[ / / / / / / / / / / / / / ] [ dir / abdl / choroy / coz / dempart / fascist / sissy / truebrit / vichan ]

/tech/ - Technology

Catalog   Archive

Winner of the 77nd Attention-Hungry Games
/x/ - Paranormal Phenomena and The RCP Authority

April 2019 - 8chan Transparency Report
Email
Subject
Comment *
Verification *
File
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Flag
Oekaki
Show oekaki applet
(replaces files and can be used instead)
Options

Allowed file types:jpg, jpeg, gif, png, webm, mp4, pdf
Max filesize is 16 MB.
Max image dimensions are 15000 x 15000.
You may upload 3 per post.


File: a6b208caec62316⋯.png (17.22 KB, 1039x726, 1039:726, 141414.png)

 No.1065075[Reply]

You motherfuckers know your shit

So I am asking if someone could help me do a simple personal HTML where I put images and gifs and they'd be scattered around like so in the page, where I could see everything

And I'd want the page to scroll down automatically, as to showcase all the images I've put on display and if there's a possibility for the cycle to start from beginning in a loop

Right now I am using very bare bones version of:

<!DOCTYPE html>

<html>

<body>

<center>

<img src="C:\Users\Me\Desktop\images\1.jpg">

<img src="C:\Users\Me\Desktop\images\gif\2.gif">

<img src="C:\Users\Me\Desktop\images\3.jpg">

</body>

</html>

I can only scroll it down myself, the images are next to each other horizontally and theres huge gaps between the images, I don't know how to make them packed tight

I only know very basic code so go easy on me

12 posts and 2 image replies omitted. Click reply to view.

 No.1065174

Use flexbox and it will be easy to do.


 No.1065178

>>1065075

It's another one of these problems where you don't even know what you want.


 No.1065260

Reconsider having the autoscroll shit. What is the point? Let people scroll at their own pace.


 No.1065269

>I got recruited to do work

>Was asked to do work

>Wat do?

<I'll ask 8chin's /tech/


 No.1065343

>>1065078

>>1065128

/thread

OP get ready to put in some time, because although it's simple and straightforward, it can be tedious.




File: b2438f7c9159511⋯.jpg (50.12 KB, 2048x352, 64:11, D5_NwuDXoAM5oNR.jpg)

 No.1064926[Reply]

SystemD uses rand() to generate random bytes for cryptographic purposes.

https://archive.fo/u8reJ

https://twitter.com/FiloSottile/status/1125840911299223554

30 posts and 3 image replies omitted. Click reply to view.

 No.1065155

>>1065145

>>1065136

>>1065134

>>1065046

>>1064947

fuck off poettering

>https://twitter.com/pid_eins

how do we even know this is poettering; what kind of faggot would have his screen-name be "pid_eins"

someone like poettering would get the kosher mark immediatly


 No.1065173

>>1065099

>>1065111

Use Evercrypt if it supports the algorithm you need.

>>1065155

>fuck off poettering

no u


 No.1065181

>how expensive is a hitman?

>we can pool some bitcoins

Does this trigger you, Poettering?


 No.1065193

>>1065181

shouldn't the triggering be left to the hitman?

>carlos.jpg


 No.1065333

>>1065150

not an argument

>>1065155

fuck off filippo




File: 22907d1c127af69⋯.jpg (2.7 KB, 184x184, 1:1, 2ch_anon.jpg)

 No.1065270[Reply]

Finally the fork of GoodByeDPI: Zapret is translated to english, even the readme is poor and shorten, the method is understandable.

Dividing http requests into TCP segments is a good idea to fool DPI.

Project main:

https://github.com/bol-van/zapret

English:

https://github.com/bol-van/zapret/blob/7fdc41fc217563c62f7253a71d340ef00d96c11a/docs/readme.eng.txt

 No.1065271

File: 1089d3c9dbdb587⋯.jpg (33.33 KB, 454x490, 227:245, wat_wat.jpg)

>>1065270

I still can't understand the installation of the project, do we have to set iptables rules? It just confuses me


 No.1065272

>>1065270

>Other DPIs stumble when the "Host:" header is written in another case: for example, "host:". Sometimes work adding extra space after the method: "GET /" => "GET /" or adding a dot at the end of the host name: "Host: kinozal.tv."

