[ / / / / / / / / / / / / / ] [ dir / agatha2 / choroy / doomer / druz / eirepol / fast / hamradio / vril ]

Catalog (/tech/)

Winner of the 75nd Attention-Hungry Games
/caco/ - Azarath Metrion Zinthos

March 2019 - 8chan Transparency Report
[Create a thread]
Sort by: Image size: [Show all] Archive
R: 1 / I: 0 / P: 1 [R] [G] [-]

Welcome to /tech/ - ∞chan's technology board.

Please check the rules before you post:

https://www.8ch.net/metatech/rules.html

Looking for hardware or software recommendations? Check out the InstallGentoo Wiki:

https://wiki.installgentoo.com/

/tech/ is for the discussion of technology and related topics.

/tech/ is NOT your personal tech support team or personal consumer review site. We have stickies for that. Keep those kinds of posts in there.

For tech support, software recommendations, and other questions that don't warrant their own thread, please use the '/tech/ Questions and Support' sticky.

For consumer advice, please use the consumer advice sticky located below.

For meta discussion, please go to >>>/metatech/.

For desktop threads, homescreen threads and ricing, please go to >>>/rice/.

For tech support/issues with computers:

https://startpage.com/ or https://ixquick.com (i.e., fucking Google it)

https://stackexchange.com/

http://www.logicalincrements.com/

If you can't find what you're looking for and still need help, post in the tech questions sticky.

Looking to switch over to GNU/Linux? Don't know where to start?

http://linuxnewbieguide.org/

http://distrowatch.com/dwres.php?resource=major

https://www.linux.com/learn/new-user-guides

∞chan Android apps

https://github.com/Floens/Clover

https://github.com/Mishiranu/Dashchan

https://github.com/Luorrak/Ouroboros/

https://github.com/miku-nyan/Overchan-Android

https://github.com/wingy/Exodus

https://github.com/xvdiff/infinity

The Case Against Google Chrome

https://8ch.net/tech/chrome.html

/tech/ FAQs - Email Services

https://8ch.net/tech/email.html

/tech/ FAQs - DuckDuckGo

https://8ch.net/tech/ddg.html

/tech/ Resources and Information

https://8ch.net/tech/res.html

Windows 7 Telemetry Removal

https://8ch.net/tech/w7tele.html

/tech/ IRC

irc://irc.rizon.net #/tech/

Mumble

magenta.cleanvoice.ru:65058

You can search the catalog for a specific term by using:

https://8ch.net/tech/catalog.html

Always check the catalog before creating a thread.

To use the Code tag, book-end your body of code with:

[code]
and
[​/code]

This is a SFW board; however, NSFW (Nudity, gore, etc.) material may be uploaded so long as it is spoilered. If you are browsing at work or similar, assume spoilered images are not safe for work.

If you see any posts that break the rules, please report them. Thanks!

You can find the public /tech/ volunteer action log at https://8ch.net/log.php?board=tech

To appeal a ban longer than 1 week, feel free to use the email provided or use the built-in appeal system. Be sure to attach a screenshot of your ban message when submitting an appeal via e-mail.

R: 201 / I: 38 / P: 1 [R] [G] [-]

/tech/ Questions and Support

Bring all your hardware, software and other troubles here.

R: 400 / I: 50 / P: 1 [R] [G] [-]

Consumer Advice

Looking to buy something but aren't sure what to get? Ask here.

R: 26 / I: 1 / P: 1 [R] [G] [-]

Linux Smartphone General

>Librem 5 dev-kits making calls to each other

>PinePhone dev-kits sent out

YEAR OF THE LINUX SMARTPHONE: 2019

YEAR OF THE LINUX DESKTOP: TBA

I can't wait for PostmarketOS to start making calls on those devices.

Complaining about smartphones thread: >>1045136

R: 67 / I: 12 / P: 1 [R] [G] [-]

/tech/ introduced captcha for every single post

wat

>"OP must be at least 32 chars on this board."

<"You seem to have mistyped the verification, or your CAPTCHA expired. Please fill it out again."

R: 14 / I: 0 / P: 1 [R] [G] [-]

Request: a 1337 coder to start a new chan\imageboard

I'm a NEET who likes spending all his time on chans\imageboards. Kinda sick of seeing people get banned for mere words (example: >>>/sudo/97161 and >>>/sudo/97242) and other legal material. That, and for other reasons, is why I've always wanted my own imageboard. One hosted on non-US servers and where CP is strictly forbidden, but everything else is allowed.

Problem: I'm a complete technical noob who can barely install Windows. I have 0 server and Linux experience and I'm too retarded to learn all of it. I do, however, have a lot free time and enough NEET bux to buy hosting and pay a fee to someone to do all the technical work of implementing an imageboard. Preferably one based on LynxChan, but other software is negotiable.

Is anyone here interested in something like this? Someone with free time and willing to do a project like this? You could co-run the imageboard with me when it's done, or not and just do the technical stuff. Again, I would pay you a fee in bitcoin or whichever cryptoval.

R: 326 / I: 79 / P: 1 [R] [G] [-]

ThinkPad (and Toughbook) thread

Dell Precision edition. As usual, the old one hit 400 posts again.

>tfw your M6500 died and all you're left with is this M4300 and two Pentium era Precisions

R: 24 / I: 2 / P: 1 [R] [G] [-]

Is taking steps to stay anonymous online ultimately futile?

Running open source browsers with anti ad and tracking features at least guarantee big corporations can't as easily gather data on you but this is about where the ease ends.

For example, lets say your next step is downloading software to further configure your computer for privacy, like email clients, torrent clients, virtual machines, misc productivity tools, etc. You download these through Tor but your ISP still knows you're connecting to Tor, so how the fuck am I supposed to download software to evade prying eyes when those prying eyes will, by my download activity, be able to determine I am trying to evade them and probably take steps to do le sneaky shit. Obviously, you'd use a tustworthy and transparent VPN along with Tor, but YOU CAN'T GET THE FUCKING VPN COMPLETELY ANONYMOUSLY EITHER. You can pay with crypto but the steps you take to buy crypto will be known so they know you; 1. are into crypto 2. used it to purchase a VPN. Yeah, maybe you're off the grid after these two steps by this time you've probably done so much internet research on this they've got a nice little log and can get a good idea of what you're trying to do and why. They know XYZ user purchased a VPN with crypto and will keep tabs on you.

Am I supposed to get a burner laptop and configure it somewhere else besides my own house, load all the installers onto an encrypted usb, and load it onto my desired computer? If I do that, who can still see what software I run on my computer? What the FUCK

R: 2 / I: 1 / P: 1 [R] [G] [-]

Elon Musk Twitter New Profile Pic “Crazy Reaction on Reddit”

https://ydraft.com/elon-musk-twitter-new-profile-pic-crazy-reaction-on-reddit/

R: 13 / I: 3 / P: 1 [R] [G] [-]

Has Anyone Taken The Ploverpill?

http://www.openstenoproject.org/

R: 27 / I: 3 / P: 1 [R] [G] [-]

Python in Firefox

[http://archive.fo/b023H] https://hacks.mozilla.org/2019/04/pyodide-bringing-the-scientific-python-stack-to-the-browser/

What could possibly go wrong?

Also since when did mozilla.org replace their favicon to a communist star?

R: 19 / I: 0 / P: 1 [R] [G] [-]

Canvas fingerprinting

>canvas fingerprinting

This shit is a privacy nightmare. Every website you visit can generate a hash which is unique to your device. Yet, spoofing it makes you even more unique.

How do we defeat this sort of tracking ? Tor browser has a feature which sends a blank canvas, but it's not a sufficient solution for everyday browsing

R: 234 / I: 67 / P: 1 [R] [G] [-]

Old Hardware Thread

The old thread passed the bump limit so I figured I'd make a fresh one. Discuss your old hardware. Are you fixing anything?

I have an IDE to mSATA adapter and an mSATA SSD coming in the mail to fix my thinkpad.

R: 4 / I: 0 / P: 1 [R] [G] [-]

Why the hell is the GNOME shell written in Javascript?

I thought it was just the extension engine but no, Javascript has literally permeated the entire thing, this is completely absurd. No wonder it's so slow.

R: 45 / I: 17 / P: 2 [R] [G] [-]

https://www.dailymail.co.uk/news/article-6946695/New-version-Google-Chrome-make-harder-stop-computer-users-watching-porn-online.html

tl;dr: Chrome is adding encrypted DNS

>Google's plans for new encrypted Chrome web browser could make it harder for UK government to stop computer users watching porn online

>Crisis talks being held by National Cyber Security Centre, of GCHQ, on May 8

Why does the GCHQ care about porn so much?

R: 71 / I: 9 / P: 2 [R] [G] [-]

Are you really a programmer? Show us your own 8ch downloader then.

Here's mine.

R: 108 / I: 13 / P: 2 [R] [G] [-]

Best GUI

I'm looking for a multiplatform (Windows and Linux) GUI design platform. So far, everything I tried was utter shit. QT threw an useless error message on my first run and it's tremendously bloated.

The best stuff I've tried so far is wxWidgets but it's worse than VB6 in all aspects.

Do you have any suggestions? I'm looking for stuff available since 1996 in Win32 land but even that low bar seems impossible to overcome with multiplatform GUI systems.

Pic related: this is the best the open source community has to offer when it comes to GUI design (outside of QT). Word 97 looked better than that.

R: 31 / I: 9 / P: 2 [R] [G] [-]

New Discord Hacking Server

Yo I'm making a tech / "hacking" community, we got a discord and a crappy forum up and we're fishing for some decent members. When I say hacking I'm usually talking about CTF's or HTB cuz discord is fucking gay and likes to ban communities. But on top of that we're a linux focused group with a huge specialty in security, anonymity and privacy. We have a huge archive of resources such as scripts, eBooks, tools and more and want to share it all with users that can help contribute.

Invite Link: https://discord.gg/TNqQ2m

R: 14 / I: 3 / P: 2 [R] [G] [-]

A website where people control an online computer

CollabVM

http://computernewb.com/collab-vm

R: 77 / I: 16 / P: 2 [R] [G] [-]

Realtime imageboards

Realtime imageboards might be the solution to the problem traditional imageboards have of exit being very difficult, since they require a large volume of people at once to build up sustainable momentum and not stay dead. Realtime seems to only need a small amount to build active discussion, while still retaining anonymity and transciency, and all the benefits that come from it. Up until now they've really only been used by the insular, hidden /a/ communities that built them but I always thought they had a lot of potential for the rest of the imageboard user base - they're just not that well known.

To test my thesis, I launched one earlier this week using a lightly modified fork of meguca. In 24 hours, it hit 6000 posts, which is a higher rate than 4chan's slower boards. This may partially be due to it targeting the oldfag diaspora, but it points to the fact that until now, true exit from 4chan has been exceedingly difficult. It wasn't even intended as a launch, but just a test run that ended up getting a community. Traditional imageboards struggle desperately to achieve what a realtime imageboard did on accident.

I feel like the attempts to build decentralized imageboard software miss the point. State intervention is a looming threat, but the only immediately critical issue of imageboards has always been ease of exit. imo realtime boards are the future, more people should know about them, and more people should be starting them.

R: 12 / I: 1 / P: 2 [R] [G] [-]

Project Ideas?

I'm going to be doing a product design paper next semester, in which I have the lion's share of 6 months to make a half decent prototype then demonstrate it at the end. I have the knowledge and resources (CnC machines, 3D printer, CAD experience, etc) to make a decent variety of things. The problem is coming up with something that isn't shit.

Ideas I trashed are:

Supercapacitor powered toy car - Can charge fast as all heck then romp around for maybe a minute or two, could be a good toy for kids since it wouldn't need to spend ages charging.

Problems - Every man and his dog are making supercapacitor powered toys on Youtube, and this would have fairly limited scope for design process write-ups and design refinement, if I really wanted to this could be done in a week or two.

Coilgun

Problems - No real advantages compared to a firearm, probably won't be allowed to make a bootleg weapon, horrible idea.

HUD Diving Mask - A diving mask with depth, gas pressure, etc displayed in a HUD for the user, a few of these have being produced commercially but none have really been successful for various reasons.

Problems - OLED technology isn't quite there in regards to embedding a screen in the lens, furthermore even if it was my place of study lacks the tools for me to embed an OLED screen in a lens and embed other circuitry in silicone (for a half decent prototype I'd basically need to manufacture a diving mask as well).

In short I'm looking for a half decent idea that isn't pathetic/useless or way too ambitious for a 6 month project with relatively limited tools at my disposal.

Feel free to use this thread if you're in the same boat or just want to do a project for fun.

R: 3 / I: 0 / P: 2 [R] [G] [-]

Do you know any Linux desktop/terminal clients for multiple imageboards (or at least 8chan)?

R: 115 / I: 11 / P: 2 [R] [G] [-]

LynxChan 2.2

For those who don't know, LynxChan is a new chan engine I have been developing for the past 4 years or so.

Today I started 2.2 beta. It's main feature is the comeback of archives. Not only threads can be archived manually, but also limits for replies can be set for threads to be archived automatically after these limits are passed and the thread is pruned.

On a smaller scale and a more technical aspect was the optimization of ram usage. It should have use 80% to 75% less ram. Boot times have been improved too. And the json api have been merged into the form api too, which should make for a more consolidated api.

R: 19 / I: 4 / P: 2 [R] [G] [-]

Trade School

Did any of you programmers learn how to program from a trade/vocational school? If you didn't, but managed to be hired (for your programming skills) anyways, what exactly was your method of learning? Don't answer if you're gonna say college, that's an easy answer. If you didn't go to trade school nor college then I'd assume you learned using programming books. Go ahead and suggest some if you wish, but that isn't the primary concern at the moment. Did you keep a GitHub portfolio?

Another question, if I may; if you did go to a trade school, how exactly did you find it? I'm in the market for one, myself, but haven't actually found any, and google seems to confuse trade schools with community colleges and actual universities, which I want no part of.

R: 139 / I: 14 / P: 2 [R] [G] [-]

Command-line programs in the current year

Seriously, why do programs that operate strictly via command line exist in the current year? These days, anyone with at least two brain cells to rub together can create even the most rudimentary UI consisting of checkboxes, dropdown lists, and text boxes. In the time it takes you to write an insanely-long documentation that explains every single command line and its proper syntax, you could create a UI that is intuitive and self-explanatory.

This beef comes from me trying to figure out how to use exiftool.exe to remove all tags from an image EXCEPT for the orientation tag. No, this thread is not for you to tell me how to do it since I have since figured it out, but to serve as an example of the bullshit that is command-line-only applications. Here, take a look at the documentation for this program:

https://sno.phy.queensu.ca/~phil/exiftool/exiftool_pod.html

You cannot convince me that all of that is completely necessary. Just make a fucking UI. Otherwise, fifty other people will create their own variations of a wrapper for your exe, you will list each and every fucking one of them on your shitty website that looks like it crawled out of the year 2000, and I guarantee that you WILL NOT update your list to remove the 90% of wrappers that fall out of date or become defunct because the developer abandoned them. So now I have to scour a list of wrappers and download/install/use multiple ones before I find the one I want to use that also fucking WORKS.

If you are wanting the exe to serve as a sort of API then also write a wrapper for it rather than make someone else slog through your wall of text to figure out how to do it themselves. At the very least, create a switch metadata file that provides 1) the data type required for each switch (string, number, date, boolean, etc) and 2) any dependencies and interdependencies between switches that others can use to auto-generate their UIs. This way, you can make changes to your metadata file and everyone else's UI would update automatically if they were smart enough to leverage it.

tl;dr: Anyone who creates command-line-only utilities in the current year needs to kys. Prove me wrong. Pro tip: ██████████

R: 6 / I: 0 / P: 2 [R] [G] [-]

Can Linus be saved?

We don't know exactly what happened to him (although one could theorize it might have had something to do with his feminist daughter and the trannies at tech companies) and he hasn't appeared in any public space, conference or video after his cucked "temporary retreat to think about things" (has he? I didn't see anything so I don't know for sure). I don't know exactly where he stands on now other than him saying he's not going to go on his classic rants anymore.

The rants were important. He was stern and determined, and his rudeness was necessary to impose something approaching quality to kernel development. He had strong stances against breaking user space, and specially on blaming someone else for your bad code. Sure, he could still make a "softer" rant about it now, but will it have the same impact as before? Will he even make another rant anymore?

I wish we could at least know what the hell happened to him that made him do what he did, and allow that one Coraline tranny to infect the kernel with his smelly CoC

R: 96 / I: 12 / P: 2 [R] [G] [-]

>free software is communism

>open source is communism

>intellectual property is enforced by the government

>governments around the world add more restrictions regarding user freedom and do nothing but try to constrain people when doing code(see North Korea os)

How come communists try to appropriate free software and open source philosophy when they are actually the opposite? Are they that clueless about what they defend or are they just trying to pull as many retards as possible on, even if by lies and deceit? I mean, of course (((the ones behind communism))) are trying to do just that so that they can rule over, but even the would be underclass retarded drone are sinking that low?

This shit is so retarded.

R: 9 / I: 0 / P: 2 [R] [G] [-]

C++ build systems

What is the best option when it comes to build systems for C++?

All of them seem bloated and shit.

>autotools

>make

>cmake

>meson

Out of these only meson seems to be somewhat modern but

>python

R: 0 / I: 0 / P: 3 [R] [G] [-]

MCSA 2016 70-740 - 70-742

hey anons,

recommended tips for studying for 70-740 through 70-742?

I've got Sybex book on the 3 and cbt nuggets. Any other tips? or is it piss easy to pass?

R: 8 / I: 1 / P: 3 [R] [G] [-]

Twitter CEO Acknowledged “It’s easy to Abuse Others on Twitter”

https://ydraft.com/twitter-ceo-acknowledged-its-easy-to-abuse-others-on-twitter/

R: 331 / I: 72 / P: 3 [R] [G] [-]

/ipfs/ - IPFS Thread #3

Last thread:

>>915966 (https://archive.is/rQakE)

Updates

0.4.17

>ipfs 0.4.17 is a quick release to fix a major performance regression in bitswap (mostly affecting go-ipfs → js-ipfs transfers). However, while motivated by this fix, this release contains a few other goodies that will excite some users.

>The headline feature in this release is urlstore support. Urlstore is a generalization of the filestore backend that can fetch file blocks from remote URLs on-demand instead of storing them in the local datastore.

>Additionally, we've added support for extracting inline blocks from CIDs (blocks inlined into CIDs using the identity hash function). However, go-ipfs won't yet create such CIDs so you're unlikely to see any in the wild.

Features

>URLStore (ipfs/go-ipfs#4896)

>Add trickle-dag support to the urlstore (ipfs/go-ipfs#5245).

>Allow specifying how the data field in the object get is encoded (ipfs/go-ipfs#5139)

>Add a -U flag to files ls to disable sorting (ipfs/go-ipfs#5219)

>Add an efficient --size-only flag to the repo stat (ipfs/go-ipfs#5010)

>Inline blocks in CIDs (ipfs/go-ipfs#5117)

Changes/Fixes

>Make ipfs files ls -l correctly report the hash and size of files (ipfs/go-ipfs#5045)

>Fix sorting of files ls (ipfs/go-ipfs#5219)

>Improve prefetching in ipfs cat and related commands (ipfs/go-ipfs#5162)

>Better error message when ipfs cp fails (ipfs/go-ipfs#5218)

>Don't wait for the peer to close it's end of a bitswap stream before considering the block "sent" (ipfs/go-ipfs#5258)

>Fix resolving links in sharded directories via the gateway (ipfs/go-ipfs#5271)

>Fix building when there's a space in the current directory (ipfs/go-ipfs#5261)

tl;dr for Beginners

>decentralized P2P network

>like torrenting, but instead of getting a .torrent file or magnet link that shares a pre-set group of files, you get a hash of the files which is searched for in the network and served automatically

>you can add files to the entire network with one line in the CLI or a drag-and-drop into the web interface

>HTTP gateways let you download any hash through your browser without running IPFS

>can stream video files in mpv or VLC (though it's not recommended unless the file has a lot of seeds)

How it Works

When you add a file, the files are cryptographically hashed and a merkle tree is created. These hashes are announced by the IPFS client to the nodes in the network. (The IPFS team often describes the network as a "Merkle forest.") Any user can request one of these hashes and the nodes set up peer connections automatically. If two users share the same file then both of them can seed it to a third person requesting the hash, as opposed to .torrent files/magnets which require both seeders use the same file.

FAQ

>Is it safe?

It's about as safe as a torrent right now, ignoring the relative obscurity bonus. They are working on integration with TOR and I2P. Check out libp2p if you're curious.

>Is it fast?

Finding a seeder can take anywhere from a few seconds to a few minutes. It's slowly improving but still requires a fair bit of optimization work. Once the download starts, it's as fast as the peers can offer, just like a torrent.

>Is it a meme?

You be the judge.

It has implementations in Go (meant for desktop integration) and Javascript (meant for browser/server integration) in active development that are functional right now, it has a bunch of side projects that build on it, and it divides important parts of its development (IPLD, libp2p, etc) into separate projects that allow for drop-in support for many existing technologies.

On the other hand, it's still alpha software with a small userbase and has poor network performance.

