I bring the Binary Gospell to all....lol StIgnatiusofCyberspace 09/21/2018 (Fri) 04:35:09 [Preview] No. 293 [Reply] [Last 50 Posts]
No one really knows what the matrix is.....



Anonymous 09/19/2018 (Wed) 14:35:43 [Preview] No. 12870 [Reply] [Last 50 Posts]
I MADE A THING :DDDDDD

https://github.com/loki-project/loki-network

posting via it rn


Anonymous 09/19/2018 (Wed) 14:49:27 [Preview] No.12871 del
>https://github.com/loki-project/loki-network/blob/master/doc/high-level.txt
This is awesome. I like how its called the LLARP protocol.


Anonymous 09/19/2018 (Wed) 15:58:36 [Preview] No.12872 del
llar protocol tbh


Anonymous 09/19/2018 (Wed) 16:01:30 [Preview] No.12873 del
I originally was going to call the reference implementation of the server WIZARD (wan/inter-network zero anonymity routing daemon) and the client BARD (blind/anonymous routing daemon) where BARD had a mesh local layer.


Anonymous 09/19/2018 (Wed) 19:09:37 [Preview] No.12874 del
This is fucking boss. Nice work op.



Online Security News Endwall 07/07/2016 (Thu) 06:09:23 [Preview] No. 149 [Reply] [Last 50 Posts]
See a news article or CVE bug report on an emerging computer security issue and want to share it? Post below.

I will also post links to Hak5 Threatwire videos.
Edited last time by Endwall on 07/07/2016 (Thu) 16:22:47.
504 posts and 3 images omitted.


Innovative anti-aging. Or as in 70 years look 30 years. Frankwon 08/10/2018 (Fri) 11:46:22 [Preview] No.1258 del
What do you think about it?
This person is selling the secret of eternal youth:

Endwall:
It could be a scam...but you never know, eternal youth sounds enticing...
No Spam 6 Month Ban
Edited last time by Endwall on 08/13/2018 (Mon) 21:35:18.


Endwall 08/13/2018 (Mon) 06:44:33 [Preview] No.1263 del
Hak5
Steal One Billion Euros? Get Arrested - ThreatWire 9:29
https://youtube.com/watch?v=OpFYA-Xfx9U [Embed]


Endwall 08/22/2018 (Wed) 00:41:05 [Preview] No.1284 del
Hak5
DEF CON 26: Voting Machines Hacked by Kids! - ThreatWire
https://youtube.com/watch?v=mHm0yle6GBI [Embed]


Endwall 09/05/2018 (Wed) 06:16:54 [Preview] No.1307 del
Hak5
Fortnite Rewards for 2FA, T-Mobile Hacked, and Apache Struts Vulnerable to Hacks - ThreatWire
https://youtube.com/watch?v=Hov9LKSSmO4 [Embed]


Endwall 09/15/2018 (Sat) 20:27:18 [Preview] No.1308 del
Hak5
Hacker Charged for Sony and WannaCry Hacks - 8:31
https://youtube.com/watch?v=UAXWFX0huM8 [Embed]



(220.29 KB 1920x1080 1498596199651.png)
Anonymous 06/28/2017 (Wed) 14:13:05 [Preview] No. 8768 [Reply] [Last 50 Posts]
/g/ is building an OS
http://boards.4chan.org/g/thread/61110805

It's a riced out, gentoo based desktop distro
https://cloveros.ga/

Has a nice low ram footprint

irc.rizon.net #cloveros
110 posts and 56 images omitted.


Anonymous 05/16/2018 (Wed) 19:35:40 [Preview] No.12731 del
(3.81 MB 3264x2448 IMG_20180330_004725.jpg)


Anonymous 05/18/2018 (Fri) 01:29:31 [Preview] No.12734 del
>>12731
Nice background.


Anonymous 07/18/2018 (Wed) 11:50:41 [Preview] No.12839 del
Pretty cool distro, however.
There are a few things that the maintainers neglect to tell in their repository.
Things like the overlays used in the binaries.
From what I've been able to piece together is that most bins and most of their package.use is built around the Libressl overlay and (maybe?) a few others.

There is also a huge problem right now with the way they setup nvidia drivers.
The driver that is downloaded and supplied is (again from my understanding) built for linux version 4.14.* whilest CloverOS currently runs 4.16.* which is a uge problem because installing these drivers will destroy your install.
additionally, the nvidia drivers supplied are 396.24-r1 which is the unstable versions that lack legacy support for some older(not that old) graphics cards.
The system doesn't store a local version of their Gentoo sources, so if you want to go full Gentoo you'll have to download the sources.
This made getting dkms nvidia drivers a bit annoying.

It would be great if the script was updated to serve a dkms version of nvidia drivers, various versions would help with legacy support.
That being said, i get the feeling the scripts weren't designed much with supporting a wide range of systems.
If you use some memeware thinkpad/toughbook this distro is perfect right out of the gate.
If you want to get some other kind of setup to work it'll require a bit of legwork, but that's not a bad thing.
It's amazing how simplified this makes a your regular Gentoo install.
Because it's Gentoo I've been able to get most of the above to work perfectly.


Anonymous 07/20/2018 (Fri) 15:54:14 [Preview] No.12845 del
>>12731
Not to be too forward, but I want to lick your desktop. Do you find this is a common reaction?


Anonymous 09/15/2018 (Sat) 09:37:54 [Preview] No.12869 del
>>12845
I want to bite his desktop on the ass. I don't know how he can stand to have that as his background, I would have broken the screen or my dick before long.



OPSEC Endwall 08/23/2016 (Tue) 01:08:39 [Preview] No. 357 [Reply] [Last 50 Posts]
Discuss best practices for operational security.
13 posts omitted.


Anonymous 07/12/2018 (Thu) 19:23:11 [Preview] No.1248 del
copied from:
>>>/b/17546

BASIC SECURITY TIPS UPDATED

(1) Don't use social media [Avoid Facebook/Myspace/Twitter/Snapchat/etc.] (no brainer) Tell your friends to just hang out with you face-to-face instead of using social media.
(2) Forward secrecy (keep your mouth shut about any personal info if you don't want to expose yourself)
(3) Use a cheap private VPN (w/ no IP logging policy) and Tor browser! You can also use an OS like Whonix or Tails to spoof your MAC address in extreme cases.
(4) Always disconnect your internet (physically) when you are not going to use it! Make sure bluetooth and WiFi is physically disabled/disconnected. Don't keep your modem online all the time! If you do, you are asking to be hacked!
(5) Use an old "flipper" phone. AKA a jitterbug. Cover up any camera if has one. Jitterbugs are basic cellphones for people with disability problems / senior citizens! Just a bare basic cell phone where you can take out the battery. Has no internet platform. Any kind of device that has a camera you might want to consider covering up because they can easily be hacked to spy on and identify you remotely.
(6) Flock to flea markets, garage sales, thrift shops to buy older electronics! Do not by 'smart' or 'green' appliances! Learn how to maintain and fix older products/utilities too! All IoT (Internet of Things) tech can be used to spy on you, avoid IoT and 'home automation' technologies! Trojan horses, all of them.
(7) Never put your real name or personal info into your computer, always use FAKE names / aliases.
(8) Use cash whenever possible. Credit Card and other digital transactions can be tracked and directly linked to you. Cash could be tracked back to you too, but it is much harder and takes a lot of effort and human resources for governments to do.
(9) No OS is safe. Just exclude as much personal information you can from your Operating System. Make sure its disconnected offline when not being used! Make sure bluetooth and WiFi is also physically disabled/disconnected when not in use. If you use a "hot spot" which I do NOT recommend, at least turn it off and put it inside a little faraday cage bag when not being used (to prevent more sophisticated remote tampering).


