[ / / / / / / / / / / / / / ] [ dir / 2hu / ara / b2 / choroy / dempart / ita / otter / vichan ]

/tech/ - Technology

Catalog   Archive

Winner of the 82rd Attention-Hungry Games
/tikilounge/ - Relax, take it easy

June 2019 - 8chan Transparency Report
Comment *
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Show oekaki applet
(replaces files and can be used instead)

Allowed file types:jpg, jpeg, gif, png, webm, mp4, pdf
Max filesize is 16 MB.
Max image dimensions are 15000 x 15000.
You may upload 3 per post.

File: 9ad49a10a43fab2⋯.jpg (58.38 KB, 700x525, 4:3, Tecnologia-Google-e-i-big-….jpg)



>Huawei has been blocked from using Google software on its phones, dealing a huge blow to the Chinese tech giant. New Huawei-made phones will not have access to apps such as Gmail, Google Maps and the Google Play store. Existing phones will still have the apps but users will not be able to upgrade to newer versions of the Android operating system.

>Huawei can still use Android’s open-source alternative but it will not include Google’s own-brand apps such as Gmail. Google’s move comes after President Trump banned Huawei from U.S. networks, and the firm said today it was taking ‘steps to comply with recent government actions’.

>The move from Google deals a major blow to the expansion of Huawei and is likely to cripple its expansion.

<This is an unprecedented move that ostracizes what may currently be the best phone manufacturer in the world. Consider that there is no alternative. Phones are either iPhones with iOS or Android devices. No matter how good of an alternative to these Google apps Huawei makes, the fact that their phones don’t have official Google apps will definitely influence people looking for a new phone.

>Huawei confirmed it has developed its own operating system that could replace Google’s Android and Microsoft’s Windows should it be barred from using American-made products. The prospect of being banned from such products has intensified for Huawei in the wake of its recent lawsuit against the US government.

>“We have prepared our own operating system. Should it ever happen that we can no longer use these systems, we would be prepared,” Huawei executive Richard Yu said.

Could this be a chance for a non-Google fork of Android to enter the mainstream market?

157 posts and 13 image replies omitted. Click reply to view.



>"i know more about (some subject) than you do, therefore fuck you and kys"


America didn’t block huawei because of chink spyware. America blocked huawei because huawei refused to install NSA spyware.



Proof of your negative and your positive?



Lmfao dude you are fucking retarded. Literally nothing you said has any basis in reality.



i want to believe.

File: d4405afd9377915⋯.jpeg (224.92 KB, 1920x1280, 3:2, k3h98jilhfplzozdd8l5wglm0….jpeg)


Did he win?

>systemd is now the default for most Linux distros

>alternatives to the components of systemd are dying

228 posts and 19 image replies omitted. Click reply to view.



I hate sageniggers, so yes.



systemd IS the alternative nigger you forget systemd did not exist a few years ago.

systemd hate isnt even about init anyway people dont like systemd because

#1 it was FORCED on people all of a sudden.

#2 other programs REQUIRING systemd is a big problem and should NEVER happen there is no reason why a specific init system should be required to run gnome or whatever

#3 bloat getting bigger and bigger lol systemd replacing MOUNT

#4 likely a botnet or huge security holes.

systemd could have been a good init by itself but it just got too big like pottering's ego. I dont understand him, he takes apple's perfect software that works great then makes his own bootleg versions that run like shit just copy 1:1 and u would be hailed as the hero of linux bro

also binary logs are retarded


File: cb12e3c92c62f16⋯.jpg (53.08 KB, 900x506, 450:253, 4-format2020.jpg)


>implying jews can't be bribed into marching fellow merchants into gas chambers



>implying gas chambers existed aside from delousing chambers

kys kike



>hitler dindu nuffin the holoHOAX didn't happen

>oh btw hitler was a great guy for gassing the jews haha

>wait fuck

>i mean he was a great guy for totally not having but totally should having gassed the jews



>want to install linux

>choose lean and systemd free one: Void Linux

>run Void live cd

>there is no "install" icon on desktop or start menu

>read fucking manual, you have to put some stupid command into terminal to install it

