>>12473 Fuck. I riced to hard guys... no clue which tweak actually did this... working fine now... fuck! Guess I just try to figure out what part of my system is unstable by guessing randomly after th next few crashes. The stop code is Fucking unlisted... also does anyone have a fix for oldNewExplorer not actually updating windows explorer? It up dated the first element and then all the controls quit working. Now even reinstalling it is giving now results. Also, how how likely is it that messing with adding a PATH system variable to MPV's container might have caused that BSoD?
>>12475 Thank you for that link. I was wondering why I was seeing so many i3 rices and not i3-gaps. That makes sense the github username is airblader the guy seems edgy. But i have been looking at lightweight window managers and on the 2bwm readme they have a neat little chart of the lightest wm's https://github.com/venam/2bwm. Apparently http://hack.org/mc/hacks/mcwm/ is the lightest on RAM.
I Didn't see that rizonrice link in the installgentoo wiki page on ricing which is all I known of. Unfortunatly /r/unixporn is more up to date than the wiki. But I understand the animosity all of this is vanity.
>>12459 i3-gaps, practically the same of i3 except for the... gaps. The .config is totally compatible. I've got a nice setup before I get bored of it, now I'm trying awesome wm and I've to say that's very good. If you know lua and if you know C you basically already know it you can do everything. Literally.
>>12455 I pay for Startmail.com. They gave me an early adopter's discount for the second year of service that was nice. I'm in college still so I basically never use that email. I don't like where Ixquick is taking the Startpage service though so I'm considering dropping them.
In November of 1737, decades before America officially declared its independence from the king of England, a young Benjamin Franklin published an essay in The Pennsylvania Gazette entitled, “On Freedom of Speech and the Press.” In it, Franklin wrote, “Freedom of speech is a principal pillar of a free government; when this support is taken away, the Constitution of a free society is dissolved, and tyranny is erected on its ruins.” Franklin went on to write, “An evil magistrate entrusted with power to punish for words, would be armed with a weapon the most destructive and terrible.”
Although this was written in an article published more than two and a half centuries ago, Franklin’s words are quite possibly more relevant today than they ever have been. Indeed, there is an ongoing effort by the progressive left and extremists such as George Soros to silence speech that doesn’t align with the liberal agenda. This effort to effectively gut the First Amendment is taking place virtually everywhere you look, from the mainstream media, to Hollywood, to college campuses, and perhaps most frequently, across the Internet.
Recently, the popular Internet web browser Mozilla Firefox announced that it plans on joining the fight against what it considers to be “fake news,” a term that to leftists means nothing more than news that is written by conservatives. Mozilla said that it was “investing in people, programs and projects” in an effort to “disrupt misinformation online.”
The first question that every constitutionalist and liberty-loving American should be asking is as follows: How does Mozilla define “fake news?” Are they only talking about suppressing radical websites such as sites run by white supremacists, or are they talking about any news that comes from conservatives? At the very least, it should worry you that companies like Mozilla are often reluctant to thoroughly define “fake news” – it is highly unlikely that this is unintentional.
Furthermore, what exactly gives Mozilla the right or the authority to determine what is misinformation and what is not? The United States Constitution is the law of the land, and the freedom of speech is an inalienable right from God. The fact that Mozilla thinks it has sweeping authority to select which speech is censored and which speech is not runs contrary to everything that America was founded upon.
With the assault on independent media getting increasingly aggressive, many Internet bloggers and website owners are desperately looking for ways they can continue voicing their opinions without being harassed, suppressed or silenced. If you are one of these people, you may want to consider using “Brave,” a relatively new web browser founded by former Mozilla CEO Brendan Eich.
On its website, Brave states that its goal is “to transform the online ad ecosystem with micropayments and a new revenue-sharing solution to give users and publishers a better deal, where fast, safe browsing is the path to a brighter future for the open web.”
It's a shame how inactive this board is. It seems only to be that way because there's about three other chans consolidating the userbase. In the interest of promoting activity, I'll try to make this thread a thread about technology related musings I have (not that I'm important or anything) that could hopefully be used as starting points for discussion.
