[ / / / / / / / / / / / / / ] [ dir / chaos / choroy / colombia / funegros / imouto / miku / tacos / voat ]

Catalog (/tech/)

Winner of the 36th Attention-Hungry Games
/alcoholism/ - The Attention-Hungry Games are the Dark Souls of Hunger Game Simulators
[Create a thread]
Sort by: Image size: [Show all] Archive
R: 1 / I: 0 / P: 1 [R] [G] [-]

Welcome to /tech/ - ∞chan's technology board.

Please check the rules before you post:


Looking for hardware or software recommendations? Check out the InstallGentoo Wiki:


/tech/ is for the discussion of technology and related topics.

/tech/ is NOT your personal tech support team or personal consumer review site. We have stickies for that. Keep those kinds of posts in there.

For tech support, software recommendations, and other questions that don't warrant their own thread, please use the '/tech/ Questions and Support' sticky.

For consumer advice, please use the consumer advice sticky located below.

For meta discussion, please go to >>>/metatech/.

For desktop threads, homescreen threads and ricing, please go to >>>/rice/.

For tech support/issues with computers:

https://startpage.com/ or https://ixquick.com (i.e., fucking Google it)



If you can't find what you're looking for and still need help, post in the tech questions sticky.

Looking to switch over to GNU/Linux? Don't know where to start?




∞chan Android apps





The Case Against Google Chrome


/tech/ FAQs - Email Services


/tech/ FAQs - DuckDuckGo


/tech/ Resources and Information


Windows 7 Telemetry Removal


/tech/ IRC

irc://irc.rizon.net #/tech/



You can search the catalog for a specific term by using:


Always check the catalog before creating a thread.

To use the Code tag, book-end your body of code with:


This is a SFW board; however, NSFW (Nudity, gore, etc.) material may be uploaded so long as it is spoilered. If you are browsing at work or similar, assume spoilered images are not safe for work.

If you see any posts that break the rules, please report them. Thanks!

You can find the public /tech/ volunteer action log at https://8ch.net/log.php?board=tech

To appeal a ban longer than 1 week, feel free to use the email provided or use the built-in appeal system. Be sure to attach a screenshot of your ban message when submitting an appeal via e-mail.

R: 400 / I: 94 / P: 1 [R] [G] [-]

/tech/ Questions and Support

Bring all your hardware, software and other troubles here.

R: 400 / I: 57 / P: 1 [R] [G] [-]

Consumer Advice

Looking to buy something but aren't sure what to get? Ask here.

R: 44 / I: 3 / P: 1 [R] [G] [-]

Lessons from the Legends

There's a lot we can learn from the great programmers of our time. What follows is a list of quotes from them relevant to /tech/...

>I have a mouse, but don't have a mouse driver for MINIX and have never felt the need to write one. Typing "rm x y z" is a lot faster than clicking five times and then having to convince the system that you really, truly, mean it and this is not a mistake and that you are consenting adult over 18 and that you completely understand the consequences and you still want to do it.

>I can type faster than I can point. And my mother told me that pointing is impolite.

>UNIX does not allow path names to be prefixed by a drive name or number; that would be precisely the kind of device dependence that operating systems ought to eliminate.

>The only real argument for monolithic systems was performance, and there is now enough evidence showing that microkernel systems can be just as fast as monolithic systems.

- Andrew S. Tanenbaum

>From an operating system research point of view, Unix is if not dead certainly old stuff, and it's clear that people should be looking beyond it.

>Unix has retarded OS research by 10 years and linux has retarded it by 20.

>Steve Jobs has said that Xwindows is brain-damamged and will disappear in two years. He got it half-right.

>One of the obvious things that went wrong with Multics as a commercial success was just that it was sort of over-engineered in a sense. There was just too much in it.

- Dennis Ritchie

>Avoiding complexity reduces bugs.

>I started Linux as a desktop operating system. And it's the only area where Linux hasn't completely taken over. That just annoys the hell out of me.