>open installer

>installer doesn't format disk for you

>read fucking manual how this shit wants my filesystem to look like



>there is no GUI tool to set network configuration

>read manual, idiots tell to modify some stupid file

>open file manager, icons are empty, broken

>also toolbar icons are missing

>browse to folder where the file is located

>double click on it

>it asks me which program to use when opening this file, there is no text editor, this shit doesn't bundle with text editor

>open some shitty "vi" in terminal with this file

>try to write something

>when you want to move cursor it does some crazy things, you cannot go back to your line and continue writing

>there is no interface or explanation what to press on keyboard

>don't even know how to close this vi shit

>instead turn off PC

>proceed to remove linux shit from your disk

72 posts and 8 image replies omitted. Click reply to view.



>No, but I might be installing fucking Arch since it doesn't give you Xorg with the installer.

Now, I'm not sure about Arch, but there are probably distros that include gpm daemon. Meaning, you can copy/paste in loonix console.

>Would be unnecessary if there was an ncurses interface that just let you choose the damn UUID.

Yaknow, if I installed 10+ new systems every day, I might think about it. Or maybe I just would write a script for it once, because it's easier than interfacing with some program to lookup possible block devices and make uuids out of them. We're working hot garbage bazaar here.

>How about not needing to waste my time reading stuff that I don't care about before going on with my life?

How about you shut up your stupid mouth? Are you telling me right now that with some mount options given to you in GUI without reference, you're gonna magically know what they do? That shit isn't self-explanatory, yo. Are you gonna squeeze that shit into pop-up hints? Get outta here, seriously.

>Isn't the purpose of fstab mounting filesystems?

Some encrypted block of data isn't exactly a filesystem. It could be anything, and mount would rightfully choke up if not for some other program to make actual addressing available. That's why you use crypttab or whatever.

>Why should each user have to write a hacked together script to do what should be basic OS functionality?

I don't use disk encryption, because if glowers will come for me in my country, I will be just tortured to say all keys, and I am not sure about yours either. I mean, if there is a lot at stake for them, they might just torture you.

But AFAIK disk encryption is not really "hacked together" in loonix.

Also, what mainstream systems support full disk encryption as a part of OS functionality? Real mode: without strings attached? xD

>deniable (headerless) encryption.

Deniable, my ass.

>Oh, isPost too long. Click here to view the full text.





>Are you gonna squeeze that shit into pop-up hints?

See? You're learning how to design good user interfaces! Good boy!

>It could be anything

It mounts the LVM pv after it's opened with dm-crypt you mong.

>I will be just tortured to say all keys

That's why you put your encrypted data into the free space of a Windows filesystem and say you filled the disk with urandom before creating the partition you fucking drooling nigger.

>Also, what mainstream systems support full disk encryption as a part of OS functionality? Real mode: without strings attached? xD

None, that's why I said disk encryption on Linux is a hacked together piece of shit. See? Even with brain damage you can figure some things out. Good job!



>the mouse is shit

Laptop niggers can fuck off honestly. You fags are just a precursor to the touch screen retards who in about 3 years will be telling us all their great ideas about UI.



>See? You're learning how to design good user interfaces!

Get outta here with that nonsense.

There is only so much you can put into hints without turning your UI into shit. man mount is fucking huge though, so you would have to redesign mount interface too, which was mostly the point of the previous post.

>It mounts the LVM pv after it's opened with dm-crypt you mong.

That means if you took your time to configure a lot of other shit for that, it shouldn't be a problem for you to do a final step in fstab.

>That's why you put your encrypted data into the free space of a Windows filesystem

That looks like a recipe for failure TBH. I wouldn't have anything of importance on some traveling system, and if glowers come for you to your home, they will seize everything if they are not retarded. Thus, no sensitive data at home, period.

>None, that's why I said disk encryption on Linux is a hacked together piece of shit.

It has kernel support, so whatever.


>clicking retard projecting

Nice one.



kys brainlet


What are /tech/'s thoughts on the feasibility of a global meshnet as an alternative to the internet?

I have to say, updating the *Internet as a platform* is an interesting idea. We all eventually replace or update or patch our internet-connected devices, why not also the means that makes them useful? When considering the internet as a platform, how would you improve it?

