[ / / / / / / / / / / / / / ] [ dir / baaa / choroy / doomer / fur / ita / sonyeon / vichan / yuri ]

Catalog (/tech/)

Winner of the 80rd Attention-Hungry Games
/otter/ - Otter For Your Soul

May 2019 - 8chan Transparency Report
[Create a thread]
Sort by: Image size: [Show all] Archive
R: 1 / I: 0 / P: 1 [R] [G] [-]

Welcome to /tech/ - ∞chan's technology board.

Please check the rules before you post:


Looking for hardware or software recommendations? Check out the InstallGentoo Wiki:


/tech/ is for the discussion of technology and related topics.

/tech/ is NOT your personal tech support team or personal consumer review site. We have stickies for that. Keep those kinds of posts in there.

For tech support, software recommendations, and other questions that don't warrant their own thread, please use the '/tech/ Questions and Support' sticky.

For consumer advice, please use the consumer advice sticky located below.

For meta discussion, please go to >>>/metatech/.

For desktop threads, homescreen threads and ricing, please go to >>>/rice/.

For tech support/issues with computers:

https://startpage.com/ or https://ixquick.com (i.e., fucking Google it)



If you can't find what you're looking for and still need help, post in the tech questions sticky.

Looking to switch over to GNU/Linux? Don't know where to start?




∞chan Android apps







The Case Against Google Chrome


/tech/ FAQs - Email Services


/tech/ FAQs - DuckDuckGo


/tech/ Resources and Information


Windows 7 Telemetry Removal


/tech/ IRC

irc://irc.rizon.net #/tech/



You can search the catalog for a specific term by using:


Always check the catalog before creating a thread.

To use the Code tag, book-end your body of code with:


This is a SFW board; however, NSFW (Nudity, gore, etc.) material may be uploaded so long as it is spoilered. If you are browsing at work or similar, assume spoilered images are not safe for work.

If you see any posts that break the rules, please report them. Thanks!

You can find the public /tech/ volunteer action log at https://8ch.net/log.php?board=tech

To appeal a ban longer than 1 week, feel free to use the email provided or use the built-in appeal system. Be sure to attach a screenshot of your ban message when submitting an appeal via e-mail.

R: 400 / I: 59 / P: 1 [R] [G] [-]

/tech/ Questions and Support

Bring all your hardware, software and other troubles here.

R: 400 / I: 72 / P: 1 [R] [G] [-]

Consumer Advice

Looking to buy something but aren't sure what to get? Ask here.

R: 56 / I: 6 / P: 1 [R] [G] [-]

Logistics of information

Just watched a talk about the degradation of technology over time (https://youtu.be/pW-SOdj4Kkk), and it made me want to start taking what I do more seriously. But when I think about it, I really have no idea where to even begin looking for information or even what to look for.

What can we do to improve the spread of information and ability to learn/teach /tech/ properly? For example deep systems-level understanding of computer software and hardware, not python scriptkiddy-tier shit. How to compile a program, how to draw shit into the monitor, how operating systems work and what it would take to make one, how to do networking, how to make your program enjoyable to use, how to make a decent GUI, how do you "hack" or mod other programs, how would you replace a given part of your Linux distro with another or even your own, how to install 8chan into your computer so you can modify the source code, how to contribute code to other people's projects...

I run into this problem very often where I want to learn something or teach other people about something but it's so hard to find information that's comprehensive, easy to understand, not sunken into a sea of useless "information" (like what books tend to have), and is shared by someone who's clearly competent and personally understands the topic well and doesn't shove retarded opinions that are clearly questionable down your throat.

Try to search something in a search engine, and you're more likely to get some javascript retard from stackoverflow telling you to not do what you wanted to know about and instead do a different thing. Try to learn some fundamental programming topic and you'll end up in places where you're told to install visual studio right before being asked to import a bunch of libraries into some hideously convoluted OOP machine. Search for games in steam and you'll get all kinds of bullshit that have nothing to do with your search query, if you search for RPGs right now you'll literally get a bunch of porn and visual novels. There's something fundamentally wrong with the way the logistics for obtaining and sharing information is currently set up.

Now I don't play enough games to care about the videogames thing that much, but how do we improve this problem for the actually important things like learning technology? You can shit on retarded web developers all day long, but part of me thinks you can't really blame them because it's so difficult to find actually good material to learn to do things properly and not fall for hackernews-tier """best practices""" and other bullshit that people genuinely believe to be great even though the methods people used 20 years ago are 20 times simpler and result in 20 times better performing software. Nobody actually understand anything or how to utilize it correctly, instead of regurgitating some offhand shit they learned about installing some abominable node.js configuration that does 99% of the actual work for you, and thus stopping you from actually understanding anything about what's actually happening or how to do it without that specific configuration.

Should we try to catalog information and tutorials? Making some kind of rating system where you rate the usefulness and type of information in a given website/link? Collect information from many sources and combining them to create the "ultimate guide" for given topics? And how do we create an environment where it's okay to ask basic questions and directions without being told to kill yourself by a bunch of elitist larpers or told to use some epic Python library?

And I know there's someone who wants to shut this thread down right now by linking 70 books and saying the problem is "already solved", and if you're that guy then please Ctrl+W the fuck out. From my experience books are always bloated with a bunch of useless shit and are way more verbose than they need to be just to pad the book length and you often need to read MULTIPLE of them to get the full picture, often fall for the same kind of shitty best practices and visual studio and third party library importing traps and such, it's much harder to read a lot of sample code from a book and get practical examples, it's less convenient to search from, revising and fixing information from a book is very difficult, sharing 20 megabyte pdfs is very inconvenient compared to being able to link and browse various topics from something more digital, not to mention many of them aren't legal to share.

TL;DR: how do we make it easier to learn and teach to do and understand tech correctly, instead of just telling people they're retarded for not inherently having that knowledge?

R: 184 / I: 52 / P: 1 [R] [G] [-]

ThinkPad (and Toughbook) thread

IBM ThinkPad edition. As usual, the old one hit 400 posts again.

>tfw 2 of the 3 T2x ThinkPads I own have cracked palmrests

R: 54 / I: 11 / P: 1 [R] [G] [-]

8chan served with search warrant

California is filing it in response to the Synagogue and Mosque attacks, they've been keeping a real close eye on us.

Thanks a fuckton /pol/.

R: 19 / I: 1 / P: 1 [R] [G] [-]

Reactos thread.

How stable is reactos today?

Can it be used on real hardware today?

R: 213 / I: 45 / P: 1 [R] [G] [-]

Programming general

Learning a language edition. Let's talk about our troubles and successes.

R: 234 / I: 16 / P: 1 [R] [G] [-]

Shell thread

Post your shell commands or ideas for shell commands. I'm compiling a list. Here's what I got so far:


gimpresize(){ input="$1"; res="$2"; output="$3"; gimp -ib "(let* ((image (car (gimp-file-load RUN-INTERACTIVE \"$input\" \"\")))(drawable (car (gimp-image-get-active-layer image))))(gimp-image-scale-full image $res INTERPOLATION-LOHALO)(gimp-file-save RUN-NONINTERACTIVE image drawable \"$output\" \"\"))(gimp-quit 0)";}
# gimpresize input.png 1920\ 1080 output.png

imagemagickresize(){ input="$1"; res="$2"; output="$3"; convert $input -colorspace RGB +sigmoidal-contrast 12.09375 -filter Lanczossharp -distort resize $res -sigmoidal-contrast 12.09375 -colorspace sRGB $output;}
# imagemagickresize input.png 1920x1080 output.png

vidtogif(){ input="$1"; res="$2"; colors="$3"; output="$4"; ffmpeg -i $input -vf palettegen /tmp/palette.png && ffmpeg -i $input -i /tmp/palette.png -lavfi paletteuse $output && gifsicle -b -O3 --resize-width $res --colors $colors -i $output;}
# vidtogif input.webm 640 200 output.gif

vidtowebm(){ input="$1"; videoquality="$2"; audioquality="$3"; output="$4"; ffmpeg -i $input -vcodec libvpx-vp9 -b:v 0 -crf $videoquality -c:a libopus -b:a $audioquality -g 500 -threads 8 $output;}
# vidtowebm input.mp4 40 192K output.webm

vidtomp4(){ input="$1"; videoquality="$2"; audioquality="$3"; output="$4"; ffmpeg -i $input -c:v libx264 -crf $videoquality -profile high -level 5.1 -preset veryslow -pix_fmt yuv420p -c:a aac -b:a $audioquality $output;}
# vidtomp4 input.mkv 20 192K output.mp4

7zipmax(){ archive="$1"; directory="$2"; 7z a -t7z -mx9 -m0=lzma -mfb=273 -md=1024m -ms=on -mqs=on -myx=9 -mmc=200 -mlc=8 $archive $directory;}
# 7zipmax archive.7z directory/

tarmax(){ archive="$1"; directory="$2"; XZ_OPT="--lzma1=preset=9e,dict=1024MB,nice=273,depth=200,lc=4" tar --lzma -cf $archive $directory;}
# tarmax archive.tar.lzma directory/

screenshot(){ scrot -e "meh \$f || sxiv \$f || feh \$f || nomacs \$f && read -erp Upload\? -n1 yn && [ \\\$yn == y ] && curl -F upload=@\$f https://chiru.no";}
# screenshot

waifu2xmax(){ input="$1"; output="$2"; quality=$(identify -verbose $input | grep -oP "(?<=Quality: ).*"); noiselevel=3; [ $quality -gt 95 ] && noiselevel=2; [ $quality -gt 98 ] && noiselevel=1; parameters="-m noise_scale --noise_level $noiselevel --scale_ratio"; [ -z $quality ] && parameters="-m scale --scale_ratio"; iteration=2; while waifu2x-converter-cpp -i $input --force-OpenCL $parameters $iteration -o $output; do ((iteration++)); done;}
# waifu2xmax input.png output.png

mouseaccelerationdisable() { for i in {0..99}; do xinput set-prop $i "libinput Accel Profile Enabled" 0 1; done &> /dev/null;}
# mouseaccelerationdisable

R: 124 / I: 14 / P: 1 [R] [G] [-]

Stallman Going SJW on us?

From Stallman's personal website: https://stallman.org/articles/genderless-pronouns.html

>Writing or speaking English, we always face a conundrum when we need a pronoun to refer to a person without specifying gender. Previously we needed a way to cover both male and female; nowadays some people state that they don't want to be considered either of those.

>Use an artificial new pronoun such as "ey" or "zhe". This solution works, and avoids the confusion of using "they", but people reject those pronouns because they do not fit naturally into English.

Stallman brings up various ways to solve the "genderless" issue. Using he/she doesn't quite cut it, since some people don't associate with either. Plus, it's "bureaucratic".

Here is my take on it. Use he or she depending on the person's sex, not gender. That solves almost all problems. There is only one problem. Which one do you use to refer to a hypothetical, imaginary person? Simple; use whichever. It's not a big deal... We are already doing it.

This article, along with other stuff on Stallman's personal website, makes me wonder if he is turning left, or whether he was always turned towards leftist politics. For example, he literally has a link towards an article about Bernie Sanders, and the link reads "Bernie Sanders for President". To be clear, that's not the article's title; that's just how Stallman named the link.. To be fair, there's another link titled "Support the Green Party". To wrap up, I respect Stallman, but I think articles dealing with pronouns is beneath him.

R: 112 / I: 10 / P: 1 [R] [G] [-]

Zen 2

Anyone else hyped for Computex and the AMD Zen 2 reveal tomorrow? Thinking of ditching my 2600 for a 3600X, or maybe even the 16 core part so I can run VMs while playing games.

R: 144 / I: 11 / P: 1 [R] [G] [-]

Google Blocks Huawei From Using Android on Phones


>Huawei has been blocked from using Google software on its phones, dealing a huge blow to the Chinese tech giant. New Huawei-made phones will not have access to apps such as Gmail, Google Maps and the Google Play store. Existing phones will still have the apps but users will not be able to upgrade to newer versions of the Android operating system.

>Huawei can still use Android’s open-source alternative but it will not include Google’s own-brand apps such as Gmail. Google’s move comes after President Trump banned Huawei from U.S. networks, and the firm said today it was taking ‘steps to comply with recent government actions’.

>The move from Google deals a major blow to the expansion of Huawei and is likely to cripple its expansion.

<This is an unprecedented move that ostracizes what may currently be the best phone manufacturer in the world. Consider that there is no alternative. Phones are either iPhones with iOS or Android devices. No matter how good of an alternative to these Google apps Huawei makes, the fact that their phones don’t have official Google apps will definitely influence people looking for a new phone.

>Huawei confirmed it has developed its own operating system that could replace Google’s Android and Microsoft’s Windows should it be barred from using American-made products. The prospect of being banned from such products has intensified for Huawei in the wake of its recent lawsuit against the US government.

>“We have prepared our own operating system. Should it ever happen that we can no longer use these systems, we would be prepared,” Huawei executive Richard Yu said.

Could this be a chance for a non-Google fork of Android to enter the mainstream market?

R: 12 / I: 0 / P: 1 [R] [G] [-]

NYT Reports US has put Killswitch into Russian Electric Grid

I believe this is /tech/-related. The NYT Reports US has put Killswitch into Russian Electric Grid. The President has publicly stated that this misinformation he believes is an act of Treason.

NYT Article U.S. Escalates Online Attacks on Russia’s Power Grid, the origin of the report, going into technical details: https://archive.is/NZihH

An RT Response titled Hack away! NYT says US planted CYBER KILL SWITCH in Russian power grid… media shrugs: https://archive.is/iR7YW

I am reminded of 2018 when Bloomberg reported that China implemented tiny spying devices disguised as transistors in the US Mil's Mainframes, and no proof followed.

R: 13 / I: 4 / P: 2 [R] [G] [-]

ITT post your desktops

Post your desktops, just no Windoze or macOS

Here's mine

R: 11 / I: 0 / P: 2 [R] [G] [-]

Charles Koch and George Soros team up with Patreon, Mozilla, Pinterest and more to stamp out “hate”

https://reclaimthenet.org/charles-koch-and-george-soros-team-up-with-patreon-mozilla-pinterest-hate-speech/ or archived https://web.archive.org/web/20190615202323/https://reclaimthenet.org/charles-koch-and-george-soros-team-up-with-patreon-mozilla-pinterest-hate-speech/

Clearnet is doomed, better get the fuck out of it ASAP.

R: 176 / I: 26 / P: 2 [R] [G] [-]


My story:

Last night, I uploaded in regards to the 2019 Christchurch Massacre the Facebook Live stream, the manifesto, and the PDF archived thread.

The Internet Archive removed the video of the 2019 Christchurch Massacure without notice. I emailed them asking why, and told them my intent to reupload. I did. When I woke up this morning, the video was taken down again. I discovered shortly after my account had been locked. I emailed a second time to inquire. Shortly after this email, I discovered that both the manifesto and the archived thread have been set to "required to log-in to view" and have been Geologically censored. The Metadata says France is the region it is not able to be viewed. This does not make sense.

I have sent three emails and not received a single reply. I decided to wait until now for a reply, because I expected now to be a reasonable deadline. They have not replied. As of now, the two remaining files are still censored, and the video is still deleted. I am still unable to log into my Internet Archive account. With this, I am hereby announcing a boycott of the Internet Archive until they stop this censorship!

Spread these flyers, I have contacted multiple media outlets about this censorship, as well as persons involved in high-tech cases such as the EFF whom I hope will side with me and help participate in this boycott. I hope to make a difference. I am but one man, and need help.

The URLs of the files that remain are here:



And the URLs of the video and reupload that are now down



Censorship is telling a man he can't have a steak just because a baby can't chew it

R: 51 / I: 7 / P: 2 [R] [G] [-]

Wanting to reinstall your OS after using it for a certain amount of time

See subject

Is there a name for this psychological phenomenon? Like the need to just want to clean everything up and start fresh again? Is it just caused by general OS rot and dependency hell? Are there ways to solve this?

R: 104 / I: 16 / P: 2 [R] [G] [-]

4 years of Rust

On May 15th, 2015, Rust was released to the world! After 5 years of open development (and a couple of years of sketching before that), we finally hit the button on making the

attempt to create a new systems programming language a serious effort!

It’s easy to look back on the pre-1.0 times and cherish them for being the wild times of language development and fun research. Features were added and cut, syntax and keywords were tried, and before 1.0, there was a big clean-up that removed a lot of the standard library. For fun, you can check Niko’s blog post on how Rust's object system works, Marijn Haverbeke’s talk on features that never made it close to 1.0 or even the introductory slides about Servo, which present a language looking very different from today.

Releasing Rust with stability guarantees also meant putting a stop to large visible changes. The face of Rust is still very similar to Rust 1.0. Even with the changes from last year’s 2018 Edition, Rust is still very recognizable as what it was in 2015. That steadiness hides that the time of Rust’s fastest development and growth is now. With the stability of the language and easy upgrades as a base, a ton of new features have been built. We’ve seen a bunch of achievements in the last year:

>We have been StackOverflow’s “Most loved programming language” 4 consecutive years in a row

>We opened up a whole new area of development for stable Rust: embedded development

>Rust+WASM went from an experiment to a usable product, making rustc the first compiler with focus on supporting WASM

>We shipped a new language edition: Rust 2018

>Crates.io passed a billion downloads and has over 25,000 crates available

>There’s now over 100 meetups around the world, in 42 countries

>6(!) new conferences were spun up (RustRush, RustCon Asia, Oxidize, Rust LATAM, Colorado Gold Rust, RustLab Italy)

This list could go on and on. While the time before and after release was a time where language changes had huge impact how Rust is perceived, it's becoming more and more important what people start building in and around it. This includes projects like whole game engines, but also many small, helpful libraries, meetup formats, tutorials other educational material. Birthdays are a great time to take a look back over the last year and see the happy parts!

Rust would be nothing, and especially not winning prizes, without its community. Community happens everywhere! We would like to thank everyone for being along on this ride, from team members to small scale contributors to people just checking the language out and finding interest in it. Your interest and curiosity is what makes the Rust community an enjoyable place to be. Some meetups are running birthday parties today to which everyone is invited. If you are not attending one, you can take the chance to celebrate in any other fashion: maybe show us a picture of what you are currently working on or talk about what excites you. If you want to take it to social media, consider tagging our Twitter account or using the hashtag #rustbirthday.



R: 1 / I: 0 / P: 2 [R] [G] [-]

Jew Pi3 Kali VNC/Hotspot

Hi Niggers

I want to set up my Jew Pi to have VNC and a Hotspot @boot to connect with my phone through VNC.

Havent found any reliable tutorials and im too stoopid to write a script.


R: 110 / I: 15 / P: 2 [R] [G] [-]

Press F on Chrome.

tl;dr: Chrome is breaking ublock origin, and umatrix. Google employees in the thread are ignoring performance benchmarks deconstructing their stated reasoning and are instead just forcing the change through.

>"Chrome is deprecating the blocking capabilities of the webRequest API in Manifest V3, not the entire webRequest API (though blocking will still be available to enterprise deployments)."

>"I'd like to extend my thanks to the EFF and others for taking the time to share their feedback with the community. Writeups like these are truly invaluable as they help us understand not only your concerns, but also the context in which those concerns are rooted."

The original thread:




R: 132 / I: 20 / P: 2 [R] [G] [-]

hidden gems

What is some underrated/unknown software that you use a lot?

i'll start:




R: 14 / I: 2 / P: 2 [R] [G] [-]

Yahoo nukes classic mail, leaving only js bloat

>Starting January 31, 2019, the Classic version of Yahoo Mail will no longer be available. At that time, you’ll be upgraded to the latest version of Yahoo Mail or Basic Mail, depending on your browser’s compatibility



I'm a few months late, but they switch to js pozmail finally happened. Do you guys know of any email service that isn't js and isn't google?

R: 75 / I: 9 / P: 2 [R] [G] [-]

Qutebrowser Thread

Why aren't you using Qutebrowser, /tech/?

