[ / / / / / / / / / / / / / ] [ dir / ausneets / b2 / choroy / cyber / dempart / doomer / fa / vichan ]

/tech/ - Technology

Catalog   Archive

Winner of the 75nd Attention-Hungry Games
/caco/ - Azarath Metrion Zinthos

March 2019 - 8chan Transparency Report
Comment *
Verification *
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Show oekaki applet
(replaces files and can be used instead)

Allowed file types:jpg, jpeg, gif, png, webm, mp4, pdf
Max filesize is 16 MB.
Max image dimensions are 15000 x 15000.
You may upload 3 per post.


Daily reminder to do your digging 8chab is being hosted by a San Fran based company

10 posts and 1 image reply omitted. Click reply to view.


>>1050799 for my purposes text is fine enough

t. torposter



Hence it is the case that Tor posters can post normally like the rest of us.



just browse 8chan in catalog mode and you won't notice until you click on the post


why does media.8ch.net keep connecting to Tor when im on the onion site?

I can see it popping up in my circuits

if I didn't mind the exit node seeing a 8ch domain id just use the normal 8ch domain and not the onion site



They can post links to pictures

File: f4aba6f468c394e⋯.mp4 (6.35 MB, 480x480, 1:1, you are complicit.mp4)


Got bored so I wrote a script for doing the dnsbls from your terminal, it'll spit the image out to /tmp/captcha.png and it'll display it with the command specified with the -d flag if specified.

while getopts ":d:h" opt; do
case "$opt" in
echo "Usage: dnsbls [-h] [-d IMAGE_DISPLAY_COMMAND]"
exit 255

function Captcha {
html=$(curl $dnsbls_url 2>/dev/null)
echo "$html"

function Captcha_id {
echo "$captcha" | grep -oP "(?<=value=['\"])[\S]+(?=['\"])"

function Captcha_image {
echo "$captcha" | grep -oP '(?<="data:image\/png;base64,)[\S]+(?=">)' | base64 -d > "$2"

function Captcha_submit {
captcha_id=$(Captcha_id "$captcha")

status="$(curl --output /dev/null -w %{http_code} -s --data "captcha_text=$captcha_text&captcha_cookie=$captcha_id" https://8ch.net/dnsbls_bypass.php)"

if [ "$status" -eq 200 ]
return 0
return 255

Captcha_image "$captcha" "/tmp/captcha.png"

if [ "$display_command" != "" ]
$display_command /tmp/captcha.png &
read answer
kill -15 "$display_process" 2>/dev/null
read answer

Captcha_submit "$captcha" "$answer"

23 posts and 3 image replies omitted. Click reply to view.


Lots of shills in this thread.


Wow. Just wow.


Europeons need to burn in a tar-pit. Disgusting


This isn't going to work. Try again.


This is a Q Boomer psy-ops.

File: 497a80c7934c26f⋯.jpg (68.88 KB, 330x330, 1:1, devil_bsd.jpg)



This list is for desktop oriented operating systems. List is ordered roughly by developmental stage.

BSDs - finished, werks:

Name: MidnightBSD

License: Simplified BSD License

Kernel: BSD Monolithic

Name: OpenBSD

License: Simplified BSD License

Kernel: BSD Monolithic

Name: NetBSD

License: Simplified BSD License

Kernel: BSD Monolithic

Name: Dragonfly BSD

License: Modified BSD License

Kernel: BSD Monolithic/Hybrid

Illumos - mostly server oriented, compatibility layer is there "but haven't ported it yet":

Name: OpenIndiana IllumoS

License: CDDL License (MIT resemblence)

Kernel: IllumoS Monolithic

Name: ToaruOS IllumoS

License: UIUC License (MIT resemblence)

Kernel: IllumoS Monolithic

Name: Tribblix IllumoS

License: CDDL License (MIT resemblence)

Kernel: Illumos Monolithic

AROS Systems - Amiga-based niche OS, mostly justwerks:

Name: AROS Research OS

License: AROS Public License (Mozilla resemblence)

Kernel: Exec Microkernel

Name: Icaros Desktop

License: AROS Public License (Mozilla resemblence)

Kernel: Exec Microkernel

Name: Aspire Post too long. Click here to view the full text.

