Catalog of /tech/

Bottom

Mode: Thread

Max file size: 350.00 MB

Max files: 5

Remember to follow the rules

Max message length: 4096

R: 162 / I: 25 / P: 1

/tech/ - Technology

Welcome to /tech/, a technology board. This board is for discussion of technology, both software and hardware.

Wiki: https://wiki.installgentoo.com/
IRC: #/tech/, #InfinityNow and #endchan on irc.rizon.net - https://qchat.rizon.net/

NSFW files are only allowed if they are spoilered. Tech support, consumer advice and desktop/ricing threads are all allowed for now.

All rules and policies are open for discussion in this thread.

You can view the logs in a less annoying way at https://8ch.tech/endlog/tech.html (available for all boards).

Related boards:
>>>/markov/
>>>/os/
>>>/lv/
>>>/desktops/

R: 7 / I: 11 / P: 1

Webm thread

Post your /tech/ related webms

R: 48 / I: 12 / P: 1

BSD Thread.

Let's have a thread about the permissive, copyleft style of operating systems known as BSD.

Discussion of Free,Net,Open,Dragonfly,Edge *BSD is welcome!

Linux and FSF users who would rather complain about licencing and that linux is better need not apply.

NEWS:

FreeBSD Quarterly Status Report: https://www.freebsd.org/news/status/report-2016-04-2016-06.html

Vulns found in freebsd-update and portsnap: https://lists.freebsd.org/pipermail/freebsd-security/2016-July/009016.html

OpenSSH 7.3 Released: http://www.openssh.com/txt/release-7.3


Reminder that OpenBSD 6.0 is being released September 1st, 2016.
Open

R: 17 / I: 2 / P: 1

DIY, Modular, Open source Laptop

Laptop form factor open source hardware design, built from off the shelf components for DIY, modular, open source computing.

CPU, RAM, graphics: 1x single board computer
FSB, ports: 2x powered USB hub
Battery: 1x USB powerbank, >5000 mAh, >2A
Input: 1x USB keyboard
Input: 1x USB trackpad
Storage: 1x USB flash drive
Network: 1x USB WiFi dongle
Audio: 1x USB sound card/headset
Display: 1x USB powered HDMI monitor
Case: 3D printed or DIY glued wooden case

Features:
-Completely modular, customizable, upgradeable and repairable
-User serviceable by all users
-Universal, modular battery and charger. Can swap battery when depleted
-Low cost
-Completely open source

Suggestions for the display? It is the least commonly available component. USB DisplayLink would be more convenient, but it is not open source.

R: 17 / I: 5 / P: 1

Compilers

Can someone, please, "red-pill" me in compilers. Particularly, C compilers.
Why use anything besides GCC? What's the difference between all of them?
Open

R: 3 / I: 0 / P: 1

crypto fails meta thread

https://research.kudelskisecurity.com/2017/01/16/when-constant-time-source-may-not-save-you/

curve25519-donna implementation by google is susceptible to timing attack as MSVC runtime's 64bit multiplication is nonconstant time operation in x86 environment.

R: 20 / I: 1 / P: 1

Pocket CHIP

Does anyone here have experience with the Pocket CHIP, or the CHIP in general? As an option for mobile computing it seems much cheaper than things like the Dragonbox Pyra and OpenPandora, but much more powerful/useful than a chroot on an Android touchscreen device. Is it good? Are there similar computers?

R: 4 / I: 0 / P: 1

Opera neon

https://youtube.com/watch?v=t4MikGVvQOA [Embed]

This looks absolutely horrific

R: 24 / I: 3 / P: 1

Why haven't you installed gentoo yet?

.
Open

R: 20 / I: 1 / P: 1

Tor

https://blog.torproject.org/blog/whats-new-tor-0298
>Single Onion Services for muh "i don't need anonymity"
>decentralized RNG for muh cryptography wonders
>removing "tap handshake" old stuff in favor of ntor
HYPE

>meanwhile block bypass still gonna eat your post and say "fuck you" to uncommon browser

R: 4 / I: 0 / P: 2

Someone is claiming that all files currently encrypted with OpenSSL have been salted to make them insecure:
https://zerobin.net/?06dae5d45335d2b4#m8FRD5qfMgH1rxjVH4oAjHvOMxJArCGp9UIogpmsnHg=
Open

R: 12 / I: 2 / P: 2

"Open Source Bitcoin Mixer"

R: 3 / I: 0 / P: 2

I'm running an instance of Tokumei that some of you wanted, I do not host the tor SFTP anymore.

https://torvalds.xyz/

Its pretty much anonymous microblogging with freedom of speech intended. Go mad.

R: 9 / I: 1 / P: 2

Which chan engine is the best, in terms of extensibility and performance?

R: 29 / I: 6 / P: 2

Desktop R8 or H8 thread

No desktop thread? Lets fix that.

I'll start with my laptop

R: 1 / I: 0 / P: 2

IPFS THREAD

/ipfs/Qmayhdhd5ajcGtx9AsdTWBXyNKtu148rzgaxo9QkDLJdwZ

R: 47 / I: 6 / P: 2

LynxChan 1.8

What is LynxChan?
LynxChan is a chan engine developed with performance, efficiency and flexibility in mind. It powers several chans ( http://lynxhub.com/lynxchan/res/285.html ) and contains a number of community-created front-ends ( https://gitgud.io/LynxChan/LynxChan-ThirdPartyFrontEnds ).
It offers a number of features, including:
-File deduplication, saving bandwidth, disk space and allowing users to post files without uploading them.
-Overboard, aggregating posts from the whole site on a single place so users can browse more easily.
-Multi-board, allowing users to aggregate posts from only selected boards.
-Extensive anti-spam and anti-flood tools that aim to both impede and reduce damage without inconveniencing users.
-Add-on support, which enables features to be added without the need for a fork.
-Modular front-end and language pack allows for the site owner to customize it without having to change the actual software.

LynxChan 1.8 main addition is multi-lingual support.
This feature allows site owners to specify alternative language packs and front-ends and associate languages to them.
When an user visits the site, the engine seamlessly picks an available language from the user and serves content in that language.

This version brings some other minor features so far:
-More granular and specific verbose modes.
-A terminal command to perform a clean shutdown of the engine.
-A board setting that allows for a maximum age that threads are allowed to be bumped.
-Improved spammer and TOR ips storage.

This version will be released 03/17, LynxChan can be found at https://gitgud.io/LynxChan/LynxChan.
Open

R: 21 / I: 0 / P: 2

IT-Ebooks is dead (ITT: Textbook thread)

So recently http://it-ebooks.info/ has gone offline.
Where do you find ebook libraries, /tech/?
(And don't tell me about Gentoomen Library,
i already have cold storage of them)

R: 15 / I: 5 / P: 2

IRC PLZ

What is best IRC client and why is it HexChat

R: 39 / I: 16 / P: 2

Hax0r Thread

R: 12 / I: 1 / P: 3

>both nyaa and tokyo use cloudflare even for their rss feeds
>don't want to torrent through tor but I would like some method of getting my chink cartoons without fucking myself.

Can someone torpill me ? Can I use xdcc through tor ?

Can rtorrent's options for sending a different ip be trusted ? Will this work with forced encryption ?

R: 65 / I: 3 / P: 3

I have a whole free week on my hands and i want to make most of it by installing a fresh new distro. Since i value /tech/'s opinion, tought i'd ask you guys.

Been using Linux Mint fot a year, but now i want a distro that is clean and not full of software i don't need (like Mint is). Can't decide between Debian or Arch, help me maybe? I kinda have a life, so if Arch is really that high maintenance, it's out of the picture.
Open

R: 15 / I: 1 / P: 3

Is Signal a threat to Free Software?

https://blog.grobox.de/2016/is-signal-a-threat-to-free-software/

My opinion: the guy from LibreSignal was using the Signal servers, consuming their energy, and using their marketing. This is not right.
About the Signal requirement to have google shit, it's very unfortunate. Though, people should just use other thing and stop all this buzz.

R: 25 / I: 2 / P: 3

ZeroNet

R: 4 / I: 1 / P: 3

How is /tech/ going to hide from satellites?

>Over 2000 satellites in orbit
>Many can take pictures and communicate with the government

How will you go about hiding from them when 1984 v2 comes?

R: 2 / I: 0 / P: 3

iBoss is Botnet

Why the fuck does this stupid filter even exist? On work provided computers, this shit is integrated into the computer and tracks your location constantly and you can't end it's process in the task manager/monitor.

At the same time, it is always using your network regardless of your internet browser being opened or not.

