/tech/ - Technology


Boards | Catalog | Bottom

Check to confirm you're not a robot
Drawing x size canvas

Remember to follow the rules

Max file size: 350.00 MB

Max files: 5

Max message length: 4096

(79.04 KB 768x576 X.jpg)
Anonymous 02/09/2018 (Fri) 04:51:26 [Preview] No. 12366 [Reply] [Last 50 Posts]
If Windows is such a shitty operating system, why do police officers use it to write reports?

Checkmate /tech/.

Anonymous 02/09/2018 (Fri) 05:21:57 [Preview] No.12368 del
I actually like the old Win 95, Win 2000 and XP platform. As long as its not online 24/7 its not a bad OS to have. Sure does have its security flaws like every other OS.

On the other hand... Win 10 I would not touch with a ten foot pole.

Anonymous 02/09/2018 (Fri) 19:49:57 [Preview] No.12375 del
>If Windows is such a shitty operating system, why do police officers use it to write reports?
So they can make sure the police aren't writing reports full of wrong think.

Anonymous 02/09/2018 (Fri) 23:32:20 [Preview] No.12380 del
Software support. Most UNIX-like systems lack support for mainstream tools that these guys need. Also, the US government has contracts with Microsoft, as well as universities.
The server running the services from police is most likely a gnu/linux or BSD system.

Some sensitive groups in inteligence agencies don't use Windows because of security, just the 'normal' police.

Anonymous 02/10/2018 (Sat) 01:52:15 [Preview] No.12381 del
Unix/Linux won everywhere (servers + mobile platforms) except for desktops because people expect desktops to do everything from interfacing 20 year old printers to running the latest games.

Anonymous 02/12/2018 (Mon) 20:24:54 [Preview] No.12392 del
I think its more of the fact that its the default os with toughbooks. They can set it on their car and see the screen in full daylight.

Wireless transmitter inside Lenovo AC Adapters Recording your charging habits Anonymous 02/11/2018 (Sun) 22:35:59 [Preview] No. 12382 [Reply] [Last 50 Posts]
FAKE ASS MOTHERFUCKING NEWS, never really existed https://web.archive.org/web/20170515000000*/https://computersdaily.com/

A group of hardware hackers came across a small transmitter inside Lenovo AC Adapters, that when turned on, would send signals to your computer which would then send data to Lenovo about your charging habits on February 9, 2018.

The application that allowed this to work is included in all Windows 10 operating systems that come pre-installed on Lenovo computers and has supposedly been this way for eight months.

When asked about the purpose of these chips, Lenovo stated that they were to create better computers and help with power reduction in specific situations, and also acknowledged that these chips are in no way malicious and will never be used for malicious purposes.

Edited last time by _ on 02/13/2018 (Tue) 13:44:36.
2 posts omitted.

Anonymous 02/12/2018 (Mon) 14:36:15 [Preview] No.12388 del
>bacdoored cpu enough
Supposedly they worked a backdoor into RAM modules but it was a report that I came across many months ago.

Anonymous 02/12/2018 (Mon) 16:01:22 [Preview] No.12389 del
>these chips are in no way malicious
>and will never be used for malicious purposes

good guy lenovo, everyone!

Anonymous 02/12/2018 (Mon) 16:57:30 [Preview] No.12390 del
Just fucking inset a chip into my dick already.

Anonymous 02/12/2018 (Mon) 19:36:33 [Preview] No.12391 del
I want off this fucking ride.

Anonymous 02/13/2018 (Tue) 13:16:28 [Preview] No.12395 del
>https://computersdaily.com is a parked domain
fake news, no archive link.

Apple's iPhone Source Code Leaks Out, Hackers Can Now Steal Everything You Have On Your iPhones /news/ 02/09/2018 (Fri) 05:04:15 [Preview] No. 12367 [Reply] [Last 50 Posts]
Disregard this faggot, he can't even post the goddamn link to the article to make people reply to the /news/ thread while having a slightly misleading subject line (goes to show the OP is very much so technology illiterate). Just read the article for yourself.

Update: this sums it up better https://archive.fo/n4ce0 https://www.bleepingcomputer.com/news/apple/apple-iboot-source-code-leaked-on-github/
Edited last time by _ on 02/09/2018 (Fri) 06:36:26.
4 posts omitted.

Anonymous 02/09/2018 (Fri) 18:39:17 [Preview] No.12373 del
This spent a whole year on reddit and no one saw it because the poster had zero attention whoring karma. Reddit is such a fucking echo chamber full of faggots jerking each other off they didn't notice the leak of the decade. I fucking hate reddit so god damn fucking much.