I am particularly interested in this idea not only for the fact that it would mitigate censorship and allow universal access but also because i have come to realize that the Internet is the great equalizer in the digital age. Anyone can log on and find an answer; start a business; find a home; hire an employee; and so on.

As i see it, an alternative internet is an opportunity for humanity to create something truly special, a non-natural resource that is unlimited and free. De-centralizing such a powerful resource would, in my opinion, be the only way ensure its endurance in the future as a resource that connects and informs.

I would love to hear some other perspectives on the topic. For me, I want to be free from interference.

35 posts and 2 image replies omitted. Click reply to view.


File: 71ac56a8cfa4de3⋯.png (128.2 KB, 800x580, 40:29, 1*rzpn-WRHzz0X7yccXkB6Aw.png)


Interesting info on JS8Call (ultra-low bandwidth mode) which has some mesh networking capabilities:


Problem is AFAIK it can only make one hop. There's no routing built in, so some kind of protocol should have to be built on top of that. And then some kind of solar powered relay needs to be made so people can set it up cheaply. The transmitters can be as small as this https://www.hamradioreviews.eu/2017/01/23/keychain-qrp/




Not exactly related, but if you are in the US and you want to establish a municipal mesh net, you should put together a proposal to install some Ubiquiti APs or other turn-key mesh WiFi routing hardware. Get a couple neighborhood association busybodies into the idea, get Planning staff to consider it, and then apply for a FEMA PDM grant to buy and install the routers. Most PDM grant applications are for stupid make-work construction contracts for "underserved" groups, so your competition is weak. Pitch the idea as a resilience and continuity of government plan. Have directional links between the library, emergency services and city hall so that they have a secondary, local comms network if the ISP goes down. Sprinkle in some sob story about how a free muni-net could help black people apply for jobs or get an ejucayshun from their smart phones while they're hanging out at the bus stop.

I think the problem with the Internet as-is is the fact that a small cartel of telecoms owns the physical infrastructure, and if they drop packets to tor/i2p/freenet or wherever, then you really can't do anything about it.



>The only truly good solution is satellites, except they're too expensive.


> I've also heard it (usenet) used to be beamed through satellite


>So how do you connect across the ocean? Satellites?


>On satellites there barely is any amateur packet radio activity whatsoever.


>On the other hand, if you tap into military (and probably commercial) satellites expect to be fucked in the ass until you bleed


>unless we're talking about urgent tactical info for which satellite phones and ham radio are likely to be more adequate.

People hijack military satellites for years. Was very common in Brazil.




Yeah that's what I mean. If you do that shit on the regular in the US you're bound to get a visit from law enforcement and get your shit pushed in in federal prison.

Even the Brazilian government has been pressured into arresting people.

Now with commercial satellites there's probably less enforcement (unless they decide to throw the computer fraud act at you if they're really pissed off), but the tx frequencies aren't easy to find (for rx freqs just point a dish at it and scan the spectrum on an sdr), and it requires better equipment than satcom which is designed to be able to be reliably talked into with a potato.

File: 3603737bbc9a77c⋯.jpg (76.81 KB, 708x531, 4:3, key.jpg)


Today I woke up thinking about doing a new network. I thought such thing could be fun even if only I use it to connect my computers.

The most distinctive feature would be the asynchronous packets. A node can send a packet to disconnected node, and this packet would be stored (for a limited time) by intermediate nodes until it could be delivered. Of course, the packets would be end-to-end encrypted to prevent the routing nodes from reading the content.

Now, I'm in doubt about a point. Should the network be anonymous? I think this could be achieved by identifying the destination node with a code that only this node would recognize (think of something like an RSA signature) and each packet must be distributed and stored only its claimed. But them, how can a DoS be mitigated if you cannot identify the source? Of course, you can know the where the packets came from (the IP address if the network is on top of the Internet), but a clever attack would route the packets through different nodes in the network.

So, in short, opinions? Suggestions for reading? I will be checking the FreeNet because the cache capability may be something similar to what I describe as asynchronous packets.