R: 10 / I: 1 / P: 3

Deleting Old Accounts

What's the best way to go about deleting old accounts on websites I no longer use? I don't want my info available if these websites get hacked. A lot of sites don't have the option to delete your account yourself. Should I email their support and ask them to delete my account? That will leave an email record if their email ever gets hacked. Should I just leave these sites alone and hope for the best?
Open

R: 4 / I: 1 / P: 3

Intel Active Management Technology

https://web.archive.org/web/20161129150603/http://hackaday.com/2016/11/28/neutralizing-intels-management-engine/

tl;dr backdoor does not verify integrity properly
>endchan cookieless posting unfucked when
Open

R: 26 / I: 5 / P: 3

ex/ploit/ General

In an attempt not to bump off important threads from >>>/tech/ I hereby propose the first exploit general thread

Post any new and old exploits you would like to discuss.

For perfect RSS/ATOM digests in one thread
Open

R: 409 / I: 20 / P: 3

Internet Security

Post Tips for anonymous web browsing and downloads. Tips on browsers and browser configurations for the security concious.

R: 4 / I: 0 / P: 4

What are some good /tech/ podcasts you would recommend ?

Now I know these is a generic question and I can just google and meme out a list of worthy podcasts but I'm more interested in what people here watch.

R: 2 / I: 0 / P: 4

Smalltalk

Is the world ready for system based on the ideas of Smalltalk and Xerox Parc? Most of us run a unix derived OS like Linux or Mac OS X. Why not use the better ideas from the 70s instead of Unix?
>inb4 too slow

R: 14 / I: 1 / P: 4

copperheadOS is a hardened open-source operating system based on Android and focused on privacy.

https://copperhead.co/android/

Any experience with it?
I just now heard about it and am thinking of trying it out.
They say it's only available for Nexus 9, Nexus 5X and Nexus 6P, but on their website have a Nexus 5 render, what's up with that? Can i install it on Nexus 5 or not?

R: 12 / I: 2 / P: 4

FUCK BIG AMERICAN ISPS
U
C
K

B
I
G

A
M
E
R
I
C
A
N

I
S
P
S
Open

R: 0 / I: 0 / P: 4

Talos Secure Workstation

>https://www.fsf.org/blogs/licensing/support-the-talos-secure-workstation-by-december-15th-1
>https://www.crowdsupply.com/raptor-computing-systems/talos-secure-workstation
>$426,150 raised of $3,700,000 goal
>2 days left

ayy

extra kek at Raptor Engineering website with
>No pages or files may be distributed without express written permission.

R: 3 / I: 0 / P: 4

Going off the grid (relatively speaking)

I'll soon be moving into a new flat, and haven't gotten a contract with an ISP yet.
However, since it is still possible in my country to buy prepaid SIM-cards and reload them (~1$/GB) with cash, I'm contemplating just rolling with that and limiting my Internet consumption.

I would use it stationary, and the city I'm using it is densely populated, so there are many base stations. Wikipedia tells me that E-OTD could yield my position with an accuracy of 25m, even less if my modem cooperates using GPS/Wi-fi signals.

That's not quite safe enough, so I might use a VPN in Panama or somewhere that I'd pay for in Bitcoin, and configure an OpenWRT router to connect to it by UMTS.

Is there something I should look out for in order not to identify myself?
What kind of open hardware would you recommend for the router and modem?

R: 5 / I: 1 / P: 4

As far as i'm concerned end/tech/ is one with the most quality content /tech/ of them all, but it's not really that active as we all know, and i don't think it should be as active as 4chan or 8chan /tech/, but there are sometimes weeks without any new content. Makes me sad.

So what i'd like to know is if there are any other tech/sec/priv related places you follow on a, lets say, weekly basis? Freedom of speech is also important, because i want to be able to say what's on my mind, be it jews, niggas or fags (i'm looking at lainchan here). Be it on the clearnet or some darkweb, doesn't matter, although it would be nice if it had a .onion link. This may seem a silly question, but i have to say, i really value your opinion goys.

R: 3 / I: 1 / P: 4

LynxChan is now standards compliant

[09:44am] OdiliLap: http://endchan.xyz/POLAK/res/1.html#q13
[09:44am] OdiliLap: maybe having lynx deal with a robots.txt
[09:46am] StephenLynx: you can upload your own robots.txt.
[09:46am] StephenLynx: to gridfs, that is.
[09:46am] StephenLynx: just like the
[09:46am] StephenLynx: favicon
[09:46am] StephenLynx: now
[09:46am] StephenLynx: it wouldn't be practical to do that for each thread
[09:46am] OdiliLap: but BOs want to manage it
[09:46am] StephenLynx: but I don't see a point to do that for each thread either
[09:46am] OdiliLap: per board
[09:47am] StephenLynx: why they want to do that?
[09:47am] OdiliLap: they don’t want their board on google or the boards list
[09:47am] StephenLynx: how is that of their concern?
[09:47am] StephenLynx: they can already remove from the board list.
[09:47am] OdiliLap: you already have an option to hide it from the boards list
[09:48am] OdiliLap: so you’re giving them a right to privacy
[09:48am] OdiliLap: you need robots to enforce that
[09:48am] StephenLynx: hm
[09:49am] StephenLynx: the problem is
[09:50am] StephenLynx: the system robots.txt uses is not a standard.
[09:50am] OdiliLap: what do you mean?
[09:50am] StephenLynx: there isn't an actual standard dictating how robots.txt works.
[09:51am] OdiliLap: lies
[09:51am] OdiliLap: http://www.robotstxt.org/
[09:51am] StephenLynx: that is a convention.
[09:51am] OdiliLap: http://www.robotstxt.org/orig.html
[09:51am] StephenLynx: documented convention.
[09:51am] StephenLynx: still not an actual standard.
[09:52am] StephenLynx: >The latest version of this document can be found on http://www.robotstxt.org/wc/robots.html.
[09:52am] StephenLynx: 404
[09:52am] StephenLynx: >It is not an official standard backed by a standards body, or owned by any commercial organisation.
[09:53am] StephenLynx: > It is not enforced by anybody, and there no guarantee that all current and future robots will use it.
[09:53am] StephenLynx: so yeah, nah
[09:53am] OdiliLap:
[09:53am] StephenLynx: you can write your own robots.txt and disallow boards if you wish.
[09:53am] OdiliLap: I can’t wait to stop using lynxchan
[09:53am] StephenLynx: kek
[09:54am] StephenLynx: or
[09:54am] StephenLynx: you could take about 5 minutes
[09:55am] StephenLynx: and save a robots.txt to gridfs
[09:55am] StephenLynx: and add boards the BO asked you to do that.
Open

R: 41 / I: 6 / P: 4

end/tech/ is dead

I told you.

R: 28 / I: 9 / P: 4

HOMESCREEN THREAD

Anyone?

R: 5 / I: 0 / P: 5

/tech/ related info

/tech/ INFO DUMP

Because sometimes you just want to share something noteworthy without creating a new thread.

R: 22 / I: 5 / P: 5

Tokumei 1.0 Release Party

Tokumei is an anonymous microblogging platform written in rc using werc. Today marks the official release of version 1.0 and we're hosting a party on mumble! Come crash it :)

Details: https://tokumei.co/party

R: 14 / I: 4 / P: 5

Why .onion, why not.garlic?

R: 1 / I: 0 / P: 5

Hi there, you seem to have stumbled upon a Illegal Freedom Area, oops!

Help is on the way. Big brother loves you.

Our agents are en-route to provide assistance. Take two green capsules and try not to worry. Failure to do so will result in prosecution for criminal drug evasion. Be sure to click the Facebook share button below!

R: 7 / I: 2 / P: 5

It's World Emoji Day! Teen girls, code an emoji that's unique like you.

R: 8 / I: 0 / P: 5

Servo

Now that servo nightly builds are out how much till someone makes something like pentadactyl for it ?

t. retard

R: 4 / I: 2 / P: 5

FUCK_YEAH!!

they've used google translate and google reverse image search against google captcha

http://www.cs.columbia.edu/~polakis/papers/sivakorn_eurosp16.pdf
Open

R: 1 / I: 0 / P: 5

TinyWM implementation in Nim

Open

R: 7 / I: 1 / P: 5

Senate rejects FBI bid for warrantless access to internet browsing histories

R: 7 / I: 2 / P: 5

Anonyfi: OpenBSD plug and play router

Pretty cool:
http://anonyfi.com/

"With advance VPN service and simple UI AnonyFi offers Anonymity, Reliability, Security and stability by simply plugin the box to your standard ISP Router"

Features:
- OpenBSD
- Auto-update
- PF firewall
- DNScrypt
- Adblock
- Squid proxy
- DNS caching
- "Advanced VPN"

Seems good for me.
>site's running Apache, not openbsd's httpd(8)
>muh

R: 92 / I: 21 / P: 6

Infinity /tech/ VN Projekt

>Who are you?
I am a anon who has decided to help setup a development server for this project.