On topic: this could result in some awesome hacks, however I hear this will be exploits only as the hardware won't allow a custom bootloader or something?

Anonymous 02/09/2018 (Fri) 19:26:31 [Preview] No.12374 del
Don't worry. It will be the last piece of news I ever post here, I promise! No courtesy or respect to those who want to contribute? Au revoir!

Anonymous 02/09/2018 (Fri) 19:51:11 [Preview] No.12376 del
Is this snapshot all that was leaked? Or was there repository history as well?

Anonymous 02/09/2018 (Fri) 20:03:34 [Preview] No.12378 del
Calm down dear, you know exactly what you did, directing traffic to /news not saying anything's wrong with that, an archive link would have been nice. Thanks for posting anyway.

Anonymous Board owner 02/09/2018 (Fri) 22:48:16 [Preview] No.12379 del
You didn't heed my warning the last time in >>12294 which that last stunt was just terrible. The first thread you've made was okay, but the previous thread you made at least had the fucking link. This is really my extended warning in not deleting your overly sensationalized drivel immediately at sight. You have contributed essentially nothing of use, nor to this very thread. I honestly prefer desktop threads over your pathetic attempt at technology journalism when you yourself don't understand what you're saying. I'm going to lock this fucking thread too, please don't come back.

(146.23 KB 800x600 DSCN1845.jpg)
Anonymous 02/04/2018 (Sun) 04:40:31 [Preview] No. 12338 [Reply] [Last 50 Posts]
I must say, I enjoy utilizing old operating systems such as Windows 95/98, the lack of bloat and low resource usage really appeals to me.

What would you like to see me install on a 32-bit 64 Megabyte of RAM machine?

Anonymous 02/04/2018 (Sun) 04:50:34 [Preview] No.12339 del
Windows for Workgroups, 3.11.

Anonymous 02/04/2018 (Sun) 04:53:28 [Preview] No.12340 del

PS: Don't forget Trumpet Winsock!

Anonymous 02/04/2018 (Sun) 19:01:29 [Preview] No.12343 del
Freedos with Win3x on top and some cool dos games. Keen, GTA, Dungeon Keeper and Fallout1 should all play fine.

Anonymous 02/06/2018 (Tue) 22:14:43 [Preview] No.12359 del
Any updates op? I would also like to see it run debian potato.

Anonymous 02/06/2018 (Tue) 22:46:42 [Preview] No.12360 del

Redhat Linux 3.0.3

(292.67 KB 450x399 RMS.png)
/tech/ - Technology Anonymous 01/03/2016 (Sun) 17:52:28 [Preview] No. 125 [Reply] [Last 50 Posts]
Welcome to /tech/, a technology board. This board is for discussion of technology, both software and hardware.

Wiki: https://wiki.installgentoo.com/
IRC: #/tech/, #InfinityNow and #endchan on irc.rizon.net - https://qchat.rizon.net/

NSFW files are only allowed if they are spoilered. Tech support, consumer advice and desktop/ricing threads are all allowed for now.

All rules and policies are open for discussion in this thread.

Related boards:
>>>/cyber/ - Cyberpunk & Science Fiction
>>>/lv/ - Libre Vidya
>>>/markov/ - bot hell
>>>/os/ - Online Security
>>>/t/ - Torrents/trackers
Edited last time by ring on 06/14/2017 (Wed) 23:18:55.
280 posts and 64 images omitted.

betamax Board owner 02/04/2018 (Sun) 20:28:15 [Preview] No.12344 del

Anonymous 02/06/2018 (Tue) 08:57:31 [Preview] No.12353 del
(328.19 KB 500x500 TAD.png)

Anonymous 02/06/2018 (Tue) 09:10:35 [Preview] No.12354 del
I would recommend the lower case omega symbol but it kind of looks like an ass.

Anonymous 02/06/2018 (Tue) 21:01:19 [Preview] No.12355 del
Mod, stop this spam, please >>12345

betamax Board owner 02/06/2018 (Tue) 21:26:47 [Preview] No.12356 del
You were beaten by >>12353 sorry m8.

Use the report function.

Locking this thread, going to make another.

USBGuard Anonymous 01/27/2018 (Sat) 23:42:26 [Preview] No. 12301 [Reply] [Last 50 Posts]
Someone pointed this on OpenBSD-misc list, maybe it could help some linux users in here:

Very interesting. Don't know how effective it is to prevent attacks, though.

Anonymous 01/28/2018 (Sun) 06:54:50 [Preview] No.12302 del
Wow, that's pretty great, thanks. This should be standard software on all distros tbh. It would certainly be of great benefit in an office environment.

