[ / / / / / / / / / / / / / ] [ dir / agatha2 / animu / bestemma / bmn / in / just / sw / tingles ]

/netplus/ - Networks and Plus


Winner of the 72rd Attention-Hungry Games
/otter/ - The Church of Otter

February 2019 - 8chan Transparency Report
Subject *
Comment *
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Show oekaki applet
(replaces files and can be used instead)

Allowed file types:jpg, jpeg, gif, png, webm, mp4, pdf
Max filesize is 16 MB.
Max image dimensions are 15000 x 15000.
You may upload 5 per post.

File: 1433166483300-0.png (79.25 KB, 1280x774, 640:387, tor.png)

File: 1433166483301-1.png (34.21 KB, 510x326, 255:163, htw3.png)


This thread is for general information on tor, what it is and how to get started with the tor browser bundle.

>how do I into tor?

You can start using tor within couple minuets if you like.

1. Download the tor browser bundle from the tor project website here https://www.torproject.org/download/download-easy.html.en

2. extract the archive

3. click the 'start-tor-browser' shortcut

4. optionally you may want to change the noscript add-on to block all scripts by default and allow them on a site to site basis when necessary

5. browse the Internet in privacy

6. see the tor LINKS thread for links to hidden service 'onion' sites that are only accessible over tor

What is tor? tor is a low latency, onion routing network intended to facilitate anonymous and censorship resistant communication with a focus on facilitating access to the 'regular' Internet in a way that shields your identity from the destination server as well as shielding your destination from your isp/someone listening on the wire. Tor also has a 'hidden service' capability that provides anonymity for both the user and the server. tor is a free software project and as such you are welcome to review, redistribute, contribute and fork the source code.

How does tor work?

For a basic overview in simple term I recommend you read the overview on the tor project website https://www.torproject.org/about/overview.html.en

what can tor do for me?

- tor can provide a level of network level anonymity when you communicate over the Internet

- if you are someone who 'has nothing to hide' but feels like hiding anyway then tor is for you. tor is one of the best things going if you want to avoid passive, buPost too long. Click here to view the full text.

14 posts and 2 image replies omitted. Click reply to view.


>This thread is for general information on tor

>what it is

(((Tor))) is an NSA Sandbox where millenials play to enjoy the (((NSA//MOSSAD))) Niggers

Now that being said, this thread can be closed.


File: 1433166098090.jpg (56.8 KB, 600x400, 3:2, stallman-assange-snoweden.jpg)


Edit: Ifinity never ever is dead, what good news.

As a result I am unlocking every thread there.

Welcome to /netplus/ the board for discussing networks and networking protocols/software, including but not limited to; tor, i2p, retroshare, GNUnet, freenet, hyperboria/cjdns, syndie, meshnets and whatever else. This includes discussion, general information, information on how to get involved and link sharing. Discussion can related to the technologies themselves, how they work, what they are intended to do, what their uses and weaknesses are, the services hosted on them, communities and culture.

If you have a technology/network/community you would like to introduce to the board it would be appreciated if you write a short paragraph or two describing what it is and provide links to guide and documentation .

Please refer to the rules before posting. http://oxwugzccvk3dk6tj.onion/netplus/rules.html

Board log


As the original board owner hasn't logged in for about 15 weeks the board showed up as claimable.

Thanks original board owner for creating this board.

Things to do;

Remove that Brown pill crap. Done

Update the link to the rules list as it is using the older link.

Enable board log. Done

If anyone wishes to make any changes to the rules/settings, ask away.

Removed: CP spam, low tier shitpost that wasn't even board related, obvious malware and theme, which looking back was hard to read.

1 post and 1 image reply omitted. Click reply to view.
Post last edited at




Country flags

Disallow combining characters ("Zalgo", Vietnamese text)


Display SAGE! after saged posts


Allow posters to see when a thread is bumplocked

Set Max number of newlines per post to unlimited.




Same content as

>>351 , but this has more posts and actually discoussion.


I get the interest in developing a coin for balancing a ledger but are there any tokens or coins poised to replace major internet registries like root-hints or DNS all together, Internet Authorities like ARIN and RIPE, SSL Authorities like GlobalSign and VeriSign?

We trust our ISP for L1-3, then sometimes encapsulate to get L3 from a more trusted source, but after that we're all relying on the same authorities to confirm whether or not our traffic is meddled with.


>all together

It's *altogether*, Nigger.

You can exclude the 2 top DNS Servers owned by US MIL with bash.




(((They))) did it on purpose (((to monitor you))) down to milliseconds.

Mesh Networks are the ultimate network pill.


File: 8ae0626ea91766b⋯.jpg (75.55 KB, 1280x720, 16:9, sloth.jpg)


>You can exclude the 2 top DNS Servers owned by US MIL with bash.