That is hilarious.


 No.1065314

>breaks requests into seperate tcp segments

what exactly is the point of this? and how can i as a person outside of slavland benifit from it?


 No.1065327

>>1065270

tfw you live in a country that blocks internet traffic


 No.1065331

>>1065270

Привет с Хабра.




File: 96dbb00e758468e⋯.png (356.93 KB, 876x876, 1:1, f9ef7f343f269e5470f9c340a6….png)

 No.1065329[Reply]

Where to learn IT security? Books, videos, courses? Idk because there is a lot of info along the internet but to collect it all in the head... is much more nontrivial task that seemed before. Looked for everything from "HOW TO HACK YOUR NEIGHBOUR'S WIFI ULTIMATE SKID TUTORIAL 3000" to OWASP, MIT Security Course & Metasploit Unleashed but still have the voids in my knowledge.

 No.1065347

>>1065329

QTDDTOT nigger.

Maybe if your post consisted of more than a run on sentence and some liberal cartoony picture then I might be inclined to give you some pointers, but it doesn't.

I will however say this

READ THE FUCKING STICKY

Now get out!

sage for shit thread




File: 4ec5500d02a0dd6⋯.jpg (347.33 KB, 998x630, 499:315, 1551145585150.jpg)

File: 0823b8eda85ab27⋯.jpg (55.79 KB, 796x647, 796:647, 1554609453554.jpg)

File: 9ec902eb5f29053⋯.png (1.22 MB, 1600x1179, 1600:1179, 1554696121007.png)

 No.1065182[Reply]

Program in c# and javascript because it's the closest thing to lisp you can get a job programming.

5 posts omitted. Click reply to view.

 No.1065257

File: 1405f42aa238088⋯.jpg (267.55 KB, 1000x1333, 1000:1333, FLAUNT-MAGAZINE-SONOYA-MIZ….jpg)

>>1065220

Sonoya Mizuno

Dr. Azumi Fujita from "Maniac" American drama miniseries.


 No.1065282


 No.1065295

microsoft abandoned C# for good reasons

javascript needs to be exterminated as soon as possible


 No.1065315

>>1065295

>microsoft abandoned C# for good reasons

Uh when lol


 No.1065323

>>1065315

when it rebooted Longhorn, entire os was supposed to built on C#




 No.1065186[Reply]

I'm looking for a new laptop right now ($400 budget), and I'd like to get hardware with no goverment backdoors (like Intel Management Engine or AMD Platform Security Processor). It needs to be something from the past 10 years, have at least 2GB of RAM, and be capable of running Debian.

 No.1065191


 No.1065192

>>1065191

Thinkpads still have Intel Management Engine. I've heard that you can disable it on some of them, but I'd prefer a device that doesn't even have it in the first place.


 No.1065201

>>1065192

Buy something with and AMD processor then.

>muh PSP

PSP and IME are not the same thing. For one, PSP has no access to the networks unless the OS grants it . Either way if an attacker has a privileged access to run such a thing, then he owns you already.


 No.1065311

>>1065186

> 400 USD

> no firmware backdoors

♪♫dream on♬♩

seriously, though- Even Libreboot hardware might be using proprietary EC (Embedded Controller) code. When even Google is giving up on open bringup firmware (see NERF, now called LinuxBoot) you know you're screwed.


 No.1065313

Not op but I also need to find a laptop that is free of backboors but unlike op funds are not an issue




File: 81a58ce73caa11d⋯.jpg (81.91 KB, 1280x720, 16:9, INTERNET CENSORSHIP PASSED.jpg)

 No.1045751[Reply]

160 posts and 23 image replies omitted. Click reply to view.

