Thread 99231 in /tech/

P99231 Working Tor2web proxies? link reply
pablo.gonzales.2007.png
Anyone know any other Tor2web proxies?
I'm in a fascist country and need help connecting and viewing.

None of these work :(
https://gist.github.com/adulau/5caf188bb1f63263bf7ac00c4a19f710
9 replies omitted.
P103686 link reply
P103310

shut up faggot
P104474 vandalism link reply
P99231
what deems a fascist country?
Australia?
Syria?
Denmark?

P100884
yes they do
P104544 link reply
you can literally use tor with pretty much any program or any browser, just run a tor daemon and use 127.0.0.1:9050 as SOCKS5 proxy
in web browsers you can do that in the settings, but make sure to enable DNS proxying as well.
for anything else, either use torsocks or proxychains-ng.
also kindly shove your proprietary lion shill chromosomium garbage into where the sun doesn't shine.
P104562 link reply
iceweasel.png
still the best browser
P104586 link reply
P104562
shut up rodent

Thread 98912 in /tech/

P98912 which cock in the box (VPS) for 4chin and other use link reply
Which VPS
1) can be obtained anonymously - paid with Bitcoin or alike, on Tor, no email or privacy-friendly email such as cock.li email
and ideally also
2) are NOT banned on the hacker board 4chan (the IP of the server, if you post from that server)
3) are generally not banned in places like other social

Does the server provider you know match (1), does it also match (2) and (3)? Does it allow Tor *without* JS or is JS needed?

Btw how to easily use it as exit point for browser on my desktop? Some VPN (which/how/howto?), some ssh tunnels (probably not), something else?

Thanks

P98916 link reply
You need residential proxies not a VPS.
P98920 link reply
P98916
>You need residential proxies not a VPS.
How one would get these? With privacy.
You find some dudes and pay them to run proxy out / vpn out? how?
P99016 link reply
P98912
>are NOT banned on the hacker board 4chan
Anything with a cloud IP address will be auto-banned just like Tor exits (the meaning behind P98916).

>how to easily use it as exit point for browser on my desktop?
Run firefox through proxychains. That will let you create a tunnel that goes You -> Tor -> Another Proxy
Keep in mind this only works with socks and http[bold:s] proxies. A regular http proxy will silently fail. So if you find a proxy list but none of them seem to be working with proxychains that could be the reason.

P98920
>You find some dudes and pay them to run proxy out / vpn out? how?
That's the neat part you don't tell them they are proxying your edgy 4chon shitposts. It's grandma's laptop which is infected with malware and the guy who controls the malware is renting access to you.
P99030 There's no hax0rs on 4bans link reply
>be OP
>pay 0.1 BTC for double elite proxy
>get config details to newly set up cock.li @email
>realized still blocked in first 5 seconds

-10 with this faction for even mentioning that place
P104485 bump link reply
+1

Thread 100182 in /tech/

P100182 Looking for a good older digital camera? link reply
What are some good older cameras that meets the needs of a privacy and security individual?
Trying to find a camera that take decent quality pics but has no onboard storage.

Not quite sure about the camera game but my understanding is that many have embeded operating systems for the camera setting and only store photos on MicroSD Card. Although I had an older one that did have onboard storage in addition to external storage on a MicroSD Card.

Heres a summary of what I'm looking for:

- No onboard built in storage

- Storage only on MicroSD Card or SD Card (No Outdated xD-Picture Card™)

- No built in WiFi or bluetooth preferably, cuz why not airgap?

- Decent picture quality (like better then flip phones but not iPhone 15 mpegs)

- Reasonable price cuz like times are hard you know man.