Websites of interest

https://ipfs.io/ipfs/

Official IPFS HTTP gateway. Slap this in front of a hash and it will download a file from the network. Be warned that this gateway is slower than using the client and accepts DMCAs.

glob.me — dead

R: 98 / I: 9 / P: 3 [R] [G] [-]

John Carmack - writing Rust code feels very wholesome

I'm still completely in the excited-newbie honeymoon phase, but writing Rust code feels very wholesome.

https://twitter.com/id_aa_carmack/status/1094419108781789184

R: 32 / I: 4 / P: 3 [R] [G] [-]

Activating Windows XP in (((Current Year)))

How the fuck do I do it? Can't find any cracks. Won't be connecting to the internet on this.

Tried the "OobeBnk" trial period reset trick (with registry modification), and pic related is what I get.

It still gives me five days left and I can't reset the trial period no matter what I do even though I have only reset it twice since and I really don't want to reinstall everything on this machine because right now it is perfect the way it is.

R: 124 / I: 14 / P: 3 [R] [G] [-]

Nanochan

Old thread hit 400 replies: >>996935

Nanochan is a tor only imageboard written in lua:

https://nanochancsvnej4vxiidu4fhpchkxffl3mgqypub63xadeetkjttavqd.onion/

Source code:

https://nanochancsvnej4vxiidu4fhpchkxffl3mgqypub63xadeetkjttavqd.onion/source.lua

Changes since the last thread:

>the old v2 onion address has been redirected to the new v3 address

>is there gonna be another /tech/ thread needed after the current one hits 400?

<I'm not going to make one. In retrospect I actually think it was a mistake to advertise on pigchan in the first place

Discuss alternative imageboards, web dev best practices, and call each other faggots

R: 24 / I: 3 / P: 3 [R] [G] [-]

Mozilla enables hyperlink auditing, proving they are an enemy of privacy once again

https://via.hypothes.is/https://www.bleepingcomputer.com/news/software/mozilla-firefox-to-enable-hyperlink-ping-tracking-by-default/

>Mozilla has told BleepingComputer that they will be enabling the tracking feature called hyperlink auditing, or Pings, by default in Firefox.

>For those not familiar with hyperlink auditing, it is a HTML feature that allows web sites to track link clicks by adding the "ping=" attribute to HTML links

>When we asked if they felt that users should at least be given the ability to disable the feature if they wish, Mozilla stated that they did not believe it would have any "meaningful improvement" to a user's privacy.

R: 16 / I: 1 / P: 3 [R] [G] [-]

The days of free API keys are dead.

>You're almost ready! You still need at least 1 collaborator to authorize your app before you can submit. Also, in order to review your app, we require a fully testable implementation and instructions for how to authenticate with your service.

unbased and gay

R: 20 / I: 1 / P: 3 [R] [G] [-]

Stop """caring""" about privacy

Stop fucking asking corporations to change shit. Make and use good technology instead

>wahhhh google adsense tracks you (repeat every day in every fucking "tech" site from 2000-2010)

<nothing changes, except now websites make you close some stupid fucking popup to appease the peons. website is literally less usable than before

>wahhh i dont like something about the recording industry

<a bunch of gay hipsters post retarded garbage on sites like bandcamp for no purpose other than "me me me", making it no different than the consumerist garbage they "react" against

meanwhile, what based niggers do:

>websites are fucking shit.

<turn off JS. all ad "problems" solved

<turn on Tor. all "tracking" "problems" solved

>the consumer music industry is gay

<download 30000 albums

<listen in random order

<use blacklist/whitelist and categorize them

<publish categorizations to help others, such as genre tags

dissimenate warez such as music you ripped yourself and programs you cracked yourself. the only solution to garbage corporate software is to pirate it and reprogram it to not be gay. for instance if you want to use something offline, that requires reverse engineering or at least using a crack someone already made

in short, everyone who just bitches about contemporary western "political" "issues" every day does not belong here. and fuck gay """hackers""" who say this is irresponsible. everything corporations do is irresponsible. they deserve to be milked as hard as possible until they die

R: 10 / I: 1 / P: 3 [R] [G] [-]

> he doesn't use bedrock linux

> he doesn't have 15 distros installed simultaneously

Why bitch about different peoples' distro choices when you can just have them all?

R: 27 / I: 3 / P: 3 [R] [G] [-]

Arch Linux

Hey just wanted to know about your guys opinions. Is Arch good? Is it stable ? Is it secure ?

R: 13 / I: 0 / P: 3 [R] [G] [-]

Useful things to do with a raspberry pi 1 b+

A friend of mine gave me an old raspberry pi b+ that he didn't have any use for.

Does anyone know any decent uses for one of these? I've never used one of these before, I don't want to use it as an emulation box because It's an older board and, i just play roms on my pc anyway.

What are some good uses for it?

R: 3 / I: 0 / P: 3 [R] [G] [-]

YouTube Music and Amazon Music Streamable on Google Home and Amazon Echo

https://ydraft.com/youtube-music-and-amazon-music-streamable-on-google-home-and-amazon-echo/

R: 1 / I: 1 / P: 3 [R] [G] [-]

YouTube Music and Amazon Music Streamable on Google Home and Amazon Echo

https://ydraft.com/youtube-music-and-amazon-music-streamable-on-google-home-and-amazon-echo/

R: 19 / I: 0 / P: 4 [R] [G] [-]

IRC networks that allow proxies\VPNs

Since recently Rizon has started aggressively banning proxies and VPNs that used to work on their network despite already not being allowed.

Are there any IRC networks that are more lenient?

Thanks.

R: 14 / I: 2 / P: 4 [R] [G] [-]

Y'all are hating on SystemD, but its wide adoption is evidence of its great performance. You all hate it because it doesn't follow your archaic "Unix Philosophy" and is made by a guy that people hate on for no reason, but it simplifies the operation of linux and makes the administration of multiple computers easier.

The days of Init and "wizardry" are over, stop living in the past.

>Prove me wrong

Protip: You can't. Productivity with SystemD cannot be beat.

R: 22 / I: 0 / P: 4 [R] [G] [-]

Linear volume control

># echo $CURRENT_YEAR

>there's still software with linear volume controls

>top third of the fader/slider range does virtually nothing

>middle third changes volume somewhat but not much

>bottom third changes volume rapidly down to 0

How is this still a thing?

R: 2 / I: 0 / P: 4 [R] [G] [-]

Is everything Trevor writes pure shit? Or just Kusaba?

R: 60 / I: 3 / P: 4 [R] [G] [-]

Brave Browser

>making money just by using a browser

jej

all other browsers are inferior now

R: 99 / I: 5 / P: 4 [R] [G] [-]

A fork() in the road

Microsoft BTFO UNIX weenies

>The received wisdom suggests that Unix’s unusual combination of fork() and exec() for process creation was an inspired design. In this paper, we argue that fork was a clever hack for machines and programs of the 1970s that has long outlived its usefulness and is now a liability. We catalog the ways in which fork is a terrible abstraction for the modern programmer to use, describe how it compromises OS implementations, and propose alternatives.

>As the designers and implementers of operating systems, we should acknowledge that fork’s continued existence as a first-class OS primitive holds back systems research, and deprecate it. As educators, we should teach fork as a historical artifact, and not the first process creation mechanism students encounter.

https://www.microsoft.com/en-us/research/publication/a-fork-in-the-road/

R: 6 / I: 0 / P: 4 [R] [G] [-]

CloverOS Game, CloverOS Power

Happy 4.20!

It is never TOO late to remember XXXTentacion's legacy as a honorable, noble author of the most influential lyrics of our generation. Every one of his words written down is almost as recognizable and memorable as the Constitution at Golden Corral.

In addition, CloverOS is an excellent Gentoo variant that can automatically install itself in around 5-10 minutes. A normal installation of Gentoo would take from 35 minutes to a few hours for beginner users. CloverOS is nearly perfect enough to be deployed in an enterprise setting or for a small business workspace. CloverOS is good for personal and business use.

Chromebooks are also good but not perfect in nature. Chromebook’s are marketed to be able to play Roblox, but at a mere Mobile standard. CloverOS, on the other hand, is documented to be able to run Adobe professional software like Photoshop and After Effects. Many GNU/Linux distros including Debian, PopOS, and Mint have difficulty to keep up with the exceptional standards CloverOS has set. CloverOS isn’t bogged down with systemd, pulseaudio, dbus, avahi, nls that plague major distros like Ubuntu and Fedora GNU/Linux.

If you don’t like reading paragraphs to persuade you into using CloverOS, don’t mind watching my cringeworthy video.

Thank you for your time.

Here’s the link to install CloverOS or buy a Chromebook!

https://cloveros.ga/

https://www.google.com/chromebook/

R: 122 / I: 9 / P: 4 [R] [G] [-]

Did he win?

>systemd is now the default for most Linux distros

>alternatives to the components of systemd are dying

R: 114 / I: 7 / P: 4 [R] [G] [-]

OpenBSD as Primary Workstation

Been using linux since hardy, used various forms of it from suse to arch for different applications but now thanks to pledge+chromium it has replaced arch on even my laptop and my private server has run it since I first heard of it. My question is has anyone tried it in a workstation setting?

R: 75 / I: 2 / P: 4 [R] [G] [-]

Veracrypt file plausible deniability / cuckoo's egg

Hey!

Instead of using an hidden volume for plausible deniability of the existence of an encrypted volume, wouldn't it be also possible to use a file container and and hide the file as something unremarkable?

The encrypted container can't distinguished from random. You could name it "004.dump" or "mem.log" to make it seem like it's just a blob of uninterpretable binary.

Are there any programs which generate big files of data which can't be distinguished from random afterwards?

R: 51 / I: 4 / P: 4 [R] [G] [-]

Someone is Trying to Govern the Internet Again

/tech/, a group of Swedish internet vigilantes are trying to govern the internet. More specifically, websites that host 3D printed weapons, like the Liberator and Songbird pistols. They're doing this by spamming the websites with phony uploads, claiming to be one of the pistols, but instead, is a model of that goddamn knotted-barrel revolver thing. Of course, this is useless against websites that show CAD previews, but it's still fucking annoying. Leave our goddamn physibles alone, Sweden. You can't stop humans from arming themselves.

https://www.thefirearmblog.com/blog/2019/02/27/non-violence-torrent-3d-printed-gun/

https://vimeo.com/314435907

Of course, there are plenty of websites that only host the files (such as http://herohog.com/GunBuilds/), and can't have anything uploaded, and websites that have file previews, but websites like The Pirate Bay are going to be hit pretty hard by this.

The only thing that annoys me more than the project itself is that they constantly refer to 3D printed gun file distribution as "the 3D printed gun market", which is so obviously wrong, it pisses me off. The 3D printed gun community (actually, the entire 3D printing community) is literally the most open source community next to Linux and GNU.

R: 37 / I: 6 / P: 4 [R] [G] [-]

Ching Chong hate thread

Every single Linus video:

>"today we are gonna test this chinese fake hardware"

>"it's so cheap, it's impossible to be real"

>"I fucking hate the chinks so much, can't wait for WWIII"

>test the hardware

>"it's actually performing better than the original"

>"but NVidia/Intel said it's bad and has no warrant, so never buy it and be wary of the red menace"

or:

>"wow, this test/hardware actually shows Intel was lying about this subject"

>"but doing it is bad because Intel said this can explode your home or something"

R: 2 / I: 0 / P: 4 [R] [G] [-]

Good GUI widget libraries

Are there any good GUI widget libraries for C, specifically with as little bloat as possible? Most of them seem to be only compatible for C++.

R: 41 / I: 4 / P: 4 [R] [G] [-]

Retro CRT Monitors

Is anyone here interested in old CRT monitors?

I'm considering buying a Sony Trinitron.

R: 297 / I: 49 / P: 4 [R] [G] [-]

Audio Hardware Thread

AUDIO AND AUDIO ACCESSORIES

What AMPs are you faggots using? I'll be getting an HD 6XX soon and is currently looking for an AMP. I'm currently looking at the Fiio E10K and the K3 but don't know the difference between the two. Any amps you'd recommend?

R: 94 / I: 8 / P: 5 [R] [G] [-]

NodeJS

Why, oh why would anyone use this abomination? How did we even get to this point where it is acceptable to have something like NodeJS exist?

God truly abandonded us.

R: 353 / I: 29 / P: 5 [R] [G] [-]

UNIX Hater: I am Calling You Out

GET IN HERE UNIX HATER

This is your thread. You can do and say whatever you want in this thread. Stop derailing other threads.

No one cares what you think about UNIX or C. You might think it fools anyone to larp around quoting yourself with based, but it doesn't. You've not proven any knowledge or proficiency beyond quoting insufferable usenet posts made by academics who were butthurt because they made poor choices with their careers. You aren't posting any facts to support your opinion, so your opinion is shitposting and is against the rules.

>No spamming, sagebombing, shitposting, unwarranted self-identification (ie. signatures, avatars, tripcodes), or making posts advertising or requesting any kind of currency (bitcoin, altcoin, USD, etc), referrals, boards, products, and/or services. Shitposting is defined as a post or thread that doesn't have any meaningful content, indecipherable text (ie. "lol u tk him 2da bar|?") or otherwise contributes nothing toward discussion (ie. posting just to announce sage). It does NOT mean "anything you don't personally like."

If you want to contribute to this board, then you need to have evidence to back up your claims.

You've already been called out about making your own OS. This was your response >>1035593

>I don't have enough time to dedicate to doing so.

You are a shitposter. If you want to shitpost, do it in your own shitty thread.

R: 160 / I: 9 / P: 5 [R] [G] [-]

Vim alternatives

I've been a pretty big vim fan for most of my programming career. I've always liked how good it was at doing one thing well, editing. However, I feel as though a few things are happening to it; specifically, more and more people are joining the community, expecting VS-code-like features from their editor. Few people are really interested in the Unix philosophy that made vim such a powerful tool to begin with.

I've been looking at a few alternatives:

1. nvim - Attempts to rewrite vim bug-for-bug. I've been using this for a while, but it still has problems with people trying to force it to do things it really shouldn't do.

2. vis - This is a new favorite. This mixes vi(m) modality and sam/acme regex. Cool stuff

3. vi - I've been looking at using this as a daily driver. However, I enjoy syntax highlighting and easy configuration, which vi doesn't really have.

4. kakoune - A total redesign of vim, with less emphasis on cutting bloat and more on adding features/redefining features. Cool ideas in there though.

What do you guys use?

>inb4 emacs

R: 59 / I: 9 / P: 5 [R] [G] [-]

KDE Long Term Goals and increasing diversity via a coc

>The community is largely homogeneous with regard to gender, race, class and geographical extraction, being made up mainly by white male middle class European engineers.

>Help increase diversity: Over the next 5 years help promote diversity and collaborate in attracting contributors in order to get close to having the same proportion of men, women, and other genders as there are in the real world. Likewise promote KDE as a community all over the world to contribute to recruiting contributors so as to achieve a balanced representation of the largest number of ethnicities and nationalities as possible among contributors. At the moment, the community is composed mainly by white male Europeans. The goal is to add 5 percentile of minority contributors to the community every year over the next 5 years, without decreasing the number of contributors KDE already has. We can do this by carrying out actions that target under-represented genders, ethnicities and people with disabilities, so that we can tap undiscovered talent, receive input and help from a larger slice of the population, and better adapt KDE's software to the needs of wider selection of the population. We can take a page from Wikimedia's playbook on how to encourage under-represented groups to participate in KDE's community. Implement and enforce a strict CoC both for the community and each event against discrimination and harassment. Also, move main event (Akademy) away from Europe and encourage sprints and events in other places, like Asia, South America and Africa, as well as activities devise activities which will appeal to minorities.

https://banana.dog/@yaaps/101603286717521033#

https://community.kde.org/Promo%27s_Long_Term_Goals

If any of the KDE contributors comes here please stop this madness you don't need "diversity" you need people who wants to contribute and especially people who does it well.Skin color, race, sex is not important. If you force yourselves to have such goals instead of just wanting to just grow a better community then you'll have people who think that race, sex, nationality etc... is more important than the project/code.

R: 99 / I: 7 / P: 5 [R] [G] [-]

Uses for a raspberry pi 3?

I got a pi3 awhile back to make a retroarch setup. It was fun, but I got bored with it.

Does /tech/ mess with these things? What projects have you made? Are arduinos better?

I'd like to get some ideas to make this thing useful.

R: 29 / I: 4 / P: 5 [R] [G] [-]

Robot Monk Delivers Buddhist Sermons at an Ancient Japanese Temple

To attract young worshippers, an ancient Japanese temple engaged an AI monk - Android Kannon - to deliver religious sermons in multiple languages.

The $900K robot, which was a collaboration between Kyoto’s Kodaiji temple and Hiroshi Ishiguro, an Osaka University intelligent robotics professor, provided its first sermon at the religious landmark on Feb. 23, The Daily Mail reported.

https://www.turingtribe.com/story/robot-monk-delivers-buddhist-sermons-at-an-ancient-japanese-temple-mPyzW5p7yfqjSeasz

R: 35 / I: 2 / P: 5 [R] [G] [-]

SPEEDGATE AI GAME

SPEEDGATE

SpeedGate is a sport that some AI faggots came up with. I wanted to archive the website and link that here, but the website is generated from JS in real time (because that's apparently necessary to describe a sport,) rendering archiving useless. Eventually, I had to screencap the website 18 times and stitch the parts together in GIMP to create pic related.

The game seems alright for backyard fun; thing is, it really wasn't that much work on the part of the software. The sport was dreamed up by a series of ANNs that were being run on an (((Nvidia))) cluster along with many other possible games and this one was the one that made the most sense (others were games that involved exploding frisbees and underwater freerunning.)

Although the sport seems decently fun, it seems that the creators are complete faggots. I'm not sure about my own opinion of this sport, but it at least seems like a technically impressive feat.

R: 27 / I: 4 / P: 5 [R] [G] [-]

MOTIVATION

I have no motivation to accomplish anything, /tech/. How do you all stay motivated?

R: 6 / I: 0 / P: 5 [R] [G] [-]

What's the difference between an algorithm and a logarithm? I've been trying to finally solve this problem and spent all day looking it up. Someone here has to know.

I think it's something like algorithms run in PSPACE and logarithms only apply to the quantumn domain.

R: 231 / I: 28 / P: 5 [R] [G] [-]

This VPN that is being advertised here is a honeypot and Jim is cooperating with glowniggers by being sponsored by them.

R: 9 / I: 1 / P: 5 [R] [G] [-]

Fuck me in my asshole right now. I don't want to move to shitty Windows 10 and I don't want to switch to some backwater OS that has next to no mainstream software or vidoe gaem support. I don't want to become a script kiddie, Linux-using /tech/ faggot. I want my Windows 7 forever for eternity without compromised security. How can I make this be the case after January 2020?

R: 53 / I: 5 / P: 5 [R] [G] [-]

Do we need a higher resolution than 640x480? Why? What is the ideal resolution?

R: 3 / I: 1 / P: 5 [R] [G] [-]

Alright so how do I bypass error 6118 on command prompt? Yeah Ik I sound like a boomer and probably shouldn’t ask /tech/ this retarded question but I’m getting desperate :(

R: 36 / I: 5 / P: 5 [R] [G] [-]

What the heck is with this trend of taking a modern computer and using it solely to emulate a 40 year old microprocessor? It's just a damn pi every time. It would be interesting to see a retro-style console made from actual hardware, but this? Even chink hackers are more ambitious than these 'makers' and their pi shit when they make their plug'n play consoles.

R: 58 / I: 3 / P: 5 [R] [G] [-]

I do not like smartphones. The whole concept and idea of smartphone seems completely stupid for me. This device is just shitty computer, shitty mobile phone, shitty camera and shitty navigation combined into one shitty and in practice totally useless device.

However smartphones are very popular and I do not know what does it mean. Why there are so popular? Are these devices have any future or there are just temporary fashion?

Note for retards: I enjoy classical mobile phones and even feature phones, these ideas was pretty good, but smartphones are in my opinion mistake

R: 229 / I: 27 / P: 6 [R] [G] [-]

Post sites that don't stink

What are some good sites that respect the client? (regardless of the quality of content on the site)

>disqualification:

- Google captcha

- completely non-functional without JS

>crippling penalty:

- banning/captcha-walling Tor or VPN usage

- Cloudflare

- not e2e encrypted

>hard mode:

- WWW

- aesthetically appealing

>beast mode:

- interactive forum with regular activity

- popular

R: 17 / I: 2 / P: 6 [R] [G] [-]

Goldberg Steam Emulator

https://gitlab.com/Mr_Goldberg/goldberg_emulator

Someone made an open source steam emulator. How long until they shut it down?

R: 65 / I: 22 / P: 6 [R] [G] [-]

masonic symbols in tech logos

"Top tech companies have based their main logos on luciferianism and freemasonry"

pics related. what are your thoughts about this? do you have any other examples like these? discuss.

(pics from jimstone.is http://82.221.129.208 where i found this whole story)

R: 9 / I: 0 / P: 6 [R] [G] [-]

Code & Script Thread

So I am looking to automate some task but I am having trouble finding what I really need on Google and dont really know where to begin otherwise.

At the job I work at, I receive automated text messages everyday asking if I'd like to pick up an extra shift. The problem is that they only give out extra shifts to so many people before locking the form.

What ends up happening is

>get text message containing web page to accept available extra shift.

>click on link

>opens chome

>login in

>click shift form button, click accept, click confirm

>all spots have been taken, try later.

>rage.jpg

On top of not being fast enough to open the link, the company sends the once daily text at random times during the night and day.

What I need is something that

>automatically detects text messages received from a specific number.

