[ / / / / / / / / / / / / / ] [ dir / animu / doomer / femdom / lovelive / mde / sw / vichan / x ]

/netplus/ - Networks and Plus

Catalog

Winner of the 77nd Attention-Hungry Games
/x/ - Paranormal Phenomena and The RCP Authority

April 2019 - 8chan Transparency Report
Name
Email
Subject *
Comment *
File
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Oekaki
Show oekaki applet
(replaces files and can be used instead)
Options
dicesidesmodifier

Allowed file types:jpg, jpeg, gif, png, webm, mp4, pdf
Max filesize is 16 MB.
Max image dimensions are 15000 x 15000.
You may upload 5 per post.


File: 1433166483300-0.png (79.25 KB, 1280x774, 640:387, tor.png)

File: 1433166483301-1.png (34.21 KB, 510x326, 255:163, htw3.png)

 No.2[Reply]

This thread is for general information on tor, what it is and how to get started with the tor browser bundle.

>how do I into tor?

You can start using tor within couple minuets if you like.

1. Download the tor browser bundle from the tor project website here https://www.torproject.org/download/download-easy.html.en

2. extract the archive

3. click the 'start-tor-browser' shortcut

4. optionally you may want to change the noscript add-on to block all scripts by default and allow them on a site to site basis when necessary

5. browse the Internet in privacy

6. see the tor LINKS thread for links to hidden service 'onion' sites that are only accessible over tor

What is tor? tor is a low latency, onion routing network intended to facilitate anonymous and censorship resistant communication with a focus on facilitating access to the 'regular' Internet in a way that shields your identity from the destination server as well as shielding your destination from your isp/someone listening on the wire. Tor also has a 'hidden service' capability that provides anonymity for both the user and the server. tor is a free software project and as such you are welcome to review, redistribute, contribute and fork the source code.

How does tor work?

For a basic overview in simple term I recommend you read the overview on the tor project website https://www.torproject.org/about/overview.html.en

what can tor do for me?

- tor can provide a level of network level anonymity when you communicate over the Internet

- if you are someone who 'has nothing to hide' but feels like hiding anyway then tor is for you. tor is one of the best things going if you want to avoid passive, buPost too long. Click here to view the full text.

14 posts and 2 image replies omitted. Click reply to view.

 No.560

>This thread is for general information on tor

>what it is

(((Tor))) is an NSA Sandbox where millenials play to enjoy the (((NSA//MOSSAD))) Niggers

Now that being said, this thread can be closed.

—————————————————————-8←————————————————————–




File: 1433166098090.jpg (56.8 KB, 600x400, 3:2, stallman-assange-snoweden.jpg)

 No.1[Reply]

Edit: Ifinity never ever is dead, what good news.

As a result I am unlocking every thread there.

Welcome to /netplus/ the board for discussing networks and networking protocols/software, including but not limited to; tor, i2p, retroshare, GNUnet, freenet, hyperboria/cjdns, syndie, meshnets and whatever else. This includes discussion, general information, information on how to get involved and link sharing. Discussion can related to the technologies themselves, how they work, what they are intended to do, what their uses and weaknesses are, the services hosted on them, communities and culture.

If you have a technology/network/community you would like to introduce to the board it would be appreciated if you write a short paragraph or two describing what it is and provide links to guide and documentation .

Please refer to the rules before posting. http://oxwugzccvk3dk6tj.onion/netplus/rules.html

Board log

http://oxwugzccvk3dk6tj.onion/log.php?board=netplus

As the original board owner hasn't logged in for about 15 weeks the board showed up as claimable.

Thanks original board owner for creating this board.

Things to do;

Remove that Brown pill crap. Done

Update the link to the rules list as it is using the older link.

Enable board log. Done

If anyone wishes to make any changes to the rules/settings, ask away.

Removed: CP spam, low tier shitpost that wasn't even board related, obvious malware and theme, which looking back was hard to read.

1 post and 1 image reply omitted. Click reply to view.
Post last edited at

 No.465

[Settings]

[Disabled]

Country flags

Disallow combining characters ("Zalgo", Vietnamese text)

Oekaki

Display SAGE! after saged posts

ROBOT9000

Allow posters to see when a thread is bumplocked

Set Max number of newlines per post to unlimited.

Threads.

Deleted

>>352

Same content as

>>351 , but this has more posts and actually discoussion.




File: 1433194972851.png (48.74 KB, 1100x324, 275:81, retrosharelogo.png)

 No.6[Reply]

Watch the getting start video for setup instructions. http://a.pomf.se/exmviw.webm

Post your certificate here and add other people's. Remember that both parties need to add each other's not just your their's.