I don't think you understand how dns works.

You can pick whatever dns you like but it's all recursive forwarding and the registrars are the ultimate authority that prevent you from using nxdomain to hijack zones.



Thanks for confirming you don't know anything. You're suggesting using a TLD in lieu of internet numbers. (hey guyeze lets replace L3 with L4+, duh). Yea that'll fix BGP tables.


>(((They))) did it on purpose (((to monitor you))) down to milliseconds.

You suggesting giving up? If we had a blockchain to store pgp keys you could essentially replace SSL with something like and evolving IPSEC and since you're not using SSL to get the chain the handshake wouldn't get captured.


Need to see what roommate is up to. Need suggestions to start researching tools. Your suggestions will help me learn and figure out what the fuck is this guy up to. What tools can I use? Suggestions to reading material or better yet youtube links.



Windows 10 desktop, which does not require a username and password to login. Connected to the internet behind a NAT firewall. Machine is an older Core 2 Duo with 2GB RAM & intigrated graphics, so very slow.

Will have physical access to the machine for only one hour

Have unrestricted access to the LAN all the time



Access from within the LAN

- Desktop files and My Documents for primary user

- Keylogger files

- Periodic Screenshots or Remote Desktop Access - View Only

Access over the internet

- Keylogger files


Prerequisites: Social engineering

Like, who is his fav pr0nst*r ?? Send a mail with a zip file of *alleged* img of that bitch

Disguise a rat as the zip file and you'll own that nigger's PC.


We must talk more of this. Please email me


Tor looks wonderful! It hides my real IP address and identity.


I2P and Freenet are also good.

File: 901b68248a62166⋯.png (56.89 KB, 590x408, 295:204, temp.png)


TL;DR - Create a p2p software that will work as a fully anonymous database (more than just key-pair) and add local web-socket/http(s) so that clear net sites (or even just static html files) could query for data(using a dedicated javascript library to make things easy).

So iv'e been reading a lot and planning to execute this idea, but before I do so I need some opinions and valuable criticism about it (mostly so I won't do it for nothing), and also if people think it's a good idea maybe create a git for it for collaborated development

The idea is simple:

1 - create a p2p network, (completely anonymous and decentralized) and allow each node to issue simple queries to create/update/delete/get data in forms of List or a single value,

2 - inside that software create a web-socket bridge (or other technology) to listen for requests made from the browser, issuing them to the network and sending the browser the response (if any)

3 - create a javascript library to ease the creation of such websites and allow easy integration everywhere, only leaving the developer to handle the

"db" requests and how it will show on the browser(as well as filtering lists if needed)

*using signatures and simple cryptography one could create&upload content, and then only he could modify it. this gives the ability to create sites which behaves in a certain way and allow a developer to update the code, as well as giving him a way to allow users(and himself) to modify their own content .

Idea demonstration:

Making a simple chan using this will be as simple as:

-list(<board>,<callback that takes it and encodes it into the page>,<number of posts>,<filters(optional)>)// this will get all the posts, individual post comments will be on a different request



Why this is different than i2p and similars:

-The data flPost too long. Click here to view the full text.


tl;dr for me atm but whatever you do make it hard as fuck for advertisers to get anywhere with it

they literally ruin everything they touch

File: 1458425891792.jpg (42.58 KB, 736x376, 92:47, 1433623890316.jpg)


Not sure if I ever made a thread here before about /volknet/, but I thought it was relevant.

It takes a different approach to Internet privacy than just strictly a technological one, or of building yet another darknet.

The Internet in general would be more anonymous & private if we all just started using the darknet en masse. But of course we don't. All the most popular websites are on the clearnet, so that's where everyone goes. And because that's where most everyone goes, that's where web developers and content creators focus their efforts. They go where the traffic is rather than producing quality content for the darknet. So…places like i2p and onionland have a kind of self-fulfilling isolation to them.

No content, no traffic. No traffic, no content. And most of the general population just keeps on using the regular, insecure Internet.

/volknet/ is a proposal on how to get out of this bind and to jump-start a migration to the darknet.

We don't need to try and convince bloggers, artists, vloggers, etc to set up a presence on i2p or freenet or any other place. Instead, we just don't give them a choice.

If you happen to have a favorite website, blog, wiki, whatever, just outright scrape the content from these websites and then clone them onto the darknet yourself. It doesn't even need to be a full website, it could be the works of your favorite Deviant Artists, or the channels of your favorite Youtube personalities.

Quality content creators are hard to come by, but ANYONE can copy and pirate and rip stuff. Anons are always posting stuff they found on the Internet anyway, so why not take it a step further and build something with it? Then you wouldn't need to leave i2p in order to visit your favorite blog or news website. Just go and visit the cloned eepsite.

