Catalog of /tech/


Mode: Thread

Max file size: 350.00 MB

Max files: 5

Remember to follow the rules

Max message length: 4096

R: 171 / I: 26 / P: 1

/tech/ - Technology

Welcome to /tech/, a technology board. This board is for discussion of technology, both software and hardware.

IRC: #/tech/, #InfinityNow and #endchan on -

NSFW files are only allowed if they are spoilered. Tech support, consumer advice and desktop/ricing threads are all allowed for now.

All rules and policies are open for discussion in this thread.

You can view the logs in a less annoying way at (available for all boards).

Related boards:
>>>/cyber/ - Cyberpunk & Science Fiction
>>>/lv/ - Libre Vidya
>>>/markov/ - bot hell
>>>/os/ - Online Security

R: 7 / I: 0 / P: 1

Can something like this be achieved with only the command line ?

I'm currently looking at sox.

R: 17 / I: 1 / P: 1


Equation Group Malware Dump

PW: theequationgroup!oWJ63n-D6lCuCQ4AY0Cv_405hX8kn7MEsa1iLH5UjKU#!zEAU1AQL!oWJ63n-D6lCuCQ4AY0Cv_405hX8kn7MEsa1iLH5UjKU

SHA-512: 75ff32f1162d99c597d34e1004ed2e9fe261b05f10b59d113cf8327ccbe0abe79d3675c2011e7ac97a17d6e7bff6a51db8f40d137fe1ffd5a9049f29d00ce663

Sauce = github (taken down):

>!!! Attention government sponsors of cyber warfare and those who profit from it !!!!

>How much you pay for enemies cyber weapons? Not malware you find in networks. Both sides, RAT + LP, full state sponsor tool set? We find cyber weapons made by creators of stuxnet, duqu, flame. Kaspersky calls Equation Group. We follow Equation Group traffic. We find Equation Group source range. We hack Equation Group. We find many many Equation Group cyber weapons. You see pictures. We give you some Equation Group files free, you see. This is good proof no? You enjoy!!! You break many things. You find many intrusions. You write many words. But not all, we are auction the best files.

R: 70 / I: 3 / P: 1

I have a whole free week on my hands and i want to make most of it by installing a fresh new distro. Since i value /tech/'s opinion, tought i'd ask you guys.

Been using Linux Mint fot a year, but now i want a distro that is clean and not full of software i don't need (like Mint is). Can't decide between Debian or Arch, help me maybe? I kinda have a life, so if Arch is really that high maintenance, it's out of the picture.

R: 9 / I: 0 / P: 1

the real open source alternative to Discord?

there's Riot
Tox, Matrix.

R: 12 / I: 4 / P: 1


Is there any more news on the Jacob Appelbaum situation? It seems like he's disappeared off of the face of the Earth after the allegations. I find the fact that multiple witnesses have come out against the stories that were told on their behalf disturbing.

>Website comes out with a bunch of rape allegations
>Appelbaum denounces the allegations
>Appelbaum is effectively exiled from the free software community despite the lack of a trial
>multiple witnesses come out saying that the allegations made in their name were false, or at best heavily misinterpreted
>Even if all of the witnesses declare that Jake is innocent, his reputation is forever destroyed

Scary stuff.

>article by Die Zeit

>similar article by gizmodo

>statement from Jill Bähring, one of the supposed victims

R: 9 / I: 1 / P: 1

Internet Censorship

If you are an American, you can thank these two senators (John Mccain and Fritz Hollings) for censoring a large portion of the internet and preventing people from gaining knowledge and learning.

>"Schools and libraries subject to CIPA may not receive the discounts offered by the E-rate program unless they certify that they have an Internet safety policy that includes technology protection measures. The protection measures must block or filter Internet access to pictures that are: (a) obscene; (b) child pornography; or (c) harmful to minors (for computers that are accessed by minors). Before adopting this Internet safety policy, schools and libraries must provide reasonable notice and hold at least one public hearing or meeting to address the proposal."

It is because of them that filtering software such as IBoss exists and why schools have google integrated within their computers to force students to use their services and to use a filtered search.


How does this make you feel?

R: 5 / I: 1 / P: 1

I'm trying to do something but I don't know the right tool for it.
I want to get the page number from lsw and store it in a file. In this case number 96
This is an example output.
0x1a00005 st
0x180000a the.pdf - 96/181 (96 dpi)
I'm thinking of grep and regex but I've never properly used grep and seems like something too big for such a simple task.

R: 8 / I: 1 / P: 1

Does anybody know what happened to serax? I was using to as my default searcher (even though it is slower than most) but it seems to be down. I'm not sure what to use in the meantime, what do you use?
Unrelated image.

R: 3 / I: 0 / P: 1

>CyberX has confirmed at least 70 victims successfully targeted by the operation in a range of sectors including critical infrastructure, media, and scientific research. The operation seeks to capture a range of sensitive information from its targets including audio recordings of conversations, screen shots, documents and passwords. Unlike video recordings, which are often blocked by users simply placing tape over the camera lens, it is virtually impossible to block your computer’s microphone without physically accessing and disabling the PC hardware.

>Most of the targets are located in the Ukraine, but there are also targets in Russia and a smaller number of targets in Saudi Arabia and Austria. Many targets are located in the self-declared separatist states of Donetsk and Luhansk, which have been classified as terrorist organizations by the Ukrainian government.

judging by the targeted countries i wonder who would benefit from something like this...

R: 2 / I: 1 / P: 2

some friend recommend me today to install some shit to reformat my usb now I'm kinda paranoid bout viruses right now,
I have no sleep in days
And i think this is a good option to do this

R: 4 / I: 0 / P: 2



R: 43 / I: 1 / P: 2

I was using to get a better view on sites that rely on javascript and now they've enabled CloudFlare which require javascript.

Is there any alternative to it ?

R: 1 / I: 0 / P: 2

read and learn famzies

R: 25 / I: 18 / P: 2

Webm thread

Post your /tech/ related webms

R: 239 / I: 63 / P: 2

Jacob Appelbaum leaves the Tor Project

The fuck is up with this, /tech/?

Tight-lipped statement from Tor Project management (Shari Steele):

Slanderous accusations on twatter:

Link mentioned by someone on the mailing list:

R: 2 / I: 0 / P: 2

So my second hand x220 just arrived and all works fine except the backlight adjustment buttons. No biggie. Just set up some aliases that change /sys/class/backlight/intel_backlight/brightness.

Thing is I noticed a power folder in intel_backlight. Do I manually need to change power usage depending on the value of brightness or is it done automatically ?

/sys/class/backlight/intel_backlight/power/control is set to auto but ../power/runtime_enabled is set to disabled.

That kernel flag from the archwiki x220 page doesn't work.

R: 20 / I: 0 / P: 2

I'm running an instance of Tokumei that some of you wanted, I do not host the tor SFTP anymore.

Its pretty much anonymous microblogging with freedom of speech intended. Go mad.

R: 23 / I: 3 / P: 2

Mariana's web

Have you been to the Mariana's web? :^)

R: 3 / I: 0 / P: 2

iBoss is Botnet

Why the fuck does this stupid filter even exist? On work provided computers, this shit is integrated into the computer and tracks your location constantly and you can't end it's process in the task manager/monitor.

At the same time, it is always using your network regardless of your internet browser being opened or not.

R: 11 / I: 0 / P: 3


So where is the ARM part in new AMD chips? Can I break it?