Add you certificate to the /netplus/ chatserver here udgdahofbq52bzxk.onion it will instantly add you and give you instant access to a set of chatrooms. Remember the chatserver will not replay traffic for you so you will need to add some people to your friends list if you want to share and download files.

152 posts and 5 image replies omitted. Click reply to view.

 No.550

>>549

Not using TOR by the way (if that matters)


 No.551

Just dropping this, I'll try to add some certs from this thread while I am at it.

I am using I2P though.

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 No.554
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 No.556

adding everyone itt

here's mine(tor node):

CQEGAcGYxsBNBFsuz8EBCAC7tkRRcPuPnh/9CTCsfJ2uN7uNnS9t77KgqjkgGcpI

sEj4byhyy+VEf4zuqObZBpnaJ7+v7OC+zszNajQBMiDHhWmTuxPFetY0IB9tRw1L

2cNxuRcr4DudBNLFSnVyXMghtZoPSE1zHsX49KElEafpZOVZ/9UaYz16VZg/X/Mq

CKU6BT5aq204lvbgWMeQt/sO8qyL7Gy1lMGg2DROTWjkdQKbedffjZEi8aXGWkKz

102zxAq2gmFyYreGEzzsZT8F3r3ecDr7c8Jlqx0UfcvyCffYk2IQDQVVuBlrwqgt

tZ/lmogG1ThoEdJ6hKOYTys/pGBWONRdaYKNxEzNzDHzABEBAAHNJGNhdHdhc2gg

KEdlbmVyYXRlZCBieSBSZXRyb1NoYXJlKSA8PsLAXwQTAQIAEwUCWy7PwQkQPu48

mL2586ACGQEAAC7bCACotWXYEwrYpdhhtCeyXReOTpDKwPZX1NUO4TwFoLxs1o2q

iiYC2tYyX7nY/e5F+duD/jAgPs3CdB0AgEdFxcJtVNMVFrKI9kTNDXUb3TjKXJNP

ttgFpCWCsA8JNEvxiU47wwqO2ttAzqkuTyAoF/b+rtE8r2LFxL68MaJvpcObKU2O

S840MwvRl162h31pdBHs9jUxSUTzOp8FWaqTDsymR0PdeaR6UU3AZCaxRvI+R1dp

5EgMppN0VKQGH9PJ5Lq3vhsaGOyTULCc7f1aA0JeRFKL8FYrkCK7QMzSIzAwIp0e

4Q7RvrDU2hII46T2hbQUcqSg/BQv7SDqFf0aW3HXCBtjZGF2bmhpemFqZHd5djZz

Lm9uaW9uOjk4NzgGC015IGNvbXB1dGVyBRC2TDWP5T5WOaAc2UjKtLnvBwOB21s=


 No.572

File: a5cba8a9d48ba6b⋯.gif (753.51 KB, 500x270, 50:27, LainStare.gif)

