(71.70 KB 750x750 NGC_1_&_NGC_2.jpg)
Anonymous 12/10/2018 (Mon) 03:53:28 [Preview] No. 13013 [Reply] [Last 50 Posts]
This, to my knowledge, is the best /tech/nology board that exists. 4chan is consumerist gaymer garbage, 8ch/tech/ has been overrun with faggots from /pol/ trying to hide from muh jooz, lainchans data was wiped off the fucking planet when their administrators screwed up, and all of the others are dead.

If this board is to be brought back to a state of prosperity, we need to create and bring forth more educated individuals with a yearning to understand with the motivation and knowledge to pursue their own projects.

Learning 4 Newbs:
C Programming Language (Learn how to make that machine you shitpost with do what you want)
Computer Organization and Design (Learn how that machine you are using to shitpost works)
George Simmons Precalculus In A Nutshell (Will revamp your mathematical knowledge and help you understand deeply)
The Art Of Electronics (Learn how that machine you shitpost on works on the lowest level with electricity!)

Getting Started:
-Look on ebay for old thinkpads (If you are here, you should already have done this)
-Get a small Raspberry Pi (Simple to learn with and a massive community and hundreds of projects done already with firmware support)
-FPGA boards (Big boy electronic design, where you get to psuedodesign your own CPU. Try https://www.nandland.com/ (Xilinx is independent, Altera is Intel owned, so I'm not going to trust them)) LIMITED ONLY BY YOUR IMAGINATION!...
-Some cheapo electronics tools and wires from Amazon or an electronic supply store. Hakko is a japanese-based company and creates some of the best soldering stations and irons for the lowest price, 60/40 solder will get the job done. Don't forget solder wick, or your gonna have a bad time. Avoid working with BGA electonics.
-A multimeter and an Oscilloscope (EXTREMELY IMPORTANT) if you want to dig deeper into your electronics. A variable power supply will also give you more freedom.

Message too long. Click here to view full text.

17 posts and 6 images omitted.

betamax Board owner 12/18/2018 (Tue) 22:28:37 [Preview] No.13043 del
(1.81 MB 720x540 1533223237900.gif)
lol this thread

Anonymous 05/07/2019 (Tue) 20:39:19 [Preview] No.13312 del

Thanks for the general outline of how/where to get going. Any and all tips and guides are immensely helpful.

Anonymous 05/09/2019 (Thu) 05:13:04 [Preview] No.13315 del
nano/g/ is pretty comfy, if a bit slow

Anonymous 05/18/2019 (Sat) 14:23:39 [Preview] No.13321 del
nice bread op. i have a few books coming in and i've already read through most of them in pdf format. one is k&r but i also recommend people get a solid grasp of networking. my recommendation is Computer Networking a Top-down Approach. pretty pricey textbook, found a bad condition copy on ebay for 30 bucks though.

Anonymous 05/22/2019 (Wed) 22:50:40 [Preview] No.13324 del
Why a thinkpad?

(46.14 KB 887x272 masterTheorem.jpg)
Discord is shit Anonymous 10/22/2018 (Mon) 02:28:19 [Preview] No. 12909 [Reply] [Last 50 Posts]
Is there a Libre version of Discord that isn't so shit? It needs stuff like this:
>voice chat
>text chat
>Youtube and image embeds in text chat
>Free Software (Libre)
>you can host it on your own server
>you can make bots for it
>uses actual good encryption
>has a web interface and mobile app
>you don't have to have a mobile phone to register an account
33 posts and 3 images omitted.

Anonymous 04/18/2019 (Thu) 05:52:35 [Preview] No.13287 del
>Teamspeak is proprietary.
There's mumble for that.

Anonymous 04/18/2019 (Thu) 17:46:13 [Preview] No.13288 del
IP leaks ain't fun. Use Matrix

Anonymous 04/18/2019 (Thu) 18:39:32 [Preview] No.13289 del
>no ip leaks
lmao i have bad news for you my dude, matrix.org got pwnd af

Anonymous 04/30/2019 (Tue) 17:55:11 [Preview] No.13305 del
Use Tor (bad latency, though).

Anonymous 05/21/2019 (Tue) 05:12:55 [Preview] No.13323 del
What are you, a pedo?

Get in ere

(162.95 KB 800x800 random.jpg)
Anonymous 10/29/2018 (Mon) 14:30:31 [Preview] No. 12952 [Reply] [Last 50 Posts]
What do you think about Suckless ideology?
12 posts omitted.

Anonymous 12/22/2018 (Sat) 10:29:58 [Preview] No.13046 del
I only use dwm and surf-right-now, but I love the way they maintain their code.

Anonymous 12/22/2018 (Sat) 13:49:46 [Preview] No.13047 del
their motto is less is more by adding more

Anonymous 12/30/2018 (Sun) 09:13:24 [Preview] No.13079 del
dwm is crap use awesome

Anonymous 12/30/2018 (Sun) 09:18:27 [Preview] No.13080 del
best st colours coming through

/* Terminal colors (16 first used in escape sequence) */
static const char *colorname[] = {

/* 8 normal colors */
[0] = "#2d2d2d", /* black */
[1] = "#f2777a", /* red */
[2] = "#99cc99", /* green */
[3] = "#ffcc66", /* yellow */
[4] = "#6699cc", /* blue */
[5] = "#cc99cc", /* magenta */
[6] = "#66cccc", /* cyan */
[7] = "#d3d0c8", /* white */

/* 8 bright colors */
[8] = "#747369", /* black */

Message too long. Click here to view full text.

Anonymous 05/20/2019 (Mon) 00:04:45 [Preview] No.13322 del

Online Security News Endwall 07/07/2016 (Thu) 06:09:23 [Preview] No. 149 [Reply] [Last 50 Posts]
See a news article or CVE bug report on an emerging computer security issue and want to share it? Post below.

I will also post links to Hak5 Threatwire videos.
Edited last time by Endwall on 07/07/2016 (Thu) 16:22:47.
498 posts and 3 images omitted.

Endwall 04/17/2019 (Wed) 03:01:56 [Preview] No.1390 del
Facebook is surveillance monster feeding on our personal data - Richard Stallman
https://youtube.com/watch?v=9c3sv30w158 [Embed]
Duration : 26:09
Published : 15 Apr 2019
"Our world today may be a high-tech wonderland, but we, the users, own nothing in it, with our personal data being the new oil for Big Tech. How do we break its grip on our digital lives? We asked Richard Stallman, the founder and leader of the Free Software Movement"

He3* 0e Anonymous 05/06/2019 (Mon) 18:20:05 [Preview] No. 13308 [Reply] [Last 50 Posts]
5 need s60e he3*, 0y 2eyb6ard n6 36nger w6r2s and n6w 5t 5s st4c2 ty*5ng 352e th5s and 5 can't ret4rn 5t t6 n6r0a3. 5 ca0e here beca4se 6f y64r g4ys c60*4ter s2533s and 5 d6n't tr4st g66g3e f6r a sec6nd w5th 0y 3a*t6*.
D6es any6ne 2n6w h6w t6 f5x th5s+

Anonymous 05/06/2019 (Mon) 19:16:36 [Preview] No.13309 del
d5d y64 try 25335ng y64rse3f+

Anonymous 05/07/2019 (Tue) 03:43:57 [Preview] No.13310 del
F4C2 Y64 FAGG6T, TH5S F4C25NG SER564S 5 HAVE W6R2 T606RR6W 4N352E Y64 5D56TS, 5 NEED T6 ST6* TH5S. H6W D6 Y64 T4RN TH5S SH5T 6FF+++

Anonymous 05/16/2019 (Thu) 11:45:11 [Preview] No.13320 del

(8.71 KB 646x483 gpcs2pppppp.png)
Author rescinds GPL licensed code from "Geek Feminists" Anonymous 01/11/2019 (Fri) 01:21:48 [Preview] No. 13089 [Reply] [Last 50 Posts]

Reportedly, the author of the GPL licensed text-mode casino game "GPC-Slots 2" has rescinded the license from the "Geek feminist" collective.