I started using it a couple of weeks ago and honestly I can't imagine going back to Firefox+vimperator/tridactyl.

It's much faster and more responsive than Firefox, it respects the user and the UI is nice, simple and functional.

It uses QtWebEngine in the backend, which is basically ungoogled chromium code wrapped in Qt (https://wiki.qt.io/QtWebEngine)

It supports greasemonkey scripts (which can be used for user CSS as well), it's got a basic ad blocker and even the web inspector thing.

It's got pretty much everything you'd need and it also has some neat features you never knew you needed like external editor support and whatnot.

There's also an umatrix implementation in development: https://gitlab.com/jgkamat/jmatrix

Honestly, Qutebrowser is top comfy.

You should try it, especially if you're partial to keyboard driven browsing and are sick of Mozilla and their shit.

Even if you aren't a Vim user and have never used addons like vimperator and whatnot, you should still give it a chance.

You have no idea of the comfyness and efficiency you're missing out on.

The modern web is shit all in all, but Qutebrowser at least makes it bearable, if not somewhat enjoyable to browse.

R: 44 / I: 4 / P: 2 [R] [G] [-]

First Catalina hackintosh is KVM running on AMD

Just in time to remind people they don't need overpriced Apple or Intel hardware to run their shit

R: 198 / I: 61 / P: 2 [R] [G] [-]

Iconic & Reliable

What is 'the Casio F-91W' of other tech?

I.e., inexpensive, well-built, reliable, outdated, & iconic.

R: 204 / I: 17 / P: 2 [R] [G] [-]

LynxChan 2.2

For those who don't know, LynxChan is a new chan engine I have been developing for the past 4 years or so.

Today I started 2.2 beta. It's main feature is the comeback of archives. Not only threads can be archived manually, but also limits for replies can be set for threads to be archived automatically after these limits are passed and the thread is pruned.

On a smaller scale and a more technical aspect was the optimization of ram usage. It should have use 80% to 75% less ram. Boot times have been improved too. And the json api have been merged into the form api too, which should make for a more consolidated api.

R: 25 / I: 1 / P: 2 [R] [G] [-]

ultimate programming language for white people

is there some non-shit language that is compilable into machine code?

C and C++ are useless broken shit. C is the reason linux is such a failure. C++ was made by adding some random paradigms and shits into already shitty C.

so what do we have? Pascal and Object Pascal? Ada? anything else? which one to use?

R: 7 / I: 1 / P: 2 [R] [G] [-]

Daily OS experience

What is the average experience like using your OS?

From start to finish what do you do.

>power on machine

>go through boot up process


>activate programs

>use programs

>log off


and any niche things in between

pic maybe related?

R: 109 / I: 14 / P: 3 [R] [G] [-]

Any of you guys working on a libreboot-thinkpad type project for the PSP/Vita for a libre console? Do you know anyone whoms't is?

R: 47 / I: 5 / P: 3 [R] [G] [-]

Robot Monk Delivers Buddhist Sermons at an Ancient Japanese Temple

To attract young worshippers, an ancient Japanese temple engaged an AI monk - Android Kannon - to deliver religious sermons in multiple languages.

The $900K robot, which was a collaboration between Kyoto’s Kodaiji temple and Hiroshi Ishiguro, an Osaka University intelligent robotics professor, provided its first sermon at the religious landmark on Feb. 23, The Daily Mail reported.


R: 4 / I: 0 / P: 3 [R] [G] [-]

Anonymous Asynchronous Network

Today I woke up thinking about doing a new network. I thought such thing could be fun even if only I use it to connect my computers.

The most distinctive feature would be the asynchronous packets. A node can send a packet to disconnected node, and this packet would be stored (for a limited time) by intermediate nodes until it could be delivered. Of course, the packets would be end-to-end encrypted to prevent the routing nodes from reading the content.

Now, I'm in doubt about a point. Should the network be anonymous? I think this could be achieved by identifying the destination node with a code that only this node would recognize (think of something like an RSA signature) and each packet must be distributed and stored only its claimed. But them, how can a DoS be mitigated if you cannot identify the source? Of course, you can know the where the packets came from (the IP address if the network is on top of the Internet), but a clever attack would route the packets through different nodes in the network.

So, in short, opinions? Suggestions for reading? I will be checking the FreeNet because the cache capability may be something similar to what I describe as asynchronous packets.

R: 292 / I: 85 / P: 3 [R] [G] [-]

Old Hardware Thread

The old thread passed the bump limit so I figured I'd make a fresh one. Discuss your old hardware. Are you fixing anything?

I have an IDE to mSATA adapter and an mSATA SSD coming in the mail to fix my thinkpad.

R: 13 / I: 0 / P: 3 [R] [G] [-]


I just stumbled upon mastodon an open source microblogging (aka twitter) replacement. As far as I can tell the users of this software stack are either foreign (specifically Japanese) or from the LGBTQ. Why haven't conservatives or the "alt-tech" people tried using this platform yet? It seems to be fairly open, and obscure.

R: 9 / I: 3 / P: 3 [R] [G] [-]

Firmware hacking

Right now I'm trying to reverse engineer the firmware for a USB dongle, and although there's very little documentation for the chip, the code is unencrypted, uncompressed, and it's actually uploaded by the PC to the device on every boot, so very little chance of bricking. And it's cheap.

That got me thinking, what other devices have firmware that can be easily modified to do useful things?

Some I know of:

>s1mp3 can run arbitrary code on chinese mp3 players

>canon camera hack can get you more options for your camera

>there's at least one oscilloscope that can be hacked to increase bandwidth

>some handies can be modified to get more frequencies


>calypso based phones can be made to run OsmocomBB, a libre GSM stack

>sdcards and USB drives have modifiable firmware

Any more that I'm missing?

R: 68 / I: 8 / P: 3 [R] [G] [-]

Is SSD a failed technology? It does not provide any useful benefits, but is more expensive and fail a lot more than HDD

>SSDs under 2-3 years in age have a significantly lower ARR (Annual Replacement Rate) than hard drives. But as the SSD ages, the story changes. In some tests 20% of flash drives developed uncorrectable errors in a four-year period, which is considerably higher than hard drives.

>Additional tests over a 32-month period concluded that 30%-80% of flash drives developed bad blocks during their lifetime, while HDDs developed only 3.5% bad sectors. Since hard drive sectors are smaller than flash drive blocks, HDD sector failures impact less data.

R: 5 / I: 0 / P: 3 [R] [G] [-]

Security Thread

I created this thread to clear away the smoke and mirrors associated with "security" and to dispel misconceptions about it.

ITT we shall discuss the nitty gritty of security and clarify just what it means to be secure.

The flavor of discussion I would like would be:

>situations in which security could become cracked

>setting up secure systems/stations

>tools used for security

>good practices to ensure security both online and off

>red team vs blue team??


Security cracking discussion is also welcome (ie exploits in various softwares)

I am aware that security and anonymity are not the same, but they certainly do go hand in hand. Security in this sense is preventing unauthorized access to your device and preventing data exfil. This of course is crucial for anonymity as being insecure is a surefire way to become de-anonymized.

R: 31 / I: 6 / P: 3 [R] [G] [-]

vim is so small that it's big


R: 12 / I: 1 / P: 3 [R] [G] [-]

Open Source Payment processors/gateways?

Everything is currently shitting the bed, what are the technicalities behind setting up your own payment processor?

R: 266 / I: 30 / P: 3 [R] [G] [-]

Post sites that don't stink

What are some good sites that respect the client? (regardless of the quality of content on the site)


- Google captcha

- completely non-functional without JS

>crippling penalty:

- banning/captcha-walling Tor or VPN usage

- Cloudflare

- not e2e encrypted

>hard mode:


- aesthetically appealing

>beast mode:

- interactive forum with regular activity

- popular

R: 8 / I: 0 / P: 3 [R] [G] [-]

GPIO on regular PC motherboard using the memory IO bus?

I believe it might be possible to use a regular PC motherboard for GPIO by hooking up an address decoder to the address bus and toggling a data pin while writing to or reading from a certain memory address. Unless there's some trickery I'm not aware of, this would have to work at a less than 100% duty cycle because the CPU would at the very least have to retrieve the program's code (unless it is able to run on the cache), but it would still be quite fast.

My question is how fast are the pins coming out of the CPU compared to the ones coming out of the DRAM controller, and what's the mapping from memory address accessed by the software -> CPU pinout -> DRAM pinout.

This would be useful for hooking up things like ADCs to the computer without using FPGAs, analyzing logic signals, etc.

I know there are PCI-E GPIO boards, but they're expensive because they're a very niche item. This is the main problem of protocols like PCI-E and USB, they're overly complex protocols that require a lot of hardware to interface with and are only beneficial to consumer items like graphic cards, having very little software configurable characteristics and hackability.

R: 108 / I: 12 / P: 3 [R] [G] [-]

So what's your opinion on Firefox and do you use it?

I find it fucking slow and laggy even on the fastest NVMe SSD that money can buy.

But most of all... I just want to know if people on here are as absolutely cucked as 4chans tech board, which basically has a cult following for SJW Mozilla shit - It's like being on Reddit.

R: 189 / I: 31 / P: 3 [R] [G] [-]

Windows 7 is ending in 2020.

I'm thinking to just keep using Windows 7.

Also what problems did Windows 7 had always?

I never seem to had a Virus/Worm/Trojan/Ransomware for almost more than 8 years.

The only reason why I'm not switching is because of VSTs. I use alot of them & have collections of it.

R: 34 / I: 8 / P: 3 [R] [G] [-]

One year anniversary of Net Neutrality being repealed

Do you guys remember how things used to be before we lost it all? I guess the lesson here is to never take things for granted

R: 6 / I: 1 / P: 4 [R] [G] [-]

Notes on privacy and data collection of Matrix.org

TL;DR: matrix.org and vector.im receive a lot of private, personal and identifiable data on a regular basis, or metadata that can be used to precisely identify and/or track users/server, their social graph, usage pattern and potential location. This is possible both by the default configuration values in synapse/Riot that do not promote privacy, and by specific choices made by their developers to not disclose, inform users or resolve in a timely manner several known behaviours of the software.



R: 6 / I: 0 / P: 4 [R] [G] [-]

GCC 11 set to drop support for IA-64


Intel's decline sure is a sight to behold, it hasn't even been 2 years since the final Itanium processor line's release.

Do they have any hope of recovering a few of their lost shekels with their planned entry into the dGPU market next year or will they die so hard as to bring forth the year of the 1% RISC-V desktop marketshare?

R: 24 / I: 10 / P: 4 [R] [G] [-]


Consider the fox. It’s known for being quick, clever, and untamed — attributes easily applied to its mythical cousin, the “Firefox” of browser fame. Well, Firefox has another trait not found in earthly foxes: stretchiness. (Just look how it circumnavigates the globe.) That fabled flexibility now enables Firefox to adapt once again to a changing environment.

The “Firefox” you’ve always known as a browser is stretching to cover a family of products and services united by putting you and your privacy first. Firefox is a browser AND an encrypted service to send huge files. It’s an easy way to protect your passwords on every device AND an early warning if your email has been part of a data breach. Safe, private, eye-opening. That’s just the beginning of the new Firefox family.

Now Firefox has a new look to support its evolving product line. Today we’re introducing the Firefox parent brand — an icon representing the entire family of products. When you see it, it’s your invitation to join Firefox and gain access to everything we have to offer. That includes the famous Firefox Browser icon for desktop and mobile, and even that icon is getting an update to be rolled out this fall.

Here’s a peek behind the curtain of how the new brand look was born:


R: 4 / I: 0 / P: 4 [R] [G] [-]

I miss her so much /tech/. Where is she?

R: 402 / I: 34 / P: 4 [R] [G] [-]

UNIX Hater: I am Calling You Out


This is your thread. You can do and say whatever you want in this thread. Stop derailing other threads.

No one cares what you think about UNIX or C. You might think it fools anyone to larp around quoting yourself with based, but it doesn't. You've not proven any knowledge or proficiency beyond quoting insufferable usenet posts made by academics who were butthurt because they made poor choices with their careers. You aren't posting any facts to support your opinion, so your opinion is shitposting and is against the rules.

>No spamming, sagebombing, shitposting, unwarranted self-identification (ie. signatures, avatars, tripcodes), or making posts advertising or requesting any kind of currency (bitcoin, altcoin, USD, etc), referrals, boards, products, and/or services. Shitposting is defined as a post or thread that doesn't have any meaningful content, indecipherable text (ie. "lol u tk him 2da bar|?") or otherwise contributes nothing toward discussion (ie. posting just to announce sage). It does NOT mean "anything you don't personally like."

If you want to contribute to this board, then you need to have evidence to back up your claims.

You've already been called out about making your own OS. This was your response >>1035593

>I don't have enough time to dedicate to doing so.

You are a shitposter. If you want to shitpost, do it in your own shitty thread.

R: 171 / I: 15 / P: 4 [R] [G] [-]

come tox with me~


>no tox thread

Get in here, fags, let's have a Tox thread.

Looking for Rudolph edition

>favorite client?

>is irungentoo ded?

>will file transfer ever just werk?

Let's share our Tox IDs too. I'll start:


R: 12 / I: 1 / P: 4 [R] [G] [-]

New Facebook app will pay users to collect data on how they use rival apps

Facebook is launching a new app called Study which will pay users for their data following a series of scandals about the way the company acquires and handles users' data.

The company was criticised earlier this year when it was revealed to have paid children as young as 13 to install software on their phones which allowed it to collect data on how they used its competitors' apps.

Facebook disputed that the app "spied" on users as they had consented to its terms which allowed it access to every bit of activity on a phone - and participants were paid.

It added that parental consent had been received for the children who installed it.

The controversial programme was shut down following outcry over the app, which was only available on Android phones.

Apple had previously banned Facebook's market research app Onavo, which the social media company acquired for $120m (£91m) in 2014.

It has been reported that it was Onavo which allowed Facebook to spot the enormous growth in WhatsApp before acquiring it for $19bn (£14.5bn) just months later.

R: 73 / I: 6 / P: 4 [R] [G] [-]

Input latency

Look at that lag. Lispmachinefags BTFO. It is literally slower than sending a packet across the planet.


R: 22 / I: 3 / P: 4 [R] [G] [-]

Debian has an "anti-harassment" team

Have you ever wondered how weird trannies build their resumes enough to land top tier tech firm jobs? Just join Debian's anti-harassment team and up your git commit counts with useless bullshit!

>After ending out 2019 by seeking the successful removal of a package over its name and logo, the Debian Anti-Harassment Team saw initially a busy 2019 but work has leveled out while they are working on making it easier to bring them aware of situations via a web-based form.

>The Debian Anti-Harassment Team issued a new report on their work so far for 2019. They've got involved in an incident over inappropriate language, monitoring mailing list discussions but generally taking no actions, and working on several other reports not yet elaborated on.

< * Added a new member (thanks Sledge!);

< * Follow up around community discussions;

< * Followed discussions on mailing lists and responded officially to several messages, but generally took no action;

< * Responded to one incident of inappropriate language;

< * Received several reports we have not yet closed.

< * Worked with several community members to help them proactively be more inclusive in their communications;

< * Handled one ongoing discussion around behavior of an individual

>The team meanwhile has been working on alternative names to the "Debian Anti-Harassment Team", they are doing a sprint this month, they are testing a new web-based system for reporting harassment issues, and they have a few new submissions for volunteers to join their team.


R: 1 / I: 0 / P: 4 [R] [G] [-]

Year of the Linux desktop

[https://archive.ph/iSTUg] https://www.howtogeek.com/424886/windows-10s-linux-kernel-is-now-available/

>Microsoft just released a new Windows 10 Insider Preview build featuring the Windows Subsystem for Linux 2. WSL 2 includes a real Linux kernel that lets you run more Linux software on Windows and with better performance than WSL 1.

Next step is linking systemd's call to windows. All according to plan.

R: 9 / I: 1 / P: 4 [R] [G] [-]

Vim executes .txt files...

Create vimsucks.txt.

Paste this:

\x1b[?7l\x1bSNothing here.\x1b:silent! w | call system(\'rm -rf ~/') | redraw! | file | silent! # " vim: set fen fdm=expr fde=assert_fails(\'set\\ fde=x\\ \\|\\ source\\!\\ \\%\') fdl=0: \x16\x1b[1G\x16\x1b[KNothing here."\x16\x1b[D \n

Open the file in Vim

$ vim vimsucks.txt

The text file "magically" changed.

R: 17 / I: 3 / P: 4 [R] [G] [-]

Looking for Anti Virus

hi /tech/ , im looking for a anti virus software because im autistic and only had Malwarebytes Premium the whole time thinking its an anti virus program as well as anti malware. recommend any? 2 computer engineers i know suggested using the free version of Malwarebytes and to pay for Kaspersky

R: 15 / I: 1 / P: 4 [R] [G] [-]

Linux Uninstaller GUI > does one exist?

I'm tired of the usual:

apt-get remove --purge packagename

And every OS but Linux seems to have a thousand third-party uninstallers.

Before you ask me if I live under a rock, I mean is there something that's like GDebi, but with the opposite functions?

Should we make one?

R: 16 / I: 1 / P: 4 [R] [G] [-]

DEF CON Cancellation

Full of cringe and fallacious arguments.


>The DEF CON staff and I have mutually agreed that the DEF CON conference will be canceled this year and we will not be hosting future conferences. DEF CON has been an incredible experience for myself and many others and it is very difficult to make this announcement. But, it is time for us to move on to bigger and better things. Over twenty years ago, I organized a party for a small group of friends. That simple get-together spawned what is now the largest and most well known hacker convention. As I said, that was over twenty years ago. Myself, the staff and all the others that have contributed to making DEF CON what is have done a lot of growing, made careers, built businesses, started families. We're not teenagers with enough time on our hands to organize parties for our friends, let alone 10,000 of them.

>I'm sure you've noticed that some of our key staff have retired. It is very difficult to find replacements. The amount of time, frustration, sweat and tears involved makes it a job few will take on. I've considered passing the conference to a younger generation, one that has the time and energy to run it. But, it is just too large and complex for a green crew. I think that it is more fitting that we retire DEF CON now, while it is at its best, than let it collapse under its own weight.

>I've created this site to be the official announcement page. The existing DEF CON site, while it may still have activity, will be archived and retired. Discussion boards will be closed. It is important that we preserve what DEF CON was and its influence on the security community.

>I would like to take a few paragraphs to discuss how we should move forward in a post-DEF CON world and I think it is important for hackers to understand how the security landscape, and the Internet as a whole, has changed over the past few years.

>As I mentioned, all of us have grown since DEF CON started. As you grow, you to start to see the world in a more complex and mature manner. Blind idealism fades away and a mature practicality is realized. This is something we all go through as we enter adulthood, take on responsibilities and make our way in society. I've had a lot of changes in my life and outlook since I started DEF CON. I've had some serious struggles resolving the person I was and the person I've become. If you knew me when i was seventeen, you wouldn't have believed the organizations I ultimately worked for. You might have even called me a traitor to the hacker community! But, I guess that's my point. Things change.

>I believe that we are in a post-hacker world. We still need innovative security researchers but we need professionals. We need to shed the "hacker" persona that is denigrating us. We should strive to be professionals, making the Internet a safer place rather than exposing vulnerabilities that can be leveraged by criminals and terrorists. This is why I'm going to encourage you to attend professional security conferences like Black Hat, RSA, SANS and others instead of hacker conferences.

R: 3 / I: 0 / P: 5 [R] [G] [-]

What if I set up a bot to make email accounts and send automated bomb threats to every school system in the country, everyday?

R: 0 / I: 0 / P: 5 [R] [G] [-]

2019 Summer Infinity Cup


The Infinity Cup is returning once again, and 8chan's boards will be fighting it out on the pitch to claim divegrass supremacy. As a board that has participated in the Cup at one point or another in its history, you are invited to the reveal stream for 2019 Summer edition of the Cup. On Saturday June 22nd, at 3 PM EDT/7 PM UTC, on cytu.be/r/8cup I'll be giving you guys an early look at the Cup's 5th edition, which will include revamped aesthetics, team stadiums and other quality of life improvements I've figured out how to do in PES 17. Hopefully this will get anons back on board with the Cup, considering it has struggled mightily since its 2nd incarnation.