CQEGAcGaxsBNBFzHib4BCADbqUBITx0wBhl5fF2GrRhAd/Nn0cgMnD5vRrUw00US

bcAb9QSoksM+4SrDx+znuhOynIFroNn7WnB8+yFBjR9QfkeeL/6M8plm15dWu5wJ

NbUI9jO2woSQ+HMF44dxBGn0odIVZWXMnvjTV5/RIdZ85kLaPErRgpZaStbEPXLY

br4qRDbhc+XQgA6v8tITatbGrKZ1xsh/hL/TtSAwlpi5sDBqk2mKq5PV12RI6m4y

yFdhl7unPfEj1MqXhLkuXh/zJD91wOuSqlRXGW8s9KVIqMmfZYbHNYx+RijQuyv1

1dAZ0MJn81jkqb0eIePwPyCyxAT5QP48hvENTyWjv7trABEBAAHNJlZhbmFnYW5k

ciAoR2VuZXJhdGVkIGJ5IFJldHJvU2hhcmUpIDw+wsBfBBMBAgATBQJcx4m+CRAi

fz1foAnB9gIZAQAAhvQH/01pnMN3C9GZeWQ/UK+03kSIZG2sra4f/lGcgvOVpa5/

Lnp1HviXf8ugLklsqlaC9gES6QFHxCVDT2U02b52jiSi9IBNFYz4JnF3KLlx482o

yCHRVjSV5Wd12ZyZhkvhTdtTOsbVv+HCyHwMPW22Aa/RLI/YUnW7kf6UNOYd6m9A

JFQ6k0UXcIdPsLauI9P8Cjw5q9QzjZefIT864N4SYkeImUAqECyEUlivL311EYQT

bnxkMmVsfRZO3Lo1onio3ybBRz+2Wr/W6keRJcCk4YIiP/ujCwT6qHwM5GreMulh

i1jVyQ6k2ats/MO0EX5mOY6iN5VtyA3iYgMcTR8ZVD4CBrnoFspggQMGCm+sEmCB

BAAGC015IGNvbXB1dGVyBRB470WIn1LJUcfU6Sc7OFdBBwNaUkM=




File: aa70a04d74d6ff7⋯.jpg (15.29 KB, 259x194, 259:194, download.jpg)

 No.569[Reply]

my first thread here ,my friends suggested to me this site so if its the wrong board suggest me the right one

so

running out of time

anons , i have a project for uni

i must create a website and i only have sum days left

when it comes to programming i have no problem

the problem that i dont have any ideas for the content of my website

its not a big thing

its like a website for an online library when a customer can check books , loan and order them or a website for an online school ,bank and that shiit

but the fuckers my mates took all subject and here i am with just a week left

anons any ideas or examples of content for the website ??? i really need help

any thing that comes to your mind anons

 No.571

Maybe stuff about programming or the technical aspects of website building?




 No.570[Reply]

When I was younger I was sexually assaulted by a man named Steve Donnelly who later changed his name to Jack Steven Taylor out of guilt.I have finally found him on social media, after he was hiding for years and his new business - StrattonCourt.com.au

What I am asking is how can I expose him to all his clients for the rapist that he is? If I try to make a fake account even when using a VPN and going onto his Facebook Page (Stratton Court) I get deleted straight away.

Would love to hear some suggestions!

I have made strattoncourtaustralia.wordpress.com but it hasn't been indexed on Google as of yet.



File: 1434726719330.gif (1.99 MB, 766x800, 383:400, 1433540833072.gif)

 No.97[Reply]

Hi, for someone who is a complete newbie to all of this, do you have any info graphics or simple guides on how to get started with general internet security, how to easily get proxies running, what you can/can't do on Tor (how does one for example handle downloads and torrents) ect?

Thanks in advance, and it's great this board exist!

20 posts and 9 image replies omitted. Click reply to view.

 No.524

>>455

Also need to disable webfonts (its what pwned tor users, kaspersky labs, and even cryptostorm's test network) , randomagentspoofer has this option as well as many good ones. uMatrix should be added as well


 No.525

>>470

Remember to ignore/filter all post who say something technical is bad but gives no technical explanation


 No.541

>>102

>>103

can someone duplicate this and remove the pedophilia? im already on a list for downloading Tor. I don't want to get put on another list that will get me into jail.


 No.542

>213

>fucko.png, post 810

>"Think of the children!"

I admit I laughed.


 No.568

There's an inherent problem with questions about security asking for easy-to-understand answers that let beginners quickly start using the techniques.

The first, most obvious, is that the topics are very complex, and any information that will let you start using the techniques quickly will not teach you why the recommended techniques are recommended, why they are safe, secure, etc., why they do what they are supposed to do, and sometimes they don't even what it is they are supposed to do. In order for you, or anyone, to be secure, it is not enough to do things securely, because security involves probabilities and expectation, and a system is secure when the probability of breach is low, and the 'expectation' of the danger at the possible breaches is low. specifically, you have the probability distribution, which states what the probability of each event is relative to the current conditions, and the 'expectation' is the 'value' of a certain event taking place. actually, the expectation of an event is the value of that event multiplied by the probability, and the 'total expectation' or the expectation given some condition is the sum of the expectations of each simple events / occurrences (simple events are events which are atomic). The 'danger' is essentially negative expectation. Probability never tells you what the 'absolute' probabilities are, only the conditional probabilities, that is to say, what the probability of some event is in the circumstance that some other event has a given probability. It is up each of us to know for ourselves what the base probabilities are, so that we can construct a good probabilistic understanding of the other events. What does this all mean for security? It means that when you want to secure your system, you want to lower the danger, but to do that, you have to calculate the probabilities of the 'dangerous' events and the harm of those 'dangerous events'. In order to calculate the probabilities and expectations, you have to have a good understanding of all the factors, which takes time and effort of study. The reason that you must understand everything yourself, rather than simply doing the secure methods, is because security is not about how safe you are, but about how safe you know you are. Someone reccomends a secure procedure, but if you don't understand it, how can you know it's safe? you can't. The only thing you can do then is trust their word that itPost too long. Click here to view the full text.