The original author, after years of silence, notes that the "Geek Feminist" changed[1] a bunch of if-then statements which were preceded by a loop waiting for string input to a switch statement. The author reportedly noted that to use a switch statement in such an instance is no more preformant than the if-thens. Switch statements should be used where the input to the switch statement is numerical, and of a successive nature, for most efficient use of the jump table that is generated from said code.

The author reportedly was offended, after quiet observation of the group, that the "Geek Feminists" mocked his code, mocked his existence as a male, and never did any work on the code afterwards and never updated to include new slot machines added to the original code by author subsequently.

The author notes that he neither sought nor received any compensation for the granted license, that is was a gratuitous license, and that there never was any refutation of his default right to rescind given. (A right founded in the property law of licenses.)

The copyright owner has reportedly watched quietly as each year the "Geek Feminists" published a recount of their heroic efforts regarding his code.[2][3] Presumably he has now had enough of it all...

The author notes that the SF Conservancy attempts to construe a particular clause in the GPL version 2 license text as a "no revocation by grantor clause", however that clause states that if a licensee suffers and automatic-revocation by operation of the license, that licensees down stream from him do not suffer the same fate. The author of "GPC-Slots 2" reportedly notes that said clause does only what it claims to do: clarifies that a downstream licensee, through no fault of his own, is not penalized by the automatic revocation suffered by a licensee he gained a "sub-license" from (for lack of a better term.)

The author reportedly notes that version 3 of the GPL did not exist when he published the code, additionally the author notes that even if there was a clause not to revoke, he was paid no consideration for such a forbearance of a legal right of his and thus said clause is not operative against him, the grantor, should it exist at all.

(Editor's note: GPL version 3 contains an explicit "no-revocation-by-grantor" clause, in addition to a term-of-years that the license is granted for. Both absent in version 2 of the GPL)

Message too long. Click here to view full text.

87 posts and 7 images omitted.

Anonymous 04/24/2019 (Wed) 04:50:20 [Preview] No.13295 del

Anonymous 05/05/2019 (Sun) 04:58:12 [Preview] No.13307 del
Are you actually posting 4/g/ threads to the LKML? lol, you fucking nutter, as if people didn't already totally disregard you for being an obnoxious wackjob.
Here's an idea, fake lawyer. Actually make a contribution to the Linux kernel, then rescind it, if you want to try to prove your point. Because nobody gives a shit about your little casino script, you pathetic eunuch.

Anonymous 05/13/2019 (Mon) 04:07:00 [Preview] No.13319 del
Got a legal argument?

Discussion Thread Endwall 02/24/2018 (Sat) 01:52:08 [Preview] No. 1145 [Reply] [Last 50 Posts]
Want to say something off topic about anything?

Have a hot tip about something in the computer security world that doesn't fit into any current thread or category?

Want to chat with your fellow invisible 7 proxy friends?

Want to tell Lt. Gen Michael Hayden, GEN Keith Alexander, ADM Michael Rogers, GEN Paul Nakasone, GOOGLE, AMAZON, FACEBOOK and Microsoft etc. how you feel?

It's open mic at >>>/os/ , anything goes!!

Put all of your banter here:
Edited last time by Endwall on 04/14/2019 (Sun) 02:40:40.
48 posts and 1 image omitted.

Endwall 09/27/2018 (Thu) 04:11:20 [Preview] No.1322 del

I added code tags to >>>/endsoft/

They weren't enabled for some reason. I'm logged in right now, I'll be getting down to homework in a bit, so I'll be off soon. Thanks.

Endwall 11/04/2018 (Sun) 06:14:40 [Preview] No.1332 del
The Invisible Man

Queen - The Invisible Man (Official Video)
https://youtube.com/watch?v=zKdxd718WXg [Embed]

Queen - The Invisible Man (Rare Alternative Version)
https://youtube.com/watch?v=GItyEOAiZ2A [Embed]

Queen- The Invisible Man (HQ)
https://youtube.com/watch?v=PLBRQgksQNU [Embed]
Edited last time by Endwall on 11/06/2018 (Tue) 03:58:05.

Endwall 04/14/2019 (Sun) 02:52:44 [Preview] No.1389 del

I didn't forget about you Captain Sulu. I never forget a face....

This guy's dad was busy translating Japanese decrypts for US Army Intelligence during WWII while George Takei grew up in an internment camp in California. He should hire Noriko (Ashley Hanrahan) as a cyber-warrior and she can post memes for US cyber command. I think that would be pretty funny. On a side note I have to repair NHK Japan in Endstream...Was this post racist?
Edited last time by Endwall on 04/14/2019 (Sun) 02:58:34.

Tylerseelo 04/17/2019 (Wed) 04:24:29 [Preview] No.1392 del

Do not click on any links that pop up from these spammers and be careful with any links in general even ones I post. Use tor, no javascript, locked down in a firejail. Check them out with links browser or download the website with endget or endcurl.
No Spam 5 Year ban
Edited last time by Endwall on 04/17/2019 (Wed) 05:10:02.

Endwall 05/12/2019 (Sun) 22:12:30 [Preview] No.1402 del
The Beatles -Dig It
https://youtube.com/watch?v=fUUOX6kAIxI [Embed]

Endware Endwall 05/03/2016 (Tue) 08:54:28 [Preview] No. 32 [Reply] [Last 50 Posts]
Endware is a suite of programs geared towards internet privacy, security, and anonymity.

Endwall: endwall.sh is an iptables based firewall script designed to be implemented on any linux distribution shipped with iptables. endwall.sh is based on default drop policies, coupled with a novel strategy of passing packets on local host ports only for those enabled by the enduser. It comes with a variety of well used ports enabled with several additional port passing configurations available by uncommenting the script. It provides essential security to a new user.

Endsets: endsets.sh is a script that adds blacklisting and whitelisting functionality to endwall.sh. It depends on the program ipset. It is persistent on reboot if you enable ipset as a service. This is the recommended blacklisting tool for endwall if you are running a server or planning on opening up ports and services to the public and will require daily blacklisting of new incomming IPs.

Endlists: endlists.sh is a traditional text file list based blacklisting and whitelisting script. It has slow performance, and can't be updated on the fly. Good for <1000 ip subnets, very tedious and slow to run for more than that. Blocks the IPs by adding them as individual rules to the iptables ruleset. Works but not recommended for heavy duty on a server. May be useful for workstation use to block ip ranges if you are not opening up ports and services to public clients.