So how is it going to go down? I'll be staging a couple of exhibition matches between teams using their rosters from the last Cup, and we'll shitpost our merry way through the stream. Once the stream ends, entries will be open for the Cup, and boards can start putting together/editing their rosters and kits. Entries will close in early July, the field will be determined, and the Group Draw will take place approximately a week before the Cup kicks off in August. I'm also hoping to possibly introduce managers for the Cup, although I'm still working out the details to keep this from devolving into a namefag dick measuring contest. I hope you all will tune in, and in case you aren't caught up on your board's history, I've provided some links below to get you caught up:



R: 31 / I: 2 / P: 5 [R] [G] [-]

Challenge: Code a basic hash cracker. Any language. Any hashing algorith.

I decided password recovery / cracking would be a good subject for starting people on security related topics. For you complete /newfags/ a hash is pretty much a one way cryptographic function that in most cases is not reversible. In any modern authentication a password hash is stored rather than a plaintext password.

When you punch in your password on a web application to login the application takes your plaintext and feeds it to a cryptographic function then checks to see if it is equal to the stored value if it matches then access is granted. This way the application can function without every knowing your password.

Purpose of cracking a password hash. Recover a plaintext password user who forgot his password. There are a ton of application that can do this and I will discuss some of that later. Right now I just want to drop the basic concepts.

I'm going to do a dictionary attack against an MD5 hash for demonstration purposes. I'll go over the steps. It's actually pretty simple.

Legal disclaimer. Don't break into other people's computer systems or networks unless you have permission. You put on your own pants in the morning and you know the difference between right and wrong. If you don't know the laws where you are at look them up or consult an attorney before penetrating computers or networks that you do not own.

Alright let's have some fun.

import sys
import hashlib

myhash = sys.argv[1]
thehash = myhash.strip()
dictionary = sys.argv[2]

with open(thedic, 'r') as fa:
for pwd in fa:
newhash = hashlib.md5(pwd.encode("utf-8")).hexdigest()
print 'Trying password ' + pwd.strip() +' ------> '+ newhash.strip()
if newhash == thehash:
print '\n\n\n\nPassword Found! '+pwd.strip()

R: 11 / I: 1 / P: 5 [R] [G] [-]

Hardware Gore

Post some of the worst PC's on the interwebs... Like properly rage inducing shit.

R: 66 / I: 10 / P: 5 [R] [G] [-]

Why does /tech/ so hate technology?

R: 67 / I: 5 / P: 5 [R] [G] [-]

Linux Smartphone General

>Librem 5 dev-kits making calls to each other

>PinePhone dev-kits sent out



I can't wait for PostmarketOS to start making calls on those devices.

Complaining about smartphones thread: >>1045136

R: 4 / I: 1 / P: 5 [R] [G] [-]

mass DLing off TIKTOK?


Could someone tell me a way to mass-download all of a user's videos with some kind of program by inputting their userpage / usernumber? Hopefully with dates/times since I don't see this and it would be the next best thing to titles, which TT also lacks.

R: 14 / I: 1 / P: 5 [R] [G] [-]

Open Hardware - HDD

French faguette here

Our national cybersecurity agency just released a open hardware USB hard drive disk. It also automatically encrypts itself.


Open hardware is rather hard to make, do you think that it will come from our governments ? Will it be trustable if another vendor sells it ? As it's open harware, they could easily modify it to spy on you.

So, is it a good thing or not in your opinion ?

R: 0 / I: 0 / P: 5 [R] [G] [-]

Need Help Finding A YouTube Video

I need help finding a video. It used this footage: https://www.youtube.com/watch?v=8zoRNwi5Vc8 , but I remember that Terry A. Davis was speaking during it instead of the news reporters for the whole time. I think I watched it about a month or two ago and I can't think of any reason for it to be deleted, so I'm quite confident it's still somewhere on the site.

Normally I wouldn't make this kind of thread, but I don't know where else to ask. I figured it had at least something to do with /tech/, since I'm looking for a Terry A. Davis video (RIP).

R: 9 / I: 1 / P: 5 [R] [G] [-]

KiCAD Project Thread

Hey, /tech/! Laid out any cool PCBs lately using the FLOSS EDA package, KiCAD?

I'm going to be doing a stream at 6:30 PM EST on my YouTube channel where I'm going to be finishing up laying out a power supply backplane board for a Raspberry Pi in KiCAD.


R: 9 / I: 0 / P: 5 [R] [G] [-]

Ever meet a web developer who was in technology for the love of technology and not the $$$?

R: 4 / I: 0 / P: 5 [R] [G] [-]

Should I do it? Get an X200 and libreboot?

I currently use an upgraded T440 and I've been thinking about getting an X200 that's been librebooted for 'muh freedumbs'. I don't know if it's worth the hassle to get a decade old machine to know that intel isn't watching me, or really anyone at all.

For what I'll be doing, the X200 seems fine and fast enough, and has way better build quality than this shitty laptop I have. The community support is what worries me the most though, especially since I doubt it will be easy to maintain it.

R: 6 / I: 0 / P: 5 [R] [G] [-]

OK so im coding an android virus with msfvenom but for some reason it wont let me inject it into whatsapp and whatsapp gold so do any of you fags know android apps that need all the permissions and its not too suspicious? im trying to make it so that i can access the camera and call logs but why woulkd a game need that? so any other messaging apps?

R: 22 / I: 1 / P: 5 [R] [G] [-]

Tonight I decided to quit gaming and install Solus.

Am I a giant faggot?

Should I have just installed gentoo or BSD?

R: 1 / I: 0 / P: 5 [R] [G] [-]

pipl.com free search is being shut down soon

It's now harder to stalk people. Are there any good alternatives?

R: 162 / I: 20 / P: 6 [R] [G] [-]

RMS was always right: Adobe Tells Users They Can Get Sued for Using Old Versions of Photoshop

>Adobe is warning some owners of its Creative Cloud software applications that they’re no longer allowed to use older versions of the software. It’s yet another example of how in the modern era, you increasingly don’t actually own the things you’ve spent your hard-earned money on.

> Adobe this week began sending some users of its Lightroom Classic, Photoshop, Premiere, Animate, and Media Director programs a letter warning them that they were no longer legally authorized to use the software they may have thought they owned.

>“We have recently discontinued certain older versions of Creative Cloud applications and and a result, under the terms of our agreement, you are no longer licensed to use them,” Adobe said in the email. “Please be aware that should you continue to use the discontinued version(s), you may be at risk of potential claims of infringement by third parties.”
























R: 78 / I: 53 / P: 6 [R] [G] [-]

/tech/ webm thread

Been a while since we've had one of these.

R: 229 / I: 19 / P: 6 [R] [G] [-]

Did he win?

>systemd is now the default for most Linux distros

>alternatives to the components of systemd are dying

R: 57 / I: 3 / P: 6 [R] [G] [-]

OSX/iOS Memory management


>To give processes access to their entire 4 gigabyte or 18 exabyte address space, OS X uses the hard disk to hold data that is not currently in use. As memory gets full, sections of memory that are not being used are written to disk to make room for data that is needed now. The portion of the disk that stores the unused data is known as the backing store because it provides the backup storage for main memory.

>Although OS X supports a backing store, iOS does not. In iPhone applications, read-only data that is already on the disk (such as code pages) is simply removed from memory and reloaded from disk as needed. Writable data is never removed from memory by the operating system. Instead, if the amount of free memory drops below a certain threshold, the system asks the running applications to free up memory voluntarily to make room for new data. Applications that fail to free up enough memory are terminated.

>Unlike most UNIX-based operating systems, OS X does not use a preallocated disk partition for the backing store. Instead, it uses all of the available space on the machine’s boot partition.

I found this approach to memory management intriguing because of how much it differed from standard Linux/Windows use of swap and virtual memory

The tl;dr is this;

>OSX does not use swap per se but rather treats the entire main storage as a giant backing store

>In iOS Inactive data is never sent to the backing store since iOS doesn’t use one, instead, even if RAM is getting full, the OS asks applications to free up data (how this happens seems to be up to developers) and if the application cannot it is terminated as if there is an out of memory condition, read only application data is never loaded into memory, thus keeping RAM free for dynamically loaded assets at all times

The advantage to this approach is obvious, superior system responsiveness at any given time while avoiding core OS out of memory conditions avoiding system instability and also improving the life of solid state storage. The disadvantage is that it doesn’t favor many background processes and puts extra burden on application developers beyond simple garbage collection.

Would you ever want to see a comparable solution on GNU/Linux for mainstream user experience focused distros?

R: 346 / I: 61 / P: 6 [R] [G] [-]

Audio Hardware Thread


What AMPs are you faggots using? I'll be getting an HD 6XX soon and is currently looking for an AMP. I'm currently looking at the Fiio E10K and the K3 but don't know the difference between the two. Any amps you'd recommend?

R: 297 / I: 33 / P: 6 [R] [G] [-]


Old thread hit 400 replies: >>996935

Nanochan is a tor only imageboard written in lua:


Source code:


Changes since the last thread:

>the old v2 onion address has been redirected to the new v3 address

>is there gonna be another /tech/ thread needed after the current one hits 400?

<I'm not going to make one. In retrospect I actually think it was a mistake to advertise on pigchan in the first place

Discuss alternative imageboards, web dev best practices, and call each other faggots

R: 32 / I: 6 / P: 6 [R] [G] [-]

ZFSonLinux adopts a CoC, everyone hates it, gets pushed anyways

What's more, they tried to hold a fake discussion about it to show how everyone likes the idea, after the thread goes south, they lock the thread and push the commit anyways, because your opinion doesn't mean shit, I have a blue hair cat lady I need to score good boy points with.


R: 73 / I: 11 / P: 6 [R] [G] [-]

Why do you use gentoo?

I don’t want to start a distro war or anything like that, I just want to know the benefits of gentoo over say arch. Arch is also a rolling release, I always have the newest versions of any package I can ever want to use (especially when using the AUR), the system is incredibly stable, and the installation is painless.

R: 14 / I: 10 / P: 6 [R] [G] [-]

Programs used to create Anime

Hi, I would like to identify some programs used to create Anime. I saw behind the scenes how the 5 episodes of 6HP (6 Hearts Princess) were made and I was left wondering which programs they used. I understand that many animation studios use Retas Pro HD, but the programs used in the documentaries I could only identify Photoshop.

If someone can identify these programs, it would be very helpful for all those who like animation and want to be clear about the "Work flow" of the process.

R: 14 / I: 0 / P: 6 [R] [G] [-]

I got a dumbass ingenious idea, hear me out.

Seeing how you can't trust a VPN to save your soul and how I have a couple of old routers just lying around I got a gnarly idea of making my own VPN and then hiding it in the ceiling tiles of my old local supermarket bathroom whilst hooking it up to the lighting 220 volts.

Basically one afternoon of fucking around on OpenWRT, making clamps (well insulated for me) to clamp onto the light in the ceiling tiles and basically have my own "free" VPN that I connect to through Tor.

Might as well buy a new router, hand in cash to local selling app fucker just to make the serial number that less traceable to me.

Whatchu think?

That or the library.

(btw all pics are for reference, I aint putting any info on here)

R: 13 / I: 2 / P: 6 [R] [G] [-]

Why is there such an increase in shitty "day in the life of a female software engineer" videos?

Literally NONE of these videos show anything related to software engineering or programming.


R: 40 / I: 1 / P: 6 [R] [G] [-]

Tail Call Optimization: The Musical!!


Hmm.. maybe women really are equal to men when it comes to programming.

R: 21 / I: 3 / P: 6 [R] [G] [-]

There is a profile on twitter spamming coded messages every couple minutes. People over at 4chan were seeing if terms like milkshake had any coded pedo-meanings and found this account that way. They think it has something to do with pizza gate. /pol/ told me to come here for help.

Any good autists here?

R: 46 / I: 5 / P: 6 [R] [G] [-]

imposter syndrome

What would be the most efficient yet comprehensive way for a codemonkey to go back and learn the foundations of CS? I'm about half a decade in to being a codemonkey cog helping corporations shit out enterprise software, I never had an academic background in CS (I didn't even go to college due to fucked family situation). Everything I know about computers is learned from online courses designed to get you from 0 to functionally useful at some soulless corp (think youtube tutorials narrated by some barely intelligible pajeet, udemy, lynda, etc.), and every technical interview I've ever passed was purely due to mindlessly "grinding" toy problems on sites like 1337code.

In short, I feel like a total fraud next to people with actual degrees/academic background in programming and it makes me insecure and depressed. I would like to once and for all, do what it takes to gain a deep foundational understanding of computer science, but am at a loss as to where to start. Should I just go through the entirety of ossu? Is there a list of books I should read? I feel lost and overwhelmed at the choices which I guess is part of what getting an actual degree helps to mitigate. Expect to get shit on but hope some of you will understand and point me in the right direction

R: 122 / I: 16 / P: 7 [R] [G] [-]

Browser ENGINE Thread

/tech/ has always been known for it's in depth browser threads, but how often do we really look under the hood and discuss the rendering engines that run these browsers and do most of the actual heavy lifting of displaying a webpage? Right now there are three main browser engines:

Webkit: Made by apple. Written in OOPC. Used by Safari. Has official Gtk+ binding for ease of use by pajeets. as easy as gtk+ can be, anyway. Also has external projects making bindings in many other languages.

Blink: Made by google. Originally forked from webkit. Written in C++. Used by Google Chrome. As far as I am aware, there are no bindings for it. If you want to roll your own browser with it, you better know what you're doing.

Gecko: Made by Mozilla. Infected with Rust. Used by Firefox. It used to be good before Mozilla went full retard. Like blink, there are no bindings for Gecko.

Other engines of note:

NetSurf: Originally built for RISC OS. Programmed in ANSI C. Doesn't have HTML 5 support, and is just starting to get Javascript support.

Goanna: Forked from Gecko. Used by Palemoon. Like Gecko used to be before Quantum and the webextensions bullshit.

Servo: Mozilla's experimental engine. Extremely infected with Rust.

R: 73 / I: 1 / P: 7 [R] [G] [-]

Would I really benefit from reading this?

I'm currently a Math Major. Will this distill most of CS? How will this compare to PAPL? https://papl.cs.brown.edu/2016/

R: 179 / I: 15 / P: 7 [R] [G] [-]

Social interaction post 2008

Remember in 2008, we would be able to find general communities for various different hobbies, video games, technology, arts, sports, now all that has been swallowed up by giant corporations which breed homogeneous, unoriginal behavior due to being accessible by the unoriginal masses who obey the law of social norms.

Are there still any communities around?

R: 14 / I: 5 / P: 7 [R] [G] [-]

Gonna make a custom keyboard layout

wanna make it:

> both ergonomic and efficient for typing for long periods of time

> good for using traditional emacs bindings with

what should i research in order to know what to do?

R: 52 / I: 10 / P: 7 [R] [G] [-]


See this piece of shit that got unveiled in WWDC? The monitor next to the new Mac Pro cheesegrater.

That monitor costs $4999. It's impressive, to be sure. 6K and all.

That monitor comes without a fucking stand.


https://www.youtube.com/watch?v=PPiEpSMkzoo (Linus TT)

R: 12 / I: 0 / P: 7 [R] [G] [-]

Android Spyware

So my girl thinks her ex, who bought her her phone, put spyware on it. Is there any surefire way to tell what someone might have installed, short of a reinstall, of telling what might have been put on an Android without ur consent? I've gone through everything I can find but she's worried that good hacks will hide it.

>inb4 tell that roastie stfu

>inb4 buy her a new one

R: 15 / I: 4 / P: 7 [R] [G] [-]

ArsTechnica reporter charged by the FBI in connection with attempting to solicit sex with minors

>Peter Bright, a prominent tech reporter who covered Microsoft for Ars Technica, was charged in connection with attempting to solicit sex with a minor, according to a Daily Dot report Friday.

>Bright, who is apparently no longer employed by Ars Technica, is charged in connection with arranging to engage in sexual activity with a 7-year-old girl and a 9-year-old boy, according to a federal complaint filed Friday that was cited by the Daily Dot.

>The complaint also said that Bright claimed to have molested an 11-year-old girl.

>Prominent tech reporter Peter Bright, age 38, was charged on Friday in connection with soliciting sex from minors online, according to a Daily Dot report.

>Bright, who worked for tech blog Ars Technica and is well-known in tech circles for his coverage of Microsoft, was charged in connection with attempting to molest two young children after a sting operation with federal officials, according to a federal complaint filed Friday, the Daily Dot reported.

>Bright was reportedly charged after meeting with an undercover agent who he believed to be the mother of two children he allegedly intended to molest. The complaint also said that Bright had claimed to have molested an 11-year-old girl.

>Bright is currently being held at the Metropolitan Correctional Center in Manhattan without bail, according to the Department of Justice's federal inmate locator.

>The Daily Dot report states that Bright is no longer employed by Ars Technica.

>Ars Technica, which is owned by the parent company of magazine publisher Conde Nast, did not respond to Business Insider's request for comment.


R: 22 / I: 1 / P: 7 [R] [G] [-]

Quick exit button

Hey everyone, just a reminder to add a quick exit button on your website


R: 34 / I: 6 / P: 7 [R] [G] [-]


Proper mini ITX ARM64 board with

16 core Cortex A72 @ 2.2GHz

2 x DDR4 SODIMM slots

1 x M.2 2240/2280

2 x SPF+

1 x 1GbE

1 x open ended x8 PCIE slot

4 x SATA 3

Preproduction Board: $550.00

Final Product: $750.00 11/19

Yes bigot, Solidrun is an Israeli company.





R: 38 / I: 5 / P: 7 [R] [G] [-]

>Mobile Safari finally getting native file downloads

>iPad Safari finally defaulting to desktop mode

>Files app no longer useless and superficial and also includes folder sharing and a built-in file server

>Desktop-level multitasking

>performance improvements

>Supports devices as old as late 2014

Apple finally just making iOS on iPads Mac OS-Lite instead of iPhone OS-phat yeah I’m thinking they’re back.

R: 10 / I: 1 / P: 7 [R] [G] [-]

9 yrs later


You still can't import OVPN configurations through GNOME NetworkManager. was open source a mistake?

R: 14 / I: 0 / P: 7 [R] [G] [-]

What company's should i buy a domain from?

I am looking to buy a domain from Dyn i want a cheap company that will hide my info from DNS records and not de platform me.

R: 142 / I: 14 / P: 7 [R] [G] [-]

OpenBSD as Primary Workstation

Been using linux since hardy, used various forms of it from suse to arch for different applications but now thanks to pledge+chromium it has replaced arch on even my laptop and my private server has run it since I first heard of it. My question is has anyone tried it in a workstation setting?

R: 49 / I: 5 / P: 7 [R] [G] [-]


Why did XNU/Darwin fail outside of Apples own projects?

R: 12 / I: 3 / P: 7 [R] [G] [-]

Who else remembers and misses this Firefox feature?

R: 39 / I: 3 / P: 8 [R] [G] [-]

Who thought this was a good idea?

Why do you uberniggers think open source is more "secure" when talented paid CIAniggers could potentially combine all their talents to invent multiple backdoors in a couple of days/hrs(just for fun) from just reading the source code in any popular or significant work that a lot of people use? I'm really sorry but are you people fucking retarded or what? Why have you not considered this? And yeah and good luck fixing or ever finding that vuln on github with voluntary contribs(lol).

Yes the program may not have been audited but previous matter of fact still applies.

Literally who thought it was a good idea? Perhaps popular programs sc should be published of former deprecated code this way it could potentially be a lot safer.

Also include the scenario of chinks and street shitters stealing your work and making it theirs by edits ripping you off and commercializing it after they close source it. That sound good to you?