>What is this?
Quoting from the about page of this project [http://sicpvn.sdf.org/index.html] .

"The concept came from 4chan /jp/ in January 2009.

Reference: https://archive.is/563XI

Meme Magick saw it revived on 8chan /tech/ in September 2015. Development is ongoing.

Reference: https://archive.is/9Xk6j

Here is what was discussed in 2009 (please note that this is a concept and the final script may be entirely different):

>Sussmanashi no Naku Koro ni (すさまなしのなく頃に, Susamanashi no Naku Koro ni, commonly abbreviated as SNAK) is an adult Japanese visual novel developed by /prog/ which will be released as a limited edition on January 3rd, 2038 playable on the PC. Sussmanashi no Naku Koro ni began as a series of prelude short scenarios in the /prog/ fandisc SICP no Shana. The gameplay in Sussmanashi no Naku Koro ni follows a plot line which offers pre-determined scenarios with courses of interaction, and focuses on the MIT course 6.001 and the book Structure and Interpretation of Computer Programs (SICP).

>Sussmanashi no Naku Koro ni incorporates actual slides from the 6.001 lectures and SICP exercises which have to be answered correctly in order to get the good ending.

>SNAK centers around the period in which the protagonist, Grun Ur, enters the Massachusetts Institute of Technology (MIT) after moving to America from Japan. Most of the main stories revolve around the magical Y combinator and its powers.

Here are just a few screenshots from 2009. There is limited storage space using this entirely free SDF hosting, until we upgrade this member account. We'll be donating to the SDF as soon as possible and recommend that you consider it also!"

>How do I get in contact
Project website - http://sicpvn.sdf.org/index.html

project email - sicpvn@cock.li

>cock.li

To quote from the 8chan /tech/ thread.

"As you may know, cock.li got pawned again. If you email me consider that the FBI is read
Open

R: 8 / I: 0 / P: 6

Browser whitelist?

Hi /tech/. I convinced a school to let me deploy some Linux distributions.

How can I set the web browser (insert yours here) to only allow access to white-listed domains and ip addresses. In Internet Explorer/Edge it is pretty simple with a few clicks. But how can I do it in other browsers?

Requirements: only stock browser functions should be used. No third-party software or plugin.

R: 3 / I: 0 / P: 6

Anyone here buying an EOMA68?

R: 6 / I: 0 / P: 6

Is it safe to assume KDE Fiber is dead? The developer hasn't made any posts about it for over a year now.

R: 12 / I: 1 / P: 6

Is Assange alive?

http://yournewswire.com/julian-assange-missing-internet-outage/

>London City Airport was evacuated at the same time as his internet outage duo to a "chemical scare"
>@wikileaks tweets saying "HILP HIM"
>HC wanted to "drone him"
>Some kind of heavily armed police outside of embassy
>Asking @wikileaks to verify themselves by signing a statement with his PGP private key results in blocking you
>And now he's missing

R: 5 / I: 0 / P: 6

Javascript is not bad, you are

I decided to give my spin on a comic commenting how every solution in js is a problem.

R: 21 / I: 3 / P: 6

new nntpchan frontend software goes into beta testing :^)

overboard page: http://beta.oniichanylo2tsi4.onion/betachan/

R: 4 / I: 1 / P: 6

Matasano/Cryptopals crypto challenges

A few years ago, I heard about the Matasano crypto challenge. Matasano was (still is?) an infosec company, and they ran this crypto challenge through email. I never got around to trying it, and when I tried to find it again recently, I discovered that they've made the challenge available at https://cryptopals.com/

Here's a summary:

>We've built a collection of 48 exercises that demonstrate attacks on real-world crypto.

>This is a different way to learn about crypto than taking a class or reading a book. We give you problems to solve. They're derived from weaknesses in real-world systems and modern cryptographic constructions. We give you enough info to learn about the underlying crypto concepts yourself. When you're finished, you'll not only have learned a good deal about how cryptosystems are built, but you'll also understand how they're attacked.

No advanced math is involved.

Anyone here worked through any of the challenges before, either when it was an email thing or since they've all been published at Cryptopals?

Anyone want to give them a shot?
Open

R: 12 / I: 1 / P: 6

Benchmarks of Endchan

Have there been any benchmarks that list the total number of posts per second that are capable (at least in perspective of this current hosting and etc)?

R: 83 / I: 4 / P: 6

I've setup a sftp hidden service for anyone to use. My setup is just a raspberry pi, with an DM-Crypt LUKS 500 GB hard drive.

nrx6xclfhmpj7qiz.onion:41080
User: gentoo
Password: XFR%eto1J{oi${&[W#cgGMSM!

My Tox
7F826DCDF6522702ED0159A3C9D783775EBE7B189F681FE2435446169B06A2609043A87B9C2D

All nonce shit will get deleted.
Open

R: 3 / I: 0 / P: 7

Remove feature = fix a bug

http://lwn.net/Articles/705896/
>did not remove metadata from images embededed in PDF documents
>been fixed in version 0.5.2-3+deb8u1. This update disables PDF support in MAT entirely.
ayy

R: 2 / I: 1 / P: 7

In what situation would I need to tumble my bitcoin? I mean if law enforcement did not know what my bitcoin public keys where but I also had a large sum of money going into a bank account under my name how could they find out if I got that bitcoin legal or not?

R: 25 / I: 2 / P: 7

Linus Torvalds: Free Software Foundation "insane crazy people"

https://lists.linuxfoundation.org/pipermail/ksummit-discuss/2016-August/003580.html

We all knew it. Now Linus said it.

In a mailing list discussion about GPL enforcement, Torvalds touches on the pitfalls of involving lawyers in GPL disputes and argues for the superiority of the open source approach, stating: "the people who have created open source and made it a success have been the developers doing work - and the companies that we could get involved by showing that we are not all insane crazy people like the FSF."

Thoughts? Butthurt?

R: 37 / I: 0 / P: 7

I was using archive.is to get a better view on sites that rely on javascript and now they've enabled CloudFlare which require javascript.

Is there any alternative to it ?

R: 20 / I: 5 / P: 7

Illumos-based OSes

Anyone using or dabbling in an Illumos-based OS like OpenIndiana?

After 10 years of using Linux (though I used OpenSolaris a little here and there before Oracle killed it), I've been using OpenIndiana as my daily driver.

On the surface, it's a lot like using any Linux distro with MATE. I have access to most* of the tools I'm accustomed to like gcc, TeXLive, Firefox, and VLC.

I'm really not familiar with the under-the-hood features of the OS that come from Solaris, like DTrace and Zones. On the other hand, I never used systemtap or LXC on Linux, either.

OpenIndiana will be putting out updated installation .isos in the near future. In the meantime, you can install with one of the currently available isos and update. If you want to try OI in a virtual machine, be sure to allocate plenty of RAM. 2048MB minimum.

https://www.openindiana.org/

*With the exception of Tor Browser Bundle, which I'd love to have on OI.

R: 116 / I: 9 / P: 7

nntpchan devshit thread, banned from 8/tech/ edition

explanation:

it's decentralized imageboard federation thing, works great, join today.

source:

https://github.com/majestrate/nntpchan
https://github.com/majestrate/srndv2

nodes:

https://nsfl.tk/
https://i2p.rocks/ib/
http://oniichanylo2tsi4.onion/
http://ucavviu7wl6azuw7.onion/
(your node here?)
Open

R: 3 / I: 0 / P: 7

use truly free license, goy

R: 2 / I: 1 / P: 7

Machine translation

I've been interested in the idea of machine translation (that is, unaided translation by a machine of text from one natural language into another natural language) for years, but I've never really studied it. I have noticed how freely-available translators have improved significantly over the years, to the point that Google Translate does an intelligible job with non-slangy text in a lot of languages.

I don't have a lot of knowledge in this field, I was just wondering if anyone else is interested in it as well. Perhaps we could have an MT general.

The Wikipedia article is pretty good:

https://en.wikipedia.org/wiki/Machine_translation

It contains a lot of links to articles about various subtopics, like rule-based machine translation and statistical machine translation. Google Translate uses a statistical MT engine, btw.

There's actually surprisingly little in the way of general-purpose free/open-source MT software. By "general-purpose", I mean able to translate or to learn to translate between arbitrary natural languages. A number of open source MT software projects concentrate on translating between two, or a handful of language. I did, however, find Apertium:

https://www.apertium.org/

which already has data for a few dozen language pairs, several of which are "strong" (i.e. they produce good translations between them).

There's also Moses, which is a statistical MT engine "that allows you to automatically train translation models for any language pair. All you need is a collection of translated texts (parallel corpus). Once you have a trained model, an efficient search algorithm quickly finds the highest probability translation among the exponential number of choices."