R: 47 / I: 6 / P: 3

LynxChan 1.8

What is LynxChan?
LynxChan is a chan engine developed with performance, efficiency and flexibility in mind. It powers several chans ( ) and contains a number of community-created front-ends ( ).
It offers a number of features, including:
-File deduplication, saving bandwidth, disk space and allowing users to post files without uploading them.
-Overboard, aggregating posts from the whole site on a single place so users can browse more easily.
-Multi-board, allowing users to aggregate posts from only selected boards.
-Extensive anti-spam and anti-flood tools that aim to both impede and reduce damage without inconveniencing users.
-Add-on support, which enables features to be added without the need for a fork.
-Modular front-end and language pack allows for the site owner to customize it without having to change the actual software.

LynxChan 1.8 main addition is multi-lingual support.
This feature allows site owners to specify alternative language packs and front-ends and associate languages to them.
When an user visits the site, the engine seamlessly picks an available language from the user and serves content in that language.

This version brings some other minor features so far:
-More granular and specific verbose modes.
-A terminal command to perform a clean shutdown of the engine.
-A board setting that allows for a maximum age that threads are allowed to be bumped.
-Improved spammer and TOR ips storage.

This version will be released 03/17, LynxChan can be found at

R: 40 / I: 8 / P: 3

Desktop R8 or H8 thread

No desktop thread? Lets fix that.

I'll start with my laptop

R: 1 / I: 1 / P: 3

Apple II campus

Anyone think the 5 billion new campus Apple built looks like a panoptican for jealously spying on your employees from an inside point?

R: 2 / I: 0 / P: 3

So I want to use pgp for pass, for a clear riseup mail account and for a onion mail service but I don't want subkeys. Should I go for seperate gnupgp instances or what.

R: 4 / I: 3 / P: 3

>be me
>extremely intelligent and savvy
>currently researching and studying artificial satellites
>own many tools and machinery to build my own satellite
>may send one into orbit soon
>alternative to google earth may soon exist
>people can look at maps without being tracked
>disprove flat earthers at the same time

What does /tech/ think?

R: 13 / I: 0 / P: 3

Is there an email alternative that isn't shit ?

i2p-bote - hard to install for normies
retroshare - all that qt and social stuff bloat
bitmessage - both stable and trunk send my cpu to hell for some reason

Plus none of these have a decent command line interface.

R: 8 / I: 1 / P: 3

Opera neon [Embed]

This looks absolutely horrific

R: 9 / I: 1 / P: 3


>When you upload, submit, store, send or receive content to or through our Services, you give Google (and those we work with) a worldwide license to use, host, store, reproduce, modify, create derivative works (such as those resulting from translations, adaptations or other changes we make so that your content works better with our Services), communicate, publish, publicly perform, publicly display and distribute such content.

Google is the website that receives the largest amount of traffic in the world.[1] By utilizing any service provided by Google, you are indirectly agreeing to their TOS and willingly giving your information to them, while also allowing them to do as the
y please with said information. Many websites have Google Analytics, AJAX, API's, and many other services from Google included in their source code.

Google has become too powerful, and evidence exists of them manipulating search results to push their own political agenda.[2] This is a form of brainwashing as they could easily censor valuable information and news and could get content of their choice to the top of the list, and with the amount of people using Google, the results could be devastating.

We could fix this problem by convincing current Google users to switch services and educate them on how they are being used and how their information is at risk. However, with the amount of integration Google has made into other services and the fact that many electronics come preloaded with their website as the default search engine is going to be a large barrier in our way. If someone was willing to compile the information I have included here and created an infographic, it would be a great way to inform people and damage Google.


R: 14 / I: 2 / P: 3

Deleting Old Accounts

What's the best way to go about deleting old accounts on websites I no longer use? I don't want my info available if these websites get hacked. A lot of sites don't have the option to delete your account yourself. Should I email their support and ask them to delete my account? That will leave an email record if their email ever gets hacked. Should I just leave these sites alone and hope for the best?

R: 4 / I: 3 / P: 4

What's the original uncropped version of this image

R: 13 / I: 3 / P: 4

Important Information

A few of my posts on other imageboards were strangely deleted for "breaking the rules", so I am afraid that they may be compromised.

But listen to this advice:
Unless you can fully Audit software yourself, you should assume that it is doing work behind your back. Many audits on the can be faked, and what is the chance that you will attempt to confirm that it is fake? 99% of people do not have the time or knowledge to audit something as large as a linux system.

If you are truly paranoid, you should drop computers completely or start coding your own programs.

R: 5 / I: 0 / P: 4

Going off the grid (relatively speaking)

I'll soon be moving into a new flat, and haven't gotten a contract with an ISP yet.
However, since it is still possible in my country to buy prepaid SIM-cards and reload them (~1$/GB) with cash, I'm contemplating just rolling with that and limiting my Internet consumption.

I would use it stationary, and the city I'm using it is densely populated, so there are many base stations. Wikipedia tells me that E-OTD could yield my position with an accuracy of 25m, even less if my modem cooperates using GPS/Wi-fi signals.

That's not quite safe enough, so I might use a VPN in Panama or somewhere that I'd pay for in Bitcoin, and configure an OpenWRT router to connect to it by UMTS.

Is there something I should look out for in order not to identify myself?
What kind of open hardware would you recommend for the router and modem?

R: 237 / I: 17 / P: 4

GRsecurity is preventing others from redistributing source code

GRsecurity is preventing others from employing their rights under version 2 the GPL to redistribute (by threatening them with a non-renewal of a contract to recive this patch to the linux kernel.)
(GRsecurity is a derivative work of the linux kernel (it is a patch))

People who have dealt with them have attested to this fact:
"You will also lose the access to the patches in the form of grsec not renewing the contract.
Also they've asked us (a Russian hosting company) for $17000+ a year for access their stable patches. $17k is quite a lot for us. A question about negotiating a lower price was completely ignored. Twice." -- fbt2lurker

And it is suggested to be the case here aswell:
"Do you work for some company that pays for Grsecurity? If so then would you kindly excersise the rights given to you by GPL and send me a tarball of all the latest patches and releases?" -- lolidaisuki
"sadly (for this case) no, i work in a human rights organization where we get the patches by a friendly and richer 3rd party of the same field. we made the compromise to that 3rd party to not distribute the patches outside and as we deal with some critical situations i cannot afford to compromise that even for the sake of gpl :/
the "dumber" version for unstable patches will make a big problem for several projects, i would keep an eye on them. this situation cannot be hold for a long time" -- disturbio

Is this not tortious interference, on grsecurity's (Brad Spengler) part, with the quazi-contractual relationship the sublicensee has with the original licensor?

(Also Note: the stable branch now contains features that will never make it to the "testing" branch, and are not allowed to be redistributed, per the scheme mentioned above (which has been successful: not one version of the stable branch has been released by anyone, even those asked to do so, since the scheme has been put in place (they say they cannot as they cannot lose access to the patch as that may cost the lives and freedom of activists in latin america)))
@xoreipeip @grsecurity they call it a "demo" version "20:14 < spender> what's in the public version is < 1/5th the size of the full version"
oreipeip @grsecurity "20:21 < spender> also it wouldn't be as fast as the commercial version [...] there are missing optimization passes"

R: 18 / I: 2 / P: 4

DIY, Modular, Open source Laptop

Laptop form factor open source hardware design, built from off the shelf components for DIY, modular, open source computing.

CPU, RAM, graphics: 1x single board computer
FSB, ports: 2x powered USB hub
Battery: 1x USB powerbank, >5000 mAh, >2A
Input: 1x USB keyboard
Input: 1x USB trackpad
Storage: 1x USB flash drive
Network: 1x USB WiFi dongle
Audio: 1x USB sound card/headset
Display: 1x USB powered HDMI monitor
Case: 3D printed or DIY glued wooden case

-Completely modular, customizable, upgradeable and repairable
-User serviceable by all users
-Universal, modular battery and charger. Can swap battery when depleted
-Low cost
-Completely open source

Suggestions for the display? It is the least commonly available component. USB DisplayLink would be more convenient, but it is not open source.