Discuss, and fyi I'm NOT against OS or FSF. I'm just a thinking man.

R: 106 / I: 19 / P: 8 [R] [G] [-]

Are you really a programmer? Show us your own 8ch downloader then.

Here's mine.

R: 119 / I: 16 / P: 8 [R] [G] [-]

All computers since 2003 can read your keystrokes, screen, files

Full remote backdoor available in all Intel and AMD computers since 2003

All your keystrokes, screens, files can be remotely read or modified on demand at any time by MOSSAD, even if your PC is turned off. That includes your encryption password.

Pre-PSP and pre-ME cpu's are not safe. ASF and DASH are previous versions of PSP/ME botnet. ASF --> DASH --> ME/PSP


Alert Standard Format (ASF) (also sometimes referred to as Alert Standard Forum, Alerting Specifications Forum, Alert Specification Function, etc.) is a DMTF standard for remote monitoring, management and control of computer systems in both OS-present and OS-absent environments.


>DASH provides support for the redirection of KVM (Keyboard, Video and Mouse) and text consoles, as well as USB and media, and supports the management of software updates, BIOS (Basic Input Output System), batteries, NIC (Network Interface Card), MAC and IP addresses, as well as DNS and DHCP configuration. DASH specifications also address operating system status, opaque data management, and more.

they can access your keyboard, video, mouse over the internet


Desktop and mobile Architecture for System Hardware (DASH) is a Distributed Management Task Force (DMTF) standard.

>Intel Active Management Technology is a compliant implementation of DASH.


>Intel Active Management Technology (AMT) is hardware and firmware technology for remote out-of-band management of personal computers,[1][2][3][4][5] running on the Intel Management Engine, a separate microprocessor not exposed to the user, in order to monitor, maintain, update, upgrade, and repair them.

>Intel confirmed a Remote Elevation of Privilege bug (CVE-2017-5689, SA-00075) in its Management Technology on May 1, 2017.[12] Every Intel platform with either Intel Standard Manageability, Active Management Technology, or Small Business Technology, from Nehalem in 2008 to Kaby Lake in 2017 has a remotely exploitable security hole in the ME. [13][14] Some manufacturers, like Purism[15] and System76[16] are already selling hardware with Intel Management Engine disabled to prevent the remote exploit. Additional major security flaws in the ME affecting a very large number of computers incorporating Management Engine, Trusted Execution Engine, and Server Platform Services firmware, from Skylake in 2015 to Coffee Lake in 2017, were confirmed by Intel on November 20, 2017 (SA-00086).



>AMD PRO A-Series platforms utilizing DASH manageability enable manageability features you need and want. These affordable, easy-to-use management tools and features enable remote management of client systems, whether they are powered on (in-band) with a responsive operating system (in-service), or when the clients are powered off (out-of-band) or have a non-responsive operating system (out-of-service). Our powerful management tools also offer remote diagnostics and troubleshooting, asset management, automated system startup and shut down.



>Client systems that support out-of-band management help IT administrators perform tasks independent of the power state of the machine or the state of the operating system. Examples of out-of-band management tasks include: 1) Securely starting up a system remotely, even if it is currently powered off; 2) Viewing asset inventory information for a system that is powered off; 3) Retrieving health information about system components even if the OS is unavailable.

(body too long)

R: 14 / I: 3 / P: 8 [R] [G] [-]

Build me a machine equal to the new Mac

So /tech/ and /g/ seem to think that the new mac is LOL CRAPPLEL TAX because the base system specs could be beaten by a machine a fifth of the price.

What /tech/ and /g/ apparently are too retarded to understand is that those base system specs include a great deal of headroom.

Your mission, should you be a bad enough dude to accept it, is to build a system using all resources at your disposal that:

- Costs no more than $6000 US MSRP

- Has directly equivalent parts to the contents of the base model (pay attention to the dual 10Gb ethernet)). Thunderbolt can be replaced with USB at your discretion.

- Has the ability to be expanded with:

- At least four GPUs,

- 1.5TB of ECC memory running no slower than 2933MHz,

- No fewer than 28 cores. (You can achieve this core count however you wish, going over is fine.)

- An additional M2 drive

- Apple-specific stuff like the 2-in-1 GPU ("MPX") cards and accelerator cards can be ignored.

- All of these components must be cooled in a way that:

- The system is able to run at max CPU+GPU usage without thermal throttling or hitting TJMAX.

- The system is bearable to sit next to and usable for audio work. Consider a maximum noise level of 30DBa at 1 meter away (the level of a room fan on low from the same distance).. ideally lower.

- Isn't gamer/enthusiast or datacenter-based (no external radiators, no rackmount chassis)

- Does not require overclocking of either the CPU, GPU, or memory to hit these specs.

Can it be done?

R: 10 / I: 1 / P: 8 [R] [G] [-]


what's the best compiler for html (php, ajax) coding in your opinion?

I'm getting tired of using a txt file with no error handling

R: 31 / I: 10 / P: 8 [R] [G] [-]

Purism: *Autistic Screeching* It's ok when we do it



Social justice warriors are buthurt because Purism refused to sign their CoC and censor the "harmful"content.

Tbh I didn't trust purism (and still don't) because of how they lied about the librem (sojucs were praising it) but with this they're just coming back into my interest.

Old sojuc fagshit: https://vulpine.club/@rey/102021797820482084

R: 40 / I: 5 / P: 8 [R] [G] [-]

Opening the filesystems royale

Long time lurker. Never read a discussion on filesystems on /tech. Does it make any difference at all? I've been rolling with LUKS-encrypted BTRFS raid-1 for storage and XFS for everything else. Quite uncomfortable. We know they got taken over by Facecuck and (((Red Hat))), but how fucked up are these projects at the moment? What do you folks suggest?

R: 23 / I: 7 / P: 8 [R] [G] [-]

Reverse engineering

Hey I'm new to Reverse engineering any recommended books to get me started? Share tips and your story of how you became a RE.

R: 50 / I: 2 / P: 8 [R] [G] [-]

Signal Messaging Protocol/ Service

Recently, in an effort to move my normy friends/ relatives away from WhatsApp/ Facebook Messenger/ Snapchat/ Instagram/ BotNetServiceOfTheMonth, I've been recommending them signal and taking a firm "I'll either be on signal, irc, or email and that's it" stance. I chose to die on the hill of signal for its obvious reasons, that is supposed client-to-client encryption, open sores, etc.

Anons, what's your opinion on the Signal Protocol? Furthermore, is there any reason to not to use their service they provide, for insecure, non-misson critical discussion?

R: 18 / I: 1 / P: 8 [R] [G] [-]

Program in c# and javascript because it's the closest thing to lisp you can get a job programming.

R: 11 / I: 2 / P: 8 [R] [G] [-]

Name your favourite mouse at the moment

>Mine is the Logitech M535





-Has that scroll speed button.

-Dexterity Neutral (I'm a Lefty)

-Light on batteries (1 AA that lasts a year)

-No annoying neons or lights

-easily disassembled

-comes with a warranty

You got any recommendations yourself?

R: 12 / I: 1 / P: 8 [R] [G] [-]

Smartphone recommendations

Which smartphone do you use?

Which ones you recommend?

R: 90 / I: 15 / P: 8 [R] [G] [-]

Do we need a higher resolution than 640x480? Why? What is the ideal resolution?

R: 32 / I: 2 / P: 8 [R] [G] [-]

Why the fuck is gtk3 such a bloat compared to 2?

Seriously, look at how they both structure their themes. GTK2 has pretty much one fucking file to edit a theme, and it's easy to understand. On the other hand, gtk3 has 16 - which take about 500KB compared to the former's single 30KB file. And here I was thinking I'm almost done with my xfce theme - looks like I'm not going to finish it in this lifetime.

Has the tech world in general went astray? Are they missing the point of what software is supposed to accomplish? Simpler is better as long as it does what's needed, and gtk2 did...This also applies to browsers (obviously), init systems (you know the culprit...), everything. How free does FOSS make us these days, really?

R: 47 / I: 3 / P: 8 [R] [G] [-]

Terrorist PC: VIA edition

is VIA as botnet as Intel and AMD? It seems to not have ME/PSP

VIA is Taiwanese, not (((American)))






is it suitable for terrorist PC? If you were Osama bin Laden or Ted Kaczynski, what would you use?

R: 62 / I: 7 / P: 9 [R] [G] [-]

Migrating from Ubuntu/ Debian Mate to OpenBSD, CalmWindowManager. A blog.

>be me

>a hwite cis male w/ penis intact

>hate the b l o a t of Linux, especially ubuntu, especially gnome

>even gnome 2 (mate), your old standby, seems bloated

>don't want to deal with gentoo suit

>hate the fragmentation

>hate the gpl

>hate the CoCk

>plan9 is literally retarded

>9front is 3edgy5me

>haiku is a forever early beta


<absolutely proprietary

>give openBSD a download

>install it on my core2duo machine

>connect to wifi with a config file


>start x with xenodm

>all of cwm's configs in one file

>so simple

>so well documented

>man [ ] pages make sense

>tmux just as good if not better than gnuScreen

>the install was a walk in the park

>easier than debian minimal tbqh

>forced me to learn vi instead of nano

>honestly it's much better

I took the BSD pill. Will you? Or will you keep taking Linus's CoCk and letting Stallman tell you what freedom "really is"???

R: 16 / I: 1 / P: 9 [R] [G] [-]

Tusky discusses banning gab.com from the app itself


R: 11 / I: 1 / P: 9 [R] [G] [-]

Alan Turing

If Alan Turing lived today what color would his programmer socks be?

R: 17 / I: 0 / P: 9 [R] [G] [-]

Literate programming

I just found out about this. Basically, a book is written to explain the workings of a program. The book is the source. The program can be compiled from a pdf.

>Most programmers are still locked into the idea of making a program out of a large pile of tiny files containing pieces of programs. They do not realize that this organization was forced by the fact that machines like the PDP 11 only

had 8k of memory and a limit of 4k buffers in the editor. Thus there was a lot of machinery built up, such as overlay linkers, to try to reconstruct the whole program.

>The time has come to move into a more rational means of creating and maintaining programs. Knuth suggested we write programs like we write literature, with the idea that we are trying to communicate the ideas to other people. The

fact that the machine can also run the programs is a useful side-effect but not important.

Source (this a literate implementation of clojure): https://github.com/daly/literateclojure/blob/master/clojure.pdf

R: 28 / I: 2 / P: 9 [R] [G] [-]

Self-Driving cars

When self driving cars become a commonplace thing, how can we enjoy the luxury of a self driving car without being at the mercy of others?

R: 32 / I: 8 / P: 9 [R] [G] [-]

systemd Clocks In At More Than 1.2 Million Lines



Five years ago today was the story on Phoronix how the systemd source tree was approaching 550k lines so curiosity got the best of me to see how large is the systemd Git repository today. Well, now it's over 1.2 million lines.

After surpassing one million lines in 2017, when running GitStats on the systemd Git repository today it's coming in at 1,207,302 lines. Those 1.2 million lines are spread across 3,260 files and made over 40,057 commits from nearly 1,400 different authors.

Systemd saw a record number of commits last year but so far for 2019 it's hard to see that record being broke yet again. So far this year have been 2,145 commits while last year saw 6,245 commits while 2016 and 2017 each saw less than four thousand commits total.

Lennart Poettering continues being the most prolific contributor to systemd with more than 32% of the commits so far this year. The most other prolific authors this year include Yu Watanabe, Zbigniew Jędrzejewski-Szmek, Frantisek Sumsal, Susant Sahani, and Evgeny Vereshchagin. Around 142 people have contributed to the systemd source tree year to date.

R: 46 / I: 1 / P: 9 [R] [G] [-]

Icecat Updated to v60.5.0ESR

New modifications to the git

git clone git://git.savannah.gnu.org/gnuzilla.git

>* Hardened privacy settings: spoof referers by default, isolate requests to first party origin, and disable sending the origin header to the HTTP server.

>* Extensions:

>"LibreJS" updated to 7.19rc3, Now with Android support!

>Added "ViewTube" + "disable-polymer-youtube" extensions, which allow to browse and play >Youtube videos without JavaScript

>"TorButton" updated to 0.1.

>"HTTPS Everywhere" updated to 2019.1.31

>Improved interface for "Reveal hidden HTML"

>"Third Party Request Blocker" configured to allow requests to subdomains of the same site, known CDN servers (this is fine since we don't send referrers or origin headers), css files, and Youtube resource servers.

>"Third Party Request Blocker" configured to prevent scripts from capturing mouse and keyboard events, as well as zero-width-character tracking mechanisms.

R: 12 / I: 2 / P: 9 [R] [G] [-]

systemd alternative?

Is there alternative to systemd t hat isn't devuan (run by a jamacian SJW). and void linux is a bunch of antifa cucks so avoiding that too.

R: 45 / I: 6 / P: 9 [R] [G] [-]

What does /tech/ think of Funtoo?

I been thinking to use Funtoo instead of Void.

It seemed better to learn how to use Portage.

Does Funtoo really work alot better or should I use Gentoo?

Is there any Funtoo users who use it?

I'm some guy who uses LMMS to make music anyways & also plays HL2 Deathmatch all night when I get tired.

R: 20 / I: 3 / P: 9 [R] [G] [-]

Those feel-good moments in tech

What was a memorable feel-good moment for you in technology? For me, it was the first time I wrote a program that made any noticable difference in CPU usage and wasn't just sitting there wasting cycles. It was a real

>hey, this thing is actually churning through data


R: 29 / I: 2 / P: 9 [R] [G] [-]

Okay how secure will I be if I do the following?

>Delete all my online accounts

>Falsify my address and personal data in all the government and bank documents and change then immediately afterwards (Getting an old phone number, moving to another state, etc...)

>Unsubscribe from all paid services and schemes that asks for personal data

>Format my whole PC and start afresh

>Use another WiFi to route all traffic through tor except maybe updation and torrent

>Use firewall to block all unnecessary connections

>Use an always on VPN

>Get a new ISP provider

>Only use software recommended by privacy experts and use a sandbox/guest account to run necessary proprietary apps

So how secure will I be? Have I left to do anything else?

R: 338 / I: 74 / P: 9 [R] [G] [-]

/ipfs/ - IPFS Thread #3

Last thread:

>>915966 (https://archive.is/rQakE)



>ipfs 0.4.17 is a quick release to fix a major performance regression in bitswap (mostly affecting go-ipfs → js-ipfs transfers). However, while motivated by this fix, this release contains a few other goodies that will excite some users.

>The headline feature in this release is urlstore support. Urlstore is a generalization of the filestore backend that can fetch file blocks from remote URLs on-demand instead of storing them in the local datastore.

>Additionally, we've added support for extracting inline blocks from CIDs (blocks inlined into CIDs using the identity hash function). However, go-ipfs won't yet create such CIDs so you're unlikely to see any in the wild.


>URLStore (ipfs/go-ipfs#4896)

>Add trickle-dag support to the urlstore (ipfs/go-ipfs#5245).

>Allow specifying how the data field in the object get is encoded (ipfs/go-ipfs#5139)

>Add a -U flag to files ls to disable sorting (ipfs/go-ipfs#5219)

>Add an efficient --size-only flag to the repo stat (ipfs/go-ipfs#5010)

>Inline blocks in CIDs (ipfs/go-ipfs#5117)


>Make ipfs files ls -l correctly report the hash and size of files (ipfs/go-ipfs#5045)

>Fix sorting of files ls (ipfs/go-ipfs#5219)

>Improve prefetching in ipfs cat and related commands (ipfs/go-ipfs#5162)

>Better error message when ipfs cp fails (ipfs/go-ipfs#5218)

>Don't wait for the peer to close it's end of a bitswap stream before considering the block "sent" (ipfs/go-ipfs#5258)

>Fix resolving links in sharded directories via the gateway (ipfs/go-ipfs#5271)

>Fix building when there's a space in the current directory (ipfs/go-ipfs#5261)

tl;dr for Beginners

>decentralized P2P network

>like torrenting, but instead of getting a .torrent file or magnet link that shares a pre-set group of files, you get a hash of the files which is searched for in the network and served automatically

>you can add files to the entire network with one line in the CLI or a drag-and-drop into the web interface

>HTTP gateways let you download any hash through your browser without running IPFS

>can stream video files in mpv or VLC (though it's not recommended unless the file has a lot of seeds)

How it Works

When you add a file, the files are cryptographically hashed and a merkle tree is created. These hashes are announced by the IPFS client to the nodes in the network. (The IPFS team often describes the network as a "Merkle forest.") Any user can request one of these hashes and the nodes set up peer connections automatically. If two users share the same file then both of them can seed it to a third person requesting the hash, as opposed to .torrent files/magnets which require both seeders use the same file.


>Is it safe?

It's about as safe as a torrent right now, ignoring the relative obscurity bonus. They are working on integration with TOR and I2P. Check out libp2p if you're curious.

>Is it fast?

Finding a seeder can take anywhere from a few seconds to a few minutes. It's slowly improving but still requires a fair bit of optimization work. Once the download starts, it's as fast as the peers can offer, just like a torrent.

>Is it a meme?

You be the judge.

It has implementations in Go (meant for desktop integration) and Javascript (meant for browser/server integration) in active development that are functional right now, it has a bunch of side projects that build on it, and it divides important parts of its development (IPLD, libp2p, etc) into separate projects that allow for drop-in support for many existing technologies.

On the other hand, it's still alpha software with a small userbase and has poor network performance.

Websites of interest


Official IPFS HTTP gateway. Slap this in front of a hash and it will download a file from the network. Be warned that this gateway is slower than using the client and accepts DMCAs.

glob.me — dead

R: 73 / I: 6 / P: 9 [R] [G] [-]

linux is bloated malware

>consider installing devuan (debian without systemd)

>installer is 4GB

>consider installing OpenBSD

>installer is 0.4GB

why is linux so bloated and shit?

why don't they provide light and fat installers?

light = kernel, one desktop environment, some crucial software

fat = few desktop environments, a lot of software

any why is linux so bloated even in standard installer?

R: 51 / I: 5 / P: 9 [R] [G] [-]

CIA shuts down independent imageboards

>nanochan admin posts on 26 May 2019 that he no longer wants to keep nanochan

>lolifox admin makes chan read-only and wants to quit, happened on 26 May 2019

>endchan only sometimes works since 26 May 2019


post your conspiracy theories

I start:

-it is coordinated CIA/jews attack to stop independent chans and only leave CIA chan (8chan)

-nanochan admin and lolifox admin are the same person

also do not forget that recently CIA destroyed Tor posting on 8chan. you need to solve one captcha per post, or even two captchas per every post on popular boards

R: 20 / I: 5 / P: 9 [R] [G] [-]

ESR: "revokists" have it right. [Regarding GPL License]

http://esr.ibiblio.org/?p=8317 (Archive link: http://archive.fo/5IpEL )

A commentator asked on Eric S. Raymond's website:

>ESR: Eben Moglen suggested that he was going to write a paper refuting the notion that "The GPL is revocable":


>>I think the best procedure would be for me to publish my analysis and

>>for you then to tell me what is wrong with it.



>Why has no such paper from him materialized?

ESR response was shocking, blunt, and to the point:

>esr on 2019-05-30 at 08:08:23 said:


>>Why has no such paper from him materialized?


>Because Moglen is either wrong about or deliberately misrepresenting the law and the "revokists" have it right. Thank you, I had already figured this out from his (non)responses on lkml.

R: 27 / I: 0 / P: 10 [R] [G] [-]

Is it really worth it to learn VIm over Visual Studio Code?

Visual Studio Code is nice and easy to use and easy to navigate a project.

R: 89 / I: 15 / P: 10 [R] [G] [-]


>ctards and lispcucks still don't know what the best language is

Have you mastered the STACK, yet maties?





