/tech/ - Technology

A Technical Place

Boards | Catalog | Bottom

Check to confirm you're not a robot
Drawing x size canvas

Remember to follow the rules

Max file size: 350.00 MB

Max files: 5

Max message length: 4096

Crash Firefox on Linux via Notification API Anonymous 09/12/2017 (Tue) 13:34:22 [Preview] No. 11064 [Reply] [Last 50 Posts]

Anonymous 09/12/2017 (Tue) 21:11:49 [Preview] No. 11071 del
firefox crashes very well on its own thank you very much

Anonymous 09/13/2017 (Wed) 02:08:57 [Preview] No. 11073 del

(45.36 KB 2000x770 amd.png)
(((Intel))) is RIP Anonymous 07/09/2017 (Sun) 22:01:37 [Preview] No. 9599 [Reply] [Last 50 Posts]

AMD told us in their AMA on reddit yesterday that they'd consider Coreboot/Libreboot support. We should do something to let them know we're interested, because this would be a game changer.
9 posts omitted.

Anonymous 08/17/2017 (Thu) 06:17:45 [Preview] No. 10781 del

Anonymous 08/17/2017 (Thu) 07:12:41 [Preview] No. 10782 del
Wow, not going to lie, this just got my hopes waaay up.

Anonymous 08/17/2017 (Thu) 07:17:26 [Preview] No. 10783 del
You bumped a 5 week old thread for that no-content comment?

kys, faggot

Anonymous 08/17/2017 (Thu) 07:20:58 [Preview] No. 10784 del
>kiss yourself
thanks, pretty proud.

Anonymous 09/12/2017 (Tue) 23:27:56 [Preview] No. 11072 del

(1.52 MB 640x360 nyan gnu.webm)
Anonymous 09/12/2017 (Tue) 15:52:57 [Preview] No. 11065 [Reply] [Last 50 Posts]
Had to move my desk to the other side of the room and now everything feels cramped, awkward and unergonomic as fuck and my autism is flaring up.

How long will it take me to relearn how to comfortably use my computer?

Anonymous 09/12/2017 (Tue) 16:29:01 [Preview] No. 11066 del
It depends on so many variables, probably no more than 3 months. If you really have some degree of autism or asperger, I suggest you reduce the maximum cognitive effort you can, so you can adapt faster. For example, remove other objects from the desk, put the chair against a wall (so you don't feel as someone is watching you).
You don't just adapt to, but also, in this case, nurture the experience around you. So, besides removing things you don't need, try to maintain the same things from before the change and then gradually change (again), until you adapt to it. It works similarly as "cold turkey" vs "gradual removal" on drugs.
You can also use behaviorism: every time something bothers you, and you can't change it, give some punitive measure to yourself. Read more on behaviorism and create your own protocol.
You can also use hormesis and spaced repetition: every time you feel unconfortable, give it a break, go drink some green tea, look at the trees, then you go back.

Privacy of DNA Testing Anonymous 09/10/2017 (Sun) 00:47:26 [Preview] No. 11061 [Reply] [Last 50 Posts]
Would you do it?

I wouldn't, but seems really interesting for nutrigenomics:

Anonymous 09/10/2017 (Sun) 03:34:33 [Preview] No. 11062 del
(74.51 KB 800x600 143948591274.jpg)
I'm not going to watch the video, but if it's referring to 23-and-me or Ancestry.com and those other DNA testing services, no. Their privacy protections are so flimsy that they're practically nonexistent.

In addition, like the recent Equifax breach reminds us (140 million people's sensitive personal financial info stolen), sensitive data is not safe in the hands of centralized third parties. These big DNA testing providers will be breached, and the DNA information of millions of people will be leaked.

I'm waiting for something like the Bento Lab to become available and reasonably affordable.


By reasonably affordable, I mean in the $500 range. That's not pocket change to me, but I think I know enough people who would be interested in having their DNA tested but also don't trust the big services that I could get them to help subsidize a kit.

I think home biohacking is going to be producing some weird and wild stuff in the next 20 or 30 years, including some pathogens of interest to bioterrorists.