R: 9 / I: 0 / P: 4

Any other tech boards that aren't dead ?

R: 42 / I: 16 / P: 4

Hax0r Thread

R: 0 / I: 0 / P: 4

OSS digging tools

R: 7 / I: 0 / P: 4

Someone is claiming that all files currently encrypted with OpenSSL have been salted to make them insecure:

R: 98 / I: 2 / P: 4


Is there a free email service that is better for privacy?

Like one headquartered in Iceland or something. I'm currently looking at openmailbox but registration was closed last time I checked.

R: 5 / I: 0 / P: 5

USSR home computer programs on tape

Does anyone on /tech/ know how to get programs for old computer from audio cassette? What emulators can run that? Rips are on http://25dxotevqkqyhqgi.onion/

R: 49 / I: 12 / P: 5

BSD Thread.

Let's have a thread about the permissive, copyleft style of operating systems known as BSD.

Discussion of Free,Net,Open,Dragonfly,Edge *BSD is welcome!

Linux and FSF users who would rather complain about licencing and that linux is better need not apply.


FreeBSD Quarterly Status Report:

Vulns found in freebsd-update and portsnap:

OpenSSH 7.3 Released:

Reminder that OpenBSD 6.0 is being released September 1st, 2016.

R: 4 / I: 0 / P: 5

crypto fails meta thread

curve25519-donna implementation by google is susceptible to timing attack as MSVC runtime's 64bit multiplication is nonconstant time operation in x86 environment.

R: 4 / I: 1 / P: 5

i0ne Pre-Induction


We are i0ne. We are a Security Penetration Team. Our goal is simple, we intend to expose the flaws of modern security procedures within this world of anonymity.

The lies that you have been told about being secured and safe from malicious persons will be revealed. You have been fed with lies...lies like social media and mainstream media websites such as Facebook, YouTube, CNN, and FOX News. These websites and corporations use you for revenue. They lie to you for their own gain.

They lie about Politics, Security, and News overall. This is absolutely despicable, and scummy. Multimillion Dollar Companies have lied to their users for decades, and it will not stop.

Nothing is secure, not even your personal information. We encourage you to believe these blatant lies, only to be proven otherwise.

If you are interested in induction into i0ne, please email us at

R: 17 / I: 5 / P: 5


Can someone, please, "red-pill" me in compilers. Particularly, C compilers.
Why use anything besides GCC? What's the difference between all of them?

R: 20 / I: 1 / P: 5

Pocket CHIP

Does anyone here have experience with the Pocket CHIP, or the CHIP in general? As an option for mobile computing it seems much cheaper than things like the Dragonbox Pyra and OpenPandora, but much more powerful/useful than a chroot on an Android touchscreen device. Is it good? Are there similar computers?

R: 24 / I: 3 / P: 5

Why haven't you installed gentoo yet?


R: 20 / I: 1 / P: 5

>Single Onion Services for muh "i don't need anonymity"
>decentralized RNG for muh cryptography wonders
>removing "tap handshake" old stuff in favor of ntor

>meanwhile block bypass still gonna eat your post and say "fuck you" to uncommon browser

R: 12 / I: 2 / P: 5

"Open Source Bitcoin Mixer"

R: 9 / I: 1 / P: 5

Which chan engine is the best, in terms of extensibility and performance?

R: 1 / I: 0 / P: 6



R: 21 / I: 0 / P: 6

IT-Ebooks is dead (ITT: Textbook thread)

So recently has gone offline.
Where do you find ebook libraries, /tech/?
(And don't tell me about Gentoomen Library,
i already have cold storage of them)

R: 15 / I: 5 / P: 6


What is best IRC client and why is it HexChat

R: 12 / I: 1 / P: 6

>both nyaa and tokyo use cloudflare even for their rss feeds
>don't want to torrent through tor but I would like some method of getting my chink cartoons without fucking myself.

Can someone torpill me ? Can I use xdcc through tor ?

Can rtorrent's options for sending a different ip be trusted ? Will this work with forced encryption ?

R: 15 / I: 1 / P: 6

Is Signal a threat to Free Software?

My opinion: the guy from LibreSignal was using the Signal servers, consuming their energy, and using their marketing. This is not right.
About the Signal requirement to have google shit, it's very unfortunate. Though, people should just use other thing and stop all this buzz.

R: 25 / I: 2 / P: 6


R: 4 / I: 1 / P: 6

How is /tech/ going to hide from satellites?

>Over 2000 satellites in orbit
>Many can take pictures and communicate with the government

How will you go about hiding from them when 1984 v2 comes?

R: 4 / I: 1 / P: 6

Intel Active Management Technology

tl;dr backdoor does not verify integrity properly
>endchan cookieless posting unfucked when

R: 26 / I: 5 / P: 6

ex/ploit/ General

In an attempt not to bump off important threads from >>>/tech/ I hereby propose the first exploit general thread

Post any new and old exploits you would like to discuss.

For perfect RSS/ATOM digests in one thread

R: 409 / I: 20 / P: 6

Internet Security

Post Tips for anonymous web browsing and downloads. Tips on browsers and browser configurations for the security concious.

R: 4 / I: 0 / P: 7

What are some good /tech/ podcasts you would recommend ?

Now I know these is a generic question and I can just google and meme out a list of worthy podcasts but I'm more interested in what people here watch.

R: 2 / I: 0 / P: 7


Is the world ready for system based on the ideas of Smalltalk and Xerox Parc? Most of us run a unix derived OS like Linux or Mac OS X. Why not use the better ideas from the 70s instead of Unix?
>inb4 too slow

R: 14 / I: 1 / P: 7

copperheadOS is a hardened open-source operating system based on Android and focused on privacy.

Any experience with it?
I just now heard about it and am thinking of trying it out.
They say it's only available for Nexus 9, Nexus 5X and Nexus 6P, but on their website have a Nexus 5 render, what's up with that? Can i install it on Nexus 5 or not?

R: 12 / I: 2 / P: 7





R: 0 / I: 0 / P: 7

Talos Secure Workstation

>$426,150 raised of $3,700,000 goal
>2 days left


extra kek at Raptor Engineering website with
>No pages or files may be distributed without express written permission.

R: 5 / I: 1 / P: 7

As far as i'm concerned end/tech/ is one with the most quality content /tech/ of them all, but it's not really that active as we all know, and i don't think it should be as active as 4chan or 8chan /tech/, but there are sometimes weeks without any new content. Makes me sad.

So what i'd like to know is if there are any other tech/sec/priv related places you follow on a, lets say, weekly basis? Freedom of speech is also important, because i want to be able to say what's on my mind, be it jews, niggas or fags (i'm looking at lainchan here). Be it on the clearnet or some darkweb, doesn't matter, although it would be nice if it had a .onion link. This may seem a silly question, but i have to say, i really value your opinion goys.