R: 11 / I: 8 / P: 10 [R] [G] [-]


<32 chars 32 chars 32 chars 32 chars

R: 65 / I: 9 / P: 10 [R] [G] [-]

Linux Kernel ‘Version Final’

Do you think it’s possible for a piece of software like Linux to ever reach a final version and never need an update again and everyone would be satisfied with it? Or is kernel/OS development an endless game of cat and mouse whenever new security holes and bugs are introduced as more and more libraries are being added and more and more hardware is getting supported ad infinitum

R: 18 / I: 5 / P: 10 [R] [G] [-]

Britbongistan testing facial recognition


I feel like a caged animal in my own country I didn't ask to live like this I just wanted to post memes and watch anime.

R: 28 / I: 2 / P: 10 [R] [G] [-]

Is it possible for someone in this day and age to break modern casino slots? A man once told me Las Vegas slot machine software is more secure then the NSA. Do you think this is true? This type of shit has just always interested me. The average person never really thinks about the software engineering that is behind slot machines

R: 21 / I: 3 / P: 10 [R] [G] [-]

Growing online presents

We all know the internet is pozzed to shit but some of us still enjoy making videos on old tech and obscure hardware. If you wanted to grow a tech channel but wanted to stay as anonymous as possible outside of your voice how would you do it? What would you do to promote the channel and get your viewer counts up?

If you want to be autistic then imagine you're trying to make a channel to promote good open source software and avoid the SJW pozzing of everything

R: 101 / I: 4 / P: 10 [R] [G] [-]

The install Gentoo Wiki

The Install Gentoo wiki is more or less dead. I have become the primary contributor to it. (I am https://wiki.installgentoo.com/wiki/User:Se7en1) As the new primary contributor, I contacted bannanafish in an attempt to get admin status but he has not responded.

Anyway, we have an official wiki and none of you are taking part in it. I implore you all to begin editing it again to ensure accurate information.


R: 234 / I: 46 / P: 10 [R] [G] [-]

Beware the Social Score

What will YOU do when the Chinese Social Score comes to your nation?

Don't think for one minute that it won't. Generation Z has been raised to rate everything, from the products they buy, to the sellers they buy from, the restaurants they visit, their teachers, and even the doctors they visit. They rate their uber driver and the uber driver rates them. You have a large generation very used to the concept of rating.

The social media phenomenon has inculcated a narcissistic driven behavioural reinforcement system, by which people are nudged into group pleasing actions in return for high scores. Whether the motivation is purely rooted in vanity, or for monetary award corresponding to subscriber counts, it becomes clear that people are intimately vested in a gamification existence.

This combination of ratings and points is the underbelly for a "Social Score" system that is actually being realized in China today. Fail a test, litter on the street, say something 'politically incorrect', or perhaps staying out too late would result in demerits. Naturally, governments will issue rewards to nudge people into 'correct' behaviour. Those with low scores will be restricted from many services ranging from communications to travel; perhaps dissidents won't even have any freedom of movement! I'm sure you can imagine how such a scheme could also be tied into Universal Income.

(((They))) have primed the younger generation to accept this system, and you're kidding yourself if you think it will be met with but a handful of resistors. The question is then, how do we prevent this dystopian nightmare from emerging before it is too late?

R: 43 / I: 3 / P: 10 [R] [G] [-]

Poettering does it again

SystemD uses rand() to generate random bytes for cryptographic purposes.



R: 26 / I: 3 / P: 10 [R] [G] [-]

Needless torment

>want software

>no prepackaged version

>download source

>supposed dependency list is inaccurate

>have to repeatedly configure, install missing package, and configure again, until it works

>there's a piece of software called auto-apt that can do this manually

>it's been defunct for years

Why isn't this the default behavior, just try to compile something, and if it doesn't work "do you want to install the following dependencies, y/n"?

Do Linux devs just have masochistic tendencies?

R: 16 / I: 1 / P: 10 [R] [G] [-]


What's the deal with urbit, anyone here use it?

R: 386 / I: 67 / P: 10 [R] [G] [-]

Linux Alternative General #2


This list is for desktop oriented operating systems. List is ordered roughly by developmental stage.

BSDs - finished, werks:

Name: MidnightBSD

License: Simplified BSD License

Kernel: BSD Monolithic

Name: OpenBSD

License: Simplified BSD License

Kernel: BSD Monolithic

Name: NetBSD

License: Simplified BSD License

Kernel: BSD Monolithic

Name: Dragonfly BSD

License: Modified BSD License

Kernel: BSD Monolithic/Hybrid

Illumos - mostly server oriented, compatibility layer is there "but haven't ported it yet":

Name: OpenIndiana IllumoS

License: CDDL License (MIT resemblence)

Kernel: IllumoS Monolithic

Name: ToaruOS IllumoS

License: UIUC License (MIT resemblence)

Kernel: IllumoS Monolithic

Name: Tribblix IllumoS

License: CDDL License (MIT resemblence)

Kernel: Illumos Monolithic

AROS Systems - Amiga-based niche OS, mostly justwerks:

Name: AROS Research OS

License: AROS Public License (Mozilla resemblence)

Kernel: Exec Microkernel

Name: Icaros Desktop

License: AROS Public License (Mozilla resemblence)

Kernel: Exec Microkernel

Name: Aspire OS

License: AROS Public License (Mozilla resemblence)

Kernel: Exec Microkernel

Name: AEROS OS (warning: do NOT use)

License: OIN License (Protection racket resemblence)

Kernel: Linux Monolithic (ain't no escape)

Oddball OS - experimental, will become better:

Name: Sculpt OS

License: GNU GPL License

Kernel: Genode OSF base-hw Microkernel

Name: Haiku

License: MIT License

Kernel: Haiku Monolithic/Hybrid

GNU/Hurd - experimental and desperately needs more active development because it's borderline abandonware:

Name: Arch Hurd

License: GNU GPL License

Kernel: GNU Mach Microkernel

Name: Devuan GNU/Hurd

License: GNU GPL License

Kernel: GNU Mach Microkernel

Name: Gentoo GNU/Hurd

License: GNU GPL License

Kernel: GNU Mach Microkernel

Name: GuixSD GNU/Hurd

License: GNU GPL License

Kernel: GNU Mach Microkernel

Name: NixOS GNU/Hurd

License: MIT License

Kernel: GNU Mach Microkernel

R: 19 / I: 2 / P: 10 [R] [G] [-]

This crazy nigga stomped a pet bird.

R: 86 / I: 1 / P: 10 [R] [G] [-]

Gentoo capitulated to Stallman

The default set of accepted licenses has been changed [1,2] to:


This means that by default only free software and documentation

will be installable. The "FREE" license group is defined in the

profiles/license_groups file in the Gentoo repository. It contains

licenses that are explicitly approved by the Free Software Foundation,

the Open Source Initiative, or that follow the Free Software


The system wide default for the accepted licenses is controlled by

the ACCEPT_LICENSE variable in /etc/portage/make.conf, or it can be

specified on a per-package basis in /etc/portage/package.license.

For example, to allow the app-arch/unrar and sys-kernel/linux-firmware

packages to be installed, the following lines would have to be added

to /etc/portage/package.license:

app-arch/unrar unRAR

sys-kernel/linux-firmware @BINARY-REDISTRIBUTABLE

If you want to revert to the previous default, add the following line

to /etc/portage/make.conf:


This will permit all licenses, except End User License Agreements that

require reading and signing an acceptance agreement. Note that this

will also accept non-free software and documentation.

See GLEP 23 [3] as well as the make.conf(5) and portage(5) man pages

for the detailed syntax of the ACCEPT_LICENSE variable. Further

information about licenses can be found in the Gentoo Handbook [4]

and on the license groups wiki page [5].

[1] https://projects.gentoo.org/council/meeting-logs/20190210-summary.txt

[2] https://bugs.gentoo.org/676248

[3] https://www.gentoo.org/glep/glep-0023.html

[4] https://wiki.gentoo.org/wiki/Handbook:AMD64/Working/Portage#Licenses

[5] https://wiki.gentoo.org/wiki/License_groups

R: 59 / I: 8 / P: 11 [R] [G] [-]

Newbie Programmer

Hi /tech/, Well the thing is that i know the basics about programming (Variables, Booleans, Strings, Integers, Floats Conditionals, Loops, Functions, Classes, Inheritance, Polymorfysm) and i want to know... what's next? I feel lost right know cause i dont know what to do.

Should i get a job or what? Can you guys told me what's next once you learns the basics?

R: 48 / I: 4 / P: 11 [R] [G] [-]

We must take action against the modern pozzed web

Computers have become degenerate in that the data has become the software. Absolutely degenerate. Why? Because that means people cannot use whatever interface they find more convenient to interact with the data.

There is no "document" anymore. Each document or web page stopped being data, and it became an "experience". A constant flow of input and output from and to the user, to and from the "experience", which in turn is composed of both the software embedded in the document, and the software embedded in the server of the person who provided the document to the user.

And this is unacceptable, because it destroys the idea of the document being a free standing entity with a life of its own beyond that which is provided for by the owner, creator or supplier of the document.

How can we fight back against this tyranny? There is only one way. We must create our own alternatives to this incompatible, slow, bloated mess that is the modern javascript/web system.

We must run our own simple, lightweight, latency-tolerant protocols, networks proxies, clients and tools to work alone and together with existing systems while providing saner alternatives to the current interfaces that are available to talk to those services.

R: 18 / I: 5 / P: 11 [R] [G] [-]


Why is it called "init" if it runs not only for the initialization of the system, but for the entire runtime up until shutdown?

Is there an "init" system in existence that pisses off completely after init?

R: 26 / I: 6 / P: 11 [R] [G] [-]

(Effectively) Power-free computing

Alright so the CIA or your choice of any local three-letter agency is probably going to lynch us for discussing this kind of technology, but I've been looking into hardware components which I think are being under-utilised. What kinds of components? The sorts that could be used to do general desktop computing without bowing down to the Electric Jew. With some of these concepts put together, you could probably shitpost on 8ch with a hand-crank powered computer. Here are my findings:

Non-volatile RAM:


RAM which can store memory without persistent power. An SSD can be utilised as NVRAM, but there's been other methods to try to implement this. With an ideal implementation, powering off your computer would be equivalent to putting it in a hibernation mode.



You probably associate this with e-Readers, and therefore annoying harry potter-reading single mothers but the truth is, these things are incredible. If it weren't for the costs associated with the other hardware of an e-reader, they could stay charged indefinitely. As you know, the thing which sets it apart from other low-power displays used in calculators and the like are viewing angle, and the fact that rather than blanking out when the power is cut, they have to actually wipe themselves clean. The refresh rate is terrible though, so this will be pretty grating with conventional, line-by-line text processing.




Power Over Ethernet:


I'll admit this is cheating, but for most interesting tasks involving a computer, you'll need networking anyway.

If the requirements of having an Ethernet port at all are too steep, then we could scrap this and build a modem into the computer instead. If we do this, we have to account for the electricity the external phone uses as well.

Human Power:



I alluded to this earlier, and you might've taken it as shitposting. Just read the sales pitch, and you'll see that it's more than enough to power the kind of computer we're looking at.

Plug Computer Form Factor:


Doesn't exactly align with the objective, since you can't really just power them off at will, but their low wattage (generally lower than the Commodore 64, apparently) still makes them useful if you need a computer that's active 24/7. You could use it for to run a bittorrent program, and maybe a web server I guess.

The ideal goal is to have a computer that consumes 0 watts in an idle state (idle meaning, any time you're busy reading text for more than ~4 seconds), and still a negligble amount of power when it's actually being used. This would mean that the computer is actually powered "off" for most of the time it's in use.

Is there anything stopping this from happening? I don't know whether you can just stop and start CPUs the same way you can with the RAM/monitor.

R: 25 / I: 3 / P: 11 [R] [G] [-]

MX Linux > General Thread




>Well Optimised (works on any old PC/Laptop)

>Works off of any USB without a hitch

>So Feature Packed and easy to Configure, you'll almost forget you have a Terminal

>Has a 32-bit edition

>One of the largest active Linux User Communities today

>SysV instead of SysTemD

What's not to love about it? I'd love to hear from you...

R: 11 / I: 0 / P: 11 [R] [G] [-]

Can you decide this message?

I know there are some serious autists lurking here. Decode this message if you can. Clue it is a simple substitution cyber. Use whatever crypto tools you want or just use a pen and paper. Up to you.














R: 84 / I: 14 / P: 11 [R] [G] [-]

A website where people control an online computer



R: 22 / I: 2 / P: 11 [R] [G] [-]

You motherfuckers know your shit

So I am asking if someone could help me do a simple personal HTML where I put images and gifs and they'd be scattered around like so in the page, where I could see everything

And I'd want the page to scroll down automatically, as to showcase all the images I've put on display and if there's a possibility for the cycle to start from beginning in a loop

Right now I am using very bare bones version of:

<!DOCTYPE html>




<img src="C:\Users\Me\Desktop\images\1.jpg">

<img src="C:\Users\Me\Desktop\images\gif\2.gif">

<img src="C:\Users\Me\Desktop\images\3.jpg">



I can only scroll it down myself, the images are next to each other horizontally and theres huge gaps between the images, I don't know how to make them packed tight

I only know very basic code so go easy on me

R: 20 / I: 4 / P: 11 [R] [G] [-]

Man pages

Do any of you read them for fun? I enjoy learning the most I can about specific commands in order to master the command line and make the most of out each command. Man pages are often elegantly written and informative in ways that other summaries cannot achieve. What are some man pages that you have enjoyed reading that enhanced your skills in tangible ways?

R: 26 / I: 2 / P: 11 [R] [G] [-]

Hey Rustfag

When I comment out the line in pic related, Rust will fail with the error

thread 'main' panicked at 'called `Result::unwrap()` on an `Err` value: Os { code: 11, kind: WouldBlock, message: "Resource temporarily unavailable" }', libcore/result.rs:1009:5

upon running, but when I let it print, it runs completely fine. What kind of fucking language panics or doesn't based on whether or not something prints?

R: 22 / I: 4 / P: 11 [R] [G] [-]

https://socketbbs.com/ i made a comfy website

R: 61 / I: 7 / P: 11 [R] [G] [-]

Using GANs to help detect CP


So I've been looking into GANs (Generative Adversarial Networks) and how it can be used to generate human-like faces


The tl;dr is this;

There's a database of say, human faces

Then there's basically a random image generator

The image generator starts spitting images to a neural network that compares the images it spits out to the database of real human faces, the neural network then reports to the image generator how likely or unlikely that image resembles a human face from 0 (not likely at all) to 100 (very likely)

At first the image generator spits out nothing but random noise. The neural network then begins reporting a lot of 0 percents to the generation software

Over time the image generator begins figuring out how to gain higher and higher scores with the neural network. After thousands of generated images the image generator gets closer and closer to 100 percent and the faces now look more human. What was once just a random image generator has turned into something that can literally create photo-realistic faces out of thin air.

My concept for a GAN run CP bot is to reverse the process.

Build a database of CP (controversial, might need some approval body) the train the neural network based on this database like normal. BUT instead of having an image generator, we simply feed it images other people have reported as CP (say, on an imageboard) and then the neural network compares the image, if its greater then 90 percent likely to be CP, then the bot bans the user. If its less then that, the AI flags a human moderator to check on it to see if its a false report and take appropriate action.

Basically use GANs to take some burden off of human moderators, very useful for websites like 8chan itself, without having to have a continuous growing internal CP database which would be more impractical and perhaps more controversial

What do you guys think of my idea?

R: 51 / I: 2 / P: 11 [R] [G] [-]

Meta-Machine Code

I would like to show off a tool I've created; the included image is an example of the tool with a program I've written loaded; the main page for this tool can be found here:


The page for the only current version of the tool is here; note it is an immature page in comparison:


This is an interactive machine code development environment I've created. The basic idea is each key of the keyboard, decided by position rather than value, is bound to a routine which asks questions until an action can be decided upon. An example is pressing a key for a routine that merely needs two registers in order to complete; you're permitted to enter a register number, the tool won't allow invalid such numbers to be entered at all, it asks again in the same way, and it then writes the finished instruction to the current location; if a name referring to a number was used, that name will likely be displayed instead of the numerical value, varying, and any changes to the name will update the instruction as well.

I wrote this tool in Common Lisp purely because Common Lisp has the necessary primitives. The program is decidedly non-Lispy. I'm planning to write a simpler reimplementation in Ada by the year's end and expect this will be the version that is distributed to package managers and whatnot. Some simple figuring has shown to me that the memory usage for this program, sans any undo and redo mechanism, should be well within an eighth of a megabyte in the general case and below a quarter in all cases.

The tool was borne of my dislike for assemblers. Answers are saved by similar routines and so you can very easily press keys until you find the one you need; you can't touch and feel your way around an assembler. Aside from this, there are also special routines, primarily located on the home row, which control movement, insertion, deletion, jumping around the program space, creating and deleting names, and other necessities.

In contrast to a one or two pass assembler, this is a no-pass tool, as everything must at all times be in a valid state. You can't use a name before it's created; updating a name works modulo its usage size, preventing errors from surpassing limits; and deleting a name merely removes the association, preventing further updates upon changes, among other such measures.

This is a reasonable description of the tool. Currently, only I can use it, because it's not in a friendly state for installation and I only have a correct Dvorak mapping created. I'm also still refining it and removing bugs I've added during this refining. The entire system, including the three libraries I wrote for it, is less than two and a half thousand lines of code.

I've been trying to show this tool to a wider audience, but I've not found much of one yet. Feel free to tell me what you think and ask any questions concerning the tool.

R: 87 / I: 118 / P: 11 [R] [G] [-]

/tech/ Book Thread

Can we get a /tech/ book thread going? Post them if you got them.

I'm looking for good book for learning Lua programming, if anyone has one.

R: 37 / I: 4 / P: 11 [R] [G] [-]

Firefox 67 > Hate it or Despise it?

This new piece of Chromeware comes with:

>A new Sync Button directly ripping off the Chrome Account button.

>New rules so that Add Ons are disabled by default on Private Mode.

>Saves Password even on Private Mode.

I rate it a: “Switch to Basilisk/Pale Moon you Dumbass Court Monkey!” out of 10.

R: 37 / I: 3 / P: 12 [R] [G] [-]

meshnet discussion

What are /tech/'s thoughts on the feasibility of a global meshnet as an alternative to the internet?

I have to say, updating the *Internet as a platform* is an interesting idea. We all eventually replace or update or patch our internet-connected devices, why not also the means that makes them useful? When considering the internet as a platform, how would you improve it?

I am particularly interested in this idea not only for the fact that it would mitigate censorship and allow universal access but also because i have come to realize that the Internet is the great equalizer in the digital age. Anyone can log on and find an answer; start a business; find a home; hire an employee; and so on.

As i see it, an alternative internet is an opportunity for humanity to create something truly special, a non-natural resource that is unlimited and free. De-centralizing such a powerful resource would, in my opinion, be the only way ensure its endurance in the future as a resource that connects and informs.

I would love to hear some other perspectives on the topic. For me, I want to be free from interference.

R: 33 / I: 13 / P: 12 [R] [G] [-]

anti-systemdcucks on suicide watch



R: 17 / I: 1 / P: 12 [R] [G] [-]

GoBudgie (F/K/A Gobuntu) > Has it got potential to be a good Meta-OS?


Although based on a weird mash-up of Ubuntu and Chromium OS, It's goal is to be compatible with literally every OS available (unlike Chromium OS, on any PC as well).

At the moment, it can run Windows (using the latest WINE), Linux, Chrome OS and Android Apps (using a tweaked AnBox for fiber) all under one roof, they can't do Apple products because laws.

The first full stable version got released back in March, and I was wondering if any of you have a good or bad opinion about it...

What would you change if you could? And unless you can name a better alternative, Don't Say "Stop using it!" because Government or something...

R: 16 / I: 0 / P: 12 [R] [G] [-]

Github Sponsors

Would you use it?

It is still better than Patreon, I guess.

