[ / / / / / / / / / / / / / ] [ dir / arepa / ausneets / hisrol / leftpol / loomis / vg / zenpol / zoo ]

/netplus/ - Networks and Plus

Catalog

Winner of the 36th Attention-Hungry Games
/alcoholism/ - The Attention-Hungry Games are the Dark Souls of Hunger Game Simulators
Name
Email
Subject *
Comment *
File
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Oekaki
Show oekaki applet
(replaces files and can be used instead)
Options
dicesidesmodifier

Allowed file types:jpg, jpeg, gif, png, webm, mp4, pdf
Max filesize is 16 MB.
Max image dimensions are 15000 x 15000.
You may upload 5 per post.


File: 1433166483300-0.png (79.25 KB, 1280x774, 640:387, tor.png)

File: 1433166483301-1.png (34.21 KB, 510x326, 255:163, htw3.png)

 No.2[Reply]

This thread is for general information on tor, what it is and how to get started with the tor browser bundle.

>how do I into tor?

You can start using tor within couple minuets if you like.

1. Download the tor browser bundle from the tor project website here https://www.torproject.org/download/download-easy.html.en

2. extract the archive

3. click the 'start-tor-browser' shortcut

4. optionally you may want to change the noscript add-on to block all scripts by default and allow them on a site to site basis when necessary

5. browse the Internet in privacy

6. see the tor LINKS thread for links to hidden service 'onion' sites that are only accessible over tor

What is tor? tor is a low latency, onion routing network intended to facilitate anonymous and censorship resistant communication with a focus on facilitating access to the 'regular' Internet in a way that shields your identity from the destination server as well as shielding your destination from your isp/someone listening on the wire. Tor also has a 'hidden service' capability that provides anonymity for both the user and the server. tor is a free software project and as such you are welcome to review, redistribute, contribute and fork the source code.

How does tor work?

For a basic overview in simple term I recommend you read the overview on the tor project website https://www.torproject.org/about/overview.html.en

what can tor do for me?

- tor can provide a level of network level anonymity when you communicate over the Internet

- if you are someone who 'has nothing to hide' but feels like hiding anyway then tor is for you. tor is one of the best things going if you want to avoid passive, buPost too long. Click here to view the full text.

12 posts and 2 image replies omitted. Click reply to view.

 No.546

>>501

AFAIK, TOR is ONLY good for reaching onion sites.

Knowing what we know about CIA's resources, they have too many endpoints and hops to not have access to find tor users.

Unless you're using the TOR network for UDP traffic, you're unlikely anonymous




File: 1433166098090.jpg (56.8 KB, 600x400, 3:2, stallman-assange-snoweden.jpg)

 No.1[Reply]

Edit: Ifinity never ever is dead, what good news.

As a result I am unlocking every thread there.

Welcome to /netplus/ the board for discussing networks and networking protocols/software, including but not limited to; tor, i2p, retroshare, GNUnet, freenet, hyperboria/cjdns, syndie, meshnets and whatever else. This includes discussion, general information, information on how to get involved and link sharing. Discussion can related to the technologies themselves, how they work, what they are intended to do, what their uses and weaknesses are, the services hosted on them, communities and culture.

If you have a technology/network/community you would like to introduce to the board it would be appreciated if you write a short paragraph or two describing what it is and provide links to guide and documentation .

Please refer to the rules before posting. http://oxwugzccvk3dk6tj.onion/netplus/rules.html

Board log

http://oxwugzccvk3dk6tj.onion/log.php?board=netplus

As the original board owner hasn't logged in for about 15 weeks the board showed up as claimable.

Thanks original board owner for creating this board.

Things to do;

Remove that Brown pill crap. Done

Update the link to the rules list as it is using the older link.

Enable board log. Done

If anyone wishes to make any changes to the rules/settings, ask away.

Removed: CP spam, low tier shitpost that wasn't even board related, obvious malware and theme, which looking back was hard to read.

1 post and 1 image reply omitted. Click reply to view.
Post last edited at

 No.465

[Settings]

[Disabled]

Country flags

Disallow combining characters ("Zalgo", Vietnamese text)

Oekaki

Display SAGE! after saged posts

ROBOT9000

Allow posters to see when a thread is bumplocked

Set Max number of newlines per post to unlimited.

Threads.

Deleted

>>352

Same content as

>>351 , but this has more posts and actually discoussion.