 No.559[Reply]

I get the interest in developing a coin for balancing a ledger but are there any tokens or coins poised to replace major internet registries like root-hints or DNS all together, Internet Authorities like ARIN and RIPE, SSL Authorities like GlobalSign and VeriSign?

We trust our ISP for L1-3, then sometimes encapsulate to get L3 from a more trusted source, but after that we're all relying on the same authorities to confirm whether or not our traffic is meddled with.

 No.561

>all together

It's *altogether*, Nigger.

You can exclude the 2 top DNS Servers owned by US MIL with bash.

>ARIN, RIPE

OpenNIC

>SSL

(((They))) did it on purpose (((to monitor you))) down to milliseconds.

Mesh Networks are the ultimate network pill.


 No.567

File: 8ae0626ea91766b⋯.jpg (75.55 KB, 1280x720, 16:9, sloth.jpg)

>>561

>You can exclude the 2 top DNS Servers owned by US MIL with bash.

I don't think you understand how dns works.

You can pick whatever dns you like but it's all recursive forwarding and the registrars are the ultimate authority that prevent you from using nxdomain to hijack zones.

>>ARIN, RIPE

>OpenNIC

Thanks for confirming you don't know anything. You're suggesting using a TLD in lieu of internet numbers. (hey guyeze lets replace L3 with L4+, duh). Yea that'll fix BGP tables.

>>SSL

>(((They))) did it on purpose (((to monitor you))) down to milliseconds.

You suggesting giving up? If we had a blockchain to store pgp keys you could essentially replace SSL with something like and evolving IPSEC and since you're not using SSL to get the chain the handshake wouldn't get captured.




 No.545[Reply]

Need to see what roommate is up to. Need suggestions to start researching tools. Your suggestions will help me learn and figure out what the fuck is this guy up to. What tools can I use? Suggestions to reading material or better yet youtube links.

Target

———

Windows 10 desktop, which does not require a username and password to login. Connected to the internet behind a NAT firewall. Machine is an older Core 2 Duo with 2GB RAM & intigrated graphics, so very slow.

Will have physical access to the machine for only one hour

Have unrestricted access to the LAN all the time

Goals

———

Access from within the LAN

- Desktop files and My Documents for primary user

- Keylogger files

- Periodic Screenshots or Remote Desktop Access - View Only

Access over the internet

- Keylogger files

 No.562

Prerequisites: Social engineering

Like, who is his fav pr0nst*r ?? Send a mail with a zip file of *alleged* img of that bitch

Disguise a rat as the zip file and you'll own that nigger's PC.


 No.566

We must talk more of this. Please email me




 No.564[Reply]

Tor looks wonderful! It hides my real IP address and identity.

 No.565

I2P and Freenet are also good.




File: 901b68248a62166⋯.png (56.89 KB, 590x408, 295:204, temp.png)

 No.540[Reply]

TL;DR - Create a p2p software that will work as a fully anonymous database (more than just key-pair) and add local web-socket/http(s) so that clear net sites (or even just static html files) could query for data(using a dedicated javascript library to make things easy).

So iv'e been reading a lot and planning to execute this idea, but before I do so I need some opinions and valuable criticism about it (mostly so I won't do it for nothing), and also if people think it's a good idea maybe create a git for it for collaborated development

The idea is simple:

1 - create a p2p network, (completely anonymous and decentralized) and allow each node to issue simple queries to create/update/delete/get data in forms of List or a single value,

2 - inside that software create a web-socket bridge (or other technology) to listen for requests made from the browser, issuing them to the network and sending the browser the response (if any)

3 - create a javascript library to ease the creation of such websites and allow easy integration everywhere, only leaving the developer to handle the

"db" requests and how it will show on the browser(as well as filtering lists if needed)

*using signatures and simple cryptography one could create&upload content, and then only he could modify it. this gives the ability to create sites which behaves in a certain way and allow a developer to update the code, as well as giving him a way to allow users(and himself) to modify their own content .

Idea demonstration:

Making a simple chan using this will be as simple as:

-list(<board>,<callback that takes it and encodes it into the page>,<number of posts>,<filters(optional)>)// this will get all the posts, individual post comments will be on a different request

-post(<board>,<data>)

-comment(<post>,<data>)

Why this is different than i2p and similars:

-The data flPost too long. Click here to view the full text.