Thanks.
8 replies omitted.
P100573 link reply
P100254
Wow based but you would need an embed os or read only system seperate to the storage of phots on sd card
P100575 link reply
Nikon_Coolpix_S51c.jpeg
ifixit.jpeg
This thread inspired me.
Just airgapped my Nikon Coolpix S51c

Many older cameras that have built in wifi might either be a LAN ribbon cable ^, a chip soldered on to mother board, or a removable wifi card.
P100588 link reply
P100575
I'm board of you mother she dont give good top tbh gl
P104476 link reply
P100182
Just get an old android phone and use sd cards
P104479 vandalism link reply
P100588
your little sister does tho

Thread 102597 in /tech/

P102597 12of7 link reply
much of europe around russia to austria (so romania included) uses appliances from (((indesit))). this company is owned by turks. never buy from them, they have a big islamic component and may add backdoors into your fridge that add poison into your food items. they will make your organs invert inside out you're skin will be inside your intenstines and intestines will cover your entire outside MARK MY WORDS
P102602 link reply
P102597

>this company is owned by turks. never buy from them,


i dont really care. if i have to use hardware from kikes. As long as I have netbsd installed, i'm saved
P102616 link reply
P102597
nvr heard of it cuz im a burger i only buy LG fidges and burner phones fr

hands on my scrotal
yeah i got T-Mobile
P104478 Vandalism link reply
>they have a big islamic component and may add backdoors into your fridge that add poison into your food items.
>this company is owned by turks.


how is that (((jewish))) tho?

if anything its anhtrax pilt and based ngl

Thread 104280 in /tech/

P104280 0.0.0.0 Day Exploit link reply
I saw this earlier today, and basically you'd expect 0.0.0.0 to point to "anything" or "you". So, if you browse https://0.0.0.0/ you'll hit your local webserver (if you are running one). Remember this, back to it later.

Here's the background:

https://www.oligo.security/blog/0-0-0-0-day-exploiting-localhost-apis-from-the-browser

The part that made me take notice is this:

>Digitally “fingerprinting” the users of a website is a known technique that has many purposes. The most common legitimate use is to identify returning users, but the technique can also be used by threat actors to gather intelligence for phishing campaigns. When cross-validated with additional data about the user, websites can tell a lot about who is currently visiting—even if you’ve never logged in.

Following, quote: [bold:In this case, Ebay apparently tried to port scan the visitor as soon as the website loaded. Using this technique, the website used Javascript to scan the ports on localhost (127.0.0.1), resulting in an interesting, unique fingerprint.]

Remember the point above about localhost webservers. Many will have personal info on them. Even if not, they are usually identifiable as per you and your host. What if...a darknet site hosted a page with Javascript to scan you when you connect? Now that site has a list of your services, which might be unique like Ebay did, and, possibly, your webserver's home page.

There is a uBlock.origin to block this, but it is not on by default.

Am I wrong in my assumptions about a darknet scanner or could someone see your webserver if it is listening?
16 replies omitted.
P104427 link reply
freak-swiss-cheese.png
P104346
It's not in normal browsers + UBO, by default. You have to set it.

P104422
Correct.

Javascript was a mistake. Now basically everyone's browser is a programming language interpreter, running code from strangers.

P104432 link reply
P104393
No system is perfectly secure. Security exists on a scale. Disabling JavaScript is still an improvement even if the functionality for executing JS scripts is still present in the browser program itself, and re-enabling JS would probably require a RCE vuln in most cases which could be used for arbitrary code execution without JavaScript anyway.

If there are vulnerabilities in the Tor Browser which enable exploits to reenable JavaScript on any current release then those should be reported and fixed. That is a serious security issue. Can you please link me to any reference demonstrating such an exploit on a current version of the Tor Browser, or are none of these vulnerabilities current?
P104471 link reply
P104422
>(If the local schizo is right about the NSA packets & IME

How are is this even real?
Any device (not a router) you put inbetween a IME enabled computer would be able to see the packets
Pretty sure if your device is managed by company (you got one that the company forgot to turn off admin lock) you would see connections trying to be made to a corporate network via PXE network booting. This shit is the dumbest I have heard (not saying IME is not real threat like other faggots here). Look up "Bad BIOS" that shit you can't even see (not quite sure how the researcher the discovered it was able to see the packets being sent Maybe a SDR).