File: 1433194972851.png (48.74 KB, 1100x324, 275:81, retrosharelogo.png)

 No.6[Reply]

Watch the getting start video for setup instructions. http://a.pomf.se/exmviw.webm

Post your certificate here and add other people's. Remember that both parties need to add each other's not just your their's.

Add you certificate to the /netplus/ chatserver here udgdahofbq52bzxk.onion it will instantly add you and give you instant access to a set of chatrooms. Remember the chatserver will not replay traffic for you so you will need to add some people to your friends list if you want to share and download files.

146 posts and 5 image replies omitted. Click reply to view.

 No.512

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 No.516

>>133 here (have no access to my tripcode at the moment), finally sharing my laptop's key and adding every key in this thread to this identity (hopefully some of you are still alive and reading this):
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 No.521

CQEGAcGaxsBNBFigyFQBCADBwSbinqywFw3AA8RHyqR7+/UoQ/FMCZwjh7kwVlVB

q243mN9T2vRWkXRWVjZfSCb46zg85Dg0XDHOoOSjYe6JNgC0lPo7vk+eOjjbFYad

+3/kRCXR9QJjfTAovsiLQnZWaV++AhFSH05TaxO/BhDVJDS4EFmkanxchv7RVHtj

NtM4RXTpmZf73RjyoS9rNUh6wgmrj9PbrzgpJqzJWt45VtIJZu02uJstBphD4Gne

X8I97bnaWlJS1YnP3+vF3RvjokSKgs7/f/wlGpaChg2uMJ1GVkUzo764zjERCYCS

4vs3zS/m9NYEIvb9nRRobfDp/5rktWP+9oFa1phyRo7DABEBAAHNJm51bGxwdW5r

dCAoR2VuZXJhdGVkIGJ5IFJldHJvU2hhcmUpIDw+wsBfBBMBAgATBQJYoMhUCRAF

4kBj57vRXAIZAQAAaI4H/jcm1T1qpg7XadzRP/IWPeF35juYFy4u9/Asi/0mJGi7

+HUvSBXVB6nkRsdxj72vw6xWwVgii7YM1gG2LnSbSwyXExvRLJoPx21lnaNm+rfc

hzbT+7rg9hKcCSxeydMiC5Dq/sAVH7H5v6w0e5W09Eawfqz4XEJzRi4OygxfM31b

39k7W+MnyEt1GIKw+tjSe4YtnYP9XJgDngkd8psKe82rzNuFnTxGNN1/zI5yTueM

9FZ5SuwOsLQO3fw3TLbo+7r0Q9TvRdT5kaNelZQAG1b3edgD6va/UfYcHVMrPoGM

gCSHHT+sw6bRecf3Wp9gihq5HwSHdC4zuTWZrPvvOMoCBgIZoV2PiAMGqf7N64+I

BAAGBG1hbW8FEDfhirTMv52jS0Vc8zTWszwHA8exUg==


 No.522

CQEGAcOWxsFNBFi3IboBEACfeHQzJPBmMkK0cwRQibpSrY1qqvlFAvWZGniohSVZ

kJym03TV/Re5Pn7oHSK5ZZupl+aCIxH/8rxjYI0W7FpaShzdHUOJEAXmfThvrqIm

nWnDMD0zRcuCR4dazcBgyOkNYj1T0MwZg6UvWX4OBiYLOBTvzX6T4IX1FFNmpztn

YIdezHQclSw6tnWgzykN1nG+h0Fkm5djH+PcdopzIrXYLVFoRVMEjY6v19e7Qd1i

xc+ZUs+NZSwxY5hy5S3pl+E8jfZ/Vr9s4Vl8U95qC/GK0k/OOyzTcwIkQtvpa3xR

lmrvbfor9lvOqx/ydb6XAcFaF70Y4UfGSrgo/oympyTyLp6H31x5qVgLfqpMMbho

pVHwzinc6TID8fIvofiPDOggJHsIAWRJSCX471SBAbA9vscPNpooTU2LIcAIiOE4

H19PmFQ/yjLvbIdHcKP0yPDx6vWS/fJz3LcWQmFESP3NSTGamlH1Qpv0xwVlb7kF

CSMOgLoYDzeKdOs6yrYrNM6NsS95V4HxFp9bLSTMpeNrebuY/xRBpUt8cZZl3NvY