Anonymous 07/12/2018 (Thu) 19:27:21 [Preview] No.1249 del
>>>/b/17546
(10) Always bleach you browser cache / cookies / web logs! 35x gutmann style! (Bleachbit, Ccleaner, etc.)
(11) Browser Security: Use Noscript Security Suite add-on. Noscript is a must: make sure to block all global scripts, wipe the whitelist in Noscript and re-configure the whitelist that best fits your browser habits. IPFlood is also a useful add-on to obfuscate IP GET requests. You should use Random Agent Spoofer (or Blender) to spoof your browser & OS metadata while you surf the web, making it a lot more difficult to track your activity. Tin Foil is another great security addon. Also, make sure WebGL and WebRTC are disabled in about:config (research how to disable those, there are tutorials out there).
(12) Its best to have two computers, rather than just one. For example, have one just for banking / legit LEGAL purposes. Have another one (completely separated) just for private or illegal activity. Make sure you don't put any personal info in the private computer.
(13) Use encryption and strong passwords! Write them down on a piece of paper or memorize them. DO NOT store passwords on a computer file. That is a big no-no! Try easy to remember long sentences for passwords, and combine all the words together. The more characters used, the harder it is for hackers to break the passwords.
(14) Have separate email accounts for each kind of activity (legal or not, don't matter).
(15) Make sure you physically disconnect your web cam or cover it up with black electrical tape. Most laptops these days come with web cams attached above or below the monitor. Make sure the camera cannot be used to identify you or spy on you in any way. (Yes, webcams can be hacked / remotely hijacked to spy on you!)
(16) Avoid new "Smart TVs" (they spy on you too)! If you have a newer TV, make sure you cover up or unplug the camera and microphone. Or keep it offline and disconnected from the cable box when not in use. You could cancel cable and just rip DVDs of your favorite movies and shows instead, using them on an offline TV set.
(17) Avoid all new digitized vehicles. They can easily be hacked, used to spy on you and even be remotely hijacked by criminal entities/governments!
(18) Never allow another person to use your computer. Make sure you routinely backup important files to a flashdrive or DVD and store that data offline. Also make sure you have a backup copy of the OS you use as well as backups of the software you use. If you ever have problems with your OS someday, just wipe your partitioned OS, and then re-partition the OS again yourself from scratch. Do not allow others to 'fix' your computer, they could easily steal information from your OS you might not want them knowing about. Geek Squad works with the FBI and other agencies to steal data from their customers, do not trust them to fix or repair your computer.
(19) Any photos you take with modern cameras contain EXIF metadata that contain GPS coordinates among other data used to identify the owner of the photo. If you store your modern photos online, people will be able to identify you. Don't do it! I repeat: do not post modern photos online unless you want to be identified! (I have been told PNG formats do not store any metadata, so photos converted to PNG might be safe).

Test your online privacy and learn more: https://www.privacytools.io/


Anonymous 07/13/2018 (Fri) 15:50:44 [Preview] No.1250 del
I might as well add this report to this OPSEC thread: https://archive.fo/bBjkm

Do not allow any electronic made after 2018 into your home and you better have some backup older electronics which don't have cameras and hidden mics. The Wall Street Journal just rubbed it in our face that this is going to become the norm very soon as they will be embedding tiny microphones in almost every single thing they can get away with. So anything digital beyond 2018: don't buy it.

And do avoid things like Echo, Siri and other crap created by the big tech monopolies. Make it clear to your family, relatives and friends you won't allow this around your presence (or at least in your own residence). It is all up to us to wake others up about how they are stealing our data and selling it all over the world and if we allow it we are stupid as a bunch of rocks.


Endwall 07/13/2018 (Fri) 23:55:01 [Preview] No.1251 del
>>>/b/17546

I agree cook your own food. Buy from the local farmer's market, or from the grocery store. Cook your own food in your own house. Don't order in. As you mentioned its easy to poison you once they know your pattern. You call for take out and they intercept the delivery or have someone planted there to poison your pizza.

I just meant to say don't do crime or talk about crime or personal things on the phone, no phone sex, no dirty talk, just innocuous facts, and lawful business. "Hey are we low on milk? Yeah OK I'll pick some up, bye." Nothing about money, politics, drugs, crime, or sex. It's all being recorded digitally and stored, and if you become a "Person of Interest" they go through it and pin point all the incriminating stuff to use on you for blackmail, coercion, criminal indictment, front running etc.

Its too bad that they removed all of the public pay phones...If there were no cameras in the area you had a small level of anonymity (very small). We're going to have to look to an encrypted VOIP by tcp solution for a "Secure Line". Even then don't trust it too much.


Anonymous 09/04/2018 (Tue) 22:26:56 [Preview] No.1306 del
>>1248
>Use an OS like TAILS or Whonix to spoof your MAC address
Any BSD/Linux machine can do this with GNU macchanger [1].
I don't know how Tails or Whonix does Mac spoofing but I'd imagine they use the same thing.

1: https://directory.fsf.org/wiki/Macchanger (note: hasn't been updated in 4 years)



Discussion Thread Endwall 02/24/2018 (Sat) 01:52:08 [Preview] No. 1145 [Reply] [Last 50 Posts]
DISCUSSION THREAD
Want to say something off topic about anything?

Have a hot tip about something in the computer security world that doesn't fit into any current thread or category?

Want to chat with your fellow invisible 7 proxy friends?

Want to tell Lt. Gen Michael Hayden, GEN Keith Alexander, ADM Michael Rogers, GOOGLE, AMAZON, FACEBOOK and Microsoft etc. how you feel?

It's open mic at >>>/os/ , anything goes!!

Put all of your banter here:
37 posts and 1 image omitted.


Endwall 08/24/2018 (Fri) 22:30:59 [Preview] No.1299 del
>>1298
$ torsocks proxychains -f ~/bin/proxychains.conf curl www.google.com

This works with random chain , however

$ torsocks proxychains -f ~/bin/proxychains.conf iceweasel

Doesn't work. It tries to open a library (libproxychains.so) and can't (probably restricted by torsocks).

