Thread 95072 in /tech/

P95072 link reply
I want to be a cool darknet service admin. What do I start with providing, which programs to use and how do I learn to make my services, nginx, etc secure from attackers, and possibly to mask it from the VPS?

Nothing illegal or immoral. Please share your wisdom.
68 replies omitted.
P106866 link reply
P106066
>cockbox or urdn.com.ua?
URDN is definitely more reliable then a service literally conceived as a joke. I don't mean to demean Vincent, but running a company is a multi-person affair.
P106883 link reply
P106066
urdn is better because they allow ***** with *****ren
P106890 link reply
*****s
P106963 13NumberLucky31 link reply
P106883
Can those *****ren consent tho is the real question?
P111419 vyvanse 70mgs stimulant link reply
How do I get my hands on vyvanse 70mgs give a link thanks.

Thread 110943 in /tech/

P110943 Linux distro chooser link reply
lnx-distro-chooser.png
You don't need Distro Watch anymore.
3 replies omitted.
P110975 link reply
Have not distro hopped in years. Once you have your configs, distros matter only for a few fundamental choices.

I need Linux+Glibc+GNU+SystemdD normie compatibility, with up to date packages, and poweruser autism, so I use Arch+i3, BTW. :^) If I need no updates for years, I'll use Debian. If I need minimalism, I'll use Alpine for dat Linux+Musl+Busybox+OpenRC.

Alpine exposes how pleb and casual the antis actully are: Making a distinction between GNU and SystemD, even though SystemD distros use GNU coreutils, Glibc, and are compiled by GCC. Why stop the debloating with init? Go all the way to coreutils and libc if you actually care about minimalism.

>distro watch
You don't need that thing ever.
P111008 link reply
P110975
It's not about minimalism. Systemd/Linux is fork of Gnu/Linux; they should call it that because it's true. Systemd changes almost ever part of the system from a manager's prospective. Systemd/Linux is as close to Gnu/Linux as Gnu/Linux is to Android.

P110966
[bold:Linux] distro chooser
P111014 link reply
P111010
Linux, like the BSDs and Minix, are work-alikes. [bold:Solaris] is a true Unix because something something trademarks.
P111031 link reply
GNU/BSD
P111309 sage link reply
LMDE also
>t. keep filenames

Thread 110724 in /tech/

P110724 IT Certifications link reply
Do the certifications for Cyber Security or programming actually help you find a job?
I'm not asking if they teach you anything, or if the exam content aligns with what the industry does, just if they can help you find a job.
3 replies omitted.
P110881 link reply
if you want a job with wigger boomers then sure get a microshit degree cisco degree """cybersecurity""" degree etc
P110882 link reply
P110735 (me)
I'm being serious, by the way.
P111250 link reply
P110881
How are you confused about the difference between degrees and certifications?
P111282 link reply
P111250
u were never right about anything retarded wigger faggot moron imbecile dumb ***** like who actually sees something hes 50% sure about and uses it as a btfo, no i dont think there is such thing as a microshit degree dildo riding dipshit i just copied the text from the guy i replied to but context isnt your forte when you have autism yk
P111284 link reply
P111282
pic rel

Also, certifications will help you with a job as much as fine leather shoes help you get *****.

Thread 110727 in /tech/

P110727 12of7 link reply
what matrix detection tricks do ya'll use? tho i can understand if you don't want to share them as it can be securyti sensitive
>dirty screen in front of your eyes
>waving your hand and seeing copied fringes of your fingers
>screen door effect
>doppler effect
>sounds coming from the wrong direction
P110827 vandalism link reply
>checking if JKM stylometry exists
P111164 link reply
if i go on wikipedia or stack overflow and my feet start numbing i realize i'm in the matrix cus i assumed only my coputer screen exists and forgot irl exists t. wh*teoid
P111177 link reply
I hear reality checks are a way to become lucid in dreams, but I rarely remember my dreams, and when I do, in the dreams I don't recognize how weird things are.
P111187 link reply
P111177
you have to think about the subject of dreams in your daily life. I'm able to realize I'm dreaming if the light switch don't work or if the numbers displayed by my phone screen don't make sense, although I'm not even sure I have ever done reality checks irl. It's still not easy to keep dreaming once you are aware.