>I'd like to point out that I don't think that there is anything fundamentally superior in the GPL as compared to the BSD license, for example. But the GPL is what I want to program with, because unlike the BSD license it guarantees that anybody who works on the project in the future will also contribute their changes back to the community.

>Security people are often the black-and-white kind of people that I can't stand. I think the OpenBSD crowd is a bunch of masturbating monkeys, in that they make such a big deal about concentrating on security to the point where they pretty much admit that nothing else matters to them.

>A computer is like air conditioning - it becomes useless when you open Windows

>And what's the Internet without the rick-roll?

- Linus Torvalds

>Proprietary software tends to have malicious features. The point is with a proprietary program, when the users dont have the source code, we can never tell. So you must consider every proprietary program as potential malware.

>If the users don't control the program, the program controls the users. With proprietary software, there is always some entity, the "owner" of the program, that controls the program and through it, exercises power over its users. A nonfree program is a yoke, an instrument of unjust power.

>Writing non-free software is not an ethically legitimate activity, so if people who do this run into trouble, that's good! All businesses based on non-free software ought to fail, and the sooner the better.

>Paying isn’t wrong, and being paid isn’t wrong. Trampling other people’s freedom and community is wrong, so the free software movement aims to put an end to it, at least in the area of software.

>Free software' is a matter of liberty, not price. To understand the concept, you should think of 'free' as in 'free speech,' not as in 'free beer'.

>I've read that male dolphins try to have sex with humans, and female apes solicit sex from humans. What is wrong with giving them what they want, if that's what turns you on, or even just to gratify them?

>I'm the last survivor of a dead culture. And I don't really belong in the world anymore. And in some ways I feel I ought to be dead.

- Richard Stallman

R: 8 / I: 1 / P: 1 [R] [G] [-]


Why haven't you installed Void on your PS4 yet /tech/?

R: 323 / I: 58 / P: 1 [R] [G] [-]

/ipfs/ - IPFS thread


0.4.10 - 2017-06-27

>Ipfs 0.4.10 is a patch release that contains several exciting new features, bugfixes and general improvements. Including new commands, easier corruption recovery, and a generally cleaner codebase.


>Add support for specifying the hash function in ipfs add

>Implement ipfs key {rm, rename}

>Implement ipfs shutdown command

>Implement ipfs pin update

>Implement ipfs pin verify

>Implemented experimental p2p commands

0.4.9 - 2017-04-30

>Ipfs 0.4.9 is a maintenance release that contains several useful bugfixes and improvements. Notably, ipfs add has gained the ability to select which CID version will be output.


>Add support for using CidV1 in 'ipfs add'

tl;dr for Beginners

>decentralized P2P network

>like torrenting, but instead of getting a .torrent file or magnet link that shares a pre-set group of files, you get a hash of the files which is searched for in the network and served automatically

>you can add files to the entire network with one line in the CLI or a drag-and-drop into the web interface

>HTTP gateways let you download any hash through your browser without running IPFS

>can stream video files in mpv or VLC (though it's not recommended unless the file has a lot of seeds)

How it Works

When you add a file, the files are cryptographically hashed and a merkle tree is created. These hashes are announced by the IPFS client to the nodes in the network. (The IPFS team often describes the network as a "Merkle forest.") Any user can request one of these hashes and the nodes set up peer connections automatically. If two users share the same file then both of them can seed it to a third person requesting the hash, as opposed to .torrent files/magnets which require both seeders use the same file.


>Is it safe?

It's about as safe as a torrent right now, ignoring the relative obscurity bonus. They are working on integration with TOR and I2P. Check out libp2p if you're curious.

>Is it fast?

Finding a seeder can take anywhere from a few seconds to a few minutes. It's slowly improving but still requires a fair bit of optimization work. Once the download starts, it's as fast as the peers can offer, just like a torrent.

>Is it a meme?

You be the judge.