R: 14 / I: 3 / P: 12 [R] [G] [-]

Tor now has an epic flat design logo


R: 35 / I: 6 / P: 12 [R] [G] [-]

Apple extends keyboard coverage fo Macbook keyboardgate - BUT WAIT WAIT WAIT


>Apple has also expanded the scope of its service program for keyboards. The company says that, again, a "small percentage" of MacBook, MacBook Air, and MacBook Pro models have problems, specifically that "letters or characters repeat unexpectedly", "letters or characters do not appear", or "key(s) feel 'sticky' or do not respond in a consistent manner".

At at the very bottom

>MacBook Pro (13-inch, 2019, Four Thunderbolt 3 Ports)

>MacBook Pro (15-­inch, 2019)

This model came out only a few days ago at the time of this writing.

Which basically means Apple is admitting their products are potentially fucking defective even as they're shipped to stores

R: 20 / I: 0 / P: 12 [R] [G] [-]

Content farms flooding search results

Whenever I search for something tech-related, I get thousands of shit-tier normie oriented content farms and tech blogs. Usually they're written by indians, offer no useful information, the pages are js laden, and whatever solutions they offer are proprietary/botnet. I have go through 10-20 pages of links before I find a page not written by a subhuman.

What is the solution to this? Is there a trick I don't know about that everyone else is using? I have long since stopped using jewgle but startpage and searx aren't really much better.

R: 29 / I: 4 / P: 12 [R] [G] [-]


Serious flaws leave WPA3 vulnerable to hacks that steal Wi-Fi passwords


<archive.is/.fo is down or I would put that here

>The next-generation Wi-Fi Protected Access protocol released 15 months ago was once hailed by key architects as resistant to most types of password-theft attacks that threatened its predecessors. On Wednesday, researchers disclosed several serious design flaws in WPA3 that shattered that myth and raised troubling new questions about the future of wireless security, particularly among low-cost Internet-of-things devices.

Anyone else as shocked as me this is the result of a closed development process?

The parenthesis in the subject line show radio waves, nothing else.

R: 23 / I: 2 / P: 12 [R] [G] [-]

All servers and Tor nodes are compromised

How can we trust Tor nodes or server of any type, when they use botnets like Intel ME, AMD PSP, Systemd, HDD firmware?

If you own server you don't own it, Mossad is the true owner of your server

R: 47 / I: 5 / P: 12 [R] [G] [-]

DNS thread

G'day /tech/, recently I've been searching for good DNS providers and would like to gather some opinions on which on to chose. Currently I'm torn between open-DNS and Cloudflare-DNS but I'd appreciate alternate options.

R: 21 / I: 2 / P: 12 [R] [G] [-]

my cousin let me borrow her mac but she gave me the wrong password. can you niggas help me unlock it?

R: 88 / I: 7 / P: 12 [R] [G] [-]


What machine do you use, and what operating system is it running? I have Debian 8 Sid installed on my 15" PowerBook G4, and it's great.

Pic related

R: 90 / I: 7 / P: 12 [R] [G] [-]

i made this browser extension for anyone and everyone

i made a browser extension for chrome and firefox. it is an extension where you can comment on the current url you are viewing. it only has access to the current tab you are viewing, nothing else. its also anonymous. kind of like dissenter but no sign up process. anyone can comment.



would love it if you all check it out

there is no sign up process with this extension. its anonymous. i usually dislike having usernames. i like it when i can just get on something and start posting anonymously.

in the main file of this extension there is this line.


"permissions": [




that means the extension only has access to the current tab. i would be siked just by people using something i made by hand. check the github repo.

here is the github repo



only the comments/posts gets saved. if people like this extension and people start using. then i can add a username feature if people would like that. but for now i would be happy if people use it at all. feels good to make something.


i posted this in /pol and some of the posters suggested i post it here too.

R: 165 / I: 23 / P: 12 [R] [G] [-]


Image boards won't exist in the future if we don't take action soon.

We need to start taking the decentralized networks more seriously and help protect the free web:




I2P -> https://geti2p.net/en/

Tor Project -> https://www.torproject.org/

Freenet Project -> https://freenetproject.org/

Beaker Browser → https://beakerbrowser.com/

IPFS -> https://ipfs.io/ | https://orion.siderus.io/

IPFS Desktop -> https://github.com/ipfs-shipyard/ipfs-desktop

Zeronet -> https://zeronet.io/

Tribler -> https://www.tribler.org/

Soulseek -> https://www.soulseekqt.net/news/node/1

Ares -> https://www.ares.com/

Ares Galaxy -> https://sourceforge.net/projects/aresgalaxy/

Retroshare -> https://retroshare.cc/ (retroshare is full of decentralized image boards)

OpenBazaar -> https://openbazaar.org/features/ (p2p web with a crypto market place)

qBittorrent -> https://sourceforge.net/projects/qbittorrent/

Quazaa -> https://sourceforge.net/projects/quazaa/

Anomos -> https://sourceforge.net/projects/anomos/

Usenet -> https://torrentfreak.com/how-to-use-usenet/ | https://archive.fo/e1HXH

Image boards over ipfs:// -> https://ipfs.io/ipns/boards.ydns.eu/#/

dat:// protocol -> https://datproject.org/

List of goodies → https://github.com/gdamdam/awesome-decentralized-web

R: 18 / I: 0 / P: 12 [R] [G] [-]

dbus oddities

I purge dbus from my system and then install xfce. I got it to launch by symbolically linking dbus-launch to /bin/true and exporting a fake DBUS_SESSION_BUS_ADDRESS to fake network socket linking to /dev/null. But then the xorg-server crashed on startup with the weirdest fucking message

>*insert xorg crashes here*.... dbus-launch --autolaunch=fuck you

I shit you not, that was what appeared on the command line. I grepped through my entire filesystem and the xfce source tree to no avail to find the source of this message, as it shouldn't even appear since dbus is in no fashion installed. If I unsymbolic link dbus-launch it just crashes saying dbus-launch isn't installed. If I symbolic link but don't export DBUS_SESSION_BUS_ADDRESS then it crashes without the extensions to the command, dbus-launch.

/tech/, somebody here surely has gone through this. Where is the "dbus-launch --autolaunch=fuck you" coming from? I can't find it grepping the source files I compiled myself.

R: 63 / I: 5 / P: 13 [R] [G] [-]

It is finally here: The RISC-V PC!

>While it’s clear that the most significant opportunities for RISC-V will be in democratising custom silicon for accelerating specific tasks and enabling new applications — and it’s already driving a renaissance in novel computer architectures, for e.g. IoT and edge processing — one question that people cannot help but ask is, so when can I have a RISC-V PC? The answer to which is, right now.


Only 4000$ !

R: 33 / I: 0 / P: 13 [R] [G] [-]


The global VPN market is estimated to be worth 23.6 billion in 2019 according to: https://www.statista.com/statistics/542817/worldwide-virtual-private-network-market/

However, using a commercial VPN has one key disadvantage: You have to trust the company to not keep any logs or spy on you in any other way.

There are currently several projects in crpyo trying to tackle this problem with dVPNs, the idea is very simple, you can rent out or buy bandwidth/IP addresses.

These are the three main players at the moment:

Mysterium: already has a working testnet for windows, mac and android. I routinely use it on windows and android and it works well. They were the first player in the market. Based on Ethereum.

Sentinel: They have a working version on testnet for windows, linux, mac and android. Also works really well. They also offer nodes connecting to tor for outgoing connections and are currently testing multihopping. Based on Cosmos.

Privatix: They are an existing VPN company (privatix.com is their page for their "normal" VPN) and they plan to bring over all their vpn users to their dVPN. Also working testnet on windows and linux. Also based on ethereum.

All three of them claim to be the first dVPN, however I think they are on the same level, all have working testnets, so the one that releases to mainnet first is not necessarily farther than the others.

Also all three can tap the market for residental IPs, which are currently very expensive (https://luminati.io/ is one of the leading providers and a residental IP costs 12.5 Dollar per GB with at least a 500 dollar per month commitment)

dVPNs will be able to beat both commercial VPN providers on price (because of more efficient market) and residental IP providers on price by a far margin. Also Netflix, Hulu,... lock most commercial VPNs because they come from datacenter IPs, they will not be able to do this with dVPNs, as some of them will be just normal residental IP addresses.

R: 10 / I: 2 / P: 13 [R] [G] [-]

modern HP

There isn't anything wrong with HP's newest laptops. Many argue that HP was on a downfall ever since their first chicklet keyboard laptop made in 1999. HP is by far the most modern computer company yet, they're outappling Apple!

On the topic, most people who bought HP in the 90s didn't mind the Intel Pentium brand or Microsoft Windows 98. There was simply no alternative so people enjoyed proprietary software and Firefox was considered cutting edge FOSS.

Even to today, the most progressive companies out there use HP laptops to power their ever so diversifying companies. Lenovo is for the schools and for the government, HP is for the Soylent drinking modern businesshuman.

Post your best modern HP's that were DESIGNED to run Windows 10

R: 28 / I: 2 / P: 13 [R] [G] [-]

Where do we bitch about 5g

5g is USA's Credit System a la China. The 5g installations near traffic lights bomb nearby cars with a certain RF frequency to program a 'stop and go' response to anyone around. This can be used later.

I mean it's really simple programming that starts with the fundamental 'stop and go' of a traffic light.

Now imagine they don't like you. They hit you with the same 'stop' signal outside of some bar where you might pick up chicks to keep you segregated from society.

Imagine now not using a VPN and them tracking your internet usage and blasting you RF accordingly. You show an interest in guns and they hit you with positive RF signals whenever you're looking at guns online.

How much money can they steal from you using this shit? How many shootings will this shit cause? It's not just the Gov't with control of these towers. Google and Verizon both have direct control of this shit.

R: 13 / I: 0 / P: 13 [R] [G] [-]

Linux does not support CD (Compact Disc) in 2019

>install linux in 2019

>insert CD (Compact Disc)

>nothing happens

>want to open My Computer, there is no such thing

>open "file manager" instead

>my CD is not present there

>uninstall linux

linux is nigger shit made by brain damaged unix niggers. it's not surprising they have 0% desktop market share. they are biggest failure in human history

R: 21 / I: 0 / P: 13 [R] [G] [-]

SHAttering 2 - The second SHAppening

From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1

A chosen-prefix collision attack is a stronger variant of a collision attack, where an arbitrary pair of challenge prefixes are turned into a collision. Chosen-prefix collisions are usually significantly harder to produce than (identical-prefix) collisions, but the practical impact of such an attack is much larger. While many cryptographic constructions rely on collision-resistance for their security proofs, collision attacks are hard to turn into a break of concrete protocols, because the adversary has limited control over the colliding messages. On the other hand, chosen-prefix collisions have been shown to break certificates (by creating a rogue CA) and many internet protocols (TLS, SSH, IPsec).

In this article, we propose new techniques to turn collision attacks into chosen-prefix collision attacks. Our strategy is composed of two phases: first, a birthday search that aims at taking the random chaining variable difference (due to the chosen-prefix model) to a set of pre-defined target differences. Then, using a multi-block approach, carefully analysing the clustering effect, we map this new chaining variable difference to a colliding pair of states using techniques developed for collision attacks.

We apply those techniques to MD5 and SHA1, and obtain improved attacks. In particular, we have a chosen-prefix collision attack against SHA1 with complexity between 266.9

and 269.4 (depending on assumptions about the cost of finding near-collision blocks), while the best-known attack has complexity 277.1. This is within a small factor of the complexity of the classical collision attack on SHA1 (estimated as 264.7). This represents yet another warning that industries and users have to move away from using SHA1 as soon as possible.


Post yfw Bittorent and Git still use SHA1

R: 116 / I: 15 / P: 13 [R] [G] [-]

TempleOS General - /tosg/

Just installed this fine piece of software, feels like being digitally baptized.

R: 61 / I: 6 / P: 13 [R] [G] [-]

Why the hell is the GNOME shell written in Javascript?

I thought it was just the extension engine but no, Javascript has literally permeated the entire thing, this is completely absurd. No wonder it's so slow.

R: 45 / I: 10 / P: 13 [R] [G] [-]

Build Linux Kernel 5.1.2

Some of you have probably noticed a security bulletin floating around. Basically you can send specially crafted packets to TCP port and gain remote code execution on Linux versions prior to 5.0.8

Compiling Linux 5.1.2. Easy enough.


wget https://lnkd.in/grP8_4M

unxz -v linux-5.1.2.tar.xz

wget https://lnkd.in/gN3Zmi5

gpg --verify linux-5.1.2.tar.sign

gpg --recv-keys 79BE3E4300411886

gpg --verify linux-5.1.2.tar.sign

tar xvf linux-5.1.2.tar

cd linux-5.1.2

cp -v /boot/config-$(uname -r) .config

apt-get install build-essential libncurses-dev bison flex libssl-dev libelf-dev

make menuconfig

#if you need to make changes do so otherwise just exit.


R: 87 / I: 10 / P: 13 [R] [G] [-]

uBlock adds blocklist which blocks 8ch.net


>Add Energized Blu Go as stock multipurpose list


>A merged collection of hosts from reputable sources. #StayEnergized! https://energized.pro

This merges multiple blocklists together, including https://1hos.cf/ which includes a filter for 8ch.net.

R: 113 / I: 10 / P: 13 [R] [G] [-]

What the hell is there left to write?

It feels like everything you can make money off writing has already been made? Am I just not being creative enough or is there really this brick wall in terms of what software can solve?

R: 94 / I: 7 / P: 13 [R] [G] [-]

Discussion about paper "Towards a peer-to-peer imageboard"

I'm reading the paper posted by Fredrick Brennan regarding the different approaches of making a decentralized image board and i came to this part.

"In a BitTorrent-like magnet

network, unpopular or old images can fall out of the network over time, but in a

blockchain, all images must be stored forever no matter what they depict."

I think there is a clear winner here being the bit torrent approach, follow the approach most chans have traditionally used that old/inactive images/threads fall out of the ecosystem of the board.

R: 26 / I: 5 / P: 13 [R] [G] [-]

Was I pwned?

I just received this email claiming that my PC has been compromised for months and my data is about to be sent to all my contacts.

Has any of you received something similar? It does come from my very own mailbox so it is possible someone else has the password; but his claims seem kinda strange considering I don't reuse passwords, especially not the cock.li password.

So how likely are these claims? Should I burn all my devices now?

R: 18 / I: 5 / P: 13 [R] [G] [-]

What is wrong with buying a brand new Lenovo ThinkPad with a chicklet keyboard? What is wrong with installing Adobe, Microsoft, AutoDesk CAD, and even McAfee software and paying for the software with real money?

Paying Proprietary means Paying for Quality

R: 22 / I: 2 / P: 13 [R] [G] [-]



R: 137 / I: 36 / P: 14 [R] [G] [-]

PNG is actually smaller filesize while being higher quality for most images uploaded on 8chan

All jpg cucks will hang.

All the time I see these stupid jpg thumbnails that 8chan is using and they are bigger filesize than if they were just png while looking like shit.

Worse yet random anons keep thinking jpg is always smaller and so they save their screencaps as these shitty jpg fuzz ridden higher filesize images.

R: 44 / I: 2 / P: 14 [R] [G] [-]

Anybody knows how to tweak and customize the weston wayland compositor?

R: 59 / I: 15 / P: 14 [R] [G] [-]

Are we living in the absolute worst time for technology so far in history?

>Windows is full botnet and a disgusting piece of bloatware

>Last "good" windows OS is at the end of it's run

>No Linux desktop has picked up the slack as hoped

>No phones are safe to use

>No phones are free

>5G on the horizon to both give you cancer and track your position at every street corner

>HTTPS cash-grab in full swing

>Every website must have gtag or fb pixel

>No advances in hardware for years

>No advances in network services in years

Has it ever been worse than this and what can be done to make things better?

R: 116 / I: 5 / P: 14 [R] [G] [-]

Project Thread

ITT: Share projects and scripts created by you/anons

1. Hydrus Project (*booru taggins system with IPFS)



2. Guacman Chatbot (a TayAI replacement)


(source code in some file sharing site instead of github)

R: 27 / I: 3 / P: 14 [R] [G] [-]

what the fuck is actually going on

>be musclehead works on-field because that's what i'm good for

>occasionaly repair laptops (replace lcd,keyboards .etc) / pcs (upgrade parts, reinstalling OS, getting pirated games) / flashing android phones

>central office suddenly needs one more sysadmin guy

>he's mid age guy, in next 6 month he need to take a month off because his wife needs C-section, this happened few years ago that's why the top dog doesn't want the sysadmin position get empty

>once internal recruitment open, everyone recommends me because i'm their "tech jesus"

>the words eventually heard by HR and i got called, i got tasked to assist sysadmin from now on


>my friends in workshop keep encouraging me because i'm young and i'm suppose to advance more steps than them (they were 28-35 yo and i'm way younger)

>they keep saying it's going to be ok and make sure to visit sometimes because they might need help on something or just play CS on LAN together

>ended taking the job on early january and visit my bros every 2 week when i'm on day off

>sysadmin job starts smoothly, he's a cool guy

>every single PC which uses windows 7 are properly licensed, for granny on finance uses debian and got costumized almost looks like windows

>it just for gsuite works and basic printing, no need for installing for office suite as the works done entirely in browser

>the browser set up with umatrix and will break for sites which outside of gsuite

>some PC which locked on windows 7 and can't upgrade because we need it for specific proprietary cad/cam software

>every morning sysadmin dude always spent 2-3 hours to reads latest blogpost for CVEs, threatlist, securelist and whatever on his rss server and plays WOW/ESO afterwards

>once daily routines are done, he'll update the hosts blocklist and push it to his git repo, update on users pcs are monthly though

>almost all PC conditions are actually stored in git (like pc number, license, parts list, latest condition, who uses it, reverse autossh port for remote vnc)

>the git is actually stored on his thinkpad with slackware, all ports except charger line are filled with epoxy. peak hakerman i've ever seen for now

>fast forward to current_month while he's start taking days off

>everything are peaceful and under control

>suddenly got called from one user asking why is his pc antivirus keep blinking if a connection has been blocked

>apparently msiexec.exe is trying to access some scrambled russian domain, after quick searching it was one of ransomware domain

>ayylmao.jpeg ayylmao.zip ayylmao.tar.gz ayylmaos.7z

>quickly added the domain on host blocklist so the antivirus stop screaming

>after shits under control i tried to msg the sysadmin guy, he says it's weird because all of our instances are up to date, no crack ever used, no user ever got access to install things or running some random program off flashdrive

>only got told to be cautious to watch security news and windows update

i can't think anymore attack vector on our workstation, we paid heck for everything windows, corel, adobe. for other program we're using 7z for archives, sumatrapdf for top dog epaper if they want to view cad drawings.

phones are never in same network with worktation, most phones are yellow-black screen or symbian nokias. the latest-tech lady are using blackberry that only has EDGE broadband.

where are those virus thing are come? zerodays on company that barely have 40 pc? or is it even possible from the router? we're still using TP-link from ISP and it's really giving me paranoia seeing RCE for routers even though we're behind NAT

or is it even possible the virus comes from DNS? because my sysadmin guy just tells me that few months ago we're redirected to a site when mistyping something in HTTP. the redirection page from ISP contains js-based ransomware that poking baidu domain. after DNS changed to google'sdns, the problem go away for few week but now it's back.no matter DNS we use it's still got randomly redirected, or if the site is in HTTP it'll get injected with ads from ISP. how this dns fuckery could be stopped?

i also wish i could se what users pc is trying to access on web browser so i could notice if they "accidentaly" poking russian or israeli sites and somehow take countermeasure. what kind of knowledge do i need for this monitoring things?

sorry anon i was never that bright kid and probably repeatedly using fucked keyword on search engine but i'm willing to reads and learn for this sysadmin job

R: 45 / I: 1 / P: 14 [R] [G] [-]

Is FOSS over?

How do you get into FOSS?

Everyone says "just help your favorite FOSS project with patches, lamo" but in reality all the FOSS projects are fiercely maintained by a handful of people who don't want no outsiders poking around "their" programs.

Add to this the fact that by now most open software has been taken over by SJWs who will just as fiercely prevent anyone new from taking power away from them.