 No.1065234

>>1065231

Not quite. We require access to source code in order to have freedom. Without copyright, we would have the right to freedoms 0,2,3. Freedom 1 would be restricted by virtue of not being available to any user.


 No.1065236

>>1045751

These moves are all very obvious once everyone accepts that we are in the state of war. The entire western civilization is under siege and marked for destruction by a group that doesn't even have the honor to declare war out in the open. Instead they oppress the victim into silent acceptance of their own destruction.


 No.1065237

>>1065208

I don't think you know what you're saying. The countries being flooded by Africans are the countries who support the will of the EU. The countries who have secured their borders also oppose the EU's migration policy and are not being flooded.


 No.1065258

>>1045751

Copyrights are about controlling the dissemination of intellectual culture. If the first person to create a biface kept that from the rest of tribe we would be extinct. If the first person to control fire never shared what he had learned, we'd probably be extinct. If you limit the dissemination of technology you create further inequality in cognitive culture which leads to small groups of people having a hand up on larger groups of people. If every technological advance just leads to a small group having greater control over an even larger group where is this going to put us? It puts us in a technological dark age like in Medieval times when people only weathly and powerful people could read and write.

Information wants to be free. Liars and people who withhold information to control the masses are not working in anyone's best interest. These copyright laws are aimed at memes. He who controls the memes controls the world.

Here's what each of us should do.

Every time a company jumps on board with cenorship of any kind encourage people to boycott them.

Facebook politically censors everything. Print flyers about Minds and Gab. Physically walk around and hand them to people. Explain why Gab and Minds are better. Same with twitter.

Google. Start encouraging people to use DuckDuckGo. Personally use DuckDuckGo for a large percentage of your search queries.

Amazon: There are numerous ecommerce platforms where you can buy and sell. Stop using Amazon. If you are a big amazon seller start gradually moving your products to other platforms so you are not dependent on Amazon

Microsoft. Buy a 50 pack of DVDs and burn 50 Linux disks. Hand them out to people. Do it regularly. Start a Linux user group in your community. It will take work. Stop complaining and just do it.

YouTube Start mirror YouTube contentPost too long. Click here to view the full text.


 No.1065259

>>1065258

>that whole post

big OOOF




File: c2460c2504d7c5e⋯.jpg (102.4 KB, 1280x720, 16:9, ching chong.jpg)

 No.1064998[Reply]

The (South Korean) government will switch the operating system of its computers from Windows to Linux, the Ministry of the Interior and Safety said Thursday.

>The Interior Ministry said the ministry will be test-running Linux on its PCs, and if no security issues arise, Linux systems will be introduced more widely within the government.

>The decision comes amid concerns about the cost of continuing to maintain Windows, as Microsoft’s free technical support for Windows 7 expires in January 2020.

>The transition to Linux OS and the purchase of new PCs are expected to cost the government about 780 billion won ($655 million), the ministry said.

>Before the government-wide adoption, the ministry said it would test if the system could be run on private networked devices without security risks and if compatibility could be achieved with existing websites and software which have been built to run on Windows.

>The ministry’s digital service bureau chief Choi Jang-hyuk said the ministry expects cost reductions through the introduction of the open-source OS and also hopes to avoid building reliance on a single operating system.

http://www.koreaherald.com/view.php?ud=20190517000378

http://archive.fo/hQ7SR

1 post and 1 image reply omitted. Click reply to view.

 No.1065010

The reason western governments are so reliant on Windows is because of the corrupt politians who undo all the efforts to switch gov PCs to Linux.

t. Windows user


 No.1065015

>yfw South korea becomes the freeist country in the world

Sorry, america, your time is over.


 No.1065074

>>1065002

Got some more buzzwords?


 No.1065243

I'd just like to interject for a moment. What you're referring to as Linux, is in fact, GNU/Linux, or as I've recently taken to calling it, GNU plus Linux. Linux is not an operating system unto itself, but rather another free component of a fully functioning GNU system made useful by the GNU corelibs, shell utilities and vital system components comprising a full OS as defined by POSIX.