343 posts and 61 image replies omitted. Click reply to view.



This. BSD cuck license allowed Apple making huge money, while giving back nothing to the free software community, whereas when Apple wanted to use GCC, they had to give the source code of their modified version thanks to GPL.

BSD systems aren't worth donating money nor writing a single line of code.

Waiting for GNU/Hurd



>I'll try a few of these. You can really feel the stagnation, though. Computing is completely rotten. Not that this is new at all. You would think that there would be tons of options out there, but there really aren't.

Indeed there are, you just don't try them and/ or you just want to be entertained.

>You could say that there are only two choices to begin with, Unix and Windows,

Pfff you LARPing faggot. Modern windows is a derivative of Unix. Before Unix there were many, many operating systems for mainframes, mini, and micro computers.

>and Unix is already corrupted for the most part, and it's fucking ancient mainframe software design from the 70s.

What? Unix was made to run on a mini computer (the pdp-11) thats not that different from todays Intel shit.

>That's pretty damn shitty considering that we could have much better options by now, instead of being stuck with a bunch of old shit that either keeps getting worse or just can't keep up.

But we do have better shit. You just wont use it.

>I guess this is the result of backwards being the new forward for so long.

People think technology advanced so fast in the 19th and especially 20th centuries, but in all reality it was just the accumulation of thousands of years of mathematical research with the wars pushing for roads and communication infrastructure, thus creating a free flow of thought.

>Fuck technology. Software and hardware. One of these days I may end up just abandoning all this shit.

Clearly you know very little so what will you abandoning?

>Maybe the Amish have a point after all. They don't have to worry about this shit.

Id like to see you live without your smart phone and laptop for a day.



>But we do have better shit. You just wont use it.

Name it.


I'm just waiting. Not only until standardized ARM PCs are a thing but until they get cheap.

A smartphone has 8 cores these days while desktop PCs with lots of cooling has 8 cores at most (unless you buy super expensive enthusiast shit with at most 16 cores).

What's stopping us from having 32 core home PCs?

Even if each core had just 2.5 GHz I think it would still speed things up.

And the jump from x86 has to happen someday. x86 is just so inefficient at it's core even Intel tried to get rid of it with Itanium.



>no results

Shill thread.

File: 07ae4f582760dcd⋯.jpg (43.7 KB, 500x375, 4:3, 07ae4f582760dcda8ae869d605….jpg)


I've been seeing the altchans ramp up their shilling since the New Zealand kebab removal. I'm thinking of throwing my hat into the ring. What's the best database solution for an imageboard? MySQL, PostgreSQL, SQLite? One of the non-relational databases like MongoDB I know it gets Stephen Lynx all wet.

How do you justify your choice?

68 posts and 4 image replies omitted. Click reply to view.



A database is "lol just files" except it's a huge, fully featured, tightly integrated "lol just files" that often comes with features like durability (see post above), sorting, indexing, lookups, automation, views, operations-as-transactions and more. As you increase the complexity of an ad-hoc "lol just files", it eventually becomes indiscernible from an ad-hoc database.


The only best DB is sqlite read/written directly to/from the disk block device. Skip the filesystem middle man, they just want you to believe it's necessary.




In my experience there's no practical difference if what's being implemented is a small system with relatively little data and few users.

However as the data expands and the amount of users increase, database becomes faster, more stable and reliable over just using files especially if you're using NTFS




Sqlite is the best db until you outgrow it and need distributed architecture / sharding. Then you're fucked and have to hire a team of 30 engineers to figure out how to make it scale.

File: 0f78f8f21178279⋯.png (30.34 KB, 310x163, 310:163, ClipboardImage.png)


Can someone explain this to me?

Is this the latest webdev meme to make websites even more bloated and force people to learn yet another framework/technology?

9 posts omitted. Click reply to view.



Look at the sacred geometry logo. It's also an useless bloat solution.



forgot to sage ugh



This. It's actually pretty nice if you're using JavaScript front-to-back, which is the current shitty trend.