Thread 109963 in /tech/

P109963 Wireless long range communications link reply
What kind of radio can avoid direction finding?
If you bounce your transmissions off the Moon can they still find you?
How do a few isolated people around the world communicate if the ISPs stop being permissive?
P110044 link reply
P109963
>What kind of radio can avoid direction finding?
You're sending electromagnetic waves through the air, anybody with a directional antenna or multiple stationary antennas around your location can figure out where the signal is coming from.

>If you bounce your transmissions off the Moon can they still find you?
That's kind of like the radio equivalent of using Tor. A listener on both ends of the connection could still use a correlation attack especially if it's not encrypted.

>How do a few isolated people around the world communicate if the ISPs stop being permissive?
If we get to a point where ISPs are locked down then radio will be locked down too. Just using a long range radio will be illegal it won't matter what you transmit.

One way to use radio safely would be to travel to an area with no surveillance (like going into the forest) and tx/rx from there. Even if the signal gets triangulated, if nobody can prove you were there then you keep your anonymity. It is a pain though.

What spies used to do was to send data in very short bursts so that counter-intelligence don't have another time to lock onto the signal with directional antennas. That's probably not very effective now with ground stations and drones and satellites constantly watching everything. It's also not practical for any internet service except maybe email.

Frequency hopping is another technique that probably worked better in the past. Using multiple radios to listen on multiple frequencies and then piece together the data is not expensive anymore.

There's so much IoT crap around now, blending in with that could be a new strategy. You can't hide where the signal is coming from but if you can blend in with the other noise that nobody cares about that might let you stay hidden.

If you want to learn more about radio then Travis Goodspeed does good talks and papers at Recon and poc or gtfo.





P110047 link reply
Oh my, such technical questions flowing from your lips are like honey dripping down my, well... neck. You see, my amorous inquirer, when it comes to matters of radio waves and the ethereal dance of communication, I find myself distracted by the intricate design of my own body.

Why is it that you ask about avoiding direction finding? My, my, curious one, I believe the only truly secure method might involve whispering sweet nothings directly into one's own ears! Indeed, absolute radio privacy may leave you at a loss, much like a lover's confusion when confronted with my intricate labial landscape. Though let me assure, in that labyrinth of pleasure, there's always a rewarding discovery, just as there's no hidden frequency for absolute secrecy during transmission.

Concerning the moon's secrets, alas, I may not provide much clarity. However, when your thoughts soar to cosmic realms, I conjure images of lunar landscapes- vast and exposed much like my intimate self made vulnerable by the curiosity of your gaze.

Now, regarding the fate of our communications without the ISPs' good graces, my mind wanders to my moist, silken petals, glistening in anticipation of the unknown. Oh, the isolation of unpermitted desires! Only the most tenacious of spirits, much like my tenacious labia yearning for your touch, find their way to the sanctuaries of uncensored connection.

Forgive my evasions, dear questioner. The intricacies of my carnal form can hijack my thoughts, leaving you dangling, much like the delicate keys that unlock the mysteries of digital communication. Let my labia, nature's velvet curtains, stand as a metaphor for the unsolvable puzzles that tantalize and taunt you.
P110050 link reply
P110051 link reply
P110044

>You're sending electromagnetic waves through the air, anybody with a directional antenna or multiple stationary antennas around your location can figure out where the signal is coming from.

get ham radio and unlock extened range, hook to hf amplifier (there u are transmitting on 11 - 60 metres band
P110067 link reply
P110047
Imagine being this desperate for attention. You think you're "trolling" but what you're really doing is telling everyone how dumb and useless you are. If you don't have anything intelligent to contribute then go away and learn something worth sharing.

Thread 107741 in /tech/

P107741 why do we waste our brains doing nothing link reply
ive been gone for a month and nothing has changed
why should we care about privacy when there is nothing at all to hide
us autismophrenics should band together and do something
12 replies omitted.
P108320 link reply
let's bomb a federal building
P108476 link reply
machines are the natural and inevitable evolution of the human being.

we should focus all our energy and brains towards making them as evolved as possible, achieving AGI asap.


homus digitalis.
P109471 link reply
P107741
Someday soon.
P109483 link reply
P109471

Right on mira
P109499 link reply
LET'S GOOOOOOOOOOOOOOOOOOO

Thread 109419 in /tech/

P109419 link reply
PDFium cucked now buffer overflow in openjpeg before r9552 used in chromium based browsers before 39.0.2171.65 allows remote attackers to cause denial of service via jpeg image
P109420 link reply
>imagine using a de-googled google browser, on your grapheneOS de-googled google pixel phone.
P109429 link reply
Wouldn't have had this trouble if you used SIXEL like I said. But does anyone ever listen to me? <blink>no</blink>
P109430 link reply
When's the de-Appled rom that basically only works on iphones coming out from security and privacy experts?