>What your missing is the firewall. The firewall on the computer should already be blocking access to most of these services to every device but localhost.

You mean block incoming and ping?

P104432
If you are serious when using Tor Browser use it some way that boots from RAM and enable highest level and go to about:config and set

javascript.enabled = false
webgl.disabled = true (this can be used to fingerprint your *****U)

P104475 link reply
P104471
Messing with internal configuration options to disable JavaScript when the highest security mode does this already is unnecessary. WebGL cannot be accessed without JavaScript to my knowledge.

In fact, messing with internal configuration options that most people never touch could actually introduce a small risk that your browser might have a fingerprinting vector that makes you identifiable as compared to the people who just turned on the highest security mode. It is best not to do that.
P104477 vandalism link reply
P104475
>Messing with internal configuration options to disable JavaScript when the highest security mode does this already is unnecessary.
Bruh in the past they suggested setting javascript.enabled = false cause there was a bug that it (NoScript) didn't do anything
Javascript is being disabled by Noscript which is an extension so your relying on that.

>WebGL cannot be accessed without JavaScript to my knowledge.
Yeah its just a nice touch if (YOU) need to turn it off to look at jewish trannies *****ing ***** on xhamster

>introduce a small risk that your browser might have a fingerprinting vector that makes you identifiable as compared to the people who just turned on the highest security mode. It is best not to do that.

***** off kike fingerprinting is a meme and buzzword

Thread 37224 in /tech/

P37224 Does anyone here use Lokinet? link reply
[bold: Thinking about trying it again but this time in VM or making a template.]

Don't really care what fags say about it. It still a work in progress. Why not test it and give feedback eh? Tired of hearing buttfags dissing it. I2P is under attack and idk what to think about the dev team drama or the fact that lawmakers hate Russians.
21 replies omitted.
P65699 link reply
P37224
i use it a bit
bought microsoft ONS
P104217 🏳️‍🌈 🏳️‍⚧️ link reply
Whats the update on lokinet and is it even lowkey worth using in $CURRENT_YEAR ?
P104408 link reply
>>P64183

>If you invest now you could make 25x when it returns.

The meaning of "invest" really has changed in the past century.

Like, it used to mean funding a business venture that produced value in some way and investors would want to see what exactly the business was doing that produced value since their returns were based on whether or not people would pay for it because it was valuable, knowing the government would arrest the business owners and involved investors and they'd get no return if it was a fake business that produced no value.

Now "investment" has shifted as a term to include things like obviously criminal fake businesses scamming people to buying and reselling beanie babies.

Like, the language of economics itself has been corrupted and people have lost their minds and now can't differentiate between actual investment in a real business and the enormous number of fake business scams.

Maybe I should "invest" in buying up all the toilet paper and then reselling it for $20 a roll? Would you consider that an "investment" too? Does the FBI agree that's an "investment"? What's the average IQ of an FBI agent now? 35? Can they even read what I'm writing?
P104413 cringe + sage link reply
P104408


>Now "investment" has shifted as a term to include things like obviously criminal fake businesses scamming people to buying and reselling beanie babies.


yeaj, thats like claiming that Brenda is a\ Durex
P104415 forgot footnote link reply
>Brenda

[1] Brenda the Rubber

Thread 104113 in /tech/

P104113 Is send-later email safe for nanonymity link reply
My fellow nanons I need to know is this add-on for thunderbird safe?
Does it conflit with having thunderbird set to only send over Tor?

[bold: - Send-Later]

https://addons.thunderbird.net/en-US/thunderbird/addon/send-later-3/
1 reply omitted.
P104119 link reply
use MUTT, silly orb.
P104129 link reply
P104119
What is MUTT?
sounds like something amerimutt would say ngl tbh
P104139 link reply
Looks like all it does is make your email leave later. It does nothing for being anonymous. If you're already anonymous (watch mail headers as well) then this shouldn't change it.