Endtools: endtools are a collection of scripts including alogz.sh, mlogz.sh, spamlogz.sh and iplookup.py. These scripts will help to service an enduser of endwall in adminstering endsets/endlists.

iplookup.py is a geoiplookup script written in python and requires python and pygeoip. It has simmilar functionality to maxmind's geoiplookup program and uses the maxmind *.dat files.

spamlogz.sh is a script that searches through log files to find flagged log entries flagged in endwall.sh, endsets.sh and endlists.sh.

alogz.sh is a daily log reading script designed to read the output of an apache http server's log output.

mlogz.sh is a daily log reading script designed to read the output of a postfix smtp server's log output.

Message too long. Click here to view full text.

Edited last time by Endwall on 02/25/2019 (Mon) 00:18:53.
236 posts and 3 images omitted.

update Endwall 02/22/2019 (Fri) 01:51:57 [Preview] No.1371 del
winstream.bat version 0.05

I've added most of the static streaming channels from endstream to this now, and tested it. I also added multiple menu switching, so it is similar to endstream.sh. This file with mpv.exe and youtube-dl.exe and setpath.bat can turn any MS Windows computer into a 720 channel video streaming device. I use this to watch news on the projector screens at school.

I saw Alex Jones smashing a ROKU with hammer and complaining about de-platforming. Well Alex, I've re-platformed you on Endradio, and Endstream and now on 80% of desktop computers with Winstream. Alex is 5 mins of content per 60 mins of show. 30 mins of commercials, 15 mins of ranting and raving about how he's the tip of the spear, he was there first, saw it first, the enemy is attacking, snarling and acting like a lunatic, 10 mins of plugging the infowars store and supplements, and then 5 mins of news / content. I don't agree with everything Alex says but I believe in freedom of speech. I don't like how he talks over his guests when they say something interesting...really annoying. David Knight is alright though, he's pretty decent. Anyways you're re-platformed Alex, I've placed your channel adjacent to the globalists at the UN and the Leftists at Free-speech TV, so you can fight it out in the public forum of ideas.

I'm around but I'm busy with school work, labs and assignments, and studying for quizzes and tests. Any software feature requests, comments or bug reports place in the comments below.

Endwall 02/25/2019 (Mon) 00:21:46 [Preview] No.1372 del
Endware Hidden Service

I wiped the keys and hostname and started over. It was stalling out for some reason and inaccessible. Removing the directory and restarting solved the problem.

Endwall 03/09/2019 (Sat) 03:30:34 [Preview] No.1374 del
I just added a self signed certificate for ssl access over Tor.
Endware Hidden Service TLS/SSL

Also I think that my website was blacklisted by the Tor (((directory authorities))). This is the 3rd time that this has happened. The secure computing practices list ,SCPL, is hosted on the same computer, which is in my computer room/ study. The connection was up and I could access the SCPL site, but couldn't access the Endware site. The log for Endware showed all activity suddenly drop to null for 2 days straight, while activity on SCPL remained constant. Same computer, same connection, different tor URL. The tor connection was up and I could use it from the computer, and access the SCPL hidden service from other computers behind tor. No access could be gained from any computer through Tor to the Endware Hidden Service. I fixed the problem by deleting the old hostname/ key pair for Endware and restarting tor.

I hypothesize that the Tor project can and do censor people and websites at the request of Government Authorities through their control of the directory authority. This is unacceptable. I believe that Tor should be forked and the directory authorities replaced by a distributed blockchain based solution. Tor / Tor Hidden Services are not censorship resistant under the current model. Based on this experience I believe that they can block your Tor Hidden Service if they don't like the content.

Meow: Oooo I have some leaks!!! I'll use my phone call now!
Agent Smirk: ....What good is a phone call if you can't .....speak?
Meow: MMmmm Mmmmmm mMMmmm MMMMmmmmm aarrghhh Mmammmmm *Chair falls over*.

You can check my ssl certificate (valid for 3000 days / 8 years ish) against previous connections if I have to repeat the process, although it is tied to the current onion domain so it may give you an invalid certificate error if the new domain doesn't match cert when I wipe and restart next time it happens.

Endwall 03/09/2019 (Sat) 03:40:01 [Preview] No.1375 del

I placed the setting of the PATH variable for Winstream.bat into the file it self, so you can make a shortcut to the file and put it on the desktop. Change the icon to that green play-button, and rename it just to winstream . Open the file with a double click from the desktop. Works like a charm, tested it on several computers at school, takes about 2 mins to download mpv.exe and youtube-dl.exe into a directory and run it. You can also just make it portable and put the thing on a usb key so that you don't have to download anything. You can now turn any MS Windows computer into a thousand channel live streaming device.

Elite Proxy Elite Proxy 05/12/2019 (Sun) 15:52:46 [Preview] No.1401 del
Find good proxies here:


Anonymous 05/12/2019 (Sun) 12:44:33 [Preview] No. 13318 [Reply] [Last 50 Posts]
God is dead
This board is dead
Join this

VPN/proxy/TOR general thread Anonymous 04/15/2016 (Fri) 22:12:39 [Preview] No. 2 [Reply] [Last 50 Posts]
Cool board idea.

What's the safest possible way to browse the internet anonymously and safely? There's a thread on /tech/ with the endwall developer talking about proxychains, and that seems pretty cool. Some of the links to proxy lists seem dead, and I have found some online but why should I trust these random 'free' proxies?

What about proxychains over VPN? I'm currently using Mullvad which is alright, and I'm curious about more security if need be. Does a VPN -> proxychain -> TOR connection work? Sounds horribly slow in theory, but I think we all know that privacy comes at a cost in our current world.

I suppose I could call this a 'VPN/proxy/TOR general thread.'
61 posts and 5 images omitted.

Endwall 08/13/2018 (Mon) 22:10:33 [Preview] No.1271 del
I have a computer with parabola openrc with only a single port open to send socks5 proxy to the Tor proxy server. That's as good as it gets for me for now. My main desktop is MAC address bound to DNS servers (2 computers) and MAC address bound to the Tor Proxy, and Squid Proxy. I leave some ports open so that I can watch TV with endtv and endstream, which don't work behind squid. So I leave port 80,443,1935 open to general output on my desktop so that I can watch TV still. But you can modify some of the streams to lowest quality (low bandwidth streams) and run them behind Tor, reasonably well if you want to close port 80 and 443 for good. Oh but yeah you have to run it with 3 hops for a good transfer rate, still better than a VPN i guess. So you need to compile and link two versions of Tor, tor_stable with 6 hops and mods, and tor_stock with just the stock configuration with 3 hops. I use tor_stock when I use mpv to get around georestrictions, but you can use it for everything if you lower the bit rate on the streams.

Doing similar port restricting and mac address binding proxy schemes using OpenBSD or Gentoo Linux would be the next step. The final step will be to use dumb 8-bit machines to proxy into the Tor Proxy once someone designs it and produces the software.

Endwall 05/10/2019 (Fri) 17:38:58 [Preview] No.1396 del
>requires Java Script
84 countries with 6676 relays (3464 visible)
Germany, US, Netherlands, France are the largest pools of relays.