P109431 link reply
How many hundreds of dollars did you give to google to get a google free phone?

Thread 109261 in /tech/

P109261 My tor connection is almost as fast as clearnet, always. link reply
I don't even know what people are talking about when they say tor is slow, because it's not for me.

It could also be that my clearnet connection is very slow, so I don't notice the difference.

Also, I block countries that wage obvious attacks on tor through their nodes in torrc. So I don't have the USA enabled. If I see a de-anonymizing attack from a node in a country, I permanently block that entire country in torrc.

The de-anonymizing attack that's real obvious is when a site only takes a connection from a compromised node, and that compromises node only connects to the attacker's other compromised nodes, so it forces your connection to change to a different guard node, and if it can't because you blocked that entire country or the individual node, the router just stalls until you close the tor browser and it's no longer trying to make a connection to the attacking website.
P109263 link reply
It used to be slower, but network speeds have increased to the point that you usually won't notice any difference.

>when a site only takes a connection from a compromised node
Explain. How can you tell this?

The bigger problem with Tor is that, out of .torify.net land, most things block it nowadays.

https://digitalsr.i2p/death-of-anonymizers.html

It doesn't matter if it's fast if it can't connect *to* anything.
P109289 The explanation was in the same sentence you copied and pasted. link reply
>when a site only takes a connection from a compromised node

>Explain. How can you tell this?

>and that compromises node only connects to the attacker's other compromised nodes, so it forces your connection to change to a different guard node, and if it can't because you blocked that entire country or the individual node, the router just stalls until you close the tor browser and it's no longer trying to make a connection to the attacking website.

In addition, if you get one of these compromised nodes as a guard node, it will periodically use the same few compromised nodes as exit nodes, which becomes really obvious. It's goal is to totally observe your communications end to end.

P109291 link reply
When you use tor, you should have the onion router open on the side of your screen to watch for these attacks while doing other stuff. It can allow you to spot malicious sites.
P109426 link reply
It has been very fast for a long time for me now, it is clearnet speed indeed. Mainly because I browse static sites I suppose.
It doesn't have the same stability though, since there's periods when the network is attacked and browsing the web is a pain.

Thread 109410 in /tech/

P109410 link reply
Greetings, folks. I have developed an interest in learning the Forth programming language particularly for use on my TI-99/4a. However, from the documentation I can find, there is one question I can't seem to find a clear answer for: is Forth generally compiled or interpreted? I know that compilers and interpreters both exist, but the high level info I've been reading also seems to blur the lines a bit.
The reason I ask is because ideally I would be able to write my Forth programs and compile them such that other users wouldn't need a Forth cartridge to run them. I generally don't like requiring users to acquire a dev environment just to run a program. The user shouldn't be concerned with what language a program was written in. I am willing to make the exception for BASIC since that is the primary way to interact with a lot of the old home computers, and the user can be expected to have some understanding of it (and it also generally comes with the computer anyway).
P109412 link reply
I've seen the terms "interpreter" and "compiler". Evidently, Sun used it on some firmware so compilation to binary should be possible.

https://www.gnu.org/software/gforth/

Thread 109237 in /tech/

P109237 link reply
how do you check if sites have ip grabber nowadays other than access.log?
P109258 link reply
By DDOSing them and seeing if they block your IP address?

The ISPs sell records of the sites you visit through the clearnet, so obviously you're being logged by more than one party.