>opens link in most recent text

>auto login to webpage

>accepts the shift for me

I'd like to set this up and forget about it. An on/off switch would be nice for those days I don't want to work a double shift.

I don't know how to code and I'm not familiar with any coding apps.

If I knew how to pull links from the text messages on my phone it would be a lot easier.

R: 45 / I: 4 / P: 6 [R] [G] [-]

/pol/ /b/ /sudo/ block tor

<is /tech/ next?

(last thread censored by /tech/)

the "hapas are superior to whites" spam attacked the thread and apparently the mods deleted the entire thread.

After the new zealand shooting it's no suprise 8ch is under pressure to remove the ability for users to post anonymously. Jim has caved to the pressure.

The "hapas are superior to whites" spam is a targeted operation to give 8ch a reason to disable tor and range ban every VPN/proxy that pops up. This is not just some random spammer. This is codemonkey himself. Notice how simply requiring a captcha before every single post is not implemented (which would be an effective anti-spam tool), tor is simply blocked and VPN's banned.

/tech/ is now the only major board left to allow tor posting, but as we can already see, codemonkey is already attacking /tech/. How long until the /tech/ mods disable tor too?

Find alternative boards, maintain a list. 8ch's days as a place of free speech are coming to an end.

R: 65 / I: 1 / P: 6 [R] [G] [-]

Would I really benefit from reading this?

I'm currently a Math Major. Will this distill most of CS? How will this compare to PAPL? https://papl.cs.brown.edu/2016/

R: 47 / I: 3 / P: 6 [R] [G] [-]

Alright /tech/, I have been doing some computering lately and I realized that web browsers can load files from the local file system with this protocol:

file://

Could CIAniggers use this to load files from paths that are always the same and then send them off with JavaScript in order to find out information about you?

Like these:

C:\Windows
C:\ProgramData
/var/log
/etc
/home/<user>

When I put this:

<img src="file:///etc/alternatives/start-here-16.png" alt="benis" />

into a html file and open it, It loads the Debian icon.

Should I be worried about this?

Pls respond am not good with computer.

R: 12 / I: 3 / P: 6 [R] [G] [-]

Did she do a great job at hiding her email address?

R: 52 / I: 10 / P: 6 [R] [G] [-]

Video codec wars

>AV1 gradually getting out of the experimental stage but still suffering from snail-tier encoding

>MPEG trying to squeeze every last remaining shekel out of HEVC, thinking that hardware encoders in every $20+ GPU will save a codec that has never and will never be used for end-user livestreaming

>Intel releasing AVX-512 optimized encoders for AV1 and VP9

>h.264 going strong as VP9 is still too slow for real-time encoding while HEVC remains a licensing minefield only useful for Animu scene encodes

>MPEG working on VVC, forms the Media Coding Industry Forum ostensibly to avoid another patent licensing clusterfuck, promises 30-50% bitrate savings over HEVC by 2021

>Divideon trying to capitalize on the situation by offering the royalty-based XVC meme codec using patented tech to the extent that a single licensing scheme can allow, with similar video quality to AV1 and supposedly greater encoder performance

>Codemumkey still hasn't added AV1 support to 8chan

Who is likely to win?

When will proprietary software be outlawed?

R: 17 / I: 2 / P: 6 [R] [G] [-]

Storage general

Media, drives, controllers, NAS, RAID, partitioning, filesystems, bootloaders, multiboot etc.

R: 11 / I: 0 / P: 6 [R] [G] [-]

IDEs

I seriously don't understand why people use IDEs. Someone please explain it to me.

>tiny fraction of screen is dedicated to code

>rest is occupied by BLOAT BLOAT BLOAT

>takes hundreds of years to load

>can't edit simple files without making a BLOATED project first

R: 176 / I: 13 / P: 6 [R] [G] [-]

Shell thread

Post your shell commands or ideas for shell commands. I'm compiling a list. Here's what I got so far:

https://gitgud.io/chiru.no/useful-bash-stuff

gimpresize(){ input="$1"; res="$2"; output="$3"; gimp -ib "(let* ((image (car (gimp-file-load RUN-INTERACTIVE \"$input\" \"\")))(drawable (car (gimp-image-get-active-layer image))))(gimp-image-scale-full image $res INTERPOLATION-LOHALO)(gimp-file-save RUN-NONINTERACTIVE image drawable \"$output\" \"\"))(gimp-quit 0)";}
# gimpresize input.png 1920\ 1080 output.png

imagemagickresize(){ input="$1"; res="$2"; output="$3"; convert $input -colorspace RGB +sigmoidal-contrast 12.09375 -filter Lanczossharp -distort resize $res -sigmoidal-contrast 12.09375 -colorspace sRGB $output;}
# imagemagickresize input.png 1920x1080 output.png

vidtogif(){ input="$1"; res="$2"; colors="$3"; output="$4"; ffmpeg -i $input -vf palettegen /tmp/palette.png && ffmpeg -i $input -i /tmp/palette.png -lavfi paletteuse $output && gifsicle -b -O3 --resize-width $res --colors $colors -i $output;}
# vidtogif input.webm 640 200 output.gif

vidtowebm(){ input="$1"; videoquality="$2"; audioquality="$3"; output="$4"; ffmpeg -i $input -vcodec libvpx-vp9 -b:v 0 -crf $videoquality -c:a libopus -b:a $audioquality -g 500 -threads 8 $output;}
# vidtowebm input.mp4 40 192K output.webm

vidtomp4(){ input="$1"; videoquality="$2"; audioquality="$3"; output="$4"; ffmpeg -i $input -c:v libx264 -crf $videoquality -profile high -level 5.1 -preset veryslow -pix_fmt yuv420p -c:a aac -b:a $audioquality $output;}
# vidtomp4 input.mkv 20 192K output.mp4

7zipmax(){ archive="$1"; directory="$2"; 7z a -t7z -mx9 -m0=lzma -mfb=273 -md=1024m -ms=on -mqs=on -myx=9 -mmc=200 -mlc=8 $archive $directory;}
# 7zipmax archive.7z directory/

tarmax(){ archive="$1"; directory="$2"; XZ_OPT="--lzma1=preset=9e,dict=1024MB,nice=273,depth=200,lc=4" tar --lzma -cf $archive $directory;}
# tarmax archive.tar.lzma directory/

screenshot(){ scrot -e "meh \$f || sxiv \$f || feh \$f || nomacs \$f && read -erp Upload\? -n1 yn && [ \\\$yn == y ] && curl -F upload=@\$f https://chiru.no";}
# screenshot

waifu2xmax(){ input="$1"; output="$2"; quality=$(identify -verbose $input | grep -oP "(?<=Quality: ).*"); noiselevel=3; [ $quality -gt 95 ] && noiselevel=2; [ $quality -gt 98 ] && noiselevel=1; parameters="-m noise_scale --noise_level $noiselevel --scale_ratio"; [ -z $quality ] && parameters="-m scale --scale_ratio"; iteration=2; while waifu2x-converter-cpp -i $input --force-OpenCL $parameters $iteration -o $output; do ((iteration++)); done;}
# waifu2xmax input.png output.png

mouseaccelerationdisable() { for i in {0..99}; do xinput set-prop $i "libinput Accel Profile Enabled" 0 1; done &> /dev/null;}
# mouseaccelerationdisable

R: 15 / I: 1 / P: 6 [R] [G] [-]

Daily reminder to do your digging 8chab is being hosted by a San Fran based company

R: 28 / I: 3 / P: 6 [R] [G] [-]

Got bored so I wrote a script for doing the dnsbls from your terminal, it'll spit the image out to /tmp/captcha.png and it'll display it with the command specified with the -d flag if specified.


#!/bin/bash
while getopts ":d:h" opt; do
case "$opt" in
d)
display_command="$OPTARG"
;;
h)
echo "Usage: dnsbls [-h] [-d IMAGE_DISPLAY_COMMAND]"
exit 255
esac
done


function Captcha {
dnsbls_url="https://8ch.net/dnsbls_bypass.php"
html=$(curl $dnsbls_url 2>/dev/null)
echo "$html"
}

function Captcha_id {
captcha="$1"
echo "$captcha" | grep -oP "(?<=value=['\"])[\S]+(?=['\"])"
}

function Captcha_image {
captcha="$1"
outfile="$2"
echo "$captcha" | grep -oP '(?<="data:image\/png;base64,)[\S]+(?=">)' | base64 -d > "$2"
}

function Captcha_submit {
captcha="$1"
captcha_text="$2"
captcha_id=$(Captcha_id "$captcha")

status="$(curl --output /dev/null -w %{http_code} -s --data "captcha_text=$captcha_text&captcha_cookie=$captcha_id" https://8ch.net/dnsbls_bypass.php)"

if [ "$status" -eq 200 ]
then
return 0
else
return 255
fi
}

captcha="$(Captcha)"
Captcha_image "$captcha" "/tmp/captcha.png"

if [ "$display_command" != "" ]
then
$display_command /tmp/captcha.png &
read answer
display_process=$!
kill -15 "$display_process" 2>/dev/null
else
read answer
fi

Captcha_submit "$captcha" "$answer"

R: 348 / I: 61 / P: 7 [R] [G] [-]

Linux Alternative General #2

FREEDOM OF CHOICE EDITION

This list is for desktop oriented operating systems. List is ordered roughly by developmental stage.

BSDs - finished, werks:

Name: MidnightBSD

License: Simplified BSD License

Kernel: BSD Monolithic

Name: OpenBSD

License: Simplified BSD License

Kernel: BSD Monolithic

Name: NetBSD

License: Simplified BSD License

Kernel: BSD Monolithic

Name: Dragonfly BSD

License: Modified BSD License

Kernel: BSD Monolithic/Hybrid

Illumos - mostly server oriented, compatibility layer is there "but haven't ported it yet":

Name: OpenIndiana IllumoS

License: CDDL License (MIT resemblence)

Kernel: IllumoS Monolithic

Name: ToaruOS IllumoS

License: UIUC License (MIT resemblence)

Kernel: IllumoS Monolithic

Name: Tribblix IllumoS

License: CDDL License (MIT resemblence)

Kernel: Illumos Monolithic

AROS Systems - Amiga-based niche OS, mostly justwerks:

Name: AROS Research OS

License: AROS Public License (Mozilla resemblence)

Kernel: Exec Microkernel

Name: Icaros Desktop

License: AROS Public License (Mozilla resemblence)

Kernel: Exec Microkernel

Name: Aspire OS

License: AROS Public License (Mozilla resemblence)

Kernel: Exec Microkernel

Name: AEROS OS (warning: do NOT use)

License: OIN License (Protection racket resemblence)

Kernel: Linux Monolithic (ain't no escape)

Oddball OS - experimental, will become better:

Name: Sculpt OS

License: GNU GPL License

Kernel: Genode OSF base-hw Microkernel

Name: Haiku

License: MIT License

Kernel: Haiku Monolithic/Hybrid

GNU/Hurd - experimental and desperately needs more active development because it's borderline abandonware:

Name: Arch Hurd

License: GNU GPL License

Kernel: GNU Mach Microkernel

Name: Devuan GNU/Hurd

License: GNU GPL License

Kernel: GNU Mach Microkernel

Name: Gentoo GNU/Hurd

License: GNU GPL License

Kernel: GNU Mach Microkernel

Name: GuixSD GNU/Hurd

License: GNU GPL License

Kernel: GNU Mach Microkernel

Name: NixOS GNU/Hurd

License: MIT License

Kernel: GNU Mach Microkernel

R: 73 / I: 4 / P: 7 [R] [G] [-]

Best DB

I've been seeing the altchans ramp up their shilling since the New Zealand kebab removal. I'm thinking of throwing my hat into the ring. What's the best database solution for an imageboard? MySQL, PostgreSQL, SQLite? One of the non-relational databases like MongoDB I know it gets Stephen Lynx all wet.

How do you justify your choice?

R: 14 / I: 1 / P: 7 [R] [G] [-]

graphql

Can someone explain this to me?

Is this the latest webdev meme to make websites even more bloated and force people to learn yet another framework/technology?

R: 74 / I: 6 / P: 7 [R] [G] [-]

Internet about end

The internet as you know it is about to end.

Soon it will be worse than your worst nightmares.

The old 90s internet will NEVER be back.

R: 101 / I: 9 / P: 7 [R] [G] [-]

What the hell is there left to write?

It feels like everything you can make money off writing has already been made? Am I just not being creative enough or is there really this brick wall in terms of what software can solve?

R: 45 / I: 29 / P: 7 [R] [G] [-]

It's time to get real about OS security

We need something better than all the Win/Mac/Linux shitware we have now. Software nowadays is unmaintainable and bloated as hell. The answer is a secure microkernel OS with formal verification and a clean codebase with minimalism and isolation in mind.

R: 64 / I: 7 / P: 7 [R] [G] [-]

Article 13 around the corner and #Blackout21

https://archive.is/19XAf

I was wondering what are the average /tech/no's opinion on this whole mess of a legislation. From what I've come to understand, platforms such as this very one seems to be mostly exempt (not only because they're based in America with no European counterpart, but because they fail to reach the user and revenue quotas of the bigger players), as well as most attempts at parody and pastiche seem to be somewhat protected.

That being said, we all know how much of a shitter every filtering service really is, Youtube's Content ID check being at the forefront of fucking with even uttered words.

https://archive.is/Gox9j

https://archive.is/ylY77

Also, what are burgers' take on this?

>please don't just say "lmao doesn't affect me hoss"

R: 66 / I: 4 / P: 7 [R] [G] [-]

PowerPC?

What machine do you use, and what operating system is it running? I have Debian 8 Sid installed on my 15" PowerBook G4, and it's great.

Pic related

R: 404 / I: 8 / P: 7 [R] [G] [-]

Author successfully DMCA's GPL'd work

Since: http://oxwugzccvk3dk6tj.onion/tech/res/1018729.html

was bumplocked by the shadow admins (aka the programming code) (Since I'm winning on all counts: because I am correct on the law).

https://lkml.org/lkml/2019/2/4/1065

Quick recap, as told by anon:

Anonymous 02/05/19 (Tue) 14:47:16 No.1027517

Summary of this episode as this thread reaches the bump limit:

>an impersonator ("John Doe") created GitHub, then GitLab and BitBucket repos for trolling purposes

>MikeeUSA hit all three with DMCA (with the GitLab and BitBucket repos successfully taken down)

>meanwhile the impersonator opened the GitHub repo to pull requests; Mikee's butthurt as usual

>that GitHub repo's last commit was made last Thursday

And:

>>1027530

>Gitlab and Bitbucket repos are down due to DMCA notices

>There is still no evidence he hit github with a DMCA

<100 IQ

And

"GPL is Revocable" (== incel terrorism -reddit)

R: 79 / I: 4 / P: 7 [R] [G] [-]

Your Compiler is Backdoored

Countering "Trusting Trust"

schneier.com/blog/archives/2006/01/countering_trus.html

web.archive.org/web/19961220000813/http://www.acm.org/classics/sep95/ this is an archive of the dead link in the top of the article

>Way back in 1974, Paul Karger and Roger Schell discovered a devastating attack against computer systems. Ken Thompson described it in his classic 1984 speech, "Reflections on Trusting Trust." Basically, an attacker changes a compiler binary to produce malicious versions of some programs, INCLUDING ITSELF. Once this is done, the attack perpetuates, essentially undetectably. Thompson demonstrated the attack in a devastating way: he subverted a compiler of an experimental victim, allowing Thompson to log in as root without using a password. The victim never noticed the attack, even when they disassembled the binaries -- the compiler rigged the disassembler, too.

>This attack has long been part of the lore of computer security, and everyone knows that there's no defense. And that makes this paper by David A. Wheeler so interesting. It's "Countering Trusting Trust through Diverse Double-Compiling," and here's the abstract:

>An Air Force evaluation of Multics, and Ken Thompson's famous Turing award lecture "Reflections on Trusting Trust," showed that compilers can be subverted to insert malicious Trojan horses into critical software, including themselves. If this attack goes undetected, even complete analysis of a system's source code will not find the malicious code that is running, and methods for detecting this particular attack are not widely known. This paper describes a practical technique, termed diverse double-compiling (DDC), that detects this attack and some unintended compiler defects as well. Simply recompile the purported source code twice: once with a second (trusted) compiler, and again using the result of the first compilation. If the result is bit-for-bit identical with the untrusted binary, then the source code accurately represents the binary. This technique has been mentioned informally, but its issues and ramifications have not been identified or discussed in a peer-reviewed work, nor has a public demonstration been made. This paper describes the technique, justifies it, describes how to overcome practical challenges, and demonstrates it.

There have been cases out in the wild of this, a high profile one only a couple years ago, but I have to dig it up. Most people, even in the security industry, don't know about this type of attack, and almost no one even tries to even mitigate it. It's tough enough to get people, even developers, to compile their own code; but now they have to compile it from multiple possibly new compilers and then do extra work beyond that.

R: 20 / I: 2 / P: 7 [R] [G] [-]

(((WPA3)))

Serious flaws leave WPA3 vulnerable to hacks that steal Wi-Fi passwords

https://arstechnica.com/information-technology/2019/04/serious-flaws-leave-wpa3-vulnerable-to-hacks-that-steal-wi-fi-passwords/

<archive.is/.fo is down or I would put that here

>The next-generation Wi-Fi Protected Access protocol released 15 months ago was once hailed by key architects as resistant to most types of password-theft attacks that threatened its predecessors. On Wednesday, researchers disclosed several serious design flaws in WPA3 that shattered that myth and raised troubling new questions about the future of wireless security, particularly among low-cost Internet-of-things devices.

Anyone else as shocked as me this is the result of a closed development process?

The parenthesis in the subject line show radio waves, nothing else.

R: 130 / I: 17 / P: 7 [R] [G] [-]

Removing printer micro dots

Is there anyway to remove printer micro dots using modified firmware or physical hacks? It seems to me eventually they will crack down on political fliers by tracking down the sources.

R: 45 / I: 2 / P: 7 [R] [G] [-]

Meta-Machine Code

I would like to show off a tool I've created; the included image is an example of the tool with a program I've written loaded; the main page for this tool can be found here:

http://verisimilitudes.net/2017-07-07

The page for the only current version of the tool is here; note it is an immature page in comparison:

http://verisimilitudes.net/2018-08-08

This is an interactive machine code development environment I've created. The basic idea is each key of the keyboard, decided by position rather than value, is bound to a routine which asks questions until an action can be decided upon. An example is pressing a key for a routine that merely needs two registers in order to complete; you're permitted to enter a register number, the tool won't allow invalid such numbers to be entered at all, it asks again in the same way, and it then writes the finished instruction to the current location; if a name referring to a number was used, that name will likely be displayed instead of the numerical value, varying, and any changes to the name will update the instruction as well.

I wrote this tool in Common Lisp purely because Common Lisp has the necessary primitives. The program is decidedly non-Lispy. I'm planning to write a simpler reimplementation in Ada by the year's end and expect this will be the version that is distributed to package managers and whatnot. Some simple figuring has shown to me that the memory usage for this program, sans any undo and redo mechanism, should be well within an eighth of a megabyte in the general case and below a quarter in all cases.

The tool was borne of my dislike for assemblers. Answers are saved by similar routines and so you can very easily press keys until you find the one you need; you can't touch and feel your way around an assembler. Aside from this, there are also special routines, primarily located on the home row, which control movement, insertion, deletion, jumping around the program space, creating and deleting names, and other necessities.

In contrast to a one or two pass assembler, this is a no-pass tool, as everything must at all times be in a valid state. You can't use a name before it's created; updating a name works modulo its usage size, preventing errors from surpassing limits; and deleting a name merely removes the association, preventing further updates upon changes, among other such measures.

This is a reasonable description of the tool. Currently, only I can use it, because it's not in a friendly state for installation and I only have a correct Dvorak mapping created. I'm also still refining it and removing bugs I've added during this refining. The entire system, including the three libraries I wrote for it, is less than two and a half thousand lines of code.

I've been trying to show this tool to a wider audience, but I've not found much of one yet. Feel free to tell me what you think and ask any questions concerning the tool.

R: 158 / I: 25 / P: 7 [R] [G] [-]

BOYCOTT INTERNET ARCHIVE

My story:

Last night, I uploaded in regards to the 2019 Christchurch Massacre the Facebook Live stream, the manifesto, and the PDF archived thread.

The Internet Archive removed the video of the 2019 Christchurch Massacure without notice. I emailed them asking why, and told them my intent to reupload. I did. When I woke up this morning, the video was taken down again. I discovered shortly after my account had been locked. I emailed a second time to inquire. Shortly after this email, I discovered that both the manifesto and the archived thread have been set to "required to log-in to view" and have been Geologically censored. The Metadata says France is the region it is not able to be viewed. This does not make sense.

I have sent three emails and not received a single reply. I decided to wait until now for a reply, because I expected now to be a reasonable deadline. They have not replied. As of now, the two remaining files are still censored, and the video is still deleted. I am still unable to log into my Internet Archive account. With this, I am hereby announcing a boycott of the Internet Archive until they stop this censorship!

Spread these flyers, I have contacted multiple media outlets about this censorship, as well as persons involved in high-tech cases such as the EFF whom I hope will side with me and help participate in this boycott. I hope to make a difference. I am but one man, and need help.

The URLs of the files that remain are here:

https://archive.org/details/2019removekababmanifestonz

https://archive.org/details/2019removekabab_announce

And the URLs of the video and reupload that are now down

https://archive.org/details/2019removekabab

https://archive.org/details/2019removekabab_reupload

Censorship is telling a man he can't have a steak just because a baby can't chew it

R: 60 / I: 5 / P: 7 [R] [G] [-]

It is finally here: The RISC-V PC!