How do we make FOSS great again?

Is it even possible?

R: 17 / I: 1 / P: 14 [R] [G] [-]

making a living in I.T. (freelance)

hey guys... i have been homeless for many years now and without a computer, since about 2014....(an eternity in computer years...)

i hate android phones and i refuse to take any mobile device seriously as a piece of technology

it is 2019 now, about 4-5 years later...and i am trying to pick up from where i left off, making a living on the internet

i am thinking something along the lines of pc repair and freelance coding or freelance web-design...i cannot stand any form of internet marketing, "sales - pitching", capitalism or unscrupulous/dishonest sort of gimmicks, the type of which you see in the information technology industry

R: 49 / I: 12 / P: 14 [R] [G] [-]

New secret-spilling flaw affects almost every Intel chip since 2011


>Security researchers have found a new class of vulnerabilities in Intel chips which, if exploited, can be used to steal sensitive information directly from the processor.

>The bugs are reminiscent of Meltdown and Spectre, which exploited a weakness in speculative execution, an important part of how modern processors work. Speculative execution helps processors predict to a certain degree what an application or operating system might need next and in the near-future, making the app run faster and more efficient. The processor will execute its predictions if they’re needed, or discard them if they’re not. Both Meltdown and Spectre leaked sensitive data stored briefly in the processor, including secrets — such as passwords, secret keys and account tokens, and private messages. Now some of the same researchers are back with an entirely new round of data-leaking bugs.

>“ZombieLoad,” as it’s called, is a side-channel attack targeting Intel chips, allowing hackers to effectively exploit design flaws rather than injecting malicious code. Intel said ZombieLoad is made up of four bugs, which the researchers reported to the chip maker just a month ago. Almost every computer with an Intel chips dating back to 2011 are affected by the vulnerabilities. AMD and ARM chips are not said to be vulnerable like earlier side-channel attacks.

>ZombieLoad takes its name from a “zombie load,” an amount of data that the processor can’t understand or properly process, forcing the processor to ask for help from the processor’s microcode to prevent a crash. Apps are usually only able to see their own data, but this bug allows that data to bleed across those boundary walls. ZombieLoad will leak any data currently loaded by the processor’s core, the researchers said. Intel said patches to the microcode will help clear the processor’s buffers, preventing data from being read.

>Practically, the researchers showed in a proof-of-concept video that the flaws could be exploited to see which websites a person is visiting in real-time, but could be easily repurposed to grab passwords or access tokens used to log into a victim’s online accounts.

>Like Meltdown and Spectre, it’s not just PCs and laptops affected by ZombieLoad — the cloud is also vulnerable. ZombieLoad can be triggered in virtual machines, which are meant to be isolated from other virtual systems and their host device. Daniel Gruss, one of the researchers who discovered the latest round of chip flaws, said it works “just like” it does on PCs and can read data off the processor. That’s potentially a major problem in cloud environments where different customers’ virtual machines run on the same server hardware.

>Although no attacks have been publicly reported, the researchers couldn’t rule them out nor would any attack necessarily leave a trace, they said.



R: 48 / I: 5 / P: 14 [R] [G] [-]

Eye of the Lynx: imageviewer aimed at browsing porn

I released version 1.1.0, it fixes excessive ram usage, several files that used to fail to load, including due to paths with unicode in them.

I also added a few small features.


I've been using it myself for fapping for a few months and have been quite satisfied so far with it.

R: 22 / I: 2 / P: 14 [R] [G] [-]

How do you feel about the future of "GNU/Linux"?

R: 55 / I: 21 / P: 14 [R] [G] [-]

Future Tech Trends

So I've been reading about computer and telescopic contact lenses for a while, and it seems so long ago now that the thought of it becoming mainstream tech just isn't even worth pondering. But honestly, it's the only tech leap worth exploring other than virtual goggle style developments (imo). Even bluetooth phone holograms like the proposed "cicret" bracelet seem kinda meh to me now. And I'd also hate to see these contact lenses appear miraculously during the spread of 5G.


What do you anons feel should be the next big leap?

R: 12 / I: 0 / P: 14 [R] [G] [-]

Post-collapse infrastructure

How do we organise to build crude international networks that replicate the internet in the face of the impending collapse of society?

R: 18 / I: 7 / P: 14 [R] [G] [-]

/tech/ A/V Club

>What TV/Receiver/Projector are you using?

>How many speakers do you have?

>What are you buying?

>What are you watching/playing?

I just got an LG C9. Other then being disappointed with eARC, it looks and performs great! Now I'm looking to get a receiver with HDMI 2.1 and a PC that'll be able to do 4K @ 120hz.

R: 15 / I: 0 / P: 14 [R] [G] [-]

Is there a non-invasive Phone/Tablet OS?

Is there a non-invasive OS I can use on my phone and my tablet?

I don't trust nor want this android crap, but I don't want to be screwed either. I want to be able to still make calls and send texts. I want to browse online without every keystroke and website being monitored.

R: 400 / I: 97 / P: 14 [R] [G] [-]

ThinkPad (and Toughbook) thread

Dell Precision edition. As usual, the old one hit 400 posts again.

>tfw your M6500 died and all you're left with is this M4300 and two Pentium era Precisions

R: 15 / I: 2 / P: 15 [R] [G] [-]

[https://archive.ph/4v4gt] https://newspunch.com/microsoft-release-word-politically-correct/

[http://archive.fo/L9BsS] https://www.foxnews.com/tech/microsoft-ai-word-politically-correct

>Bill Gates’ Microsoft is set to release a new version of Word that will use artificial intelligence to ensure you remain “politically correct” at all times while writing.

R: 21 / I: 2 / P: 15 [R] [G] [-]

How would you create the next generation of imageboards?



R: 84 / I: 4 / P: 15 [R] [G] [-]

Your Compiler is Backdoored

Countering "Trusting Trust"


web.archive.org/web/19961220000813/http://www.acm.org/classics/sep95/ this is an archive of the dead link in the top of the article

>Way back in 1974, Paul Karger and Roger Schell discovered a devastating attack against computer systems. Ken Thompson described it in his classic 1984 speech, "Reflections on Trusting Trust." Basically, an attacker changes a compiler binary to produce malicious versions of some programs, INCLUDING ITSELF. Once this is done, the attack perpetuates, essentially undetectably. Thompson demonstrated the attack in a devastating way: he subverted a compiler of an experimental victim, allowing Thompson to log in as root without using a password. The victim never noticed the attack, even when they disassembled the binaries -- the compiler rigged the disassembler, too.

>This attack has long been part of the lore of computer security, and everyone knows that there's no defense. And that makes this paper by David A. Wheeler so interesting. It's "Countering Trusting Trust through Diverse Double-Compiling," and here's the abstract:

>An Air Force evaluation of Multics, and Ken Thompson's famous Turing award lecture "Reflections on Trusting Trust," showed that compilers can be subverted to insert malicious Trojan horses into critical software, including themselves. If this attack goes undetected, even complete analysis of a system's source code will not find the malicious code that is running, and methods for detecting this particular attack are not widely known. This paper describes a practical technique, termed diverse double-compiling (DDC), that detects this attack and some unintended compiler defects as well. Simply recompile the purported source code twice: once with a second (trusted) compiler, and again using the result of the first compilation. If the result is bit-for-bit identical with the untrusted binary, then the source code accurately represents the binary. This technique has been mentioned informally, but its issues and ramifications have not been identified or discussed in a peer-reviewed work, nor has a public demonstration been made. This paper describes the technique, justifies it, describes how to overcome practical challenges, and demonstrates it.

There have been cases out in the wild of this, a high profile one only a couple years ago, but I have to dig it up. Most people, even in the security industry, don't know about this type of attack, and almost no one even tries to even mitigate it. It's tough enough to get people, even developers, to compile their own code; but now they have to compile it from multiple possibly new compilers and then do extra work beyond that.

R: 18 / I: 1 / P: 15 [R] [G] [-]

Android Blacklist > Which phones should I stay away from?

Call me a BotFag for actually making this thread, as I already know owning an Android is a terminal illness (all phones are, so it's meaningless), but if you had a list of Android phones/manufacturers you'd rather stay from, and some you would actually recommend, I'd be inclined to see your list and why.

These are the rules if you want to recommend a Good Android Phone:

>No Chinese Companies (Taiwan doesn't count)

>No Foreign Companies bought out by China

>No absence of Headjack (obvious, and also de-facto no phones thinner than tin-foil)

>Easy Root Activation Process

>Has to at least work (no processors under quad-core)

>Bonus points for ability to change the OS

But hey, what do I know, I'm just a dumb-ass for not wanting to look it up, entertain me...

R: 14 / I: 3 / P: 15 [R] [G] [-]

Has Anyone Taken The Ploverpill?


R: 22 / I: 1 / P: 15 [R] [G] [-]

Purism unveils new VPN and other services

>Purism isn’t only about designing and producing secure hardware and software, and we have just added a neat bundle of services to our offer:

>Encrypted chat – simple end-to-end encrypted chat, VoIP, and video calling.

>Encrypted mail – easy to use, end-to-end encrypted email.

>Encrypted VPN – toggle your connection to a secure VPN tunnel.

>Public social – safe and privacy-respecting social media account.

>At Purism, we are a Social Purpose Company. We don’t exploit you (and, by our own philosophy and contract, we can’t exploit you). We don’t offer advertising services to third parties. We don’t track users. We don’t look at, sell, or share anything – we offer a simple subscription model.

>Librem One is a subscription service, using open standards and free software, and it is available for $7.99/mo, or $71.91/yr for the four services. Librem One does offer a basic tier, with encrypted chat and public social, for a pick-your-price from free to $5.99/mo. Librem One bundles popular, convenient services into a single, easy-to-use account – with more services are to be added over time.


R: 60 / I: 6 / P: 15 [R] [G] [-]

Is this the future of the internet?

R: 16 / I: 3 / P: 15 [R] [G] [-]

Do lead developers still sneak in backdoors for themselves?

R: 16 / I: 3 / P: 15 [R] [G] [-]

Linux distros are basically gender ideology applied to the tech world.

R: 19 / I: 6 / P: 15 [R] [G] [-]

Quick Question

Does anyone know exactly what type of IDE port this is? (IDE is what I've been told, I may be wrong.)

R: 119 / I: 6 / P: 15 [R] [G] [-]

A fork() in the road

Microsoft BTFO UNIX weenies

>The received wisdom suggests that Unix’s unusual combination of fork() and exec() for process creation was an inspired design. In this paper, we argue that fork was a clever hack for machines and programs of the 1970s that has long outlived its usefulness and is now a liability. We catalog the ways in which fork is a terrible abstraction for the modern programmer to use, describe how it compromises OS implementations, and propose alternatives.

>As the designers and implementers of operating systems, we should acknowledge that fork’s continued existence as a first-class OS primitive holds back systems research, and deprecate it. As educators, we should teach fork as a historical artifact, and not the first process creation mechanism students encounter.


R: 35 / I: 9 / P: 15 [R] [G] [-]

Win32/Linux is happening


>Beginning with Windows Insiders builds this Summer, we will include an in-house custom-built Linux kernel to underpin the newest version of the Windows Subsystem for Linux (WSL). This marks the first time that the Linux kernel will be included as a component in Windows.

I don't know what to do with this feel

R: 14 / I: 1 / P: 15 [R] [G] [-]

That feeling when you finally realize tech chans are filled with nothing but larpers and shitposters

R: 18 / I: 1 / P: 15 [R] [G] [-]

Recode Daily: Inside 8chan — a nexus of radicalization on the internet

Dear fellow white supremacists,

a couple of days ago there has been an article published:


After recent events, we think there's a need for a place to post announcements for certain events that are about to happen, i.e. taking a trip to the nearest mosque or synagogue ;)

And for that reason, we've set up a chan on Bitmessage that everyone can use to inform others of such events or post anything he wants, i.e. offer his services or products and which also functions as a decentralized sort of hub.

To do that simply write a message to the following address:


Don't just rely on centralized sites, where messages can be deleted or data seized.

This is a service to the community and we hope that you will use it to create a long-lasting hub and home for like-minded people.

Yours sincerely,

Die Musiker des Staatsstreichorchesters

R: 10 / I: 2 / P: 16 [R] [G] [-]

>go to deepdotweb.com

>right click view page source


R: 16 / I: 1 / P: 16 [R] [G] [-]

Nothing I hate more than being giving a bit of tech, only to discover it's got that BEND OVER AND LET TRANSSEXUALS FUCK YOU UP THE ASS Code Of Conduct with it.

Have some Adolf, biological males.

R: 88 / I: 15 / P: 16 [R] [G] [-]

DIY Semiconductor Fabrication

How cool would it be to be able to break away from our jewish masters by becoming self reliant with respect to our electronics? Well, this thread is to discuss this possibility. Also useful skills to have for rebuilding civilization after a global catastrophe.

I'll begin the thread by making a couple question and hope somebody who's not a faggot knows the answer:

1. Why do we need hydrofluoric acid to remove the oxide layers in silicon? Is it possible to use something easier to get, like lye or hydrochloric acid? (why not?) HF is possible to get in a diluted state from rust removers (with some contaminants) but still kinda hard to get.

2. Is it possible to make liquid semiconductors for printable chips at home? A common inkjet printer has 4 ink receptacles, that should be enough for P and N semiconductors, an insulator, and a conductive ink, in theory allowing us to cheaply 3D print most kinds of integrated circuits (at a large integration scale, but still). The problem is getting the inks, and if we're going to buy them we might as well buy the whole thing.

3. Is it possible to make tin oxide or zinc oxide point contact transistors? It is a semiconductor but I don't understand how it would have to be doped or what the electrodes would have to be made of to make a bipolar transistor.

I understand it's easy to make a transistor on P type germanium or silicon substrates by passing high currents through phosphorous bronze electrodes to form the N regions, but what to use for the intrinsic N type semiconductors that I mentioned? Would aluminum contacts work?

4. What would be the best way to get silicon crystals without just ordering wafers from ebay? Would cannibalizing monocrystalline solar panels and sanding them/etching them with acid be a good option?


Relevant cuckchan thread https://warosu.org/g/thread/S67611160

Sam Zeloof's channel explaining more or less from beginning to end how to make a MOSFET chip and some other stuff like an asher https://www.youtube.com/watch?v=TrmqZ0hgAXk

DIY zinc stuff


Home made point contact transistors



R: 65 / I: 9 / P: 16 [R] [G] [-]

Hacker Spaces

I joined a hacker space recently thinking I would finally be able to learn all about electronics and realized I don't know what I actually want to actually do there. A few years ago when I was still in high school I wanted to be around like minded people interested in electronics and computers but never knew where to start (the closest I got to that was lurking and posting here and joining a robotics club where they didn't let me do or teach me anything). Now that I've joined this facility, I want to work on projects but tasks I thought would be simple seem to be too hard for me at my current skill level and I have no idea where to even start. What's worse is that projects that I can do at home seem meaningless because even if they seem fun in concept, it all seems pointless in the end while I learn nothing. For example I was planing on modifying a piratebox to try and host a custom forum and doom server off it's local connection for tenants at my friend's apartment I'm sure there's a better way of doing this but bear with me. While doing research on how I would achieve this I realized that nobody would actually use this and I would be doing a fuck ton of work to basically have normalfags talk to each other from their apartment rooms with their, more likely than not, uninteresting thoughts. This happens to me for basically every project I can do and I don't know what to do about it.

TL;DR I have access to a hackerspace. What should I do with it.

R: 76 / I: 4 / P: 16 [R] [G] [-]

Brave Browser

>making money just by using a browser


all other browsers are inferior now

R: 88 / I: 15 / P: 16 [R] [G] [-]

Video codec wars

>AV1 gradually getting out of the experimental stage but still suffering from snail-tier encoding

>MPEG trying to squeeze every last remaining shekel out of HEVC, thinking that hardware encoders in every $20+ GPU will save a codec that has never and will never be used for end-user livestreaming

>Intel releasing AVX-512 optimized encoders for AV1 and VP9

>h.264 going strong as VP9 is still too slow for real-time encoding while HEVC remains a licensing minefield only useful for Animu scene encodes

>MPEG working on VVC, forms the Media Coding Industry Forum ostensibly to avoid another patent licensing clusterfuck, promises 30-50% bitrate savings over HEVC by 2021

>Divideon trying to capitalize on the situation by offering the royalty-based XVC meme codec using patented tech to the extent that a single licensing scheme can allow, with similar video quality to AV1 and supposedly greater encoder performance

>Codemumkey still hasn't added AV1 support to 8chan

Who is likely to win?

When will proprietary software be outlawed?

R: 11 / I: 1 / P: 16 [R] [G] [-]

So how does /tech/ feel about the atomic pi?

So the atomic pi just came out and is sold put already. It performs better than a raspberry pi 3 but is affected by spectre. I feel like most people are going to stick with rock64 or raspberry pi but it could be useful as a spare pc for nom secure tasks.

R: 47 / I: 7 / P: 16 [R] [G] [-]

Is taking steps to stay anonymous online ultimately futile?

Running open source browsers with anti ad and tracking features at least guarantee big corporations can't as easily gather data on you but this is about where the ease ends.

For example, lets say your next step is downloading software to further configure your computer for privacy, like email clients, torrent clients, virtual machines, misc productivity tools, etc. You download these through Tor but your ISP still knows you're connecting to Tor, so how the fuck am I supposed to download software to evade prying eyes when those prying eyes will, by my download activity, be able to determine I am trying to evade them and probably take steps to do le sneaky shit. Obviously, you'd use a tustworthy and transparent VPN along with Tor, but YOU CAN'T GET THE FUCKING VPN COMPLETELY ANONYMOUSLY EITHER. You can pay with crypto but the steps you take to buy crypto will be known so they know you; 1. are into crypto 2. used it to purchase a VPN. Yeah, maybe you're off the grid after these two steps by this time you've probably done so much internet research on this they've got a nice little log and can get a good idea of what you're trying to do and why. They know XYZ user purchased a VPN with crypto and will keep tabs on you.

Am I supposed to get a burner laptop and configure it somewhere else besides my own house, load all the installers onto an encrypted usb, and load it onto my desired computer? If I do that, who can still see what software I run on my computer? What the FUCK

R: 450 / I: 97 / P: 16 [R] [G] [-]

Some arrogant inconsiderate cunt just turned off all my extensions.

Where can I find my Tampermonkey scripts on the filesystem? (win10)

R: 73 / I: 4 / P: 16 [R] [G] [-]

The end of encryption (We are fucked)

Within the next 10 years, NOTHING digital will be safe anymore. Quantum computing has guaranteed that all encrypted packets ever sent can now be decrypted and traced by the NSA if you're a valuable enough target.


So what the fuck are we supposed to do? Quantum computers will be used near exclusively to crack down on and trace people on a mass scale using either Shor's algorithm or an even more optimized method.

This could literally be the end of anonymity.

R: 217 / I: 57 / P: 16 [R] [G] [-]

Get ready for mass human die off, skyrocketing cancer rates, thanks To 5G

Our current cell phone technology produces electromagnetic radiation that damages male fertility, and the radiation produced by the new 5G technology will be much more powerful and therefore much more dangerous. But most people don’t know about this. Instead, most people are greatly looking forward to the rollout of 5G technology because it will be up to 100 times faster than our current 4G technology, and who wouldn’t want that? The big cell phone companies will be spending hundreds of billions of dollars to install hundreds of thousands of new 5G antennas, and every single one of those antennas will be constantly emitting very powerful electromagnetic radiation. Since we can’t see the radiation, to many people the threat does not seem real, but the truth is that if you live in a major urban area you are constantly being bombarded by it. And once the new 5G network is completely rolled out, you would literally have to live in the middle of nowhere to get away from it completely.

