all of above.

Anonymous 06/19/2017 (Mon) 10:15:00 [Preview] No. 8565 del
The original creator didn't fuck off, he stepped down to become one of the writers. Apparently he couldn't write under all the pressure. That said, season 5/6 which was the transition was a little bloated. However they have wrapped everything together in seasons 7, 8 & 9 quite nicely. I particularly liked Finns origin story in the "Islands" mini series which harks back to previous plot development surround Finns dad Martin.
The real problem it seems is that it became far more popular than any other Cartoon Network show. So they deliberately fucked the schedule for episodes to release new episodes as a surprise to force viewers to watch the channel. This negatively affected the ratings. To be fair though the show has had a rough end date since its' creation, because they chose a child actor to voice Finn, eventually he would out grow the role. Anyway, I am clearly a little biased since I like it so much I am making a complete archive of episodes but I think it's being killed off earlier than necessary. There was talk about a Warner Bros. film, maybe now it has ended they will finally make it. Any remaining plot holes can be filled then, but it's mostly complete.

I know the intro and outtro are the same length every time , also the show stopped doing cold opens, so for the remaining seasons (6,7,8,9) that won't be a problem. This is a much better way of handling it than I was thinking to be honest, I was looking for a way to cut off the beginning then cut off the end forcing me to process each file twice.

Any ideas on renaming the files? Every file should have the "s01e01" indicator in its' name, if I could just cut out the rest, that would be ideal. I don't even need to keep the file extension, I can just add a ".mp4" in the ffmpeg output. I am looking this up, would it be sed to find the "s0" the cut everything an additional 4 characters after that and move the file to that new name?

Anonymous 06/19/2017 (Mon) 10:28:20 [Preview] No. 8566 del
No, the real cancer is Teen Titans GO!, not Cartoon Network's schedule. DC comics got CN by the balls with that show that is the epitome of Gen Z sterile canned humor. If that show just fucked off, everything would be more tolerable.

Internet Security General Anonymous 04/16/2016 (Sat) 07:56:30 [Preview] No. 4 [Reply]
Continuing from >>>/tech/597
This is for non specific, general tips for anonymous web browsing and downloads, tips on browsers and browser configurations for the security concious that you don't want to make a new thread for.
56 posts and 3 images omitted.

Anonymous 06/04/2017 (Sun) 18:01:05 [Preview] No. 935 del
That is much more complicated than it needs to be.
All that can be done with:
tmux new links \; split-window -l 2

Which will
Create a new session running links
Create a new pane 2 line tall

Endwall 06/12/2017 (Mon) 06:11:39 [Preview] No. 939 del
This is more efficient. It didn't work straight from the command line as presented though.

I have to enter command mode to do this.

$ tmux new links
$ Ctrl + b ; Shift + :
: split-window -l 2

Then repeat with a new window to multi tab
$ Ctrl +b ; c

As you can tell I don't know what the hell I'm doing. Another case of RTFM for Endwall.

Thanks for the tip.

Anonymous 06/12/2017 (Mon) 19:02:35 [Preview] No. 941 del
>It didn't work straight from the command line as presented though.
Were you already in tmux? Try this, copy it exactly:
tmux neww links \; split-window -l 2

Endwall 06/12/2017 (Mon) 21:25:43 [Preview] No. 942 del

Yeah it works, I'm not sure why it wasn't working earlier, I can't recall.
You typed an extra w in new. Thanks.

Anonymous 06/14/2017 (Wed) 18:27:58 [Preview] No. 943 del
>You typed an extra w in new.
That is for if you are already in tmux.

Endware Endwall 05/03/2016 (Tue) 08:54:28 [Preview] No. 32 [Reply]
Endware is a suite of programs geared towards internet privacy, security, and anonymity.

Endwall: is an iptables based firewall script designed to be implemented on any linux distribution shipped with iptables. is based on default drop policies, coupled with a novel strategy of passing packets on local host ports only for those enabled by the enduser. It comes with a variety of well used ports enabled with several additional port passing configurations available by uncommenting the script. It provides essential security to a new user.

Endsets: is a script that adds blacklisting and whitelisting functionality to It depends on the program ipset. It is persistent on reboot if you enable ipset as a service. This is the recommended blacklisting tool for endwall if you are running a server or planning on opening up ports and services to the public and will require daily blacklisting of new incomming IPs.

Endlists: is a traditional text file list based blacklisting and whitelisting script. It has slow performance, and can't be updated on the fly. Good for <1000 ip subnets, very tedious and slow to run for more than that. Blocks the IPs by adding them as individual rules to the iptables ruleset. Works but not recommended for heavy duty on a server. May be useful for workstation use to block ip ranges if you are not opening up ports and services to public clients.

Endtools: endtools are a collection of scripts including,, and These scripts will help to service an enduser of endwall in adminstering endsets/endlists. is a geoiplookup script written in python and requires python and pygeoip. It has simmilar functionality to maxmind's geoiplookup program and uses the maxmind *.dat files. is a script that searches through log files to find flagged log entries flagged in, and is a daily log reading script designed to read the output of an apache http server's log output. is a daily log reading script designed to read the output of a postfix smtp server's log output.

Message too long. Click here to view full text.

170 posts and 3 images omitted.