File: 91c8935da782145⋯.png (134.46 KB, 500x700, 5:7, rust programming.png)



>Can someone explain

>cuckchan thread

fuck off & never return


File: 4d733b958b6b4de⋯.png (94.65 KB, 630x747, 70:83, 1551091701456.png)


The internet as you know it is about to end.

Soon it will be worse than your worst nightmares.

The old 90s internet will NEVER be back.

69 posts and 6 image replies omitted. Click reply to view.


I was thinking about getting offline



I've been trying since 2013



Find a nigger cock and suck it slave. Fighting evil nigger kikes like you is what makes life worth living, and dying for.



>The kikes have already permanently cornered us. The only thing we can do is surrender and kill ourselves.

Abraham Shekelstein, the post.

Your dick was mutilated by your parents and rabbi. Please project your hatred towards them instead of towards us, who try and build a better and functioning society.


Isn't Intel an Israeli company?


Based anon.


Offline will be the new on-line.


File: 894f88f7d2d1b7d⋯.mp4 (168.02 KB, 480x600, 4:5, i just wanted to play lego.mp4)


It feels like everything you can make money off writing has already been made? Am I just not being creative enough or is there really this brick wall in terms of what software can solve?

96 posts and 9 image replies omitted. Click reply to view.



Still requires extreme nepotism and sacrificing your life to a jewish debt mining institution



You know you can learn PHD level Chemistry without going out and getting a PHD right?



Tell that to all the NPC HR niggers and Phdjeets/Diversity Science PhDs in all the top positions at every chemical company in the modern world.



Oh and also the debtcucks that think everybody else have "dues to pay". Can't forget them.



write software that takes existing software and ports into other newer software, that cycle is endless. Hard mode: take the code from old video games and have them take new resources to replace their old, using images from newer games, making games port and remaster themselves-- first one to do it becomes the worlds first trillionaire.

File: ece9a83f8686fee⋯.png (145.71 KB, 1164x869, 1164:869, ClipboardImage.png)

File: 476655bb65f6593⋯.pdf (5.5 MB, SFO17-417-SEL4.pdf)


We need something better than all the Win/Mac/Linux shitware we have now. Software nowadays is unmaintainable and bloated as hell. The answer is a secure microkernel OS with formal verification and a clean codebase with minimalism and isolation in mind.

40 posts and 27 image replies omitted. Click reply to view.


File: d7bcd343e962208⋯.jpg (20.93 KB, 600x576, 25:24, Hold Up.jpg)


So what you're saying is that non-privileged components have absolutely no way whatsoever of accessing privileged components or using it in any way? This sounds like a huge bottleneck by default, and if they're even given a single chance to access privileged components by the kernel, then that opens up loads of potential breach points which defeats the whole purpose of the kernel. Unless I'm acting like a retard who has no idea what any of this means.



Slides look like Microsoft kernel engineering talks from 2015...

Windows 10 HAS a secure isolated microkernel for the critical stuff like random number generation.



Unironically yes. The specification was in Haskell from what I understand.


File: 1470374ea332f18⋯.jpg (92.42 KB, 609x295, 609:295, 2_14_microkernelArchitectu….jpg)


Yeah you are, but thats ok.

>Inter-process communication (IPC) is any mechanism which allows separate processes to communicate with each other, usually by sending messages. Shared memory is strictly speaking also an inter-process communication mechanism, but the abbreviation IPC usually only refers to message passing, and it is the latter that is particularly relevant to microkernels. IPC allows the operating system to be built from a number of small programs called servers, which are used by other programs on the system, invoked via IPC. Most or all support for peripheral hardware is handled in this fashion, with servers for device drivers, network protocol stacks, file systems, graphics, etc.

>In the context of security the minimality principle of microkernels is, some have argued, a direct consequence of the principle of least privilege, according to which all code should have only the privileges needed to provide required functionality. Minimality requires that a system's trusted computing base (TCB) should be kept minimal. As the kernel (the code that executes in the privileged mode of the hardware) has unvetted access to any data and can thus violate its integrity or confidentiality, the kernel is always part of the TCB. Minimizing it is natural in a security-driven design.