13 posts omitted. Click reply to view.



>Not if you have millions of nodes.

Yes they do lol. You not wanting to use it is another thing entirely.

>You need nodes to act as relays, so that you can send a message to a PK without knowing the IP of the recipient.

Oh, so you're talking about onion routing. Yeah, I was talking about mesh metworking separate from the Internet, another thing entirely. Onion routing is pretty much a solved problem, go look at Tor, i2p, Freenet, IPFS, DHS for peer exchange, etc. for ideas. But Tor is already pretty much as good as it gets except for a few tweaks here and there, and yeah they do it with public keys for the hidden services.

But I don't think that's what OP had in mind, given he talks about store and forward kinda stuff.



I think if OP explained what the network would be used for / what requirements it needs to meet, then we could give more specific help.



OP here. First, thanks for the discussion and suggestions.

This would be hobby project, so there aren't any big or overly specific goals. One idea I have in mind is to connect devices I have physical access (i.e.: desktop computer, laptop, phone, work computer) in a private network and use the asynchronous features to keep files, messages or a database of events synchronized. Some devices may connect through the internet and others through LAN (or even directly coping files like an Sneakernet). Of course, for this anonymization wouldn't be so important, that and the question about DoS attacks was out of interest in the topic. But, it could be an interesting feature in case some nodes function from devices I don't own and control completely.

Another idea I have related to this use case is that of "asynchronous streams". Some server node could host a stream that would be just a sequence of permanently stored packets that can be retrieved starting from any point. This could be useful for file (o message) synchronization, so a node would host (o broadcast and let other host) periodic information about the changes and subscribed nodes read the stream continuing from where then left last time.

Of course, I'm aware something like this was in use with NNTP/UUCP before the Internet and permanent connections became widely available.

For now this are just ideas, but I think I can learn something at least and maybe release some code if I advance enough.


About mesh networks, smartphones connecting with each other directly through NFC, Bluetooth or WiFi in densely populated areas could make an alternative network, if enough devices participate.

All the examples of onion routing are interesting study cases, though not all of them have the asynchronous feature (I think IPFS and DHS with bitorrent does) and I'am not sure theyPost too long. Click here to view the full text.



Not him, but it probably means a network where if somebody accuses you of requesting, sending, or receiving certain data -like cp- you can produce tangible proof signed by other nodes on the network that you never requested, sent, or received that data, and if you did and somebody accuses you of it and you can't produce evidence, it becomes very hard to refute the accusation (as opposed to completely anonymous networks where everybody can refute accusations with about the same level of credibility). Thus non-refutability, being unable to refute something.



No, it's the other way around. You can present proof that a certain packet originated from a certain node. It's a proof of knowledge, proofs of ignorance are impossible (in most/all nontrivial cases).

File: 75f77121d3101bd⋯.jpeg (13.81 KB, 220x318, 110:159, images (8).jpeg)


I'm currently a Math Major. Will this distill most of CS? How will this compare to PAPL? https://papl.cs.brown.edu/2016/

72 posts and 1 image reply omitted. Click reply to view.



Either burnout or slow pace.

For me it was the glacial pace of my peers. I just said fuck it, skipped school, and hung around my cousin and friends.

also this >>1066216



There is lectures for PAPL


It's probably the greatest introductory CS course since the 1980s when they invented 6.001.


have none of you guys heard of techyourselfcs.com?

if you don't like SICP read How to Design Programs or Concepts, Techniques, and Models of Computer Programming.

CS is more than just programming.


SICP doesn't cover everything, but at least you will learn some computer science. UNIX weenie courses, the kind that make people hate computers, don't even teach computer science. They teach how to run UNIX and compile C programs. Instead of calling it a UNIX class, they give it a name like "Operating System Engineering" (aka UNIX kludges) and "Great Ideas in Computer Architecture" (aka RISC and UNIX brain damage).


>Great Ideas in Computer Architecture (Machine Structures)

>C Intro, Pointers

>C Arrays, Strings, Pointers

>C Memory Management, Usage

>Intro to Assembly Language, RISC-V Intro

Learning a new OS used to be something people would do when they get a new computer, but because of all the brain damage in UNIX, it takes many times longer to learn (years instead of weeks) even though it has less functionality and fewer features (unless you count bugs and remote exploits as features).