We're in for a wild ride.

Learning the PE Header, Malware Detection with Minimal Domain Knowledge Anonymous 09/06/2017 (Wed) 09:26:44 [Preview] No. 11029 [Reply] [Last 50 Posts]
Many efforts have been made to use various forms of domain knowledge in malware detection. Currently there exist two common approaches to malware detection without domain knowledge, namely byte n-grams and strings. In this work we explore the feasibility of applying neural networks to malware detection and feature learning. We do this by restricting ourselves to a minimal amount of domain knowledge in order to extract a portion of the Portable Executable (PE) header. By doing this we show that neural networks can learn from raw bytes without explicit feature construction, and perform even better than a domain knowledge approach that parses the PE header into explicit features.

An interesting approach to malware detection. For the next McAfee. Hey, when you're down in Guatemala in your jungle mansion, banging supple Latina teenagers, remember me, ok?
9 posts and 3 images omitted.

Anonymous 09/08/2017 (Fri) 01:27:41 [Preview] No. 11048 del
>Breaking apart post by sentence
Perhaps you don't understand the forums' purpose. If you want to discuss wikipedia articles, there are better places that permit you to pretend to be doing something. HN is one such place that might suit you better.

PDF is interesting and adds more evidence to coming age of ML. Fortunately (or unfortunately if you refuse to learn) ML you'll be left behind as a metasploit monkey and etc., if you work in another field. No doubt some of the more wealthy AVs are already testing basic ML instead of regular hashes to check for warez. It seems like a much more efficient process than sandboxing a suspected snippet and running a sim.

Anonymous 09/08/2017 (Fri) 04:09:24 [Preview] No. 11050 del
<Not breaking apart post by sentence
Where exactly I've cited wikipedia? I think you're confused anon.

Anonymous 09/08/2017 (Fri) 06:08:19 [Preview] No. 11051 del
malware detection = enumerating badness

Anonymous 09/08/2017 (Fri) 14:21:11 [Preview] No. 11052 del
>In this work we explore the feasibility of applying neural networks to malware detection and feature learning.
buzz buzz buzzword. why do we care about some minor innovations to goy tech? the single one justification for antivirus to exist is that it purges outbreaks on machines owned by the goy who run outdated software and open untrusted executables (these people will have already have had their info stolen by the time the antivirus is updated to have a signature for such malware). it does not offer any security or any useful attribute to anyone who knows what they're doing. in particular, using NN to "detect malware" is just another heuristic full of false positives and will be once again, trivial to bypass.
PDF is worse than HTML in every way
inb4 >muh typography!11
>Fortunately (or unfortunately if you refuse to learn) ML you'll be left behind as a metasploit monkey and etc
is this what people conclude when they reason on the level of memes?
>AVs check for warez
what did he mean by this
>It seems like a much more efficient process than sandboxing a suspected snippet and running a sim.
confirmed for not having a clue what you're talking about

Anonymous 09/08/2017 (Fri) 18:56:08 [Preview] No. 11059 del
I see you have missed my wordplay. What you're doing is parroting information that brings nothing new to this discussion, but only regurgitations of ideas that can be found directly on the wikipedia articles of these topics.
I would like all peoples from lainchan to please go back and learn from the beginning how to properly form sentences. Thank you. If you would like a serious discussion on my lack of understanding or the paper at hand, please initiate, otherwise you are worse than the boy who still visits and exudes neopets etiquette.

Anonymous 08/07/2017 (Mon) 23:22:13 [Preview] No. 10579 [Reply] [Last 50 Posts]
What do you use for temporary anonymous file hosting? I'd like something like pantsu used to be.

Anonymous 08/08/2017 (Tue) 01:37:26 [Preview] No. 10582 del
Just look up pantsu clones and choose one.

Anonymous 08/08/2017 (Tue) 01:38:12 [Preview] No. 10583 del
I use minfil (dot org) and cocaine (dot ninja):
<can use curl to upload

Anonymous 09/08/2017 (Fri) 00:40:44 [Preview] No. 11045 del
OnionShare https://onionshare.org/
If you want to share some non-zip files, you can easily edit resources/html/index.html to your taste.