It has implementations in Go (meant for desktop integration) and Javascript (meant for browser/server integration) in active development that are functional right now, it has a bunch of side projects that build on it, and it divides important parts of its development (IPLD, libp2p, etc) into separate projects that allow for drop-in support for many existing technologies.

On the other hand, it's still alpha software with a small userbase and has poor network performance.

Websites of interest


Official IPFS HTTP gateway. Slap this in front of a hash and it will download a file from the network. Be warned that this gateway is slower than using the client and accepts DMCAs.


Pomf clone that utilizes IPFS. Currently 10MB limit.

Also hosts a gateway at gateway.glop.me which doesn't have any DMCA requests as far as I can tell.


IPFS index, has some links (add ipfs.io/ before to access without installing IPFS)

R: 46 / I: 19 / P: 1 [R] [G] [-]

>find thread on forum that seems to have my exact problem

>it's marked as solved

>PM sent :^)

Why is this still the fucking case? What could possibly be so secret that you need to send it as a PM?

R: 17 / I: 1 / P: 1 [R] [G] [-]

Microphone Botnet


This can't be real.

<guy talks about dog toys

<Google shows dog toys Ads


R: 31 / I: 2 / P: 1 [R] [G] [-]

Wow, it seems finally the FOSS world will have a game development suite, it seems is the final year of games in linux.

I mean, a single argentinian autists literally BTFO a multibillion company with hundreds of employees.


Is this the power of autism?

R: 141 / I: 11 / P: 1 [R] [G] [-]

Cloudflare DNS

>Cloudflare, a well-known Internet performance and security company, announced the launch of—world's fastest and privacy-focused secure DNS service that not only speeds up your internet connection but also makes it harder for ISPs to track your web history.

>Cloudflare has changed this game with its new free DNS service, which it claims, will be "the Internet's fastest, privacy-first consumer DNS service," promising to prevent ISPs from easily tracking your web browsing history.

>The company has also promised not to sell users’ data, instead to wipe all logs of DNS queries within 24 hours. It's also working with auditors at KPMG to examine its systems and guarantee it's not actually collecting your data.


Can it be trusted? It has a faster response time then Google's DNS which is impressive.

R: 76 / I: 7 / P: 1 [R] [G] [-]

I've been writing C for about two years now. I have a solid grasp on the fundamentals but I'm interested in:

- Reducing code re-use

- Writing military-grade safe applications

Are there any intermediate/advanced texts out there that explore generic programming and ultra-safe code?

R: 24 / I: 2 / P: 1 [R] [G] [-]

build systems

What is the best build system?

Which build system do you use?

R: 29 / I: 0 / P: 1 [R] [G] [-]

Anonymous/Secret Web Hosting... WITHOUT TOR

Leaving aside the issues of TOR and TOR browser, the CP and the vulnerabilities, sometimes it's just not a real option for your website, but you want to maintain your privacy anyways. It seems like it is possible to host on clearnet without getting compromised. TPB hasn't had any major arrests in a long time, and their servers are very resilient, showing that it's possible to evade the wrath of the FBI and MPAA cartel while giving people a clearnet website to connect to. Here's a somewhat vague article on their setup:


I guess my main questions are these:

The article says that the real servers are hidden because the user-facing servers have an encrypted connection to the real servers. But couldn't NSA/GCHQ/etc just look at the patterns of web requests coming from the user-facing servers?

And what's the main entry point for end users? The proxy server? The load balancer?

How would one go about creating a setup with a main server hidden behind other servers?

R: 51 / I: 21 / P: 1 [R] [G] [-]


This board sucks so let's have a fun /tech/ thread

R: 9 / I: 0 / P: 2 [R] [G] [-]

What is the ideal browser to people to this board and what language it should be written in? How hard is it too make a browser from scratch and what skill level is needed for one or a group to build it?

R: 110 / I: 15 / P: 2 [R] [G] [-]

Which one and why?

R: 105 / I: 21 / P: 2 [R] [G] [-]

Microsoft has shown us the future where everything in your house is collecting data and sending it back to Microsoft.