A real computer science class about operating systems would teach many different ones, and probably only one UNIX-like OS as a bad example. And you would know how much UNIX sucks just by comparing it to the other operating systems you learned. They don't even have to "teach" it because it's obvious. You could fail the class and still learn that UNIX sucks, just by having to use it after using something better.


>For many years, MIT had no operating systems course. In the fall of 2002, one was created to teach operating systems engineering. In the course lectures, the class worked through Sixth Edition Unix (aka V6) using John Lions's famous commentary. In the lab assignments, students wrote most of an exokernel operating system, eventually named Jos, for the Intel x86. Exposing students to multiple systems–V6 and Jos–helped develop a sense of the spPost too long. Click here to view the full text.


File: 0ceb20b42e3b950⋯.jpg (51.31 KB, 499x500, 499:500, 1539515648651.jpg)


What makes a good programming font? Which font are you using and why?

77 posts and 11 image replies omitted. Click reply to view.




I have f.lux but that's not enough for me



>nullify the benefits of a larger screen real estate provided by a higher resolution display by enlarging the fonts so they are the same size again

Glyphs are a waste anyway (they carry a very low of information per bit), thus ideally they should be as small as possible.



>larger screen real estate means enlarging fonts

the pt standard doesn't depend on the size of the screen, it only depends on pixel size. Unless your screen decreased the size of the pixel, then more screen space =/= smaller fonts.


>it's all about information bits

maybe the screen bits should huffman encoded to display as much information as possible



Can you even send letters more than once or does the browser cache prevent the request? Is there any example page?


File: 3c23e731c05594f⋯.jpg (50.81 KB, 600x581, 600:581, laughinginteresting.jpg)


>You can stop the connection by pressing the X

Kek. You probably think your cell switches off when you press the off switch and it has a non-removable battery.

File: c7806a9e5efbf4c⋯.png (5.14 KB, 252x200, 63:50, download.png)


Ubuntu will drop 32-bit x86 arch entirely. If you ever needed an excuse to ditch this absolute joke of a disto in favor of the one they've been copying for years, now would be a good time.


92 posts and 10 image replies omitted. Click reply to view.



*forced TO play




Who? Which users use only 32 bit CPUs and Ubuntu at the same time?


File: b8e5d8959158594⋯.png (1.41 MB, 1918x1079, 1918:1079, Screenshot from 2019-06-23….png)


So much going on here that makes me want to throw up


Budgie is very nice out of the box. Still no reason to change it. Maybe I will find a decent wallpaper but I can't be assed.


Seeing as amd64 has been the norm for the past 15 years unless you have one of those shitty first-gen netbooks .

> What's the point, if you can't even trust these devices? You can have a supercomputer, but if it's backdoored and obeys someones orders it is useless. Maybe one day we'll have NVMe drives respecting user's freedom, but now we have to do things without them.

There is a 100% chance multiple government agencies have complete control over your computer. Stop living in denial.


Brainlets use macOS because (((they))) tell them to.


Pentium 4 supports x86-64. Only early atoms did not support x86-64

All Atom processors implement the x86 (IA-32) instruction set; however, support for the AMD 64 instruction set was not added until the desktop Diamondville and desktop and mobile Pineview cores. The Atom N2xx and Z5xx series Atom models cannot run x86-64 code.[25] The Centerton server processors will support the Intel 64 instruction set.[7] 



>Pentium 4 supports x86-64

Only the very last models. The overwhelming majority of Pentium 4 CPUs were x86 only.

(Similarly, almost all Pentium 4 CPUs didn't support the NX bit, which means Windows 7 is the last Windows which can be installed on them.)



Both snap and flatpacks are a hipster solution to portable Linux programs.

Like a site that can't function without a obscene amount of cross site scripting, a offline program that uses a pigfat heavy browser engine for GUI side of things or having blind faith in that a javascript repository will never be compromised or monetized.

File: 6564be48b585dff⋯.png (691.81 KB, 866x714, 433:357, ClipboardImage.png)


Even Linus uses light theme and gets work done.