And if the content creators don't like it, well TUFF! If someone cloned their website, the only thing they can do about it is set up their own "legitimate" version of their website on Post too long. Click here to view the full text.

2 posts omitted. Click reply to view.


Half the problem with what you're proposing is that it would lead to the normieization of the darknet.

The lack of architecture for advertisers by the darkwebs nature is what keeps it clean anyway. If shit like 8ch just made a full migration overnight and told everyone to pound sand on the clearweb, it would only inconvenience likely a few hundred thousand people, but if things for personalities (Lets use Jontron) were migrated over to the darknet and folks such as Jontron started updating there as well then you'd see fucking kids and retards go in.

The reason internet privacy is so fucking hard to obtain on the clear web is because advertisers paved the fucking road for it.



how about a booru featuring screenshots of the sites and then linking to them? tag systems are cool.



The problem with this idea is that hosting content isn't free. Who's going to pay for all of this?


is there not a proxy service you could set up? Say you want to search for and watch youtube videos, do you really need to mirror the whole of youtubes data centres or can you not just get a proxy to download the one you want, and forward it to you sans bullshit?


twitter users are mirrored to gab and its working pretty well, at least in the part that people dont need to go to twitter anymore.

also when i tell edgy twats about the mirroring they get concerned

File: 1433194972851.png (48.74 KB, 1100x324, 275:81, retrosharelogo.png)


Watch the getting start video for setup instructions. http://a.pomf.se/exmviw.webm

Post your certificate here and add other people's. Remember that both parties need to add each other's not just your their's.

Add you certificate to the /netplus/ chatserver here udgdahofbq52bzxk.onion it will instantly add you and give you instant access to a set of chatrooms. Remember the chatserver will not replay traffic for you so you will need to add some people to your friends list if you want to share and download files.

151 posts and 5 image replies omitted. Click reply to view.





Not using TOR by the way (if that matters)


Just dropping this, I'll try to add some certs from this thread while I am at it.

I am using I2P though.





adding everyone itt

here's mine(tor node):















File: 1444137342042.gif (362.96 KB, 1200x675, 16:9, image.gif)


Hey folks, I'd love to put together a piratebox router, as I live in a heavily populated neighbourhood with a fuckton of university students around. Anyone put one together? Any advice?

2 posts omitted. Click reply to view.


File: 1445489567438.jpg (138.13 KB, 500x333, 500:333, 1439522065392-4.jpg)

Start taking interest in your aspirations

stop living in dream land


Download the Piratebox app on an Android phone.


install tinyboard name wifi as free internet


^^ fucking Indians


File: 1bad10a3752d57d⋯.png (195.64 KB, 400x300, 4:3, IMG_1.png)

File: 8a32111115fc882⋯.png (154.14 KB, 400x300, 4:3, IMG_2.png)

File: 3245862a20b471a⋯.png (154.14 KB, 400x300, 4:3, IMG_3.png)


>Anyone put one together? Any advice?

Yeah, just don't expect it to be very populated since very little of the people will care unless you hype it around the university.

That sort of defeats the purpose as it is so easy to host one of those anonymously. Unless you have some heavy censorship or some shit, it will probably not be used a lot.

If students want to share files, the either do it through Google Drive/Discord/etc or if they are planning to pirate something through torrents. But still fun nonetheless.

>>424 made a good point too.

File: 11961d79a8fde72⋯.png (14.31 KB, 500x500, 1:1, opengraph.png)


Does anyone know of any reliable crypto currency tradeing sites that don't require id any help is appreciated


check out >>>/biz/ for cryptocurrency info


I'd love to see someone create an offline trader to throw into priateboxes. Maybe we'll re brand to treasure-trove or something.

so people can swap their coins, without fees, and without any trace

File: 1444383238752.png (458.17 KB, 1239x1640, 1239:1640, paranoid anons tech guide.png)


I'm passing this on to /netplus/ because I don't want you to be left out and uninformed.

Dumping massive /tech/ guide and redpill


following these instructions may severely break your computer and firefox and may ruin your privacy and your entire life.

do any of these things at your own risk.

I am not responsible for anything bad that happens to you.

Some of these things DO mess up your ability to use 8chan and screw up the way the site functions so pick and choose carefully, use saves/different profiles or something.

This may void your warranty.

Ask a professional and the mozilla team before doing anything.

You have been warned.

first open about:config

to protect against SSLv3 exploit you can use the mozilla addon "SSL version control"

or set security.tls.version.min = 1 in about:config for Mozilla Firefox.

To restore change the value back to the security.tls.version.min = 0. That's it.