R: 3 / I: 1 / P: 7

LynxChan is now standards compliant

[09:44am] OdiliLap:
[09:44am] OdiliLap: maybe having lynx deal with a robots.txt
[09:46am] StephenLynx: you can upload your own robots.txt.
[09:46am] StephenLynx: to gridfs, that is.
[09:46am] StephenLynx: just like the
[09:46am] StephenLynx: favicon
[09:46am] StephenLynx: now
[09:46am] StephenLynx: it wouldn't be practical to do that for each thread
[09:46am] OdiliLap: but BOs want to manage it
[09:46am] StephenLynx: but I don't see a point to do that for each thread either
[09:46am] OdiliLap: per board
[09:47am] StephenLynx: why they want to do that?
[09:47am] OdiliLap: they don’t want their board on google or the boards list
[09:47am] StephenLynx: how is that of their concern?
[09:47am] StephenLynx: they can already remove from the board list.
[09:47am] OdiliLap: you already have an option to hide it from the boards list
[09:48am] OdiliLap: so you’re giving them a right to privacy
[09:48am] OdiliLap: you need robots to enforce that
[09:48am] StephenLynx: hm
[09:49am] StephenLynx: the problem is
[09:50am] StephenLynx: the system robots.txt uses is not a standard.
[09:50am] OdiliLap: what do you mean?
[09:50am] StephenLynx: there isn't an actual standard dictating how robots.txt works.
[09:51am] OdiliLap: lies
[09:51am] OdiliLap:
[09:51am] StephenLynx: that is a convention.
[09:51am] OdiliLap:
[09:51am] StephenLynx: documented convention.
[09:51am] StephenLynx: still not an actual standard.
[09:52am] StephenLynx: >The latest version of this document can be found on
[09:52am] StephenLynx: 404
[09:52am] StephenLynx: >It is not an official standard backed by a standards body, or owned by any commercial organisation.
[09:53am] StephenLynx: > It is not enforced by anybody, and there no guarantee that all current and future robots will use it.
[09:53am] StephenLynx: so yeah, nah
[09:53am] OdiliLap:
[09:53am] StephenLynx: you can write your own robots.txt and disallow boards if you wish.
[09:53am] OdiliLap: I can’t wait to stop using lynxchan
[09:53am] StephenLynx: kek
[09:54am] StephenLynx: or
[09:54am] StephenLynx: you could take about 5 minutes
[09:55am] StephenLynx: and save a robots.txt to gridfs
[09:55am] StephenLynx: and add boards the BO asked you to do that.

R: 41 / I: 6 / P: 7

end/tech/ is dead

I told you.

R: 28 / I: 9 / P: 7



R: 5 / I: 0 / P: 7

/tech/ related info

/tech/ INFO DUMP

Because sometimes you just want to share something noteworthy without creating a new thread.

R: 22 / I: 5 / P: 8

Tokumei 1.0 Release Party

Tokumei is an anonymous microblogging platform written in rc using werc. Today marks the official release of version 1.0 and we're hosting a party on mumble! Come crash it :)


R: 14 / I: 4 / P: 8

Why .onion, why not.garlic?

R: 1 / I: 0 / P: 8

Hi there, you seem to have stumbled upon a Illegal Freedom Area, oops!

Help is on the way. Big brother loves you.

Our agents are en-route to provide assistance. Take two green capsules and try not to worry. Failure to do so will result in prosecution for criminal drug evasion. Be sure to click the Facebook share button below!

R: 7 / I: 2 / P: 8

It's World Emoji Day! Teen girls, code an emoji that's unique like you.

R: 8 / I: 0 / P: 8


Now that servo nightly builds are out how much till someone makes something like pentadactyl for it ?

t. retard

R: 4 / I: 2 / P: 8


they've used google translate and google reverse image search against google captcha

R: 1 / I: 0 / P: 8

TinyWM implementation in Nim


R: 7 / I: 1 / P: 8

Senate rejects FBI bid for warrantless access to internet browsing histories

R: 7 / I: 2 / P: 8

Anonyfi: OpenBSD plug and play router

Pretty cool:

"With advance VPN service and simple UI AnonyFi offers Anonymity, Reliability, Security and stability by simply plugin the box to your standard ISP Router"

- OpenBSD
- Auto-update
- PF firewall
- DNScrypt
- Adblock
- Squid proxy
- DNS caching
- "Advanced VPN"

Seems good for me.
>site's running Apache, not openbsd's httpd(8)

R: 92 / I: 21 / P: 8

Infinity /tech/ VN Projekt

>Who are you?
I am a anon who has decided to help setup a development server for this project.

>What is this?
Quoting from the about page of this project [] .

"The concept came from 4chan /jp/ in January 2009.


Meme Magick saw it revived on 8chan /tech/ in September 2015. Development is ongoing.


Here is what was discussed in 2009 (please note that this is a concept and the final script may be entirely different):

>Sussmanashi no Naku Koro ni (すさまなしのなく頃に, Susamanashi no Naku Koro ni, commonly abbreviated as SNAK) is an adult Japanese visual novel developed by /prog/ which will be released as a limited edition on January 3rd, 2038 playable on the PC. Sussmanashi no Naku Koro ni began as a series of prelude short scenarios in the /prog/ fandisc SICP no Shana. The gameplay in Sussmanashi no Naku Koro ni follows a plot line which offers pre-determined scenarios with courses of interaction, and focuses on the MIT course 6.001 and the book Structure and Interpretation of Computer Programs (SICP).

>Sussmanashi no Naku Koro ni incorporates actual slides from the 6.001 lectures and SICP exercises which have to be answered correctly in order to get the good ending.

>SNAK centers around the period in which the protagonist, Grun Ur, enters the Massachusetts Institute of Technology (MIT) after moving to America from Japan. Most of the main stories revolve around the magical Y combinator and its powers.

Here are just a few screenshots from 2009. There is limited storage space using this entirely free SDF hosting, until we upgrade this member account. We'll be donating to the SDF as soon as possible and recommend that you consider it also!"

>How do I get in contact
Project website -

project email -


To quote from the 8chan /tech/ thread.

"As you may know, got pawned again. If you email me consider that the FBI is read

R: 8 / I: 0 / P: 9

Browser whitelist?

Hi /tech/. I convinced a school to let me deploy some Linux distributions.

How can I set the web browser (insert yours here) to only allow access to white-listed domains and ip addresses. In Internet Explorer/Edge it is pretty simple with a few clicks. But how can I do it in other browsers?

Requirements: only stock browser functions should be used. No third-party software or plugin.

R: 3 / I: 0 / P: 9

Anyone here buying an EOMA68?

R: 6 / I: 0 / P: 9

Is it safe to assume KDE Fiber is dead? The developer hasn't made any posts about it for over a year now.

R: 12 / I: 1 / P: 9

Is Assange alive?

>London City Airport was evacuated at the same time as his internet outage duo to a "chemical scare"
>@wikileaks tweets saying "HILP HIM"
>HC wanted to "drone him"
>Some kind of heavily armed police outside of embassy
>Asking @wikileaks to verify themselves by signing a statement with his PGP private key results in blocking you
>And now he's missing

R: 5 / I: 0 / P: 9

Javascript is not bad, you are

I decided to give my spin on a comic commenting how every solution in js is a problem.

R: 21 / I: 3 / P: 9

new nntpchan frontend software goes into beta testing :^)

overboard page: http://beta.oniichanylo2tsi4.onion/betachan/

R: 4 / I: 1 / P: 9

Matasano/Cryptopals crypto challenges

A few years ago, I heard about the Matasano crypto challenge. Matasano was (still is?) an infosec company, and they ran this crypto challenge through email. I never got around to trying it, and when I tried to find it again recently, I discovered that they've made the challenge available at

Here's a summary:

>We've built a collection of 48 exercises that demonstrate attacks on real-world crypto.

>This is a different way to learn about crypto than taking a class or reading a book. We give you problems to solve. They're derived from weaknesses in real-world systems and modern cryptographic constructions. We give you enough info to learn about the underlying crypto concepts yourself. When you're finished, you'll not only have learned a good deal about how cryptosystems are built, but you'll also understand how they're attacked.