Dark theme is only used by LARPing NEETs.

Prove me wrong, protip: you can't!

10 posts omitted. Click reply to view.



>Here in Germany, it's fucking unbearable in the summer

It hasn't been that way though. It's just $RECENT_YEARS.



LCD screens use more power though for displaying dark pixels (as opposed to CRTs).



>LCD screens use the same or less power to display a black pixel instead of a white and emit less light when dark color is displayed.


Only reason everything is bright these days is retards hating on grey and black because of muh modern ui, big corps like google, flat themes etc.

Interfaces were grey for a reason and Youtube was dark grey to black too.


Only basement dwellers use dark themes.

>muh nostalgia

Completely false, as the first GUIs used dark text on light background everywhere.



why would they when they are black/dark in their default state? showing a color on it takes power


Full remote backdoor available in all Intel and AMD computers since 2003

All your keystrokes, screens, files can be remotely read or modified on demand at any time by MOSSAD, even if your PC is turned off. That includes your encryption password.

Pre-PSP and pre-ME cpu's are not safe. ASF and DASH are previous versions of PSP/ME botnet. ASF --> DASH --> ME/PSP


Alert Standard Format (ASF) (also sometimes referred to as Alert Standard Forum, Alerting Specifications Forum, Alert Specification Function, etc.) is a DMTF standard for remote monitoring, management and control of computer systems in both OS-present and OS-absent environments.


>DASH provides support for the redirection of KVM (Keyboard, Video and Mouse) and text consoles, as well as USB and media, and supports the management of software updates, BIOS (Basic Input Output System), batteries, NIC (Network Interface Card), MAC and IP addresses, as well as DNS and DHCP configuration. DASH specifications also address operating system status, opaque data management, and more.

they can access your keyboard, video, mouse over the internet


Desktop and mobile Architecture for System Hardware (DASH) is a Distributed Management Task Force (DMTF) standard.

>Intel Active Management Technology is a compliant implementation of DASH.


Post too long. Click here to view the full text.
126 posts and 17 image replies omitted. Click reply to view.



They do it through radio waves which are actually microwaves that can bend through the air and concentrate power directly on your board, which turns it on. It's the same technology they use to shock superman's balls.


Your PC isn't actually off, just "off". They market this as a feature.



Got any proof or just baseless claims from sources you have not even read?



if you remove the power cable then it is really off(if laptop then you remove the batteries too). if you dont then its indeed in some standby mode since it can be started with a modern non mechanical button. the old computers that were really off would be turned on/off with a real mechanical switch.



how the fuck do you think wake on lan works

File: ef87f3a79510a15⋯.jpg (20.26 KB, 840x400, 21:10, koch-soros-censorship.jpg)


10 posts omitted. Click reply to view.







>still implying he was the zodiac killer





How are all the Firefox forks different from each other?


Palemoon seems too far away from the stock firefox user experience and isn't compatible with my config and most of my addons.

I've tried Waterfox earlier, copied over my ff profile and now that I installed it again to try it out it worked perfectly with that profile with especially all the extensions I have in FF.

I thought, cool, but I need to update that profile. Backed up the profile and replaced copied it over anew from FF. Cool, but the addons didn't work (incompatible). So I reset it, copied over everything but addons and extensions files and folders - worked, but all the tabs I had open in firefox (about 300) wouldn't load now. I fixed that by creating bookmarks of all tabs so I could just close the windows and end the broken session, which worked, but I found my addons wouldn't work either.

I then got back to the backup of the old profile with the addons that worked, but they didn't. Still incompatible.

The logical conclusion here is that I have to invest some time, figure out alternative addons and take the time to really configure Waterfox rather than copying everything over.

But I have some hope it might be due to the certificates, because again, it worked 20 minutes ago with exactly the old profile I made a backup of. Does anyone know? The "studies" thing that fixed addons in Firefox lately obviously isn't available here. Also it's hard to believe there is no NoScript for Waterfox. The search doesn't find any though. Also some Addons appear to be enabled, but where are the menu options and fucking icons?