Endwall 04/17/2017 (Mon) 21:12:10 [Preview] No. 881 del
>>880 seems to be working again somewhat. I'll keep the filmontv channels out of endstream for now however.

Endwall 05/08/2017 (Mon) 06:35:33 [Preview] No. 913 del
EndRadio version 0.01

-Stream internet radio stations behind tor using mpv

Endwall 05/29/2017 (Mon) 21:42:59 [Preview] No. 929 del
Endtunes version 0.04

- Forked from endradio
- Operates in clearnet
- Mainly for music stations.
- Can be modified for tor use by adding torsocks before mpv

I put this on when I'm doing non computer related things, like studying or cleaning my room. I'll add more channels over time.

Endwall 05/29/2017 (Mon) 23:01:21 [Preview] No. 930 del
I have added a new repository for the streaming products:

I should have done this a while ago, but I was lazy and just added them to the endware repo.

Gitgud won't let me log in to create a new repo so I'll just use github for now.

If you want to make your own channel listings clone it and make a new repo.

Endwall 06/12/2017 (Mon) 06:32:11 [Preview] No. 940 del
Endstream version 0.36

I have now added user-agent methods to endstream. you can also supply the commands ua-rand , ua-ranstr, ua-tor, ua-row1, and ua-off in the command line using --ua-randor in the prompt when you are prompted to enter a number by supplying ua-rand without the --. Also you can use the + and - keys followed by enter to increment and decrement channels. It should be easy for someone to make an infrared usb remote control that supplies + ENTER when pressing channel up and - ENTER when pressing the channel down button.

I also made a minor bug fix to and to do with the ua-ranstr function. It should be working as I originally intended now. I'll implement the user-agent features on the rest of the streaming programs sometime this week.

I'll work on things here and there but I'm going to be on hiatus for the next 2 months with respect to programming. I know I still have some requests to fill but I'll get to dealing with them eventually.

If you have any bug reports, product suggestions, ideas, or concerns about the endware products, please comment below. Thanks.

(292.67 KB 450x399 RMS.png)
/tech/ - Technology Anonymous 01/03/2016 (Sun) 17:52:28 [Preview] No. 125 [Reply]
Welcome to /tech/, a technology board. This board is for discussion of technology, both software and hardware.

IRC: #/tech/, #InfinityNow and #endchan on -

NSFW files are only allowed if they are spoilered. Tech support, consumer advice and desktop/ricing threads are all allowed for now.

All rules and policies are open for discussion in this thread.

Related boards:
>>>/cyber/ - Cyberpunk & Science Fiction
>>>/lv/ - Libre Vidya
>>>/markov/ - bot hell
>>>/os/ - Online Security
>>>/t/ - Torrents/trackers
Edited last time by ring on 06/14/2017 (Wed) 23:18:55.
169 posts and 26 images omitted.

Anonymous 02/07/2017 (Tue) 17:30:17 [Preview] No. 7967 del
I added /cyber/. I can't change the image.

Anonymous 02/13/2017 (Mon) 08:51:08 [Preview] No. 8015 del
i r8 10/10

Anonymous 04/04/2017 (Tue) 03:46:54 [Preview] No. 8234 del
Which distro? I tried 8 or so distros and they all have problems on my laptop. Mainly dpi scaling on my 2k screen. Otherwise, many of them are great. I was looking at Ubuntu Budgie but there was not UI scaling option. Unity seems to have the best scaling and the GUI is all over the place. Icons are too small so I make them bigger but the text underneath is still tiny. Modal dialogs scale oddly. I compare this to running Ubuntu on my desktop(1080p). Which distro do you recommend for a 14 inch 2k laptop screen?

Anonymous 04/07/2017 (Fri) 05:08:24 [Preview] No. 8252 del
(184.31 KB 2000x1604 apuapustajaHD.png)
fuck, you just had to remind me it was dead
RIP the only good polling webapp, and the only constructive thing /s4s/ ever made

Anonymous 06/11/2017 (Sun) 02:34:36 [Preview] No. 8549 del
Put >>>/t/ in sticky plz

Remove feature = fix a bug Anonymous 11/09/2016 (Wed) 00:10:59 [Preview] No. 7328 [Reply]
>did not remove metadata from images embededed in PDF documents
>been fixed in version 0.5.2-3+deb8u1. This update disables PDF support in MAT entirely.
2 posts omitted.

Anonymous 11/09/2016 (Wed) 13:59:53 [Preview] No. 7337 del
>jpg's from a pdf
You might as well just make bunch of PNGs. Not like it's bad.

Anonymous 06/05/2017 (Mon) 11:17:23 [Preview] No. 8540 del

Anonymous 06/06/2017 (Tue) 01:27:36 [Preview] No. 8541 del
>I don't think they have enough people interested on MAT development... it's a really useful tool, though.
>Current status
>The MAT maintenance and development is currently on hold, mostly for health reasons. I might go back to it at some point in the future.
>The current version might have bugs, and doesn't work on Python3: Please avoid using it.