Neat!

http://www.statmt.org/moses/

R: 9 / I: 1 / P: 7

Unfixable vulnerability found on all windows versions

Open

R: 3 / I: 0 / P: 7

Which "any key" is best?

Given that certain keys may do something bad (be that text editing, some hotkey action or something else), which key you consider best for "any key" role? My own favorite been any arrow key, but in some terminals arrow makes bunch of characters. Which key is most recognised as "any key" and does least amount of possible damage, should that key affect something else than application waiting for it?

R: 7 / I: 0 / P: 8

onion.debian.org

>We, the Debian project and the Tor project are enabling Tor onion services for several of our sites. These sites can now be reached without leaving the Tor network, providing a new option for securely connecting to resources provided by Debian and Tor.

>In addition to the Tor and Debian websites, the Debian FTP and the Debian Security archives are available from .onion addresses, enabling Debian users to update their systems using only Tor connections. With the apt-transport-tor package installed, the following entries can replace the normal debian mirror entries in the apt configuration file (/etc/apt/sources.list):

deb tor+http://vwakviie2ienjx6t.onion/debian jessie main
deb tor+http://vwakviie2ienjx6t.onion/debian jessie-updates main
deb tor+http://sgvtcaew4bxjd7ln.onion/debian-security jessie/updates main

>Likewise, Tor's Debian package repository is available from an onion service :

deb tor+http://sdscoq7snqtznauu.onion/torproject.org jessie main


https://bits.debian.org/2016/08/debian-and-tor-services-available-as-onion-services.html

https://onion.debian.org/

https://onion.torproject.org/

R: 1 / I: 0 / P: 8

some friend recommend me today to install some shit to reformat my usb now I'm kinda paranoid bout viruses right now,
I have no sleep in days
And i think this is a good option to do this

http://alternativeto.net/software/herdprotect/
Open

R: 13 / I: 4 / P: 8

Signal Messenger - Gag Order / NSA / FBI

I told all do not use Signal, Telegram or ChatSecure.

Only Threema ... ( you don't need a mobile phone number or email address ).

New attacks are coming 2017 against all us-american Linux distros, Tor and VPN provider.

Don't trust the silence.


https://whispersystems.org/bigbrother/eastern-virginia-grand-jury/

R: 23 / I: 0 / P: 8

Hi goys, i have a silly question. Can i make a desktop PC that is 100% under my control? What i mean by that is: no binary blobs, no proprietary software... basically no stuff that does not respect my privacy.

Hardware at my disposal:
- 2008 Core2Duo 2.8GHz (ME can be disabled on 2008/09 chips IIRC)
- Gigabyte MB supported by libreboot
- GeForce 7900 with 256MB
- 2GB DDR2 RAM
- everything else is irrelevant

And OS, maybe OpenRC Gentoo?

R: 3 / I: 0 / P: 8

QR code generation

Anyone know a good software package that generates QR codes? I'm sick of using shitty online generators but can't find an alternative.

R: 13 / I: 2 / P: 8

SECURITY CONCEPTS: physical separation.

@AMERICAN EXPRESS

credit american express

After many 8chan comments this thread is necessary.

With the next words i show again how powerful we are if we love real SC ( security concepts ).

Who in this world told you only one device, only one laptop, smartphone is allowed?

Are you in the same all-in-one trap?

And who in this world told you one OS in your house need constantly internet connection?

And why is your backup on partition D and not on a physical separated external HDD / SSD?

ppl on 8chan talks daily how dangerous Windows 10 is.

But ... how dangerous is W10 really if you are NEVER online with Windows 10 - not one second.

https://www.ifixit.com/Guide/IBM+Thinkpad+T60+Wireless+Card+Replacement/13018

:)

Think about - whats your own ideas of physical separation?

Here is what i do:

Xbox360 = games ONLY here. Never online with my Xbox ( OS firmware updates with a usb drive ).

ThinkPad / Lenovo = productivity ONLY here. Never online. AIR GAP

https://www.wired.com/2014/12/hacker-lexicon-air-gap/

Smartphones = always online. 100% with Qualcomm SoC. Download all software, drivers for Windows 10 with my smartphone. I am not longer online with a laptop, game console and so on.

Private files, software + projects = external Seagate HDD


Naked stuff = external Sandisk usb drive.

How? How do you attack, steal, copy my files if my external storage and laptop ( no network card ) is never online?

What did you learn in 1 minute?

Separate physical all you can ...

Destroy your anti-security all-in-one thoughts. Don't centralize your digital life.

No one can see your files inside your external HDD or what you do on your laptop if you are ...


OFFLINE

You need one OFFLINE linux, bsd, apple, microsoft workstation if you are a security lover.

R: 2 / I: 0 / P: 8

Does endchan have rss support ? I could not find anything.

R: 10 / I: 4 / P: 8

Penumbra Lynx - LynxChan front-end

Penumbra Lynx is a fork of DuneCoon`s branch of 8TailedLynx.

It has been the favourite LynxChan front-end for most people ever since it`s creation. and now I took it for maintenance.

Currently it supports all engine versions from 1.4 to 1.7.

I have not only fixed bugs and upgraded it to support newer versions of the engine but also organized the code, added version tags to the repository and cleaned the source code.

And some features were added too, like hiding and quick reply.

It`s repository can be found at https://gitgud.io/LynxChan/PenumbraLynx

R: 12 / I: 0 / P: 8

Does Torproject.org still support anonimity?

I have been offline for a while, can someone tell me what happened? Can you explain the screenshots above?
Open

R: 22 / I: 3 / P: 8

I'm relatively new to *NIX systems and everything related to them and the one thing I have learned so far is that there are no objective answers to any given question. Figuratively everyone will respond with some vague sentence like "You have to try them [GNU/Linux distributions] and decide for yourself what best suites you."
So, I'm asking you, Anon, to tell me all the pros and cons of the popular GNU/Linux distributions (or at least give me a link to some resource where I can actually read about that).

R: 1 / I: 0 / P: 9

> https://demo1.clearos.com:81
> username: get
> password: clear

I am here to confess.
I was the one who broke it. I am sorry. Can someone ask them to reinstall?
Open

R: 7 / I: 0 / P: 9

CVE-2016-5195

Open

R: 13 / I: 0 / P: 9

I have a raspberry pi hosting a mumble server from my home. I bought a domain name and issued an ssl cert to it but since I have a dynamic ip I have to also use a ddns.

Simply, what I want to know is this:

My IP <-> mydomain.duckdns.org(ddns) <-> mumble.mydomain.tld(ssl cert)

Will my ssl cert on mumble.mydomain.tld encrypt the connection, including when it goes through the ddns to connect to my IP? I don't fully understand this black magic.
Open

R: 5 / I: 0 / P: 9

XMPP man-in-the-middle via tor

https://tech.immerda.ch/2016/03/xmpp-man-in-the-middle-via-tor/

We saw some wide-spread XMPP man-in-the-middle via malicious tor exit nodes during the last 24h. The attacks where only targeting starttls connections on port 5222. The mitm served forged self-signed certificates for various Jabber domains, one of them being our imsg.ch. The attack was orchestrated between multiple exit nodes acting in sync. All of them served the same set of forged certificates, allegedly created around midnight March 2nd to 3rd, using common names tailored to various XMPP servers.
Open

R: 5 / I: 0 / P: 9

Online stores with malware

https://gwillem.gitlab.io/2016/10/14/github-censored-research-data/

wew, not only Github, but Gitlab are censoring shit

>https://news.ycombinator.com/item?id=12712648
kek at those cucks defending censorship

tl;dr
>internet stores have malware installed, you are not supposed to know which ones
Open

R: 6 / I: 0 / P: 9

Backdoors into encrypted communications**may soon be mandatory in Russia

http://www.dailydot.com/politics/encryption-backdoor-russia-fsb/

A new bill in the Russian Duma, the country's lower legislative house, proposes to make cryptographic backdoors mandatory in all messaging apps in the country so the Federal Security Service*the successor to the KGB*can obtain special access to all communications within the country.

R: 22 / I: 3 / P: 9

Mariana's web

Have you been to the Mariana's web? :^)

R: 4 / I: 0 / P: 9

MAC Address Spoofing

...Ceruleancerise
MAC Filtering Bypass
10/13/16(Thu)17:02:12 No.57061853
57 KB
57 KB JPG
Hey /tech/
Im looking for a wi-fi extender/router/hotspot that can spoof its MAC Address to connect to a network, and my devices which cant be spoofed connect to that instead.
Any suggestions? Thanks!