I remember there being trick to make it work, I was just too lazy to try them out last time. I have no hope the solution is still among those 300 tabs.

File: 0e1cf14b55c2adc⋯.jpg (5.85 KB, 318x159, 2:1, index.jpg)


recently i have been having trouble confirming the PGP key for TOR; every-time it comes back as a negative match. is anybody else having this issue?

36 posts and 2 image replies omitted. Click reply to view.



The problem isn't software, but cost and risk. Who pays for all the bandwidth? Who pays to host the servers? Who accepts the risk of owning an endpoint with massive throughput of CP and drug deals every day?

That answer seems to be the US Government.



If the network was well designed it wouldn't matter if the exit node was CIA (unless you were dumb enough to use plain text).

All that matters is that your traffic goes through at least a couple non compromised nodes.

Tor's default is 3 nodes including the Guard server and exit node (so really only one non CIA node if you're lucky).

You can increase this number, but guess what. THAT BY ITSELF DEANONYMIZES YOU! I'm not making that up! The number is sent in plaintext!



The idea of users donating bandwidth seems great, if they can fix it somehow. And just purge specific compromised exit nodes(?) I don't see a download for HORNET yet, 2016 posts suggest it's still being developed (then). I often wonder if somewhere on the darkweb, people are sharing better technology by now, or selling it.

I'm just interested in security, don't care what other people are using it for, ideally they wouldn't be using it to commit crimes, but let's face it, as long as criminals exist, crime will exist. Gotta be people out there coding stuff that rivals the best known online security though.

Recently I was really interested in what DietPi developed for the raspberry pi, an easy tor wifi hotspot, haven't been able to get it going beyond the raspi itself, no hotspot capability, even with an edimax attached or editing password configs, meh.



Go back to Reddit.



What's wrong, anon? Didn't get enough sleep?

File: 3620f733c39978b⋯.png (626.81 KB, 3896x1769, 3896:1769, systemd-slash-linux.png)


How do you feel about the future of "GNU/Linux"?

41 posts and 2 image replies omitted. Click reply to view.



It's IBM/RedHat/Poettering at this point.



Corporate/enterprise environments use only RedHat/CentOS, Debian, or SLES, so any "professional" setting is now 100% systemd (and has been for years really).



Fuchsia will be about as successful as OS/2 or Plan9.




Why include poetterware rather than dropping BT support? OpenBSD doesn't support BT.



Don't insult OS/2 like that.

File: c6b487bbc919aa5⋯.jpg (503.65 KB, 492x611, 492:611, archad.jpg)


2 or 3 years ago I read a post in some random website by one of the lead developers behind arch saying something along the lines of "I don't know where you people come from, the entire purpose of arch was to test software, which includes having the most complete release of everything in its latest version by default so that we can test it, if you're looking for a minimalist distro you picked one that directly opposes your goals"

I can't find it now, does anyone have a link to it?

6 posts omitted. Click reply to view.



ok, retard

systemd is endorsed by linus



Linus is also paid by microsoft



So? Why would he do what he does for free?



The very same. Thanks for the suggestions though gonna give Parabola and Hyperbola a spin when I get home from vacation. I might give Artix a try on my second thinkpad.



I really like Hyperbola, the project is pretty good. Probably in the future must become superior to the Parabola.

File: 01cb7813f027419⋯.png (670.6 KB, 1922x928, 961:464, Screenshot_2019-06-19_20-5….png)


I stumble upon this every now and then.

Is this true?

What's the backstory?

11 posts omitted. Click reply to view.



Does using uBlock Origin on Tor fuck up the browser thumbprint and make you identifiable though?



Being identifiable doesn't mean you'll be identified.


Aside from that. A good portion of internet users uses blockers.

Even if you use UMatrix. Detecting what exactly you block would require webpage specific javascript. Nobody does that.



He's a low IQ glow in the dark.

If your JS is disable no miners will run.



stop reading modern myths you pleb

Delete Post [ ]
[1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18]
| Catalog | Nerve Center | Cancer
[ / / / / / / / / / / / / / ] [ dir / 2hu / ara / b2 / choroy / dempart / ita / otter / vichan ]