>While it’s clear that the most significant opportunities for RISC-V will be in democratising custom silicon for accelerating specific tasks and enabling new applications — and it’s already driving a renaissance in novel computer architectures, for e.g. IoT and edge processing — one question that people cannot help but ask is, so when can I have a RISC-V PC? The answer to which is, right now.

https://abopen.com/news/building-a-risc-v-pc/

Only 4000$ !

R: 162 / I: 13 / P: 8 [R] [G] [-]

Social interaction post 2008

Remember in 2008, we would be able to find general communities for various different hobbies, video games, technology, arts, sports, now all that has been swallowed up by giant corporations which breed homogeneous, unoriginal behavior due to being accessible by the unoriginal masses who obey the law of social norms.

Are there still any communities around?

R: 64 / I: 13 / P: 8 [R] [G] [-]

how the fuck do i make a pirate radio station

Anybody have some infographics on how to make a pirate radio station? planned on making one so i can create a local station that's for my friends mostly, if anyone also knows how to control the range, that info would be also greatly appreciated (i'm looking for a range of around 1-2 miles)

so far i've only come up with one blurry ass one on google images

R: 103 / I: 12 / P: 8 [R] [G] [-]

TempleOS General - /tosg/

Just installed this fine piece of software, feels like being digitally baptized.

R: 29 / I: 2 / P: 8 [R] [G] [-]

DNS thread

G'day /tech/, recently I've been searching for good DNS providers and would like to gather some opinions on which on to chose. Currently I'm torn between open-DNS and Cloudflare-DNS but I'd appreciate alternate options.

R: 129 / I: 3 / P: 8 [R] [G] [-]

GRSecurity Kernel Patch?

Is there any news on this.

Are they ever going to release another open version?

Why do they get to violate the GPL by adding an additional restrictive term (we will punish you if you redistribute the source), when their patch is a non-separable derivative work of the kernel?

R: 165 / I: 52 / P: 8 [R] [G] [-]

Iconic & Reliable

What is 'the Casio F-91W' of other tech?

I.e., inexpensive, well-built, reliable, outdated, & iconic.

R: 76 / I: 6 / P: 8 [R] [G] [-]

>"Smart"-everything

>corporate spyware

>Code of conducts & normie fuckery instead of actual work

>Still no year of the linux desktop

>Linux has been subverted by systemd fuckery

>Horrible flat UI interfaces that strain my eyes everywhere

>Actual government spyware all around

>still no truly secure computing

>Rampant javashite bloatware that forces you to upgrade your hardware

>software doesn't last and shit you write today doesn't last more than a couple years because everything breaks all the time and no one cares about writing lasting software

I'm so tired of technology.

How do I unplug if tech is all I know?

R: 31 / I: 1 / P: 8 [R] [G] [-]

I have $1000 to donate to tech . How can I use it to best help fix this clusterfuck situation?

R: 28 / I: 2 / P: 8 [R] [G] [-]

>Intel Pentium gold and silver with WiFi support directly in the CPU.

Why nobody is talking about this?

R: 17 / I: 4 / P: 8 [R] [G] [-]

(Effectively) Power-free computing

Alright so the CIA or your choice of any local three-letter agency is probably going to lynch us for discussing this kind of technology, but I've been looking into hardware components which I think are being under-utilised. What kinds of components? The sorts that could be used to do general desktop computing without bowing down to the Electric Jew. With some of these concepts put together, you could probably shitpost on 8ch with a hand-crank powered computer. Here are my findings:

Non-volatile RAM:

https://en.wikipedia.org/wiki/Non-volatile_random-access_memory

RAM which can store memory without persistent power. An SSD can be utilised as NVRAM, but there's been other methods to try to implement this. With an ideal implementation, powering off your computer would be equivalent to putting it in a hibernation mode.

e-Paper:

https://en.wikipedia.org/wiki/Electronic_paper

You probably associate this with e-Readers, and therefore annoying harry potter-reading single mothers but the truth is, these things are incredible. If it weren't for the costs associated with the other hardware of an e-reader, they could stay charged indefinitely. As you know, the thing which sets it apart from other low-power displays used in calculators and the like are viewing angle, and the fact that rather than blanking out when the power is cut, they have to actually wipe themselves clean. The refresh rate is terrible though, so this will be pretty grating with conventional, line-by-line text processing.

Etch-a-Sketch:

https://www.youtube.com/watch?v=0XM3BJDusBo

https://www.youtube.com/watch?v=bmDz3yQFOWc

Power Over Ethernet:

https://en.wikipedia.org/wiki/Power_over_Ethernet

I'll admit this is cheating, but for most interesting tasks involving a computer, you'll need networking anyway.

If the requirements of having an Ethernet port at all are too steep, then we could scrap this and build a modem into the computer instead. If we do this, we have to account for the electricity the external phone uses as well.

Human Power:

https://en.wikipedia.org/wiki/Human_power

https://www.k-tor.com/hand-crank-generator/

I alluded to this earlier, and you might've taken it as shitposting. Just read the sales pitch, and you'll see that it's more than enough to power the kind of computer we're looking at.

Plug Computer Form Factor:

https://en.wikipedia.org/wiki/Plug_computer

Doesn't exactly align with the objective, since you can't really just power them off at will, but their low wattage (generally lower than the Commodore 64, apparently) still makes them useful if you need a computer that's active 24/7. You could use it for to run a bittorrent program, and maybe a web server I guess.

The ideal goal is to have a computer that consumes 0 watts in an idle state (idle meaning, any time you're busy reading text for more than ~4 seconds), and still a negligble amount of power when it's actually being used. This would mean that the computer is actually powered "off" for most of the time it's in use.

Is there anything stopping this from happening? I don't know whether you can just stop and start CPUs the same way you can with the RAM/monitor.

R: 81 / I: 8 / P: 8 [R] [G] [-]

devaun gets pwned by cianiggers

>https://www.devuan.org/pwned.html https://archive.fo/Kr6nt

>THE WEB SUCKS -- JAVASCRIPT SUCKS -- BROWSERS SUCK

>GOPHER IS THE WAY -- GOPHER IS THE FUTURE

>WE KNOW YOU -- WE FOLLOW YOU -- WE OWN YOUR COMPUTERS

>WE ARE GREEN HAT HACKERS: WE CAME, WE SAW, WE KICKED YOUR ASS

So cianiggers, because of the we follow you part, hacked the one systemd free distro that is noob friendly.

>so install gentoo

Indeed but I am shocked no one is reporting on this yet. cianiggers hacked themselves and put that page up to rally those not wanting the botnet onto gopher. Now I haven't investigated gopher and have no opinion on it for now. But hacking devuan is a dick move since they only pander to a smaller audience then debian, which contains systemdick. If script kiddies, focus your energy on productive matters. If cianiggers, then fuck you and delete yourselves.

R: 102 / I: 14 / P: 8 [R] [G] [-]

Any of you guys working on a libreboot-thinkpad type project for the PSP/Vita for a libre console? Do you know anyone whoms't is?

R: 12 / I: 0 / P: 8 [R] [G] [-]

Can you escape Google?

I know it seems like a broad question but its making me really paranoid, Google tracks absolutely everything done on the internet now days, even so much as your mouse movement and screen resolution. They're a massive monopoly, and its terrifying to think the world's most advanced technology is being used by kikes to sell you ads, and what's even worse is that nobody seems to care.

I'll begin with being honest and say I don't know too much about computers, but it seems most others including normalfags/newsfags on the internet don't know either. If im being a normalfag, then telling me what i need to know and to fuck off would benefit all of us.

>what operating system should I use? (preferably one that can run games)

>will they do anything to me over my political beliefs or asking this question?

>any alternatives to popular websites like jewtube, discord, spotify, ect.. I don't want to autistically scrounge for music links

>i use tor browser now, will anything happen if i make the tab larger?

>any way to protect mobile devices? currently using samsung s7

>is there any way to remove my personal stored by Google, or at least reduce it?

>anything i should read or research, perhaps a PDF?

>how do i hide myself physically? i may be able to protect myself online but what about security cameras and hospitals? How much of a threat are cameras and public services?

this is something ive been worried about recently and the more i think about it the more it freaks me the hell out, I would do it myself but ive been able to find no information, so i at least hope you all have something to help. and also, will the big spyware companies do anything to me if i try to switch?

R: 28 / I: 3 / P: 8 [R] [G] [-]

Migrating from Ubuntu/ Debian Mate to OpenBSD, CalmWindowManager. A blog.

>be me

>a hwite cis male w/ penis intact

>hate the b l o a t of Linux, especially ubuntu, especially gnome

>even gnome 2 (mate), your old standby, seems bloated

>don't want to deal with gentoo suit

>hate the fragmentation

>hate the gpl

>hate the CoCk

>plan9 is literally retarded

>9front is 3edgy5me

>haiku is a forever early beta

>windows

<absolutely proprietary

>give openBSD a download

>install it on my core2duo machine

>connect to wifi with a config file

>thisactuallyisntasbadasitsounds.jpg

>start x with xenodm

>all of cwm's configs in one file

>so simple

>so well documented

>man [ ] pages make sense

>tmux just as good if not better than gnuScreen

>the install was a walk in the park

>easier than debian minimal tbqh

>forced me to learn vi instead of nano

>honestly it's much better

I took the BSD pill. Will you? Or will you keep taking Linus's CoCk and letting Stallman tell you what freedom "really is"???

R: 120 / I: 10 / P: 8 [R] [G] [-]

/fucko/ FBI edition

>Home security

>online privacy

>PC and data destruction methods

>How to hide questionable images, video, audio, etc. (stenography)

-==COMMON BULLSHIT==-

>B-but I dont have anything to hide!

https://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/

>B-but if you've done nothing wrong you should have nothing to hide!

If I've done nothing wrong there is no reason to search me.

-==TOOLS TO USE==-

>LiveUSB/LiveCD Review v1.1

http://pastebin.com/BbmZ8hiR

>Web Posting Assessment v.2

http://imgur.com/T8q7eB0

>TrueCrypt 7.1a [Last official release]

https://www.grc.com/misc/truecrypt/truecrypt.htm

http://istruecryptauditedyet.com/

https://wiki.installgentoo.com/index.php/Encryption

>The Paranoid #! (now #!!) Security Guide

http://pastebin.com/tUvq8Jzj

>Fake info Generator

http://www.fakenamegenerator.com/

>Pretty Good Privacy [PGP]

http://www.gpg4usb.org/

https://www.gnupg.org/

>Off the Record messaging [OTR]

https://otr.cypherpunks.ca/

>Cell Phone guide for Protesters

https://www.eff.org/deeplinks/2014/08/cell-phone-guide-protesters-updated-2014-edition

>Team 1: #Squad

http://pastebin.com/PxcDYUr0

>Team 2: #squad

http://pastebin.com/jd1sEwKL

>/fucko/ squad irc

#Fucko @ irc.rizon.net

All and any supportive comments, template contributions, are welcome and encouraged. NSA shills need not apply.

Template ALWAYS here: https://wiki.installgentoo.com/index.php/Fucko

Previously on /fucko/:

I don't fucking know

Mumble Server:

mumble://167.99.178.127

R: 34 / I: 2 / P: 9 [R] [G] [-]

Windows 7 gets DX12 support

https://archive.fo/0z3G2

>Microsoft has announced that it is bringing its latest API, DirectX 12, to Windows 7 and the first game that can take advantage of it is World of Warcraft.

>Microsoft has also stated that it is currently working with a few other game developers to port their D3D12 games to Windows 7, and it will make further announcements about these plans in the near future.

>Microsoft claims that the best DirectX 12 performance will always be on Windows 10, and that’s because Windows 10 contains a number of OS optimizations designed to make DirectX 12 run even faster.

I guess it's a good thing but I can't help to wonder why they're doing this now. Aren't there only like 6 DX12 only games? How long until WINE has support for DX12?

R: 78 / I: 14 / P: 9 [R] [G] [-]

FORTH

>ctards and lispcucks still don't know what the best language is

Have you mastered the STACK, yet maties?

Whatcha

>computing

>controlling

>compiling

R: 67 / I: 8 / P: 9 [R] [G] [-]

APL - Aryan Public License

Aryan Public License

Copyright (c) <year> <copyright holders>

Any white person is free to copy, modify, publish, use, compile, sell or distribute

this software, either in source code form or as a compiled binary, for any purpose,

commercial or non-commercial, and by any means.

Previously stated rights do not apply if the user is of non-European origin

or has black skin color. Also, neither source code or a compiled binary

may be provided to groups described in previous statement.

THE SOFTWARE IS PROVIDED AS IS, WITHOUT WARRANTY OF ANY KIND,

EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF

MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.

IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY CLAIM, DAMAGES OR

OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,

ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR

OTHER DEALINGS IN THE SOFTWARE.

R: 43 / I: 5 / P: 9 [R] [G] [-]

Hobbyist electronics

About time we had a thread on home grown tech. Hobbyist stuff and pet engineering projects

>What'cha buildin?

>How far along is it?

>What'cha just finished?

>What just exploded?

R: 12 / I: 0 / P: 9 [R] [G] [-]

EFF screeches about police sockpuppets on (((Facebook)))

Sounds like someone's salty about his dealer getting arrested.

>Despite Facebook's repeated warnings that law enforcement is required to use "authentic identities" on the social media platform, cops continue to create fake and impersonator accounts to secretly spy on users. By pretending to be someone else, cops are able to sneak past the privacy walls users put up and bypass legal requirements that might require a warrant to obtain that same information...

>EFF is now calling on Facebook to escalate the matter with law enforcement in the United States. Facebook should take the following actions to address the proliferation of fake/impersonator Facebook accounts operated by law enforcement, in addition to suspending the fake accounts.

<As part of its regular transparency reports, Facebook should publish data on the number of fake/impersonator law enforcement accounts identified, what agencies they belonged to, and what action was taken.

<When a fake/impersonator account is identified, Facebook should alert the users and groups that interacted with the account whether directly or indirectly.

https://archive.is/wQXfM

R: 11 / I: 1 / P: 9 [R] [G] [-]

IT HUNGERS

The cyberpunk vore community known as SYSTEM/D/ has gorged itself on another hapless victim, MACsec.

>Media Access Control Security (MACsec) is an 802.1AE IEEE industry-standard security technology that provides secure communication for all traffic on Ethernet links. MACsec provides point-to-point security on Ethernet links between directly connected nodes and is capable of identifying and preventing most security threats.

https://github.com/systemd/systemd/commit/b51629ad849cac72d4d41481e2082cdfdd0107ab

How many more victims will feed this vore+expansion fetishist's fantasies?

R: 36 / I: 2 / P: 9 [R] [G] [-]

Intel VISA

>Security researchers have discovered a previously unknown feature in the Intel chipsets, which could allow an attacker to intercept data from the computer memory. The feature called Intel Visualization of Internal Signals Architecture (Intel VISA) is said to be a utility that is bundled by the chipmaker for testing on the manufacturing lines. Although Intel doesn't publicly disclose the existence of Intel VISA and is extremely secretive about it, the researchers were able to find several ways to enable the feature on the Intel chipsets and capture the data from the CPU.

>As a per presentation made by the researchers Mark Ermolov and Maxim Goryachy of Positive Technologies at the ongoing Blackhat Asia 2019 conference in Singapore, their exploits of the Intel chipsets don't require any hardware modifications or special equipment. One of the techniques shared by the researchers involved vulnerabilities detailed in Intel-SA-00086 advisory that give access to Intel Management Engine (Intel ME), in turn helping enable VISA. Access to Intel VISA makes the computer's entire data vulnerable and obtainable for the attacker.

https://gadgets.ndtv.com/laptops/news/intel-visa-sa-00086-exploit-researchers-computer-data-access-2014854

https://archive.fo/dMirw

So these are the details of how they read 'encrypted cloud data' in data centers.

R: 91 / I: 4 / P: 9 [R] [G] [-]

The install Gentoo Wiki

The Install Gentoo wiki is more or less dead. I have become the primary contributor to it. (I am https://wiki.installgentoo.com/wiki/User:Se7en1) As the new primary contributor, I contacted bannanafish in an attempt to get admin status but he has not responded.

Anyway, we have an official wiki and none of you are taking part in it. I implore you all to begin editing it again to ensure accurate information.

https://wiki.installgentoo.com/wiki/Main_Page

R: 86 / I: 118 / P: 9 [R] [G] [-]

/tech/ Book Thread

Can we get a /tech/ book thread going? Post them if you got them.

I'm looking for good book for learning Lua programming, if anyone has one.

R: 12 / I: 2 / P: 9 [R] [G] [-]

DOS scripts

put here your batch programs (OP)

R: 13 / I: 4 / P: 9 [R] [G] [-]

Tips For Linux Users 2 Full Years In

I have been noticing a lot of people have been picking up Linux "recently", really since about 2016 I have noticed a huge uptake in Linux use for normie stuff. I started using linux in 2008 and this what I would tell myself in about 2010 - enough to hit what I hear people call the "distro hop".

Install Debian. Over the last 10 years the debian installer has been rock solid at delivering .deb packages to the then hotness filesystem on the then hotness block subsystem, it can handle raid, crypto, lvm and multiple filesystems for interopt fun. If you come from an Arch/Gentoo background and are distro hopping but "look down" on debian, debootstrap install a testing install before you run your mouth near me. Ubuntu or whoever is just a customized debian, Ubuntu in particular set the frame work for both deb and services modifications but for the most part you either get clean cut Ubuntu or Debian with only usually modded services *or* debs - not even mint bothers cutting both and just has a debian and ubuntu version for a reason. So if you are interested and don't mind so called bloat then try the latest 6month cycle of ubuntu. If you are going for lts ubuntu install debian, "lts" or "stable" from any other project is a fucking joke in the face of stretch. Break virtual machines, specifically those you may be interested in "distro hopping" to; it is just your curiosity if they do something better and if you do happen to find something better like openrc or more modern packages just cut the debs yourself, you're also usually not the first and using others debs is no worse than using other's containers in my eyes. From my track record I have gone from Ubuntu to Debian to Suse to RedHat to Arch/Gentoo and in 2015 I learned the seceret to stop distro hopping; install the debian. Or the OpenLinux if it's 98. My point is at the moment the debian ecosystem is the best for getting things that work better else where in it's own system; without issue it supports the most technologies at once if not the most current and up to date technologies. But usually those too due to again, custom cutting ubuntu debs.

R: 51 / I: 3 / P: 9 [R] [G] [-]

live distros

How come we never talk about live distros?

What are your lightweight go-to distros for system recovery/secure things?

R: 139 / I: 31 / P: 9 [R] [G] [-]

Tech that you horribly miss

Can we all agree that windows mobile was and still IS the most advanced mobile OS.

Instead of keeping with this bulldozer of an OS they decided to go after iPlebs and make "smart" phones for dumb people.

For those of you who never used one you are truly missing something.

R: 41 / I: 14 / P: 9 [R] [G] [-]

Future Tech Trends

So I've been reading about computer and telescopic contact lenses for a while, and it seems so long ago now that the thought of it becoming mainstream tech just isn't even worth pondering. But honestly, it's the only tech leap worth exploring other than virtual goggle style developments (imo). Even bluetooth phone holograms like the proposed "cicret" bracelet seem kinda meh to me now. And I'd also hate to see these contact lenses appear miraculously during the spread of 5G.

Thoughts?

What do you anons feel should be the next big leap?

R: 66 / I: 12 / P: 10 [R] [G] [-]

Dissenter

"Now Gab wants to give its users even more power to voice their opinions free of censorship: it has just released Dissenter, or "the comment section of the internet" as its creators have dubbed it. This service allows users to comment and read comments for every URL out there from an external plugin, without the need to log into that particular website or even having an account there. You can comment about a Facebook page, and read comments from other Dissenter users about it, without having to log into Facebook or even having a Facebook account in the first place. This means you can completely bypass the private censorship of platforms like Facebook, Twitter and even WordPress."

Is this a good idea? Is the extension a honeypot?

A homosexual tranny gives his opinion:

https://www.bitchute.com/video/BUtvgs6_tsE/

R: 17 / I: 0 / P: 10 [R] [G] [-]

Who thought this was a good idea?

Why do you uberniggers think open source is more "secure" when talented paid CIAniggers could potentially combine all their talents to invent multiple backdoors in a couple of days/hrs(just for fun) from just reading the source code in any popular or significant work that a lot of people use? I'm really sorry but are you people fucking retarded or what? Why have you not considered this? And yeah and good luck fixing or ever finding that vuln on github with voluntary contribs(lol).

Yes the program may not have been audited but previous matter of fact still applies.

Literally who thought it was a good idea? Perhaps popular programs sc should be published of former deprecated code this way it could potentially be a lot safer.

Also include the scenario of chinks and street shitters stealing your work and making it theirs by edits ripping you off and commercializing it after they close source it. That sound good to you?

Discuss, and fyi I'm NOT against OS or FSF. I'm just a thinking man.

R: 58 / I: 5 / P: 10 [R] [G] [-]

switched to Firefox after acid trip

I finally understand what Stallman was talking about. Users of nonfree software are slaves.

• Even Chromium phones home to Google

• Alternative Chromium forks like Brave, Iridium, or ungoogled-chromium all have unique fingerprints as non-mainstream browsers. This defeats the purpose of using them. Also you aren't auditing the binary builds of these, which are done by anonymous randoms in their free time.