58 countries with 908 exits (776 visible)

It would be nice if this page displayed point counts by country circle. But estimating by the size of the circles about 1/8th of world relays are in USA, and 1/5th of world exits are in USA.

US relays 6676/8 = 834.5 ~ 835
US Exits 908/5 = 181.6~182

So if all 3 nodes in your path stay in the United States, you have 835 C2 * 182 possible paths. this is 63,371,490 or 64 million If you are under surveillance as then only 835*182 = 151,970 possible paths need to be investigated. This is an extremely tractable problem.

Endwall 05/10/2019 (Fri) 17:47:09 [Preview] No.1397 del
Hypothetical Algorithm for De-anonymizing Tor Users who use Exit Nodes to view Clear-net resources.

Approximate stats: 6000 Total Relays, 1000 total exit nodes

6000 C 3 = 3.5982002 E10

So that's 35.9 Billion possible three node combinations/path selections.

Here is a possible type of attack, or analysis method. I would model all three node paths for travel time, or just model / send ping packets through each of the 36 Billion paths and make a lookup table of travel times. Then if you have all entry and exit nodes monitored (which they don't) then you could use this lookup table and compare it to what you see in real life. This will rule out certain paths.

Say that Joe is an important person who uses Tor, and all of Joe's outbound connections have been placed under surveillance. Joe connects at node A at time t0, and simultaneously within a 5 second window traffic emerges at 1000 distinct exit nodes and was observed. Calculate the time difference between these connections, and compare with the lookup table values that contain these entry and exit nodes. This will weed out several of the possible paths. So say the empirical travel time / delay time to these 1000 nodes from node A ranges from 100ms to 400ms, then you can cross off all paths with node A and the exit node (in the lookup tables) that are greater than 400ms from your ping tests, and less than 100ms and come to a smaller subset of 3 node paths.

Form there examine (from your listening posts) if any of those potential 3 node paths matches connections between node A and the remaining possible exit nodes. Namely look at all of Node A's connections in that time window and compare this to the remaining paths in the lookup table. That will give an even smaller subset of paths to examine.

At that point you could calculate probabilities of the path selections being correct and rank them by the most probable. Seems like a lot of work but with only 34 Billion possible paths this seems tractable for a super-computing cluster.

Endwall 05/10/2019 (Fri) 17:50:46 [Preview] No.1398 del
So say Joe is an important person and has been placed under surveillance. All of his connections to node A are timestamped and logged. Given that you know Joe connected to Node A, you really only have to look at 5999 C 2 possible paths = 17,991,001, or about 18 million paths. Very tractable.

So from all exit nodes that are monitored from the traffic bursts in that 5 second window, calculate delta t from Joe's connection to node A at t0 to the first burst of data coming from the 1000 exit nodes. From this calculation 100ms<dt_Joe<400ms

Go to the lookup table for Node A connections to those 1000 exit nodes and cross out any paths that have dt A->C < 100ms and dt A->C > 400ms This should bring your 2 million possible paths down to tens of thousands, then rank them by the distance of dt_joe to dt_model. A -> B_j -> C_k dt_model dt_observed From the top 100 closest rankings ( smallest absolute difference | dt_model - dt_model | , examine the connections from Node A to middle Node B_j and see if any of those node A connections match with the top 100 paths. If so you now have the complete path. If not look at the top 200. This would weed the paths from 10^4 down to maybe 100 or so.

Then from these 100 possible connections observe what they do and correlate this to things you already know about Joe and his habits. This should weed the connections down to 2 or 3. If all three of the connections happened inside of the surveillance grid ( pass through listening posts (logged routers) along their path) then all of this analysis could be performed, probably automated and within a day or two.

Endwall 05/10/2019 (Fri) 17:59:58 [Preview] No.1399 del
But now since you only observed 1000 exit nodes making traffic and you know node A was used by Joe, you only have to search 5999*1000 = 5,999,0000 possible paths from C observed to B possible middle nodes. So you only need to do 6 million delta t travel time comparisons.

| dt_model - dt_observed | where dt_model is from the lookup table of values containing node A and C, and dt_observed are the actual calculated dt values from Joe's first connection to the first output burst at those 1000 exit nodes.

And this is why you want two things :
1. Intractable amount of possible paths.
2. Entire path not under a single surveillance grid.

Which can be achieved by. 1. Making the path length longer than 3 hops. 2. Chosing each node far away from each other outside of the supervision and jurisdiction of a single monitoring authority.

US relays 6676/8 = 834.5 ~ 835
US Exits 908/5 = 181.6~182

So if all 3 nodes in your path stay in the United States, you have 835 C2 * 182 possible paths. this is 63,371,490 or 64 million. If you are under surveillance as mentioned then only 835*182 = 151,970 possible paths need to be investigated. This is now an extremely tractable problem.

150,000 dt_model constructed by sending ping packets through all 64 million 3 node USA only paths.

Message too long. Click here to view full text.

Tor Hidden Service Mail Server Endwall 08/08/2017 (Tue) 03:16:04 [Preview] No. 992 [Reply] [Last 50 Posts]
############### BEGINNING OF GUIDE ##########################

In this thread I document and revise how to set up a tor hidden service email server, you may substitute the servers that you are most comfortable with.

STEP 0) Collect the relevent files from The Endware Hidden Service
Set up a tor mail server using postfix or OpenSMTPd, with dovecot for imap or pop.

You may contact me anonymously at endwall@zvdcyrpole74oo24gqkx2wh6rmrthrhexzik5dm6xf7ewtiekxmvqwqd.onion
Use endmail.sh to send mail to this account.

Encrypt with pgp and send messages and files by email on a tor hidden mail service on port 25.

Everyone should do this. Then just share your hidden service address and handle.


Message too long. Click here to view full text.

Edited last time by Endwall on 03/09/2019 (Sat) 06:20:10.
3 posts omitted.

Endwall 08/09/2017 (Wed) 02:08:23 [Preview] No. 996 del

This name is juvenile

I'm renaming it to:

Maximum Security Electronic Mail Communications Protocol (MSEMCP)

That's more descriptive of what it is. Its a standard now. Email me with endmail.sh if you set up a server after you test it.

The great thing about this system is that it is opensource, distributed, anonymous, transport layer encrypted, and the message is RSA 4096 encrypted by gpg. Currently you do not have to have a working server to submit mail to a server. So if you were part of a 10 man spy ring with a central node the field agents only need to learn how to use gpg to encrypt and to install swaks, tor, torsocks and use a variant of endmail.sh to report back to central command. Of course it can be used for server to server anonymous communications as well. Since it uses gpg several recipients can be addressed to one anon@hiddenserver.onion and then central command can distribute the messages to their intended recipients after the first decryption. So you could encrypt with a general wrapper that contains the meta data (to: field ) that central command uses to distribute the message to the person it is intended for, and then put the from: and subject: in the targeted encryption for that person that central command/dispatch can't read. So you'd have two gpg keys one public key for central command and then a public key for the intended recipient. The field agent would perform 2 encryptions the first for the recipient with the subject: and from: field in the plain text, and then the second encryption with the to: field in the plain text of of the encrypted file.

Anyways I'm now calling it the:

Maximum Security Electronic Mail Communications Protocol (MSEMCP)
Edited last time by Endwall on 08/09/2017 (Wed) 02:17:45.