Anonymous 02/02/2018 (Fri) 04:51:53 [Preview] No.12334 del
What stops an attacker from disguising malicious device as a legit one with ease if it's just a short UUID string that defines a device purpose and identity, not a cryptographically signed public key.
>broken links on a site

(140.84 KB 1024x717 Hard_disk_dismantled.jpg)
How do you store your data/backups? Anonymous 07/20/2017 (Thu) 23:19:37 [Preview] No. 10460 [Reply] [Last 50 Posts]
Hie, I'm trying to find a good solution to never get out of storage on my HDDs, for my backups and my regular use.
What is your data storage solution?
I want, if possible, a solution that is the most freedom compliant.
There is the usb HDDs, 3/4 plugged on a rasp.
There is the NAS with 3.5' HDDs in it.
Maybe a cheap 20$ computer with the HDDs in it with linux installed...

What should be the best? What HDD to buy (there are these backdoors, even though I don't think I can find any without)

Thanks you!
29 posts and 3 images omitted.

Anonymous 01/27/2018 (Sat) 20:03:26 [Preview] No.12298 del
Quick question:
Is there some kind of file system with scalable fault tolerance/precautions?
Lets say i want to store away 500MB on a DVD and i create an image that fills the whole 4.7GB of a DVD with various redundant blocks of that data, surrounded by check sums and whatnot, as much as i like (scalable).
I hope this way it will be more likely that you can read or recover that data after a long time and you have the convenience of a DVD storage.
A nice tool for easy reading/recovering would be helpful.

EMP thoughts:
Even if you had a box with 2m thick lead walls isolating your machine, if a cable for eg. power supply goes into that box, your machine might not be EMP save.

Anonymous 01/27/2018 (Sat) 20:42:36 [Preview] No.12299 del
You are confused. There's three questions on your reply: filesystems, DVD and EMP safety
>file system with scalable fault tolerance/precautions
>A nice tool for easy reading/recovering would be helpful.
I don't know, but optical storage has only one advantage today, that is, you don't need to trust the micro-controler firmware.
>if a cable for eg. power supply goes into that box, your machine might not be EMP save.
Wrong. The EMP would just stop the conduction of the electrons through the cable temporarily, not destroy the hadware itself (unless it's a pulse so high that the copper goes to melting point). Also, you don't need lead walls, unless you want radioactivity protection. A simple aluminium faraday cage would do the job just as well.

For backup I would say: if it's offline, do a RAID setup. If it's online, use Tahoe-LAFS and distribute the HDD's on different places.

Anonymous 01/29/2018 (Mon) 16:38:45 [Preview] No.12310 del
From what I understand most electronics are vulnerable to electromagnetic pulses. However they have to be hooked up to the grid and/or have battery power to be vulnerable and/or have some kind of active Wifi signal to be vulnerable.

Faraday cages are safe as long as the electonics are NOT hooked up/powered on in any way and are properly sealed within the conductive material so they are not physically touching their conductive surrounding. For example, if you were to Faraday cage a basic cell phone, you would need to remove the batteries from it and then wrap it up with a plastic bag or inside a little cardboard box and then put that into a conductive surrounding (such as an old trash can) and making sure the lid is closed tightly so that no RF/Wifi signal can interfere with that electronic device. Then you have properly faraday'd it.

If the electronic is old and has no battery, no wifi, and is not hooked up to the grid at all it should be safe even if it is not faraday caged. I can't see how an EMP would effect it if its completely off-grid and not activated. (IF I HAPPEN TO BE WRONG ABOUT THAT, CORRECT ME PLEASE!)

Anonymous 02/01/2018 (Thu) 08:51:55 [Preview] No.12331 del
My solution is to avoid having lots of data to worry about. I can pretty much fit everything on a 500 GB USB/portable hard disk. I recently bought another such disk since my backup drive is from 2009, so I'm going to copy all files to new drive. I also backup the most critical things onto CDR. These CDs are marked by date, so it functions like a historical archive.

Anonymous 02/01/2018 (Thu) 09:18:00 [Preview] No.12332 del
You don't need any special filesystem. Use PAR2 to create the redundant data.
By default, it only creates 5% redundancy, but you can set it to 100% if you have room.
If you use this in conjunction with bzip2 and small block sizes, you should be able to recover from almost any error. Or just avoid compression altogether, if you have the room. Of course, many files like images and videos are already compressed, so can't do much about that short of dealing only with lossless formats (I mean the originals, not by stupidly converting MP3 to FLAC or whatever).