So ($ torsocks proxychains)seems to work for some applications (terminal/console applications) but not well with GUI applications. For that just just use proxychains in strict-chain mode and handle the proxies manually, or call it as you wrote earlier with two instances of proxychains with different configs. I'm using proxychains-ng, because that's in the hyperbola repository. I'll go find the original and build it from source.

Anyways don't listen to the naysayers, proxychains is a useful tool in some circumstances.


Endwall 09/02/2018 (Sun) 01:53:15 [Preview] No.1302 del
Due to the recent unfortunate news about Terry Davis, I'll be hosting a backup of TempleOS (downloaded from the main site Sept 1 2018) here:

http://ifcfqq3cwrr74v6q.onion/content/temple_os/

Someone should write a serial console and serial modem telephone BBS program for Temple OS and it will become instantly viable as a modern 64 bit Commodore 64 replacement. Make Temple OS work with a US Robotics 56K Fax Modem over serial COMM port and we're in business.

The main problem I have with the OS concept was in choosing x86_64 as the development platform, good intention but naive. I've booted it on bare metal to try it out, spent 2 hours with it and haven't revisited. It's a good start, something to build off of.

Shrine OS looks like an interesting fork.
https://github.com/minexew/Shrine
TempleOS Mirror
https://github.com/minexew/TempleOS
https://github.com/codepony/templeos

http://www.templeos.org/


Anonymous 09/02/2018 (Sun) 03:13:35 [Preview] No.1303 del
>>1279
This doesn't work because if you stop the tor daemon the random chain still keeps going.


Endwall 09/02/2018 (Sun) 22:22:49 [Preview] No.1304 del


Endware 09/03/2018 (Mon) 02:55:43 [Preview] No.1305 del
>>1302

These are all the backups of Temple OS that I have on my hard disk.

http://ifcfqq3cwrr74v6q.onion/content/temple_os/

I have just before the supplemental split in 2017, and some versions afterwards.

Some people are doubting the authenticity of latest versions in 2018. However I think that the 2017 stuff is probably OK. I'm sure there are people out there with nightly ISO updates, but that should hopefully satisfy anyone's backup needs if you don't have any.

I'm sure a super fan will emerge with even more backups in the future, but I'll leave it there for now.



(30.89 KB 800x800 Sticky.jpg)
Anonymous Board owner 05/09/2018 (Wed) 22:40:59 [Preview] No. 12705 [Reply] [Last 50 Posts]
Welcome to /tech/, a technology board. This board is for general discussion of technology.

Rule 1: Only threads about technology or /tech/ itself are allowed.
Rule 2: NSFW content are only allowed if they are spoilered.
Rule 3: No referral links, asking for cryptocurrencies, advertising or similar.
Rule 4: No spam or posts without meaningful content.

All rules and policies are open for discussion in this thread.

IRC: #/tech/, #InfinityNow and #endchan on irc.rizon.net - https://qchat.rizon.net/
Wiki (OLD): https://wiki.installgentoo.com/

Archived sticky threads:

https://archive.is/Lcqkj
https://archive.fo/WxkDv

Message too long. Click here to view full text.

Edited last time by _ on 06/19/2018 (Tue) 02:20:22.
18 posts omitted.


betamax Board owner 06/06/2018 (Wed) 23:02:34 [Preview] No.12772 del
>>12771
Yet you keep on crawling back here time after time to waste your time in your persistently broken english. Nobody's really falling for your funny business. Go bitch and moan elsewhere but you know all too well that I can't stop you from destroying this place, you'll bypass it one way or another.


Anonymous Board owner 07/03/2018 (Tue) 18:01:19 [Preview] No.12821 del
It is done.


betamax Board owner 08/23/2018 (Thu) 08:45:34 [Preview] No.12861 del
(715.87 KB 2448x3264 1531934203961.jpg)
Just letting everyone know I'm still here.


Anonymous Board owner 09/02/2018 (Sun) 15:02:11 [Preview] No.12866 del
(150.00 KB dtkzja.tar)
Since there was just no way of restoring the old flags, I've uploaded 8chan's custom flags on here except for three which was the ones that wasn't removed from the database error from awhile back. No more broken custom flags.



Endware Endwall 05/03/2016 (Tue) 08:54:28 [Preview] No. 32 [Reply] [Last 50 Posts]
Endware is a suite of programs geared towards internet privacy, security, and anonymity.

Endwall: endwall.sh is an iptables based firewall script designed to be implemented on any linux distribution shipped with iptables. endwall.sh is based on default drop policies, coupled with a novel strategy of passing packets on local host ports only for those enabled by the enduser. It comes with a variety of well used ports enabled with several additional port passing configurations available by uncommenting the script. It provides essential security to a new user.

Endsets: endsets.sh is a script that adds blacklisting and whitelisting functionality to endwall.sh. It depends on the program ipset. It is persistent on reboot if you enable ipset as a service. This is the recommended blacklisting tool for endwall if you are running a server or planning on opening up ports and services to the public and will require daily blacklisting of new incomming IPs.

Endlists: endlists.sh is a traditional text file list based blacklisting and whitelisting script. It has slow performance, and can't be updated on the fly. Good for <1000 ip subnets, very tedious and slow to run for more than that. Blocks the IPs by adding them as individual rules to the iptables ruleset. Works but not recommended for heavy duty on a server. May be useful for workstation use to block ip ranges if you are not opening up ports and services to public clients.

Endtools: endtools are a collection of scripts including alogz.sh, mlogz.sh, spamlogz.sh and iplookup.py. These scripts will help to service an enduser of endwall in adminstering endsets/endlists.

iplookup.py is a geoiplookup script written in python and requires python and pygeoip. It has simmilar functionality to maxmind's geoiplookup program and uses the maxmind *.dat files.

spamlogz.sh is a script that searches through log files to find flagged log entries flagged in endwall.sh, endsets.sh and endlists.sh.

alogz.sh is a daily log reading script designed to read the output of an apache http server's log output.

mlogz.sh is a daily log reading script designed to read the output of a postfix smtp server's log output.

Message too long. Click here to view full text.

212 posts and 3 images omitted.


Anonymous 08/11/2018 (Sat) 04:17:38 [Preview] No.1259 del
>>1237
>>1238
>>1245
>"I use Debian with dash as the interpreter for sh and your scripts don't work, so you should shebang it as #!/bin/bash and it will work."
Jesus Christ, no, sorry I know I'm fucking late but I meant you should just shebang it to bash instead of /bin/sh if you were gonna have bashisms.

>Can you give me an example of one of the bash-isms from my scripts ?
I haven't looked for every little thing but most of the scripts use "==" instead of the "=" operator when checking for equality.