Endwall 08/09/2017 (Wed) 22:02:09 [Preview] No. 997 del
Maximum Security Electronic Mail Communications Protocol (MSEMCP)


Maximum Security Encrypted Message Communication Protocol(MSEMCP)
Edited last time by Endwall on 08/09/2017 (Wed) 22:20:51.

Endwall 08/09/2017 (Wed) 22:17:11 [Preview] No. 998 del
Maximum Security Encrypted Message Communication Protocol (MSEMCP)

Author: Endwall from the Endware Development Team
Creation Date: August 8, 2017
Copyright: The Endware Development Team (c) 2017
License: You are Free to Study, Reproduce, Copy, Modify, Implement, Test, and Use this protocol as described below, in the spirit of the Endware End User License Version 1.15.


This protocol MSEMCP provides:
1. Message security through physical isolation of the encryption station by a read only Floppy Disk Message Sneaker Net (FDMSN)
2. Strong Public Key Cryptography using RSA 4096 bit.
3. Transmission and reception anonymity through Tor with 12 hops.
4. Trust and Verification through TLS 1.2 with RSA 4096 bit, and Self Signed Server Certificates to compare repeated server connections.

All of which can be implimented with 4 tools:
1) A Base install of a *nix BSD or GNU operating system in text mode.

Message too long. Click here to view full text.

Edited last time by Endwall on 08/09/2017 (Wed) 22:39:39.

Endwall 05/10/2019 (Fri) 17:20:38 [Preview] No.1394 del
Also after writing the encrypted message onto the floppy disk, eject it and then flip the write protect tab on the floppy. So that you only read encrypted.asc and sha256sum.txt from the floppy on your transmission work station when sending the file.

In general you can improve this protocol by having 2 air-gaped computers, that share your private key. One for decrypting messages, the other for encrypting messages. That way information never flows back and forth between your air-gap stations and the transmission computer.

READ ONLY Floppy 1 computer 1

computer 2
Floppy 2 READ ONLY

The transmission station has the tor mail server (postfix) with tor and endmail. The Encrypt and Decrypt station are separate computers that share your private key for pgp (not necessary if you're not signing anything, since you encrypt with the counterparty's public key only) . Both are air gaped / full disk encrypted running OpenBSD, and floating on a battery backup (off the power grid). Basically unplug your UPS from the wall for 15-20 mins while you do this operation, shutdown the computer then plug the APC back in to recharge the batteries. If malware flows in to the decrypt station, it can't return to the transmission station or jump across to the encrypt station. Nothing ever flows in to the Encrypt station only out.

If malware flows in to the decrypt station, it can't return to the transmission station or jump to the encrypt station. Nothing ever flows in to the Encrypt station only out. Nothing flows out of the decrypt station only in.

Message too long. Click here to view full text.

Endwall 05/10/2019 (Fri) 17:28:17 [Preview] No.1395 del
Nothing should flow into the encryption station, but I guess you have to get the public keys for your recipients onto the encryption station somehow, so you can make an exception for that, or do it during installation if you have a small consistent set of people that you communicate with. Or just risk bringing in a new public key by floppy disk. It's a very small attack surface.

The point is to assume that the transmission computer can or will get compromised by a keylogger, or by other malware, since it is internet connected, and to shield the messages by encrypting on the air gap.

You might need to jump new public keys onto the encryption station but aside from that nothing comes in, only messages go out on it. With the decryption station nothing comes out, only encrypted messages go in.

1.44MB is enough to have a book's worth of text. That should be enough for passing messages.
The King James bible is 4.3MB uncompressed 1.3MB compressed with gzip. So 2 floppy disks should be sufficient to shuttle messages back and forth for a couple of years.

If both message counter-parties did this protocol, it would be pretty secure. If your messages were leaked at that point and you discovered it by some means, you could safely assume that the person that you are communicating with is a rat,snitch,traitor, etc., who forwarded the decrypts along to your adversaries / enemies.

Its not unbeatable, for instance someone could install a camera in your room...and point it at your decrypt / encrypt station monitors,or keyboard, or have switched your keyboard for your encrypt station with a keyboard with RF signalling by physical access, which is why physical security is also important.

Mozilla thanks Guardian Anonymous 05/10/2019 (Fri) 16:33:52 [Preview] No. 13317 [Reply] [Last 50 Posts]
This video is important: https://youtube.com/watch?v=dpqLJLDPYUk [Embed]

the guardian posted a call to violence in that same time period https://youtube.com/watch?v=czJDIbkOrfw [Embed]

Blatent honeypots Anonymous 05/10/2019 (Fri) 07:43:37 [Preview] No. 13316 [Reply] [Last 50 Posts]
I stumbled across some chans while casually browsing and fapping by just following a few forum links. They are actually full on hardcore kid fucker sites, on the open web. Needless to say they are blatant honeypots. I've seen similar here spammed, the links are to obscure file upload sites which enforce google captcha.

I'm wondering, who is behind this shit? No pedo, except perhaps a literal retard, would be browsing bare ip with js enabled and fill out a google captcha to download that content so I doubt highly the links are legit. Whoever it is though is hosting that shit and uploading those images/clips. That's certainly illegal for the eye agencies. Russians maybe? I remember reading mentions of this on 8ch months back so they've been at it for a long while.

Anonymous 05/09/2019 (Thu) 05:08:49 [Preview] No. 13314 [Reply] [Last 50 Posts]
I have a coaxial cable with internet connection entering one part of my house attached to a modem, and then in another part that isn't connected to anything. Is there a way for me to convert it to ethernet with a modem/router/etc?

(30.89 KB 800x800 Sticky.jpg)
Anonymous Board owner 05/09/2018 (Wed) 22:40:59 [Preview] No. 12705 [Reply] [Last 50 Posts]
Welcome to /tech/, a technology board. This board is for general discussion of technology.

Rule 1: Only threads about technology or /tech/ itself are allowed.
Rule 2: NSFW content are only allowed if they are spoilered.
Rule 3: No referral links, asking for cryptocurrencies, advertising or similar.
Rule 4: No spam or posts without meaningful content.

All rules and policies are open for discussion in this thread.

IRC: #/tech/, #InfinityNow and #endchan on irc.rizon.net - https://qchat.rizon.net/
Wiki (OLD): https://wiki.installgentoo.com/

Archived sticky threads:


Message too long. Click here to view full text.

Edited last time by _ on 06/19/2018 (Tue) 02:20:22.
39 posts and 9 images omitted.

Anonymous 02/22/2019 (Fri) 06:13:44 [Preview] No.13210 del
Too bad that the users of this board were never that good with technology. They were years above typical people, but far from a unified knowledge base seen in only a few individuals across the planet...

Intel/AMD CPUs were hit with Meltdown and Spectre, and Intel already had the Management Engine inside of it.
Some things with TOR and other projects happened, a coordinated attack on multiple imageboards (Be lucky that I am telling you this, it was largely undetected) that resulted in lainchan, mewch, and other getting hit hard.


Anonymous 02/22/2019 (Fri) 06:35:11 [Preview] No.13211 del
While I'm not familiar with the board, after a quick skim I see you did a good job. I also found threads with potential, wish Endchan would have a few more posters. I hope someone with good intentions takes over your place.
Have a nice one, dude.