Consider:
-I've not tried it myself
-email is hard to keep anonymous without an application dedicated to that purpose
-you'd have to audit the code yourself (or have a trusted party do it for you) to be sure
P104186 🏳️‍🌈 🏳️‍⚧️ link reply
P104139
What OP is legit lowkey prob most likely trying to do is set mail to send (death threats) when they are away so they have an alibi that they were at work or something when they were sent
P104366 link reply
P104129
https://www.mutt.org/
P104186
So basically a dead man's switch?

Thread 104172 in /tech/

P104172 cirrus cl-gd5446 + pentium P5 + NetBSD 10 = won! link reply
it has framebuffer support
8 replies omitted.
P104241 link reply
its called benchmark, i forgot
P104257 link reply
well takes 20 minutes to connect to tor
P104269 link reply
useradd -m user

1.30 minutes
P104351 link reply
P104172
10/10 impersonation of some un*x loser mumbling his geek words that don't actually mean anything
P104361 link reply
P104351

It's orbology, dumbo...

Thread 103638 in /tech/

P103638 the best os link reply
is qubes the goat?
name a better os
57 replies omitted.
P104301 link reply
P104300

>I used coloured orbs on a tube to help me visualise the system, didn't like command lines back then.

coloured orbs like xserver / xwayland use framebuffer which makes you more vulnerable to orb sniffers.
P104310 link reply
>Digdeeper's slackware
with packages that aren't even maintained with vulns out the wa*****o
P104316 link reply
P104310

yeah rubbish, unless you can live with elinks, ed and n/t/groff, ps2pdf
P104320 link reply
P104316
ngl u should rope tbh
P104332 link reply
>>P104274
>GPU acceleration is being worked on so ill check again in a few years.



can u enable the gpu?

Thread 22358 in /tech/

P22358 Technology appreciation thread link reply
Which piece of everyday technology are you particularly fond of?

For me, it's stainless steel. Thanks Berthier for allowing me to let my kitchenware to rot in the sink.
40 replies omitted.
P104191 🏳️‍🌈 🏳️‍⚧️ link reply
i appreciate dildos cuz they legit are nice to stick up my ass when im trying to lowkey have my oooo face
P104195 link reply
P104191


but I appreciate Guppy's size
P104198 🏳️‍🌈 🏳️‍⚧️ link reply
P104195
seems nice but netbsd is cringe ngl openbsd is way better and lowkey not even mid like netbsd tbh
P104201 link reply
P104198

but netbsd never have trouble booting up on my pentium ngl unlike the other BSDs...
P104204 🏳️‍🌈 🏳️‍⚧️ link reply
>>P104201

seems like skill issue tbh
i would suggest shoving a clean dildo up your ass and lowkey checking your BIOS version ngl

Thread 59647 in /tech/

P59647 qbittorrent 4.6.0-1 I2P Torrenting link reply
Now that the next major version of qbittorrent is in repo, how have you been finding it over the past couple of days? My setup below involves the following:
In /var/lib/i2pd/i2pd.conf:
-I have enabled ipv6

## Enable communication through ipv4 (default: true)
ipv4 = true
## Enable communication through ipv6 (default: false)
ipv6 = true

-I have maxxed out bandwidth

## Bandwidth configuration
## L limit bandwidth to 32 KB/sec, O - to 256 KB/sec, P - to 2048 KB/sec,
## X - unlimited
## Default is L (regular node) and X if floodfill mode enabled.
## If you want to share more bandwidth without floodfill mode, uncomment
## that line and adjust value to your possibilities. Value can be set to
## integer in kilobytes, it will apply that limit and flag will be used
## from next upper limit (example: if you set 4096 flag will be X, but real
## limit will be 4096 KB/s). Same can be done when floodfill mode is used,
## but keep in mind that low values may be negatively evaluated by Java
## router algorithms.
bandwidth = X
## Max % of bandwidth limit for transit. 0-100 (default: 100)
share = 100