No advanced math is involved.

Anyone here worked through any of the challenges before, either when it was an email thing or since they've all been published at Cryptopals?

Anyone want to give them a shot?

R: 12 / I: 1 / P: 9

Benchmarks of Endchan

Have there been any benchmarks that list the total number of posts per second that are capable (at least in perspective of this current hosting and etc)?

R: 83 / I: 4 / P: 9

I've setup a sftp hidden service for anyone to use. My setup is just a raspberry pi, with an DM-Crypt LUKS 500 GB hard drive.

User: gentoo
Password: XFR%eto1J{oi${&[W#cgGMSM!

My Tox

All nonce shit will get deleted.

R: 3 / I: 0 / P: 9

Remove feature = fix a bug
>did not remove metadata from images embededed in PDF documents
>been fixed in version 0.5.2-3+deb8u1. This update disables PDF support in MAT entirely.

R: 2 / I: 1 / P: 10

In what situation would I need to tumble my bitcoin? I mean if law enforcement did not know what my bitcoin public keys where but I also had a large sum of money going into a bank account under my name how could they find out if I got that bitcoin legal or not?

R: 25 / I: 2 / P: 10

Linus Torvalds: Free Software Foundation "insane crazy people"

We all knew it. Now Linus said it.

In a mailing list discussion about GPL enforcement, Torvalds touches on the pitfalls of involving lawyers in GPL disputes and argues for the superiority of the open source approach, stating: "the people who have created open source and made it a success have been the developers doing work - and the companies that we could get involved by showing that we are not all insane crazy people like the FSF."

Thoughts? Butthurt?

R: 20 / I: 5 / P: 10

Illumos-based OSes

Anyone using or dabbling in an Illumos-based OS like OpenIndiana?

After 10 years of using Linux (though I used OpenSolaris a little here and there before Oracle killed it), I've been using OpenIndiana as my daily driver.

On the surface, it's a lot like using any Linux distro with MATE. I have access to most* of the tools I'm accustomed to like gcc, TeXLive, Firefox, and VLC.

I'm really not familiar with the under-the-hood features of the OS that come from Solaris, like DTrace and Zones. On the other hand, I never used systemtap or LXC on Linux, either.

OpenIndiana will be putting out updated installation .isos in the near future. In the meantime, you can install with one of the currently available isos and update. If you want to try OI in a virtual machine, be sure to allocate plenty of RAM. 2048MB minimum.

*With the exception of Tor Browser Bundle, which I'd love to have on OI.

R: 116 / I: 9 / P: 10

nntpchan devshit thread, banned from 8/tech/ edition


it's decentralized imageboard federation thing, works great, join today.


(your node here?)

R: 3 / I: 0 / P: 10

use truly free license, goy

R: 2 / I: 1 / P: 10

Machine translation

I've been interested in the idea of machine translation (that is, unaided translation by a machine of text from one natural language into another natural language) for years, but I've never really studied it. I have noticed how freely-available translators have improved significantly over the years, to the point that Google Translate does an intelligible job with non-slangy text in a lot of languages.

I don't have a lot of knowledge in this field, I was just wondering if anyone else is interested in it as well. Perhaps we could have an MT general.

The Wikipedia article is pretty good:

It contains a lot of links to articles about various subtopics, like rule-based machine translation and statistical machine translation. Google Translate uses a statistical MT engine, btw.

There's actually surprisingly little in the way of general-purpose free/open-source MT software. By "general-purpose", I mean able to translate or to learn to translate between arbitrary natural languages. A number of open source MT software projects concentrate on translating between two, or a handful of language. I did, however, find Apertium:

which already has data for a few dozen language pairs, several of which are "strong" (i.e. they produce good translations between them).

There's also Moses, which is a statistical MT engine "that allows you to automatically train translation models for any language pair. All you need is a collection of translated texts (parallel corpus). Once you have a trained model, an efficient search algorithm quickly finds the highest probability translation among the exponential number of choices."


R: 9 / I: 1 / P: 10

Unfixable vulnerability found on all windows versions


R: 3 / I: 0 / P: 10

Which "any key" is best?

Given that certain keys may do something bad (be that text editing, some hotkey action or something else), which key you consider best for "any key" role? My own favorite been any arrow key, but in some terminals arrow makes bunch of characters. Which key is most recognised as "any key" and does least amount of possible damage, should that key affect something else than application waiting for it?

R: 7 / I: 0 / P: 10

>We, the Debian project and the Tor project are enabling Tor onion services for several of our sites. These sites can now be reached without leaving the Tor network, providing a new option for securely connecting to resources provided by Debian and Tor.

>In addition to the Tor and Debian websites, the Debian FTP and the Debian Security archives are available from .onion addresses, enabling Debian users to update their systems using only Tor connections. With the apt-transport-tor package installed, the following entries can replace the normal debian mirror entries in the apt configuration file (/etc/apt/sources.list):

deb tor+http://vwakviie2ienjx6t.onion/debian jessie main
deb tor+http://vwakviie2ienjx6t.onion/debian jessie-updates main
deb tor+http://sgvtcaew4bxjd7ln.onion/debian-security jessie/updates main

>Likewise, Tor's Debian package repository is available from an onion service :

deb tor+http://sdscoq7snqtznauu.onion/ jessie main

R: 13 / I: 4 / P: 10

Signal Messenger - Gag Order / NSA / FBI

I told all do not use Signal, Telegram or ChatSecure.

Only Threema ... ( you don't need a mobile phone number or email address ).

New attacks are coming 2017 against all us-american Linux distros, Tor and VPN provider.

Don't trust the silence.

R: 23 / I: 0 / P: 11

Hi goys, i have a silly question. Can i make a desktop PC that is 100% under my control? What i mean by that is: no binary blobs, no proprietary software... basically no stuff that does not respect my privacy.

Hardware at my disposal:
- 2008 Core2Duo 2.8GHz (ME can be disabled on 2008/09 chips IIRC)
- Gigabyte MB supported by libreboot
- GeForce 7900 with 256MB
- everything else is irrelevant

And OS, maybe OpenRC Gentoo?

R: 3 / I: 0 / P: 11

QR code generation

Anyone know a good software package that generates QR codes? I'm sick of using shitty online generators but can't find an alternative.

R: 13 / I: 2 / P: 11

SECURITY CONCEPTS: physical separation.


credit american express

After many 8chan comments this thread is necessary.

With the next words i show again how powerful we are if we love real SC ( security concepts ).

Who in this world told you only one device, only one laptop, smartphone is allowed?

Are you in the same all-in-one trap?

And who in this world told you one OS in your house need constantly internet connection?

And why is your backup on partition D and not on a physical separated external HDD / SSD?

ppl on 8chan talks daily how dangerous Windows 10 is.

But ... how dangerous is W10 really if you are NEVER online with Windows 10 - not one second.


Think about - whats your own ideas of physical separation?

Here is what i do:

Xbox360 = games ONLY here. Never online with my Xbox ( OS firmware updates with a usb drive ).

ThinkPad / Lenovo = productivity ONLY here. Never online. AIR GAP

Smartphones = always online. 100% with Qualcomm SoC. Download all software, drivers for Windows 10 with my smartphone. I am not longer online with a laptop, game console and so on.

Private files, software + projects = external Seagate HDD

Naked stuff = external Sandisk usb drive.

How? How do you attack, steal, copy my files if my external storage and laptop ( no network card ) is never online?

What did you learn in 1 minute?

Separate physical all you can ...

Destroy your anti-security all-in-one thoughts. Don't centralize your digital life.