R: 53 / I: 8 / P: 2 [R] [G] [-]

Intel just got BTFO

R: 138 / I: 33 / P: 2 [R] [G] [-]

Apple Proposes Emojis of Disabled People


Who is actually going to use these?

R: 67 / I: 5 / P: 2 [R] [G] [-]


What's the general consensus on ReactOS? Kind of seems like a "worst of both worlds" thing to me (having done little research).

R: 375 / I: 38 / P: 2 [R] [G] [-]

ThinkPad (and Toughbook) thread

Old one hit 400 posts again.

>tfw my X32p needs more GPU voltage but I can't solder for shit

R: 38 / I: 3 / P: 2 [R] [G] [-]




>getting rid of python2

>almost completely removing gtk2


All great things that Fedora has done FIRST. There's a reason developers prefer Fedora over other distros. They make out with the old ONLY if there's a better alternative.

(unlike canonicuck with sysv -> upstart)

tl;dr fedora 28 is almost here install it

R: 17 / I: 3 / P: 2 [R] [G] [-]


What vpn do you use and why do you use it?

Lets hold a general VPN discussion. Please nothing of "if you have nothing to hide" bullshit please.

R: 191 / I: 19 / P: 2 [R] [G] [-]

Is it finally the time to dump Firefox and its forks?

Now, Firefox has been making shitty anti-user decisions for YEARS, and they keep piling up. Removing the ability to disable javascript completely (and removing many settings in general). Anti privacy shit like pocket, google / yahoo as default search engines, and a bunch of unsolicited connections and other shit that requires huge scripts to disable (https://github.com/pyllyukko/user.js/). Removing support for many addons. It goes on and on.

Anyway...all Firefox forks are dependent on Firefox in the end. IceCat has a team behind it, I guess, but does not stray much from FF. It has many of the same issues. Waterfox is made by one guy? And Palemoon is the least worst, but still - it lacks support for many addons, and how long can it keep up with the security fixes and such? It will become outdated soon.

So what's the solution? Clearly, addons are essential, so meme browsers like netsurf or links are out of consideration. The other browser giant is Chrome, which spies on you, and apparently Chromium as well. It has many forks but the only one worth anything is Iridium, so I think that should be used. Regardless, time to throw Firefox and friends to the trash.

R: 22 / I: 4 / P: 2 [R] [G] [-]

>have an encrypted 1 TB drive full of childhood photos, whole unencrypted iphone and ipod backups you made as a kid, your whole [deleted] facebook takeout archive, several [autistic but well-written] files kept on your friends and colleagues including screen shots, whatsapp exports and voice recordings, lots of virtualbox machines that you have no idea what you've done in them, and lots of embarrassing porn

>lose it one and half years ago

>thank to all gods because it was encrypted



>it dawns on you that there was a slight possibility of it being not encrypted at that moment because around that time you lost back-up keys to encryption, and might have half-assed it and not encrypted it back


R: 106 / I: 17 / P: 2 [R] [G] [-]

Stop using harmful software.

R: 365 / I: 38 / P: 2 [R] [G] [-]

Terry A. Davis:

Hobo Edition

Latest news:

>currently in San Diego

>disability check has been blocked by Terry's family

>streaming daily on https://www.youtube.com/channel/UCJZTn-fPu-uIA55UI47_cXg

Old thread: https://archive.fo/acSYN

Terry's archive: https://archive.org/download/TerryADavis_TempleOS_Archive/

R: 27 / I: 2 / P: 2 [R] [G] [-]

Telegram Founder Pledges Millions in Bitcoin For VPNs and “Digital Resistance”


<A massive wave of action to block messaging service Telegram resulted in widespread collateral damage yesterday after Russian authorities ordered millions of IP addresses blocked across the country. But the efforts have only lit a fire under Telegram founder Pavel Durov, who has pledged to donate millions of dollars in bitcoin to VPN providers as part of his "Digital Resistance".