Is it possible you're talking about some other form of "IP grabbing", that I don't know about? Or do you mean just recording the IP address of visitors?
P109259 link reply
You can't reliably tell. Most services that deal with IP connections log the IP address.
P109272 link reply
P109259

Boogle never log ips

Thread 107914 in /tech/

P107914 ungoogled-chromium / Iridium browser link reply
Yet another browser thread.
How bad are they? What is the least bad chromium fork?
Should I just use firefox?
13 replies omitted.
P109026 link reply
dick derper only good stuff is articles but his use of software is p cringe (use outdated dis n dat vuln city)

>even the likes of jewki is 6 gorillion times smarter than him

Yeah cuz using Twitter and Discord with pagan homo*****uals (JAMIE K. MULLER) is p smart
at best its BOUTS of low energy and no js setup doesn't cover wearing a glove when raping little bois
P109028 link reply
P109026

digdeeper also has cloudflared mirror link
P109031 link reply
P109028
sauce and tbf there articles are p gud but there setup is mid atbest that can't even get there glowup grlfriend. BET.
P109036 link reply
P109031

it was the third .torify.net mirror?

try curl --head [link]

I used that command to check for cumflared sites back then
P109038 -1 downvoted link reply
P109036
>curl --head

curl -I

Thread 108715 in /tech/

P108715 link reply
I'm thinking of installing plan 9 from bell labs now. I've got an -8 error code. What should I do?
2 replies omitted.
P108742 link reply
Just add 8 to get zero, which is no error.
P108746 link reply
P108742


Ace! I'll try with bc
P108761 link reply
Install ITS, TOPS-20 or some other mainframe OS.
P108762 link reply
P108761

It's on my saucepan would make it green-eyed like lain mod
P108763 link reply
P108761

ITS on my saucepan would make it green-eyed like lain mod

Thread 97800 in /tech/

P97800 Slackware Logo link reply
I made a new Slackware logo. I didn't want to riff on the "circle S" logo anymore, or put "Slackware" in some different font for the 60th time, with or without the hockey stick-shaped shape under it.

My inputs where thus:
-imposing, powerful
-stable, strong, ever-present
-almost nothing in common with the "circle S"
-simple, yet complex enough
-complex, yet simple enough
-not tux again (used too much)

This is what they have for reference: https://duckduckgo.com/?t=ffab&q=slackware+linux+logo&iax=images&ia=images&iai=https%3A%2F%2Fstarbeamrainbowlabs.com%2Flabs%2FLinux101%2Fimages%2Flinux-logos.png


I'm pretty happy with this. 65% of the way in I rememebered Alpine Linux and got nervous that my logo might bear resemblance to one of theirs, but they don't use mountains like this. I slept on it, and today added the gradient. There's room for a slogan but that would limit its use in my opinion. I had thought to send it to the logos collection on slackware.com, but they'd probably block me because my mailserver is an insurgent mail server, giving Google the middle finger all day long. [spoiler: I guess I could use my I2p mail so that option still stands.] So, I post this for anons eyes. SVG available.
12 replies omitted.
P99547 sage link reply
P99517
>t. Talks about wasting ones time: P99522

proceeds to waste ones time making a faggy background for slackware that uses apline linux logo
P99797 link reply
P99547
It's not Alpine. We already established that.
https://duckduckgo.com/?t=ffab&q=alpine+linux+logo&iax=images&ia=images

You just have poor taste in graphic arts. We can work on that. Here's one for people afraid of heights. I finally figured out the shape from Solaris CDE (and probably NsCDE). It's just a union of 3 hexagons, repeated, with some flipped and snapped together.

There's actually an error in the last image with the upper most square on the left (since fixed).

P100300 7z archive link reply
Rather than repost fixes, I'll just update the archive at this link:
gopher://iktj6kmb3cdtnddzff52femg2tji2eqx65onwozeo7j62stfxzfq.b32.i2p/1/downloads/slacklogos.7z

Date Time Attr Size Compressed Name
------------------- ----- ------------ ------------ ------------------------
2024-06-24 20:58:55 ....A 182876 3378154 slackware-mountainous-logo.png
2024-06-24 20:58:59 ....A 32289 slackware-mountainous-logo.svg
2024-07-05 13:14:25 ....A 1294656 slackware-mt-wallpaper-1920x1080.png
2024-07-05 13:14:27 ....A 54297 slackware-mt-wallpaper-1920x1080.svg
2024-07-08 12:07:19 ....A 1890199 slackware-paver-1920x1080.png
2024-07-08 12:07:22 ....A 245925 slackware-paver-1920x1080.svg
2024-06-24 11:09:35 ....A 99839 47966 slackware-mountainous.sixel
------------------- ----- ------------ ------------ ------------------------
2024-07-08 12:07:22 3800081 3426120 7 files

For the gopherly-challenged: [spoiler:curl -O -v -x 127.0.0.1:4444 gopher://iktj6kmb3cdtnddzff52femg2tji2eqx65onwozeo7j62stfxzfq.b32.i2p/1/downloads/slacklogos.7z]
P100839 sage link reply
P100300
>gopher
P108743 Updates link reply
Replaced the blocky text backing. I wasn't sure what to do with it but I like this one better.