5G is a quantum leap from 4G, but because the smaller 5G waves do not travel as well, a lot more antennas will be required…

In order to achieve faster speeds, 5G relies on millimeter waves, which are even smaller than microwaves and operate at a higher frequency. These smaller waves are more easily absorbed by buildings, trees and other things (like people), so more towers will be needed in order to maintain connectivity. The industry has created specialized “small cell” stations and new, larger base stations to accommodate the demands of 5G tech. Even so, it’s expected that a small cell will need to be installed every 250 meters in cities for 5G to work properly. There will be one on every street corner.

In addition, 5G technology is “ultra high frequency and ultra high intensity”…

5G cell towers are more dangerous than other cell towers for two main reasons. First, compared to earlier versions, 5G is ultra high frequency and ultra high intensity. 1G, 2G, 3G and 4G use between 1 to 5 gigahertz frequency. 5G uses between 24 to 90 gigahertz frequency. Within the RF Radiation portion of the electromagnetic spectrum, the higher the frequency the more dangerous it is to living organisms.

So basically the radiation that we will constantly be absorbing will be much, much, much more powerful than before, and the sources emitting the radiation will be much closer to us.

Are you starting to get the picture?

If that wasn’t bad enough, an investigation conducted at a university in Israel discovered that the surface of the human body actually draws 5G radiation in “like an antenna”…

What’s further disturbing about 5G radiation is how the human body responds to and processes it. Dr. Ben-Ishai from The Hebrew University of Jerusalem discovered as part of a recent investigation that human skin acts as a type of receptor for 5G radiation, drawing it in like an antenna.

“This kind of technology, which is in many of our homes, actually interacts with human skin and eyes,” writes Arjun Walia for Collective Evolution about the study.

“… human sweat ducts act like a number of helical antennas when exposed to these wavelengths that are put out by the devices that employ 5G technology,” he adds.

Okay, now let’s talk about fertility.

Several early studies found that our current cell phone technology has a negative affect on male fertility…

A 2005 mouse study found “a significant genotoxic [DNA-damaging] effect on…spermatozoa.”

A 2007 rat study found “significantly higher incidence of sperm cell death,” suggesting “that carrying cellphones near reproductive organs could negatively affect male fertility.” And a 2009 rat study found that the radiation from cellphones “negatively affects semen quality and may impair male fertility.”



R: 90 / I: 7 / P: 16 [R] [G] [-]


>corporate spyware

>Code of conducts & normie fuckery instead of actual work

>Still no year of the linux desktop

>Linux has been subverted by systemd fuckery

>Horrible flat UI interfaces that strain my eyes everywhere

>Actual government spyware all around

>still no truly secure computing

>Rampant javashite bloatware that forces you to upgrade your hardware

>software doesn't last and shit you write today doesn't last more than a couple years because everything breaks all the time and no one cares about writing lasting software

I'm so tired of technology.

How do I unplug if tech is all I know?

R: 14 / I: 2 / P: 16 [R] [G] [-]

GNU nano 4.2 "Tax the rich, pay the teachers"

Why are commies so stupid?


R: 28 / I: 10 / P: 16 [R] [G] [-]

GNU nano 4.2 "Tax the rich, pay the teachers" released



How does it feel to be surrounded by a bunch of commie retards in the free software movement?

R: 166 / I: 32 / P: 16 [R] [G] [-]

hidden copy of windows 3.1

i hid a copy of windows 3.1 inside this photo just open it with winrar or

7zip that is if theres some sort of system that would remove the files from the photo its self on this image board

R: 20 / I: 2 / P: 17 [R] [G] [-]

Rest In Piss, SJW-browser.

S to spit on it's grave.

R: 16 / I: 6 / P: 17 [R] [G] [-]

Multix II

We have enough discussion of UNIX brain damage here, so it's high time for a real change. Multix II is a programmer-friendly distributed Functional OS topology. This enables extreme-Agile teams to introduce AI-driven LEAN software JIT composition, collaboration, live interactivity, language mixing, multi-layered coding surfaces and other advanced Dev, Test and DevOps technologies. You can now have effective use of AI-automation within your PLM & SDLC processes, significantly improving productivity.

To all your weenies out there who don't immediately grasp the significance of this, I'll explain. Multix II is a Functional OS inspired by Multics with a HTML user interface using Rho Calculus where the operating system is the monad. It makes heavy use of Applied Category Theory, Persistent Memory, Single Level Memory, and is 100% free of UNIX brain damage as it is developed by NYC bankers and Estonians instead of lambda calculus-addicted East Coast Silicon Valley weenies. It also takes inspiration from blockchain, relational database, and spreadsheet technology, advances that weenies have been slow to understand the true significance of.




Operating Systems Need an Overhaul
Functions should be first-class objects for starters. Another is direct
Kleisli support for JSON within the shell. Or how about support for
Kleisli joins and workflow? Handling continuations (lazy eval) at the
filesystem level? On the productivity side, Kan extensions should
handle much of the busy work of scaling out DevOps without having
to rip up code. The system should be able to split out lambdas
automatically at runtime. The list goes on and on.

In other words, Yoneda.
Yeah we know it is all madness drugs etc. to daring to challenge the
Big Tech status quo and take the industry forward into the future.
Category theory has always been controversial for this reason.
Some ideas are out of this world.

R: 12 / I: 6 / P: 17 [R] [G] [-]

What's the deal with autocorrect?

When I misspell words or use chanspeak, I get weird autocorrections.

Oftentimes the word has some weird connotation to it if you think about it, it's related to the word in either a denigrating or spoopy way. Why is this?

R: 54 / I: 13 / P: 17 [R] [G] [-]

More normie tech spying



>Crashed Tesla vehicles, sold at junk yards and auctions, contain deeply personal and unencrypted data including info from drivers' paired mobile devices, and video showing what happened just before the accident.

>(...) the computers on Tesla vehicles keep everything that drivers have voluntarily stored on their cars, plus tons of other information generated by the vehicles including video, location and navigational data showing exactly what happened leading up to a crash, according to two security researchers.

Elon fags will defend this.

Librecar when?

R: 45 / I: 7 / P: 17 [R] [G] [-]

What the heck is with this trend of taking a modern computer and using it solely to emulate a 40 year old microprocessor? It's just a damn pi every time. It would be interesting to see a retro-style console made from actual hardware, but this? Even chink hackers are more ambitious than these 'makers' and their pi shit when they make their plug'n play consoles.

R: 14 / I: 0 / P: 17 [R] [G] [-]

Should I learn Lisp if I hate Jews?

R: 40 / I: 2 / P: 17 [R] [G] [-]

I spent an hour and a half making this hyper autism, unreadable chart of all the imageboard software I could find. Anything I should add?

R: 103 / I: 10 / P: 17 [R] [G] [-]

John Carmack - writing Rust code feels very wholesome

I'm still completely in the excited-newbie honeymoon phase, but writing Rust code feels very wholesome.


R: 36 / I: 3 / P: 17 [R] [G] [-]



SpeedGate is a sport that some AI faggots came up with. I wanted to archive the website and link that here, but the website is generated from JS in real time (because that's apparently necessary to describe a sport,) rendering archiving useless. Eventually, I had to screencap the website 18 times and stitch the parts together in GIMP to create pic related.

The game seems alright for backyard fun; thing is, it really wasn't that much work on the part of the software. The sport was dreamed up by a series of ANNs that were being run on an (((Nvidia))) cluster along with many other possible games and this one was the one that made the most sense (others were games that involved exploding frisbees and underwater freerunning.)

Although the sport seems decently fun, it seems that the creators are complete faggots. I'm not sure about my own opinion of this sport, but it at least seems like a technically impressive feat.

R: 111 / I: 14 / P: 17 [R] [G] [-]

Best GUI

I'm looking for a multiplatform (Windows and Linux) GUI design platform. So far, everything I tried was utter shit. QT threw an useless error message on my first run and it's tremendously bloated.

The best stuff I've tried so far is wxWidgets but it's worse than VB6 in all aspects.

Do you have any suggestions? I'm looking for stuff available since 1996 in Win32 land but even that low bar seems impossible to overcome with multiplatform GUI systems.

Pic related: this is the best the open source community has to offer when it comes to GUI design (outside of QT). Word 97 looked better than that.

R: 19 / I: 3 / P: 17 [R] [G] [-]

is this accurate?

10 charqacter limit

R: 16 / I: 0 / P: 17 [R] [G] [-]

Mechanical HDDs Can Be Used As Microphones Now


>Turning a hard drive into a listening device doesn’t have anything to do with its data storage capabilities. Instead, the team leveraged the sensors that help control the position of the read head above the platters.

>Any vibration can alter the position of a hard drive, so a modern hard drive is sensitive enough to pick up even minute disturbances in the platter. Yes, even human speech shows up in the PES data.

Long story short, the signal needs to be loud and the attacker needs physical access, but HDDs can be turned into microphones now.

R: 25 / I: 4 / P: 17 [R] [G] [-]

Take the UNIX Hater pill

I hear many people talking about their UNIX addiction. The thing is that they rarely understand that UNIX is truly addictive.

I remember back in the day when I weighed 260 pounds and felt miserable, I lived on UNIX. It was a staple in my religion. I bought 2 licenses of UNIX System V. I gorged on them, had ed sandwiches and smothered my shellscripts in metacharacters.

My body ached, I was lethargic and depressed..

Thankfully, hypnosis changed my life. I used hypnosis for UNIX addiction as well as for weight loss and overall lifestyle change.

The result is that today I have a large amount of no desire for UNIX. I lost about 115 – 120 pounds and I feel great.

My hypnosis for weight loss program can help you too. If you are struggling with UNIX addiction or just want to lose weight, call or email me now. Together, no matter where you may live, we can develop a hypnosis program for you.

Pic related, it's what all you UNIX weenies look like.

.............'.... .......''','.........'''.. ............................'. ................................. .'............',,................... . .'............''','................... . .'.............'........................ . ...,;;;,,;:cc:,'..... .. ........... . .',:ccccclodddl:;;;:;'.. .... .... . .,;::cccclloodddoooool:'... ... ... . .,;;;;:::ccllloodddddolc;....... ...... . .''...',;;;;;;:::cllllllc;'....... ... . .','''...,,'...',,;;;;;:cll:,.......... .. .::,..''..,;,''.''',;;,,;:::c:,.... ..''.. . ,cc;'.''',::,,;,''''',,;::ccclc;......,;;.. .,::;,,,;ccc::::;;;::ccllllllcc;,.....,::'. .:::::::cc:::clllllloolllllccc:;,,''''::. ... .,;::;,,,,,,;:loooolllcccc::::::;;,,,;:,. .... .,;;;,,'',;::::cccccccc:::;;;;;;;;;;;,'........ .',;,,;:::clcc::cccc::::;;;;;;;;;;;,............ .',coollooooooc::c:::;;,,,,,,,;;,,'............ .;okOOOOOOOOOOxl:::::;;,,,,,,;;;;,,..........'.. .:c:;,:xOOOOOOOOOOOOOkdlc:;;;;,;;;;;;;;,,'''''...''.''.. .';clloooodddkO0OOOOOOOOOkxdolc::;;;;;;;;;;,,'',,'''''.';:c;'.. ..':oddxxddxxkkxxkOOOOOOOOkkdollloooc:::;;;;;;,,,,,,,,,''',;:::::ll;,,,'.... ;dddoooooddddxkO0K00OkkkOOkxdllllllll::::;;;,,,,,;;,;;;,'',;::::cldddxxxxxxdl .':oxxdolldxxdolloookOOOkxkxdolcclllllllc;;;;,,,,,,;::::;,'';;;::::looodddddoodo .;ldolllloddxkOOOkddxkOOkkkkdolcccccclllc:,,,,,''''';ccc:,'',,'.',;coddoollodddool 'lddolc;;::::cllloxkkkxxxxdolccccccccc:;,..''''...';:c:;,'''...',;clddolc:,,;:clll .:lllllccc:::::ccloxdxxxdoc::cccccclc;...........';::::,.....',,;cllollllccc:;;:;, .;:;,,,;:cc:;;::clloddxdlcccllllcc:;............,;:c::;'.';;:;,,;;;::;,;:c::cc:;;, .',,,,....',;;;,'',,,;:ccccclolc:;,.. ...',;,,,,,,;cloolllcc:;;::,,:;'.'',',, ',;;,,,,''...........'''',;:cccc::;'...........,;;;;;;;;::;:looooooooolclc:;:;,,,;::c cc:;;,''''...... .........';:c::;'.......... ....,;::::::,..;ccccccc:;::;,;;;:cccc:;; ccc::;,...... ........,;;,.. ....'''..';;;,,;:::::;,,,;;;;,,;;,;;'..,;:;::::;;; clcc:;'.... ..... ........... ....',;;::cc::;;::ccoo:;::::c::cllllc,',,,,;;;::::: ccc:;,'... .................... ....,,,;;::ccccclllooc:ccc:::cccccc:;,,;;;;;;;;;;: cc:;,'.. ................ ......',;;;;;;;,,,,,,,,,,;:cllllcccc:,,,,;;,,,,;;:::ccc ::;,'......''''.....................',;cccccccc:::::::::::ccccloooc:;,..',;:clllccccc ;,'.........'',,''''..............''',;;;::::::::ccccccccccc:ccccc:;;'.,:ccc::;;;;::: '''',,,,,,'...',,,,,,''......'',,;;;,''''''''''',,,,;;;;;;:::ccc:;,,'.':cc::;;;;::ccc ',::::;;;;:,.....',,,,,,'''',,;;;,,'',;::;;,,,'''''''.....',;:cc:::,..,:cccc:::ccllol

R: 164 / I: 28 / P: 17 [R] [G] [-]

Haskell is causing global warming

or at least it would, if anyone used it


R: 33 / I: 1 / P: 17 [R] [G] [-]

Canvas fingerprinting

>canvas fingerprinting

This shit is a privacy nightmare. Every website you visit can generate a hash which is unique to your device. Yet, spoofing it makes you even more unique.

How do we defeat this sort of tracking ? Tor browser has a feature which sends a blank canvas, but it's not a sufficient solution for everyday browsing

R: 53 / I: 2 / P: 18 [R] [G] [-]

I have $1000 to donate to tech . How can I use it to best help fix this clusterfuck situation?

R: 15 / I: 0 / P: 18 [R] [G] [-]

EFF screeches about police sockpuppets on (((Facebook)))

Sounds like someone's salty about his dealer getting arrested.

>Despite Facebook's repeated warnings that law enforcement is required to use "authentic identities" on the social media platform, cops continue to create fake and impersonator accounts to secretly spy on users. By pretending to be someone else, cops are able to sneak past the privacy walls users put up and bypass legal requirements that might require a warrant to obtain that same information...

>EFF is now calling on Facebook to escalate the matter with law enforcement in the United States. Facebook should take the following actions to address the proliferation of fake/impersonator Facebook accounts operated by law enforcement, in addition to suspending the fake accounts.

<As part of its regular transparency reports, Facebook should publish data on the number of fake/impersonator law enforcement accounts identified, what agencies they belonged to, and what action was taken.

<When a fake/impersonator account is identified, Facebook should alert the users and groups that interacted with the account whether directly or indirectly.


R: 36 / I: 3 / P: 18 [R] [G] [-]

Brighteon - a platform for uncensored videos?

Many times I've seen /tech/ asking for a decent youtube alternative. Well today I just found this by accident. You can find political, conspiracy, health etc. videos in there. All exploring alternative content that would be censored on youtube. Unfortunately you have to get an invitation to register. But at least there's now a youtube without censorship. Even flat earth videos are allowed!

R: 131 / I: 17 / P: 18 [R] [G] [-]

Removing printer micro dots

Is there anyway to remove printer micro dots using modified firmware or physical hacks? It seems to me eventually they will crack down on political fliers by tracking down the sources.

R: 12 / I: 10 / P: 18 [R] [G] [-]

Temps thread

Post CPU temperatures, I wanna see how hot your machines are.

R: 101 / I: 12 / P: 18 [R] [G] [-]

>free software is communism

>open source is communism

>intellectual property is enforced by the government

>governments around the world add more restrictions regarding user freedom and do nothing but try to constrain people when doing code(see North Korea os)

How come communists try to appropriate free software and open source philosophy when they are actually the opposite? Are they that clueless about what they defend or are they just trying to pull as many retards as possible on, even if by lies and deceit? I mean, of course (((the ones behind communism))) are trying to do just that so that they can rule over, but even the would be underclass retarded drone are sinking that low?

This shit is so retarded.

R: 26 / I: 0 / P: 18 [R] [G] [-]

Linear volume control


>there's still software with linear volume controls

>top third of the fader/slider range does virtually nothing

>middle third changes volume somewhat but not much

>bottom third changes volume rapidly down to 0

How is this still a thing?

R: 38 / I: 3 / P: 18 [R] [G] [-]

Python in Firefox

[http://archive.fo/b023H] https://hacks.mozilla.org/2019/04/pyodide-bringing-the-scientific-python-stack-to-the-browser/

What could possibly go wrong?

Also since when did mozilla.org replace their favicon to a communist star?

R: 24 / I: 4 / P: 18 [R] [G] [-]


Except from this image, what is wrong with scrum? I have seen people shitting on it in here, that's why I ask. To me it looks like a more dynamic way of translating requirements into measurable results.

The only negative thing I think of is it does take a bit of fun out of programming

R: 37 / I: 5 / P: 18 [R] [G] [-]

Hey /tech/, yes Im "from" 4chan and so are 95% of you fucks. Anyways, I'm curious about what you peoples think about privacy and security on mobile networks. I can do what is possible on my end and Im def interested in the librem5 when it comes out, but its seems like no matter what you are forced into a illusion of choice for mobile internet. every 3 months or so a scandal comes out that your mobile provider has sold your data for example:




etc ad nausem.

My point is I can do what i can on my end but I cant make my own mobile network. Anyway around this besides just throwing my fucking phone away?

R: 11 / I: 3 / P: 18 [R] [G] [-]

I think this can teach people to software engineer if they spend five years reading it.

R: 14 / I: 0 / P: 18 [R] [G] [-]

NIST Lightweight Crypto Standardization

There are several emerging areas (e.g. sensor networks, healthcare, distributed control systems, the Internet of Things, cyber physical systems) in which highly-constrained devices are interconnected, typically communicating wirelessly with one another, and working in concert to accomplish some task. Because the majority of current cryptographic algorithms were designed for desktop/server environments, many of these algorithms do not fit into constrained devices.

NIST has initiated a process to solicit, evaluate, and standardize lightweight cryptographic algorithms that are suitable for use in constrained environments where the performance of current NIST cryptographic standards is not acceptable. NIST has published a call for algorithms (test vector generation code) to be considered for lightweight cryptographic standards. The deadline for submitting algorithms has passed.

NIST will hold a workshop on November 4-6, 2019 in Gaithersburg, MD, to discuss candidate algorithms, including design strategies, implementations, performance, cryptanalysis, and target applications.

July 20-21, 2015 First Lightweight Cryptography Workshop at NIST

October 17-18, 2016 Second Lightweight Cryptography Workshop at NIST

August 11, 2016 (Draft) NISTIR 8114 is published.

October 31, 2016 End of public comment period to Draft NISTIR 8114 Public comments received (August 11 - October 31,2016)

March 28, 2017 NISTIR 8114 Report on Lightweight Cryptography is published.

April 26, 2017 (Draft) Profiles for Lightweight cryptography standardization process is published.

May 14, 2018 (Draft) Submission Requirements and Evaluation Criteria for the Lightweight cryptography standardization process is published..

May 14, 2018 Federal Register Notice is published.

June 16, 2017 Public comments received (April 26 - June 16, 2017)

June 28, 2018 End of public comment period to the submission requirement. Public comments received (May 14-June 28, 2018).

August 27, 2018 Federal Register Notice is published

August 27, 2018 Submission Requirements and Evaluation Criteria for the Lightweight Cryptography Standardization Process is published.

January 4, 2019 Early submission deadline for early feedback

February 25, 2019 Submission dealine

March 29, 2019 Amendment Deadline

April 18, 2019 Announcement of the Round 1 Candidates

November 4-6, 2019 Third Lightweight Cryptography Workshop at NIST