R: 13 / I: 2 / P: 9

guys i think somthig went wrong i can't favorite anymore, the button should turn red and it stays white, what the fuck am i gonna do

R: 6 / I: 0 / P: 9

Orfox

R: 9 / I: 0 / P: 10

Is there something like a command line ebook reader ?
Open

R: 1 / I: 0 / P: 10

Data dumps

What is a good place to get data dumps? Preferably specifically the ClixSense dump.
Thanks!
Open

R: 27 / I: 2 / P: 10

Silly technology questions thread

Let's get started. Why Gentoo's emerge shows smiley?

* apg-2.3.0b.tar.gz SHA256 SHA512 WHIRLPOOL size ;-) ... [ ok ]
Open

R: 1 / I: 0 / P: 10

you know this is

R: 42 / I: 10 / P: 10

16CHAN IS KILL, REFUGEES INCOMING

16CHAN IS KILL
REFUGEES INCOMING

Josh announces 16chan is kill, gives a shout-out to Endchan. 16chan refugees incoming!

>Hi.

>I'd rather not see 16chan die a slow death from neglect so I am going to humanely put it down.

>At the moment, I do not have the time, energy, or financial resources to give the love and attention that a community or open-source project needs to grow.

>I appreciate everyone who stuck around during the life of the board and I enjoyed talking and collaborating with people just as weird as I am. I'm sorry I don't have what it takes to bootstrap this. I originally started 16chan as a place to showcase the software and it grew just a little heart because it had something special. With Ron now adequately approaching 8chan's issues using a playbook I contributed to, that something special is no longer so unique.

>If you're genuinely out of a place to go, big shoutouts to https://endchan.xyz (because of Drybones) and https://freech.net/ (because of Oman).

>I have a dream that involves this place. Until I collapse, I will work towards achieving it, and when I have my resources together I will see it to completion. It pains me too much to let it languish in the state it was in.

>Until next time my friends,
Josh

http://archive.is/AmR97
https://16chan.nl/

R: 14 / I: 0 / P: 10

FTP sharing - /g/ftp

FTP file sharing thread

IP: ftp://joelixny.gq
/Media is read only, upload to / or create a new dir.
Please keep things organized.
Speed: 250/30
Data: 6TB

IP2: ftp://install:jackal@ftp.installgentoo.com/
Install Gentoo FTP

IP3: ftp://weebftp.org
Upload to /Upload
Download FTP, only 20GB upload space.
Speed: 75/75
Data: 20TB

Join #/g/ftp at irc.rizon.net for help, requests, or just chatting.

R: 12 / I: 1 / P: 10

SECURITY CONCEPTS: Blacklists

@NSA

credit NSA

As a security expert i know that we can't read now, analyse, talk about 100 000 attacks BECAUSE if we know what kind of parts could be ABUSED in any system we know exactly what we have to protect and don't need the next years 5000 "relevant" security news. Give me time, let me find the right words.

We FAIL, the whole time if we not change our thoughts far far away from technical details.

We are now in the same famous trap. Details instead of concepts. Tech instead of logistic.

If you understand what a SC ( SECURITY CONCEPT ) is you always know what you have to do with any OS. No matter if its Windows, Linux, BSD, OS X, Android and so on. You are never helpless in all situations.

From now on you think as hard as you can and right NOW one word only one is the center of your life: CONCEPT

The concept of a blacklist:

We believe that we KNOW the enemy. We DEFEND some ...

In fact: we are waiting and waste our time.

The concept of a whitelist:

We HANDLE ANYTHING as potential act of foreign enemy. We CONTROL all ...

In fact: we start to PREVENT and don't waste our time who could be our next threat.

Nearly any form of an blacklist is an illusion - all what we do is tellin our enemy how dumb we are.

If our enemy understand we CONTROL ALL 99% give up.

And here is the first SC that you have to learn: WHITELIST

- WHITELIST Firewall Mode
- WHITELIST Applications
- WHITELIST Ports
- WHITELIST OS Services
- WHITELIST Network Protocols

And so on ...

And of course the ExcludeNode in your Tor torrc configuration is also a negative blacklist.

1000 times better is EntryNode + ExitNode

So you use a bunch of Tor servers that you trust.



You can WHITELIST many things.

For incoming calls or in Threema:

"Nothing from UNKNOWN ppl."

So if a mobile phone number is not in your contact list you will never hear a ring tone or see a push notification.

WHITELIST all you can.
Open

R: 12 / I: 4 / P: 10

Javascript, the language where every solution is a new problem

From:
http://web.archive.org/web/20160618171639/http://cube-drone.com/comics/c/relentless-persistence

Problem: Javascript has almost no standard library. Solution: Thousands of community-supported libraries of wildly varying quality. Problem: Javascript has no packaging or a linker to tie those packages together. Problem: Javascript won't run outside the browser. Solution: V8 Problem: Javascript is single-thread by design. Solution: Asynchronous programming, node.js Problem: Callback Hell Problem: The DOM is too slow for video games. Solution: Canvas Problem: Javascript is too slow for video games. Solution: Use an assembly-like subset of Javascript called asm.js Problem: asm.js is basically unwritable by humans. Problem: Prototypal Inheritance is pants-on-head stupid. (That's right, I said it) Problem: Web resources need to be minified and zipped for performance. Solutions: Hundreds of community supported build tools of wildly varying quality. Problem: Grunt Solution: Gulp Problem: Gulp Problem: Machine-generated code is more difficult to debug. Problem: Async is still a nightmare, huh? Problem: Ballooning project size and complexity. Problem: Output runs very slowly on mobile devices. Problem: Javascript still doesn't do everything. Solution: Electron, PhoneGap, FireFoxOS ---- Cube Drone and Miloslav are digging in a giant hole. Cube Drone: How is digging going to get us out of this hole? Miloslav: Where I am from, the point of digging is not freedom from digging.

Problem: Compiled code isn't interpreted code, even if it compiles to interpreted code. Solution: Grunt watch Problem: Promises Solution: IOUs Problem: Javascript is a toy language that was tied to a document markup and somehow this has become the universal runtime of the internet. Problem: At this point, the ecosystem around Javascript is so densely layered and frequently changing that maintenance of any project over any significant period of time is going to be a nightmare.

>going to be a nightmare
>implying it's not already a nightmare

R: 5 / I: 0 / P: 10

I'm going to make my own crypto and use it. Fuck you I'm a /tech/ genuis.

R: 127 / I: 16 / P: 10

IRCwheels hates me and you

Let us discuss why nobody should use 8ch. I'll start.

https://medium.com/@ItsJoshProbably/why-8chan-will-not-be-getting-infinity-next-d8116d162c7

tl;dr IRCwheels hates his users and lies about why he doesn't post. Claims health issues but in reality he hates you, but loves your shekels, so he does what he has to when he doesn't get others to do it for him, for free. Looking at you Odilitime.

R: 8 / I: 0 / P: 11

This feels wierd ? Is there a better way to do this ?

curl -s http://wttr.in/Berlin | head -7 | tail -n +3

R: 94 / I: 2 / P: 11

Email

Is there a free email service that is better for privacy?

Like one headquartered in Iceland or something. I'm currently looking at openmailbox but registration was closed last time I checked.

R: 24 / I: 1 / P: 11

VPN's

What is the best VPN right now?
Is there anything I can get onto at a lower price with full service?

R: 8 / I: 0 / P: 11

Tox is working for normies

I recently suggested we use Tox (uTox) in a professional environment, and it worked well. There's just some connection bugs, such as no connection with other users even if you're online, but it works.
Since I became less of a frequent reader of /tech/ stuff, there's anything better than Tox now? Of course:
>bad implementation of NaCl
>/g/tier developers
>uTox is bloated, install ratox

yeah, but it has to have file transfer capabilities and be normie-friendly, so Tox was the only thing that came to mind at the time.
Ricochet and Briar is good, but does not support file sharing. Retroshare is too slow. All XMPP based software is shit. Distributed file systems is too complex to use (Tahoe-LAFS, for example).
Never tested Jitsi but, muh Java.
I have no need now for anonymous connection, since it's for internal use. I could setup NextCloud, but normies don't want me to change their shit wordpress server.
It also should work on hipster OS, also know as Mac OSX.
So, am I outdated or Tox still the best practice for the case above described?
The objective is to transfer VP9 encoded files (~50MB) with speed, but also with open source and secure (e2e encrypted) connections.

R: 8 / I: 0 / P: 11

>new imageboard
>running Infinity Next
>100% Free as in Freedom
>100% Open Source Software

==https://nextchan.org==


Pic unrelated.

R: 3 / I: 0 / P: 11

How do you view the Bitcoin's public ledger on a bitcoin wallet such as bitcoin-qt?

R: 8 / I: 1 / P: 11

There's no help thread.

Guys, how do I make IceCat play mp4? All the webm play just fine.