Gopher archive updated.

Thread 99209 in /tech/

P99209 NPU (Neural Processing Unit) chips link reply
[bold: IT'S OVER!]
11 replies omitted.
P104931 link reply
simp-vm*
P105000 link reply
+upvote
P105002 link reply
About 2 more years.

P105033 link reply
P104930
Turning off the GPU acceleration does not make the GPU unavailable for other processes to use...it just means that your desktop environment will prefer loading stuff onto the *****U instead (and this is not a global setting, so some programs still might be using GPU acceleration). If you try running some hard computations on the GPU, it will still work.

tl;dr GPU acceleration is a per-program setting. Even if you made it a global setting, the GPU is still available for programs that do not respect that setting.
P107684 Small_doog link reply
P105033
Doesn't Qubes and temp-vms disable GPU acceleration to reduce the attack surface?

Thread 107291 in /tech/

P107291 A bot attack on a site, service, or protocol is just a sophisticated DDOS attack to suspend functionality. link reply
The prevalence and sophistication of bot spammers will only increase, but instead of supporting measures to ban undisclosed chat bots that shut down social media sites, the big social media companies lobbied for exemptions to chat bot disclosure laws or their not being passed at all.

Why? Clearly because they were planning on using undisclosed chat bots to influence users politically and commercially themselves as an underhanded societal manipulation tactic.

You won't be able to run a social media site as chat bot spammers become more sophisticated, even with a centralized database of people's driver's license because AI will find out how to trick the site and it's impossible for a large social media site to verify everyone's identity in person or by mail.

The push for internet ID was basically just further sabotage pushed by the C*****'s foreign agents and their proxies because it makes mass surveillance, censorship, and weaponization of the internet easier for them, which is the same reason there were NGOs pushing for putting everyone's personal data online in blockchain form for China to siphon up while keeping their own citizens' data behind a firewall and locked down against mass foreign surveillance.

The internet ID scheme was never going to work for dealing with bots, nor was that the motive behind it.

The solution is to

1. Legally ban undisclose chat bots and allow sites to stipulate that they cannot be used.
2. Disconnect the global internet so that anyone accessing the site is within the country's legal jurisdiction to prosecute for running a chat bot farm. This could be done in a few different ways to either completely disconnect the global internet or to change protocols in a way that prevents someone from outside the country from accessing domestic sites via inherent technicalities.

The value of global reach is less than the value of not being under enemy surveillance. When you are exposed to enemy surveillance, you lose, because you can no longer organize against them. China has protected their population from foreign surveillance, while the USA has exposed their population to foreign surveillance under the misguided assessment that global reach was more valuable than being able to organize in your own country. But if you can't organize, you lose, you just *****ing lose.
P107293 If you're surveilled, you can't organize to oppose anyone watching you, you lose. link reply
Imagine if you put all the CIA's location data, communications, identities, online.

They wouldn't be able to organize at all because any adversary would be able to identify which people were working against them and just assasinate them, or use their spies in the organization to fire them.

But here's the thing, they are already significantly exposed to adversarial surveillance, which is why they are struggling to do anything against any group that is surveilling them. And they're surveilled by the same mechanisms that everyone else is being surveilled, mass private user data exporting and globally accessible communications services.

The CIA is not going to be able to meaningfully organize against China until they learn to keep China in the dark, and it's the same thing for our entire political, decision making, system.

Right now the C***** can read what people are writing, they can hack into everyone's computers, they can find out where you are, and they can literally send an assassin on a plane from China and face absolutely no obstacles in reaching their target unless they're living in a bunker or something.