This. Forth on bare metal.

File: 4b3fbad7dbb3ddd⋯.jpg (18.18 KB, 326x303, 326:303, 4b3fbad7dbb3dddd083aaca0a3….jpg)

File: a327531a579b183⋯.pdf (97.32 KB, Art_13_unofficial.pdf)



I was wondering what are the average /tech/no's opinion on this whole mess of a legislation. From what I've come to understand, platforms such as this very one seems to be mostly exempt (not only because they're based in America with no European counterpart, but because they fail to reach the user and revenue quotas of the bigger players), as well as most attempts at parody and pastiche seem to be somewhat protected.

That being said, we all know how much of a shitter every filtering service really is, Youtube's Content ID check being at the forefront of fucking with even uttered words.



Also, what are burgers' take on this?

>please don't just say "lmao doesn't affect me hoss"

59 posts and 7 image replies omitted. Click reply to view.



>I have been trying to work on my own memes just in case


>And homebrewed memes or course.

and of course homebrewing must be illegal. obviously. thats bootleg memes. imagine what harmful memes may do to innocent internetters who just want to have a good time and then gets to see that negativity. only memes by authorizeded producers like google would be allowed. for a small fee of course.



The EU is filled with inmigrants anyway, just nuke them.


>Browse Youtube without JavaScript:

>change browser agent to 'Mozilla/5.0 (X11; Linux x86_64; rv:10.0) Gecko/20100101 Firefox/40.0' (at some point TBB stopped letting users change the agent, not sure if this is resolved)

Just use https://invidio.us/ , JewTube's official site is garbage.

By the way, NEVER do something as retarded as changing your user agent on TBB, you're just asking to get fingerprinted.


Shut up chaim.

File: f8552bcb25ec11c⋯.png (65.41 KB, 658x463, 658:463, Screenshot from 2019-03-01….png)


What machine do you use, and what operating system is it running? I have Debian 8 Sid installed on my 15" PowerBook G4, and it's great.

Pic related

61 posts and 3 image replies omitted. Click reply to view.



No I haven't but I have the kernel drivers installed so I could use it if I wanted to.


File: 00ba9329625e20b⋯.jpg (3.81 MB, 4640x3480, 4:3, IMG_20190409_171631.jpg)

Got the SSD adapter for my IDE drive in the Mac Mini, M.2 SATA SSD to IDE because sure why not. Pulls about 171MB/s with 16k blocksizes




Looks pretty simple,

JM20330 - SATA bridge

HS1084S2-3.3 is a voltage regulator (I think)

Doesn't look like JMicron sells the JM20330 anymore, the current equivalent would probably be a JMH330/S




I figured out the power issue, I just use a penny and a rubber glove to press the pinbutton down so I complete the circuit and it powers up. Now I just have to figure out how to get the display port working since I've plugged it into several different monitors but nothing. It boots up, I hear the *dong but it doesn't output a signal signal. I'm going to try an adapter of usb to hdmi next and see how that goes.

Does anyone know if its possible to use a non-apple power supply with this machine? Because I intend to eventually migrate it into the Compaq case at some point so I'm not using pennies as power buttons.



Can you take some pictures? of the pinbutton, PSU.

Might also help to see what kind of wires run from PSU to mainboard.

I mean, we don't even know which model you have >>1052853



Since: http://oxwugzccvk3dk6tj.onion/tech/res/1018729.html

was bumplocked by the shadow admins (aka the programming code) (Since I'm winning on all counts: because I am correct on the law).


Quick recap, as told by anon:

Anonymous 02/05/19 (Tue) 14:47:16 No.1027517

Summary of this episode as this thread reaches the bump limit:

>an impersonator ("John Doe") created GitHub, then GitLab and BitBucket repos for trolling purposes

>MikeeUSA hit all three with DMCA (with the GitLab and BitBucket repos successfully taken down)

>meanwhile the impersonator opened the GitHub repo to pull requests; Mikee's butthurt as usual

>that GitHub repo's last commit was made last Thursday



>Gitlab and Bitbucket repos are down due to DMCA notices

>There is still no evidence he hit github with a DMCA

<100 IQ


"GPL is Revocable" (== incel terrorism -reddit)

401 posts and 8 image replies omitted. Click reply to view.