Anonymous 06/10/2017 (Sat) 16:55:19 [Preview] No. 8547 del
when you're so bloated, you use more bloat to trim the files produced by bloatware

Anonymous 06/10/2017 (Sat) 17:09:28 [Preview] No. 8548 del
>asks if you want to make an archive of files that you can not clean in the program.
useless feature

GRSecurity removes public testing patch - goes full commercial. the hacker known as 4chan 06/08/2017 (Thu) 23:35:18 [Preview] No. 45 [Reply]
I told you this would happen, you all said it wouldn't, I assured you he would go full commercial within a year. He did. --MikeeUSA

GRSecurity removes public testing patch - goes full commercial.

>"Don't worry about it, there's nothing for a "grateful" user like yourself
>to download anymore. Boy, if I had more "grateful" users like yourself
>obsessed with harrassing us on Twitter, Reddit, and IRC so that they
>can go around and paint themselves as some kind of victim, I wouldn't
>know what to do with myself.

The solution?
As I said before, Copyright licenses (like any license) are freely revocable unless barred by estoppel. The GPL v2 lacks a no-revocation clause thus estoppel would be more difficult to argue (additonally none of the "agreeing parties" have ever met each other).

Message too long. Click here to view full text.

the hacker known as 4chan 06/09/2017 (Fri) 03:10:46 [Preview] No. 46 del
Theme song for this made today: [Embed]

(65.25 KB 575x602 1468355595882.jpeg)
Anonymous 06/07/2017 (Wed) 21:07:56 [Preview] No. 8544 [Reply]
Could I follow youtube channels without having an account? I am thinking using RSS or similar.

I subscribe to 400+ channels on my current account so I cannot simply check each one for new videos.

Anyone tried something like this?

Anonymous 06/08/2017 (Thu) 06:29:33 [Preview] No. 8545 del
Hmm, I use newsbeuter, have a query feed (basically an entry which includes entries for multiple feeds) and I filter them by age and some certain keywords but jesus christ I don't have 400+ channels I barely have like 10 and probably 2 of them are dead. I don't know if there's any practical solution for your case.

Just using newsbeuter and putting all of them into a query feed and checking that query feed full screen from time to time to see if there's anything interesting might do it but I'm not familiar with the way youtube shows videos to users (I know they introduced some follow feature or some bullshit)

Anonymous 06/08/2017 (Thu) 08:23:29 [Preview] No. 8546 del[ID HERE eg. UCvBqzzvUBLCs8Y7Axb-jZew]
will do.
I think some feed readers just take the URI to a channel and it gets converted automagically.

Online Security News Endwall 07/07/2016 (Thu) 06:09:23 [Preview] No. 149 [Reply]
See a news article or CVE bug report on an emerging computer security issue and want to share it? Post below.

I will also post links to Hak5 Threatwire videos.
Edited last time by Endwall on 07/07/2016 (Thu) 16:22:47.
423 posts and 2 images omitted.

Endwall 05/26/2017 (Fri) 03:29:04 [Preview] No. 928 del
Jupiter Broadcasting

Kill Switch Engage | TechSNAP 320
Posted on: May 23, 2017
We’ve got another round of WannaCry analysis, the latest on the FCCs battle over Net neutrality. Then IPv6 Tunnels & you, a 2017 check-in. [Embed]

I don’t WannaCry | BSD Now 195
May 25, 2017
A pledge of love to OpenBSD, combating ransomware like WannaCry with OpenZFS & using PFsense to maximize your non-gigabit Internet connection! [Embed]

Endwall 06/01/2017 (Thu) 04:49:10 [Preview] No. 931 del

Luckily this was about a Windows 10 driver supplied with OEM HP computers, written by crap programers outsourced from India. However that said, I don't trust pulseaudio.

One computer can't do it all. You can't be gaming and browsing and encrypting and watching videos and music while emailing and instant messaging with everything else with a full desktop like KDE or Gnome, all on one computer if you want to avoid problems.

Most people seem to be getting on in life just fine with Windows 10, Mac OS X 10.11, smart tv's, Android and iPhones, Wifi and Smart Tablets.

And yes it's infuriating; terrorists, drug dealers, and criminals in gangs are running free watching porn on Windows 10 and I'm locked in my room playing with Unix and Linux and it's barely working. While they be flossing with dollar bills and hos dancing with Windows 10 and rap music playing in the background.

I'm 90% sure that I'm being keylogged right now. I'm not sure of the source of the problem, probably some jpeg,mp3 or webm i looked at on Endchan or a malware package i've pulled in from the Parabola repo. I'm going to have to wipe and reinstall and redesign my internal network. I'm not sure if I can reuse this computer because of the ME problem or if it's going into the trash bin, the BIOS is probably infected by now.

Secure computing feels like a problem that should have already been solved like a decade ago.

But I've inherited this disaster so I plan on trying to mitigate it.

Anonymous 06/01/2017 (Thu) 06:13:56 [Preview] No. 932 del
IME is fucking cancer (Windows ME was a buggy piece of shit). Mess around with this and perhaps put this in the sticky, maybe. Read its wiki too.

Security through normalfaggotry is not a tactic for abnormal people like (real) journalists/whistleblowers, pedophiles (Jared was fucked through PhotoDNA tech), real hackers, political dissidents, etc.