So I had this plan. Go into technology as an entrepreneur, innovate, and make bank as well as the future. I realized that it would not work in the US. Patent trolls accumulated all the ideas and sue anyone who seemingly comes into conflict with them. Only large and established companies like Microsoft and Google can stave them off and get things done. But you can't work for those companies because not only will you never get into a position of real decision making, but your position will constantly be in danger due to hiring politics and economics. Of course, that's why entrepreneurship is the answer in the first place.
So the only rational choices are to stay put and do nothing, bow to venture capitalists and risk the integrity of your work, or leave for brighter places. I'm leaning toward the last.
Does anyone have an idea of places in the world with burgeoning technology sectors? Besides the usual suspects, and India, that is.
>>12492 Seems like a wet dream than a plan. Work for a small company first. You would need some certificates and sometimes you would also need more than that like a degree. Once you've got more hands on experience, then move on to already existing small tech companies or make your own or work alone. If you're going to make something "new" then avoid China, India (still a horrible bureaucracy), US, and all of Europe under the EPO. Japan might be okay, their antitrust laws are sane, but you need to have lots of credentials to get a job there so it's not really worth it. Where's most of the money at? Webdev. Real boring but practical necessity for any company.
>>12493 US is a sinking ship. I don't have anything close to a tech degree, and even CS graduates aren't guaranteed a job. There's no way I am getting a job soon, and there's no way I am going to advance in the career in a speedy amount of time, which I feel is necessary; nor would I be advancing in a reasonable amount of time, given the large amount of workforce that is already in the market, vying for promotion.
The US makes it very difficult for the not well-off and not well-connected to advance, and I am both. There's virtually no opportunity for me if I stay here.
I won't discuss my plans I have right now, but I feel like there's a way out for me if I just focus on accumulating enough wealth here first, in whatever way I can, then seek opportunity elsewhere.
Blogpost, sorry. My main point is that only full-grown adults have a shot at successful tech entrepreneurship in the US. Everyone else must wait decades for their chance, or else go where there are less restrictions on their activity and less barrier for entry. I don't think we have that much time left.
>Google announced a 72-qubit universal quantum computer that promises the same low error rates the company saw in its first 9-qubit quantum computer. Google believes that this quantum computer, called Bristlecone, will be able to bring us to an age of quantum supremacy.
>Ready For Quantum Supremacy
>Google has teased before that it would build a 49-qubit quantum computer to achieve “quantum supremacy.” This achievement would show that quantum computers can perform some well-defined science problems faster than the fastest supercomputers in the world can.
>In a recent announcement, Google said:
> If a quantum processor can be operated with low enough error, it would be able to outperform a classical supercomputer on a well-defined computer science problem, an achievement known as quantum supremacy. These random circuits must be large in both number of qubits as well as computational length (depth).
> Although no one has achieved this goal yet, we calculate quantum supremacy can be comfortably demonstrated with 49 qubits, a circuit depth exceeding 40, and a two-qubit error below 0.5%. We believe the experimental demonstration of a quantum processor outperforming a supercomputer would be a watershed moment for our field, and remains one of our key objectives.
>Not long after Google started talking about its 49-qubit quantum computer, IBM showed that for some specific quantum applications, 56 qubits or more may be needed to prove quantum supremacy. It seems Google wanted to remove all doubt, so now it’s experimenting with a 72-qubit quantum computer.
>Don’t let the numbers fool you, though. Right now, the most powerful supercomputers can simulate only 46 qubits and for every new qubit that needs to be simulated, the memory requirements typically double (although some system-wide efficiency can be gained with new innovations).
>Therefore, in order for us to simulate a 72-qubit quantum computer, we’d need millions of times more RAM (2^(72-46)). We probably won’t be able to use that much RAM in a supercomputer anytime soon, so if Bristlecone will be able to run any algorithm faster than our most powerful supercomputers, then the quantum supremacy era will have arrived.
>>12425 >job at HebrewPrinting Jel.