-I have increased exploratory tunnel length to 3

[exploratory]
## Exploratory tunnels settings with default values
inbound.length = 3
# inbound.quantity = 3
outbound.length = 3
# outbound.quantity = 3

-Everything else left as default
On qbittorrrent side:
Tools -> Preferences -> Connection -> ✓ I2P (experimental)
-No values altered in this section.
Tools -> Preferences -> BitTorrent -> ✓ Automatically add these trackers to new downloads:
https://opentracker.dg2.i2p/a
https://w7tpbzncbcocrqtwwm3nezhnnsw4ozadvi2hmvzdhrqzfxfum7wa.b32.i2p/a
-NOTE: The above trackers are the same, one is regular domain and the other is base32.
-NOTE: Tracker https://tracker2.postman.i2p/announce.php and it's corresponding base32 address, https://6a4kxkg5wp33p25qqhgwl6sj4yh4xuf5b3p3qldwgclebchm3eea.b32.i2p/announce.php, seem to time out for me. If used when a new torrent is added, right-click on torrent -> Edit trackers... and then remove unwanted trackers.
Tools -> Preferences -> Advanced:
I2P inbound quantity = 3
I2P outbound quantity = 3
I2P inbound length = 3
I2P outbound length = 3
-NOTE: Allegedly The above inbound and outbound lengths can be set to 1 or 0 when torrenting, as some claim the benefit of added security isn't needed, however I choose to stay with the default values for good measure.
-Everything else in Preferences left as default
16 replies omitted.
P104070 link reply
P103201
>qbit has never worked for me when it comes to i2p torrenting.
Works on my machine & skill-issue.
P104088 https://www.askjeeves.net/ link reply
>torrenting

do wh*tes really even?
P104090 link reply
P104070
i am a tech illiterate, so what ?
at the end of the day, i use what works best for me
P104110 link reply
P104099
flat files are better then non-relational databases tbh
P104188 🏳️‍🌈 🏳️‍⚧️ link reply
>>P104110

nah nah semi-structured databases are nocap straight up bussin

Thread 103973 in /tech/

P103973 MMX Technology link reply
Are they faster than the original Pentium P5? I'm eager to upgrade mine.
P104049 bump link reply
P103973
i prefer MX Linux ngl
only non soystemd system worth using outside a network closet
P104177 link reply
MX Linux is nice, but it doesn't run on my MMIX

Thread 7244 in /tech/

P7244 QTDDTOT link reply
Thread dedicated to Questions That Don't Deserve Their Own Thread
[spoiler: (but are worth asking)]
Lambda edition
595 replies omitted.
P103952 link reply
P103907
Uh, yes? It sounds like you haven't even looked into hosting anything ever at all.
Text is stored in the database, point your data/media directory at some remote storage.
P103997 link reply
P103947
>dh*****cd

me don't have such a ting
me only have internal and me disp-vm
P104053 ? link reply
is it dangerous to cat a drive and pipe it to hexdump?
P104054 link reply
i did it and i was fine btw tbh
P104055 link reply
P103952
>t. It sounds like you haven't even looked into hosting anything ever at all.
Yes, but do to the nature of mossad agents and paedos and knowing how this are n shiet.
I'm not looking to have ***** on drive or touch my drive
not cause im a ***** but cause i dont want to see that shit deal with that shit ngl

Thread 103971 in /tech/

P103971 link reply
P104035 Jamie K. Muller link reply
P103971
full of vulns me backdoored network adapters made by w*ggers
P104050 link reply
P103971
Good goy inside.
P104051 TIL link reply
P103971
today i learned that celeron was also in mobile devices

https://en.wikipedia.org/wiki/Celeron#Mobile_Celerons

tbh this was pretty cool info to learn

maybe im up there with phone posters now not mid posters like histy

Thread 103969 in /tech/

P103969 i love it link reply
The computer's inside
P103970 officially dead this one link reply
P103987 link reply
I've moved on to mainframes. Or at least minicomputers. Bigger things for me. If you want to bring down Google, you need powerful systems.