>Starting yesterday, Russia went to war with free cross-platform messaging app Telegram. Authorities including the FSB wanted access to Telegram’s encryption keys, but the service refused to hand them over.

>As a result, the service – which serviced 200,000,000 people in March alone – came under massive attack. Supported by a court ruling obtained last Friday, authorities ordered ISPs to block huge numbers of IP addresses in an effort to shut Telegram down.

>Amazon and Google, whose services Telegram uses, were both hit with censorship measures, with around 1.8 million IP addresses belonging to the Internet giants blocked in an initial wave of action. But the government was just getting warmed up.

>In an updated posted by Pavel Durov to Twitter from Switzerland late last night, the Telegram founder confirmed that Russia had massively stepped up the fight against his encrypted messaging platform.

>Within the last two days, Russia blocked over 15 million IP addresses in attempts to ban Telegram on its territory. Regardless, Telegram remained available for the majority of Russia’s residents #digitalresistance

>Of course, 15 million IP addresses is a huge volume, particularly since ‘just’ 14 million of Telegram’s users are located in Russia – that’s more than one IP address for each of them. As a result, there are reports of completed unrelated services being affected by the ban, which is to be expected given its widespread nature. But Russia doesn’t want to stop there.

>According to Reuters, local telecoms watchdog Rozcomnadzor asked both Google and Apple [Update: and APKMirror] to remove Telegram from their app stores, to prevent local citizens from gaining access to the software itself. It is unclear whether either company intends to comply but as yet, neither has responded publicly nor taken any noticeable action.

>An announcement from Durov last night thanked the companies for not complying with the Russian government’s demands, noting that the efforts so far had proven mostly futile.

<“Despite the ban, we haven’t seen a significant drop in user engagement so far, since Russians tend to bypass the ban with VPNs and proxies. We also have been relying on third-party cloud services to remain partly available for our users there,” Durov wrote on Telegram.

<“Thank you for your support and loyalty, Russian users of Telegram. Thank you, Apple, Google, Amazon, Microsoft – for not taking part in political censorship.”

>Durov noted that Russia accounts for around 7% of Telegram’s userbase, a figure that could be compensated for with organic growth in just a couple of months, even if Telegram lost access to the entire market. However, the action only appears to have lit a fire under the serial entrepreneur, who now has declared a war of his own against censorship.

<“To support internet freedoms in Russia and elsewhere I started giving out bitcoin grants to individuals and companies who run socks5 proxies and VPN,” Durov said.

<“I am happy to donate millions of dollars this year to this cause, and hope that other people will follow. I called this Digital Resistance – a decentralized movement standing for digital freedoms and progress globally.”

>As founder of not only Telegram but also vKontakte, Russia’s answer to Facebook, Durov is a force to be reckoned with. As such, his promises are unlikely to be hollow ones. While Russia has drawn a line in the sand on encryption, it appears to have energized Durov to take a stand, one that could have a positive effect on anti-censorship measures both in Russia and further afield.

R: 79 / I: 5 / P: 3 [R] [G] [-]

Teamspeak-like server for socialising online

Any of you guys use/host some sort of teamspeak server or other (preferably self-hosted) voice chat platform ? I had a TS server I used to hangout on for years, just casually speaking to people, working on projects whilst idling in a channel, etc... But it's been dying, to the point where barely anyone shows up anymore. Anything to recommend ?

R: 26 / I: 3 / P: 3 [R] [G] [-]

The Failure of Moore's Law

We had CPUs clocked at 3.0GHz+ in the early 2000s. They've been beclouding their lack of progress by increasing the cache, adding more cores, and adding more threads. At what point will progress stagnate completely? What will happen then?