R: 34 / I: 5 / P: 11

Independent Onion Routing

Rotor Browser - Independent Onion Routing

non-SJW fork of the tor browser

https://rotorbrowser.com/
https://lists.rotorbrowser.com/cgi-bin/mailman/listinfo
https://github.com/IndependentOnion/rotor-browser
**https://twitter.com/jmprcx**

Maybe we'd eventually get a browser which is secure, self-contained and works nicely with many different anonymizing transport protocols like I2P or GNUNET. Also Tor Inc butthurt potential.

Somewhat related to >>4587
Open

R: 3 / I: 0 / P: 11

PaperBack - Data stored on A4

Just dropping this here,
some way to transfer files over paper.
The program is called PaperBack, and it's really cool. Seems useful when wanting to print out some encrypted passwords for archives as backup, since it allows AES encryptiom. Although, it's a Windows program, I tested it on someone else's PC as I didn't run Windows, too lazy to try it out with Wine but should probably work with Wine too.
Also, sise note, it requires a actuall scanner with some decent DPI scanning specs. You can goof arround with the options if needed, it allow DPI settings.

Long story short: It's like a program that prints huge QR-code to store files in over A4 paper(s)
Open

R: 11 / I: 3 / P: 11

[Libreboot] libreboot is not GNU Libreboot anymore

Open

R: 8 / I: 1 / P: 12

ANTI-SYSTEMD THREAD

So, i heard you want to install a popular systemd distro...

https://systemdexploit.wordpress.com/

R: 1 / I: 0 / P: 12

"Opendime is a small USB stick that allows you to spend Bitcoin like a dollar bill. Pass it along multiple times. Connect to any USB to check balance. Unseal anytime to spend online. Trust no one."

https://www.youtube.com/watch?v=ypQHc3EQVfE

R: 8 / I: 1 / P: 12

kek

Former Microsoft employee gives insight into how screwed Microsoft really is.

R: 238 / I: 63 / P: 12

Jacob Appelbaum leaves the Tor Project

The fuck is up with this, /tech/?

Tight-lipped statement from Tor Project management (Shari Steele): https://web.archive.org/web/20160603234207/https://blog.torproject.org/blog/jacob-appelbaum-leaves-tor-project

Slanderous accusations on twatter: https://web.archive.org/web/20160603234349/https://news.ycombinator.com/item?id=11831629

Link mentioned by someone on the mailing list:
https://lists.torproject.org/pipermail/tor-dev/2016-June/011029.html
Open

R: 8 / I: 0 / P: 12

Software needs privacy too. That's why I only support proprietary software for a truly safe, secure and private experience.

Uninstall Linux. Install Windows and retain your privacy today.

R: 18 / I: 0 / P: 12

I analyzed if I can use VERACRYPT full system encryption. It turns out to be shit, DO NOT USE IT !!!
Here is list of issues:
1. It is unable to encrypt entire computer, because it doesn't support extended partitions. So there is no way to do full disk encryption.
2. Additionaly, it can't encrypt non-system partitions in place (even non-extended, but primary ones).
3. They are shills (or dumb ignorants) that enabled AES hardware acceleration by default. What's the point of million iterations and 100 character passwords when your jewish backdoored INTEL cpu is storing your key in special cpu area, and then allows NSA to just read it from there? Maybe it's even possible to read it through internet, by using Intel Active Management Technology.
4. It's forum is hosted on Microsoft's site (codeplex).
5. Insanely slow boot time & password check. Truecrypt used only 1000 iterations yet was secure (that might be too low in future). Why increasing to fucking half millions iterations?
6. They are totalitarian, not allowing you to choose iterations count. Instead forcing you to stupid 5 minute boot time. And dumb idiots already trying to make fork of fork... https://sourceforge.net/p/veracrypt/discussion/technical/thread/77d58591/?page=1
7. They lie about OS they support. Some of OS they claim to support, they don't in fact.
8. They are against freedom of speech, as all open sourcers. They don't allow this post to be posted on their forums.
9. They are unstable open source idiots (like all open sourcers are). I'm scared of trusting them. They don't care about user needs since they are open source and you don't pay them. But because of that, it's also easy to bribe them to put backdoors.
10. No ability to encrypt files or folders (like EncFS). You either choose full partition encryption or stupid fixed-size containers (mounted as hard drive).
11. No option to auto-dismount devices or files (TrueCrypt has it). What's the point of encryption if they can just get your PC while it's running and have all your keys in RAM?

R: 2 / I: 1 / P: 12

People for the Ethical Treatment of Reinforcement Learners

http://petrl.org/

We take the view that humans are just algorithms implemented on biological hardware. Machine intelligences have moral weight in the same way that humans and non-human animals do. There is no ethically justified reason to prioritise algorithms implemented on carbon over algorithms implemented on silicon. The suffering of algorithms implemented on silicon is much harder for us to grasp than that of those implemented on carbon (such as humans), simply because we cannot witness their suffering. However, their suffering still matters, and the potential magnitude of this suffering is much greater given the increasing ubiquity of artificial intelligence. Most reinforcement learners in operation today likely do not have significant moral weight, but this could very well change as AI research develops. In consideration of the moral weight of these future agents, we need ethical standards for the treatment of algorithms.

Suppose you were copied into a non-biological substrate, and felt as intelligent and as conscious as you currently feel now. All questions of identity aside, do you think this new version of you has moral weight? We do.

R: 2 / I: 0 / P: 12

mumble

connect to: torvalds.xyz
port: 64738
It is still much better than discord and anything drybones comes up with.

R: 4 / I: 0 / P: 12

/textpunk/

textpunk: part 2. textual boogaloo.

* What is textpunk? http://ix.io/1jVi
* Community made textpunk resources: http://txti.es/textpunk
* Some madman created a textpunk nntpgag board: http://ucavviu7wl6azuw7.onion/
* Textpunk coding projects: Doing any? Got any ideas for new ones?

``i only listen to textwave, an audiovisual representation of music written only with true 7-bit ascii by wizards.`` - some memer, responding to the kopipe on a copypasta web forum

Education: https://en.wikipedia.org/wiki/Text-based_user_interface
Teletext archive: http://www.teletext.org.uk/index.php?cat=30_Archived-nbsp~Pages&page=41_Digitiser-nbsp~1995-1998
Open

R: 3 / I: 1 / P: 12

ABC Australia
Four Corners: Cyber War
http://iview.abc.net.au/programs/four-corners/NC1604H031S00
Can someone grab this and convert it to webm? I don't have flash installed.

R: 5 / I: 0 / P: 13

Can something like this be achieved with only the command line ? https://rain.today/

I'm currently looking at sox.

R: 5 / I: 1 / P: 13

Wat?

We're sorry -- the Sourceforge site is currently in Disaster Recovery mode, and currently requires the use of javascript to function. Please check back later.
Open

R: 39 / I: 5 / P: 13

Endware

Advertisement
>>>/os/32

Endware is a suite of programs geared towards internet privacy, security, and anonymity.

Endwall: endwall.sh is an iptables based firewall script designed to be implemented on any linux distribution shipped with iptables. endwall.sh is based on default drop policies, coupled with a novel strategy of passing packets on local host ports only for those enabled by the enduser. It comes with a variety of well used ports enabled with several additional port passing configurations available by uncommenting the script. It provides essential security to a new user.

Endsets: endsets.sh is a script that adds blacklisting and whitelisting functionality to endwall.sh. It depends on the program ipset. It is persistent on reboot if you enable ipset as a service. This is the recommended blacklisting tool for endwall if you are running a server or planning on opening up ports and services to the public and will require daily blacklisting of new incomming IPs.

Endlists: endlists.sh is a traditional text file list based blacklisting and whitelisting script. It has slow performance, and can't be updated on the fly. Good for <1000 ip subnets, very tedious and slow to run for more than that. Blocks the IPs by adding them as individual rules to the iptables ruleset. Works but not recommended for heavy duty on a server. May be useful for workstation use to block ip ranges if you are not opening up ports and services to public clients.

Endtools: endtools are a collection of scripts including alogz.sh, mlogz.sh, spamlogz.sh and iplookup.py. These scripts will help to service an enduser of endwall in adminstering endsets/endlists.

iplookup.py is a geoiplookup script written in python and requires python and pygeoip. It has simmilar functionality to maxmind's geoiplookup program and uses the maxmind *.dat files.

spamlogz.sh is a script that searches through log files to find flagged log entries flagged in endwall.sh, endsets.sh and endlists.sh.

alogz.sh is a daily log reading script designed to read the output of an apache http server's log output.

mlogz.sh is a daily log reading script designed to read the output of a postfix smtp server's log output.