Notice the 'Imaging and Printing' positions are in shit locations. Fits the job well.
>Analysis Only if networked, anon.
Open the printer and fix it.
Or build your own libre printer It should fit 11w sheets so both 8x11 and 11x17 can be printed
>>12426 Also during 2018-2019 massive computer security breaches are expected -more cataclysmic than previously (from forecasts a decade in advance based on tech trends). I suspect it will be due to broken AES. NIST are opening up to PQC already which is a portent of a cryptographic SHTF scenario. We've already seen indications of these breaches with Meltdown, Spectre, and Wifi in 2017. I'm cutting out those odd accounts hardly/never used that could possibly be part of a leveraged attack on main accounts. Cloud data users are set to get rained on, hard.
>>12430 >Open the printer and fix it. Printers also doxx you on the printout (with the infamous yellow dots on color printers for example). There is also reason to believe there are fingerprinting methods used in monochrome printers. Such devices are a double-ended botnet.
Just audit the documents and hand type them to airgapped and TEMPEST resistant computers. This is how they do it in nuclear reactors, and presumably at CIA offices with high(est) clearance requirement.
My opinion: the guy from LibreSignal was using the Signal servers, consuming their energy, and using their marketing. This is not right. About the Signal requirement to have google shit, it's very unfortunate. Though, people should just use other thing and stop all this buzz.
>>8931 They keep adevertising that end to end encryption but there's like one client that has it and that's the web/electron based on. The rest are useless, and as someone already mentioned in this thread it's not really federated at the moment.
Just communicate by vibrating air particles. This is also known as talking face to face. Features include:
-Absolutely no botnet
-Safe from CIAniggers (unless you talk to a CIAnigger)
-Audited and mathematically proven
-Messages are scrubbed the moment they are delivered
-Best security ever
And optional benefits:
-Satisfying the natural, human exposure quota
There is "owner" module that allows controlling OUTPUT traffic on per user or per group basis. And if you use separate users for every service running just like you should, you can control every service with iptables. For example permit traffic going to internet for tor daemon user and permit only localhost traffic for everything else.
Start thinking about older hardware and compartmentalization of different tasks onto different hardware units. If you're doing something that doesn't need speed (writing and sending email, text browsing, low impact web/mail servers) use older hardware, if it needs speed (rendering, gaming, 1080p streaming video, number crunching,) then use something modern but only for that task (and for nothing else).
Also assume that you're being keylogged if you're connected to the internet on a modern operating system (including linux and bsd) on a modern hardware machine (Anything >2005). Just operate as if that is true and weigh the implications of your typing and mouse clicks accordingly in your actions online and "Offline".
Also get an airgap for anything that you wouldn't want to share publicly with your boss, spouse, grandmother, neigbour or law enforcement. Make sure you do volume encryption or full disk encryption if you have sensitive data on the airgap. I consider personal financial information ( like taxes, income, planning, purchases, etc) to be in this category that requires an airgap. Anything to do with planning, inventory or income sources ( what books you have in your personal library, how many "things you own", un-booked travel plans etc...), part time revenue etc, stock picking and purchasing plans, business plans, business ideas etc. Do all of that on an airgap. Mainly I'm thinking of personal spreadsheets, and personal text documents, digital photography and personal digital collections (music, pictures, videos, pdfs, etc). Also be sparing in what you share about this information in conversation with other people. Stick to the weather and sports teams.
Also start thinking about low tech ( pen and pad, mechanical typewriters, rotary dial telephones, mechanical locks) to confound some of the more obvious possible entry points for government or criminal hackers to peer into your residence. Keep your blinds up in your study and maybe tinfoil the windows in your 'study'. Also no cellphones. No smart phones. No Alexea, No Siri, No Google Home, no remote home security (don't be a retard). Buy books and things second hand and try to pay in cash (second hand book stores and electronic recyclers).
Making small todo lists should go in a non online hand writen journal, if its sensitive,then put the journal book in a fireproof mechanical safe inside your study, and shred/burn the contents when it is no longer required to keep track of the information. Low tech can beat high tech in the spy game. You loose convienience but you'll gain personal privacy. Just some ideas, feel free to contribute.