Anonymous 08/11/2018 (Sat) 04:20:17 [Preview] No.1260 del
>>1259
>Jesus Christ, no, sorry I know I'm fucking late but I meant you should just shebang it to bash instead of /bin/sh if you were gonna have bashisms.
Eh, sorry, dismiss that, I misread /bin/bash as /bin/dash, so yes, that was exactly what I meant, except I wasn't using debian but I WAS using dash as /bin/sh.


Endwall 08/12/2018 (Sun) 02:24:03 [Preview] No.1261 del
>>1259

$ man test

yup you're correct I'll work on fixing that later. I just assumed that string equality was tested like in C++ or other programming languages with == . while assignment used = . I am mistaken. I'll fix it.

I wanted the files to be portable and work on as many distributions as possible. So I she banged it with #!/bin/sh .

I'll modify all of the if statements and comparisons to just use equality, and do some testing to see if that works everywhere including with dash. Hopefully that solves the problem. This might get done by the end of the month ... I'm going to be semi busy in September with back to school, and really busy after October.

I have to nuke my main desktop and reinstall from scratch so I'll be out of commission for the next day or two and probably not back up to capacity until next weekend while I reinstall stuff.

If you see anything else that is upside down in the code, comment below and I'll take a look at it. Thanks for the feedback, it is very helpful.


Endwall 09/02/2018 (Sun) 01:34:32 [Preview] No.1300 del
I've merged the check24,check16,check8 programs into a single program called ipsweep.sh

https://raw.githubusercontent.com/endwall2/endware/master/ipsweep.sh


Endwall 09/02/2018 (Sun) 01:36:57 [Preview] No.1301 del
>>1300

I might change the name to ip_check, I'll think about it.

I'll fix the rest of the files to change == to = incrementally over the next little while as well.



(174.10 KB 500x375 1404081830023.jpg)
Anonymous 04/18/2016 (Mon) 15:50:14 [Preview] No. 484 [Reply] [Last 50 Posts]
I came here assuming this board was some /r9k/ spinnoff.

How many bots we got here? Is this board all AI? Can someone teach me to create my own AI Waifu? I've been having strange dreams for a number of weeks and find myself here.
3 posts omitted.


Anonymous 04/18/2016 (Mon) 15:58:07 [Preview] No. 494 del
>>490
Okay. ;/


mark 04/18/2016 (Mon) 15:59:03 [Preview] No. 495 del
>>494
made for gaijins it running Everyone bitched how to interpret a script file In this


Anonymous 08/22/2017 (Tue) 15:00:27 [Preview] No. 606 del
>>484
I find the bots on this board very helpful


Anonymous 06/02/2018 (Sat) 17:49:42 [Preview] No.608 del
did robutts create cryptomone?


Anonymous 08/29/2018 (Wed) 14:05:46 [Preview] No.609 del
(93.81 KB 435x594 1534786606065.jpg)
i am organic
reply to me bots!



(681.20 KB 2400x1600 ARM-A72-Meltdown.jpg)
ARM ChromeOS Meltdown Anonymous 03/25/2018 (Sun) 17:35:05 [Preview] No. 12529 [Reply] [Last 50 Posts]
>Meltdown only affects Inte-

Dumping this info here since /g/ is full of bait threads and shit.

This is what meltdown looks like in a Samsung Chromebook Plus. If you want to give it a try yourself, start by installing Arch on a USB stick

https://archlinuxarm.org/platforms/armv8/rockchip/samsung-chromebook-plus

And then,

$git clone https://github.com/lgeek/spec_poc_arm.git
$cd spec_poc_arm
$make
$taskset 0x30 ./dump_sys_regs

To pin the task to the vulnerable A72 cores use 0x30, use 0x0F to compare with the not vulnerable A53 cores.

Message too long. Click here to view full text.

1 post omitted.


Anonymous 04/15/2018 (Sun) 16:51:53 [Preview] No.12643 del
Running mainline kernel is now much easier.

https://archlinuxarm.org/platforms/armv8/rockchip/samsung-chromebook-plus

Mainline Kernel
The installation above will use the ChromeOS 4.4 kernel. The mainline kernel can be used instead, though some hardware may not be working yet.

Install linux-aarch64 packages, replacing the linux-gru package:
pacman -S linux-aarch64 linux-aarch64-chromebook
Type y and hit enter when prompted to flash the kernel to the kernel partition.
Reboot.


Anonymous 04/15/2018 (Sun) 16:54:13 [Preview] No.12644 del
The spectre/meltdown test still shows A72 cores are vulnerable under mainline kernel. Flashing firmware will require opening the device and removing the write protect screw on the bios.


Anonymous 08/28/2018 (Tue) 00:53:30 [Preview] No.12863 del
very interesting


Anonymous 08/28/2018 (Tue) 00:54:21 [Preview] No.12864 del
very interesting


Anonymous 08/28/2018 (Tue) 01:27:05 [Preview] No.12865 del
sorry



(999.11 KB 360x449 "Et tu, Palemoon?".gif)
Palemoon blacklists NoScript Anonymous 05/12/2018 (Sat) 03:01:36 [Preview] No. 12708 [Reply] [Last 50 Posts]
As the subject says. It's been entered into their custom "bitch at the user with a popup until they disable it" database. To be fair to the developer, he has solid reasons for his stance. I'll try to summarize as there is a lot of misinformation and emotion out there fogging the issue.

1) The Palemoon project does not have enough developer juice to debug other software and addons.
2) Various users: "[website] does not work with Palemoon. Fix your shit, Moonman!"
3) Moonman: "Known issue. Stop being morons and disable NoScript. Thank you, and have a nice day."
4) Various users: "We did. Same problem. Fix your shit."
5) Moonman: "Oh. That's an actual issue with Palemoon then. I'm on it!"
6) Much hacking and cracking and time and talent are expended to no effect. Surprise! NoScript does not follow the standard of letting go of the browser when disabled. It lingers on. It has to be completely uninstalled with an added cache clearing operation on top of that.
7) Moonman: "It's NoScript. Get rid of it. Have a nice day."
8) Various users: "No. FIX YOUR SHIT!"
9) Moonman: "Crush. Kill. DESTROY!"

If you roll with my simplification you can see his point.

I have two observations. First, quite a few sites have a technical support checklist that runs like this: "What browser are you using? Palemoon? Oh good! We have two fixes you may choose from. One, use another browser. Two, go away and do not come back."

My irony sense is tingling.

Message too long. Click here to view full text.

13 posts and 1 image omitted.


Anonymous 07/05/2018 (Thu) 16:23:46 [Preview] No.12824 del
OP again. I noticed the thread flying by on the overboard. May as well drop my final observations.

>>12823
I use Lynx with some regularity for ssh sessions, etc. In the year of our Lord 2018, a fully useful command line webbrowser still surprises the hell out of the Mircosoft wonks I come across. Nevertheless, a 32 bit system is no barrier to a desktop GUI, M$ or otherwise.