DolphinAtack: Inaudible Voice Commands Anonymous 09/02/2017 (Sat) 08:40:52 [Preview] No. 10987 [Reply] [Last 50 Posts]
Speech recognition (SR) systems such as Siri or Google Now have become an increasingly popular human-computer interaction method, and have turned various systems into voice controllable systems(VCS). Prior work on attacking VCS shows that the hidden voice commands that are incomprehensible to people can control the systems. Hidden voice commands, though hidden, are nonetheless audible. In this work, we design a completely inaudible attack, DolphinAttack, that modulates voice commands on ultrasonic carriers (e.g., f > 20 kHz) to achieve inaudibility. By leveraging the nonlinearity of the microphone circuits, the modulated low frequency audio commands can be successfully demodulated, recovered, and more importantly interpreted by the speech recognition systems. We validate DolphinAttack on popular speech recognition systems, including Siri, Google Now, Samsung S Voice, Huawei HiVoice, Cortana and Alexa. By injecting a sequence of inaudible voice commands, we show a few proof-of-concept attacks, which include activating Siri to initiate a FaceTime call on iPhone, activating Google Now to switch the phone to the airplane mode, and even manipulating the navigation system in an Audi automobile. We propose hardware and software defense solutions. We validate that it is feasible to detect DolphinAttack by classifying the audios using supported vector machine (SVM), and suggest to re-design voice controllable systems to be resilient to inaudible voice command attacks.
4 posts and 1 image omitted.

Anonymous 09/03/2017 (Sun) 03:35:54 [Preview] No. 11007 del
Another reason why voice-activation is not ready to be used, and is a major security hole. They already save recordings of your voice, and this just adds onto the bullshit.

Anonymous 09/03/2017 (Sun) 05:07:51 [Preview] No. 11008 del
I remember reading an article from some security conference about extracting data from infected computer through inaudible sound signals, perfect for some airgapped machines. This is basically the opposite, you can send commands with data streams, and since it runs proprietary voice recognition software, you may consider it a malware.

Anonymous 09/03/2017 (Sun) 18:19:33 [Preview] No. 11013 del
This isn't scary stuff at all. It's exactly what's expected when you try and use algorithms on the real world. Only consumerist robots fall for idiotic technology like "biometrics" and "voice control". The same will happen for self-memeing cars (well it already has happend with both Lidar and Tesla).

Anonymous 09/05/2017 (Tue) 10:28:23 [Preview] No. 11024 del

Anonymous 09/06/2017 (Wed) 03:44:20 [Preview] No. 11028 del
(406.15 KB 1100x1335 2017-08-23-addie-weed.jpg)

In essence, yes, but I think that technically TEMPEST is just about shielding and preventing the interception of natural side-channel information that results from computing, i.e. a system's normal EM emissions, sound production, etc.

If I remember what anon is referring to correctly, it was a computer that was actually infected with malware that was designed to exfiltrate information from the computer using sound, so it wasn't about purely passive interception. A successful attack of this kind would require getting your malware onto the machine first. It was a neat proof of concept, though.

(13.06 KB 150x120 tuz-logo.png)
Linux has been pozzed Anonymous 09/02/2017 (Sat) 17:02:41 [Preview] No. 10991 [Reply] [Last 50 Posts]

A stand-idn mascot that has appeared in the latest Linux kernel isn’t intended to push out the traditional penguin named Tux but to benefit the plight of the Tasmanian devil.

A meat-eating marsupial, the devil is bordering on extinction as the animal has been ravaged over the past decade by a transmittable cancer, one of only two known in the world. The devil is found only in the Australian island state of Tasmania.

Tuz was the mascot for January’s Linux conference in Australia, which was held in Tasmania and where the show’s annual charity auction was dedicated to raising funds to research devil facial tumor disease (DFTD).

DFTD over the past decade has wiped out up to 50% of devils, known for their offensive odor when under stress and their loud and disturbing screech.