DATE AND TIME IS: WEDNESDAY, 7-AUGUST-2024 7:09PM

RUNNING DDMP


[LOADING INTERNET HOST NAMES] [OK]

********************
*BUGINF "IPHTNI" AT 7-AUG-2024 19:09:38
*ERROR WHILE READING GHT
[KNILDR: LOADING MICROCODE VERSION *JOB: 0, USER: OPERATOR
*ADDITIONAL DATA: 600104
********************
1(
SYSJOB 7(78) STARTED AT 7-AUG-2024 1909
172) INTO ETHERNET CHANNEL 0]

RUN
[INTERNET NETWORK SYS:INFO
RUN SYS:MAPPER
JOB 0 /LOG OPERATOR XX OPERATOR
ENA
^ESET LOGIN PSEUDO
^ESET LOGIN CONSOLE
^ESET OPERATOR
^ESET LOGIN REMOTE
^ESET LOGIN ARPA
PTYCON
GET SYSTEM:7-PTYCON.ATO
/
SJ 0: @LOG OPERATOR OPERATOR
SJ 0: JOB 1 ON TTY232 7-AUG-2024 19:09:39, LAST LOGIN 6-AUG-2024 16:4

Thread 103848 in /tech/

P103848 Distributed servers and other methods for more secure onion hosting link reply
I have some ideas for hardening onion servers against typical attacks, but I need your help to get it to a working implementation. From what I know, the possible attacks for deanonymizing an onion server as a state actor, assuming the tor protocol is not flawed, are mostly related to timing traffic.
1. The first one I want to discuss is shutting down the internet or power for a short time in various districts of a city successively and seeing when the onion site goes down. They can go to more and more fine grained shutdowns to eventually localize your exact cable connection. If you think you are not such a high profile target that they would use this, you should still consider that random blackouts can also be used for this, if your service is running for a long enough time it will be possible to track you from this server outage.
To solve this, multiple servers with the same key could potentially be used. I first looked at a load balancing tool for onion services (https://onionbalance.readthedocs.io) but from what I've seen it doesn't address the security issues because the frontend is vulnerable to the described attack all the same. Just copying the keys to multiple servers could work though, I have to check yet to see if directory authorities will update quick enough during a short downtime. Has anyone tried it already?

2. Basic traffic analysis, that is, DDOSing your site with known load and asking your ISP for clients with this load at the exact time could also be used. This is more likely to be mitigated using onionbalance, you could introduce random latency between packet forwarding to the backend servers and thus avoid the timing issue. However the frontend could still be identified using this approach. Once it is compromised, LE could redirect traffic to their own backends easily.

3. If you don't host at home and your VPS provider collaborates with LE, I have no idea if there is a way to prevent them shutting down your site or compromising it. Identification of the server is trivial, they can just scan all instances for tor traffic or even look at your keys. I assume that with some basic opsec it would at least be hard to track you down just from a seized server, but everything you host will be available to them. Is there anything that can be done against this?

If you have any additional ideas for mitigation, or also other types of attacks, I would be happy to discuss in this thread.
2 replies omitted.
P103875 link reply
P103876 link reply
1. You have to be a big target for this. To defeat it, don't always be up.

2. They'd already have to have an idea of who your ISP was, so they'd most likely already be on your trail with this one.