Grsecurity is no longer releasing their experimental kernels to the public, so I've switched to the pck kernel. I'm somewhat stumped as to whether hardened or apparmor kernels are better when it comes to network security though probably not. I'm not a kernel guy, just a random stupid loonix enthusiast. My shit just doesn't feel the same without the grsec-knock kernel, but we all gotta move on. Perhaps that's what fucked you up, though your circumstance is much more different than I'm in so you should know the plausible variables that had got you better than I do.

Minix and Plan 9 already solved it though in different ways, while the Amiga was the best, it's now a big mess, it (AmigaOS) doesn't have true multicore support.

Maybe powerlines is the problem, or maybe it's something more esoteric and obscure.

Endwall 06/07/2017 (Wed) 06:57:46 [Preview] No. 937 del
Hak 5
No More Drone Registration! Subtitles Can Be Hacked, Fake Net Neutrality Comments - Threat Wire [Embed]

Fireball Malware Infects Millions - Threat Wire [Embed]

Endwall 06/07/2017 (Wed) 07:13:01 [Preview] No. 938 del
Jupiter Broadcasting
#NotMyInternet | TechSNAP 322
We discuss who really controls the internet & just how centralized and potentially vulnerable it has become. Plus the latest security letdowns from Windows 10, the story of a questionably ethical hacker & Zomato’s data breach.

PostgreZFS | BSD Now 196
This week on BSD Now, we review the EuroBSDcon schedule, explore the mysteries of Docker on OpenBSD, show you how to run PostgreSQL on ZFS & more!

A Burrito Stole My Money | TechSNAP 321
Not only is the UK leaving the Eurozone, they are starting their own internet, this time with more surveillance! Then we’ve got some top tips on getting recruited by the Israeli NSA & the details of some new WannaCry wannabes that may be infecting a windows server near you.

Message too long. Click here to view full text.

Edited last time by Endwall on 06/07/2017 (Wed) 07:15:41.

(109.91 KB 950x534 Bitcoin.jpg)
Anonymous 11/08/2016 (Tue) 12:11:09 [Preview] No. 7323 [Reply]
In what situation would I need to tumble my bitcoin? I mean if law enforcement did not know what my bitcoin public keys where but I also had a large sum of money going into a bank account under my name how could they find out if I got that bitcoin legal or not?

Anonymous 11/08/2016 (Tue) 16:10:02 [Preview] No. 7326 del
(113.66 KB 612x612 1448238693978.jpg)

>how could they find out if I got that bitcoin legal or not?

Depends on which end of the money flow you're being investigated from.

Example scenario #1: LEAs compromise a darknet market and trace payments for illegal goods/services to one of your public keys. They see subsequent transactions involving those public keys and a company that exchanges BTC->USD (or GBP or EUR or whatever). They get a warrant for information about the exchange from the exchange company. They then have information about your bank and deposits. They get a warrant for information from the bank. They now have a chain of transactions tied to you from sale of illegal goods/services through to your deposit in your name at the bank. If you tumble your bitcoins, theoretically, it's more difficult to make the connection from the public key that received BTC for illegal goods/services and the eventual conversion from BTC to fiat currency in your name.

Example scenario #2: You deposit at your bank an amount of money or in a pattern that raises red flags. LEA gets warrants from the bank and the depositing company (the BTC -> fiat exchange) and gets information about the BTC address involved in the transaction. They then try to tie the BTC address to receipt of BTC for the sale of illegal goods/services. If you're using a DNM that has its payment system set up properly, this should be really difficult. That's a form of tumbling in itself.

LEA ability to associate illegally acquired Bitcoins with you depends on 1) associating an illegal transaction with a given Bitcoin address, and 2) associating that Bitcoin address with you. Tumbling your Bitcoins attempts to make that difficult by obscuring the relationship between the Bitcoin address involved in an illegal transaction that the one that eventually is used to transfer Bitcoins to fiat currency in your name.

Anonymous 11/09/2016 (Wed) 12:30:34 [Preview] No. 7334 del
I never used bitcoin so i'm not an expert, but i remember reading that there is this site which will excange your coins for someone elses and then if LEAs are after you their trail ends at that site.

Anonymous 06/06/2017 (Tue) 23:06:10 [Preview] No. 8542 del
>In what situation would I need to tumble my bitcoin?
here's a scenario: you want to assert your right to privacy

>how could they find out if I got that bitcoin legal or not?
>guys with guns at your door
>you have 5 seconds to prove how you got this money or we fuck up your life

(2.91 MB 493x277 1464513175806.gif)
Linus Torvalds: Free Software Foundation "insane crazy people" Anonymous 09/05/2016 (Mon) 01:53:19 [Preview] No. 6644 [Reply]

We all knew it. Now Linus said it.

In a mailing list discussion about GPL enforcement, Torvalds touches on the pitfalls of involving lawyers in GPL disputes and argues for the superiority of the open source approach, stating: "the people who have created open source and made it a success have been the developers doing work - and the companies that we could get involved by showing that we are not all insane crazy people like the FSF."

Thoughts? Butthurt?
20 posts omitted.

Anonymous 09/16/2016 (Fri) 08:17:07 [Preview] No. 6757 del
Did I walk in on a bunch of shills shitposting at each other?

Did you even read OPs link? Did any of you?