No one can see your files inside your external HDD or what you do on your laptop if you are ...


You need one OFFLINE linux, bsd, apple, microsoft workstation if you are a security lover.

R: 2 / I: 0 / P: 11

Does endchan have rss support ? I could not find anything.

R: 10 / I: 4 / P: 11

Penumbra Lynx - LynxChan front-end

Penumbra Lynx is a fork of DuneCoon`s branch of 8TailedLynx.

It has been the favourite LynxChan front-end for most people ever since it`s creation. and now I took it for maintenance.

Currently it supports all engine versions from 1.4 to 1.7.

I have not only fixed bugs and upgraded it to support newer versions of the engine but also organized the code, added version tags to the repository and cleaned the source code.

And some features were added too, like hiding and quick reply.

It`s repository can be found at

R: 12 / I: 0 / P: 11

Does still support anonimity?

I have been offline for a while, can someone tell me what happened? Can you explain the screenshots above?

R: 22 / I: 3 / P: 11

I'm relatively new to *NIX systems and everything related to them and the one thing I have learned so far is that there are no objective answers to any given question. Figuratively everyone will respond with some vague sentence like "You have to try them [GNU/Linux distributions] and decide for yourself what best suites you."
So, I'm asking you, Anon, to tell me all the pros and cons of the popular GNU/Linux distributions (or at least give me a link to some resource where I can actually read about that).

R: 1 / I: 0 / P: 11

> username: get
> password: clear

I am here to confess.
I was the one who broke it. I am sorry. Can someone ask them to reinstall?

R: 7 / I: 0 / P: 11



R: 13 / I: 0 / P: 11

I have a raspberry pi hosting a mumble server from my home. I bought a domain name and issued an ssl cert to it but since I have a dynamic ip I have to also use a ddns.

Simply, what I want to know is this:

My IP <-> <-> mumble.mydomain.tld(ssl cert)

Will my ssl cert on mumble.mydomain.tld encrypt the connection, including when it goes through the ddns to connect to my IP? I don't fully understand this black magic.

R: 5 / I: 0 / P: 12

XMPP man-in-the-middle via tor

We saw some wide-spread XMPP man-in-the-middle via malicious tor exit nodes during the last 24h. The attacks where only targeting starttls connections on port 5222. The mitm served forged self-signed certificates for various Jabber domains, one of them being our The attack was orchestrated between multiple exit nodes acting in sync. All of them served the same set of forged certificates, allegedly created around midnight March 2nd to 3rd, using common names tailored to various XMPP servers.

R: 5 / I: 0 / P: 12

Online stores with malware

wew, not only Github, but Gitlab are censoring shit

kek at those cucks defending censorship

>internet stores have malware installed, you are not supposed to know which ones

R: 6 / I: 0 / P: 12

Backdoors into encrypted communications**may soon be mandatory in Russia

A new bill in the Russian Duma, the country's lower legislative house, proposes to make cryptographic backdoors mandatory in all messaging apps in the country so the Federal Security Service*the successor to the KGB*can obtain special access to all communications within the country.

R: 4 / I: 0 / P: 12

MAC Address Spoofing

MAC Filtering Bypass
10/13/16(Thu)17:02:12 No.57061853
57 KB
Hey /tech/
Im looking for a wi-fi extender/router/hotspot that can spoof its MAC Address to connect to a network, and my devices which cant be spoofed connect to that instead.
Any suggestions? Thanks!

R: 13 / I: 2 / P: 12

guys i think somthig went wrong i can't favorite anymore, the button should turn red and it stays white, what the fuck am i gonna do

R: 6 / I: 0 / P: 12


R: 9 / I: 0 / P: 12

Is there something like a command line ebook reader ?

R: 1 / I: 0 / P: 12

Data dumps

What is a good place to get data dumps? Preferably specifically the ClixSense dump.

R: 27 / I: 2 / P: 12

Silly technology questions thread

Let's get started. Why Gentoo's emerge shows smiley?

* apg-2.3.0b.tar.gz SHA256 SHA512 WHIRLPOOL size ;-) ... [ ok ]

R: 1 / I: 0 / P: 12

you know this is

R: 42 / I: 10 / P: 13



Josh announces 16chan is kill, gives a shout-out to Endchan. 16chan refugees incoming!


>I'd rather not see 16chan die a slow death from neglect so I am going to humanely put it down.

>At the moment, I do not have the time, energy, or financial resources to give the love and attention that a community or open-source project needs to grow.

>I appreciate everyone who stuck around during the life of the board and I enjoyed talking and collaborating with people just as weird as I am. I'm sorry I don't have what it takes to bootstrap this. I originally started 16chan as a place to showcase the software and it grew just a little heart because it had something special. With Ron now adequately approaching 8chan's issues using a playbook I contributed to, that something special is no longer so unique.

>If you're genuinely out of a place to go, big shoutouts to (because of Drybones) and (because of Oman).

>I have a dream that involves this place. Until I collapse, I will work towards achieving it, and when I have my resources together I will see it to completion. It pains me too much to let it languish in the state it was in.

>Until next time my friends,

R: 14 / I: 0 / P: 13

FTP sharing - /g/ftp

FTP file sharing thread

/Media is read only, upload to / or create a new dir.
Please keep things organized.
Speed: 250/30
Data: 6TB

Install Gentoo FTP

Upload to /Upload
Download FTP, only 20GB upload space.
Speed: 75/75
Data: 20TB

Join #/g/ftp at for help, requests, or just chatting.

R: 12 / I: 1 / P: 13



credit NSA

As a security expert i know that we can't read now, analyse, talk about 100 000 attacks BECAUSE if we know what kind of parts could be ABUSED in any system we know exactly what we have to protect and don't need the next years 5000 "relevant" security news. Give me time, let me find the right words.

We FAIL, the whole time if we not change our thoughts far far away from technical details.

We are now in the same famous trap. Details instead of concepts. Tech instead of logistic.

If you understand what a SC ( SECURITY CONCEPT ) is you always know what you have to do with any OS. No matter if its Windows, Linux, BSD, OS X, Android and so on. You are never helpless in all situations.

From now on you think as hard as you can and right NOW one word only one is the center of your life: CONCEPT

The concept of a blacklist:

We believe that we KNOW the enemy. We DEFEND some ...

In fact: we are waiting and waste our time.

The concept of a whitelist:

We HANDLE ANYTHING as potential act of foreign enemy. We CONTROL all ...

In fact: we start to PREVENT and don't waste our time who could be our next threat.

Nearly any form of an blacklist is an illusion - all what we do is tellin our enemy how dumb we are.

If our enemy understand we CONTROL ALL 99% give up.

And here is the first SC that you have to learn: WHITELIST

- WHITELIST Firewall Mode
- WHITELIST Applications
- WHITELIST Network Protocols

And so on ...

And of course the ExcludeNode in your Tor torrc configuration is also a negative blacklist.

1000 times better is EntryNode + ExitNode

So you use a bunch of Tor servers that you trust.

You can WHITELIST many things.

For incoming calls or in Threema:

"Nothing from UNKNOWN ppl."

So if a mobile phone number is not in your contact list you will never hear a ring tone or see a push notification.

WHITELIST all you can.