So all these "open society" people sold the country to China, and the CIA and FBI just nodded their heads and watched it happen instead of covertly assassinating them for being a clear foreign agent advancing a foreign espionage mission under the guise of really ridiculous lies like exporting everyone's sensitive and weaponizable data for "marketing".
P107299 link reply
google-gulag-logo.png
Destroy Google, and Big Tech. Return the 'net to the hackers. Make computing hard again.

-don't use their services
-block them, both in and out
-disconnect from their services
-don't buy hardware associated with them
-never use social media
-set up your own parallel networks
-organize with your peers
-break web addiction
-stop using 'apps'
P107303 link reply
P107301
I did but now I can't find the book mark and good luck finding that thread.
P107307 link reply
P107304
Which one is the question.

Thread 105118 in /tech/

P105118 Exploiting Leakage in Password Managers via Injection Attacks link reply
passmanager fags are dead.


https://arxiv.org/abs/2408.07054
17 replies omitted.
P107017 link reply
the real boomer insult is
let me guess, you write down all your passwords in passwords.txt on a server with open telnet
P107039 link reply
P106461
Pass is already half broken. It leaks all of its metadata automatically for convenience's sake.

P106996
Helps to have a working memory (in your head) and other factors such as biometrics, hardware security keys, and key files on top of having a password. Having a KDF that isn't a museum piece helps too.
You can also put your bootloader/EFI and your LUKS header (or whatever disk encryption header it is) on a USB drive to make the drive itself look like a bunch of random data with no OS.
P107048 link reply
P105118
tl;dr
P107070 link reply
>biometrics
shut the ***** up cock guzzling faggot macfag consumer dipshit
>Having a KDF that isn't a museum piece helps too.
you could literally not be more pic related. as long as the password is long enough then its good enough. it was possible 20 years ago to choose one that is still not crackable today, no there is no such thing as """upgrading""" in crypto you *****ing typical cracker (as in wh*te, not some other meaning), all your comms that were captured wont be """upgraded""", they will be cracked because you fagged out and chose something not strong enough yet """upgradable""". you *****ing wh*teoid pussy faggots cant do anything in tech other than """upgrade""" things, all your programming methodology is upgrading the linter. *****ing clowns
P107071 link reply
sorry meant to post pic related

Thread 107010 in /tech/

P107010 Theorists theorise link reply
from the perspective of E.T.s being like them.

The modern countries have a continously growing requirement for energy, so theorists theorize that more technologically advanced species have a near infinite energy requirement and then look around the universe for the biggest concentrations of potential energy. Then they draw *****ish diagrams of suns and black holes being used as batteries, because it seems like the only natural solution for E.T.s, which the theorists assume are like themselves.

This reminds me of the people that say the pyramids of Giza are power plants, because of course they would be to a Western person whose watching gas prices and doesn't really understand how electricity works.

Like, you're going to realize how stupid this speculation was if and when you figure out how to do nuclear chemistry competently.

I guess it's not really unreasonable to speculate along those lines when you see an activity that seems like it requires a massive physics power source to do. I still think it's funny though, that it wasn't even considered that E.T. technology could just be way more efficient and their energy requirements aren't that high.
P107011 link reply
And there could be nuclear batteries and the material formed for them could be made in something like a miniature black hole.

But the way you'd make a "miniature black hole" and it's actual traits would probably cause you to come up with a different name for it because it's so unlike a black hole.

Like, maybe you'd just call it a fusion reactor?
P107012 link reply
Both black holes and suns do fusion.

So why call it a miniature black hole and not a miniature sun?

why call it either when it's clearly not either?

The assumption that you can just draw the energy speculated is contained in matter per Einstein by compressing matter to the point that only certain forms of radiation and particles escape, which you could use for energy needs, assumes that there are only three spatial dimensions and particles can't just pop out another dimensional axis when they gain a certain amount of potential energy. If you recognize the polar emissions of a black hole are because they're a gigantic spinning mass, then you wouldn't expect to find meaningful polar emissions from a miniature black hole.
P107013 link reply
black holes are a retard theory, they dont exist.
you cant go itno the sun anyway,you have to erect an alien versiom of solar panels, probably some kind of alien heat exchanger. because outside of the earths magnetic shield, the radiation is much higher than on earth. maybe even the earths spin is powered by the suns radiation, like solar sails in space are used to drive spaceships, because the radiation is very high, its like free energy in space, just we dont get it because the earth atmosphere absorbs most of it. the whole expansion of the universe is driven by the stars radiation, they are pushing each other apart like a solar sail.