9ryno4HDx9eMzgf1NX3bpYEiStFPk0s3kf14W3htOLwHYHnPrgFIsf+qc6PrhNuV

H1ITRw/cAqQn4Zi+zTaEstsr0UrLkao6l0JO1cK7qYyAPwyhIgy0EhBWiqK0BLXA

xQARAQABzSJkZWNveSAoR2VuZXJhdGVkIGJ5IFJldHJvU2hhcmUpIDw+wsFfBBMB

AgATBQJYtyG6CRAxTf8l7K1R6gIZAQAAVwkP/2nEHDAx3DBB0RBg35Eg7lO3MaGl

Bk8nC1SzLVKaK0EHP45p/9TFUcIq/iHVMJzR3jr/UylKmM9yFHL/CCr72VG2pNSr

EdxhXmkBsDHt6CiJyYgPrcwVKNpbhvxmMXPOSSMCDDa8KZzV6Csmr+LWdgVc9KV1

JLA+n5DL8FO96OWtHJOmVToPFp8063g10k5g1vXzYhRncLbBtB82DFLycpAJpsd4

tKJXXgjnNN0EMWQ/fJmdoNZEa0+T+0w+ik7uyYkhpQzu0ujU/c8R6xPf9HGB28RI

RfvwNO31o2XEHxSeUXS4q/83HcSwr3bRlEMsC9Kt+iF6U/5FF55AVH8EIs4c1lLM

NcvJqFD/80Y4tOZmpqsPFKif8FsDF6WX3z5RXIQj7Hy4ELQ2KojWZKlwsWC/5JjP

UfV88KvBLGm6plD+i4eJYNFXnjZH3nMBG0MSZQqtcSXG+foOy2AMI6Djg2+cI82u

cF4fZq93h2DHnJ+9GKLsnZ9M5iQyj12WRKo82OUwB5mKqBt3SWFQJQsqahotTa1U

0S2VhdKfB1GEgJaYyt5po7hUwA1NtoxXddZkk3prY9RWUYZ7faSwob98fCchTMJ0

ZbdCNFVBcU9oDhB2+2oNt6W8zMbzXW6DQnv6iugWwh7pTSS2eVj3AfZ1JZsO2XrE

jLUdMDBnu2N9ni/pAgbG/JltJZMDBsCoCGUlkwQABgdob21lX3BjBRACgYru+9ME

DGHnfBoDgd+lBwPj04U=


 No.547

CQEGAcOWxsFNBFnoYoABEADTrY2+Lw0KF9SwsR6qOGK9iKttdqeWBIR1dk/kpkMZ

HQ8q9h+JcNosjkv29Fj8Iq9ya0Oq5JkYFKIQ0ecLGhQ9yMkxlnt9U8jTLddsNTei

8tiDA6gE38O/cBof9nFX5Xm4idNLrLpZ+OX/Awe79UVKCTdJx/43z1UDhrEjQT4n

+0YVhMj1c6a78NQmv48rn/XCDlBYx6qi8eHIhSCJ07SvYBcEqCR+DscE9THpr5u5

0pDp0taI04gEs6SlLfoQ95JLSBR97GROgn+/Nhtc8rP4MQWxB3TYhW1KQ/+F9aPE

XYhxJJNq1vR4mJvyc2qhwK6dx2sEqOnLMJ6lxUtmjHWwbBtZEKc1UIzLWEnovc0d

1rSOFEvGQHvLyECxfKbQWtvQUINY0TIBADTIniLJRpjXdIkwOqpUUZM4crRx2v78

pKDnMviEnUl1LSP91AkhMOiT6O37qi4coyi7lJT0a3KljzBZJsaQX0P4ThUdH81U

2J5xvxGWunbjN0rf4aavzvhQOJLXT/9z+ijbV/HsAjxwTdPGuHMBgLxWpkfiefGY

U90lrGjdiMnYJuWOgeuRKgf1DSZYFR53cG9sPser350Hd/o9QbghGm5lDbIve4SH

C2GlNmXTI8z3qNs1j1m/8cd5HJE5DY6VdfkTlFAZ99msDHoEnQQAmzgOlF+wmpUZ

sQARAQABzSJBZ3JpcyAoR2VuZXJhdGVkIGJ5IFJldHJvU2hhcmUpIDw+wsFfBBMB

AgATBQJZ6GKACRDg+FzsoHy0egIZAQAALF8P/2rCQ53gtcmh88VqNrEJ4OaYc16z

0d0rMXMMFiBfriMx/vy+02z4Yuu+RfxkygDI5rZ97WqRd36R8S7PKCy/le6uw3BD

yVTB/NjaEwOatj3emEWozZy9c1PLYeZFHvoo1V2IDryZwIwuiGWdGvqhEi/3mn6r

UM9z2TEEqpA7EfAeuGJ1u3O2QW6WeW1xgBaysLfOFhgK35mdLNQrsqnCyvloSGlr

poUBSO1F9UetLZDMxbFnD3DLh7NGPg1Bj0aoawru7QD9Vd6uSy/Sd240WG8hNF2l

eDqt2CIV2iqg3/Zrz4+VtIULY0t8ur2+dCAkqfD7AFSSheDmJu0mcepv4rOyT2Yx

alu4v6+hYgZqBMis7cFPOYlIuMEArUULPUngpWREkfk+Q1j/WDqyekMOMT1THN6P

LDQmGgAV/t+cXjp1efApExGazo7y75K95qPfgCheFY4jIe61w9B9LE7pS41wYx0N

tG7iQUMep9C3FAfkWBHU7beKyk9gZp7G5vW9GFgD6Tx/52MPgy4GzzholTO5jCyQ

fnyK7QM/8L1h66jW0mygpksdO/75xavCa5Mfb/S0XXWgrNCkwnJqxs2SUquaIzhB