Computer Science > Cryptography and Security Title: ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields Authors: Mordechai Guri, Boris Zadov, Andrey Daidakulov, Yuval Elovici (Submitted on 8 Feb 2018)
Abstract: Air-gapped computers are computers which are kept isolated from the Internet, because they store and process sensitive information. When highly sensitive data is involved, an air-gapped computer might also be kept secluded in a Faraday cage. The Faraday cage prevents the leakage of electromagnetic signals emanating from various computer parts, which may be picked up by an eavesdropping adversary remotely. The air-gap separation, coupled with the Faraday shield, provides a high level of isolation, preventing the potential leakage of sensitive data from the system. In this paper, we show how attackers can bypass Faraday cages and air-gaps in order to leak data from highly secure computers. Our method is based on an exploitation of the magnetic field generated by the computer CPU. Unlike electromagnetic radiation (EMR), low frequency magnetic radiation propagates though the air, penetrating metal shielding such as Faraday cages (e.g., compass still works inside Faraday cages). We introduce a malware code-named ODINI that can control the low frequency magnetic fields emitted from the infected computer by regulating the load of the CPU cores. Arbitrary data can be modulated and transmitted on top of the magnetic emission and received by a magnetic receiver (bug) placed nearby. We provide technical background and examine the characteristics of the magnetic fields. We implement a malware prototype and discuss the design
New variants, bad patches, busted microcode & devastated performance. It’s a TechSNAP Meltdown & Spectre check up. Plus Tesla gets hit by Monero Cryptojacking & a dating site that matches people based on their bad passwords…. So we gave it a go!
Researchers say they’ve discovered serious potential vulnerabilities within AMD’s Ryzen and Epyc chip architectures. AMD said it’s taking the reports seriously, though it wasn’t provided sufficient time to investigate or confirm them before their disclosure. CTS-Labs, a security research company which says it specializes in vulnerabilities within ASICs and other chips, has said it’s discovered four potential attacks, code-named Masterkey, Ryzenfall, Fallout, and Chimera. All would require a program running with local access and administrator privileges to exploit them. AMD confirmed it’s been made aware of the potential vulnerabilities. However, the statement AMD provided to PCWorld implied that the company wasn’t given the usual amount of time to investigate the vulnerabilities internally, which is typically about 90 days....
There is speculation (on 8chan and in the final article link) that this is a stock price manipulation attempt against AMD for profit by short sellers. Also Linus Torvalds wrote some skeptical tweets. I'll wait and see what comes out of the research over the next month. I'm skeptical, but its valid news, we'll see how it pans out.
Continuing from >>>/tech/597 https://archive.is/INR3l This is for non specific, general tips for anonymous web browsing and downloads, tips on browsers and browser configurations for the security concious that you don't want to make a new thread for.
>>1126 I didnt make the image I found it on one of the rebeccablack/tech/ archives. Ghostery I still never was crazy about because it is like noscript if it noscript was bloated and didnt work. I always try and remember the addons I am missing when configuring a firefox fork and that was a good image to use back a year or 2 ago. >You can mess with the settings on most apps, repack them, and run them your way instead of having them screw with everything.
That is something I will keep in mind because some addons stop working like "white noise generator" which did what "trackmenot" does but in a seperate window with tabs randomly switching to random webpages.
I have a few suggestions to add to the list adnausium, dolus, tamperdata and http nowhere
I'm pretty sure Ghostery can be analyzed. I saw somewhere recently that they made it open source, so basically you can look through the source code if you want. Might be something worthwhile to do, but isn't necessarily something I would be able to do since I don't know shit about coding.
>>12031 Honeypot. The US Government reserves the right to blackbox any patent its office labels as "significant"; consequently, I wouldn't trust contests they sponsor to design critical technologies if I was such a developer, especially not when the host doesn't believe in the technology being usable for everyone.
>in case non-bullshit "quantum" computing really becomes a thing. It already is a thing. It just requires specialized facilities so needs to be used over the cloud.