3. Your provider will absolutely cooperate with LEO; there's not much you can do about it.

P103900 link reply
P103876

>1. You have to be a big target for this. To defeat it, don't always be up.

windows = big target
NetBSD = 0 - 1% users 'tiny' target

>2. They'd already have to have an idea of who your ISP was, so they'd most likely already be on your trail with this one.

like you are not allowed to torrent


>3. Your provider will absolutely cooperate with LEO; there's not much you can do about it.


i dont really care since mine is ELO not LEO

[bold: Everybody all around the world, gotta tell you what I just heard
There's gonna be a party all over the world

I got a message on the radio, but where it came from I don't really know
And I heard these voices calling all over the world

All over the world, everybody got the word
Everybody everywhere is gonna feel tonight

Everybody walkin' down the street, everybody movin' to the beat
They're gonna get hot down in the U.S.A.
(New York, Detroit, L.A.)

We're gonna take a trip across the sea, everybody come along with me
We're gonna hit the night down in gay Paris

All over the world
Everybody got the word
Everybody everywhere is gonna feel tonight

All over the world

London, Hamburg, Paris, Rome, Rio, Hong Kong, Tokyo
L.a., New York, Amsterdam, Monte Carlo, Shard End and

All over the world
Everybody got the word
Everybody everywhere is gonna feel tonight

Everybody all around the world,
Gotta tell you what I just heard
Everybody walkin' down the street,
I know a place where we all can meet
Everybody gonna have a good time,
Everybody will shine till the daylight

All over the world, everybody got the word
Everybody everywhere is gonna feel tonight

All over the world, everybody got the word
All over the world, everybody got the word, word, word, word, word, word, word
All over the world, everybody got the word
]
P103914 RSA SecurID link reply
P103848
If you think this is bad imagine hosting an i2p website without a reverse proxy nocap

P103860
yes but make sure your POST card says no errors first
P103920 link reply
>>P103917
i2p hosting is p legit eazy to de-anon ngl

when using hardware for hosting you should use your POST card first to diagnose any BIOS error codes before hosting tbh

Thread 103614 in /tech/

P103614 Database Engine link reply
What's the best database engine? I have fallen out of love with mongodb.
3 replies omitted.
P103625 link reply
>>P103614
Colloidal silver taking looking bro right here. Looks like he has digitally manipulated a lot of housewives to treat their hysteria. Probably doesn't even need glasses, those are *****m lens goggles so he can enjoy the close up without being creeping out the ladies and getting beat by their husbs.
P103654 link reply
P103625

sounds based ngl tbh
P103660 link reply
P103614
>What's the best database engine?

For parsing the lambda database?
I would like to know tbh ngl
P103724 link reply
The mf who invented relational databases be like "Hmm, lets look at everything which makes existing specialized data file formats efficient and throw that out the window. Then we will pressure all software developers to use this shitty data format whenever they can, even though basic serialization of data structures would be perfectly sufficient in almost all cases."
P103741 link reply
P103614
I *****ing hate the topic of database management
Its the only IT topic that gets me everytime and also who tf wants to do that for a living

Thread 93578 in /tech/

P93578 hacked VPS link reply
How to get a VPS in anonymous way, or how to get hacked PC so you can run stuff on it?
28 replies omitted.
P95715 link reply
>kyun
>requires javascript

Honeypot is so honeypot. What a shame, it's very cheap too.
P95719 https://old.reddit.com/r/SurveillanceStalking/comments/mwz7zr/how_the_federal_hsin_network_might_be_playing_a/ link reply
move thread to /sage
P95745 link reply
P95715
>>requires javascript
Is there a way to test that it doesn't do anything malicious?
P95828 link reply
P95745
>Is there a way to test that it doesn't do anything malicious?
Yes you can download the code and analyze it. But if you enable javascript in web browser on their website, one day when you will log into your account they will send you javascript 0-day.
P103581 j kj link reply
n n mn

Thread 103451 in /tech/

P103451 unix time keep lagging behind link reply
has anyone ever got this issue with netbsd running on the original Pentium?
>update time to match the the 'living' room clock
then leave the machine on for like 11 - 18 hours

check the current time again with 'date' command

the time is now 17 minutes behind (worse than my old mech. pocket watch, only 1 - 2 min behind).