Tm/crRHk+7/Qrs/+v8rp1dlLJziJvbJaP3GxNWorrpoo2SW9AXzPQoFh73ZvrirT

1o1zT9po8bW+KtfWAgbO1OzzXrADBsCoNwVesAQABgRIb21lBRBzlwhA55z9gogl

cmwIUlotBwNyfLw=




 No.545[Reply]

Need to see what roommate is up to. Need suggestions to start researching tools. Your suggestions will help me learn and figure out what the fuck is this guy up to. What tools can I use? Suggestions to reading material or better yet youtube links.

Target

———

Windows 10 desktop, which does not require a username and password to login. Connected to the internet behind a NAT firewall. Machine is an older Core 2 Duo with 2GB RAM & intigrated graphics, so very slow.

Will have physical access to the machine for only one hour

Have unrestricted access to the LAN all the time

Goals

———

Access from within the LAN

- Desktop files and My Documents for primary user

- Keylogger files

- Periodic Screenshots or Remote Desktop Access - View Only

Access over the internet

- Keylogger files



File: 1444383238752.png (458.17 KB, 1239x1640, 1239:1640, paranoid anons tech guide.png)

 No.400[Reply]

I'm passing this on to /netplus/ because I don't want you to be left out and uninformed.

Dumping massive /tech/ guide and redpill

Warning:

following these instructions may severely break your computer and firefox and may ruin your privacy and your entire life.

do any of these things at your own risk.

I am not responsible for anything bad that happens to you.

Some of these things DO mess up your ability to use 8chan and screw up the way the site functions so pick and choose carefully, use saves/different profiles or something.

This may void your warranty.

Ask a professional and the mozilla team before doing anything.

You have been warned.

first open about:config

to protect against SSLv3 exploit you can use the mozilla addon "SSL version control"

or set security.tls.version.min = 1 in about:config for Mozilla Firefox.

To restore change the value back to the security.tls.version.min = 0. That's it.

In Mozilla Thunderbird you can set it also in about:config, which You can find in: Tools → Options → Advanced → General → Config Editor.

Always use a firefox fork that gets regular good security updates. never use a main distribution. the underdogs are your friends.

remember to explore "about:permissions" as well.

(search these so they come up)

network.http.pipelining TRUE

network.http.pipeliniPost too long. Click here to view the full text.

7 posts omitted. Click reply to view.