The whole point of the GPL over something like the BSD License is to make the statement "you should be making your contributions public" unavoidable. Once a company is forced to hear this statement, at some point they may realise making their contributions public is the right thing to do, not just morally, but functionally. Once they do, everyone benefits.

It is harmful to the effort to make the GPL dangerous for a company to touch. It is harmful to the effort to weaken the GPL.

I will say the BSD and other OS licences have their uses. In the end, the goal is to promote open software development. It must be gauged by the nature of the software which is appropriate.

Anonymous 09/16/2016 (Fri) 08:27:26 [Preview] No. 6758 del
To add to this, it's kind of like forming a symbiotic relationship. You want to get the most out of the companies without causing net harm to them, because hurting what you rely on is counter productive.

Anonymous 11/03/2016 (Thu) 09:16:52 [Preview] No. 7255 del
>not just morally, but functionally

openbsd and freebsd had their codes contribution back from google, netflix and whatever organizations that believed BSD codes helped their business not because license makes them but because their operation benefits from improvement and continuation of such projects.

> make GPL dangerous for a company to touch

it is meant to have consequences if someone deliberately violates terms of license. You think RMS is just masturbating with his never-ending correction of GPL. Whoever uses GPL is essentially delegating their rights to FSF for more systematic enforcement (that is, monetary backup incase you want to sue someone for not giving back the code).

GPL was bullshit and always will be bullshit just like any other software licenses because our law system is not really tailored for IT sector. Is API copyrightable or not, oracle lawsuit and vmware lawsuit will decide.

> it must be gauged by the nature of the software which is appropriate

sure, no single organization can hire entire developers of operating system right? Or maybe FSF guys are just unpaid interns of intel.

Anonymous 11/07/2016 (Mon) 13:50:45 [Preview] No. 7320 del
(1.45 MB 2538x1755 viralmarketing.jpg)
>Someone suicided because of Linus Torvald very hard critisism isn't it?
no, someone almost suicided because linus was too friendly so he decided not to be a giant faggot anymore.

>Did I walk in on a bunch of shills shitposting at each other?
yes but most of those you linked to were just joking.

let's not forget that linus refuses to make git use sha256 because "nobody would ever put binary files on a git repo so as long as there is no binary in the git diff it's highly unlikely that the hash was bruteforced".
not everything he says is logical or true.

anyway, the solution is in >>7255:
>Is API copyrightable or not, oracle lawsuit and vmware lawsuit will decide.
oracle is or was spreading hardcore anti-GPL FUD.

Anonymous 11/09/2016 (Wed) 04:35:03 [Preview] No. 7330 del
(113.57 KB 800x789 linus-torvalds-4.jpg)
Linus has a SJW daughter. Not everything that comes from Linus is pure.

Illumos-based OSes Anonymous 10/31/2016 (Mon) 18:30:36 [Preview] No. 7226 [Reply]
Anyone using or dabbling in an Illumos-based OS like OpenIndiana?

After 10 years of using Linux (though I used OpenSolaris a little here and there before Oracle killed it), I've been using OpenIndiana as my daily driver.

On the surface, it's a lot like using any Linux distro with MATE. I have access to most* of the tools I'm accustomed to like gcc, TeXLive, Firefox, and VLC.

I'm really not familiar with the under-the-hood features of the OS that come from Solaris, like DTrace and Zones. On the other hand, I never used systemtap or LXC on Linux, either.

OpenIndiana will be putting out updated installation .isos in the near future. In the meantime, you can install with one of the currently available isos and update. If you want to try OI in a virtual machine, be sure to allocate plenty of RAM. 2048MB minimum.

*With the exception of Tor Browser Bundle, which I'd love to have on OI.
15 posts and 4 images omitted.

Anonymous 11/05/2016 (Sat) 06:01:44 [Preview] No. 7300 del
Ok, let's just get into it for a moment:

"The first part of the Solaris code base to be open sourced was the Solaris Dynamic Tracing facility (commonly known as DTrace), a tool that aids in the analysis, debugging, and tuning of applications and systems. DTrace was released under the CDDL on January 25, 2005 on the newly launched website.[15] The bulk of the Solaris system code was released on June 14, 2005. There remains some system code that is not open sourced, and is available only as pre-compiled binary files."

So, the point is: the original code is not on Illumos. Part of the code has been released, but many parts has been re-engineered, that's what Indiana Project is, to reconstruct Solaris, open source.
What's your point?
I was wrong in some parts, yes. And you are wrong too.

>I knew exactly who you were.
Of course you knew, I'm the only one fag that still post in here! I don't bother hidding my typing style from you people, I know you know it's me when I type.

>over and over and over.
actually I only discuss openbsd here with you, it seems. Most part of the threads here I don't even mention openbsd.
But, yeah, I really support the project because: FSF take hundreds of thousands of dollars every year. OpenBSD guys can't even pay for the energy, and they contributed for computing security equally or more than linux dudes in many areas. Redhat and Cisco, for example, use OpenSSH on their systems and don't even donate some coins. Don't you think it's ridiculous? FSF deffend transgender fags and take mountains of money, OpenBSD do hard on security community and can't even pay for the fucking energy.

Message too long. Click here to view full text.

nntpchan user 11/07/2016 (Mon) 10:39:27 [Preview] No. 7312 del
tbph, you two should do a benchmark contest. post & compete services to see who outperforms the other.

then have a crack-me bet: offer a den of crackers some bitcoins to crack your services, and see how they sustain all the attacks.

then come back to this thread with all the results.

far better use of your times.