>>12416 You do understand there's no license to shitpost in The End℠ right?
There is no true objective winner in the license wars, every public or private license has its own purpose. Having Stallman or Terry won't change how people will always be triggered. If anything, people like you want to take over this board.
Provide me a competent image and have someone else here to agree with you in its implementation and do it ASAP but don't make me wait too long. However, this is really truly a non issue, but the real issue is that I will only allow just one more sticky image change. Get it right this time or I'll remind you all it's your guys' fault and I'll make a new sticky without any OP image and make it an official rule to not bitch about the sticky thread image posthumorously when there's no sticky image to even complain about.
Again, grow up, and if you think Terryposting is spam, report it.
>>11890 For anonymisation I suggest whonix For penitration testing I suggest Backtrack 5r3 For personal use I suggest mint linux or arch linux For linix hardware, if you want to leave microsoft i suggest System76 Or raspberry pi, pitop or piseed
>>11890 Try the Live CD version of many distros without installing, until you find one you're happiest with. Some distros are only 11Mb, others are larger than 4Gb so is case dependent whether it will fit a 4Gb USB drive.
It turns out that MS Windows NT has an 80% market share in the Desktop Operating Systems Market (whatever that is...) So in all likelihood, if you work a job anywhere, you will be forced to sit down and work on one of these machines running this well known gem of an operating system. You probably won't have administrator rights, but that's OK, we'll make do.
In reality there is no Windows security but in this thread we will try to make life a little bit better even if it is just for a placebo effect. Also Windows hackers come and show us how you hack us up real good, and help our poor unprivileged users gain administrator rights without a password, so that they can install Mahjong. Windows Advanced Firewall, Registry Editing, Browsers, etc. Post all the tips and tricks to make Windows NT better than ever.
>help our poor unprivileged users gain administrator rights without a password Quick and dirty hack with backing up and replacing utilman.exe with cmd.exe from anything able to access NTFS without breaking it too much would work well (will give you SYSTEM-privileged command line prompt). But at this point you probably should just use GNU/Linux.
I uploaded a Blue Screen of Death as the the photo for the thread but it didn't upload with the thread...I'm not sure why that is happening. I put a unique files filter on the board but that might be comparing it to a global (board wide) database. I might disable that setting.
The original text read "Turd" but then I read it back and said "That's harsh" and changed it to gem (satire to go with the Blue Screen picture that didn't upload). As for the operating system itself, it works...its semi stable... many people use it.
It's proprietary and Closed source, and the company are known NSA collaborators. So it's probably not a good Idea to run this OS anywhere at all. That said I'm going to make a board for MacOS security later as well, when I setup a Mac OS 10.7 Computer to play around with, I also don't trust MacOS but I'm approaching it from the same philosophy.
I had a very negative experience with using Windows 7 from 2009-2011, when I quit windows due to heavy invasive spying and related harassment. Which is why I full time switched to Linux. I don't recommend Windows at all. But it's everywhere and if you've got lemons make lemonade... I still have to do some things on windows for school... it's sad but true.
So my thinking is, we might as well try to increase the number of people using Tor and firewalling their computers, locking down processes, you can do some of that on Windows, so that at least if people start thinking about security, it it will be easier to transition in the future. Also GnuWin32 and Cygwin are worth mentioning and describing their use and setup.
I certainly don't recommend using windows for anything security sensitive, at all. This thread is more for people to bring them up to power user level, and to help me to learn how how to become a "power user" on Windows and to see what we can do to "lock down" Windows. This thread might be better suited for >>>/h4x0r/. We'll see where it goes.
Also this thread can include information for securing and running ReactOS, which might suit some people's needs as well. I'll set up threads for other operating systems and how to set them up (IllumOS, DOS, etc) , as I bring them online to test a play around with. This will happen over summer, I'm jam packed with school stuff until spring.
Again such boards might go better in >>>/h4x0r/. I'll think about the best way to present the info. Again the focus will be on tip sharing for poweruser stuff (scripting, settings etc) and security (Crypto, filesystems, firewalls, etc) and network communications on each of the operating systems.