 No.408

The project is strongly endorsed by various feminist groups that have nothing to do with technology. The system is headed by a developer reputed for making low-quality software. If literally any other piece of software had the kind of bugs described in the various systemd issue trackers, they wouldn't even be accepted in distro repos, yet systemd has been widely adopted in a matter of months, breaking compatibility and not offering upgrade paths even on the likes of strong server OSs like debian or centos. SELinux - a NSA project - developers are strongly for systemd, nevermind the numerous bugs and undoubtedly numerous security vulnerabilities. Speaking of, there has been NO audit of systemd even though everyone is accepting systemd no matter how security-sensitive the distro is meant to be. It's pretty evident that something is really wrong with systemd's adoption. basically the bastards who want to enslave the world decided that the best way to control opensource is to create their own and promote it until it's the standard even though it shouldn't be.

new people would fall for it and the more knowledgeable are facing a lack of support for their alternatives. The project to create an all-encompassing system that can be easily infiltrated by, at will to provide root access and spy on arbitrary non-backdoored systems is being funded by, and is being promoted by the, global elite across the entire community. It's clear that the adoption of systemd is not normal and there's something hiding behind it. Nobody has ever been specific about what kind of problem systemd solves, nobody has ever even mentioned having a problem before systemd appeared, and suddenly it spreads like wildfire.

systemd's design is flawed intentionally to increase its attack vector and make it vulnerable for outside attackers to break it more easily. There is a reason why systemd is pushed by Red hat, an American company with very close ties to the N$@. Red hat controls Fedora, so Fedora adopted it first, then Red hat enterprise linux and because Red hat funds most of debian, they also caved in. Basically all of the major distros are controlled by Red hat one way or another. Everyone hates Gnome, yet it is still here, why you ask…… it is Red hat. Red Hat wants control of Linux. Anyone who opposes systemd is in the way of them controPost too long. Click here to view the full text.


 No.409

that's all. I hope this helps many of you.


 No.421

So, you crossposted this shit on netplus too.

How many boards did you spam with this? 5? 10? Jeez


 No.538

Thanks anon- you've saved at least one life tonight


 No.544

looks like an in proved version of this but not fully.

The paranoid #! Security Guide

https://pastebin.com/tUvq8Jzj




File: 1458425891792.jpg (42.58 KB, 736x376, 92:47, 1433623890316.jpg)

 No.494[Reply]

Not sure if I ever made a thread here before about /volknet/, but I thought it was relevant.

It takes a different approach to Internet privacy than just strictly a technological one, or of building yet another darknet.

The Internet in general would be more anonymous & private if we all just started using the darknet en masse. But of course we don't. All the most popular websites are on the clearnet, so that's where everyone goes. And because that's where most everyone goes, that's where web developers and content creators focus their efforts. They go where the traffic is rather than producing quality content for the darknet. So…places like i2p and onionland have a kind of self-fulfilling isolation to them.

No content, no traffic. No traffic, no content. And most of the general population just keeps on using the regular, insecure Internet.

/volknet/ is a proposal on how to get out of this bind and to jump-start a migration to the darknet.

We don't need to try and convince bloggers, artists, vloggers, etc to set up a presence on i2p or freenet or any other place. Instead, we just don't give them a choice.

If you happen to have a favorite website, blog, wiki, whatever, just outright scrape the content from these websites and then clone them onto the darknet yourself. It doesn't even need to be a full website, it could be the works of your favorite Deviant Artists, or the channels of your favorite Youtube personalities.

Quality content creators are hard to come by, but ANYONE can copy and pirate and rip stuff. Anons are always posting stuff they found on the Internet anyway, so why not take it a step further and build something with it? Then you wouldn't need to leave i2p in order to visit your favorite blog or news website. Just go and visit the cloned eepsite.

And if the content creators don't like it, well TUFF! If someone cloned their website, the only thing they can do about it is set up their own "legitimate" version of their website on Post too long. Click here to view the full text.

1 post omitted. Click reply to view.

 No.500

>>496

I was thinking of going even further than that. Don't just clone the sites, make mysql archives of all their content so that people can build all kinds of mash-ups between sites.

>i think we should also compile a list of darknet search engines which we can index our sites in.

Only one I know at the moment is Hidden Wiki, but feel free to add to the list


 No.529

Half the problem with what you're proposing is that it would lead to the normieization of the darknet.

The lack of architecture for advertisers by the darkwebs nature is what keeps it clean anyway. If shit like 8ch just made a full migration overnight and told everyone to pound sand on the clearweb, it would only inconvenience likely a few hundred thousand people, but if things for personalities (Lets use Jontron) were migrated over to the darknet and folks such as Jontron started updating there as well then you'd see fucking kids and retards go in.

The reason internet privacy is so fucking hard to obtain on the clear web is because advertisers paved the fucking road for it.