(456.73 KB 853x480 1.png)
Realtime chinese surveillance system Anonymous 09/25/2017 (Mon) 18:06:25 [Preview] No. 11291 [Reply] [Last 50 Posts]
Scary shit:

Remember to protect your privacy. Or, you can just keep listening to your Hardvapour/Fashvapour while everyone looses it's mind and... wait, what reality really is? You postmodernist degenerate fuck.
9 posts and 2 images omitted.

Anonymous 10/01/2017 (Sun) 23:42:46 [Preview] No. 11444 del

I saw the video featuring this pic (I don't remember when it's from). But it's not that serious.
You should be 2 hundreds time more concerned about US/Europe surveillance than China. Because China is doing the same mistake than communism: brute-force the problem.
Western system is far better engineered: they want to destroy the "questionable" content directly in your head. They want to create an anarchic bubble of chaotic information, so complicated that the common with little time can't detached the truth from the false. Moreover, they're stopping you to do effective research, by enclosing your view into a bubble as I said, who never challenge your believe.
One practical exemple, if you discovered the MK Ultra program, and other "complotist" thesis, you'll be direct to bullshit complotist theory, like Flat earth, or alien life (or other bullshit injected in the chaos of information). You'll be shamed by medias, even your families, see that there is no consequence to your act, so you'll drop the thing by yourself, or enclose you in ignorance (or view through the problem, but it takes time and books).
That's a far better system, because you don't know what is the problem. In China, everything that is banned is the problem. And at least, you know there is something wrong. Here, the mass, even though they have the feeling there is a lot of bullshit, don't even have the imagination or even just time/capabilities (the bubble) to swim in the anarchic internet infos.

Who cares about camera recognition in China. It's already here. And it's pretty irrelevant. The analysis of your whole internet history, will tell pretty accurately where you're heading. You search on your local train website to make itinerary? You search about vacation places? You have your phone on you?
These infos are available since a shit tone of time. Palantir (in-q-tel funded) process them.

I mean, it's like you never encountered /tech/nologies or got interested in modern surveillance.

Anonymous 10/01/2017 (Sun) 23:55:06 [Preview] No. 11445 del
You make AI image pattern recognition stronger every time you solve captcha. This is just the tip of the iceberg. Try mind reading and silent sound weaponry.

Mind encryption now (or this is the end).

Anonymous 10/02/2017 (Mon) 17:39:58 [Preview] No. 11479 del
>look guys here I am, going through the city with IR blasters on my face blinding all those cameras all day, totally not suspicious rite
>what are those handcuffs for, officer?
>awww shit don't beat me I'm not a terrorist aah ah

Anonymous 01/31/2018 (Wed) 06:54:31 [Preview] No.12324 del
>Sesame credits for everyone
>National blockade firewall
>Chinese IDF everywhere
>Shittiest Malware Ads
Feels good being in Hong Kong. That shit sucks.

Anonymous 02/01/2018 (Thu) 08:34:59 [Preview] No.12330 del
That doesn't work with me, since I am an anarchist (and I don't mean any political party by that name, I just value true individuality above all else). Their bullshit propaganda stands out, without even thinking about it. The patterns are pretty obvious: they try to set down "rules" to play by, try to make you think or behave in certain ways. They use the same shitty emotional tactics as in public schools to get people to conform. If you don't know wtf I'm talking about, then watch some of the videos or read the books by John Taylor Gatto.

(80.99 KB 824x464 fsb_dpi.png)
Russian government doing deep packet inspection Anonymous 01/28/2018 (Sun) 20:59:07 [Preview] No. 12304 [Reply] [Last 50 Posts]
Thought it would be worth sharing: a document from WikiLeaks explaining the tatics Russian Federal Security Service (FSB) is using to get intel. This is not new, but there's some information on how they operate (assuming WikiLeaks is trustworthy):
>Russian subscribers of mobile operators [...] expose valuable metadata, including phone and message records, device identifiers (IMEI, MAC addresses), network identifiers (IP addresses), cell tower information and much more.
>The Traffic Data Mart is a system that records and monitors IP traffic for all mobile devices registered with the operator. [...] identified by IMEI/TAC, brand, model
>National stacks of DPI / BigData / DataMining technologies and solutions for collection and analysis of information, as well as means of predicting social and business trends - the key to digital and financial sovereignty of the state and business in the XXI century


Anonymous 01/29/2018 (Mon) 16:22:40 [Preview] No.12309 del
>assuming WikiLeaks is trustworthy

only if it applies to Russian leaks I presume, right?