Anonymous 11/07/2016 (Mon) 12:37:50 [Preview] No. 7315 del
>implying they actually know how to use unix

Anonymous 11/07/2016 (Mon) 12:45:33 [Preview] No. 7317 del
*nix. I don't think they have copies of UNIX or want to benchmark such an ancient thing.

still willing to bet DOS will still beat them.

Anonymous 11/08/2016 (Tue) 16:16:57 [Preview] No. 7327 del

>offer a den of crackers some bitcoin
>some bitcoin
>1 BTC = 712 USD

Front the cash or take your ridiculous idea and insert it into your faggot ass.

(275.43 KB 2508x2043 nntpchan.png)
Anonymous 03/18/2016 (Fri) 17:10:33 [Preview] No. 2365 [Reply]
nntpchan devshit thread, banned from 8/tech/ edition


it's decentralized imageboard federation thing, works great, join today.



Message too long. Click here to view full text.

111 posts and 9 images omitted.

Anonymous 07/17/2016 (Sun) 21:01:26 [Preview] No. 5859 del
Oh my God this place is fast 0.0

Anonymous 07/21/2016 (Thu) 13:57:52 [Preview] No. 5897 del
what's wrong with regular news?

Anonymous 08/19/2016 (Fri) 16:07:03 [Preview] No. 6387 del
So there's a NNTP chan.
How do you connect to read & post with a standard NNTP client, like Tin, Pine, slrn, etc.?
I checked the docs on github page, but it just says:
> Here's how to configure Pan or Thunderbird
> (blank)

Anonymous 08/19/2016 (Fri) 16:24:22 [Preview] No. 6389 del

>I checked the docs on github page, but it just says:
>Here's how to configure Pan or Thunderbird

>August 2016
>not realizing that NNTP chans are equal parts maymay, dismal failure, and vapourware

I kekt fam.

Anonymous 11/07/2016 (Mon) 12:43:57 [Preview] No. 7316 del
>The only ban like it in the board-specific mod.php ban list, has "Shitposting" as a reason, and is for a thread saying "Is my Dig Bick /tech/ worthy?", from four days ago.
lmao, corrupt /tech/ owner allows any kind of shitpost done by shills and pedos but bans any criticism or satire.
do people still use that failure of a board? i don't want to go back there even for a second.

use truly free license, goy Anonymous 11/06/2016 (Sun) 13:41:15 [Preview] No. 7303 [Reply]

Anonymous 11/06/2016 (Sun) 15:01:45 [Preview] No. 7304 del

He has two options:
1 - Release the current code with a free license (I'd suggest use ISC license) and then, after that, create more code and put it as proprietary, so he can make money from it ("commercial purpose")

2 - Put all the code as proprietary

I can't see how it's a relevant thread...

Anonymous 11/06/2016 (Sun) 16:25:02 [Preview] No. 7307 del
>We need to use this in commercial app so a MIT

Found it worthy sharing. Shows what "Microsoft ♥ opensource" truly means.

Anonymous 11/07/2016 (Mon) 01:05:37 [Preview] No. 7311 del
All these pajeets. A stark reminder of why you should avoid SEO-friendly software names.

Machine translation Anonymous 11/01/2016 (Tue) 04:03:47 [Preview] No. 7235 [Reply]
I've been interested in the idea of machine translation (that is, unaided translation by a machine of text from one natural language into another natural language) for years, but I've never really studied it. I have noticed how freely-available translators have improved significantly over the years, to the point that Google Translate does an intelligible job with non-slangy text in a lot of languages.

I don't have a lot of knowledge in this field, I was just wondering if anyone else is interested in it as well. Perhaps we could have an MT general.

The Wikipedia article is pretty good:

It contains a lot of links to articles about various subtopics, like rule-based machine translation and statistical machine translation. Google Translate uses a statistical MT engine, btw.

There's actually surprisingly little in the way of general-purpose free/open-source MT software. By "general-purpose", I mean able to translate or to learn to translate between arbitrary natural languages. A number of open source MT software projects concentrate on translating between two, or a handful of language. I did, however, find Apertium:

which already has data for a few dozen language pairs, several of which are "strong" (i.e. they produce good translations between them).

There's also Moses, which is a statistical MT engine "that allows you to automatically train translation models for any language pair. All you need is a collection of translated texts (parallel corpus). Once you have a trained model, an efficient search algorithm quickly finds the highest probability translation among the exponential number of choices."

Message too long. Click here to view full text.

Anonymous 11/05/2016 (Sat) 02:19:37 [Preview] No. 7297 del
Cool. I'm interested too, but I have no background on any are related to it.
But, from what I've read, there's much more effort today to use artificial intelligence on it, instead of just statistics. I think Cortana and Siri use this.
This are is especially interesting, for me, because it's only of the only areas where a language like lambda-prolog (teyjus) can be used. I really like the concept behind logic programming and functional programming and dependent type machisms or search-based software engineering.

Anonymous 11/05/2016 (Sat) 04:58:07 [Preview] No. 7299 del
(7.94 MB 480x320 packofjews.webm)

>there's much more effort today to use artificial intelligence on it, instead of just statistics.