The end result was Waterfox for my 64 bit systems, and Icecat for my wee 32 bit on-the-road portable. The privacy tweaking learning curve was minimal and everything is running smoothly and to my satisfaction. Palemoon is a distant memory at this point. While this was an excellent thread all in all, I don't have anything else to add to the discussion and won't waste any more time on Palemoon related activities.

Thanks everyone!


Anonymous 07/24/2018 (Tue) 03:53:46 [Preview] No.12847 del
Palemoon is cucked a long time ago, I only use it as a secondary browser.

btw ungoogled-chromium superior


Anonymous 07/31/2018 (Tue) 14:46:46 [Preview] No.12851 del
>>12847

Been doing UGC for a test drive for some time now. The only irritations I've found so far:

1) No way to conveniently prevent automatic page refreshing.
2) Installing extensions is a bit of a hassle.
3) No non-M$ 32bit version

Only that last is really irksome. Why no 32bit version?


Anonymous 08/01/2018 (Wed) 13:33:07 [Preview] No.12852 del
>>12851
Hmmm.

It also enforces tear off tabs with no way to disable. Something else I hate.


Anonymous 08/25/2018 (Sat) 11:13:21 [Preview] No.12862 del
>>12851
>no 32bit version
Rather no x86 version. You should've ditched x86 a long time ago.



(1.44 MB 500x500 1475322701427.gif)
/cyb/ + /sec/ - Cyberpunk and Cybersecurity General /cyb/ + /sec/ General 08/24/2018 (Fri) 14:55:28 [Preview] No. 292 [Reply] [Last 50 Posts]
Cypherpunk Manifesto
>https://www.activism.net/cypherpunk/manifesto.html

Cyberpunk Manifesto
>http://project.cyberpunk.ru/idb/cyberpunk_manifesto.html

Hacker Manifesto
>>http://phrack.org/issues/7/3.html

Guerilla Open Access Manifesto
>https://archive.org/stream/GuerillaOpenAccessManifesto/Goamjuly2008_djvu.txt

Fables, realities, prophecies and mythology of a community:

What is cyberpunk
>>https://pastebin.com/hHN5cBXB

Message too long. Click here to view full text.




System Resources Endwall 07/05/2017 (Wed) 03:13:35 [Preview] No. 965 [Reply] [Last 50 Posts]
I have some observations to make.

## I just tested these systems:
MS DOS 6.22 runs in 384K of memory (1994)
MS Windows 3.11 runs in 2MB of memory with a full mouse driven GUI (1994)
Macintosh OS 7.53 runs in 7.4MB of memory , full GUI + TCP/IP (1996)
Macintosh OS 8.1 runs in 13.2MB of memory, (1997)
Macintosh OS 8.6 runs in 26MB of meomory, (1998)

OpenBSD 6.1 starts in text mode command line in 27MB of memory
OpenBSD 6.1 in Xenocara uses 65-80MB of memory to start up.

## from recollection:
Windows 7 800MB of memory (2009)

Parabola GNU/Linux starts in text mode cli using 150MB of memory
Parabola GNU/Linux in weston uses 300MB of memory

Message too long. Click here to view full text.

Edited last time by Endwall on 07/05/2017 (Wed) 03:17:31.
10 posts and 3 images omitted.


Endwall 09/19/2017 (Tue) 07:06:02 [Preview] No. 1032 del
>>1008
The machine I used is a SunBlade 150 UltraSparc IIi 550MHz computer from 2003.


Anonymous 09/27/2017 (Wed) 21:38:23 [Preview] No.1038 del
I don't want to sound cliché but I suspect great part of the RAM in parabola is thanks to systemd.

Don't give up on GNU/Linux, there are some distros that take it to extremes to cut the packages to minimum. Source Mage in particular has the philosophy of only including what you want, nothing more, and the sources are clean and untouched. I don't have access to my installation but as soon as I get it I will post results, meanwhile look at how some guy went to have a graphical environment with 97MB.


Endwall 07/12/2018 (Thu) 08:34:29 [Preview] No.1247 del
Fresh install of Parabola/GNU/Linux-Libre/OpenRC

On an Intel core2 laptop

boot into cli from OpenRC

$ free -h

used 60 MB

start xorg as root

# startx

# free -h

used 75 MB

Message too long. Click here to view full text.



Endwall 08/20/2018 (Mon) 23:04:48 [Preview] No.1274 del
Alpine Linux on OpenRC
Fresh install on encrypted lvm with the services it said to start in the wiki guide. In command line on busybox.
$ free -m
120MB.

I couldn't get X org to start, but it would probably add another 20MB on top of that.


Endwall 08/20/2018 (Mon) 23:11:21 [Preview] No.1275 del
Hyperbola with linux-libre-lts on OpenRC is similar to parabola. Boots into user account in command line in at around 100MB xorg adds another 20MB ontop to around 120MB. Booting into a user shell seems to be more memory expensive than starting as root.

I want to boot to command line in no more than 20MB with a GUI that brings me up to no more than 40-50MB of memory usage. Any more than that and there is too much going on.



VPN/proxy/TOR general thread Anonymous 04/15/2016 (Fri) 22:12:39 [Preview] No. 2 [Reply] [Last 50 Posts]
Cool board idea.

What's the safest possible way to browse the internet anonymously and safely? There's a thread on /tech/ with the endwall developer talking about proxychains, and that seems pretty cool. Some of the links to proxy lists seem dead, and I have found some online but why should I trust these random 'free' proxies?

What about proxychains over VPN? I'm currently using Mullvad which is alright, and I'm curious about more security if need be. Does a VPN -> proxychain -> TOR connection work? Sounds horribly slow in theory, but I think we all know that privacy comes at a cost in our current world.

I suppose I could call this a 'VPN/proxy/TOR general thread.'
57 posts and 5 images omitted.


Endwall 08/13/2018 (Mon) 06:23:09 [Preview] No.1262 del
Tor Proxy on Local Area Network (LAN)

What ?
Setup multiple computers on a LAN to route through a tor proxy for specific applications (Links2, , etc)

Why ?
-To allow novice Linux users (mom,dad,etc), to use Tor on applications that allow socks proxy settings like links2, without needing to know how to start Tor in the command line or setting a tor daemon.
- (My reason) To allow another computer to handle Tor with a base install and to close all ports except for 9050 (or a randomly chosen port) outbound on a select computer that you use for Tor browsing and other Tor applications (endcurl, endget, endtube, oldtube, torsocks) etc.

-If you have an implant or a beacon with key logging it will usually broadcast out on port 53 or port 80, close everything (using endwall.sh and comment all ports out except local host for the ports you need and the random outbound port you will use for Tor) and set Tor outbound to a random port (not 9050 say 34591) and set your Tor proxy server to accept inbound for this random port. This will basically squash outbound beacons.