>Facebook acquisition of Israeli mobile-analytics company Onavo (a VPN service) >data show in detail how the social-media giant employs it to measure what people do on their phones beyond Facebook's own suite of apps. >"Websites and apps have used market-research services for years," the spokesman said >has been downloaded an estimated 24 million times
How can you achieve any privacy while using facebook, or smartphone in the first place. I mean, talking about privacy on any mobile device is very very stupid. There is a real problem towards ignorance here. How can anyone promote privacy as a quality of an app, when it's impossible to verify, and when the phone itself must be infected by other apps to the bone?
Too bad, that the market actually take advantage of the laziness to know and research of comfort of peoples, ready to give up their privacy for the compangy "they trust".
About monstruous company that gained trust and is seen as "friend", steam is the perfect exemple.
Has anyone researched, in-depth, the Facebook, et al., "SHARE" inserts put on web content by third parties? That is, the "Like Button" and other social media embedded services.
I remember Stallman pointing out that Facebook is able to collect metrics from these anytime, ANYONE, Facebook user or not, visits a site. For the sake of a basic example, logging the IP while performing the GET request for the "LIKE" icon.
I know the concept makes it possible but there is some heavy Java Script behind all this and would be very curious to understand how exactly all that works.
I'm not so familiar with software licenses so I started reading about the subject. At one point the question 'How does one profit from floss software?' popped in my head and these are some articles I came upon (quite outdated, but they still have a point). So GPL prevents companies from making proprietary software with your piece of software. BSD, on the other hand, does not (that's the case with Apple's kernel). Turns out the only way a company can profit from GPL license is by donations, offering support, teaching or dual licensing. Dual licensing seems like the most used option.
>But there is a net effect on software development. Who makes money off GPL code? We go back to Novell and Red Hat, who test and package this software. And we see a trend–GPL code helps software testers make money. It helps QA people. It helps the people who answer the support phones. It helps everybody except software developers. Oh, maybe Google will pay them a salary as a goodwill gesture. But it’s really, really hard to make money from developing FOSS. You can make money supporting it. You can make money testing it. But no money developing it.
So my question is - does free software actually benefit the developer?
>>10510 >I'm not so familiar with software licenses so I started reading about the subject. At one point the question 'How does one profit from floss software?' popped in my head and these are some articles I came upon (quite outdated, but they still have a point). I had similar concerns and so I did my own research on the matter. I found this one guy's 2006 blog who btfo GPL as far as I'm concerned.
It's as you say: you must provide support or dual license. What the FSF and OSI get wrong is that proprietary does not automatically mean closed source, and 'proprietary' is not inherently wrong. Here's a quote from Richard Stallman that shows a flaw in the design of GPL for making money.
>With free software, users don't have to pay the distribution fee in order to use the software. They can copy the program from a friend who has a copy, or with the help of a friend who has network access. Or several users can join together, split the price of one CD-ROM, then each in turn can install the software. A high CD-ROM price is not a major obstacle when the software is free.
Don't forget project orchestra.
> Play GPL vs BSD card
I'm in favor of GPL, because I find it scandalous that some companies will take free works to make money.
But seriously, don't lose your time on these kind of issue. Licencing can't be general but have to be thought case by case. That's it.
Some people might use this to make everyone lose time, and to deceive.
>>10510 >no money developing Your snip is full of shit, anon.
Software "Freedom" is about assurance as are all experiences. Everything else follows.
Nothing is stoping developers from selling their libre/floss++ warez.
Essential Property Rights:
0. Use it (Redundancy)
1. Study it (Assurance)
2. Change it (Ownership)
3. Share it (Liberty)
In this order, you can offer more and more control to the person using a product or service. The 'use' of a product or service is redundant; without 'use', there is no experience to "benefit" from. Studying how a product or service functions is essential to providing assurance that a product or service is fucntioning as advertised; without 'study', there is no knowledge, only trust. Changing or altering a product or service encourages and further establishes ownership; 'change' is the only thing that stays the same and, without it, there is only the nothing. Sharing a product or service reinforces the product or service's value through its continued usefulness; without 'share', communities would never form and civilization would die out.