>I just want to point out that when you buy a commercial license for software typically it will contain a section regarding revocation of the license.

You can wipe your ass with those conditions as they are illegal (at least in every jurisdiction that has consumer protection laws).



Nope, you are wrong.

It's very hit-and-miss.

_very_ hit and miss.

Some jurisdictions rule that if you paid for the software you "own" the copy like you might own any other thing you purchased (but ofcourse not distribution rights etc). Others play close to the terms. Others ask "what was the power imbalance between the parties to the contract" etc.

It's really a patchwork.

But the fundamental issue is : you paid for these terms, or this consumer good - therefor it can't be removed outside of those terms.

It wasn't always the case, and isn't always the case when it comes to two commercial / non-consumer entities. In the consumer realm the license is treated abit more like a good than simply an agreement. When dealing with learned entities it's treated like a contract.

Now with no outlay of monies, it's just permission either way. An exchange is fundamental to enforcement on the taker's side.

If they didn't give anything. They do not get anything.

Complain all you want.

Consumer protections are for those who have purchased a good or service, not for freeloaders. Contractual protections are for those who have purchased terms, not for freeloaders.



>LOL, I wish I thought of doing that!

Doing what?

>are trying to get TOR banned. Don't let them get away with it!

Notice how they have verification now. To discourage discussion specifically of this. They have no counter to the arguments here because it is correct, and more people are starting to understand that.

Not even RedHat could handwave it away in their latest press release.

That's because I'm right (hint: I'm a licensed attorney, no matter how much woman worshipers want to claim otherwise (or conversely threaten to get me disbarred))



Ideas are worth everything and nothing

To whom nothing is given; nothing is gained

Will without ability has a future. Ability without will: not even a dream



Nice poem!


Countering "Trusting Trust"


web.archive.org/web/19961220000813/http://www.acm.org/classics/sep95/ this is an archive of the dead link in the top of the article

>Way back in 1974, Paul Karger and Roger Schell discovered a devastating attack against computer systems. Ken Thompson described it in his classic 1984 speech, "Reflections on Trusting Trust." Basically, an attacker changes a compiler binary to produce malicious versions of some programs, INCLUDING ITSELF. Once this is done, the attack perpetuates, essentially undetectably. Thompson demonstrated the attack in a devastating way: he subverted a compiler of an experimental victim, allowing Thompson to log in as root without using a password. The victim never noticed the attack, even when they disassembled the binaries -- the compiler rigged the disassembler, too.

>This attack has long been part of the lore of computer security, and everyone knows that there's no defense. And that makes this paper by David A. Wheeler so interesting. It's "Countering Trusting Trust through Diverse Double-Compiling," and here's the abstract:

>An Air Force evaluation of Multics, and Ken Thompson's famous Turing award lecture "Reflections on Trusting Trust," showed that compilers can be subverted to insert malicious Trojan horses into critical software, including themselves. If this attack goes undetected, even complete analysis of a system's source code will not find the malicious code that is running, and methods for detecting this particular attack are not widely known. This paper describes a practical technique, termed diverse double-compiling (DDC), that detects this attack and some unintended compiler defects as well. Simply recompile the purported source code twice: once with a second (trusted) compiler, and again using the result of the first compilation. If the result is bit-for-bit identical with the untrusted binary, then the source code accurately represents the binary. This technique has been mentioned informally, but its issues and ramifications have not been identifiePost too long. Click here to view the full text.

74 posts and 4 image replies omitted. Click reply to view.



I'm sure there's some autists out there using a text browser to post from a NES.

>you can't really do anything with a old proccessor like that

Yes you can, you can play games on it for example. What you mean to say is that your selection of modernish software to use on it would be extrememly limited since most programs are bloated and unoptimized peices of shit.



Do you not what the word 'contemporary' means? Pull your head out of your ass.