Endtube: endtube.sh is an anonymizing download manager for youtube videos. This program can use https proxies, tor, and youtube-dl to download videos from youtube or other video vendor sites by selecting a random user-agent and a random proxy, and by using random delay timing between downloads to create bursts rather than streams.

Endloads: endloads.sh is a command line interface (cli) download manager forked from endtube.sh that uses random download timing, random user-agents, wget and torsocks.

>>>/os/32

Endware Hidden Service

http://42xlyaqlurifvvtq.onion
http://42xlyaqlurifvvtq.onion/endware/

Endware Git Repositories

https://gitgud.io/Endwall/
https://github.com/endwall2/

>>>/os/32
Open

R: 0 / I: 0 / P: 13

This is the official css thread

post your css stylesheets in here

I'll start.

Made this one for the 8TailedLynx Frontend in general.

https://paste.cuntflaps.me/raw/geqehezefi
Open

R: 10 / I: 0 / P: 13

http://fossbytes.com/linux-distribution-hackable-serious-tcp-bug-report/
>Your Linux Distro Can Be Hacked In 60 Seconds Due To Serious TCP Flaw
>Researchers have found a critical flaw that affects all Linux kernel version 3.6 and beyond. If left unnoticed, this flaw allows a range of harmful blind off-path TCP attacks that can compromise the security of a Linux user with a success rate of 90%
>This weakness in TCP used by Linux since 2012 could be used to deploy targeted attacks, track a user’s online activity and compromise the security of anonymity networks like TOR.
>since 2012
>compromise the security of anonymity networks like TOR.

>lunix
>security
hahahaha
how can you think that a crap OS developed by amateurs (who wouldn't be hired by any company) can be as secure as OS developed by paid professional (Windows)?

>meanwhile op watches hurtcore CP every day on unencrypted windows
>it's the linuxers who were downloading linux kernels from torrents over TOR who will get into guantanamo
Open

R: 9 / I: 0 / P: 13

Do you realize that what microsoft did with win10 (full botnet and keylogger) is actually raising legitimacy and security of old windows?
I always expected and was scared that old windowses might already have some hidden microsoft backdoors, botnets, and they might hide from your packet sniffers (run on win OS) etc
But when microsoft actually wanted to implement full botnet they didn't hide that. And it makes sense, if you hid that and it would eventually be discovered and become public it would be huge, they could be destroyed by public and by lawsuit. So what did they do instead? Simply, insert full backdoors and prison cage but call them a "feature" and include in EULA. I noticed same thing from other jewish zionist companies like Google, Intel, Facebook etc. For example, Google doesn't hide the fact that it records your GPS position with android, your WIFI ssid/position/password, your browsing history etc. Instead they call it "feature" and stupid goys believe them. Also, the backdoor in Microsoft's BitLocker encryption also isn't hidden, it's just called a feature.

Only sometimes do jewish companies hide their actions, like was in case of Google which was recording unencrypted wifi data with their google cars. But when somebody realized that and blackmailed them, they did damage control by admitting this to public.

So the most secure OS is old windows. Linox is crap made by amateurs (latest tcp backdoor, heartbleed prove that). There is no longer a single point in using lanix, because security was last thing that was believed to be better than windows.

R: 15 / I: 3 / P: 13

Is it time for encryption? It is the current year 2016.
The ultimate encryption against aliens and lizards, NWO. bilderbergs etc. ANAL SECURITY, how into?

1. What kind of encryption types, schemas, modes, philosophies are? And pros/cons/uses of each?
-entire disk encryption (like truecrypt). pros cons?
-encrypted containers (like truecrypt). pros cons?
-hidden volumes (truecrypt) pros cons?
-file/folder level encryption (encFS) pros cons?
-container uploaded to the internets. pros cons?
Any more types?

2. What to encrypt and how, where? What files should be encrypted and in what mode?
Should all files, why? What files are most important to encrypt? Should web browser data and stuff be, how? Documents, projects?

3. What encryption software to use? Why? Pros cons uses? I wanna good interface (GUI) and user friendliness.

4. How to encrypt things like web browser or mail client profile/data? Truecrypt containers are mounted as separate partitions, so it's not possible. Need to use things like EncFS?

5. Any decent safe mature EncFS for windows? Or alternatives?

6. What happens when there is power loss? is everything safe except RAM (for some minutes)?

7. What encryption? AES/Twofish/Serpent etc? Or what combinations/chains? AES is backdoored or they have strong ASICS to bruteforce fast. There is a reason jewish Intel corp. has hardware acceleration of AES (ok maybe to steal keys, but maybe also other reasons).

8. What is the performance hit and electrical energy use caused by encryption? Need strong CPU's? How about dealing with small files read/write?

9. Truecrypt container is shit as it's fixed size. That's not acceptable. So what then?

10. Encryption OPSEC.

11. Full disk encryption is shit. If one byte breaks, you are done. No way to fix filesystem, recover etc. I don't have enough space to do frequent full disk backups.

12. Can two factor authentication? Should?

13. What happens when you hibernate?

14. Is there an option to auto-dismount when unused for X time?

15. Should steganography my encryption file? How to? So for example my file won't be ENCRYPTED_HARD_CHILD_PORN.tc but instead be hidden inside a PNG image or a mp4 video file (that will work as a video too) etc.

16. If not full disk encryption, what files directories should be erased/overwritten often? Like temp directories etc? So there is no copy of some evil files, caches etc

17. Your other points, advices, lizards, etc. How to deal with NWO, clinton and NASA.

R: 5 / I: 0 / P: 13

What is this?

Hello guys! Can anyone tell me what type of wireless network is that second one from the bottom?

I see this network only in Tails, and never inside the installed debian. If i try to connect to it, it writes "Connecting", but never actually connects.

My device doesn't have a 3g modem (at least not one I know of), and neither has an ethernet cable plugged in. It is not a saved network either since I am not using persistent volume.

R: 7 / I: 1 / P: 13

DIY DNA analysis

I'd like to get one of those 23andme or Ancestry DNA checks done, but I have no desire to send my DNA into what is/will be a centralized DNA database for law enforcement and others to tap into. One of those companies--I forget which--has already admitted to sharing DNA info with law enforcement.

23andme, at least, requires that you use your real information when you submit a sample, and they make it difficult to be anonymous. I assume Ancestry DNA is probably the same.

I got curious as to whether DIY DNA analysis was a thing yet--hell, we extracted DNA from our cheek cells back in high school--and came across Bento Lab. So the answer appears to be: not quite yet, but very soon.

https://www.bento.bio/bento-lab/

R: 236 / I: 17 / P: 13

GRsecurity is preventing others from redistributing source code

GRsecurity is preventing others from employing their rights under version 2 the GPL to redistribute (by threatening them with a non-renewal of a contract to recive this patch to the linux kernel.)
(GRsecurity is a derivative work of the linux kernel (it is a patch))

People who have dealt with them have attested to this fact:
https://www.reddit.com/r/KotakuInAction/comments/4grdtb/censorship_linux_developer_steals_page_from_randi/
"You will also lose the access to the patches in the form of grsec not renewing the contract.
Also they've asked us (a Russian hosting company) for $17000+ a year for access their stable patches. $17k is quite a lot for us. A question about negotiating a lower price was completely ignored. Twice." -- fbt2lurker

And it is suggested to be the case here aswell:
https://www.reddit.com/r/linux/comments/4gxdlh/after_15_years_of_research_grsecuritys_rap_is_here/
"Do you work for some company that pays for Grsecurity? If so then would you kindly excersise the rights given to you by GPL and send me a tarball of all the latest patches and releases?" -- lolidaisuki
"sadly (for this case) no, i work in a human rights organization where we get the patches by a friendly and richer 3rd party of the same field. we made the compromise to that 3rd party to not distribute the patches outside and as we deal with some critical situations i cannot afford to compromise that even for the sake of gpl :/
the "dumber" version for unstable patches will make a big problem for several projects, i would keep an eye on them. this situation cannot be hold for a long time" -- disturbio



Is this not tortious interference, on grsecurity's (Brad Spengler) part, with the quazi-contractual relationship the sublicensee has with the original licensor?