R: 25 / I: 0 / P: 3 [R] [G] [-]

Google Lawsuit: Senior Engineer Alon Altman Wanted to Sabotage Trump’s Android Phone, Ban His Gmail

>Alon Altman, a senior software engineer at Google, pressured the company to sabotage President Trump’s Android phone, according to new evidence released via James Damore’s class-action lawsuit against the company. Calling on the tech giant to use the “full economic force [of] Google for good”, Altman also suggested deleting the gmail accounts of Trump, his administration, and his aides for “abuse.”

>Altman – who is still employed by the tech giant – also called on Google to blacklist “alt-right’ sites on the Google ad network (she falsely included Breitbart News in this category — an assertion refuted by a Harvard and M.I.T. study), and take down all “alt right videos” from YouTube. She also called on the tech giant to remove “neo-Nazi sites such as ‘The Daily Stormer'” from the Google search index.

>Altman has been employed at Google for seven years, and according to inside sources, is one of the most radical leftists at the company. She was named as one of the key architects of political discrimination at Google by a whistleblower we interviewed last August. As we have reported, she has previously called on the company to discipline or terminate any employee who agreed with James Damore’s viewpoint diversity manifesto, which argued that there was an atmosphere of political intolerance at Google. Google seemed to follow at least one of Altman’s suggestions, effectively kicking The Daily Stormer off the internet in August 2017, a move that was condemned even by the left-leaning Electronic Frontier Foundation (EFF). While Google did not follow Altman’s suggestion to remove Breitbart News from its ad network, its employees have begun advising clients to steer clear of Breitbart News, as we exclusively reported in February. More evidence that Google’s ad departments are trying to undermine the revenue of conservative sites has just been released via the Damore lawsuit. According to the lawsuit, when Google’s “Large Customer Sales” (LCS) team learned that the Canadian conservative news site The Rebel Media had been targeted by the far-left group Sleeping Giants, they used this as an excuse to advise clients to remove ad placements from conservative websites. In a template email to Google clients, Marshall Self, Director of Agency at Google, recommended that clients take advantage of Google’s “wide number of controls, including placement exclusions and filters for political content” to remove ads from specific sites, apps, YouTube channels and videos.

>This is the latest information that has been released as part of the Damore lawsuit. Yesterday, we reported that Google cautions many of its managers against rewarding behavior that caters the values of “white-male dominant culture,” including “meritocracy,” “individual achievement” and “avoiding conflict.” Three new plaintiffs have joined Damore’s lawsuit against Google, which alleges that the company discriminates against white, Asian, male, and conservative individuals.


R: 52 / I: 6 / P: 3 [R] [G] [-]

Which phone is popular amongst NSA agent?s

They must be paranoid about spying. What special phone do you think they would be using?

R: 1 / I: 0 / P: 3 [R] [G] [-]

Apple is on suicide watch now

https://www.youtube.com/watch?v=oNl2q6YZXlA — Apple sues iPhone screen repair shop and loses! (by Louis Rossmann) I youtube-dl'ed this one just in case

hxxps://www.youtube.com/watch?v=9-NU7yOSElE — Apple can't fix iMac Pro for any amount of money, nor can it sell replacement parts

It's near a tipping point now when normies might start to think about it.

R: 11 / I: 2 / P: 3 [R] [G] [-]

Software engineers

How come so many software "engineers" suck at their job? How do they get their jobs? How come no one fires them?

Why are so many programmers so fucking bad?

How can all of this sustain itself?

R: 28 / I: 2 / P: 3 [R] [G] [-]

Why do compilers not warn about this?

Compile with

>-Wall -Wextra -pedantic -O2 -Weffc++ -Wconversion

struct Object {
: member{4}

void mutate() {

int member;

struct Foo {
Foo(Object& obj)
: obj{obj}

void use_object() {

Object& obj;

struct Bar {
: f{obj}
, obj{}

Foo f;
Object obj;

int main() {
Bar b{};

R: 35 / I: 3 / P: 3 [R] [G] [-]

In a Leaked Memo, Apple Warns Employees to Stop Leaking Information


>Apple Inc. warned employees to stop leaking internal information on future plans and raised the specter of potential legal action and criminal charges, one of the most-aggressive moves by the world’s largest technology company to control information about its activities.