In Mozilla Thunderbird you can set it also in about:config, which You can find in: Tools → Options → Advanced → General → Config Editor.

Always use a firefox fork that gets regular good security updates. never use a main distribution. the underdogs are your friends.

remember to explore "about:permissions" as well.

(search these so they come up)

network.http.pipelining TRUE

network.http.pipeliniPost too long. Click here to view the full text.

7 posts omitted. Click reply to view.


The project is strongly endorsed by various feminist groups that have nothing to do with technology. The system is headed by a developer reputed for making low-quality software. If literally any other piece of software had the kind of bugs described in the various systemd issue trackers, they wouldn't even be accepted in distro repos, yet systemd has been widely adopted in a matter of months, breaking compatibility and not offering upgrade paths even on the likes of strong server OSs like debian or centos. SELinux - a NSA project - developers are strongly for systemd, nevermind the numerous bugs and undoubtedly numerous security vulnerabilities. Speaking of, there has been NO audit of systemd even though everyone is accepting systemd no matter how security-sensitive the distro is meant to be. It's pretty evident that something is really wrong with systemd's adoption. basically the bastards who want to enslave the world decided that the best way to control opensource is to create their own and promote it until it's the standard even though it shouldn't be.

new people would fall for it and the more knowledgeable are facing a lack of support for their alternatives. The project to create an all-encompassing system that can be easily infiltrated by, at will to provide root access and spy on arbitrary non-backdoored systems is being funded by, and is being promoted by the, global elite across the entire community. It's clear that the adoption of systemd is not normal and there's something hiding behind it. Nobody has ever been specific about what kind of problem systemd solves, nobody has ever even mentioned having a problem before systemd appeared, and suddenly it spreads like wildfire.

systemd's design is flawed intentionally to increase its attack vector and make it vulnerable for outside attackers to break it more easily. There is a reason why systemd is pushed by Red hat, an American company with very close ties to the N$@. Red hat controls Fedora, so Fedora adopted it first, then Red hat enterprise linux and because Red hat funds most of debian, they also caved in. Basically all of the major distros are controlled by Red hat one way or another. Everyone hates Gnome, yet it is still here, why you ask…… it is Red hat. Red Hat wants control of Linux. Anyone who opposes systemd is in the way of them controPost too long. Click here to view the full text.


that's all. I hope this helps many of you.


So, you crossposted this shit on netplus too.

How many boards did you spam with this? 5? 10? Jeez


Thanks anon- you've saved at least one life tonight


looks like an in proved version of this but not fully.

The paranoid #! Security Guide


File: 1434726719330.gif (1.99 MB, 766x800, 383:400, 1433540833072.gif)


Hi, for someone who is a complete newbie to all of this, do you have any info graphics or simple guides on how to get started with general internet security, how to easily get proxies running, what you can/can't do on Tor (how does one for example handle downloads and torrents) ect?

Thanks in advance, and it's great this board exist!

19 posts and 9 image replies omitted. Click reply to view.



So what is his

>I can tell you with a lot of certainty LE does hate Tails. It makes push button forensics basically impossible which drives up costs as we need specialized staff to do covert activity online. It also means we spend more time looking at less evidence, officers usually take everything on a raid, in some cases its resulted in huge portions of useless crap we have to look at.

is all a ruse, tying to convince people to use TAILS because they have a 0day?



Also need to disable webfonts (its what pwned tor users, kaspersky labs, and even cryptostorm's test network) , randomagentspoofer has this option as well as many good ones. uMatrix should be added as well



Remember to ignore/filter all post who say something technical is bad but gives no technical explanation




can someone duplicate this and remove the pedophilia? im already on a list for downloading Tor. I don't want to get put on another list that will get me into jail.



>fucko.png, post 810

>"Think of the children!"

I admit I laughed.

File: da22757bbee6400⋯.png (149.31 KB, 897x456, 299:152, images.duckduckgo.com.png)


Do any of you gents do distributed computing besides cryptocurrency? I'm familiar with folding@home, seti@home and distributed.net. Are there any other projects worthy of dedicating CPU/GPU to?


Plan9 and 9Front

File: 3473f43857cbccb⋯.png (369.08 KB, 366x554, 183:277, capture4.PNG)



Hey Guys, I stay in a youth hostel where i have access to the wifi but the router password has been changed. I'm trying to find the router password just as a practice. Can any one help me with the process ?

The router is a Technicolor model:


I have exploited all it's javascripts, Please do share your idea's and view on how to access it.

Delete Post [ ]
Previous [1] [2] [3] [4]
| Catalog | Nerve Center | Cancer
[ / / / / / / / / / / / / / ] [ dir / agatha2 / animu / bestemma / bmn / in / just / sw / tingles ]