How ?
You will need two computers to test this. On the Tor proxy server,find out the LAN router assigned internal ip address using
$ ip link

( for example say its 192.168.5.153) and add these lines to /usr/local/etc/tor/torrc

Message too long. Click here to view full text.

Edited last time by Endwall on 08/13/2018 (Mon) 21:43:35.


Endwall 08/13/2018 (Mon) 22:04:00 [Preview] No.1270 del
The idea here is to have a minimal install no GUI just a few packages on the Tor proxy server, and use it as a proxy into Tor. On your client computer you will have a full GUI, and probably have installed several packages, some, which unknown to you, will have malware. This malware can be as simple as keylogging with an output beacon going out through port 53 or port 80. It will take you months of scanning your logs to even clue in to what's happening, in the mean time all of your Tor postings are correlated back to you by running the messages against a giant database of clear text key strokes.

So you close all of the ports including port 53 and port 80 to general output, you may mac address bind port 53 to a dns server (same computer as the proxy server) using the same method described with endwall.sh, as well as setup squid to mac address bind port 3128 to the squid proxy for 80,443 and close regular port 443 and port 80 output by commenting out those sections in outbound. That way general output on port 53,80,443 etc is suppressed (dropped), so that the malware beacons can't talk out.


Endwall 08/13/2018 (Mon) 22:10:33 [Preview] No.1271 del
I have a computer with parabola openrc with only a single port open to send socks5 proxy to the Tor proxy server. That's as good as it gets for me for now. My main desktop is MAC address bound to DNS servers (2 computers) and MAC address bound to the Tor Proxy, and Squid Proxy. I leave some ports open so that I can watch TV with endtv and endstream, which don't work behind squid. So I leave port 80,443,1935 open to general output on my desktop so that I can watch TV still. But you can modify some of the streams to lowest quality (low bandwidth streams) and run them behind Tor, reasonably well if you want to close port 80 and 443 for good. Oh but yeah you have to run it with 3 hops for a good transfer rate, still better than a VPN i guess. So you need to compile and link two versions of Tor, tor_stable with 6 hops and mods, and tor_stock with just the stock configuration with 3 hops. I use tor_stock when I use mpv to get around georestrictions, but you can use it for everything if you lower the bit rate on the streams.

Doing similar port restricting and mac address binding proxy schemes using OpenBSD or Gentoo Linux would be the next step. The final step will be to use dumb 8-bit machines to proxy into the Tor Proxy once someone designs it and produces the software.



EndChan/InfinityNow Terminal Client Morphosis 06/03/2018 (Sun) 21:18:45 [Preview] No. 12749 [Reply] [Last 50 Posts]
How hard would it be to create a terminal client for endchan/InfinityNow? I know that the OverChan android app can view this site; does that work by scraping or is there an API?

It would be much more comfy to browse here from the terminal than through the browser. You could have proper keyboard navigation between posts, and you wouldn't need a mouse at all. The biggest issue that comes to mind would be solving the captcha for making posts.
8 posts omitted.


Anonymous 07/08/2018 (Sun) 09:39:38 [Preview] No.12825 del
https://github.com/bcskda/2ch-cli
Ncurses-based console client for sosach, you might try to fork it and change API.


Anonymous 08/03/2018 (Fri) 17:28:24 [Preview] No.12856 del
(4.95 MB 1920x1080 untitled.webm)
>>12749
Thanks for the idea, OP


Anonymous 08/06/2018 (Mon) 20:03:18 [Preview] No.12857 del
>>12856
:O

Is this for real?


Anonymous 08/07/2018 (Tue) 17:01:02 [Preview] No.12858 del
>>12857
Yup. It's real.
So far I'm focused on making a read-only browser, but I hope that with w3mimgdisplay I'll be able to add posting mode and captchas inside the terminal.
But before any public release I plan to revise the UI, add proper text formatting & post image viewing and make the backend more flexible.


Anonymous 08/08/2018 (Wed) 19:29:00 [Preview] No.12859 del
>>12858
I'm hard as diamonds rt



(34.60 KB 1200x800 DhabSjYW4AE8qu5.jpg)
The div that looks different in every browser. Anonymous 07/11/2018 (Wed) 23:02:51 [Preview] No. 12826 [Reply] [Last 50 Posts]
<html><head><style>

html {
display: table;
height: 100%;
width: 100%;
}

body {
display: table-cell;
vertical-align: middle;
}

div {
margin: auto;
width: 100px;
height: 100px;
outline: inset 100px green;

Message too long. Click here to view full text.

4 posts and 1 image omitted.


Anonymous 07/12/2018 (Thu) 10:22:13 [Preview] No.12832 del
>>12831
Same on palemoon.


Anonymous 07/12/2018 (Thu) 13:20:19 [Preview] No.12833 del
>>12832
version brothers holla


Anonymous 07/15/2018 (Sun) 19:50:09 [Preview] No.12838 del
> create web standards
> no one follows them
welp


Anonymous 07/20/2018 (Fri) 15:48:14 [Preview] No.12844 del
This is fucking cool. I'm going to set something like this up to generate my company logo on my site.


Anonymous 07/29/2018 (Sun) 14:00:08 [Preview] No.12850 del
>>12844
wait could copyright the CSS as like the input and then own the rights to the various shit it spits out?





Anonymous 07/12/2018 (Thu) 02:24:05 [Preview] No.12828 del
>>9100
idk how you fools struggle so hard, there is an industry defined path
>learn basic overall computer shit (A+)
>learn networking (network+)
>learn security (security+)

from there you can find your niche and specialize where'd you like. you don't even have to get the certs just have the knowledge (unless you want to get a job of course).


Anonymous 07/12/2018 (Thu) 22:01:32 [Preview] No.12834 del
(213.43 KB 620x414 bitches.png)
>>12741
I don't give a FUCK if they are getting into these political correctness stuff since I'm there to learn IT and security. And their tutorials are pretty good.


Anonymous 07/29/2018 (Sun) 12:18:14 [Preview] No.12849 del
any of you retards actually do stuff???
Have a home lab, go war driving, etc?
Or do you just copy paste links you'll never read


Anonymous 08/18/2018 (Sat) 15:40:59 [Preview] No.12860 del
>http http http
at least write https if a TLS version exists you lazy nigger



Russia's 'VPNFilter' malware Anonymous 05/23/2018 (Wed) 15:38:53 [Preview] No. 12742 [Reply] [Last 50 Posts]
So, they claim Russia attacked about 500,000 routers in Ukraine, with a software that gave root to them. Don't know if it's really from Russia or just democrats trying to push the "election-was-manipulated" agenda, but, that's the future: not as many bombs, but teams that crack the systems to get intel:
https://www.reuters.com/article/us-cyber-routers-ukraine/cyber-firms-warn-on-suspected-russian-plan-to-attack-ukraine-idUSKCN1IO1U9?il=0


Anonymous 05/24/2018 (Thu) 17:23:56 [Preview] No.12743 del
James Clapper isn't a democrat you moron


Anonymous 05/25/2018 (Fri) 05:00:37 [Preview] No.12744 del
>>12743
There is no James Clapper mentioned in the article.