This is so strange, do I need to install ntp to keep the clock synched?
6 replies omitted.
P103460 link reply
P103457

or I have tor running in background? That thing uses like 70% - 80% of orb instructor / conductor.
P103465 link reply
The virtual machines on SIMH lag. I don't know why. Qemu is OK. The host is fine, even without NTPd (which I do run anyway).

P103466 link reply
P103465

its a netbsd 10 in this case. it had never occurred to me before. I'm gonna get a pentium 4 orb box with 1.54 GB ram soon. They are dirt cheap.
P103467 link reply
4 slots (green cornflakes + dark chocolates')
512 + 512 + 256 + 256 = 1536 Morr's Bays

yeah, 1.54 Goy Bays. I am surprised me loaf can hold information this long because that was like 2 - 3 months ago. It may sold out now...
P103468 typo link reply
>Morr

I mean Moor as in Emley Moor

Thread 102813 in /tech/

P102813 Tails OS is now a tracking app. link reply
https://tails.net/news/version_6.4/index.en.html

>Random seed

>Tails now stores a random seed on the USB stick to strengthen all cryptography.

>Having a secure random number generator is critical to some of the cryptography used in Tails, for example, in the Persistent Storage, Tor, or HTTPS.

>This random seed is stored outside of the Persistent Storage so that all users can benefit from stronger cryptography.

All it takes to forensically prove that a certain TAILS USB was used for certain internet traffic is to see if the "unique seed" factors into the encryption keys. TAILS OS is now a malicious tracking application that can track users across the internet without their knowledge and link it to them as individuals.

Everything past Tails OS 6.4 is hot garbage spyware, the organization has been totally corrupted at this point and you should be warning people not to use it because it's now anti-anonymity software that tracks you across the internet.Tails OS is now a tracking app.


Tails OS is just a debian derived OS bundled as a live USB image basically. It's easily replaced as a project. But people will keep using it if you don't warn them.

They think you're stupid and that they can suppress anyone warning people about the obvious compromise of the project. They're literally saying they compromised everyone's encryption with a unique tracker and don't expect to lose more than a few users because the governments will censor everyone that alerts people online.

Tails OS is now a forensic tool that tracks all users globally and exposes them to surveillance without their knowledge by simply checking if any given traffic can be factored with your "unique seed" that persists on your hardware.

How exactly was a "unique seed" supposed to strengthen cryptography on a compromised random number generator anyway? Their argument for it is aimed at ignorance, they just wanted to put in a tracking element to link users to their internet traffic that would fool a lot of people.
24 replies omitted.
P103237 link reply
P103014
>lol the amount of unhinged schizos here
Uh, do you know where you are?
P103264 link reply
P103182
Unless you are working for a hostile foreign government, the NSA has no reason to be stealing your crypto.
P103308 link reply
>Contains binary blobs.
>Systemd slop.
>Is sponsored by the Department Of State. https://tails.net/sponsors

Yeah this thing is glowed.
P103355 12of11 link reply
tails is alright, used it for a few ops if ya'll know what i mean, but recently i do think i may have been backdoored from it. maybe they exploited a vulnerability in it. it doesn't necessarily have to mean it's backdoored. but back on topic. i remember all the powers of 2 from my long hacking experience except 2**15. 2,4,8,16,32,64,128,256,512,1024,2048,4096,8192,16384,?????,65536. this is a backdoor in my brain, 'cuz if i look at some C/C++/HolyC code that uses a short, I won't be able to interpret it correctly. i will read code with obvious off by one errors and not recognize it right away as i peruse the code, this is a major issue because the amount of code i read means i can't afford to go back and fourth. how did they do this to me?
P103430 link reply
P103355
Why are you looking at powers of 2 directly in source code? If it is a complied language it would be best practice to replace these literals that look like powers of 2 with constant bitwise shift expressions of the form (1 << n) using some integer literal n representing the power in 2^n. This would make the meaning of the expression more obvious and incur zero execution overhead in the built program or library.
x