Anonymous 03/13/2019 (Wed) 00:07:17 [Preview] No.13222 del
Anybody has any idea what is this about?

Anonymous 05/07/2019 (Tue) 18:34:48 [Preview] No.13311 del
Is anybody here using Gentoo? Would you recommend it?

Anonymous 05/09/2019 (Thu) 01:50:23 [Preview] No.13313 del
>Is anybody here?
I fixt your question.

(434.19 KB 1266x1509 1416575617064.png)
How to secure firefox forks post legacy Anonymous 10/22/2018 (Mon) 01:33:52 [Preview] No. 12908 [Reply] [Last 50 Posts]
Icecat now no longer supports LEGACY EXTENTIONS. Pic related is some of the extentions that are mostly legacy now.
Is the new firefox basically a waste of time? Is palemoon and waterfox the only forks that still support legacy extentions?
20 posts and 1 image omitted.

Anonymous 11/06/2018 (Tue) 16:37:44 [Preview] No.12987 del
(3.48 KB 76x76 icon38@2x.png)
Just do not leave Javascript enabled, and block all non-essential third-party resources. It's incredibly counter-intuitive to do otherwise.
If enough people would do that that would increase the anonymity set and solves the problem you're raising.
Then again, Tor, I2P, and VPNs aren't secure anyway because those are low latency networks so it is incredibly easy for the MI5, NSA, GCHQ, whatever to correlate ingoing and outgoing traffic.
So anyway, you are suggestion that we sent our URL referrers to every single advertisement, tracker, and third-party server that a web page contains? Very smart ...

Anonymous 11/07/2018 (Wed) 04:42:08 [Preview] No.12993 del
(20.70 KB 680x503 c16.jpg)
>all non-essential third-party resources
Again, you doing that by hand increases your browser's fingerprint uniqueness drastically.
> It's incredibly counter-intuitive to do otherwise.
<Good goy. The more you follow your intuition the easier you are to manipulate.
>If enough people would do that that
You get it.
>Then again, Tor, I2P, and VPNs aren't secure anyway because those are low latency networks so it is incredibly easy for the MI5, NSA, GCHQ, whatever to correlate ingoing and outgoing traffic.
Gosh, the traffic is easy to correlate precisely because they aren't low latency networks. I2p however is also constantly routing other people's traffic so if you leave your i2p router 24/7 you make traffic correlation (the kind your are talking about) impossible.
>So anyway, you are suggestion that we sent our URL referrers to every single advertisement, tracker, and third-party server that a web page contains? Very smart ...
Yes, that's how anonymity works, you need to blend in. Just don't do that from your IP.

Anonymous 11/07/2018 (Wed) 04:49:24 [Preview] No.12994 del
i just do the private browsing

Anonymous 04/29/2019 (Mon) 18:27:34 [Preview] No.13303 del
Where the fuck arw legacy extensions even hosted now? pozilla pruned them

Anonymous 04/29/2019 (Mon) 20:49:26 [Preview] No.13304 del
You have to search for .xpi's individually and install them from cnet type sites.

(140.84 KB 1024x717 Hard_disk_dismantled.jpg)
How do you store your data/backups? Anonymous 07/20/2017 (Thu) 23:19:37 [Preview] No. 10460 [Reply] [Last 50 Posts]
Hie, I'm trying to find a good solution to never get out of storage on my HDDs, for my backups and my regular use.
What is your data storage solution?
I want, if possible, a solution that is the most freedom compliant.
There is the usb HDDs, 3/4 plugged on a rasp.
There is the NAS with 3.5' HDDs in it.
Maybe a cheap 20$ computer with the HDDs in it with linux installed...

What should be the best? What HDD to buy (there are these backdoors, even though I don't think I can find any without)

Thanks you!
34 posts and 4 images omitted.

Anonymous 11/22/2018 (Thu) 19:54:52 [Preview] No.13000 del
In a usb

Anonymous 11/22/2018 (Thu) 22:38:19 [Preview] No.13001 del
Get MDiscs for long term storage and DVDs for your monthly back ups.

Use an encrypted tarball for your / dir. When you want to restore your files, navigate to it/copy it over and extract the tarball using the below commands. In this scenario however, if you cannot boot into your OS for whatever reason, I recommend having your private key and public key backed up on a DVD or MDisc. Then it's only a matter of reimporting and trusting your keys and running the commands like usual. Here's an idea.

# on your pc in a backup_this_computer.sh script or whatever:
timestamp=$(date +%m%d%y); #MMDDYY
tar -cjv / --one-file-system | gpg -e -r your@emailforthekey | ssh someuser@someserver "( cat > /somebackupdirectorysomewhere/hostnhostn_$timestamp.backup )";

# The above script will just pipe over the zipped and encrypted bytes over the network to a server and puke it out into a file there.


# When you want to restore your backup...

Message too long. Click here to view full text.

Anonymous 11/22/2018 (Thu) 22:40:45 [Preview] No.13002 del
Oh fuck syntax error, the hostnhostn part should just be $hostn. IDK what happened there... hm...

Anonymous 11/25/2018 (Sun) 01:54:28 [Preview] No.13004 del
Uni gave me unlimited storage on google drive. Should I encrypt my shit and upload it there?

Anonymous 04/29/2019 (Mon) 18:17:02 [Preview] No.13302 del

Torpedo bullying Anonymous 04/17/2019 (Wed) 20:58:44 [Preview] No. 13276 [Reply] [Last 50 Posts]
So, the shit BO of 8ch's /tech/ has finally joined the plague of faggots bullying Tor. When will it end, anons? When are we going to just make our own meshnet already?
6 posts and 2 images omitted.

Anonymous 04/23/2019 (Tue) 13:05:29 [Preview] No.13292 del
>whaaa i can't spam garbage shit anymore

Anonymous 04/24/2019 (Wed) 04:46:01 [Preview] No.13293 del
It's very simple:
"GPL is revocable"

This is why 8chan tech bullys tor.

Do you want endless legal treatises about how gratis licenses are revocable at-will by the copyright owner, or not?

Tech chose not.

They feel they are /tech/ not /1st draft of legal books/

Anonymous 04/24/2019 (Wed) 04:48:21 [Preview] No.13294 del

However, that being said, books /are/ technology, as is law (a foundational technology) as is logic.

So I don't know what /tech/'s deal is.

Anonymous 04/28/2019 (Sun) 05:41:51 [Preview] No.13299 del
It could actually be glowniggers doing it to force toranons to either go to other onion accessible chans or to deanon themselves, basically a downgrade attack. It would not surprise me if pigchan already has its balls in a vice and this whole ordeal is intentional.

You'd have to be a retard to go there without some sort of proxy hopping. Especially now, as there are probably more eyes on that place than ever before.

It could also just be some other onion channers wanting to drive 8chan piglets into onionland.

Anonymous 04/28/2019 (Sun) 07:50:32 [Preview] No.13301 del
>You'd have to be a retard to go there without some sort of proxy hopping.
Pretty much, but you still have retarded BOs trying to act otherwise.