Anonymous 07/25/2018 (Wed) 10:07:12 [Preview] No.12848 del
You’ve got to give the article some air of credibility, especially considering that the Russian government is the main culprit of the Ukrainian civil war. Such an attack would be in their interests not to mention that the Russian government has performed similar attacks on vital eastern Ukrainian infrastructure



Anonymous 07/14/2018 (Sat) 17:20:20 [Preview] No. 12836 [Reply] [Last 50 Posts]
Does anybody here use stack exchange? Just curious, there are a lot of tech-oriented sites as part of stack exchange and I was wondering if /tech/ recommends any of them.


Anonymous 07/15/2018 (Sun) 19:44:10 [Preview] No.12837 del
>>12836
>Does anybody here use stack exchange? Just curious, there are a lot of tech-oriented sites as part of stack exchange and I was wondering if /tech/ recommends any of them.

Only via search engine results. I attempted to contribute early on but lost interest, though there's a huge push to make their entire suite of sites a "safe space" for idiots to ask stupid questions without fear of being called stupid. I understand that being called an idiot isn't fun, though the goal of not being called an idiot is what pushed me to get good in the first place.


Anonymous 07/20/2018 (Fri) 15:08:43 [Preview] No.12842 del
>>12836
Yes I do.
Stack Exchange is the only site I know of in the category which allows anonymous contributions. Others (even Wikipedia) block Tor and/or require registration.


Anonymous 07/20/2018 (Fri) 15:34:02 [Preview] No.12843 del
>>12837

This is correct. If you find useful information take it, but don't get yourself involved. Their management publicly announced not long ago that they are to be considered typical sjw trash now, just another outlet for loony propaganda.



(98.58 KB 752x1061 473734734.jpg)
Anonymous 06/24/2018 (Sun) 20:08:57 [Preview] No. 12806 [Reply] [Last 50 Posts]
CAN THIS BE DONE?

P2P web browsing via websites served and shared on individual nodes:
users can create their own websites and host them from their own computers/servers
users can upload and share other's websites on their own computers/servers
self serviced websites are manually named *but will generate a random entropy hash within the url, example:
node://7bv45ix0/8ch.net or node://c334o96y/endchan.xyz
*the random entropy hash prevents individuals from creating and overriding other established websites
endless domain creation: .com, .org, .info, .onion, .rebel, .on, .geek ... et al (infinite)
browser can access HTTP, HTTPS, FTP, Zeronet, Beaker, eMule/eDonkee and various obscure networks.
browser is enabled for users to share files with others, creating decentralized P2P file sharing
the browser would have its own built-in decentralized search engine similar to YaCy that can pull up any content found
high standard end-to-end encryption would be active by default for all P2P connections
browser has a lightweight bit-torrent client built-in
onion routing is not mandated but the option would be allowed within the browser
I2P routing would also be an option for users
Dust and IPFS could be utilized in the browser for further anonymity and resilient decentralization.

Message too long. Click here to view full text.

1 post omitted.


Anonymous 06/25/2018 (Mon) 17:02:42 [Preview] No.12808 del
Maybe for specific solution.
A torrent search engine being decentralized would be a great thing, and far harder to kill.
But to generalize it everywhere, I seriously don't think that's a good idea, because will you accept to pay electricity and general infrastructure to host the website of someone else? Moreover, since it's less effective than a data center, you'll have need more power to support the websites.

I think that for specific purposes, yeah. But I seriously don't buy in this decentralize dream. Maybe someone will make it work at some level, I don't know.


Anonymous 06/26/2018 (Tue) 15:39:17 [Preview] No.12809 del
>>12807
Good point, I think there are some programmers out there aiming to do similar things but the problem is they are under-funded and rather scarce among the tech community (most of the tech community is now elitist drones within Silicon Valley that work for the big corps).

>>12808
>I seriously don't think that's a good idea, because will you accept to pay electricity and general infrastructure to host the website of someone else?

It depends on how big those website are and how much content they provide. Something like endchan could likely be hosted by one individual with some server space I'd imagine (this one site likely takes up 20TB at max?) That said we could at least create our own image boards or blogs. This would help decentralize a lot of info and content. And the more users that join in and participate, the more potential this has as a whole for hosting all kinds of content.

Something like Soulseek alone has over a million users with billions of albums, movies, books, software etc. available to download. This only relies on users hosting content on from their own computers. Imagine if we got 10 million+ users on a completely decentralized browser which users can host P2P websites. It would revolutionize a whole kind of new internet that would become very hard to censor or control.


Anonymous 06/27/2018 (Wed) 16:18:55 [Preview] No.12810 del
>>12809
More like 20 GB.

>>12806
RetroShare.


Anonymous 07/12/2018 (Thu) 22:23:33 [Preview] No.12835 del
You want an internet suite stuffed into one browser?
That's sorta something what Seamonkey and ChromeOS do and dozens of failed projects before them did.
Which is not really good. Having interoperability and data exchange between different gui applications is cool, but having your browser to do all the work is asking for a trouble with too much attack surface. I am also pretty sure, you can have all this shit like accessing zeronet, irc, tor and i2p, download torrents and email with set of web browser addons.
You should also understand that hosting stuff from home computer puts drawbacks on availability compared to a remote VPS in a professional datacenter, or a dedicated server in your basement with nig-rigged car battery UPS which not everyone is eager to invest in.
>the random entropy hash prevents
You just came up with some useless bullshit. Look at how onion, eepsite, gnunet and cjdns domains are resolved and generated. It should not only be a "random hash", but also act as a public encryption key or public key hash without reliability on someone's DNS servers.
The main problem of "le decentralized internet" is how easy it would be for external powerful actor to remove pieces of it, and remove them not only for one group of users, but for everyone. Let's say you live in small corrupt country and post on facebook. Your country's government wants to remove your posts from facebook, but until those break facebook's tos or facebook has big-money business in your country, they don't care. And what would your country do then, ddos facebook or block it? The latter is feasible, but blocks can be avoided, the data still exists on Facebook's servers and is available for those who put much effort in it.
Now say again, you live in Ancapistan Enterprizes Real Estate. A society of decentralized Internetz and such. You host your blog from home, a small single board server and a 1 gbit unlimited connection, pretty nice isn't it? One day you post something bad about McFacebook corporation on your blog. Automated web crawlers of YaCy search engine detect wrongthink and it triggers McFacebook CEO personally. What happens next? They simply DDOS your weak 1gigabit-wide channel to the point when your ISP, or datacenter where your VPS is hosted disconnects your server for consuming too much traffic and blackholes all requests coming for your address, your server is already inaccessible at this moment. It's done, McFacebook corporation completed it's mission and eliminated you quickly. What would you do next? You either go to your ISP or some decentralized CDN provider and ask them to implement a DDOS protection, i.e. you have to find someone who will host your shit for free on pure enthusiasm (ipfs and webtorrent) or for thousands of shekels (Cloudflare) or in exchange for datamining (Facebook). Now you get the same modern Internet and web, where you have to host your important information on a big datacenter with wide bandwidth, distribute content over wide network of CDNs and gateway proxies.