>The Cupertino, California-based company said in a lengthy memo posted to its internal blog that it "caught 29 leakers," last year and noted that 12 of those were arrested. "These people not only lose their jobs, they can face extreme difficulty finding employment elsewhere," Apple added. The company declined to comment on Friday.

>Apple outlined situations in which information was leaked to the media, including a meeting earlier this year where Apple’s software engineering head Craig Federighi told employees that some planned iPhone software features would be delayed. Apple also cited a yet-to-be-released software package that revealed details about the unreleased iPhone X and new Apple Watch.

>Leaked information about a new product can negatively impact sales of current models, give rivals more time to begin on a competitive response, and lead to fewer sales when the new product launches, according to the memo. “We want the chance to tell our customers why the product is great, and not have that done poorly by someone else,” Greg Joswiak, an Apple product marketing executive, said in the memo.

>The crackdown is part of broader and long-running attempts by Silicon Valley technology companies to track and limit what information their employees share publicly. Firms like Google and Facebook Inc. are pretty open with staff about their plans, but keep close tabs on their outside communications and sometime fire people when they find leaks.

>Facebook executive Sheryl Sandberg last week talked about her disappointment with leakers. In 2016, Google fired an employee after the person shared internal posts criticizing an executive. The employee filed a lawsuit claiming their speech was protected under California law.

>In messages to staff, tech companies sometimes conflate conversations employees are allowed to have, such as complaining about working conditions, with sharing trade secrets, said Chris Baker, an attorney with Baker Curtis and Schwartz, PC, who represents the fired Googler. "The overall broad definition of confidential information makes it so employees don’t say anything, even about issues they’re allowed to talk about," he said. "That’s problematic."

>Apple is notoriously secretive about its product development. In 2012, Chief Executive Officer Tim Cook pledged to double down on keeping the company’s work under wraps. Despite that, the media has continued to report news on the firm to satisfy demand for information on a company that’s become a crucial part of investment portfolios, many of which support public retirement funds for teachers and other essential workers.

>In 2017, Apple held a confidential meeting with employees in another bid to stop leaks. Since then, publications, including Bloomberg News, published details about the iPhone X, a new Apple TV video-streaming box, a new Apple Watch with LTE, the company’s upcoming augmented-reality headset, new iPad models, software enhancements, and details about the upcoming iPhones and AirPods headphones.

R: 13 / I: 3 / P: 3 [R] [G] [-]

Why does nobody mention this? (NetBSD Appreciation Thread)

That other one.

Most anons talk about FreeBSD or OpenBSD when BSD is brought up. But never this one. Fuck, I even see more people talking about Dragonfly, and that apparently isn't even used as much as this.

What about NetBSD?

R: 69 / I: 6 / P: 3 [R] [G] [-]

Is it really the best all around language?

R: 340 / I: 47 / P: 3 [R] [G] [-]

/dgg/ - DeGoogle General

Friendly reminder that if you're a person who respects their individual privacy and freedom, there is no reason to be using the products created by the botnet that is the Google company.

There is a plethora of options available for you to replace your Google apps that are lighter, faster and better in general, including respect for freedom and privacy.

>search engine?

SearX, DuckDuckGo, StartPage, Yandex (Soviet Botnet)


Pale Moon, Waterfox, Brave, Vivaldi


Self Host, cock.li, Proton Mail, Hotmail (Still Botnet) Yandex (Soviet Botnet)

>cloud storage?

Syncthing, ownCloud, Nextcloud

app store?

F-Droid, Yalp for Play Store front end


NewPipe for mobile, not signing in on desktop


XMPP, Signal.


Nextcloud, ownCloud, RadiCAL,


NextCloud, keep it in your emails.


RSS client, Librenews

List of Software you can Self-Host


NextCloud Providers


OwnCloud Providers,


WebMail Comparison


R: 40 / I: 1 / P: 3 [R] [G] [-]

Are professional gpu (quadro/fire pro) worth it?.