>It could also just be some other onion channers wanting to drive 8chan piglets into onionland.
I suspect this. Plus autists who bitch about Tor not being perfect, and decide to prove their point by pissing in the pool. Like >>13291 says, funny how some people REALLY don't like it.

Are you retarded? Board gets like 1 post a day and you still can't be bothered to read posts before replying?

The fuck you on about? This has nothing to do with the thread. You want to talk about it then go make your own thread for it.

(20.58 KB 480x360 er.jpg)
Intel SUCKS Anonymous 04/04/2019 (Thu) 15:47:49 [Preview] No. 13257 [Reply] [Last 50 Posts]
How about:

>Intel ME/HAP Inclusion
>So many bugs even a sewage worker would be surprised
>Aggressive marketing on Intel® Core™ Products™
>Using toothpaste instead of actual solder for the heat spreader
>CEO GTFOd' after Spectre/Meltdown/Portsmash fiasco
>Crappy as fuck x86 architecture bloated to hell riddled with bugs
>FDIV, F00F, and other catastrophes that "Wouldn't affect the average user"
>and later taking money from employees after they had to replace the fucked CPUs

If they were smart, they would start over, start with a simple pipeline with absolutely nothing else, and then adding the branch prediction, dynamic execution, and other accelerative features later, but they are in a bad spot, because while AMD, ARM, and other manufacturers are speeding ahead, Intel has just lost one of its tires and is slowing down.

Wat do?
Support more transparent manufacturers. AMD is far better than intel, but has its own problems(PSP, Etc.), while ARM/SPARC/POWER CPUs seem to be some of the most stable, but this is just speculation (Highly likely to be better than intel, though.) RISC-V/FPGA designs could also prove to be useful.
5 posts and 8 images omitted.

Anonymous 04/14/2019 (Sun) 23:26:15 [Preview] No.13274 del
Definitely an edgelord. It would be one thing to say ME has backdoor vulnerabilities (which it does) and leave it at that, but he outs himself by naming a few obscure privacy focused operating systems.

THe post is equvalent to "GIVE UP GOYIM THERE IS NO WHERE TO HIDE". 8ch/tech/ is filled with posts like this on a daily basis.

Anonymous 04/15/2019 (Mon) 13:40:49 [Preview] No.13275 del
4ch, /g/

Its nothing that wasn't already confirmed by more reputable sources like Semiaccurate. Definitely a LARP and someone who bothered capping it.

Anonymous 04/18/2019 (Thu) 04:19:57 [Preview] No.13283 del
I think I would make a distinction(addition?) and say that x86_64 sucks but yes you're right OP, Intel can go die.
I am curious to know if any anons have had success with other ISAs/architectures, specifically a "libre" ARM SBC or a POWER9 system(raptor computing?). It would be nice to relegate my x86_64 system to just a few "performance intensive" tasks.

Anonymous 04/20/2019 (Sat) 23:37:00 [Preview] No.13290 del
NPX Power Architecture might be an option too. They make SoC that are used in communications/aerospace/military applications. I'm having a difficult time finding designs available to civilians, but it looks like it could be a RISC option in addition to ARM.

Anonymous 04/28/2019 (Sun) 05:44:54 [Preview] No.13300 del
RISCV will also be an option in the future, but that might be a ways off and not necessarily high-performance. We'll see.

(4.95 KB 184x184 lain321565.jpg)
The GPL is Revocable, Discuss on G Anonymous 04/26/2019 (Fri) 10:48:40 [Preview] No. 13296 [Reply] [Last 50 Posts]

Anonymous 04/27/2019 (Sat) 14:38:19 [Preview] No.13297 del
Fuck off

Anonymous 04/28/2019 (Sun) 05:28:20 [Preview] No.13298 del
If we wanted to go to 4chucks, we would already be there. We are not cucks, therefore...

Warning All Microsoft Users: You May Need To Switch To Linux or an Other Alternative OS Soon... READ WHY Anonymous 04/10/2018 (Tue) 16:00:02 [Preview] No. 12580 [Reply] [Last 50 Posts]

"Microsoft have changed their terms of service so that they can monitor any of your personal content, including the files on your PC, while using their products or services and if they deem it offensive they can take that content and their products/services away from you and ban you! If you happen to have an Xbox or have bought PC games from the Microsoft Store and are logged into your Microsoft account on any device while committing your "crime" you can be banned from Xbox Live and have all your downloaded games and any credit that's still in your account taken away!

But it gets worse. This applies to all Microsoft products and services. So therefore Windows itself! I think I have already been a victim, probably due to posting here, as recently my Windows 10 key was revoked out of the blue. I contacted Microsoft and they told me my key was no longer valid but outright refused to tell me why. So I had to buy Windows 10 again. I didn't buy it direct from them of course. Please post if this has happened to you very recently too.

I'm pretty scared about what's coming. They want us off the internet and I think this is how they're going to get many people. They're going to just shutdown our Windows on the basis of us breaking their new terms of service. What if ISPs are next?"

OP comment:

First off, no one should be using Windows 10. If you like Windows get an older one like Windows 2000, Vista or XP and make sure you turn OFF all automatic updates in the settings. Make sure you do not leave it online 24/7 either (leaving the OS online when not in use makes it much more vulnerable). There are also programs out there you can install that will completely remove all auto-updates for Windows if you are too lazy to change the settings.

If you want to switch to Linux you can install "Wine" and run Windows executives right from your Linux OS. Depending on which OS you partition (such as Q4OS) this will mimick an older version of Windows. Q4OS is what I recommend because you can install Wine and the OS replicates Windows XP, looking almost exactly the same!

Second, which is VERY important, users should be using a private VPN service in this day and age. No reason not to. Get off your lazy ass, buy a cheap private VPN (these can cost as low as $30 PER YEAR), and shield yourself by encrypting your communications and spoofing your IPs. Its easy and even us boomers can learn how to do it, I did.

Third: always have physical offline backups of any of your important files (this includes ISOs of the OS you use, software you may use and any media or other files you deem valuable).

Message too long. Click here to view full text.

8 posts and 1 image omitted.

Anonymous 04/04/2019 (Thu) 18:43:42 [Preview] No.13262 del
There are some actions which can only be completed on windows (Unless you are willing to spend many hours porting software over to linux.). Don't be a faggot and use separate computers, a Linux machine and a Windows machine (Or just separate hard drives, but DON'T use multiple OSes on a single drive, windows WILL see that.)

Anonymous 04/07/2019 (Sun) 02:37:22 [Preview] No.13263 del
Might be a good idea to not install the Windows OS on bare metal and instead, only use it inside virtual machines. It's likely Windows fingerprints the system hardware so putting it in a metaphorical condom might help keep the actual hardware safe. This should also help prevent it from contaminating any sort of firmware on the machine, although it's not a guarantee.

Anonymous 04/07/2019 (Sun) 02:46:50 [Preview] No.13264 del
Also remember, glow niggers like to cast wide nets when buying/developing exploits, so using obscure stuff that normies do use might help you. This won't help you if you're a high value target, for whatever reason, in which case they will allocate as many resources as possible to get you. If that's the case, then you shouldn't even be on any sort of computer.