 No.563

tl;dr for me atm but whatever you do make it hard as fuck for advertisers to get anywhere with it

they literally ruin everything they touch




File: 1458425891792.jpg (42.58 KB, 736x376, 92:47, 1433623890316.jpg)

 No.494[Reply]

Not sure if I ever made a thread here before about /volknet/, but I thought it was relevant.

It takes a different approach to Internet privacy than just strictly a technological one, or of building yet another darknet.

The Internet in general would be more anonymous & private if we all just started using the darknet en masse. But of course we don't. All the most popular websites are on the clearnet, so that's where everyone goes. And because that's where most everyone goes, that's where web developers and content creators focus their efforts. They go where the traffic is rather than producing quality content for the darknet. So…places like i2p and onionland have a kind of self-fulfilling isolation to them.

No content, no traffic. No traffic, no content. And most of the general population just keeps on using the regular, insecure Internet.

/volknet/ is a proposal on how to get out of this bind and to jump-start a migration to the darknet.

We don't need to try and convince bloggers, artists, vloggers, etc to set up a presence on i2p or freenet or any other place. Instead, we just don't give them a choice.

If you happen to have a favorite website, blog, wiki, whatever, just outright scrape the content from these websites and then clone them onto the darknet yourself. It doesn't even need to be a full website, it could be the works of your favorite Deviant Artists, or the channels of your favorite Youtube personalities.

Quality content creators are hard to come by, but ANYONE can copy and pirate and rip stuff. Anons are always posting stuff they found on the Internet anyway, so why not take it a step further and build something with it? Then you wouldn't need to leave i2p in order to visit your favorite blog or news website. Just go and visit the cloned eepsite.

And if the content creators don't like it, well TUFF! If someone cloned their website, the only thing they can do about it is set up their own "legitimate" version of their website on Post too long. Click here to view the full text.

2 posts omitted. Click reply to view.

 No.529

Half the problem with what you're proposing is that it would lead to the normieization of the darknet.

The lack of architecture for advertisers by the darkwebs nature is what keeps it clean anyway. If shit like 8ch just made a full migration overnight and told everyone to pound sand on the clearweb, it would only inconvenience likely a few hundred thousand people, but if things for personalities (Lets use Jontron) were migrated over to the darknet and folks such as Jontron started updating there as well then you'd see fucking kids and retards go in.

The reason internet privacy is so fucking hard to obtain on the clear web is because advertisers paved the fucking road for it.


 No.531

>>500

how about a booru featuring screenshots of the sites and then linking to them? tag systems are cool.


 No.539

>>494

The problem with this idea is that hosting content isn't free. Who's going to pay for all of this?


 No.543

is there not a proxy service you could set up? Say you want to search for and watch youtube videos, do you really need to mirror the whole of youtubes data centres or can you not just get a proxy to download the one you want, and forward it to you sans bullshit?


 No.558

twitter users are mirrored to gab and its working pretty well, at least in the part that people dont need to go to twitter anymore.

also when i tell edgy twats about the mirroring they get concerned




File: 1444137342042.gif (362.96 KB, 1200x675, 16:9, image.gif)

 No.388[Reply]

Hey folks, I'd love to put together a piratebox router, as I live in a heavily populated neighbourhood with a fuckton of university students around. Anyone put one together? Any advice?

2 posts omitted. Click reply to view.

 No.431

File: 1445489567438.jpg (138.13 KB, 500x333, 500:333, 1439522065392-4.jpg)

Start taking interest in your aspirations

stop living in dream land


 No.446

Download the Piratebox app on an Android phone.


 No.450

install tinyboard name wifi as free internet


 No.552

^^ fucking Indians


 No.555

File: 1bad10a3752d57d⋯.png (195.64 KB, 400x300, 4:3, IMG_1.png)

File: 8a32111115fc882⋯.png (154.14 KB, 400x300, 4:3, IMG_2.png)

File: 3245862a20b471a⋯.png (154.14 KB, 400x300, 4:3, IMG_3.png)

>>388

>Anyone put one together? Any advice?

Yeah, just don't expect it to be very populated since very little of the people will care unless you hype it around the university.

That sort of defeats the purpose as it is so easy to host one of those anonymously. Unless you have some heavy censorship or some shit, it will probably not be used a lot.

If students want to share files, the either do it through Google Drive/Discord/etc or if they are planning to pirate something through torrents. But still fun nonetheless.

>>424 made a good point too.