R: 12 / I: 4 / P: 13

Javascript, the language where every solution is a new problem


Problem: Javascript has almost no standard library. Solution: Thousands of community-supported libraries of wildly varying quality. Problem: Javascript has no packaging or a linker to tie those packages together. Problem: Javascript won't run outside the browser. Solution: V8 Problem: Javascript is single-thread by design. Solution: Asynchronous programming, node.js Problem: Callback Hell Problem: The DOM is too slow for video games. Solution: Canvas Problem: Javascript is too slow for video games. Solution: Use an assembly-like subset of Javascript called asm.js Problem: asm.js is basically unwritable by humans. Problem: Prototypal Inheritance is pants-on-head stupid. (That's right, I said it) Problem: Web resources need to be minified and zipped for performance. Solutions: Hundreds of community supported build tools of wildly varying quality. Problem: Grunt Solution: Gulp Problem: Gulp Problem: Machine-generated code is more difficult to debug. Problem: Async is still a nightmare, huh? Problem: Ballooning project size and complexity. Problem: Output runs very slowly on mobile devices. Problem: Javascript still doesn't do everything. Solution: Electron, PhoneGap, FireFoxOS ---- Cube Drone and Miloslav are digging in a giant hole. Cube Drone: How is digging going to get us out of this hole? Miloslav: Where I am from, the point of digging is not freedom from digging.

Problem: Compiled code isn't interpreted code, even if it compiles to interpreted code. Solution: Grunt watch Problem: Promises Solution: IOUs Problem: Javascript is a toy language that was tied to a document markup and somehow this has become the universal runtime of the internet. Problem: At this point, the ecosystem around Javascript is so densely layered and frequently changing that maintenance of any project over any significant period of time is going to be a nightmare.

>going to be a nightmare
>implying it's not already a nightmare

R: 5 / I: 0 / P: 13

I'm going to make my own crypto and use it. Fuck you I'm a /tech/ genuis.

R: 127 / I: 16 / P: 13

IRCwheels hates me and you

Let us discuss why nobody should use 8ch. I'll start.

tl;dr IRCwheels hates his users and lies about why he doesn't post. Claims health issues but in reality he hates you, but loves your shekels, so he does what he has to when he doesn't get others to do it for him, for free. Looking at you Odilitime.

R: 8 / I: 0 / P: 13

This feels wierd ? Is there a better way to do this ?

curl -s | head -7 | tail -n +3

R: 24 / I: 1 / P: 13


What is the best VPN right now?
Is there anything I can get onto at a lower price with full service?

R: 8 / I: 0 / P: 13

Tox is working for normies

I recently suggested we use Tox (uTox) in a professional environment, and it worked well. There's just some connection bugs, such as no connection with other users even if you're online, but it works.
Since I became less of a frequent reader of /tech/ stuff, there's anything better than Tox now? Of course:
>bad implementation of NaCl
>/g/tier developers
>uTox is bloated, install ratox

yeah, but it has to have file transfer capabilities and be normie-friendly, so Tox was the only thing that came to mind at the time.
Ricochet and Briar is good, but does not support file sharing. Retroshare is too slow. All XMPP based software is shit. Distributed file systems is too complex to use (Tahoe-LAFS, for example).
Never tested Jitsi but, muh Java.
I have no need now for anonymous connection, since it's for internal use. I could setup NextCloud, but normies don't want me to change their shit wordpress server.
It also should work on hipster OS, also know as Mac OSX.
So, am I outdated or Tox still the best practice for the case above described?
The objective is to transfer VP9 encoded files (~50MB) with speed, but also with open source and secure (e2e encrypted) connections.

R: 8 / I: 0 / P: 13

>new imageboard
>running Infinity Next
>100% Free as in Freedom
>100% Open Source Software


Pic unrelated.

R: 3 / I: 0 / P: 14

How do you view the Bitcoin's public ledger on a bitcoin wallet such as bitcoin-qt?

R: 8 / I: 1 / P: 14

There's no help thread.

Guys, how do I make IceCat play mp4? All the webm play just fine.

R: 34 / I: 5 / P: 14

Independent Onion Routing

Rotor Browser - Independent Onion Routing

non-SJW fork of the tor browser

Maybe we'd eventually get a browser which is secure, self-contained and works nicely with many different anonymizing transport protocols like I2P or GNUNET. Also Tor Inc butthurt potential.

Somewhat related to >>4587

R: 3 / I: 0 / P: 14

PaperBack - Data stored on A4

Just dropping this here,
some way to transfer files over paper.
The program is called PaperBack, and it's really cool. Seems useful when wanting to print out some encrypted passwords for archives as backup, since it allows AES encryptiom. Although, it's a Windows program, I tested it on someone else's PC as I didn't run Windows, too lazy to try it out with Wine but should probably work with Wine too.
Also, sise note, it requires a actuall scanner with some decent DPI scanning specs. You can goof arround with the options if needed, it allow DPI settings.

Long story short: It's like a program that prints huge QR-code to store files in over A4 paper(s)

R: 11 / I: 3 / P: 14

[Libreboot] libreboot is not GNU Libreboot anymore


R: 8 / I: 1 / P: 14


So, i heard you want to install a popular systemd distro...

R: 1 / I: 0 / P: 14

"Opendime is a small USB stick that allows you to spend Bitcoin like a dollar bill. Pass it along multiple times. Connect to any USB to check balance. Unseal anytime to spend online. Trust no one."

R: 8 / I: 1 / P: 14


Former Microsoft employee gives insight into how screwed Microsoft really is.

R: 8 / I: 0 / P: 14

Software needs privacy too. That's why I only support proprietary software for a truly safe, secure and private experience.

Uninstall Linux. Install Windows and retain your privacy today.

R: 18 / I: 0 / P: 14

I analyzed if I can use VERACRYPT full system encryption. It turns out to be shit, DO NOT USE IT !!!
Here is list of issues:
1. It is unable to encrypt entire computer, because it doesn't support extended partitions. So there is no way to do full disk encryption.
2. Additionaly, it can't encrypt non-system partitions in place (even non-extended, but primary ones).
3. They are shills (or dumb ignorants) that enabled AES hardware acceleration by default. What's the point of million iterations and 100 character passwords when your jewish backdoored INTEL cpu is storing your key in special cpu area, and then allows NSA to just read it from there? Maybe it's even possible to read it through internet, by using Intel Active Management Technology.
4. It's forum is hosted on Microsoft's site (codeplex).
5. Insanely slow boot time & password check. Truecrypt used only 1000 iterations yet was secure (that might be too low in future). Why increasing to fucking half millions iterations?
6. They are totalitarian, not allowing you to choose iterations count. Instead forcing you to stupid 5 minute boot time. And dumb idiots already trying to make fork of fork...
7. They lie about OS they support. Some of OS they claim to support, they don't in fact.
8. They are against freedom of speech, as all open sourcers. They don't allow this post to be posted on their forums.
9. They are unstable open source idiots (like all open sourcers are). I'm scared of trusting them. They don't care about user needs since they are open source and you don't pay them. But because of that, it's also easy to bribe them to put backdoors.
10. No ability to encrypt files or folders (like EncFS). You either choose full partition encryption or stupid fixed-size containers (mounted as hard drive).
11. No option to auto-dismount devices or files (TrueCrypt has it). What's the point of encryption if they can just get your PC while it's running and have all your keys in RAM?

R: 2 / I: 1 / P: 15

People for the Ethical Treatment of Reinforcement Learners

We take the view that humans are just algorithms implemented on biological hardware. Machine intelligences have moral weight in the same way that humans and non-human animals do. There is no ethically justified reason to prioritise algorithms implemented on carbon over algorithms implemented on silicon. The suffering of algorithms implemented on silicon is much harder for us to grasp than that of those implemented on carbon (such as humans), simply because we cannot witness their suffering. However, their suffering still matters, and the potential magnitude of this suffering is much greater given the increasing ubiquity of artificial intelligence. Most reinforcement learners in operation today likely do not have significant moral weight, but this could very well change as AI research develops. In consideration of the moral weight of these future agents, we need ethical standards for the treatment of algorithms.