>>10510 >no money developing Your snip is full of shit, anon.
Software "Freedom" is about assurance as are all experiences. Everything else follows.
Nothing is stopping developers from selling their libre/floss++ warez.
Essential Property Rights:
0. Use it (Redundancy)
1. Study it (Assurance)
2. Change it (Ownership)
3. Share it (Liberty)
In this order, you can offer more and more control to the person using a product or service. The 'use' of a product or service is redundant; without 'use', there is no experience to "benefit" from. Studying how a product or service functions is essential to providing assurance that a product or service is functioning as advertised; without 'study', there is no knowledge, only trust. Changing or altering a product or service encourages and further establishes ownership; 'change' is the only thing that stays the same and, without it, there is only the nothing. Sharing a product or service reinforces the product or service's value through its continued usefulness; without 'share', communities would never form and civilization would die out.
>Meltdown mitigation is coming to OpenBSD. Philip Guenther (guenther@) has just committed a diff that implements a new mitigation technique to OpenBSD: Separation of page tables for kernel and userland. This fixes the Meltdown problems that affect most CPUs from Intel. >When a syscall, trap, or interrupt takes a CPU from userspace to kernel the trampoline code switches page tables, switches stacks to the thread's real kernel stack, then copies over the necessary bits from the trampoline stack
Very good news. Let's see the performance impact. As undeadly contributor said, help test the snapshots from 22 february. Here (check the SHA256, please - use install62.fs for usb stick or install62.iso for CD-ROM):
>>12420 >linux does any crap diff because is employed on too many servers >the diff reduces 50% of the performance, making servers owners waste much more money on energy >bsd makes it simple, clean and secure. Take time, but it's did not messed too much with the kernel and is pretty verifiable for possible bugs/exploits. >So far, no notice of performance impact, from what I know
You see, your argument is not so valid. Linux and BSD are different and users have different needs.
What's the safest possible way to browse the internet anonymously and safely? There's a thread on /tech/ with the endwall developer talking about proxychains, and that seems pretty cool. Some of the links to proxy lists seem dead, and I have found some online but why should I trust these random 'free' proxies?
What about proxychains over VPN? I'm currently using Mullvad which is alright, and I'm curious about more security if need be. Does a VPN -> proxychain -> TOR connection work? Sounds horribly slow in theory, but I think we all know that privacy comes at a cost in our current world.
I suppose I could call this a 'VPN/proxy/TOR general thread.'
One thing people will notice but never say is that normies WANT TO USE VPNS THEY THINK THEY CAN USE ONE ON A PHONE.
Look at android and itunes top apps paid and free. Those lists are LITTERED with BULLSHIT VPN apps that DO NOTHING for privacy. Hypocrites. Anyone who says "lets microchip everyone I aint got nothing to hide" They do they are hiding behind that talking point instead of an actual opinion. Somehow the media has convinced the people to want to ban vpns while the top apps for mobile are vpn apps aside from games and shit like tinder.
These cucks want all they microchips laws to go through. They think hola free vpn .apk is going to hide them as they downvote something they are supposed to downvote. Look at chrome extentions firefox extensions. All browser fingerprint spoofing.Look at the most torrented proprietary software. All virus protection programs like mcaffe and norton antivirus.
they think that they are not supposed to use vpns or shit that actually works. A bunch of incognitos pretending they dont need privacy. They dont need privacy now that being a pathetic homosexual that does nothing but pout about liberal nonsense is the ideal citizen.
>>1120 Perhaps the most loud are the most unaware. I would bet my money the ones who care know anything about VPNs aren't dumb enough to yell and scream about muh terrorists or such. Or atleast there may be a little overlap.
>>1124 Ah mate, I'm on your side, there's been some miscommunication. What I meant was the age old "vocal minority" being the loudest, while the majority quietly enjoys their lot, with a slyly opportunistic smirk.
Endware is a suite of programs geared towards internet privacy, security, and anonymity.