File: 11961d79a8fde72⋯.png (14.31 KB, 500x500, 1:1, opengraph.png)

 No.532[Reply]

Does anyone know of any reliable crypto currency tradeing sites that don't require id any help is appreciated

 No.533

check out >>>/biz/ for cryptocurrency info


 No.548

I'd love to see someone create an offline trader to throw into priateboxes. Maybe we'll re brand to treasure-trove or something.

so people can swap their coins, without fees, and without any trace




File: 1444383238752.png (458.17 KB, 1239x1640, 1239:1640, paranoid anons tech guide.png)

 No.400[Reply]

I'm passing this on to /netplus/ because I don't want you to be left out and uninformed.

Dumping massive /tech/ guide and redpill

Warning:

following these instructions may severely break your computer and firefox and may ruin your privacy and your entire life.

do any of these things at your own risk.

I am not responsible for anything bad that happens to you.

Some of these things DO mess up your ability to use 8chan and screw up the way the site functions so pick and choose carefully, use saves/different profiles or something.

This may void your warranty.

Ask a professional and the mozilla team before doing anything.

You have been warned.

first open about:config

to protect against SSLv3 exploit you can use the mozilla addon "SSL version control"

or set security.tls.version.min = 1 in about:config for Mozilla Firefox.

To restore change the value back to the security.tls.version.min = 0. That's it.

In Mozilla Thunderbird you can set it also in about:config, which You can find in: Tools → Options → Advanced → General → Config Editor.

Always use a firefox fork that gets regular good security updates. never use a main distribution. the underdogs are your friends.

remember to explore "about:permissions" as well.

(search these so they come up)

network.http.pipelining TRUE

network.http.pipeliniPost too long. Click here to view the full text.

7 posts omitted. Click reply to view.

 No.408

The project is strongly endorsed by various feminist groups that have nothing to do with technology. The system is headed by a developer reputed for making low-quality software. If literally any other piece of software had the kind of bugs described in the various systemd issue trackers, they wouldn't even be accepted in distro repos, yet systemd has been widely adopted in a matter of months, breaking compatibility and not offering upgrade paths even on the likes of strong server OSs like debian or centos. SELinux - a NSA project - developers are strongly for systemd, nevermind the numerous bugs and undoubtedly numerous security vulnerabilities. Speaking of, there has been NO audit of systemd even though everyone is accepting systemd no matter how security-sensitive the distro is meant to be. It's pretty evident that something is really wrong with systemd's adoption. basically the bastards who want to enslave the world decided that the best way to control opensource is to create their own and promote it until it's the standard even though it shouldn't be.

new people would fall for it and the more knowledgeable are facing a lack of support for their alternatives. The project to create an all-encompassing system that can be easily infiltrated by, at will to provide root access and spy on arbitrary non-backdoored systems is being funded by, and is being promoted by the, global elite across the entire community. It's clear that the adoption of systemd is not normal and there's something hiding behind it. Nobody has ever been specific about what kind of problem systemd solves, nobody has ever even mentioned having a problem before systemd appeared, and suddenly it spreads like wildfire.

systemd's design is flawed intentionally to increase its attack vector and make it vulnerable for outside attackers to break it more easily. There is a reason why systemd is pushed by Red hat, an American company with very close ties to the N$@. Red hat controls Fedora, so Fedora adopted it first, then Red hat enterprise linux and because Red hat funds most of debian, they also caved in. Basically all of the major distros are controlled by Red hat one way or another. Everyone hates Gnome, yet it is still here, why you ask…… it is Red hat. Red Hat wants control of Linux. Anyone who opposes systemd is in the way of them controPost too long. Click here to view the full text.


 No.409

that's all. I hope this helps many of you.


 No.421

So, you crossposted this shit on netplus too.

How many boards did you spam with this? 5? 10? Jeez


 No.538

Thanks anon- you've saved at least one life tonight


 No.544

looks like an in proved version of this but not fully.

The paranoid #! Security Guide

https://pastebin.com/tUvq8Jzj




File: da22757bbee6400⋯.png (149.31 KB, 897x456, 299:152, images.duckduckgo.com.png)

 No.536[Reply]

Do any of you gents do distributed computing besides cryptocurrency? I'm familiar with folding@home, seti@home and distributed.net. Are there any other projects worthy of dedicating CPU/GPU to?

 No.537

Plan9 and 9Front




Delete Post [ ]
[]
Previous [1] [2] [3] [4]
| Catalog | Nerve Center | Cancer
[ / / / / / / / / / / / / / ] [ dir / animu / doomer / femdom / lovelive / mde / sw / vichan / x ]