>be government spy contractor

>hack yourself so when somebody discovers your botnetted warez you can blame the hackers




I can post with Seamonkey on OpenBSD 6.4 and a Thinkpad X21, it's not even slow or anything.

File: 0e544228fccb25b⋯.jpeg (115.69 KB, 2000x2000, 1:1, printer.jpeg)


Is there anyway to remove printer micro dots using modified firmware or physical hacks? It seems to me eventually they will crack down on political fliers by tracking down the sources.

125 posts and 17 image replies omitted. Click reply to view.



Yeah I just looked it up. You're a lying nigger.


>The first digit in a UPC code represents the country of origin (0 for the United States)

>and the next five digits identify the manufacturer.

>Digits 7 through 11 identify the specific product.

>The twelfth digit serves as checksum, which checks the validity of the preceding 11 numbers.

None of the digits contain a serial number.

The cashier only scans the UPC. They do not open the box to scan the serial barcode sticker stuck to the printer itself. The serial number cannot be written on the outside of the package because then people would copy it and use it for warranty/registration fraud. Same as a new Windows DVD doesn't have its COA sticker on the outside of the package. You dumb nigger.



If you pay attention to the retail box you'll notice there are multiple barcodes on each one



You stupid fucker its not the number its the bar with the squigeleies itself that contains the information. Have you ever actually scanned one of those things with something that isn't supplied by a store? See the superset of UPC, EAN https://en.wikipedia.org/wiki/International_Article_Number_%28EAN%29 https://archive.fo/7ljET

>The 020-029 GS1 Prefixes are worth a special mention. GS1 defines this as being available for retailer internal use (or internal use by other types of business). Some retailers use this for proprietary (own brand or unbranded) products, although many retailers obtain their own manufacturer's code for their own brands. Other retailers use at least part of this prefix for products which are packaged in store, for example, items weighed and served over a counter for a customer. In these cases, the barcode may encode a price, quantity or weight along with a product identifier

If you want to get real fucking technical, the manufacturer specifies the 020-029 GS1 prefix at the manufacturer's factory for printers or other items and then sends a standardized reading of what that fucking means to the POS software distributers who then include it in every retailers POS without them knowing/caring via automatic updates or whatnot. So when the scanner at the cash register scans it the proccess is fully automatic.



Also of note is that some manufacturers do include the serial number in the EAN code because they think the goyim are so stupid and will never read it and have you heard of anyone doing scams involving unboxed serial numbers?. While some manufacturers put a number there that only associates to the serial code in a database, kinda like a hash but easily reversible if you have the input/serial code.


Here's an example POS EAN scanner https://archive.fo/6dmeU

>The great thing about EAN128, is that is the barcode can contain multiple information. So in the example, I have included pallet/SSCC and itemId, and when is it scanned, the system will automatically fill in the fields for me :

>Out of the box, Dynamics AX can decode the following application identifiers of EAN128:

>(00) SSCC – PalletID. The item arrival journal will also create the pallet ID in DAX

>(01)+(02) EAN – Itembarcode, that will then identify itemid + product dimensions

>(10) Batch

<(21) Serial number

>(30) Quantity –

Here's another example http://archive.fo/ENqSw

File: 2ea0fe7b064fe0d⋯.png (584.05 KB, 1280x800, 8:5, mmc-fizzbuzz-in-cool-retro….png)


I would like to show off a tool I've created; the included image is an example of the tool with a program I've written loaded; the main page for this tool can be found here:


The page for the only current version of the tool is here; note it is an immature page in comparison:


This is an interactive machine code development environment I've created. The basic idea is each key of the keyboard, decided by position rather than value, is bound to a routine which asks questions until an action can be decided upon. An example is pressing a key for a routine that merely needs two registers in order to complete; you're permitted to enter a register number, the tool won't allow invalid such numbers to be entered at all, it asks again in the same way, and it then writes the finished instruction to the current location; if a name referring to a number was used, that name will likely be displayed instead of the numerical value, varying, and any changes to the name will update the instruction as well.