Many computer users run a modified version of the GNU system every day, without realizing it. Through a peculiar turn of events, the version of GNU which is widely used today is often called "Linux", and many of its users are not aware that it is basically the GNU system, developed by the GNU Project.

There really is a Linux, and these people are using it, but it is just a part of the system they use. Linux is the kernel: the program in the system that allocates the machine's resources to the other programs that you run. The kernel is an essential part of an operating system, but useless by itself; it can only function in the context of a complete operating system. Linux is normally used in combination with the GNU operating system: the whole system is basically GNU with Linux added, or GNU/Linux. All the so-called "Linux" distributions are really GNU/Linux.


 No.1065245

>>1065002

>Maybe Linux developers will finally take their OS seriously, or let in people who want to take it seriously.

Well, Linux is just a kernel, whereas GNU/Linux is the system and GNU/Linux isn't an one thing - there are many distributions some of them are funny jokes or shit, like 'Hannah Montana linux', but some other distributions are being made seriously, for example Guix System, Gentoo, etc. But if by 'take their OS seriously' you mean clone Windows, then you should know, Windows isn't a serious OS, because it lacks basic features an OS should have, for example a proper package management. But there are distributions that try to be the same way Windows is - GNU/Linux Mint, Debian, RedHat, Fedora, basically everything having systemd.

Also the purpose of GNU/Linux isn't to make convenient environment for gamers and corporations wanting to sell their proprietary software, but its purpose is to give people freedom. And finally 'Linux developers' are just kernel developers, they don't shape how the OS looks like, that's what distro maintainers do.




File: 268ee9caee89895⋯.png (1.19 MB, 1200x1000, 6:5, 268ee9caee89895206cb8dcf93….png)

 No.1064620[Reply]

I purge dbus from my system and then install xfce. I got it to launch by symbolically linking dbus-launch to /bin/true and exporting a fake DBUS_SESSION_BUS_ADDRESS to fake network socket linking to /dev/null. But then the xorg-server crashed on startup with the weirdest fucking message

>*insert xorg crashes here*.... dbus-launch --autolaunch=fuck you

I shit you not, that was what appeared on the command line. I grepped through my entire filesystem and the xfce source tree to no avail to find the source of this message, as it shouldn't even appear since dbus is in no fashion installed. If I unsymbolic link dbus-launch it just crashes saying dbus-launch isn't installed. If I symbolic link but don't export DBUS_SESSION_BUS_ADDRESS then it crashes without the extensions to the command, dbus-launch.

/tech/, somebody here surely has gone through this. Where is the "dbus-launch --autolaunch=fuck you" coming from? I can't find it grepping the source files I compiled myself.

13 posts omitted. Click reply to view.

 No.1065118

>>1065106

Gnome, KDE, xfce, mate, cinammon, unity, and lxqt all have hard or token source code/runtime dependencies on dbus or dbus-launch as I just found out.

LXDE and lumina DE are your two choices for sanity or just use a WM alone. One is gtk2 or gtk3 based the other is QT based. You can make LXDE look like windows XP but I duno about making lumina look like windows for normalfag DE replacement. LXDE is stable and requires few updates. Lumina is a WIP that is not done. I'm sure with minimal editing xfce could be made to not use dbus. All the others, which I have checked out above, have non trivial usage of d

bus in their source code.

Of course all of this removes the functionality to click a radio button and shutdown/reboot/hibernate the computer. I have yet to find a replacement that interfaces with HAL to do so. DBUS interfaces with HAL to do all of that functionality and I can't find documentation on how to interface with HAL nor find it in the absolute shit that is dbus source code.


 No.1065126

>>1065118

Note that GTK3 requires DBus for accessibility shit which is not removable by configuration because lol gnome. See this for a patch: https://forums.gentoo.org/viewtopic-t-1084252-postdays-0-postorder-asc-start-50.html


 No.1065130

>>1065126

>note that gtk3 requires malware by default

Noted. I just used some repository to try this shit out. I dont know how any of this stuff actually works other then grepping source code is easy.