• You de facto can't compile your own Chromium or maintain your own fork. Besides the cognitive time investment, it would take days to compile, discouraging you from rebasing and re-compiling to apply the latest security updates.

• Mozilla allows you to run a self-hosted sync server, if you really need bookmark/settings syncing.

• Chromium having a faster JavaScript engine is largely irrelevant since a properly paranoid user would block most JavaScript.

• I'd gladly pay for better hardware to run inefficient Firefox if it means being less vulnerable to surveillance.

Also I think nowadays that your choice of browser is more important than your choice of OS. A Google Chrome user on Tails is less free than a Firefox (TOR style hardened) user on macOS or Windows. Change my mind.

R: 31 / I: 9 / P: 10 [R] [G] [-]

Net Neutrality Thread

https://www.apnews.com/c15bb1c64b454af499e1fc4c55cbc5d1

Are we for or against net neutrality now, /tech/?

R: 71 / I: 2 / P: 10 [R] [G] [-]

.onion URLs and HTTPS certificates

DuckDuckGo as an example: https://3g2upl4pq6kufc4m.onion/

What is the impact of using TLS on an .onion URL like this? Is it redundant? And/or is it counterproductive?

R: 39 / I: 6 / P: 10 [R] [G] [-]

Rainbow's End

How far are we from the kind of tech that's in this book? For those that haven't read it, I'm talking about practical, ubiquitous AR, augmented reality. In the book, essentially everyone has non-intrusive, wearable computers in their clothes that produce images on contacts, and the input consists of specific eye-movement and by moving other parts of the body in certain ways. It's so powerful and comes so natural to the people in the setting that they function like they have the calculator software and all the other tools in their brains. On their way to work, as they look around, they see their favorite fictional setting on top off the real world, in a safe way. And everything's connected to the network. Will 5G make this stuff possible? Great book, by the way.

R: 14 / I: 0 / P: 10 [R] [G] [-]

Mechanical HDDs Can Be Used As Microphones Now

http://archive.is/uYGeS

>Turning a hard drive into a listening device doesn’t have anything to do with its data storage capabilities. Instead, the team leveraged the sensors that help control the position of the read head above the platters.

>Any vibration can alter the position of a hard drive, so a modern hard drive is sensitive enough to pick up even minute disturbances in the platter. Yes, even human speech shows up in the PES data.

Long story short, the signal needs to be loud and the attacker needs physical access, but HDDs can be turned into microphones now.

R: 23 / I: 4 / P: 10 [R] [G] [-]

Take the UNIX Hater pill

I hear many people talking about their UNIX addiction. The thing is that they rarely understand that UNIX is truly addictive.

I remember back in the day when I weighed 260 pounds and felt miserable, I lived on UNIX. It was a staple in my religion. I bought 2 licenses of UNIX System V. I gorged on them, had ed sandwiches and smothered my shellscripts in metacharacters.

My body ached, I was lethargic and depressed..

Thankfully, hypnosis changed my life. I used hypnosis for UNIX addiction as well as for weight loss and overall lifestyle change.

The result is that today I have a large amount of no desire for UNIX. I lost about 115 – 120 pounds and I feel great.

My hypnosis for weight loss program can help you too. If you are struggling with UNIX addiction or just want to lose weight, call or email me now. Together, no matter where you may live, we can develop a hypnosis program for you.

Pic related, it's what all you UNIX weenies look like.


.............'.... .......''','.........'''.. ............................'. ................................. .'............',,................... . .'............''','................... . .'.............'........................ . ...,;;;,,;:cc:,'..... .. ........... . .',:ccccclodddl:;;;:;'.. .... .... . .,;::cccclloodddoooool:'... ... ... . .,;;;;:::ccllloodddddolc;....... ...... . .''...',;;;;;;:::cllllllc;'....... ... . .','''...,,'...',,;;;;;:cll:,.......... .. .::,..''..,;,''.''',;;,,;:::c:,.... ..''.. . ,cc;'.''',::,,;,''''',,;::ccclc;......,;;.. .,::;,,,;ccc::::;;;::ccllllllcc;,.....,::'. .:::::::cc:::clllllloolllllccc:;,,''''::. ... .,;::;,,,,,,;:loooolllcccc::::::;;,,,;:,. .... .,;;;,,'',;::::cccccccc:::;;;;;;;;;;;,'........ .',;,,;:::clcc::cccc::::;;;;;;;;;;;,............ .',coollooooooc::c:::;;,,,,,,,;;,,'............ .;okOOOOOOOOOOxl:::::;;,,,,,,;;;;,,..........'.. .:c:;,:xOOOOOOOOOOOOOkdlc:;;;;,;;;;;;;;,,'''''...''.''.. .';clloooodddkO0OOOOOOOOOkxdolc::;;;;;;;;;;,,'',,'''''.';:c;'.. ..':oddxxddxxkkxxkOOOOOOOOkkdollloooc:::;;;;;;,,,,,,,,,''',;:::::ll;,,,'.... ;dddoooooddddxkO0K00OkkkOOkxdllllllll::::;;;,,,,,;;,;;;,'',;::::cldddxxxxxxdl .':oxxdolldxxdolloookOOOkxkxdolcclllllllc;;;;,,,,,,;::::;,'';;;::::looodddddoodo .;ldolllloddxkOOOkddxkOOkkkkdolcccccclllc:,,,,,''''';ccc:,'',,'.',;coddoollodddool 'lddolc;;::::cllloxkkkxxxxdolccccccccc:;,..''''...';:c:;,'''...',;clddolc:,,;:clll .:lllllccc:::::ccloxdxxxdoc::cccccclc;...........';::::,.....',,;cllollllccc:;;:;, .;:;,,,;:cc:;;::clloddxdlcccllllcc:;............,;:c::;'.';;:;,,;;;::;,;:c::cc:;;, .',,,,....',;;;,'',,,;:ccccclolc:;,.. ...',;,,,,,,;cloolllcc:;;::,,:;'.'',',, ',;;,,,,''...........'''',;:cccc::;'...........,;;;;;;;;::;:looooooooolclc:;:;,,,;::c cc:;;,''''...... .........';:c::;'.......... ....,;::::::,..;ccccccc:;::;,;;;:cccc:;; ccc::;,...... ........,;;,.. ....'''..';;;,,;:::::;,,,;;;;,,;;,;;'..,;:;::::;;; clcc:;'.... ..... ........... ....',;;::cc::;;::ccoo:;::::c::cllllc,',,,,;;;::::: ccc:;,'... .................... ....,,,;;::ccccclllooc:ccc:::cccccc:;,,;;;;;;;;;;: cc:;,'.. ................ ......',;;;;;;;,,,,,,,,,,;:cllllcccc:,,,,;;,,,,;;:::ccc ::;,'......''''.....................',;cccccccc:::::::::::ccccloooc:;,..',;:clllccccc ;,'.........'',,''''..............''',;;;::::::::ccccccccccc:ccccc:;;'.,:ccc::;;;;::: '''',,,,,,'...',,,,,,''......'',,;;;,''''''''''',,,,;;;;;;:::ccc:;,,'.':cc::;;;;::ccc ',::::;;;;:,.....',,,,,,'''',,;;;,,'',;::;;,,,'''''''.....',;:cc:::,..,:cccc:::ccllol

R: 24 / I: 3 / P: 10 [R] [G] [-]

Energizer's Cell Phone

You know how when a story is being pushed by the MSM they all use the same exact goddam talking points at nearly the EXACT same goddam time?

It seems that the MSM hates Energizer's phone.

>18mm-thick smartphone goes just a bit overboard

https://arstechnica.com/gadgets/2019/02/energizers-beastly-smartphone-has-an-18000mah-battery/

https://www.engadget.com/2019/02/26/energizer-p18k-pop-big-battery-hands-on-thick-phone/

>Look at the size of this ridiculously large phone that's almost all battery

https://www.cnbc.com/2019/02/26/energizer-p18k-pop-packs-18000mah-battery.html

>Maybe not everyone should make a foldable phone

https://techaeris.com/2019/02/27/mwc-2019-maybe-not-everyone-should-make-a-foldable-phone-meet-the-energizer-power-max-8100s/

>Energizer’s P18K Pop is basically a giant battery with a smartphone built into it

https://techcrunch.com/2019/02/26/energizers-p18k-pop-is-basically-a-giant-battery-with-a-smartphone-built-into-it/

>It will be remembered as the fattest phone of MWC 2019. I mean, just look at it.

https://sea.mashable.com/tech/2522/energizers-18000mah-battery-phone-is-as-thick-as-3-normal-ph

>They basically did that last part but in reverse. Avenir took a massive portable battery and carved out just enough room to shove a phone on top.

https://www.geek.com/tech/the-battery-in-this-energizer-phone-is-five-times-bigger-than-yours-1776185/

The complaint everywhere is the same, "It's too big"/"It's a brick," and just like gamergate all the stories ran at almost the exact same time, which immediately makes me think that maybe this isn't a piece of goddam spyware or something.

In spite of immediately wanting to give this a shot because the MSM hates it, does anyone know any real information about this thing yet?

R: 48 / I: 2 / P: 10 [R] [G] [-]

Underused technology thread

With every bird genociding kike shilling for 5G radio communications it's highly coincidental that no one seems to be interested in implementing wider Li-fi infrastructure.

Li-fi has none of the microwave botnetting of regular 5G but speeds akin to fibre but without fibre wires, yet for some reason there is little interest in this technology.

Self-driving glowmobiles could share information of local interest through their daytime LED lights with other glowmobile peers, when waiting at an intersection they could recieve wide Area traffic information through Street lamps thus lowering wireless signal congestion while causing less cancer to boot.

Glowphones with Li-fi sensors wouldn't even need to connect to any regular wireless networks when traversing something as light polluted as Manhattan, the entire wireless signal congestion issue would be a meme once everyone's devices glow in the dark and low botnet density Areas should do fine with LTE-A for the time being anyhow.

R: 32 / I: 3 / P: 10 [R] [G] [-]

Brighteon - a platform for uncensored videos?

Many times I've seen /tech/ asking for a decent youtube alternative. Well today I just found this by accident. You can find political, conspiracy, health etc. videos in there. All exploring alternative content that would be censored on youtube. Unfortunately you have to get an invitation to register. But at least there's now a youtube without censorship. Even flat earth videos are allowed!

R: 121 / I: 11 / P: 10 [R] [G] [-]

Anyone a real pro with html, css?

So I've been having a problem with this table for the past couple hours... I'm trying to make a simple table consisting of three cells, so one row and three columns. I want the middle column to be centered with the span I place inside of it and the other outside cells taking up the rest of the space within the table. I've included a picture to better help explain what I'm trying to do...

What keeps happening is the top table. What I want it to look like is the bottom table. I'm using inline-block for the middle cell which is what I want, the middle cell then changes to fit the text inside of it perfectly, but then the two outside cells do not fill the gaps completely. There's weird spaces between them. Any suggestions on what to do? Thanks.

R: 64 / I: 6 / P: 10 [R] [G] [-]

>privacy respecting

>almost perfect search results

>ecology-friendly

>hosted in EU

Why don't you use it, 8tards?

R: 72 / I: 5 / P: 10 [R] [G] [-]

Botnet, but it isn't botnet. There was a thread a while ago outlining this problem: 'propietary' free software, FOSS that is too big to be properly maintained, modified or audited, and as such, provide temporary or even permanent backdoors, or vulnerabilities exploited by many agents. The best example of this is Poetterware; software coming out from Red Hat aiming to standardize the GNU/Linux desktop experience, carrying all this baggage with itself for no practical reason concerning the end user, and often written in part or in whole by Lennart Poettering.

In this thread, I'm asking for a bit of a clarification on a few examples of what is and isn't, as well as tips to recognize, avoid and replace it.

What everyone here agrees about:

systemd

I don't need to say anything about this, we've heard about it for years. It's obvious.

Avahi

Something something about needing no configuration when networking.

polkit

Allowing users to turn off the computer without admin privileges, among other things.

Why not just use the suid bit?

NetworkManager

Using wpa_supplicant and dhcpcd is a breeze, why bother with this.

Pulseaudio

This piece of software was memed on by many people because it simply did not work, but is it really that bad? The fact that Poetter wrote it already makes me allergic, but I'm not too well informed about its code quality. It does "just werk", but who knows how much shit it needed to just work.

What I am not sure about, but most likely is:

D-Bus

D-Bus was released quite a while ago. Is there really a need for this? Programs depending on this are systemd (and elogind), big DEs and icon trays, among others. Hadn't had to depend on this until I used elogind.

Then there's the other stuff Red Hat's been up to, like the countless patches they've been getting mainlined into the kernel, and things like KVM, which actually are useful and even surpassing the performance of many propietary solutions.

What's the deal with udev? Why is that inside systemd, too?

R: 41 / I: 5 / P: 10 [R] [G] [-]

Create your own shitty Tor textboard.

http://bm7syfu6qxtbuqt2.onion

8chan ripoff I've been working on. Check it out.

R: 30 / I: 5 / P: 11 [R] [G] [-]

Women """programmers"""

>lets invite more women into programming!

>it will be great!

>women will take part in programming and soon all software will be written by women!

meanwhile in reality...

R: 34 / I: 11 / P: 11 [R] [G] [-]

pol users are a bunch of retards according to a simple analysis of post lengths

out of the three major boards /pol/ tards appear to have the lowest length per post, this implies they do not put much effort into posting

R: 93 / I: 7 / P: 11 [R] [G] [-]

Discussion about paper "Towards a peer-to-peer imageboard"

I'm reading the paper posted by Fredrick Brennan regarding the different approaches of making a decentralized image board and i came to this part.

"In a BitTorrent-like magnet

network, unpopular or old images can fall out of the network over time, but in a

blockchain, all images must be stored forever no matter what they depict."

I think there is a clear winner here being the bit torrent approach, follow the approach most chans have traditionally used that old/inactive images/threads fall out of the ecosystem of the board.

R: 139 / I: 14 / P: 11 [R] [G] [-]

Peer to peer imageboard

/pol/ here. Genuinely concerned about the future of this place.

Can any of you make sense of this autistic screeching? Is this a viable idea or just incoherent pseudo technical mumblings of a crippled kike?

https://twitter.com/HW_BEAT_THAT/status/1106875435403509760

R: 116 / I: 15 / P: 11 [R] [G] [-]

Browser ENGINE Thread

/tech/ has always been known for it's in depth browser threads, but how often do we really look under the hood and discuss the rendering engines that run these browsers and do most of the actual heavy lifting of displaying a webpage? Right now there are three main browser engines:

Webkit: Made by apple. Written in OOPC. Used by Safari. Has official Gtk+ binding for ease of use by pajeets. as easy as gtk+ can be, anyway. Also has external projects making bindings in many other languages.

Blink: Made by google. Originally forked from webkit. Written in C++. Used by Google Chrome. As far as I am aware, there are no bindings for it. If you want to roll your own browser with it, you better know what you're doing.

Gecko: Made by Mozilla. Infected with Rust. Used by Firefox. It used to be good before Mozilla went full retard. Like blink, there are no bindings for Gecko.

Other engines of note:

NetSurf: Originally built for RISC OS. Programmed in ANSI C. Doesn't have HTML 5 support, and is just starting to get Javascript support.

Goanna: Forked from Gecko. Used by Palemoon. Like Gecko used to be before Quantum and the webextensions bullshit.

Servo: Mozilla's experimental engine. Extremely infected with Rust.

R: 11 / I: 2 / P: 11 [R] [G] [-]

BREAKING NEWS: Vulnerability in golang.org/x/crypto/salsa20

BREAKING NEWS: Vulnerability in golang.org/x/crypto/salsa20

>Hello gophers,

>Commit b7391e95 (https://go.googlesource.com/crypto/+/b7391e95e576cacdcdd422573063bc057239113d) fixes a vulnerability in the amd64 implementation of the golang.org/x/crypto/salsa20 and golang.org/x/crypto/salsa20/salsa packages that affects large message sizes or high counter values.

>If more than 256 GiB of keystream is generated, or if the counter otherwise grows greater than 32 bits, the amd64 implementation will first generate incorrect output, and then cycle back to previously generated keystream. Repeated keystream bytes can lead to loss of confidentiality in encryption applications, or to predictability in CSPRNG applications.

>The issue might affect uses of golang.org/x/crypto/nacl with extremely large messages.

>Architectures other than amd64 and uses that generate less than 256 GiB of keystream for a single salsa20.XORKeyStream invocation are unaffected.

>The vulnerable code is derived from the amd64-xmm5 and amd64-xmm6 implementations that are distributed with SUPERCOP, NaCl and at https://cr.yp.to/snuffle.html. The issue is present in those upstreams, but is not considered a problem by their author because of the policy at https://nacl.cr.yp.to/valid.html, and because support for counters larger than 32 bits is an incomplete experiment. We attach a patch that applies to the amd64-xmm5 and amd64-xmm6 salsa20.s files for any downstream that might want to fix this issue.

>This issue was discovered and reported by Michael McLoughlin.

>Cheers, Filippo for the Go team

https://groups.google.com/forum/#!msg/golang-announce/tjyNcJxb2vQ/n0NRBziSCAAJ

Daniel J. Bernstein responds

>"Let's take code from the SUPERCOP benchmarking framework. Does this file supercop/crypto_stream/salsa20/e/amd64-xmm6/warning-256gb mean anything? Probably not." [Time passes] "BREAKING NEWS: We found that this implementation doesn't work after 256GB!"

https://twitter.com/hashbreaker/status/1108637226089496577

tl;dr Gophers copy Salsa20 code from SUPERCOP, ignore warning that shit breaks after 256GiB

R: 14 / I: 5 / P: 11 [R] [G] [-]

Worst Hacker Cliches?

What are your are favorite or least favorite hacker cliches? Why?

Hands down my pet peeve of hacker stereotypes is this shit with the balaclavas, hoodies, and masks. Everybody knows you can just put tape over your fucking webcam. Also this Guy Fawkes mask thing is pure faggotry. If you're going to be hacker don't LARP as Hugo Weaving's worst character. Though I predict this Mask thing will gain traction again in light of the recent arrest of the white wizzard.

Anyhow this came up in one of the cybersecurity groups on LinkedIn. The hoodie thing is marketing from people who do marketing for security products and want to make hackers and malware look spooky to people who think using Microsoft Office is a computer skill. I get that. What bothers me is when actually security professionals like Consultants and Pentesters use bullshit cliches along with blog articles on security breaches or malware and just makes everyone involved look like a faggot who has no idea what they are talking about. Sometimes I think tech companies just let cybersecurity people sit at the grownups table because it's funny. What do you guys think of this?

R: 72 / I: 5 / P: 11 [R] [G] [-]

i made this browser extension for anyone and everyone

i made a browser extension for chrome and firefox. it is an extension where you can comment on the current url you are viewing. it only has access to the current tab you are viewing, nothing else. its also anonymous. kind of like dissenter but no sign up process. anyone can comment.

https://chrome.google.com/webstore/detail/lairs/jlnmmppdaamadepklklilakmmgafnhlh

https://addons.mozilla.org/en-US/firefox/addon/lairs/

would love it if you all check it out

there is no sign up process with this extension. its anonymous. i usually dislike having usernames. i like it when i can just get on something and start posting anonymously.

in the main file of this extension there is this line.

————-

"permissions": [

"activeTab"

],

—————–

that means the extension only has access to the current tab. i would be siked just by people using something i made by hand. check the github repo.

here is the github repo

https://github.com/zedsa/Lairs

https://github.com/zedsa/Lairs/blob/master/manifest.json

only the comments/posts gets saved. if people like this extension and people start using. then i can add a username feature if people would like that. but for now i would be happy if people use it at all. feels good to make something.

--------------

i posted this in /pol and some of the posters suggested i post it here too.

R: 62 / I: 2 / P: 11 [R] [G] [-]

Backdoors

>intel ME (Management Engine)

>amd PSP (Platform Security Processor)

https://youtu.be/Lr-9aCMUXzI

What does /tech/ think about this?

Is it worth buying a new laptop with ME disabled? (purism or system76 laptops) also dell has some models with it disabled

WAT DO

R: 54 / I: 5 / P: 11 [R] [G] [-]

Iv been using vpn for more than 4 years now but i got no money to buy it no more so its necessary to use vpn while im here

R: 14 / I: 0 / P: 11 [R] [G] [-]

Monitors for Productivity

Does anyone have any real beefy monitors that are good for productivity? I see so many monitors these days by companies that don't understand that their "ultrawide" monitors don't have the pixel density of a single 4K monitor. Everyone I speak to also has no idea what I am talking about, and don't understand why I can work with such small font sizes. I am looking for a really high quality monitor for productivity - preferably something larger than 4K - I currently use 2 4k monitors as my daily driver but I am really looking for something like 5760x2160 - i.e. approximately 6 1080p monitors, or 1.5 4k ones. I can't seem to find anything like this outside of 6 monitor arrays which are just inefficient. I'd technically prefer a single monitor with the density of 6 1080p monitors and a second vertical one that does something like 1920x2160 for web browsing or multitasking two windows in parallel.

R: 44 / I: 11 / P: 11 [R] [G] [-]

More normie tech spying

https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html

http://archive.is/jGosN

>Crashed Tesla vehicles, sold at junk yards and auctions, contain deeply personal and unencrypted data including info from drivers' paired mobile devices, and video showing what happened just before the accident.