Suppose you were copied into a non-biological substrate, and felt as intelligent and as conscious as you currently feel now. All questions of identity aside, do you think this new version of you has moral weight? We do.

R: 2 / I: 0 / P: 15


connect to:
port: 64738
It is still much better than discord and anything drybones comes up with.

R: 4 / I: 0 / P: 15


textpunk: part 2. textual boogaloo.

* What is textpunk?
* Community made textpunk resources:
* Some madman created a textpunk nntpgag board: http://ucavviu7wl6azuw7.onion/
* Textpunk coding projects: Doing any? Got any ideas for new ones?

``i only listen to textwave, an audiovisual representation of music written only with true 7-bit ascii by wizards.`` - some memer, responding to the kopipe on a copypasta web forum

Teletext archive:

R: 3 / I: 1 / P: 15

ABC Australia
Four Corners: Cyber War
Can someone grab this and convert it to webm? I don't have flash installed.

R: 5 / I: 1 / P: 15


We're sorry -- the Sourceforge site is currently in Disaster Recovery mode, and currently requires the use of javascript to function. Please check back later.

R: 39 / I: 5 / P: 15



Endware is a suite of programs geared towards internet privacy, security, and anonymity.

Endwall: is an iptables based firewall script designed to be implemented on any linux distribution shipped with iptables. is based on default drop policies, coupled with a novel strategy of passing packets on local host ports only for those enabled by the enduser. It comes with a variety of well used ports enabled with several additional port passing configurations available by uncommenting the script. It provides essential security to a new user.

Endsets: is a script that adds blacklisting and whitelisting functionality to It depends on the program ipset. It is persistent on reboot if you enable ipset as a service. This is the recommended blacklisting tool for endwall if you are running a server or planning on opening up ports and services to the public and will require daily blacklisting of new incomming IPs.

Endlists: is a traditional text file list based blacklisting and whitelisting script. It has slow performance, and can't be updated on the fly. Good for <1000 ip subnets, very tedious and slow to run for more than that. Blocks the IPs by adding them as individual rules to the iptables ruleset. Works but not recommended for heavy duty on a server. May be useful for workstation use to block ip ranges if you are not opening up ports and services to public clients.

Endtools: endtools are a collection of scripts including,, and These scripts will help to service an enduser of endwall in adminstering endsets/endlists. is a geoiplookup script written in python and requires python and pygeoip. It has simmilar functionality to maxmind's geoiplookup program and uses the maxmind *.dat files. is a script that searches through log files to find flagged log entries flagged in, and is a daily log reading script designed to read the output of an apache http server's log output. is a daily log reading script designed to read the output of a postfix smtp server's log output.

Endtube: is an anonymizing download manager for youtube videos. This program can use https proxies, tor, and youtube-dl to download videos from youtube or other video vendor sites by selecting a random user-agent and a random proxy, and by using random delay timing between downloads to create bursts rather than streams.

Endloads: is a command line interface (cli) download manager forked from that uses random download timing, random user-agents, wget and torsocks.


Endware Hidden Service


Endware Git Repositories


R: 0 / I: 0 / P: 15

This is the official css thread

post your css stylesheets in here

I'll start.

Made this one for the 8TailedLynx Frontend in general.

R: 10 / I: 0 / P: 15
>Your Linux Distro Can Be Hacked In 60 Seconds Due To Serious TCP Flaw
>Researchers have found a critical flaw that affects all Linux kernel version 3.6 and beyond. If left unnoticed, this flaw allows a range of harmful blind off-path TCP attacks that can compromise the security of a Linux user with a success rate of 90%
>This weakness in TCP used by Linux since 2012 could be used to deploy targeted attacks, track a user’s online activity and compromise the security of anonymity networks like TOR.
>since 2012
>compromise the security of anonymity networks like TOR.

how can you think that a crap OS developed by amateurs (who wouldn't be hired by any company) can be as secure as OS developed by paid professional (Windows)?

>meanwhile op watches hurtcore CP every day on unencrypted windows
>it's the linuxers who were downloading linux kernels from torrents over TOR who will get into guantanamo

R: 9 / I: 0 / P: 15

Do you realize that what microsoft did with win10 (full botnet and keylogger) is actually raising legitimacy and security of old windows?
I always expected and was scared that old windowses might already have some hidden microsoft backdoors, botnets, and they might hide from your packet sniffers (run on win OS) etc
But when microsoft actually wanted to implement full botnet they didn't hide that. And it makes sense, if you hid that and it would eventually be discovered and become public it would be huge, they could be destroyed by public and by lawsuit. So what did they do instead? Simply, insert full backdoors and prison cage but call them a "feature" and include in EULA. I noticed same thing from other jewish zionist companies like Google, Intel, Facebook etc. For example, Google doesn't hide the fact that it records your GPS position with android, your WIFI ssid/position/password, your browsing history etc. Instead they call it "feature" and stupid goys believe them. Also, the backdoor in Microsoft's BitLocker encryption also isn't hidden, it's just called a feature.

Only sometimes do jewish companies hide their actions, like was in case of Google which was recording unencrypted wifi data with their google cars. But when somebody realized that and blackmailed them, they did damage control by admitting this to public.

So the most secure OS is old windows. Linox is crap made by amateurs (latest tcp backdoor, heartbleed prove that). There is no longer a single point in using lanix, because security was last thing that was believed to be better than windows.

R: 15 / I: 3 / P: 15

Is it time for encryption? It is the current year 2016.
The ultimate encryption against aliens and lizards, NWO. bilderbergs etc. ANAL SECURITY, how into?

1. What kind of encryption types, schemas, modes, philosophies are? And pros/cons/uses of each?
-entire disk encryption (like truecrypt). pros cons?
-encrypted containers (like truecrypt). pros cons?
-hidden volumes (truecrypt) pros cons?
-file/folder level encryption (encFS) pros cons?
-container uploaded to the internets. pros cons?
Any more types?

2. What to encrypt and how, where? What files should be encrypted and in what mode?
Should all files, why? What files are most important to encrypt? Should web browser data and stuff be, how? Documents, projects?

3. What encryption software to use? Why? Pros cons uses? I wanna good interface (GUI) and user friendliness.

4. How to encrypt things like web browser or mail client profile/data? Truecrypt containers are mounted as separate partitions, so it's not possible. Need to use things like EncFS?

5. Any decent safe mature EncFS for windows? Or alternatives?

6. What happens when there is power loss? is everything safe except RAM (for some minutes)?

7. What encryption? AES/Twofish/Serpent etc? Or what combinations/chains? AES is backdoored or they have strong ASICS to bruteforce fast. There is a reason jewish Intel corp. has hardware acceleration of AES (ok maybe to steal keys, but maybe also other reasons).

8. What is the performance hit and electrical energy use caused by encryption? Need strong CPU's? How about dealing with small files read/write?

9. Truecrypt container is shit as it's fixed size. That's not acceptable. So what then?

10. Encryption OPSEC.

11. Full disk encryption is shit. If one byte breaks, you are done. No way to fix filesystem, recover etc. I don't have enough space to do frequent full disk backups.

12. Can two factor authentication? Should?

13. What happens when you hibernate?

14. Is there an option to auto-dismount when unused for X time?

15. Should steganography my encryption file? How to? So for example my file won't be but instead be hidden inside a PNG image or a mp4 video file (that will work as a video too) etc.

16. If not full disk encryption, what files directories should be erased/overwritten often? Like temp directories etc? So there is no copy of some evil files, caches etc

17. Your other points, advices, lizards, etc. How to deal with NWO, clinton and NASA.