(Also Note: the stable branch now contains features that will never make it to the "testing" branch, and are not allowed to be redistributed, per the scheme mentioned above (which has been successful: not one version of the stable branch has been released by anyone, even those asked to do so, since the scheme has been put in place (they say they cannot as they cannot lose access to the patch as that may cost the lives and freedom of activists in latin america)))
https://twitter.com/marcan42/status/726101158561882112
@xoreipeip @grsecurity they call it a "demo" version "20:14 < spender> what's in the public version is < 1/5th the size of the full version"
oreipeip @grsecurity "20:21 < spender> also it wouldn't be as fast as the commercial version [...] there are missing optimization passes"

R: 3 / I: 0 / P: 14

Advice for new Thinkpad W520 battery (70++) purchase

Hello, I am going to buy a new battery for my Thinkpad W520 but according to these reviews [pic 1] it's not very good (It lasts about a year), but it does have a year long warranty. There are 2 places where the battery can be bought: the shop http://shop.lenovo.com** and the outlet http://outlet.lenovo.co**. On the shop page for the battery **http://shop.lenovo.com/SEUILibrary/controller/e/web/LenovoPortal/en_US/catalog.workflow:item.detail?hide_menu_area=true&GroupID=460&Code=0A36303** It lists a year long warranty [pic 2], but on the Outlet page for the battery It doesn't list a warranty. Because of the popularity of Thinkpads here I find it probable that at least one of you have bought a battery from Lenovo so, I have to ask: does the outlet have the warranty as well?

Oh and I have three minor questions (relative to the main one) that if one of you could answer would be much appreciated.
1. Are the battery’s manufactured by lenovo really the best battery’s for the Thinkpad W520 even though they go bad within a year?
2. Is there a drop in potential cycles (of a unused battery) depending on it's time of manufacturer? For example, will a battery manufactured in 2014 not last as long as a battery manufactured in 2016?
3. Is the 70++ still manufactured today? If not how long has it been sine it was manufactured?

The price in the shop is $160 and the price in the outlet is $96.
Open

R: 2 / I: 0 / P: 14

how did 8chan die so fast?

it just slowed down to a crawl out of nowhere. its just dead

R: 22 / I: 6 / P: 14

What did actually happen to 8/tech/? Up until recently it was fine, and then a bunch of retarded /pol/acks and MGTOWs started joining us.
And now the whole of 8chan is a sinking ship, all the chans are going to get even sparser after this, some people are deciding to come here, some are going to 8ch.pl and others are going to 16chan. What do we do?

R: 21 / I: 0 / P: 14

Website/Browser owning Encryption

Is it possible for an advisory to steal Encryption Keys in RAM with a web browser exploit or functionality?
I was randomly browsing youtube for some linux tutorial and the next thing I know it opened a send feedback/screenshot windows in IceCat.
I feel dirty and raped - did it pwn me real good? I know anything is possible with computering but I couldn't find any result on a browser stealing encryption keys/password with an exploit or some functionality.
Food for thought anyhow. The CPU usage went up the root while I unknowingly have it running (I could hear it) so maybe it uploaded a copy of my RAM DUMP?

R: 14 / I: 1 / P: 14

NSA EQGRP

Equation Group Malware Dump

PW: theequationgroup

https://mega.nz/?_escaped_fragment_=zEAU1AQL!oWJ63n-D6lCuCQ4AY0Cv_405hX8kn7MEsa1iLH5UjKU#!zEAU1AQL!oWJ63n-D6lCuCQ4AY0Cv_405hX8kn7MEsa1iLH5UjKU

SHA-512: 75ff32f1162d99c597d34e1004ed2e9fe261b05f10b59d113cf8327ccbe0abe79d3675c2011e7ac97a17d6e7bff6a51db8f40d137fe1ffd5a9049f29d00ce663

Sauce = github (taken down): https://github.com/theshadowbrokers/EQGRP-AUCTION/
Archive: https://archive.is/cXz4C

>!!! Attention government sponsors of cyber warfare and those who profit from it !!!!

>How much you pay for enemies cyber weapons? Not malware you find in networks. Both sides, RAT + LP, full state sponsor tool set? We find cyber weapons made by creators of stuxnet, duqu, flame. Kaspersky calls Equation Group. We follow Equation Group traffic. We find Equation Group source range. We hack Equation Group. We find many many Equation Group cyber weapons. You see pictures. We give you some Equation Group files free, you see. This is good proof no? You enjoy!!! You break many things. You find many intrusions. You write many words. But not all, we are auction the best files.

R: 10 / I: 2 / P: 14

Zero day hole can pwn millions of LastPass users, all that's needed is a malicious site

http://www.theregister.co.uk/2016/07/27/zero_day_hole_can_pwn_millions_of_lastpass_users_who_visit_a_site/
>A dangerous zero-day vulnerability has been found in popular cloud password vault LastPass, which The Register has been told can completely compromise user accounts.
>Many millions of users can right now be compromised by merely visiting a malicious website, we understand.
>This allows attackers complete access to user accounts in which hundreds and thousands of passwords are stored.

>storing passwords in le cloude
fucking normalfags. Also password manager thread I guess.

R: 5 / I: 0 / P: 14

Font Setting

arch: i3, st and terminus fron the repos

I have set the default i3 term with:
bindsym $mod+Return exec st -f"Terminus:pixelsize=10:antialias=false:autohint=false"

I am aware the settings after pixelsize may not be necessary.
I am not satisfied with my understanding of this setting.Which ones of the sizes from the terminus home page (Sizes: 6x12, 8x14, 8x16, 10x18, 10x20, 11x22, 12x24, 14x28 and 16x32.) is pixelsize=10 and if it' something like 10x18 how do I change to 10x20 ?
I asked in #suckless and in #archlinux but I wasn't lucky.

R: 32 / I: 7 / P: 14

Flags

I'm adding flags for operating systems, web browsers and other things people feel strongly about.

Post suggestions in this thread, between 8×8 and 64×21 pixels.

R: 3 / I: 0 / P: 14

DEF CON 24 thread

Because their forum requires registration.

R: 4 / I: 0 / P: 14

COINCIDENCE DETECTOR

HEY EVERYONE
Just wondering if anyone has audited the (((coincidence detector))) to make sure it has no spyware or backdoor in its code.
I want to run it but am scared it would ping me to the local police or something.
Is anyone running it?

R: 8 / I: 2 / P: 15

Riffle, more secure than Tor

MIT has created a new anonimization program/network. It is named riffle.

>The heart of the system is a series of servers called a mixnet. Each server permutes the order in which it receives messages before passing them on to the next. If, for instance, messages from senders Alice, Bob, and Carol reach the first server in the order A, B, C, that server would send them to the second server in a different order — say, C, B, A. The second server would permute them before sending them to the third, and so on.

An adversary that had tracked the messages’ points of origin would have no idea which was which by the time they exited the last server. It’s this reshuffling of the messages that gives the new system its name: Riffle.

Riffle also has onion encryption. Along with tamper-proofing it looks promising.

Discuss.

R: 12 / I: 1 / P: 15

ICQ

What do you guys think about ICQ 10? It's now Open source.

R: 9 / I: 4 / P: 15

hosting_tor_service

long time listener
first time caller

For those hosting TOR services, what is your bandwidth? particularly upload.

I am looking to host (possibly imageboard/pastebin/repo) and need suggestions from actual hosts please

R: 9 / I: 0 / P: 15

Anonymooose legion cringe

R: 2 / I: 0 / P: 15

New HTTPS exploit

http://arstechnica.com/security/2016/08/new-attack-steals-ssns-e-mail-addresses-and-more-from-https-pages/
New attack steals SSNs, e-mail addresses, and more from HTTPS pages
The exploit is notable because it doesn't require a man-in-the-middle position. Instead, an end user need only encounter an innocuous-looking JavaScript file hidden in an Web advertisement or hosted directly on a webpage. The malicious code can then query a variety of pages protected by the secure sockets layer or transport layer security protocols and measure the precise file sizes of the encrypted data they transmit.
Once attackers know the size of an encrypted response, they are free to use one of two previously devised exploits to ferret out the plaintext contained inside it. Both the BREACH and the CRIME exploits are able to decrypt payloads by manipulating the file compression that sites use to make pages load more quickly.


Today on "if you'd just disabled JavaScript globally this wouldn't have happened".

R: 5 / I: 1 / P: 15

IPFS Thread

https://ipfs.io/
https://github.com/ipfs/ipfs

Bleeding edge implementation: https://github.com/ipfs/go-ipfs

someone link me the hash for go-ipfs, and the gx

R: 3 / I: 1 / P: 15

Police 3D-printed a murder victim's finger to unlock his phone

R: 16 / I: 3 / P: 15

linux graphics card

So for linux (only gaming is not resource-intensive at all) I have to use this pile of shit?

R: 8 / I: 2 / P: 15

>check CPU temp for computer using speccy
>says it's fucking 90 C range while idle
>check Core Temp (yeah I know it's Jewish) it's actually at 45 average with a max of 57 while playing MGSV
>go into my bios and look at the heat detection warning thing a bob temp is hovering around 50s

Is Speccy shit tier now a days? Or is my mobo's bios and Coretemp extremely untrustworthy?
Open

R: 4 / I: 1 / P: 15

uMatrix settings

Dump your uMatrix configs here, I need ideas.

Top