>(...) the computers on Tesla vehicles keep everything that drivers have voluntarily stored on their cars, plus tons of other information generated by the vehicles including video, location and navigational data showing exactly what happened leading up to a crash, according to two security researchers.

Elon fags will defend this.

Librecar when?

R: 46 / I: 2 / P: 11 [R] [G] [-]

Snowden, VPNs, and Tor

do VPNs and Tor provide any meaningful resistance against the Surveillance-Industrial-Complex that Snowden exposed? Can they still "get" you?

R: 108 / I: 18 / P: 11 [R] [G] [-]

hidden gems

What is some underrated/unknown software that you use a lot?

i'll start:

>rufus

>textadept

>winamp

R: 38 / I: 4 / P: 11 [R] [G] [-]

Databases in C

Alright, I'm writing some file syncing software in c, and well I need to create a database of some kind to keep track of differences in the server's and host's files. The thing is I have not the slightest clue where to even start with working with something like that in c. So do you guys have any ideas or suggestions?

R: 24 / I: 3 / P: 12 [R] [G] [-]

Anyone know what port 76 was registered for? It's marked down as ”deos: Distributed External Object Store” but I'm unable to find any rfc or specifications about the protocol it uses or even what its used for. helb?

R: 67 / I: 12 / P: 12 [R] [G] [-]

Get in here

EU Copyright Law

>... any online community, platform or service that has existed for three or more years, or is making €10,000,001/year or more, is responsible for ensuring that no user ever posts anything that infringes copyright, even momentarily. This is impossible, and the closest any service can come to it is spending hundreds of millions of euros to develop automated copyright filters.

>any link that contains more than "single words or very short extracts" from a news story must be licensed, with no exceptions for noncommercial users, nonprofit projects, or even personal websites with ads or other income sources, no matter how small.

Why aren't we discussing this?

https://www.eff.org/deeplinks/2019/02/final-version-eus-copyright-directive-worst-one-yet

R: 15 / I: 0 / P: 12 [R] [G] [-]

Why do things get stuck?

Every fucking other day for the last 13 years, Tor will get permanently (or at least for half an hour) stuck connecting to the network. Why the fuck? How is this not fixed?

Apr 11 12:03:01 localhost Tor[2504]: Parsing GEOIP IPv4 file /usr/share/tor/geoip.

Apr 11 12:03:02 localhost Tor[2504]: Parsing GEOIP IPv6 file /usr/share/tor/geoip6.

Apr 11 12:03:02 localhost Tor[2504]: Bootstrapped 0%: Starting

Apr 11 12:03:03 localhost Tor[2504]: Starting with guard context "default"

Apr 11 12:03:03 localhost Tor[2504]: Bootstrapped 5%: Connecting to directory server

Apr 11 12:10:26 localhost Tor[2504]: Interrupt: exiting cleanly.

Then I restart it and it connectst instantly.

Why do my ethernet over power devices get broken until I replug them into the sockets?

Why does my XMPP client fail to connect to the network until I restart it? (x2 because I literally know 2 such applications, Gajim and Fortnite - Fortcrap uses XMPP to implement chat, no surprise)

Why does my thermostat turn off until I reset it 40 times?

Is there any engineering reason for any of this shit? I've been "systems programming" for 15 years and I've never heard of one.

R: 11 / I: 1 / P: 12 [R] [G] [-]

US thinks Linux is operating system

Virginia Courts think Linux is operating system instead of an kernel.

We cannot let this slide.

https://www.justice.gov/usao-edva/press-release/file/1153481/download

R: 16 / I: 5 / P: 12 [R] [G] [-]

Making a decent oscilloscope from a TV?

Where I live oscilloscope are very expensive, think 300 or 400 dollars for the shittiest 20mhz used one.

The reason the common conversion of a TV into an oscilloscope doesn't really work beyond audio frequencies is that the RF signals are blocked by the inductance of the coils that are used to control the electron beam.

So could a TV CRT beam be deflected electrostatically by placing high voltage electrodes OUTSIDE the tube? Maybe a little bit of tinfoil glued to the neck of the CRT? (since the glasswork and vacuum pump work to get electrodes inside the tube would be impractical to do)

R: 141 / I: 16 / P: 12 [R] [G] [-]

MORE SYSTEMD EXPLOITS PART II

SYSTEMD-JOURNALD IS VULNERABLE TO TWO MEMORY CORRUPTIONS AND ONE INFORMATION LEAK. ALL SYSTEMD LINUX SYSTEMS ARE VULNERABLE.

https://seclists.org/oss-sec/2019/q1/54

https://archive.fo/SeSiy

R: 10 / I: 5 / P: 12 [R] [G] [-]

5G to make way for AI 3D holograms of Humans

https://www.youtube.com/watch?v=LXBSPPd4QNY&t=44s

R: 20 / I: 2 / P: 12 [R] [G] [-]

Adblockers - Which one is best?

I have been using uBlock Origin for a long while now but that might come to a end soon.

It started when I went to YouTube and it failed to block advertisements in videos. Not exactly sure how YouTube did this but they basically broke uBlock Origin and made it so that it plays advertisements that you can't skip if it detects you have a adblocker.

Not sure how many are effected but if I can't find a solution I might have to find some alternative. Any suggestions?

R: 37 / I: 2 / P: 12 [R] [G] [-]

>Decide to give linux a go on my 10 year old netbook

>Download debian ISO

>Burn it to USB as you would on Windows

>Install it as you would on Windows

>Camera "just werks"

>Keyboard "just werks"

>Touchpad "just werks"

>WiFi "just werks"

>Comes with FF and LibreOffice that all "just werks"

When does the oft vaunted difficulty of Linux come into factor?

R: 17 / I: 2 / P: 12 [R] [G] [-]

Is this person right?

Does the bloke really know Terry (peace be upon him)? Do any of you know wtf he is trying to say?

he commented this here https://www.youtube.com/watch?v=7uLzaKlZSQQ

and his channel is here https://www.youtube.com/channel/UCm6k-Bu65cifD0jFF3kom6g/featured

R: 82 / I: 8 / P: 12 [R] [G] [-]

Ghidra is out!

Ghidra is a static analysis/reverse engineering tool that is apparently very similar to big commercial offerings such as IDA Pro. It was developed internally by the NSA, but is just now being released to the public. They put it out there as Free Software under the Apache license. It is written in Java.

>Site

https://ghidra-sre.org/

>Source code

https://github.com/NationalSecurityAgency/ghidra

R: 99 / I: 5 / P: 12 [R] [G] [-]

Project Thread

ITT: Share projects and scripts created by you/anons

1. Hydrus Project (*booru taggins system with IPFS)

>>>/hydrus/

github.com/hydrusnetwork/hydrus

2. Guacman Chatbot (a TayAI replacement)

>>>/machinecult/

(source code in some file sharing site instead of github)

R: 24 / I: 1 / P: 12 [R] [G] [-]

Reminder that there is a neat site made by a (((/tech/))) poster on spywares.

https://spyware.neocities.org/

Would be pretty cool if the BO could stop being such a giant faggot for just one second and add it to the sticky.

R: 106 / I: 44 / P: 12 [R] [G] [-]

Brian Fagioli™ General

All the Fagioli threads go here.

R: 86 / I: 17 / P: 12 [R] [G] [-]

better search engines

wiby.me is full of html only websites and interesting things I haven't seen from google.

duckduckgo is privacy focused and doesn't try to curate results according to your search history. But its still not quite as good as google for finding things.

Is there any search engine you can unironically use as a substitute to google or are we pretty much stuck with them forever?

R: 162 / I: 28 / P: 13 [R] [G] [-]

Haskell is causing global warming

or at least it would, if anyone used it

https://thenewstack.io/which-programming-languages-use-the-least-electricity

R: 152 / I: 22 / P: 13 [R] [G] [-]

EU DICTATORSHIP DECLARES WAR AGAINST THE WORLD WIDE WEB

Image boards won't exist in the future if we don't take action soon.

We need to start taking the decentralized networks more seriously and help protect the free web:

https://www.zerohedge.com/news/2019-03-26/eu-parliament-signs-disastrous-internet-law-what-happens-next

https://www.eff.org/deeplinks/2019/03/eus-parliament-signs-disastrous-internet-law-what-happens-next

https://www.techdirt.com/articles/20190326/05584741869/eu-puts-end-to-open-internet-link-taxes-filters-approved-just-5-votes.shtml

I2P -> https://geti2p.net/en/

Tor Project -> https://www.torproject.org/

Freenet Project -> https://freenetproject.org/

Beaker Browser → https://beakerbrowser.com/

IPFS -> https://ipfs.io/ | https://orion.siderus.io/

IPFS Desktop -> https://github.com/ipfs-shipyard/ipfs-desktop

Zeronet -> https://zeronet.io/

Tribler -> https://www.tribler.org/

Soulseek -> https://www.soulseekqt.net/news/node/1

Ares -> https://www.ares.com/

Ares Galaxy -> https://sourceforge.net/projects/aresgalaxy/

Retroshare -> https://retroshare.cc/ (retroshare is full of decentralized image boards)

OpenBazaar -> https://openbazaar.org/features/ (p2p web with a crypto market place)

qBittorrent -> https://sourceforge.net/projects/qbittorrent/

Quazaa -> https://sourceforge.net/projects/quazaa/

Anomos -> https://sourceforge.net/projects/anomos/

Usenet -> https://torrentfreak.com/how-to-use-usenet/ | https://archive.fo/e1HXH

Image boards over ipfs:// -> https://ipfs.io/ipns/boards.ydns.eu/#/

dat:// protocol -> https://datproject.org/

List of goodies → https://github.com/gdamdam/awesome-decentralized-web

R: 17 / I: 1 / P: 13 [R] [G] [-]

Linux VT Replacements

Can anybody suggest some replacements to Linux's native virtual terminal?

Before you yell "bloat", "botnet", or even "sin", know that Linux's own terminal is essentially a terminal emulator in itself (instead of sending the text to a device, it just sends the text to itself), so the only real difference between it and a replacement is basically whether it runs in kernelspace or userspace (as far as I'm aware, there are no kernel modules which replace the VT. Something like that would interest me though).

Anyway, here's a list of ones that I know of, but I don't really know which one of them is best. Do any of you guys use these ones?

http://zhcon.sourceforge.net/ - Old, unfinished software which only implemented UTF-8 support in its last version. Not really a candidate, but it's included just to make this list comprehensive.

http://jfbterm.osdn.jp/ - Even older than the last one. Doesn't explicitly mention UTF-8 support, but I've heard people mention it here and there, so it probably has it.

https://github.com/uobikiemukot/yaft - This one could be pretty good, if it supports obscure stuff like sixels. I like to screw around with a lot of dumb shit.

https://repo.or.cz/fbpad.git/blob_plain/HEAD:/README - Seems to have some kind of integrated termux bullshit.

https://www.freedesktop.org/wiki/Software/kmscon/ - Looks alright, but I'm skeptical of any software produced by freedesktop. Looks like the idea of it is to be more of an expansion to the native terminal, than a replacement if that means anything.

https://code.google.com/archive/p/fbterm/ - I've heard of this one often. Looks like it has more of that multiplexing stuff.

Pictured is zhcon. I'm not a chink, but I find this image kind of "aesthetic", if you guys are into that.

R: 21 / I: 2 / P: 13 [R] [G] [-]

Google fires AI ethics counsil after just one week

Alphabet Inc’s Google said on Thursday it was dissolving a council it had formed a week earlier to consider ethical issues around artificial intelligence and other emerging technologies.

The Vox report said Google employees had signed a petition calling for the removal of one of the members over comments about transsexual people, and added that the inclusion of a drone company executive had raised debate over use of Google’s AI for military applications.

https://www.reuters.com/article/us-alphabet-google-ai/google-to-pull-plug-on-ai-ethics-council-vox-idUSKCN1RH00S

R: 20 / I: 1 / P: 13 [R] [G] [-]

P2p domain name system sorta

I came across this intresting project on gitcrap and figured you guys would be interesting in tinkering around with this a little its a like having a p2p dns server sort of https://github.com/mwarning/KadNode

R: 206 / I: 38 / P: 13 [R] [G] [-]

Beware the Social Score

What will YOU do when the Chinese Social Score comes to your nation?

Don't think for one minute that it won't. Generation Z has been raised to rate everything, from the products they buy, to the sellers they buy from, the restaurants they visit, their teachers, and even the doctors they visit. They rate their uber driver and the uber driver rates them. You have a large generation very used to the concept of rating.

The social media phenomenon has inculcated a narcissistic driven behavioural reinforcement system, by which people are nudged into group pleasing actions in return for high scores. Whether the motivation is purely rooted in vanity, or for monetary award corresponding to subscriber counts, it becomes clear that people are intimately vested in a gamification existence.

This combination of ratings and points is the underbelly for a "Social Score" system that is actually being realized in China today. Fail a test, litter on the street, say something 'politically incorrect', or perhaps staying out too late would result in demerits. Naturally, governments will issue rewards to nudge people into 'correct' behaviour. Those with low scores will be restricted from many services ranging from communications to travel; perhaps dissidents won't even have any freedom of movement! I'm sure you can imagine how such a scheme could also be tied into Universal Income.

(((They))) have primed the younger generation to accept this system, and you're kidding yourself if you think it will be met with but a handful of resistors. The question is then, how do we prevent this dystopian nightmare from emerging before it is too late?

R: 13 / I: 0 / P: 13 [R] [G] [-]

Left vs Right in tech movements

So often, alternative sercices are made by anarchists or neo-nazis who were banned from mainstream communities. Will the leftists or alt-right be the ones to lead the resistance against big tech?

protip: youre thinking that the answer is your own side, you irrational tard

nonbinary political affiliations are allowed ITT

Right:

>big tech is now leftist/jewish and is censoring us!

>social media is degenerate and castrating [white/other] people and our values

>diversity hires and pajeets are killing meritocracy and therefore killing good programming

Left:

>big tech is now capitalists/fascists who are censoring us!

>big tech is evil capitalism exploiting the proletariat to try and control everyone

>we have a right to privacy and to not be owned by government

>software should be free and open to all

R: 71 / I: 15 / P: 13 [R] [G] [-]

The All-Embracing Library

Size 177.96GB. I dare to say contains among the best books of their fields and are supposed not to repeat. It is a extremely well ordered collection by topic, and if you compare the size you soon see its value. Topics range from mathematics, physics, psychology, self improvement, survivalism, the best science fiction and fantasy literature, comics, magazines, and more. Magazines takes about 75 GB and there are many youtube videos, documentaries and conferences so you can exclude these if you want to. All books combined takes about 40 GB or so. But i really recommend downloading other stuff too since you can't really find it somewhere else easily. Did I mention is well sorted and contains only the best books?

magnet:?xt=urn:btih:488eb9134190440bbf1e77929754321c85a24c72&dn=The+All-Embracing+Library&tr=udp://tracker.openbittorrent.com:80&tr=udp://open.demonii.com:1337

It has only one seeder left right now. Used to be many more months ago. Would you kindly share this torrent on places like demonoid, piratebay and other imageboards too? That would be good.

R: 69 / I: 4 / P: 13 [R] [G] [-]

Anonymous distributed networks

Can we have a thread about anonymous (so no cjdns, no IPFS and no retroshare) distributed networks for the purpose of file sharing and shitposting?

>Tor

Primarly made for and used as a proxy to the clearnet; the network is saturated by this. The client is written in C with some welcome security features like sandboxing.

>i2p

Supposedly better than Tor, has a fork of the bittorrent protocol as filesharing. Sadly, the main implementation is a JavaPD implementation that includes everything possible.

Fortunately, there's i2pd, an actively developped C++ implementation and XD, a Go torrent application for it. It's still rough around the edges but progressing fast.

>gnunet

Don't know anything about it, except that there are some papers supporting it and the userbase is extremely tiny for now. Has filesharing builtin and an optional GTK+ GUI. It looks like its website got a facelift recently, maybe we'll see more development.

>lokinet (i2pd and monero successor)

Made by some guys including some i2pd devs because they're fed up with i2p and monero. Supposed to cure cancer and all.

For now, I think i2p is the way to go as far as anonymous filesharing goes. Any further opinions?

R: 35 / I: 4 / P: 13 [R] [G] [-]

Hey /tech/, yes Im "from" 4chan and so are 95% of you fucks. Anyways, I'm curious about what you peoples think about privacy and security on mobile networks. I can do what is possible on my end and Im def interested in the librem5 when it comes out, but its seems like no matter what you are forced into a illusion of choice for mobile internet. every 3 months or so a scandal comes out that your mobile provider has sold your data for example:

https://www.theguardian.com/business/2016/oct/25/att-secretly-sells-customer-data-law-enforcement-hemisphere

https://www.washingtonpost.com/technology/2019/01/10/phone-companies-are-selling-your-location-data-now-some-lawmakers-want-federal-investigation/?utm_term=.8187bf07fd7c

https://www.theverge.com/2018/6/19/17478934/verizon-selling-real-time-location-data-third-party-securus-wyden

etc ad nausem.

My point is I can do what i can on my end but I cant make my own mobile network. Anyway around this besides just throwing my fucking phone away?

R: 54 / I: 4 / P: 13 [R] [G] [-]

There's this clearnet imageboard hosting CP, won't link because that's illlegal and don't want thread deleted.

By now the authorities should be aware of it (it's been up for more than a month I think)

So my question is, how come it has not been shut down?

Don't the authorities have the power to do that?

R: 18 / I: 0 / P: 13 [R] [G] [-]

Decentralized imageboards

Now that the dust has settled and anyone with a brain realized that centralized imageboards don't work we discuss decentralized alternatives.

https://github.com/majestrate/nntpchan

>federated

>terrible frontends

>anonymous with Tor/I2P

>autistically developed

https://gitgud.io/millchan/millchan

>self-moderated

>zeronet

>anonymous with Tor

>autistically developed

https://github.com/smugdev/smugboard

>unmoderated

>IPFS

>not anonymous

>abandonware

R: 68 / I: 9 / P: 13 [R] [G] [-]

Home Computer Repair

I am tired of attempting to find work. I have decided to become a small-buisness owner and make my own computer repair store. I wish to run this out of my own home.

I plan to make a website tomorrow. However, I am looking for some advice on this.

What is a good price schedule for computer repair? Would having customers mail their computers to me at their own cost be a deturrent? I live in a gated community and don't think I could have people physically enter my property (let alone safely). How would you personally start this business?

I'll come up with more questions eventually, but this is all I have at the moment.

PIC not related

R: 116 / I: 15 / P: 13 [R] [G] [-]

hidden copy of windows 3.1

i hid a copy of windows 3.1 inside this photo just open it with winrar or

7zip that is if theres some sort of system that would remove the files from the photo its self on this image board

R: 105 / I: 14 / P: 13 [R] [G] [-]

Why are audiophiles so fucking stupid? Pic related manages to top the stupidity of cable risers, a feat I did not think was possible.

R: 118 / I: 32 / P: 14 [R] [G] [-]

PNG is actually smaller filesize while being higher quality for most images uploaded on 8chan

All jpg cucks will hang.

All the time I see these stupid jpg thumbnails that 8chan is using and they are bigger filesize than if they were just png while looking like shit.

Worse yet random anons keep thinking jpg is always smaller and so they save their screencaps as these shitty jpg fuzz ridden higher filesize images.

R: 61 / I: 3 / P: 14 [R] [G] [-]

Thwarting the phone number jew

From a technical standpoint, the trend of large online platforms demanding that you provide them a phone number to use their services is by far the most difficult barrier to ban evasion and maintaining privacy to overcome. Other measures of tracking such as browser fingerprinting and MAC address bans aren't terribly difficult to bypass with techniques such as using a VM, MAC spoofing, etc. But adding phone numbers to the equation makes keeping your PII safe and avoiding skynet much more difficult. Phone numbers aren't easily replaced and at the same time are extremely easy to trace back to your real identity. And while tools such as online SMS services and VOIP exist, these sites are wise to them and in most cases with have no trouble at all figuring out that a number came from such a service and blocking it.

What are the options available when it comes to solving this problem. Are there even any options?

>in b4 'just get a burner phone'

Burner phones and SIM cards still cost money, so once you get the banhammer you're effectively forced to make another purchase if you want to get back on the service in question. In this way you are limited in how aggressive you can be with whatever information you are trying to spread. Also, the aforementioned privacy issues still apply.

>you shouldn't be using these services in the first place

I agree. No one should, in fact. But the unfortunate reality of the current state of the internet is that due to the size and influence of these large platforms, you are effectively required to engage with them if you want to spread information. If you only ever post on 8chan and sites like it, you only end up containing yourself. When it comes to spreading information, breaking containment is key.

R: 13 / I: 4 / P: 14 [R] [G] [-]

Crystal Thread

I like this language, do you guys think it's worth it?

R: 14 / I: 0 / P: 14 [R] [G] [-]

e-mail in 2019

What e-mail services are worth a damn in 2019 for your primary e mails? Stuff where privacy doesn't matter that much because you're already interacting with untrust worthy sources. Things like Amazon accounts, forum accounts and such.

Tutanota has shit it's self repeatedly with it's spam filters where it's caught important messages from people I mailed first. Order confirmations and a bunch of other shit.

R: 52 / I: 6 / P: 14 [R] [G] [-]

Defending digital spaces

How do you defend digital spaces from being overrun by degenerate communities? Furries turn up and more of them come along, until it's full of furries and people wanting the original content leave so they don't have to deal with it.

Similarly with anime and porn consumers, they turn up and shit up the place until it becomes a swamp full of them.