Anonymous 04/07/2019 (Sun) 02:54:31 [Preview] No.13265 del
Many of those virus scanners include functionality that checks the hash result of each scanned file against a database of file hashes, so that could be used to identify specific files. For example, if you downloaded one of the NZ shooting videos and have it stored on your drive, in an unaltered state.

Anonymous 04/18/2019 (Thu) 04:53:26 [Preview] No.13285 del
>There are some actions which can only be completed on windows (Unless you are willing to spend many hours porting software over to linux.)
What are you doing that requires Wangblows only? After Effects or something?

Why are you still running systemd? Anonymous 10/24/2018 (Wed) 07:43:56 [Preview] No. 12921 [Reply] [Last 50 Posts]
Serious question, not sure what else to add.
22 posts and 2 images omitted.

SystemDeezNuts BenBoi 12/29/2018 (Sat) 10:25:39 [Preview] No.13055 del

I am a Fedora user and Fedora is top kek. So I guess I'd have to get used to using systemd not that I really ever used an init system ever, until recently getting into to adminning stuff.

Anonymous 12/29/2018 (Sat) 21:04:16 [Preview] No.13069 del
I only used systemd for a very short time, when I installed Armbian on a board I got to move away from the x86 disaster. Well it was less than a month later before a systemd bug was causing problems (some daemons wouldn't start). Armbian didn't address the bug and simply waited for their upstream (Ubuntu) to take care of it. Apparently those guys didn't care about fixing it quickly because allegedly it only affected ARM systems. So I immediately installed Devuan, and that was the end of all that. I never even looked back to see if they finally fixed the bug.
Anyway my other computers were all running OpenBSD, long before systemd even existed. I would have used it here except they don't have good 32-bit ARM support. NetBSD runs okay, but video has no acceleration whatsoever, so Firefox is laggy to the point of 1-2 second delays between hitting arrow key or clicking mouse and it actually doing the action. Which is strange because I also tried some emulators (NES and Amiga) that work pretty damn good with the exact same Xorg driver.

Anonymous 12/30/2018 (Sun) 05:20:10 [Preview] No.13074 del
Arrest this man for the crime of making stable and well maintained software!

Anonymous 03/06/2019 (Wed) 14:21:41 [Preview] No.13217 del
I'm not using systemd and don't intend to, if an opportunity continues to exists to do so. This whole ordeal just demonstrates how much sway Redhat has over the direction of Linux/GNU distros. It can do this because of the development projects it controls.

The ultimate goal is to unify most of the userland amongst the different distributions to the point where there won't be much difference between them and then let redundant distros burn out and have those developers roll into other projects.

There may still be a few holdouts that don't use it, but as long as Redhat and Debian/Ubuntu use it, that will eventually push out non-conformists by creating an ever increasing workload in-order to un-systemd projects that establish hard dependencies to it.

At that point, the remaining non-systemd crowd may make the jump to a different UNIXy OS or just learn to love Lennart's systemd.

If you look at the big picture, this may actually not be a bad thing because it will position Linux for the "not Windows" crowd, where as folks who actually like traditional Unix, will jump over to one of the other options.

Anonymous 04/18/2019 (Thu) 04:32:35 [Preview] No.13284 del
I'm not. I've been using Void Linux, with runit, as a daily driver for ~3 years now. Haven't had any issues with it so far.

(97.27 KB 768x768 amazon_spycam.jpg)
Amazon Ring Anonymous 01/11/2019 (Fri) 03:27:32 [Preview] No. 13092 [Reply] [Last 50 Posts]
If you own one of these... well, lol.


Apparently the maker thought that adding encryption would make the company less valuable. Annnd of course it's outsourced. Ring customer's video from inside and outside of their homes goes to some Ukrainian company. Maybe they're padding their revenue by running some amateur Ring porn sites on the side.
3 posts and 1 image omitted.

Anonymous 01/16/2019 (Wed) 20:30:39 [Preview] No.13121 del
Internet of shit. But seriously though, Ring is a useful innovation that lets you pretend to answer the door and pretend the house isn't vacant when you are 50 mile aways at a restaurant.

Anonymous 02/16/2019 (Sat) 19:38:08 [Preview] No.13198 del
Amazon owns Ring, and there's a great editorial out that wrecks them for not putting their 2nd HQ in NYC. The cat is out of the bag, and tech companies care about nothing but themselves, just like any other business.


Anonymous 04/14/2019 (Sun) 19:25:51 [Preview] No.13273 del
>a folder on Amazon’s S3 cloud storage service that contained every video created by every Ring camera around the world

And the press handler is a guy called Shamir?

Anonymous 04/18/2019 (Thu) 00:28:08 [Preview] No.13280 del
Honestly, at this point there's a whole market segment of brainless cattle that eats this shit up. This isn't for people like us. If I was the company I'd do the exact same. If people are giving their data away, might as well take it.

Do you guys think though that there's a market for DIY security camera kits? With cheap single board computers and cameras these days, you could easily make an almost plug-and-play package that uses fully open source software to record video, process, even do fancy image recognition, put it on your own machine or optionally provide a passworded web UI that only you have access to. You could actually make it cheaper than these shitty electronic doorbells. The only issue is that security wise, you should store the video off-site so that burglars can't steal it, which is pretty trivial but you can offer your own VPS solution and zero-configuration setup script for the retards.

Anonymous 04/18/2019 (Thu) 04:16:38 [Preview] No.13282 del
Some video codec characteristics are such that it wouldn't be too hard to perform some limited encryption (that is, not having to fully encrypt every bit in the whole video) to render the video useless if stolen, but still allow for passworded viewing or fast export.

Marketing will probably be harder than product development. There are so many of these things now. A DIY niche might be easier to target than something in a glossy retail box though.

Good, little known software Anonymous 03/27/2019 (Wed) 10:33:51 [Preview] No. 13242 [Reply] [Last 50 Posts]
ITT: recommend nice, little known software.
My picks would be minimodem and mgod.
Minimodem is a little program that can convert text to/from an audio representation (think dialup tones). Also paired with a mic and speakers, it makes for a pretty retarded way to exchange files wirelessly.
mgod is a tiny gopher server with all the features you could need (executables, automatic file listings, separate http proxy, etc). Written in pure C, I'm yet to find a thing that doesn't compile it.

Anonymous 03/27/2019 (Wed) 17:00:31 [Preview] No.13243 del
That Minimodem is kind of interesting. Reminds me of the news about some bot/malware using a similar technique to communicate, but at audio frequencies outside the range humans can detect. Cellphones are good for that purpose ;-D

Anonymous 03/31/2019 (Sun) 16:34:08 [Preview] No.13248 del
SayIt, it's an Android app to read and speak text documents.

Anonymous 04/01/2019 (Mon) 17:00:00 [Preview] No.13250 del
Talking about android apps, the Tricorder app from F-Droid is really neat.
It's just a prop, but it looks nice and can do stuff like read from mic or grav sensors and display it with a graph, there's also something with gps and cameras. Pretty cool.

Anonymous 04/03/2019 (Wed) 20:14:38 [Preview] No.13256 del
Midnight Commander is a pretty featureful and mature file manager that never gets any love :(
Also gallery-dl is a great tool for downloading all of the hentai you want.

Anonymous 04/13/2019 (Sat) 11:55:41 [Preview] No.13271 del