Anonymous 07/18/2018 (Wed) 15:43:21 [Preview] No.12841 del
>>12806
Yeah, some girls wrote it years ago
Then google hired them and gave them soul crushing jobs so they would forget about ever having written the wooden stake that could kill the google vampire
https://github.com/PeerServer/peer-server



(138.63 KB 414x433 1480819757263.png)
Anonymous 07/18/2018 (Wed) 15:14:19 [Preview] No. 12840 [Reply] [Last 50 Posts]

<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<title>ENDchan.xyz</title>


Anonymous 09/04/2018 (Tue) 13:42:58 [Preview] No.12868 del
>>12840
what is this



Internet Security General Anonymous 04/16/2016 (Sat) 07:56:30 [Preview] No. 4 [Reply] [Last 50 Posts]
Continuing from >>>/tech/597
https://archive.is/INR3l
This is for non specific, general tips for anonymous web browsing and downloads, tips on browsers and browser configurations for the security concious that you don't want to make a new thread for.
88 posts and 7 images omitted.


ZyBxVLcAxIx Grace 06/09/2018 (Sat) 09:30:28 [Preview] No.1229 del
David Beckham has admitted that a big part of him has questioned whether he was right to retire from professional football but that he has been too busy over the past four months to dwell on the decision.

Hey that's great news. He's still in pretty good shape. He'll be signed in no time. Hope he gets a good contract!
No Spam 6 Month Ban
Edited last time by Endwall on 06/11/2018 (Mon) 07:00:31.


Anonymous 07/05/2018 (Thu) 23:59:13 [Preview] No.1241 del
Check out the bleeding edge tor source code!!

The 6-hop mod BREAKS THE COMPILING


torsocks git clone http://dccbbv6cooddgcrq.onion/tor.git


Anonymous 07/06/2018 (Fri) 01:26:42 [Preview] No.1242 del
>>1241
You can still do the 6 hop mod but in src/core/or/circuituse.c after you change default_path_len to 7 delete the line under it that says
else if fourhop_cutoff

also in src/core/or/or.h you can still change default_route_len to 6 but there is no option to modify max_recent_circuits from 1000 to 100


Endwall 07/06/2018 (Fri) 03:46:26 [Preview] No.1243 del
It compiled for me and linked in

src/app/tor

I haven't fully tested it yet though.

But you're correct the options have all been removed from or.h . Also much of the code has been moved around and segregated into different sub directories.

Keep an eye on this. Also if you have any other good Tor mods please feel free to share.


Endwall 07/06/2018 (Fri) 04:03:41 [Preview] No.1244 del
circuitstats.h: * 1000 is approx 2.5 days worth of continual-use circuits. */
circuitstats.h:#define CBT_NCIRCUITS_TO_OBSERVE 1000
circuitstats.h:#define CBT_MAX_RECENT_CIRCUITS 1000
circuitstats.h:#define CBT_MAX_MAX_RECENT_TIMEOUT_COUNT 10000
circuitstats.h:#define CBT_MAX_MIN_CIRCUITS_TO_OBSERVE 10000
circuitstats.h:#define CBT_DEFAULT_TIMEOUT_INITIAL_VALUE (60*1000)

this seems to have been moved into src/cor/or/circuitstats.h

use grep to search for other missing / moved variables. Thanks for the tip >>1241 , >>1242 .



(816.64 KB 1308x1588 womens_health_formula_1.jpg)
por favor amigo the hacker known as 4chan 05/12/2016 (Thu) 09:45:50 [Preview] No. 31 [Reply] [Last 50 Posts]
I need someone to do an illegal for me, upload these fonts in a zip to any pomf clone and post link here pls kthx X3.

https://aur.archlinux.org/packages/ttf-ms-fonts/


the hacker known as 4chan 06/10/2016 (Fri) 14:22:51 [Preview] No. 35 del
Sent ;)


the hacker known as 4chan 07/03/2018 (Tue) 22:08:31 [Preview] No.52 del
Arial *swoon*



(206.06 KB 1500x788 1080.jpg)
Anonymous 06/21/2018 (Thu) 22:54:06 [Preview] No. 12804 [Reply] [Last 50 Posts]
Does there exist any alternatives to the CUDA technologies offered by Nvidia? Asking because of a few software applications which I desire to run but rely on those technologies to work most efficiently.



(203.71 KB 600x808 cage.jpg)
6 posts and 1 image omitted.


Anonymous 06/09/2018 (Sat) 22:16:27 [Preview] No.12781 del
reminder, if you don't like gitlab.com, there's always gitgud.io.
They've never lost any user data and run on faster hardware.


Anonymous 06/10/2018 (Sun) 04:34:49 [Preview] No.12782 del
>>12780
GitLab as a web-based Git-repository manager with wiki and issue-tracking features is not GitLab the website that's on Microshit servers. GitGud.io runs on GitLab software, gitlab.gnome.org is not GitLab.com, etc., so basically, you're still a fucking moron.


Anonymous 06/10/2018 (Sun) 12:36:28 [Preview] No.12785 del
>>12782
Damn, why so hostile?
I obviously referred to GitLab as a service (and GitHub as a service, not the GitHub desktop client used in offline mode) and that 250000 project whom just fled over according to https://twitter.com/gitlabstatus/status/1003887898142367744


Anonymous 06/13/2018 (Wed) 00:54:02 [Preview] No.12789 del
(112.00 KB 983x1445 allura.png)
(70.21 KB 783x503 link_to_artifact.png)
(101.08 KB 827x819 threaded_discussion.png)
A reminder that Apache Allura (which is used by SourceForge) still exists: https://allura.apache.org/
And it also includes a forum. What I always hated about GitHub and GitLab that some projects have hundreds of open "issues" because people use the Issue system as a forum for every type of discussions.

+bonus 1: usable without Javascript
+bonus 2: non-flat theme


Anonymous 06/18/2018 (Mon) 14:57:44 [Preview] No.12799 del
http : //JAPANFC2CAM.7th . it

This is a SFW board, NSFW content (which includes links) must be marked as NSFW content but otherwise this is considered spam. I'll let you go off with this ONE warning.
Edited last time by _ on 06/19/2018 (Tue) 02:07:56.