I wrote this tool in Common Lisp purely because Common Lisp has the necessary primitives. The program is decidedly non-Lispy. I'm planning to write a simpler reimplementation in Ada by the year's end and expect this will be the version that is distributed to package managers and whatnot. Some simple figuring has shown to me that the memory usage for this program, sans any undo and redo mechanism, should be well within an eighth of a megabyte in the general case and below a quarter in all cases.

The tool was borne of my dislike for assemblers. Answers are saved by similar routines and so you can very easily press keys until you find the one you need; you can't touch and feel your way around an assembler. Aside from this, there are also special routines, primarily located on the home row, which control movement, insertion, deletion, jumping around the program space, creating and deleting names, and other necessitiPost too long. Click here to view the full text.

40 posts and 2 image replies omitted. Click reply to view.


super optimized machine code is already being used like in consoles to accelerate game engines

but this could be something like that in open source...


As an update, I've finished the display and creation functions. So, what remains for Ada is writing the more base routines. That which implements much of the personality of the tool is rather finished now.

I believe I'll be using the current implementation of the tool to write another game soon. I'll discuss more later.

That brings me to another topic. I'm considering participating in the finger protocol and writing about my progress with it. I intend to also ask elsewhere, but would any of you actually be interested in reading development logs for something such as this?

It's my understanding some people are interested in reading people's development logs. My current format leaves many of the details behind, in my far less numerous articles.



>I don't put April Fools' jokes on my website. I bump this thread, but I've taken a break from IRC and whatnot and intend to for a bit. I'm already more productive and well-off, not wasting my time with it.

Good, your hate has made you powerful. Now, fulfill your destiny.


>development logs

I'd rather read those than another browser battle thread, but might be best to leave a link here to the detail somewhere on your website and only periodically summarize here, so anons don't complain about blog posting.



>Well, x86 is an architecture that doesn't even work well with an assembler

why not go for RISC then



MIPS is the next intended target, purely because I own a Lemote Yeeloong.

File: a2fa71e6ef6c791⋯.png (321.85 KB, 2550x3300, 17:22, boycott.png)

File: 045e2beaf2493c7⋯.png (268.8 KB, 2550x3300, 17:22, boycott-hosts.png)

File: ba207ed540b0820⋯.png (309.79 KB, 2550x3300, 17:22, boycott-address.png)


My story:

Last night, I uploaded in regards to the 2019 Christchurch Massacre the Facebook Live stream, the manifesto, and the PDF archived thread.

The Internet Archive removed the video of the 2019 Christchurch Massacure without notice. I emailed them asking why, and told them my intent to reupload. I did. When I woke up this morning, the video was taken down again. I discovered shortly after my account had been locked. I emailed a second time to inquire. Shortly after this email, I discovered that both the manifesto and the archived thread have been set to "required to log-in to view" and have been Geologically censored. The Metadata says France is the region it is not able to be viewed. This does not make sense.

I have sent three emails and not received a single reply. I decided to wait until now for a reply, because I expected now to be a reasonable deadline. They have not replied. As of now, the two remaining files are still censored, and the video is still deleted. I am still unable to log into my Internet Archive account. With this, I am hereby announcing a boycott of the Internet Archive until they stop this censorship!

Spread these flyers, I have contacted multiple media outlets about this censorship, as well as persons involved in high-tech cases such as the EFF whom I hope will side with me and help participate in this boycott. I hope to make a difference. I am but one man, and need help.

The URLs of the files that remain are here:



And the URLs of the video and reupload that are now down

https://aPost too long. Click here to view the full text.

153 posts and 25 image replies omitted. Click reply to view.



Or seed a torrent. That way anyone who downloaded it also hosts the file.




Watch The Greatest Story Ever Told and you will see that it was entirely true that Hitler was not allowed to speak in 1928.



Sorry, The Greatest Story Never Told




Reminder that Tarrant's book should be on libgen.io and none of you faggots did it yet.


Delete Post [ ]
[1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18]
| Catalog | Nerve Center | Cancer
[ / / / / / / / / / / / / / ] [ dir / ausneets / b2 / choroy / cyber / dempart / doomer / fa / vichan ]