5 posts omitted.

sage Anonymous 09/02/2017 (Sat) 20:44:36 [Preview] No. 11001 del

sage sage 09/02/2017 (Sat) 21:08:33 [Preview] No. 11002 del

Anonymous 09/02/2017 (Sat) 21:20:24 [Preview] No. 11003 del

Excellent saging.


Anonymous 09/02/2017 (Sat) 21:46:33 [Preview] No. 11004 del
(6.77 KB 308x164 RC.jpeg)
Sage bombing run ...


sage Sage 09/03/2017 (Sun) 03:33:13 [Preview] No. 11006 del
(96.38 KB 1024x681 Sage.jpg)

(99.67 KB 1280x720 video_wuc.jpg)
Anonymous 08/30/2017 (Wed) 17:44:56 [Preview] No. 10940 [Reply] [Last 50 Posts]
In a move to increase diversity in the bitcoin community, bitcoin.org updates its branding to include images of goat people. One of the latest moves in what /pol/ is calling, "a clampdown on the internet".
1 post omitted.

Anonymous 08/30/2017 (Wed) 22:24:05 [Preview] No. 10942 del
(57.11 KB 720x552 retarded-jap.jpg)
Since when the bitcoin is a national currency?
The funder of bitcoin is Satoshi Nakamoto, so I don't actually understand, if we had to chose any nationality, why is there americans/europeans/arabs and not only japaneses on this pic.
I'm against multiculturalism but your point is retarded.

Anonymous 08/31/2017 (Thu) 05:42:44 [Preview] No. 10950 del
I believe OP was not being post-ironic in his meanings.

Anonymous 08/31/2017 (Thu) 22:38:28 [Preview] No. 10969 del
Why have you reported on these revelations as if they are a malicious change?

Increasing diversity is not bad, it attempts to include all races of people using the service, if it was only one specific race using the software, images depicting diversity would not be needed, but the fact that all races use the internet means that they should all be represented. If all of the people in the picture were white, it would piss off everyone else. If they were all black, it would piss off everyone else. The internet is a medium where ones actions are of more importance than ones ability, if you act stupid, your going to be treated badly regardless of race.

Including people in the logo was a mistake, it should simply be the typical bitcoin logo with some decorations around it.

Anonymous 09/01/2017 (Fri) 20:16:56 [Preview] No. 10977 del
>If they were all black, it would piss off everyone else
Not as much, and even if it did it'd piss different groups off, but I agree with your main point.
Not to mention that most people there are still white, so really /pol/ is bitching about nothing.
I think too often people see something that's not "pro-X" as somehting that's "anti-X". Which is naturally what happens with idpol.
sage since nothing of this has to do with /tech/

Anonymous 09/02/2017 (Sat) 16:56:57 [Preview] No. 10990 del
b-but there is no Uyghur representation in that picture

(21.56 KB 500x500 sxj9bJ7.jpg)
Anonymous 09/01/2017 (Fri) 02:18:04 [Preview] No. 10971 [Reply] [Last 50 Posts]
>email provider offers onion imap and smtp
>the certificate doesn't include the onions
What's her name /tech/ ?
2 posts and 1 image omitted.

Anonymous 09/01/2017 (Fri) 21:48:02 [Preview] No. 10978 del
What about the the part between the exit node and the server ?

Anonymous 09/01/2017 (Fri) 22:38:23 [Preview] No. 10981 del
Wow rude.

Anonymous 09/01/2017 (Fri) 23:14:35 [Preview] No. 10982 del
Tor hidden services do not use exit nodes. They are within the Tor network and do not need to exit from it. Therefore, no exit node.

What's rude is making an OP that is nearly incomprehensible and contributes nothing to the board.

Anonymous 09/02/2017 (Sat) 01:14:56 [Preview] No. 10984 del
OP here, I just realized I'm retarded. Sorry everyone.

Anonymous 09/02/2017 (Sat) 04:03:58 [Preview] No. 10986 del
It's alright, bro. We're with you. We all do dumb shit sometimes.

For example, I got married.