Anonymous 01/29/2018 (Mon) 23:06:46 [Preview] No.12314 del
SORM, what it does and general situation with surveillance/censorship in Russia is no longer secret for anons and these documents might be true, haven't checked them yet.
However, there are more than one company developing DPI and monitoring solutions in Russia, some of them publish corporate blogs, and even one of such devices got into hands of habrahabr user, revealing poor quality of your average subcontractor who usually hires a CS student for food and launders 1,5 million dollars for his work:
City transport companies buy data off mobile operators to plan their routes, Yandex owns all big city taxis and is the sole provider for official bus/metro/commute train navigation apps. The fun thing, you can find all this info on habrahabr, both in corporate blogs and ordinary IT guy's blogs busting these apps shitty security and excessive datamining.
Another example, cities like Moscow have a centralized network of surveillance cameras, on roads, in apartment buildings and streets, in metro, every train and bus. It is also known that they use automatic face and walking posture recognition already for APBs. There is a website anyone can visit, register with their state ID and start snooping on people in real time.
Biggest russian "anonymous" imageboard 2ch handed itself to Mail.ru corporation in late 2016. It's pretty damn /cyber/ life here in Russia, more soykaf than schway though.
Not all network operators implement SORM properly, and sometimes it doesn't work. But most of them are bought out by state corporation Rostelecom. Mobile network operators are the worst since they clearly break the "net neutrality" principle and don't try to hide it. Limited data plans since lat year, "social networking" data plans and so on, traffic throttling aka QoS, DPI and http request filtering are in common knowledge and people are trying to bypass them. For example, simple shadowsocks is throttled by Yota operator, but when you add obfuscation and spoof headers as "vk.com", the speed goes back to advertised.
Source, this thread:

Anonymous 01/30/2018 (Tue) 01:07:44 [Preview] No.12319 del
Thanks for your anecdote, fellow anon.
Have you guys tested this thing? Here:

How does Tor work in russia? Only through bridges? Is VPN traffic normal or they reduce the speed too? Maybe tunneling TCP traffic to UDP could work, see here:

Also, have anyone thought about doing a meshnet in Moscow? Like the Freifunk project, but using B.A.T.M.A.N, or simply connecting with Briar Project through Bluetooth:

Check also the other links here:

Anonymous 01/30/2018 (Tue) 03:38:20 [Preview] No.12321 del
Not really. Assange is getting more and more on in politics, I wouldn't be choked if he is now a government contractor.
Now, of course, Wikileaks is more than Assange. But I do think they use it as a weapon (governments "leaking" information purposefully, to affect economic tradings or whatever).

The people at Cryptome seem more radical, at the point that I see it as very difficult that they got corrupted by the "system power", as they would say.

Let's not forget that both Assange and Young (from Cryptome) used to be cypherpunks. And, for those who don't know, the cypherpunks was basically the most important mailing list for privacy and security computing. From there, they released PGP, the EFF, Tor and stopped multiple attempts from NSA (such as the backdoors on VPNs and the "clipper chip").

Anonymous 01/29/2018 (Mon) 15:43:04 [Preview] No. 12307 [Reply] [Last 50 Posts]
/tech/ is this good or bad news? What will this mean and how would this effect us?

White House Is Planning To Nationalize 5G Network


In a stunning - if accurate - report published Sunday night, Axios claims that White House national security officials are considering an unprecedented federal takeover of a portion of the nation’s mobile spectrum/network to protect against Chinese attacks, in what may well be a pre-emptive shot, hinting at upcoming trade wars between the two superpowers.

Axios got its hands on PowerPoint deck and a memo, both of which were purportedly produced by a senior National Security Council official, which were presented to other senior officials at other agencies during a recent meeting. The documents argue that America needs a centralized nationwide 5G network within three years. There'll be a fierce debate inside the Trump administration, and an outcry from the industry over the next 6-8 months over how such a network is going to be built and paid for.


Anonymous 01/29/2018 (Mon) 15:45:51 [Preview] No.12308 del
I still use a wired modem, hope that I won't be needing to use this shit just to go online anytime soon.

Anonymous 01/29/2018 (Mon) 23:09:54 [Preview] No.12315 del
5G nationalized ISP
4 Unit rack
3 letter agency
2 party system
and your segfaulting code in C

Anonymous 01/29/2018 (Mon) 23:12:06 [Preview] No.12316 del
on the 6th day of parole, i got from my ISP:

Anonymous 01/30/2018 (Tue) 00:50:42 [Preview] No.12318 del
If it's true, that's probably a retaliation against AT&T and Verizon monopoly.
It's not as they don't already see everything, but now they can have all mobile data for them, without asking (again, if it's true).
Imagine not having to ask Akamai, Google and Amazon for data. Imagine they doing traffic shaping all they want, with no limits.

They will probably use the "action i favor of net neutrality and the good of the people" argument next months... we will see.