Endwall: endwall.sh is an iptables based firewall script designed to be implemented on any linux distribution shipped with iptables. endwall.sh is based on default drop policies, coupled with a novel strategy of passing packets on local host ports only for those enabled by the enduser. It comes with a variety of well used ports enabled with several additional port passing configurations available by uncommenting the script. It provides essential security to a new user.
Endsets: endsets.sh is a script that adds blacklisting and whitelisting functionality to endwall.sh. It depends on the program ipset. It is persistent on reboot if you enable ipset as a service. This is the recommended blacklisting tool for endwall if you are running a server or planning on opening up ports and services to the public and will require daily blacklisting of new incomming IPs.
Endlists: endlists.sh is a traditional text file list based blacklisting and whitelisting script. It has slow performance, and can't be updated on the fly. Good for <1000 ip subnets, very tedious and slow to run for more than that. Blocks the IPs by adding them as individual rules to the iptables ruleset. Works but not recommended for heavy duty on a server. May be useful for workstation use to block ip ranges if you are not opening up ports and services to public clients.
Endtools: endtools are a collection of scripts including alogz.sh, mlogz.sh, spamlogz.sh and iplookup.py. These scripts will help to service an enduser of endwall in adminstering endsets/endlists.
iplookup.py is a geoiplookup script written in python and requires python and pygeoip. It has simmilar functionality to maxmind's geoiplookup program and uses the maxmind *.dat files.
spamlogz.sh is a script that searches through log files to find flagged log entries flagged in endwall.sh, endsets.sh and endlists.sh.
alogz.sh is a daily log reading script designed to read the output of an apache http server's log output.
mlogz.sh is a daily log reading script designed to read the output of a postfix smtp server's log output.
Proxyload is down again (I noticed this 2 weeks ago). They changed something with the website. I'll look at this next weekend.
I fixed some channels in endstream and added some stuff to endradio.
I spruced up rmpac-files so that the user just needs to capture the error output of pacman -Su, but doesn't need to edit the file as it will jump to the proper line automatically. It now asks you for deletion confirmation.
I also made a windows version of endstream called winstream as a batch file it's in prototype stage and works with the windows version of youtube-dl and mpv, it needs some sprucing up, but it's low priority. I made this to play news at school on the windows computers with the projector screens, it works well enough.
>>1138 Please keep the commentary in this thread to Endware discussion. As this note might be falsely attributed to Endwall. I didn't write it.
I don't know anything about this information. I assumed it may have been a recommendation for me to try the Bastille Linux script or a notice about its status... I looked around and didn't find anything in the news about any status changes or problems with it... I'm not sure what this is about.
Please post information and notifications of this type in Online Security News, or in the Internet Security General. And possibly follow up with a link or source backing up the information. Thanks.
>When can I buy a lowRISC SoC? >As with most tech projects, the most accurate answer is “When it’s ready”. >We are expecting to crowdfund an initial instantiation of the lowRISC platform during the course of 2017.
I'm pretty sure the lowRISC FAQ said 2016 last year. It didn't happen, obviously, and it was changed to 2017, but we're running out of that, too. Ten weeks left, boys. Is a lowRISC SoC vaporware for another year?
At what point do we start looking to the J-x processors based on Hitachi's SuperH architecture? The last SH-4 patents are expiring this year.
>>12350 >why RISC chips always run so fucking hot ARM is RISC and run really cold. I don't think that a issue is RISC. Power was constructed primarilly for servers, so it will have more cores running, more L1 cache entries, so on.
>How is it that x86 has gotten around this? From what I know, adaptative methods. For example, the clock and voltage adapts to the need of the user.
>>12350 >dev board >not for enthusiasts it's exactly for enthusiasts, unless by enthusiasts, you mean the kind of enthusiast artist that buys Crayola instead of watercolor. HiFive is offering a modern computer, on an entirely new, unexploited platform, for us to program, all for a measly grand. The opportunity here is huge, and poorfags are gonna dismiss it just cuz it's not China cheap and includes proprietary parts.