 No.531

>>500

how about a booru featuring screenshots of the sites and then linking to them? tag systems are cool.


 No.539

>>494

The problem with this idea is that hosting content isn't free. Who's going to pay for all of this?


 No.543

is there not a proxy service you could set up? Say you want to search for and watch youtube videos, do you really need to mirror the whole of youtubes data centres or can you not just get a proxy to download the one you want, and forward it to you sans bullshit?




File: 1434726719330.gif (1.99 MB, 766x800, 383:400, 1433540833072.gif)

 No.97[Reply]

Hi, for someone who is a complete newbie to all of this, do you have any info graphics or simple guides on how to get started with general internet security, how to easily get proxies running, what you can/can't do on Tor (how does one for example handle downloads and torrents) ect?

Thanks in advance, and it's great this board exist!

20 posts and 9 image replies omitted. Click reply to view.

 No.470

>>213

So what is his

>I can tell you with a lot of certainty LE does hate Tails. It makes push button forensics basically impossible which drives up costs as we need specialized staff to do covert activity online. It also means we spend more time looking at less evidence, officers usually take everything on a raid, in some cases its resulted in huge portions of useless crap we have to look at.

is all a ruse, tying to convince people to use TAILS because they have a 0day?


 No.524

>>455

Also need to disable webfonts (its what pwned tor users, kaspersky labs, and even cryptostorm's test network) , randomagentspoofer has this option as well as many good ones. uMatrix should be added as well


 No.525

>>470

Remember to ignore/filter all post who say something technical is bad but gives no technical explanation


 No.541

>>102

>>103

can someone duplicate this and remove the pedophilia? im already on a list for downloading Tor. I don't want to get put on another list that will get me into jail.


 No.542

>213

>fucko.png, post 810

>"Think of the children!"

I admit I laughed.




File: 901b68248a62166⋯.png (56.89 KB, 590x408, 295:204, temp.png)

 No.540[Reply]

TL;DR - Create a p2p software that will work as a fully anonymous database (more than just key-pair) and add local web-socket/http(s) so that clear net sites (or even just static html files) could query for data(using a dedicated javascript library to make things easy).

So iv'e been reading a lot and planning to execute this idea, but before I do so I need some opinions and valuable criticism about it (mostly so I won't do it for nothing), and also if people think it's a good idea maybe create a git for it for collaborated development

The idea is simple:

1 - create a p2p network, (completely anonymous and decentralized) and allow each node to issue simple queries to create/update/delete/get data in forms of List or a single value,

2 - inside that software create a web-socket bridge (or other technology) to listen for requests made from the browser, issuing them to the network and sending the browser the response (if any)

3 - create a javascript library to ease the creation of such websites and allow easy integration everywhere, only leaving the developer to handle the

"db" requests and how it will show on the browser(as well as filtering lists if needed)

*using signatures and simple cryptography one could create&upload content, and then only he could modify it. this gives the ability to create sites which behaves in a certain way and allow a developer to update the code, as well as giving him a way to allow users(and himself) to modify their own content .

Idea demonstration:

Making a simple chan using this will be as simple as:

-list(<board>,<callback that takes it and encodes it into the page>,<number of posts>,<filters(optional)>)// this will get all the posts, individual post comments will be on a different request

-post(<board>,<data>)

-comment(<post>,<data>)

Why this is different than i2p and similars:

-The data flPost too long. Click here to view the full text.



File: da22757bbee6400⋯.png (149.31 KB, 897x456, 299:152, images.duckduckgo.com.png)

 No.536[Reply]

Do any of you gents do distributed computing besides cryptocurrency? I'm familiar with folding@home, seti@home and distributed.net. Are there any other projects worthy of dedicating CPU/GPU to?

 No.537

Plan9 and 9Front




File: 3473f43857cbccb⋯.png (369.08 KB, 366x554, 183:277, capture4.PNG)

 No.535[Reply]



 No.534[Reply]

Hey Guys, I stay in a youth hostel where i have access to the wifi but the router password has been changed. I'm trying to find the router password just as a practice. Can any one help me with the process ?

The router is a Technicolor model:

TC7200

I have exploited all it's javascripts, Please do share your idea's and view on how to access it.