I've read that as well, but also that there hadn't been much success yet.

>I think Cortana and Siri use this.

Oh? Is there any public information about that? I haven't bothered looking because I figured the technology behind Siri and Cortana would be kept pretty secret.

(20.78 KB 220x221 1349750667734.jpg)
Unfixable vulnerability found on all windows versions Anonymous 11/02/2016 (Wed) 17:13:13 [Preview] No. 7246 [Reply]
5 posts and 1 image omitted.

Anonymous 11/03/2016 (Thu) 17:11:52 [Preview] No. 7264 del

Anonymous 11/03/2016 (Thu) 18:52:26 [Preview] No. 7265 del
maybe it's /pol/, but was shilled not only there.

Massive shilling plus URL-shortener like addresses forcing you to click if no alternative - what could be worser?

t. not pol

Anonymous 11/08/2016 (Tue) 08:59:45 [Preview] No. 7322 del
W^X is an openbsd thing it's basically all files are either write or execute not both...
you should probably go ask someone who uses openbsd more but this is the info i found using it in the past
>t. a fag who only used gentoo/*bsd for 5 days and couldn't find hardening tools...

Anonymous 06/06/2017 (Tue) 23:22:14 [Preview] No. 8543 del
at least he posted the original link. half the using fuckers just post a shortlink. can even use long links like what >>7259 posted. But yeah they need to get rid of cuntflare (maybe switch to a real anti-ddos solution, and save half their money) so their service can actually be useful.

This isn't even a problem for most users since they already run everything as the same user, in which case we can just use WriteProcessMemory and CreateRemoteThread for the same functionality (or one of the million other ways to do the same thing). BTW this situation is no differeent than Linux or any other mainstream OS.

Firstly the article is completely retarded, so let's talk about the actual "disclosure" instead:
>Heading picture leet-haxor.jpg
>script kiddie trash detected
>no actual disclosure
>no CVE
>Any kind of decent application level firewall installed on the computer would block that executable’s communication.
Well no, there are millions of ways to communicate with the rest of the OS and you cannot enumerate them all, and even if you did, it would mean your stupid Application Firewall gives obscure meaningless warnings (with a 99.999% false positive rate) for every possible action a program takes. This reminds me of Comodo's Application Firewall crap, which did exactly this.
>Threat actors! threat actors!!!!
pure cancer

Which "any key" is best? Anonymous 10/25/2016 (Tue) 12:36:57 [Preview] No. 7192 [Reply]
Given that certain keys may do something bad (be that text editing, some hotkey action or something else), which key you consider best for "any key" role? My own favorite been any arrow key, but in some terminals arrow makes bunch of characters. Which key is most recognised as "any key" and does least amount of possible damage, should that key affect something else than application waiting for it?

Anonymous 10/31/2016 (Mon) 16:01:25 [Preview] No. 7224 del
The only keys that don't usually generate characters in terminals are the modifiers (ctrl, alt, shift etc).

But that's because most applications/input libraries don't count them as a keypress alone.

Maybe you just need to be really careful what window you're typing into.

Anonymous 11/03/2016 (Thu) 05:15:26 [Preview] No. 7251 del
Left Shift

one of the standard pm-utils scripts uses it for exactly this reason

Anonymous 11/03/2016 (Thu) 08:53:34 [Preview] No. 7254 del
Obviously Scroll Lock. That is the only key which is guaranteed to not do any harm on any new or old OS.

don't usually =/= least amount of possible damage

(1.14 KB 75x92 openlogo-nd-75.png) Anonymous 08/08/2016 (Mon) 17:14:45 [Preview] No. 6141 [Reply]
>We, the Debian project and the Tor project are enabling Tor onion services for several of our sites. These sites can now be reached without leaving the Tor network, providing a new option for securely connecting to resources provided by Debian and Tor.

>In addition to the Tor and Debian websites, the Debian FTP and the Debian Security archives are available from .onion addresses, enabling Debian users to update their systems using only Tor connections. With the apt-transport-tor package installed, the following entries can replace the normal debian mirror entries in the apt configuration file (/etc/apt/sources.list):

deb tor+http://vwakviie2ienjx6t.onion/debian jessie main
deb tor+http://vwakviie2ienjx6t.onion/debian jessie-updates main
deb tor+http://sgvtcaew4bxjd7ln.onion/debian-security jessie/updates main

>Likewise, Tor's Debian package repository is available from an onion service :

deb tor+http://sdscoq7snqtznauu.onion/ jessie main

Message too long. Click here to view full text.

2 posts omitted.

Anonymous 08/09/2016 (Tue) 15:41:45 [Preview] No. 6159 del
To prevent misunderstanding (even if you did know): the only difference HTTPS makes is that snoopers can't see which packages you're fetching. It doesn't help with authentication because that's handled by the package format.

Anonymous 08/10/2016 (Wed) 11:46:57 [Preview] No. 6167 del
lol Devuan already have this

fucking Debian cucked as always

Anonymous 08/10/2016 (Wed) 12:13:34 [Preview] No. 6168 del
Debian is cucked because they did something your favourite distro did too?

Also, remember that Debian has had support for this since before Devuan.