How do you defend your digital spaces from these people? Is there a way to safe guard against this slippery slope or is it permanent?

R: 157 / I: 19 / P: 14 [R] [G] [-]

linux file managers

Why do all of them suck ass?

Seriously they're worse than fucking windows explorer.

How is that even possible?!

Is ranger any good or just a broken meme?

R: 62 / I: 9 / P: 14 [R] [G] [-]

Hacker Spaces

I joined a hacker space recently thinking I would finally be able to learn all about electronics and realized I don't know what I actually want to actually do there. A few years ago when I was still in high school I wanted to be around like minded people interested in electronics and computers but never knew where to start (the closest I got to that was lurking and posting here and joining a robotics club where they didn't let me do or teach me anything). Now that I've joined this facility, I want to work on projects but tasks I thought would be simple seem to be too hard for me at my current skill level and I have no idea where to even start. What's worse is that projects that I can do at home seem meaningless because even if they seem fun in concept, it all seems pointless in the end while I learn nothing. For example I was planing on modifying a piratebox to try and host a custom forum and doom server off it's local connection for tenants at my friend's apartment I'm sure there's a better way of doing this but bear with me. While doing research on how I would achieve this I realized that nobody would actually use this and I would be doing a fuck ton of work to basically have normalfags talk to each other from their apartment rooms with their, more likely than not, uninteresting thoughts. This happens to me for basically every project I can do and I don't know what to do about it.

TL;DR I have access to a hackerspace. What should I do with it.

R: 68 / I: 5 / P: 14 [R] [G] [-]

VLC Media Player > Say something bad about it...

I mean, is there anything it can't do concerning media formats, let alone surpassing every other media player in existence?!

I want you to try and name one thing that needs to be fixed/added/improved, and I'll owe you a Coke if I ever meet you...

R: 17 / I: 3 / P: 14 [R] [G] [-]

scuttlebutt have you guys heard of it

Apparently I have came across some sort of friend to friend a log store network That's also p2p and people build apps on it like patchwork which is a p2p social network it claims to somehow work over a sneaker net to There's also a few other applications built on top of this platform it's quite interesting that the problem is is that if you were to say post something you can't edit it so I have to be careful what you say because it's going to be there There's no way of editing a it or removing it

https://www.scuttlebutt.nz

R: 31 / I: 0 / P: 14 [R] [G] [-]

Tox group for /tech/

Maybe we should have like an official group bot for this board since the other group bot got shut down permanently unfortunately i wonder if i can contact the moderator of this board and send him a recommendation for it

R: 54 / I: 0 / P: 14 [R] [G] [-]

Browser anonymity thread.

>your screen resolution

https://bestfirms.com/what-is-my-screen-resolution/

>your fingerprint w/o bullshit

https://ipleak.net/ (js mode)

https://ifconfig.me/

What add-ons/extensions does anon use to enhance anonymity and protection against trackers/fingerprinting?

They can literally track your screen resolution, realtime clock, and user agent even if you spoofed them.

>without premium proxies

All they will ever need to know is your DNS, realtime clock on packet requests, and screen resolution to track you (IP is sometimes shared through NAT so it's not that reliable unless they look side-by-side with the logs).

In case you stopped being bareip they will only need to track your canvas and other bloat 'renderer' fingerprints or make use of clever unpatched bugs or intentionally merged exploits tend to be used for the likes of anon.

In case you blocked JS/cookies and the rest of the baddies, they'll just resort to tracking you by DNS/IP/webrtc(chrome niggers) and header/packet infos/date&time that you probably won't even bother changing.

In case you put VPN atop everything they will just read your logs tonight like what (((they))) do everyday you can ask someone in the back-lines, what's the point even if you're not readjusting your system's clock according to your new IP? Pretty much looking like captain obvious.

Keep in mind they're still liable to share data to LEA unrestricted though VPNs always aer marketed as 'will never share to third parties' and through wordplay they'll just give them to firstparties like when the same VPN company is Amazon-owned so it's first party - like most of the internet right now lol, they even give it to ISPs and guess whom are the ISPs right now...

So you finally learned how make your own VPN or tunnel everything to your remote rogue circuits. Good. But sooner or later you'll find out your network, browser, or OS was parallel-phoning to something else because they've cracked your encryption or your browser/connection was rigged (or nigged like the most).

Phones are even worse, there's literally no good browser right now aside from Klar but it still lacks other anonymizers against fingerprint (it's just 'privacy' crap that cleans your history and cookies only but still decent enough).

>inb4 tor

Are you that stupid? Though, I already know the answer.

R: 167 / I: 15 / P: 14 [R] [G] [-]

come tox with me~

>ctrl+f

>no tox thread

Get in here, fags, let's have a Tox thread.

Looking for Rudolph edition

>favorite client?

>is irungentoo ded?

>will file transfer ever just werk?

Let's share our Tox IDs too. I'll start:

8FC4694583756BEC3F9DCBED5CEF21AD47D5B4A19D6C2974D68FC33AAB056509E24B62449BF0

R: 17 / I: 9 / P: 14 [R] [G] [-]

How to brake away from Linux: A beginners guide

Linux noob here. Would someone like to proof-read this?

It's still a bit of a mess but the first half should be spot-on.

One day, I'll learn how to stop processes like Windows Task Manager can, create repositories for downloaded programs, and most important of all, be able to use devices such as the Roccat mouse and keyboard.

R: 31 / I: 1 / P: 14 [R] [G] [-]

New Social Network

Check out the Social Network that I built. It can understand human facial expressions and feelings. Let me know what you all think of it. www.spotmi.app

R: 17 / I: 2 / P: 14 [R] [G] [-]

Hello respectable individuals. I just finished making this new imageboard on TOR. I haven't named it yet, but it would be nice if you guys could tell me what you think. http://vs5eqpjze3yvnw22ry53iflaoyvdm5dvjbubfolfoud4geygfhopzoid.onion/

sorry if this double posts

R: 204 / I: 56 / P: 15 [R] [G] [-]

Get ready for mass human die off, skyrocketing cancer rates, thanks To 5G

Our current cell phone technology produces electromagnetic radiation that damages male fertility, and the radiation produced by the new 5G technology will be much more powerful and therefore much more dangerous. But most people don’t know about this. Instead, most people are greatly looking forward to the rollout of 5G technology because it will be up to 100 times faster than our current 4G technology, and who wouldn’t want that? The big cell phone companies will be spending hundreds of billions of dollars to install hundreds of thousands of new 5G antennas, and every single one of those antennas will be constantly emitting very powerful electromagnetic radiation. Since we can’t see the radiation, to many people the threat does not seem real, but the truth is that if you live in a major urban area you are constantly being bombarded by it. And once the new 5G network is completely rolled out, you would literally have to live in the middle of nowhere to get away from it completely.

5G is a quantum leap from 4G, but because the smaller 5G waves do not travel as well, a lot more antennas will be required…

In order to achieve faster speeds, 5G relies on millimeter waves, which are even smaller than microwaves and operate at a higher frequency. These smaller waves are more easily absorbed by buildings, trees and other things (like people), so more towers will be needed in order to maintain connectivity. The industry has created specialized “small cell” stations and new, larger base stations to accommodate the demands of 5G tech. Even so, it’s expected that a small cell will need to be installed every 250 meters in cities for 5G to work properly. There will be one on every street corner.

In addition, 5G technology is “ultra high frequency and ultra high intensity”…

5G cell towers are more dangerous than other cell towers for two main reasons. First, compared to earlier versions, 5G is ultra high frequency and ultra high intensity. 1G, 2G, 3G and 4G use between 1 to 5 gigahertz frequency. 5G uses between 24 to 90 gigahertz frequency. Within the RF Radiation portion of the electromagnetic spectrum, the higher the frequency the more dangerous it is to living organisms.

So basically the radiation that we will constantly be absorbing will be much, much, much more powerful than before, and the sources emitting the radiation will be much closer to us.

Are you starting to get the picture?

If that wasn’t bad enough, an investigation conducted at a university in Israel discovered that the surface of the human body actually draws 5G radiation in “like an antenna”…

What’s further disturbing about 5G radiation is how the human body responds to and processes it. Dr. Ben-Ishai from The Hebrew University of Jerusalem discovered as part of a recent investigation that human skin acts as a type of receptor for 5G radiation, drawing it in like an antenna.

“This kind of technology, which is in many of our homes, actually interacts with human skin and eyes,” writes Arjun Walia for Collective Evolution about the study.

“… human sweat ducts act like a number of helical antennas when exposed to these wavelengths that are put out by the devices that employ 5G technology,” he adds.

Okay, now let’s talk about fertility.

Several early studies found that our current cell phone technology has a negative affect on male fertility…

A 2005 mouse study found “a significant genotoxic [DNA-damaging] effect on…spermatozoa.”

A 2007 rat study found “significantly higher incidence of sperm cell death,” suggesting “that carrying cellphones near reproductive organs could negatively affect male fertility.” And a 2009 rat study found that the radiation from cellphones “negatively affects semen quality and may impair male fertility.”

https://www.zerohedge.com/news/2019-03-05/will-5g-cell-phone-technology-lead-dramatic-population-reduction-large-numbers-men

https://web.archive.org/web/20190306073600/https://www.zerohedge.com/news/2019-03-05/will-5g-cell-phone-technology-lead-dramatic-population-reduction-large-numbers-men

R: 55 / I: 10 / P: 15 [R] [G] [-]

Wireguard Might Finally Come to Linux in 5.2!!

Wireguard hype thread!

>Article

https://www.phoronix.com/scan.php?page=news_item&px=WireGuard-V9-Maybe-Linux-5.2

>What is it?

Wireguard is a new VPN protocol that utilizes state-of-the-art cryptography. It aims to be faster, simpler, leaner, and more useful than IPsec, while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances.

It has been and continues to be considered unstable and incomplete, but that time may be coming to an end in the near future.

>Why should I care?

WireGuard has been designed with ease-of-implementation and simplicity in mind. It is meant to be easily implemented in very few lines of code, and easily auditable for security vulnerabilities. Compared to behemoths like *Swan/IPsec or OpenVPN/OpenSSL, in which auditing the gigantic codebases is an overwhelming task even for large teams of security experts, WireGuard is meant to be comprehensively reviewable by single individuals.

>Where can I check it out?

https://www.wireguard.com/

R: 66 / I: 8 / P: 15 [R] [G] [-]

has the internet doomed humanity as a whole?

R: 65 / I: 8 / P: 15 [R] [G] [-]

why is linux so stupid

That it lets a program steal 100+% of CPU usage just like that?

R: 12 / I: 0 / P: 15 [R] [G] [-]

Gnunet

It claims to be so many things including having a decentralized name service I have looked at it so many times I've tried to find some stuff about it on jewtube And there's not too many videos on it there I mean I played with it to and it seems to be nothing more than a file sharing software Yet it claims it can do all these things and more It is there something I'm missing here is there a way to set it up to browse sites on there and use there GNS name system Or is it all bullshit

R: 27 / I: 1 / P: 15 [R] [G] [-]

Is GSF-less android safe enough?

I use AOSP-based custom ROM, microG without google account and F-droid apps for stuff where possible.

I am aware Android still uses proprietary vendor drivers, but network monitoring didn't report any connection to google or other suspicious sites except for connectivitycheck.gstatic.com which can be blocked at dns level.

So is this solution relatively safe from data collection or do you know about something I don't know?

R: 53 / I: 6 / P: 15 [R] [G] [-]

And when you think StackOverflow can't get any more cucked than it is now...

> The type of people Stack Overflow serves has changed, and now, as a part of the developer ecosystem, we have a responsibility to create an online community that is far more diverse, inclusive, and welcoming of newcomers.

> So a big challenge for Stack Overflow is welcoming those new developers into the fold.

> In many ways Stack Overflow’s specific rules for what is permitted and what is not are obstacles, but an even bigger problem is rudeness, snark, or condescension that newcomers often see.

> We’re looking for a new CEO for Stack Overflow.

> We’re especially focused on identifying candidates from under-represented groups, and making sure that every candidate we consider is deeply committed to making our company and community more welcoming, diverse, and inclusive.

https://stackoverflow.blog/2019/03/28/the-next-ceo-of-stack-overflow

https://archive.fo/3lY4M

R: 10 / I: 2 / P: 15 [R] [G] [-]

app messaging encryption

I do recall an F-Droid app that, provided both users had the app, encrypted facebook direct messages between the recipients, as so that the messages being logged in facebooks servers cannot be read.

I cannot find this app, and am wondering anons know of any apps that perform the same functions for instagram, snapchat, other social media platforms, etc.

>inb4 zoomer btfo

R: 14 / I: 2 / P: 15 [R] [G] [-]

What is the ThinkPad of automobiles?

R: 42 / I: 3 / P: 15 [R] [G] [-]

Compartmentalization

https://www.youtube.com/watch?v=lLessJ4R6w8&t=1198s

Anyone use this? Anyone else even watch this channel? He's really great.

The idea is to "compartmentalize" your browsing between different browsers.

He has an older video on only this topic

https://www.youtube.com/watch?v=b7GH_ZA5jik

R: 14 / I: 2 / P: 15 [R] [G] [-]

Is there any escape?

Yes, another browser thread, you fucking idiot.

R: 14 / I: 0 / P: 15 [R] [G] [-]

Need a way to quickly and permanently wipe all files on a scammer's computer upon them downloading, any tips on what works best? Even better is if it were to go for their networks. Just a quick file or program that's undetectable generally on the computers of those in places like the Philippines.

R: 102 / I: 6 / P: 15 [R] [G] [-]

Ncurses Programming

How can you possibly do it correctly?

I see things like menus (which are fine but what if I need multiline items). What about scrolling (not just down but also up)

What if I need to scroll not by lines, but by "items" like windows, or scroll horizontally

Also, ranger somehow uses images, how can images be seamlessly used. Can other types of things be items, like videos, and music (of course some other external program would be called to properly play it) What about resizing?

Wouldn't it be great to have a library on top of ncurses which allowed you to do these things plus more easily, just as the java swing allows one to easily build GUI programs.

I'm a minimalist fag, so I'd love for more TUI programs when appropriate, and it seems having something like this would be a yuuge help towards making TUI programs

R: 197 / I: 22 / P: 15 [R] [G] [-]

Creative Production on Linux (Audio/Video/Editing)

What do you use/how do you cope? Is there any hope for commercial solutions/VSTs that only support Windows/MacOS to get a Linux port?

R: 28 / I: 2 / P: 15 [R] [G] [-]

Planetary USB C at stake in one hour

https://www.apple.com/apple-events/livestream/

This time every year Tim Cook comes out of his hole in scilicon valley. The myth goes that if he shakes his wallet the entire planet will get usb c. Otherwise its two more years of winter.

R: 42 / I: 7 / P: 16 [R] [G] [-]

Hai fren! I made a new tor board called VileChan, please come over because it would make me happy.

http://hvjgdbwgmn4iu4yxkc4gxxclskxigh5oz52uot3ltqijb76wxjdnxpyd.onion/

R: 70 / I: 3 / P: 16 [R] [G] [-]

TOR PROJECT CHOOSES PERFORMANCE OVER SECURITY

another proofs of Tor Project being owned by CIA

https://trac.torproject.org/projects/tor/ticket/28838

>This function is currently around 9% of our startup time, and it does a bunch of curve25519 operations. We could make it a bunch faster, since our curve25519_basepoint function has not been observed to fail in the wild.

>Resolution: → implemented

https://trac.torproject.org/projects/tor/ticket/28851

> After the #28837, #28838, and #28839, I note that we're now spending about 24% of our of our startup time in crypto_validate_dh_params().

>Since our diffie hellman parameters are hardcoded, maybe we don't actually need to validate them on every startup, especially on clients?

>Resolution: → fixed

they trade performance over security. they implement tiny performance gains at expense of security, privacy of users

maybe someone orders them to do that

TOR PROJECT IS COMPROMISED, DO NOT TRUST THEM

R: 74 / I: 6 / P: 16 [R] [G] [-]

why does gnu/linux not feel like real computing to me? i know how to operate linux efficiently because i just translate my knowledge from using command prompt all these years and translate lingo to its linux counterparts. but for some reason despite having more complexity it still feels like a kids toy in comparison to good ol' windows 7.

i do not say this to offend, more to see if anybody else feels this way. Microsoft is now being run by a bunch of idiots but windows 98, 2000, XP and 7 ran like absolute chads and you knew you could get work done on them and count on everything working as intended, given you weren't a mouthbreather who ran untrusted programs.

hell even win ME and vista worked great in my experience. i probably got service packs because i dont remember them being bad, most of the issues were upon release and were quickly fixed. not excuseable from MS, but it wasn't THAT BAD.

>inb4 dumb wincuck

ive been using linux for years now, but only now am i realising i should come home. all those years i could have been using a system that just werks, and prior to 10, had an infinitely better aesthetic than gayDE or footgnome. even win8 looks good if you just install classic shell and use regedit to bring everything back to control panel from the settings "app"

>inb4 nice blog

thanks!

R: 27 / I: 6 / P: 16 [R] [G] [-]

Userview Digizine: A Digizine Exclusively Focused on Internet Users

>be me

>love shitposting and copypastas and meme fanfics

>have god-tier indesign skills and routinely read 8chan's shit

>really pissed off at mods and admins abusing the user class

>facebooks bans Tommy Robinson for criticizing BBC and threatens all their users

>meme economy badmins ban me because my aura of free speech was too great for them to comprehend

>interviewed genius world-travelling technologist who predicts Universal Basic Income becomes a big deal this decade

>JAPAN IS GONNA COPYRIGHT ALL MANGA AND ANIME AND MAKE IT ILLEGAL ONLINE FUCKKKKKK

>youtube gonna soft-censor all conspiracies

>mfw i turn this all into a digizine

>mfw mods and admins forever have wrecked anuses

Userview Issue 2: https://userview.wixsite.com/home

Cost me 40 bucks to display this digizine in order to own the mods and admins, but I'm pretty happy with it. Tell me if I should set up a functioning SubscribeStar or if you feel the Internet's better off without this. I'd probably keep making this either way since it's fun tho.

P.S. it's okay to be namefag.

~E p y c [redacted] W y n n

R: 135 / I: 26 / P: 16 [R] [G] [-]

EU Puts An End To The Open Internet: Link Taxes And Filters Approved By Just 5 Votes

EU Puts An End To The Open Internet: Link Taxes And Filters Approved By Just 5 Votes

> Well, it was a nice run while it lasted, but the EU Parliament has just put an end to the open internet. By the incredibly thin margin of just five votes, the Parliament voted to approve the EU Copyright Directive, including the terrible versions of both Article 11 and 13. This is an inauspicious day and one that the EU will almost certainly come to regret. While we now need to see how each of the member states will implement the actual laws put forth in the Directive (meaning the damage in some states may be more mitigatable than in others), on the whole the EU Copyright Directive requires laws that effectively end the open internet as an open communications medium. Sites that previously allowed content creators to freely publish content will now be forced to make impossible choices: license all content (which is literally impossible), filter all content (expensive and failure-prone), or shut down. Sites that used to send traffic to news sources may now need to reconsider, as doing so will inexplicably require payment.

>At best, the EU--for all its complaints about Google and Facebook--has just locked both companies into a dominant position. They can afford this. Others cannot. And, the legacy gatekeepers in the media and entertainment business will quickly pivot to seeking to export this model elsewhere.

>The MEPs who voted for this are up for election in two months, and hopefully the EU shows them the door, but in the meantime, today is a sad day for the open internet. I am sure that some will be celebrating on the false belief that this will magically "help artists." It will not. You just handed more power to giant companies, and took it away from creators. In time, one hopes, those who mocked the protesters and activists and actual experts will come to realize just how much they destroyed today.

https://www.techdirt.com/articles/20190326/05584741869/eu-puts-end-to-open-internet-link-taxes-filters-approved-just-5-votes.shtml

R: 16 / I: 0 / P: 16 [R] [G] [-]

Backing up YouTube channel

>tries to download 267 of vids

>uses Youtube-dl

> Has 1TB of storage so he doesn't have to worry

>leaves it running over night

I wake up to find the next morning I could only download a 136 of his videos because it dc :(

R: 19 / I: 0 / P: 16 [R] [G] [-]

Eye of the Lynx: imageviewer aimed at browsing porn

I released version 1.1.0, it fixes excessive ram usage, several files that used to fail to load, including due to paths with unicode in them.

I also added a few small features.

https://gitgud.io/eye-of-the-lynx/eol-build

I've been using it myself for fapping for a few months and have been quite satisfied so far with it.

R: 103 / I: 12 / P: 16 [R] [G] [-]

tech cringe

Is there anything more cringeworthy than these "koans"?

https://sanctum.geek.nz/arabesque/vim-koans/

http://stevelosh.com/blog/2013/04/git-koans/

And of course half the people in them are women because we all know the field is really saturated with women

R: 17 / I: 0 / P: 16 [R] [G] [-]

Would it be technically possible to make an imageboard software in C? I ask because I was thinking for making a 3ds imageboard just for the keks, and I'm pretty sure you have to write 3ds homebrew and custom applications with C.

R: 16 / I: 0 / P: 16 [R] [G] [-]

Private virtual lan

Is it possible to make a program like hamachi that does not require external servers?

Maybe a p2p version of it?

R: 43 / I: 10 / P: 16 [R] [G] [-]

Image encoding

Will JPEG ever be succeeded as the default lossy image encoding standard on the Internets?