 No.1065164

Maybe Xorg has that exact condition in which you symlink your dbus-launch and it says "Fuck you" cause the programmer was mad at himself he kept getting that bug


 No.1065232

>>1064820

>openbox > icewm

IceWM is more lightweight and it has a working menu, panel, system monitor and clock that just werk out of box. IceWM's configuration files are way comfier than OpenBox. That being said, OpenBox is the 2nd most comfy WM.




 No.1065223[Reply]

 No.1065303

Zeronet is written by idiots and prefers marketing bullshit over technical details in its docs. That should be a red flag if you've ever seen one.




 No.1062808[Reply]

>consider installing devuan (debian without systemd)

>installer is 4GB

>consider installing OpenBSD

>installer is 0.4GB

why is linux so bloated and shit?

why don't they provide light and fat installers?

light = kernel, one desktop environment, some crucial software

fat = few desktop environments, a lot of software

any why is linux so bloated even in standard installer?

52 posts and 4 image replies omitted. Click reply to view.

 No.1065036

linux is bloated and malware (systemd)

macos and windows are superior


 No.1065070

>>1063056

Thank you for making this clear again.


 No.1065140

>>1063056

...so, is Linux Mint really:

Linux (kernel) + a "Mint modified" GNU OS + systemd?


 No.1065143

>>1065140

GNU is the basic OS and Linux is the kernel program that's paired with GNU. Mint is the branding of the specific GNU OS + Linux kernel + systemd manager combination.


 No.1065162

>>1062870

ebuild looks interesting. I actually enjoy writing install scripts.

>>1062824

I didn't realize so many people were in the anti-systemd camp.

>>1062810

ca$h do you have a build script for this? This is without any kind of package manager right? How minimal a system is it?




File: 957095eb5bec93f⋯.png (140.19 KB, 512x512, 1:1, 957095eb5bec93f6b1d72f6393….png)

 No.983922[Reply]

Last thread:

>>915966 (https://archive.is/rQakE)

Updates

0.4.17

>ipfs 0.4.17 is a quick release to fix a major performance regression in bitswap (mostly affecting go-ipfs → js-ipfs transfers). However, while motivated by this fix, this release contains a few other goodies that will excite some users.

>The headline feature in this release is urlstore support. Urlstore is a generalization of the filestore backend that can fetch file blocks from remote URLs on-demand instead of storing them in the local datastore.

>Additionally, we've added support for extracting inline blocks from CIDs (blocks inlined into CIDs using the identity hash function). However, go-ipfs won't yet create such CIDs so you're unlikely to see any in the wild.

Features

>URLStore (ipfs/go-ipfs#4896)

>Add trickle-dag support to the urlstore (ipfs/go-ipfs#5245).

>Allow specifying how the data field in the object get is encoded (ipfs/go-ipfs#5139)

>Add a -U flag to files ls to disable sorting (ipfs/go-ipfs#5219)

>Add an efficient --size-only flag to the repo stat (ipfs/go-ipfs#5010)

>Inline blocks in CIDs (ipfs/go-ipfs#5117)

Changes/Fixes

>Make ipfs files ls -l correctly report the hash and size of files (ipfs/go-ipfs#5045)

>Fix sorting of files ls (ipfs/go-ipfs#5219)

>Improve prefetching in ipfs cat and related commands (ipfs/go-ipfs#5162)

>Better error message when ipfs cp fails (ipfs/go-ipfs#5218)

>Don't wait for the peer to close it's end of a bitswap stream before considering the block "sent" (ipfs/go-ipfs#5258)

>Fix resolving links in shPost too long. Click here to view the full text.

329 posts and 71 image replies omitted. Click reply to view.

 No.1057797

File: d22bc8bb25226cd⋯.webm (135.38 KB, 640x360, 16:9, oy_vey_shut_it_down.webm)

Hosting your own data on your own machine? Who let this happen?