Anonymous 10/30/2016 (Sun) 20:23:58 [Preview] No. 7222 del
By using plain-text HTTP an attacker could see exactly what software do you use. This is just as serious issue as the authentication.

I would argue that running a malicious software with limited permissions might be less harmful than running a vulnerable one with root access.

If you used HTTPS the MITM attacker would have to correlate your traffic and guess the package size, then reverse-search the software from it, which is much harder and less accurate.

Anonymous 10/30/2016 (Sun) 23:50:32 [Preview] No. 7223 del
A MITM would be able to inject arbitrary data into an unencrypted HTTP connection. That could spell trouble if there is discovered an exploitable bug in the authentication/verification code of the package manager.

Signal Messenger - Gag Order / NSA / FBI TP~* 10/07/2016 (Fri) 00:18:26 [Preview] No. 6992 [Reply]
I told all do not use Signal, Telegram or ChatSecure.

Only Threema ... ( you don't need a mobile phone number or email address ).

New attacks are coming 2017 against all us-american Linux distros, Tor and VPN provider.

Don't trust the silence.
8 posts and 3 images omitted.

TP~* 10/14/2016 (Fri) 20:02:46 [Preview] No. 7115 del
>>But threema is propietary

Yes - the GUI and all features.

The rest is public donain / open sorce and based on NaCI

Anonymous 10/26/2016 (Wed) 08:55:52 [Preview] No. 7199 del
(90.63 KB 474x509 1477472144149.jpeg)
>a literal kike

Anonymous 10/26/2016 (Wed) 16:15:34 [Preview] No. 7200 del

>Moxie Marlinkike

Never trust a white guy with dreads.

It goes without saying to never trust a black guy, dreads or not.

Anonymous 10/27/2016 (Thu) 10:19:36 [Preview] No. 7204 del
>what is libresignal

Anonymous 10/28/2016 (Fri) 02:40:16 [Preview] No. 7211 del
And I'm supposed to trust the closed source nonfree "Threema" over the security of things like bitmessage, ricochet, or TOX?

I'll pass.

(38.57 KB 1000x509 blehbleh.jpg)
Anonymous 10/11/2016 (Tue) 20:45:56 [Preview] No. 7066 [Reply]
Hi goys, i have a silly question. Can i make a desktop PC that is 100% under my control? What i mean by that is: no binary blobs, no proprietary software... basically no stuff that does not respect my privacy.

Hardware at my disposal:
- 2008 Core2Duo 2.8GHz (ME can be disabled on 2008/09 chips IIRC)
- Gigabyte MB supported by libreboot
- GeForce 7900 with 256MB
- everything else is irrelevant

And OS, maybe OpenRC Gentoo?
17 posts omitted.

Anonymous 10/14/2016 (Fri) 16:44:54 [Preview] No. 7111 del
>being allowed
oy vey, obey the rules!

Anonymous 10/14/2016 (Fri) 17:07:42 [Preview] No. 7113 del
Rules affect you even if you choose to ignore them. Not having them is better than having them and ignoring them.

TP~* 10/27/2016 (Thu) 00:49:38 [Preview] No. 7203 del
>>Can i make a desktop PC that is 100% under my control?




Welcome to the world of Raspberry Pi or ITX or ODROID and microSD.

Raspberry Pi Open Firmware + Kali Linux

Message too long. Click here to view full text.

Anonymous 10/27/2016 (Thu) 11:12:13 [Preview] No. 7205 del
>Does/Will it boot Linux?
>Eventually maybe

That's why you don't buy "almost free hardware". Paying companies asking for more proprietary shit with slim chance to get nouveau-tier replacement? Why?

SECURITY CONCEPTS: physical separation. TP~* 09/28/2016 (Wed) 23:21:59 [Preview] No. 6881 [Reply]

credit american express

After many 8chan comments this thread is necessary.

With the next words i show again how powerful we are if we love real SC ( security concepts ).

Who in this world told you only one device, only one laptop, smartphone is allowed?

Are you in the same all-in-one trap?

And who in this world told you one OS in your house need constantly internet connection?

And why is your backup on partition D and not on a physical separated external HDD / SSD?

ppl on 8chan talks daily how dangerous Windows 10 is.

Message too long. Click here to view full text.

8 posts and 2 images omitted.

Anonymous 10/01/2016 (Sat) 14:56:03 [Preview] No. 6922 del
fuck off goy

Anonymous 10/01/2016 (Sat) 14:56:46 [Preview] No. 6923 del
also: >implying xbox games are so shit you need multiplayer for them to be worth your time

Anonymous 10/25/2016 (Tue) 10:26:20 [Preview] No. 7190 del
best bump ever

Anonymous 10/25/2016 (Tue) 13:31:38 [Preview] No. 7194 del
Who in this world told you to




Anonymous 10/25/2016 (Tue) 14:44:42 [Preview] No. 7195 del
don't mind TP, he's our entertainment bot here at /tech/

(33.83 KB 300x302 Td6TRyw.jpg)
Anonymous 09/27/2016 (Tue) 10:05:45 [Preview] No. 6857 [Reply]
Does endchan have rss support ? I could not find anything.

Anonymous 09/27/2016 (Tue) 12:11:38 [Preview] No. 6859 del