Shit's getting old and is only surviving due to the (((industry))) failing to adopt any superior standards widely enough no matter how good they are.

Does AVIF have any chance of breaking that deadlock or is it fugd too?

R: 69 / I: 2 / P: 16 [R] [G] [-]

Germany to Ban Tor

https://news.ycombinator.com/item?id=19399576

I've linked the Hacker News page since it provides human translation

>They want you to face jail, if you provide an "internet based service", which "accessibility is restricted due to specific, technical precautionary measures", and which "purpose is to allow or encourage specific illegal actions".

R: 19 / I: 2 / P: 16 [R] [G] [-]

Example of the dangers of centralized services

If you're not aware a mainstream video streaming service has turned off search filtering to prevent the spread of information.

Remember this when the main stream media tells you about Turkey, Russian and Iran are for censoring foreign websites

R: 17 / I: 1 / P: 16 [R] [G] [-]

Is vichan still the big thing or is something better out now?

R: 273 / I: 31 / P: 16 [R] [G] [-]

MULTIPLE VULNERABILITIES IN THE RUST PROGRAMMING LANGUAGE

>make a """safe""" programming language.

>has vulnerabilities

OH NoNOnoNONo.... OHOHH NOOOONOONONO.... BAHAHAHAHAHHAHAHAHAHAHAHAHAHAHAHAHAHAAHA

https://twitter.com/cvenew/status/1016419391515381760

https://bugzilla.redhat.com/show_bug.cgi?id=1632932

R: 67 / I: 4 / P: 17 [R] [G] [-]

Anyone remember that news about Firefox changing their privacy policy back in 2018/2017. Said that newer versions would start keeping data or something, being the casual ass I am, I just downgraded to like version 51 something and stopped updating. I'm 90% sure the archived website reporting it somewhere on my harddrive, but can't organize for shit, and I can't find any news online. Il keep looking and If I can't find shit Il call it quits here.

R: 20 / I: 2 / P: 17 [R] [G] [-]

By 2025 Amazon will have a literal series of tubes running to every apartment/housing complex in major cities to pipe in food ingredients. You'll get one line for meat (think of it as a liquid hotdog fountain, or you can opt into ElasticTofu for a 100% soy-based service, with a bonus discount), one for condiment, and one for soybean oil. They will plug directly into your AmazonBasics brand smart cooker, which will cook automatically every day on schedule every morning to have you finishing your meal just as your daily smartcab ride to work arrives at your apartment. Meals will be optimized using advanced AI to maximize human-wagecage endurance, and the menu will be selected using a separate artificial intelligence to curate meals based on local cultural, ethnic, and employee preferences. The warehouse cafeteria will be a wagecage lot with cubbies, each containing a cage-connector port with an injector hose that plugs directly into the wagecage's built-in cooker at their optimal break time (all made possible due to AWS-based cloud cooker monitoring and ingredient allocation services, which log and keep track of each cooker loaded recipe, ingredients, present cooking status, employee weight, employee BMI, employee portion size, employee meal price, employee wagecage efficiency profile, with extra options for text messages or email alerts for when your meal is done, for an additional fee). All meals will get automatically withdrawn from your wages based on portion size and ingredient base price. They'll store the ingredients in giant underground distribution tanks with the main pipes going directly to regional warehouses, and then branching out to employee apartments.

R: 15 / I: 0 / P: 17 [R] [G] [-]

Does AdNauseam steal from kikes or is it a kike scheme?

R: 33 / I: 2 / P: 17 [R] [G] [-]

Are markup languages actual programming languages?

What makes a normal programming language better than a mark-up language? Do you consider mark-up languages such as HTML and XML to be true programming languages? And what about lightweight markup languages such as WikiText and Markdown?

R: 49 / I: 4 / P: 17 [R] [G] [-]

I want to copy myself as an artificial intelligence. It is mean I want to create a software which will achieve just like me while using a computer (this part it is simple) and will also set own goals (this part is difficult).

It should be real artificial intelligence, no just set of simple scripts to automation.

First of all what I need (as I think) is software tol spy me and then create scripts based on my behavior. Do you know any solutions for Linux for this? Do you have any more ideas, tips, keywords for this question?

R: 13 / I: 0 / P: 17 [R] [G] [-]

Blackpillbro thread

WE CALLED IT

>Article 13 passed, securing eternal kike rule over the earth

>nobody will fight back

>1984 eternity intensifies

R: 36 / I: 1 / P: 17 [R] [G] [-]

The era of cloud computing

10-15 years ago I remember everyone and their uncle self-hosting their own forums, teamspeak/ventrillo servers, IRC Bots, ect. Now all I see is Discord, Youtube, AWS/Azure, and all of these highly available macro-services hosting content as managed services instead of people just going out and getting a server host content on. Is it because "real" business class internet is so expensive? I know that in the US it is next to impossible to get decent upload on a residential like for under $150-200 a month for most people (seriously what the fuck Comcast, $180 a month to get 35mbps upload?).

Most of my fondest memories were posting on small, obscure chans or forums that were self-run and not owned by some corporation.

R: 29 / I: 2 / P: 17 [R] [G] [-]

What is happening to Purism?

Look at first pic related. This is, or was, the Purism Freedom Roadmap. This was their progress towards creating libre hardware (while not having it be just reselling decade-old thinkpads for the ten millionth time). They had corebooted their system, me_cleaned it, and even got their distro FSF-approved.

But look at their site now. https://puri.sm/

You look around, and there's no sign of this roadmap anywhere. You can technically still find it using a search engine https://puri.sm/learn/freedom-roadmap/

But it hasn't been updated since mid last year. If you remove the freedom-roadmap part you'll get an error. They took down the learn page, which was where they talked about Free Software, privacy, and it also means that there is no way to navigate to the roadmap page anymore.

Looking at the second pic related taken from https://puri.sm/posts/womens-day-2019/ , it would appear that they have gone very SJW. I mean, just look at this shit.

>Digital rights concern everybody, touch most people’s lives, and carry a heavy societal weight when it comes to women. In spite of that, the gender gap in Tech is abyssal – and women are almost nowhere to be seen.

>To say women are under-represented in the IT sector is an understatement; the situation in Free Software development is not much better, although some steps have been taken to improve the gender gap. There is, for example, the Debian Woman project, with its own mentoring program; or Outreachy, inviting cis and trans women, trans men and genderqueer people to apply – and, if you have a sense of humor, there’s also WoMan.

Why is Purism entertaining this bullshit? Shouldn't they be writing code? Reverse-engineering those last few binary blobs?

Well, ok, they are writing code. Really laggy Javascript code to add a bloated fucking 3D spinning laptop to their webpages as you scroll down.

https://puri.sm/products/librem-13/

What happened to this company? In the past they had a vision, a drive, a roadmap, a goal. They were going to work towards Libreboot support. They were going to get some libre laptops out there that aren't running on a C2D. Now, it appears they have sold out their integrity and ideals for cash and some feminist/trans brownie points.

RISC-V can't come soon enough.

R: 16 / I: 1 / P: 17 [R] [G] [-]

I2p questions

How much trouble would you be in if you publicly admitted you used i2pd but you just use it for chatting with people and visiting a few sites that don't contain illegal content or you made a video about it on your YouTube channel

R: 14 / I: 1 / P: 17 [R] [G] [-]

/fucko/ thread general

There has been no thread for this in a long time so I thought I would make a new template out of the original 2014 thread. If you have improvements to my template, please give them so I can update it.

/Fucko/ General Thread v0.8.0

"Get on the ground, fucko! Squad, take his computer and all other electronics!"

This edition:

New Zealand Worldwide Censorship

ITT:

>Computer security

>Home security

>online privacy

>PC and data destruction methods

>How to hide questionable images, video, audio, etc. (stenography)

>What to do in case squad ever actually breaks down your door

>Brandon Tarrant and censorship

>But I dont have anything to hide :^)

https://archive.fo/tjkFV

>If you have done nothing wrong you should have nothing to hide.

If I've done nothing wrong there's no reason to search me.

>LiveUSB/LiveCD Review v1.1

http://pastebin.com/raw/BbmZ8hiR

>Web Posting Assessment v.2

https://i.imgur.com/T8q7eB0.jpg

>Anti-Forensics - Leave no Trace [Windows]

https://i.imgur.com/9YmNuDf.jpg

>The paranoid #! Security Guide

http://pastebin.com/tUvq8Jzj

>Fake info Generator

http://www.fakenamegenerator.com/

>Pretty Good Privacy [PGP]

http://www.gpg4usb.org/

https://www.gnupg.org/

>Off the Record messaging [OTR]

https://otr.cypherpunks.ca/

>OMEMO Multi-End Message and Object Encryption [OMEMO]

https://conversations.im/omemo/

>Camera Software

http://www.ispyconnect.com/ (FLOSS)

>Cell Phone guide for Protesters

https://www.eff.org/deeplinks/2014/08/cell-phone-guide-protesters-updated-2014-edition

https://ssd.eff.org/en Successor to Previous

>The old squad from 2014

>Team 1: #Squad

http://pastebin.com/PxcDYUr0

>Team 2: #squad

http://pastebin.com/jd1sEwKL

>/fucko/ squad irc

Dead due to lack of interest

All and any supportive comments, template contributions, are welcome and encouraged. NSA shills need not apply.

Template here: https://wiki.installgentoo.com/wiki/Fucko

Previously on /Fucko/:

"The NSA controles the Internet Servers so there's no point", stenography, told "i-don't-need-security-:^)"-fags and much more.

R: 11 / I: 4 / P: 17 [R] [G] [-]

Why I wrote a shitty npm package and why few people still use it

By Kshitij Awadhiya

When I started writing code for the first time, PHP was the goto language.

Want to setup a blog? PHP

E-Commerce website? PHP

Build an MVP for your startup? PHP

Scripting? PHP

Scraping a Website? PHP

Worst of all, it was vanilla PHP, not even a framework. Every component was handwritten. Not that it should be done that way nor is it the right way but writing your own tools made sure you knew what was happening behind those small libraries. To run migrations on MySQL, I used to maintain a list of PHP files in a `db` folder to create tables in MySQL. It wasn't really an automated solution. Once the code is deployed, one needs to log on to the server and run certain numbered files and get that done. The point of telling all this is that running it manually was a simple solution to a simple problem. It didn't account for scalability, continuous deployment etc but it worked.

This went on for a while until I switched to Python Django. The latest version was 1.4 that time for Django. Django didn't have a flexible migration system either. If you want to make changes to a table, you need to delete it manually using MySQL console and run migrations again. Django South solved that problem and eventually the library was packaged as a default with the core itself. This happened version 1.7 onward and before that, I had again switched to a different technology stack.

I worked on a year or two on NodeJS. The setup already existed when I started working. I didn't care about how the migrations were being executed but always assumed it was some npm module. I assumed that just like PHP, some simple package was being used to execute such puny tasks. I still don't know what it was. But after this, I worked for almost 3 year on RoR and Rails migrations amazed me. It is so smooth and transactional in nature. Although it doesn't work for tables with huge amounts of data but conceptually it worked fine.

After all this, I had to work on a small project on NodeJS and I was baffled to find no simple solution to run sequential migrations. I had to make 3 tables and needed to run 6-7 migrations but I couldn't find a npm package. I had to literally maintain a list in notes to run the migrations on production. That is when I came up with a shitty npm package to run migrations. This is all it does:

Generates a migration file using timestamp

Lets you write forward and backwards migrations

Lets you run migrations (all, particular or ranged)

That's it. Just to see how many people would use it, I made a publishable version and published it. It got an astonishing 13 stars and 13 forks on github. I had expected literally zero. I didn't even publicize or anything (because I didn't gain anything by doing that). Now, I have got multiple PRs open to fix things and it gets downloaded on an average 200-300 times a week. This might come down to 30-40 times a day but hey, there are still few people who want to keep things simple and they find my solution useful. I really want to thank them for showing appreciation by them using the package. Despite being a year old (and no updates), it hasn't been replaced by a better solution. Simple solutions are still being appreciated and I am thankful to the world for that.

In case you are wondering, that shitty npm package is mysql-migrations. Feel free to fork, apply for authorship or raise a PR :).

https://codeoldschool.blogspot.com/2019/03/why-i-wrote-shitty-npm-package-and-why.html

R: 155 / I: 23 / P: 17 [R] [G] [-]

Based Microsoft Does It Again

Eat shit, haters. I can already hear the freetards scrambling to get their hands on some actually useful code.

https://blogs.windows.com/buildingapps/2019/03/06/announcing-the-open-sourcing-of-windows-calculator/

R: 53 / I: 1 / P: 17 [R] [G] [-]

Comparison between Tor and i2p?

What are the differences between just booting up tor browser/entering the network and running i2p?

Are there any imageboards or any random interests websites on i2p or is it dead?

I boot up tor frequently to see how stuff is going and visit a few imageboards, been listening about i2p for a few years but never did any search.

R: 27 / I: 6 / P: 17 [R] [G] [-]

Is dual monitor a meme? How is it better than one monitor?

R: 14 / I: 1 / P: 17 [R] [G] [-]

is nextcloud a botnet?

shit is super comfy. just installed it.

R: 59 / I: 7 / P: 18 [R] [G] [-]

CIA Glowniggers thread

Anons,

I think the 3letter agencies might be trying to spy on me.

This or my VPN provider is actively collaborating with them to spy on me.

Here a description what I mean:

>be anon

>connect to internet always via VPN

>it has been like this since 2011

>year 2015 or 2016

>have strange occurence where my tower pc turned itself on

>it went to the passwords page of my encrypted debian partition

>turn on screen and just look at it

>maybe someone is remoting my machine and will type passwords now

>nothing happens

>turn off after 10 minutes

>shrug it off as nothing

>FF March 16th 2019

>Christchurch happening

>8gag slows down for me

>government agencies are lurking this site

>Jim even confirmed he is collaborating their research

>nobody knows what that means

>today my internet connection gets weird

>after I make a posting on /pol/ my internet dies

>need to restart cable modem

>reconnect another VPN server, everything works

>get back to /pol/

>connection dead again

>reconnect router

>works again

So now I want to ask what the odds are that I am on some govt watchlist.

I never thought I am interesting enough for govts but maybe they now just want to have everyone who ever posted on /pol/ in a govt database and spy on them for life. Or am I just paranoid and this was all coincidence?

My VPN provider has a warrant canary and they state up until March 11th everything was fine. As this was one week ago I cannot do much with this info for todays problems. Have you similar stories that happed to you? I just wanted to shitpost and have fun browsing memes and dark humour. Why do normalcattle always ahve to ruin everything?

R: 42 / I: 11 / P: 18 [R] [G] [-]

Jewsh

>can't into php

>stole Hotwheel's money for drugs

>runs shitty site that leeches content off of /cow/

>defends fat autistic trannies online

When did it go wrong?

R: 70 / I: 2 / P: 18 [R] [G] [-]

C vs asm

So I have been thinking about doing a sega genesis back port of undertale and have come to a crossroad of programming it in asm or C. The only arguments I hear are

>The compiler knows better than you, use C

>you can do better low level optimizations on low power platforms, use asm

Which one should I go for, I already know C and I don't have much interest in learning 68k asm

R: 19 / I: 0 / P: 18 [R] [G] [-]

any alternative to ychan

im trying to download all of the photos off this board using ychan

how ever it seems to not be working right any alternative

R: 11 / I: 0 / P: 18 [R] [G] [-]

This is my superior calculator design: forthposter.neocities.org/calculatrice

Please feel free to weep.

R: 20 / I: 3 / P: 18 [R] [G] [-]

LSP

>The Language Server Protocol (LSP) is an open, JSON-RPC-based protocol for use between source code editors or integrated development environments (IDEs) and servers that provide programming language-specific features. The goal of the protocol is to allow programming language support to be implemented and distributed independently of any given editor or IDE.

It sounds really good on paper, convince me that it's shit and botnet.

https://en.wikipedia.org/wiki/Language_Server_Protocol

https://langserver.org/

https://microsoft.github.io/language-server-protocol/

R: 54 / I: 11 / P: 18 [R] [G] [-]

SYSTEMD ABSORBS L2TP

L2TP has been officially absorbed by SYSTEMD.

https://github.com/systemd/systemd/commit/54c258566ea1e6cf0c0c51d8a1afb8cdc0c92379

How many years until all VPN code is officially merged, making SYSTEMD 100% exploitable?

R: 16 / I: 0 / P: 18 [R] [G] [-]

Beaker browser

I've been using the beaker browser for little bit I mean it seems OK but my only complaint is it tends to be a little bit finicky sometimes I usually use it to visit fritter Is supposedly a peer to peer Twitter I don't know why I waste my time with it to be honest with you but what's your opinion about it

R: 24 / I: 2 / P: 18 [R] [G] [-]

bug bounty

Are bug bounty programs a meme? Can you actually make money of this shit? Any experiences?

https://hackerone.com/reports/429679

What do you think how hard it is to get to that level? I've built some foundation, studying on Cybrary Network+, Comptia A+, Security+, Linux+ and currently reading TCP/IP illustrated. I need to study Web app stuff right?

R: 11 / I: 0 / P: 18 [R] [G] [-]

bcachefs

is this the FS that will save linux or is it just another meme?

R: 45 / I: 1 / P: 18 [R] [G] [-]

BBOS 10 | QNX

Recently got a BB Passport and thought the OS is pretty nice to use. The complete lack of support however makes it impractical for daily use unless you only call and text.

Android apps barely work, they're slow, make the phone runs hot and is prone to crashing. The Android runtime is stuck at 4.3

The BB developer website still has docs for BBOS 10 development. There's also a section describing its architecture, basically a POSIX-compliant microkernel OS

http://developer.blackberry.com/native/documentation/dev/rtos/arch/about_system_architecture.html

R: 48 / I: 2 / P: 18 [R] [G] [-]

Are AMD FX processors botnet? What's the best x86-64 processor to get if one is looking to avoid the botnet while being able to run various legacy software?

R: 59 / I: 13 / P: 18 [R] [G] [-]

/ftg/ fuck telstra general

right boys, what are we gonna do?

what can we do?

how can we really get under their skin?

>I'm on a contract

i honestly feel like saying fuck off, finding a new provider and not paying them a single cent more. why should they have my money when i don't agree one bit with what they're doing

>inb4 get a vpn

imagine connecting to 8chan without a vpn, are you retarded?

i am barely stopped by this, but instead pissed that legitimate websites are being banned because of a minority of snuff brainlets

R: 25 / I: 1 / P: 18 [R] [G] [-]

HW pro censorship now

wtf did his pain meds ruin his brain or something?

R: 137 / I: 11 / P: 18 [R] [G] [-]

ReactOS > your opinion over it

Is it the closest thing we get to Linux imitating Windows down to detail? Or is it just as, if not more, broken than WINE?

Have you tried it, have you tested it, and have you experimented with it? All questions I want to know.

If I were to run any Windows program on it now, what are the chances it won't work?

R: 45 / I: 3 / P: 19 [R] [G] [-]

Intellectual pursuit in the face of Racism

Can racist attitudes make you a worse programmer/mathematician/physicist?

The more I learn about the aforementioned topics, I cannot help but marvel at the power of my own intellect, juxtaposed against the vacuous expanse of the nigger mind, for which antithesis begs to be defined. Every theorem I prove, every language construct I discover, every universal truth I discover about the nature of the universe, is yet one more point of differentiation demarcating the ever growing gulf, beyond that which pity can afford, one finds between my awesome abilities and those of the lowly negroid. I worry that time spent pondering superiority over the enfeebled negro mind might distract one from the destiny of their great work. I would hate to deprive humanity from even one iota of my talent which might for worse be spent holding contempt for niggers.

R: 103 / I: 11 / P: 19 [R] [G] [-]

Windows 10 thread - new updates!

Just installed the new 'dipshit 2019' update! More ads and spyware have been installed, and Bill personally made it harder to modify the desktop environment. Toolbar colors are now locked into a pool of 16 choices, and you can no longer change its position. I really enjoy the sterile, flat colors, and microsofts pledge to stick to the interface paradigm that they have since 95. Using Linux, there is just too much choice in interface control. Thank god that has been taken away from me, it makes my brain hurt.

I was dumb enough to remove the ads from the windows(tm) smarttile(r), so they have been put back! Can't wait to look at the cool candy crush logos while I'm trying to search for an item off the super menu, which for some reason takes several minutes. I actually remember the function being faster on xp. Maybe it's bill's little way of saying "stare at the ads you fucking consumer pig. look at the groove(tm) music ad, that looks good doesn't it? Did you know that artists can make .001% of every sale?"

If you do want to disable the tiles adware completely, don't worry! It's as easy as : gpedit.msc => Local Computer Policy => User Configuration => Administrative Templates => Start Menu and Taskbar => Notifications. => navigate to sidebar => turn off tile notifications

Then, simply:

Go to regedit => HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\PushNotifications => click on NoTileNotifications => modify dword => change base hex value to 1

(not kidding, you actually have to go through all of this. I could not make up something this user-unfriendly)

Do you guys have the update yet? If not, Microsoft will install it for you the next time you leave your pc for half an hour. Remember to save your work!

R: 33 / I: 0 / P: 19 [R] [G] [-]

High-end Linux ARM laptops are coming!

Thanks to System76

Video:

https://www.youtube.com/watch?v=Fopa1Uoh87w [Embed]

Article:

https://www.phoronix.com/scan.php?page=news_item&px=System76-Wants-High-End-ARM

ME/PSPfags BTFO!