 No.1059027

Necrobumpity with a chat log showing the developers of LineageOS are fucked

/ipfs/QmcbapngtcQFVHHqGCf7eCtjAhjcPHvsgQwKjPS1NHW6G7


 No.1063494

File: 7c17c1fc66147d8⋯.jpg (67.06 KB, 1000x600, 5:3, hashish-history-hash-human….jpg)

>v0.4.20

DUDE HASH LMAO


 No.1064192

Is there a way to download a hash from a specific peer using their node address?


 No.1065147

>>1064192

For what purpose? If it's for privacy you probably want to create a private network.

https://github.com/ipfs/go-ipfs/blob/master/docs/experimental-features.md#private-networks




File: e32efeb5feb31c6⋯.jpg (708.06 KB, 1920x1080, 16:9, RVPC_Finished.jpg)

 No.1029868[Reply]

>While it’s clear that the most significant opportunities for RISC-V will be in democratising custom silicon for accelerating specific tasks and enabling new applications — and it’s already driving a renaissance in novel computer architectures, for e.g. IoT and edge processing — one question that people cannot help but ask is, so when can I have a RISC-V PC? The answer to which is, right now.

https://abopen.com/news/building-a-risc-v-pc/

Only 4000$ !

58 posts and 5 image replies omitted. Click reply to view.

 No.1055451

>>1041679

No, you would disasemble it and look at the assembly code; not try to inspect a raw binary.


 No.1055482

>>1041585

That... kinda makes some sense


 No.1064248

>>1042101

An FPGA comparable to a modern processor? Probably not possible, FPGAs can't be optimized like an ASIC can. Xilinx and Intel are doing some ARM+FPGA SoCs, thats probably the closets you'll get.


 No.1064404

>>1029868

it's botnet


 No.1065144

>>1055444

interesting and based




File: 116247876cd1272⋯.png (90.83 KB, 734x452, 367:226, passwordcracker.png)

 No.1064844[Reply]

I decided password recovery / cracking would be a good subject for starting people on security related topics. For you complete /newfags/ a hash is pretty much a one way cryptographic function that in most cases is not reversible. In any modern authentication a password hash is stored rather than a plaintext password.

When you punch in your password on a web application to login the application takes your plaintext and feeds it to a cryptographic function then checks to see if it is equal to the stored value if it matches then access is granted. This way the application can function without every knowing your password.

Purpose of cracking a password hash. Recover a plaintext password user who forgot his password. There are a ton of application that can do this and I will discuss some of that later. Right now I just want to drop the basic concepts.

I'm going to do a dictionary attack against an MD5 hash for demonstration purposes. I'll go over the steps. It's actually pretty simple.

Legal disclaimer. Don't break into other people's computer systems or networks unless you have permission. You put on your own pants in the morning and you know the difference between right and wrong. If you don't know the laws where you are at look them up or consult an attorney before penetrating computers or networks that you do not own.

Alright let's have some fun.


#!/usr/bin/python
import sys
import hashlib

myhash = sys.argv[1]
thehash = myhash.strip()
dictionary = sys.argv[2]
thedic=dictionary.strip()


with open(thedic, 'r') as fa:
for pwd in fa:
newhash = hashlib.md5(pwd.encode("utf-8")).hexdigest()
print 'Trying password ' + pwd.strip() +' ------> '+ newhash.strip()
if newhash == thehash:
print '\n\n\n\nPassword Found! '+pwd.strip()

11 posts omitted. Click reply to view.

 No.1065041

File: 43634395f753a8a⋯.png (307.81 KB, 673x462, 673:462, ci0clqtx.png)

What's the point of this thread if you're just going to import a library that does the whole thing for you?


 No.1065042

>>1065041

That’s pretty much what 90 percent of software development is these days fam


 No.1065044

>>1065042

No wonder modern software is so shit.


 No.1065082

>>1065044

Yep, software today would be far better if nobody used libraries and every single program reimplemented all of its hashing, encryption, encoding, and network functionality from scratch. That's a reasonable thought and not at all completely fucking retarded.