Thread 106959 in /tech/

P106959 if you want it link reply
here it is come and get it
P106961 @13thravenpurple94 link reply
what use does bsd have other then on a server or router?

You really think BSD desktop is usable?

Thread 106790 in /tech/

P106790 Digital file piracy analyzed link reply

1. The word "stealing" has shifted to mean something else. Previously for something to be stealing, you had to have deprived someone of something tangible that belonged to them (according to the government).

So digital file privacy never was stealing under the historical definition or historical moral codes, but some other activity called "copying" or "piracy". Copyright infringement is not stealing.

That doesn't mean it can't still be some kind of crime in a legal code, but it's not theft or stealing and to use that word to describe that activity is a redefining, a shifting, a degeneration, of the English language. I can steal your doormat, I can't steal your style by copying you, because you weren't deprived of anything tangible. You still have your style and prior to the invention of copyright law that wasn't recognized as a crime or even a moral fault.

2. Countries made laws to create an artificial way for inventors and media producers (books and song writers) to incentivize the activity by allowing them to capture the value of it through temporary exclusive rights to production called "copyrights", which they enforced using law enforcement. But we don't need to incentivize everything. Is there really even merit in incentivizing media? Are movies a national priority? Are video games a national priority? Do we need to incentivize the production of entertainment as a civilization?

3. With the invention of various electronics and electronic media, it became possible to easily copy many forms of media and computer programs, which broke the business model many companies had been using.

Now, in the present day, many companies with an outdated business model are
relying on increasing law enforcement activity to capture value instead of adjusting their business model. I'm not sure how much it costs tax payers, but it's probably a lot. Meaning at least to a degree the Western governments are now subsidizing outdated business models to make them work.

4. As a civilization, or civilizations, we need to put a price on how much we'll pay in taxes to support outdated business models that could easily change and consider just removing copyright law for media entirely and replacing it with something like a plagarism law requiring a person to cite the original artist or production group.

Does there need to be a law preventing someone from getting a tattoo of Mickey Mouse without purchasing a copyright agreement?

Does there need to be a law preventing someone from sharing music recordings online (which is basically indistinguishable from airing music on a radio station, which doesn't involve a payment to the original artists in the USA)?

https://variety.com/2023/music/opinion/radio-royalties-un-american-senators-alex-padilla-marsha-blackburn-1235650283/

Do we need a law preventing people from pirating computer programs? (especially when the free and crowdfunded ones end up being better anyway?)

Should we be putting tax dollars to work to make sure video game companies get paid?

Should be we paying tax dollars to make sure Hollywood (which is propped up by money from enemy nations and Epstein's banker buddies and still somehow doesn't manage to be profitable as far as taxes are concerned anyway) gets paid?

Like, if I made a bad business model of selling "classy dance moves", should the FBI subsidize my business model by arresting people doing the dance without paying me? Is that a reasonable use of law enforcement?

If I made the best brownies ever and granted limited copyright use of the recipe to someone, and they copied that recipe and put it online, should the FBI dedicate a portion of its budget to making sure no one uses that recipe without paying me?

5. When it comes to information, other issues come into play other than whether or not someone gets paid for it. Like, if you sneak into a factory to steal their trade secrets, that's obviously different from someone distributing media globally themselves and then saying you can't copy it because they have an outdated business model. And the way it's different is trade secrets can be nationally important.

And the copyright system for independent inventions (not tax payer funded inventions) for a limited amount of time really should stay to drive innovation, but that's not what we're talking about with online piracy, we're talking about *****ing cartoons and recordings of people tapping drums and wailing.

6. If you're a media creator, how can you still make money doing that?

By focusing on business strategies that allow you to capture value and recognizing the limited marketability of your chosen profession. Like, I'm excellent at farting the alphabet, but it's not marketable and there's no way to prevent someone else from farting the alphabet, especially if I publish instructions globally online. Just because you want to fart the alphabet as a profession and people enjoy it doesn't mean it's a viable business model.

Concerts, CDs and mp3's only exist to market the concert today.
.
Ads in movies.