File: 11961d79a8fde72⋯.png (14.31 KB, 500x500, 1:1, opengraph.png)

 No.532[Reply]

Does anyone know of any reliable crypto currency tradeing sites that don't require id any help is appreciated

 No.533

check out >>>/biz/ for cryptocurrency info




File: 1437435643143.jpg (320.47 KB, 2483x2481, 2483:2481, tor.jpg)

 No.223[Reply]

Ricochet is as instant messenger that uses Tor hidden services as identities.

Post your ID and desired display name ITT, and optionally include your interests.

Info:

https://github.com/ricochet-im/ricochet/blob/master/doc/design.md

https://github.com/ricochet-im/ricochet/blob/master/doc/protocol.md

Download:

https://ricochet.im/releases/1.1.0/

Whirlpool Hashes:

6edada572f755f3f456bf5fd543b3035fde6a30f771f990ff3d70bbb2446acb2b52123769f028b41c122f051d5a52f78a174fcdabcfbf5b6db580a1231b49182  Ricochet-1.1.0.dmg
701991c9bb338e0a9253a764b9c12e604b1a029639e30205711d5e66a588226fba7fb7ec692a7676d3b128d868e27e876e845f5c5b7f06bb91f44b4ea8fabe0d Ricochet-1.1.0.dmg.asc
36eefbebc6a087af063a94e286c5ad9083f316a92098b6998585c134534b93cb97769d47e2ea9078ba8575606e21211291804e7b0c9e7d42f339cd55c2998abc Ricochet-1.1.0.exe
1ba1d4913064b09f12fe8fb5ca2afc5b57c9115acc92ba0caa1965c8b50a59ea360eaa4e906d51e36cb2daec0b7a919f9752a73c8c37b5593682a11cc3e03ad6 Ricochet-1.1.0.exe.asc
eb2087a6165cc01f2fb1e004a02fdf1cbb2d690ebd40e2d653ba4b5f95101d435889dcd0a25c4aa0b30787748d6bd6356db051c700ca72601d2c43e208debdb2 ricochet-1.1.0-src.tar.bz2
066647fe6f99fb0dc0d05b20beb4075c780145ce036f56964dac649cd41e4623d5e097f8a03fc4756df6595a3f14d774e28c972a851cbfedc847c61161351489 ricochet-1.1.0-src.tar.bz2.asc
2900b78e431ce7858d049e45d3e75e2de8aa3341a695f42ded071615073a15546ceb352a2dc6069e8ae2cdc4033d103c14537bbae087f2a2653216d329110373 ricochet-1.1.0-static-i686.tar.bz2
e08768f22372f607077500069d75cf1d30691d355aee74a03070f11daf437c49134e11527a3b5cbba43db15b1c4aa6eea280d7ed36a127f6fe64366bc38ee567 ricochet-1.1.0-static-i686.tar.bz2.asc
942a67c654e90118fcf562cca74e49fb1174094e62fa1ae464ab7194ad5d57c15
Post too long. Click here to view the full text.

 No.362

Add me for awkward conversations

ricochet:ok4bmpwkiosjnejq


 No.489

>>362

ricochet:4juwzjf6uwdu23za

Might as well try. Added you too OP


 No.515

More awkward conversations:

ricochet:xwdyr5nco72tugvm

I added everyone above.


 No.530

ricochet:w7c5bxu2x7jg6hao

i have no friends




File: 1457468521141.mp4 (7.62 MB, 480x360, 4:3, 1426006908834.mp4)

 No.490[Reply]

I don't know if this is the right place to discuss it, but are there some people here that still use telnet or BBS's? i use anonbbs.org on port 1337 on telnetthough it's empty and dead.

 No.513

isn't Telnet cleartext?


 No.528

Yes, telnet is unencrypted. You can probably wrap it with stunnel or something, but then again why not just use ssh instead? Either way there has to be a server account and password to log into.




File: 3bbaf1e5e6ccc18⋯.jpg (249.54 KB, 900x600, 3:2, Euglossa_CRARC.jpg)

 No.527[Reply]

Here is a bug

ht tps://bugs.chromium.org/p/project-zero/issues/detail?id=1252&desc=5



Delete Post [ ]
[]
Previous [1] [2] [3] [4]
| Catalog | Nerve Center | Cancer
[ / / / / / / / / / / / / / ] [ dir / arepa / ausneets / hisrol / leftpol / loomis / vg / zenpol / zoo ]