 No.1065107

>>1065082

What is automation scripting? Take a bunch of programs that already exist. Write a script that calls programs and gets output from them. For some things like this hash cracking bullshit yeah you don't really even need a crypto libraries just a header and addtional file as with this C++ implementation. http://www.zedwood.com/article/cpp-md5-function You could code all of that and compile it or you could just

$(echo -n password | md5sum | cut -d ' ' -f 1)
Get the value as a variable in a bash script and work with it. Depends on if you value your time or maybe you want to write closed source software and sell it. Not sure what your motive (other then developing deeper understanding of a given language) for writing all of that extra code would be. Don't get me wrong. I see where you are coming from. I just don't give a shit.

If you need to reverse engineer the hashing algorithm that's another story. Godspeed.

But honestly most languages built in crypto.

Also why rewrite an library when you can just write a function or two and get the result you want.




File: ac27611cf124b03⋯.jpg (99.59 KB, 960x684, 80:57, vpn-usage.jpg)

 No.1064408[Reply]

The global VPN market is estimated to be worth 23.6 billion in 2019 according to: https://www.statista.com/statistics/542817/worldwide-virtual-private-network-market/

However, using a commercial VPN has one key disadvantage: You have to trust the company to not keep any logs or spy on you in any other way.

There are currently several projects in crpyo trying to tackle this problem with dVPNs, the idea is very simple, you can rent out or buy bandwidth/IP addresses.

These are the three main players at the moment:

Mysterium: already has a working testnet for windows, mac and android. I routinely use it on windows and android and it works well. They were the first player in the market. Based on Ethereum.

Sentinel: They have a working version on testnet for windows, linux, mac and android. Also works really well. They also offer nodes connecting to tor for outgoing connections and are currently testing multihopping. Based on Cosmos.

Privatix: They are an existing VPN company (privatix.com is their page for their "normal" VPN) and they plan to bring over all their vpn users to their dVPN. Also working testnet on windows and linux. Also based on ethereum.

All three of them claim to be the first dVPN, however I think they are on the same level, all have working testnets, so the one that releases to mainnet first is not necessarily farther than the others.

Also all three can tap the market for residental IPs, which are currently very expensive (https://luminati.io/ is one of the leading providers and a residental IP costs 12.5 Dollar per GB with at least a 500 dollar per month commitment)

dVPNs will be able to beat both commercial VPN providers on price (because of more efficiPost too long. Click here to view the full text.

28 posts omitted. Click reply to view.

 No.1064896

Privacy has become an arms race of the people against governments.

Governments always win, except in meme wars.


 No.1064908

>>1064527

This defeats the point of a VPN... is this true?


 No.1064964

>>1064763

Tor is an acronym, guy.


 No.1065065

>>1064964

>>1064763

I don't think that is true, do you have any proof for that?

>This defeats the entire point of a dVPN and their code can be checked on https://github.com/mysteriumnetwork so I'm pretty sure there is no way they can see or control in any way what someone uses the vpn for, as the servers are not even controlled by them.

>Still I like the anonymous approach of sentinel more, as they cannot be touched legally by anyone for providing an uncontrollable vpn service.

>>>1064964

>the name is based on an acronym, but it's still Tor


 No.1065068

corrected post:

>>1064527

I don't think that is true, do you have any proof for that?

This defeats the entire point of a dVPN and their code can be checked on https://github.com/mysteriumnetwork so I'm pretty sure there is no way they can see or control in any way what someone uses the vpn for, as the servers are not even controlled by them.

Still I like the anonymous approach of sentinel more, as they cannot be touched legally by anyone for providing an uncontrollable vpn service.

>>1064964

the name is based on an acronym, but it's still Tor




Delete Post [ ]
[]
[1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18]
| Catalog | Nerve Center | Cancer
[ / / / / / / / / / / / / / ] [ dir / abdl / choroy / coz / dempart / fascist / sissy / truebrit / vichan ]