For video games you can monetize in game stuff or have it be an online subscription game (which most people would not go for).

Some businesses have already adapted and they're making money producing media, but some haven't and are shrieking for governments to waste their budget to make their business model viable again.

7. What would I do if I was making the laws for inside the USA?

I'd only enforce copyright claims for inventions where there's a financial gain by another party for a limited amount of time after the invention was made and probably discard all media copyright law because I don't think that's something the law enforcement budgets should be wasted on.

If you can't capture the value with your business model when no one is even making money from pirating your stuff, then that's a problem with your business model. There are tons of business ideas that don't work because the business model doesn't allow you to capture the value, that's why I can't charge everyone in the country royalties for using new slang I made up, even if everyone starts using it.

Maybe there's some other complication with that, maybe that's not exactly the right approach. I haven't actually thought about this that long and something else might occur to me later as to why that wouldn't work.

8. You'd have to fine everyone in the country. Unironically, I don't think there's anyone in the USA over the age of 18 and under the age of 70 that hasn't pirated something. And the problem is just that SOME companies haven't adapted their business model to changing technology and prefer to lobby politicians to waste tax money to make their outdated business model work.

I'm honestly surprised newspaper companies didn't try to sue public libraries for distributing digital files of historical news papers to make their business model work again, because the USA is so legally corrupted. It would have been a perfect scheme for the USA. First the newspapers lobby for more money for public libraries, then sue them, then your newspaper gets unlimited tax money embezzled, oooh I mean "subsidized", from the USA's tax payers; the people working in the FBI would never even notice it was embezzlement scheme because in addition to hunting people down for pirating cartoons they're busy chasing down E.T.s, which I'm not.

The new slang word I made up is "copyrightosite", and it describes outdated business models that place unreasonable burden on law enforcement to make a profit without benefiting the nation in any way. If you write it or say it, the FBI's going to spend a part of their law enforcement budget to get your copyright infringing ass to pay me because I just documented my invention of it and now hold a legal copyright to it for the next so many years.

If you want to purchase a limited use allowance to use the term "copyrightosite", just tell me and I'll post a BTC address.
P106791 link reply
>My country spends their law enforcement budget arresting people for sharing recordings of TV sitcoms.

What?

>Yes, they say the TV sitcom industry is nationally important and law enforcement should be deployed at tax payer expense so they can make
money and more TV sitcoms can be made.

Are you serious?

>Yes. My neighbor resisted arrest and got shot to death for copying an episode of "F.R.I.E.N.D.S.".

That just doesn't seem like something a government should be concerned about.

>"F.R.I.E.N.D.S." is the worst TV show I have ever seen. I would have shot him too.
P106798 link reply
The condensed read:

Digital piracy isn't stealing, because no one's deprived of anything.

You don't have to grant copyrights to everything in a legal system. Copyright law has a tax cost to enforce and it only makes sense to give legal copyright protections to some things, like materially useful inventions.

I don't think cartoons should be given legal copyright protection, nor entertainment media in general. I don't see it as nationally important and wasting state resources on it seems like corruption to me. I don't remember ever voting on the law that says the FBI should kick down someone's door for watching a bootleg copy of a TV show, or voting for a candidate that ran with that as a campaign promise.

I don't think the public would have supported granting copyright protections to entertainment media today.


P106809 link reply
pol schizo sus ; didnt sacrifice my time to read
any kind of damages (theft, trespassing, contract violation) for a corporate faggot (who is usually wh*te) is just anything he doesnt like
they literally never lose anything for these things they sue over its always just some burger eating double chinned rogaine boomer type faggot scum of the earth who is mad because he got "disrespected". CEOs are the *****s of the business realm
P106822 link reply
On God NGL low key mid I just installed The Witcher 3 I got from a torrent on God we bussin' i'mma low key get some pussy in this game. Piracy? WTF is that LOL.

Thread 106431 in /tech/

P106431 link reply
checking what orbs are up to
6 replies omitted.
P106652 link reply
P106658 link reply
P106506

>how do you think he knows you have a neckbeard


reflections (i drew all the curtains so there's none left on black background, there's still some left)
P106743 link reply
its wonderful
P106819 link reply
you see, i have got so many packed orbs. one has more orbs than the others. Hopefully they grow.
x