I'm a hobbyist CAD designer, is the improvement worth the investment?

R: 249 / I: 16 / P: 3 [R] [G] [-]

Machine learning engineer, AMAA

I work on machine learning as a software engineer. I'll limit answers involving my own personal details, but I'm happy to answer questions about the industry.

A lot of people, including people working on ML, think that there is too much hype around ML, but in my opinion they are just being contrarians. I actually think that ML is right now the cutting edge of technology more so than anything else. The main short term advances I expect are self-driving cars, detecting disease from genetic and gene expression data, and robotics (e.g. agricultural, medical).

R: 99 / I: 8 / P: 3 [R] [G] [-]

Best programmer language for intermediate brainlet

Just set up gentoo on my thinkpad and holidays are coming up and I was thinking about finally diving into the programming meme. What is the best programming language out of







R: 63 / I: 8 / P: 3 [R] [G] [-]

Shit no one needs/wants

When will it die already?

R: 87 / I: 15 / P: 4 [R] [G] [-]

Font thread!

Post your favorite fonts, for every font you like post another one! The purpose of this thread is to get the best fonts flowing faster. Discuss your favorite fonts and feel free to share your opinion on fonts you dislike. If you have the skill, make your own!

Font renaissance inbound!

R: 22 / I: 1 / P: 4 [R] [G] [-]

GPUs becoming cheaper?

Is it me, or are GPUs suddenly becoming cheaper? Pic related is a Sapphire RX Vega 56 Nitro+ which went from 800€ to 750€ in less than a day. Cryptoniggers calling it quits?

good fucking god, 750+€ for a Vega 56.. and I am glad I bought my RX480 for only 250€ back in 2016

R: 152 / I: 13 / P: 4 [R] [G] [-]

Is a single skilled developer more efficient than 100 pajeets?

R: 277 / I: 42 / P: 4 [R] [G] [-]

FreeBSD internal discussion of the code of conduct got dumped.

Download link: my.mixtape.moe/nhbsi.mbox

Source: https://twitter.com/blakkheim/status/969610276810186753

R: 234 / I: 50 / P: 4 [R] [G] [-]

Guys! She figured out how cd works!


Why is shit like this getting circulated?

R: 176 / I: 10 / P: 4 [R] [G] [-]

/mg/ - Software and Hardware Minimalism General

For discussing software and hardware minimalism and minimal computing lifestyle.

>What is computing minimalism?


>Why software minimalism?

- Fewer bugs

- Better performance

- Lower memory footprint

- Better maintainability

- Higher scalability

- Longer software lifetime

- Smaller attack surface

>List of minimal OSes and distros


>Minimal programs lists

Alternatives to Bloatware: https://github.com/mayfrost/guides/blob/master/ALTERNATIVES.md

Window Managers: https://en.wikipedia.org/wiki/Comparison_of_X_window_managers

Suckless: https://suckless.org/rocks

Cat-v.org: http://harmful.cat-v.org/software/

Minimalism is not a lack of something. It's simply the perfect amount of something.

R: 13 / I: 0 / P: 4 [R] [G] [-]

What went wrong?

R: 69 / I: 26 / P: 4 [R] [G] [-]

CLOUD Act passes in congress

Tired of winning yet?

Because of this failure, U.S. and foreign police will have new mechanisms to

seize data across the globe. Because of this failure, your private emails,

your online chats, your Facebook, Google, Flickr photos, your Snapchat videos,

your private lives online, your moments shared digitally between only those

you trust, will be open to foreign law enforcement without a warrant and with

few restrictions on using and sharing your information. Because of this

failure, U.S. laws will be bypassed on U.S. soil.

As we wrote before, the CLOUD Act is a far-reaching, privacy-upending piece of

legislation that will:

Enable foreign police to collect and wiretap people's communications from U.S.

companies, without obtaining a U.S. warrant. Allow foreign nations to demand

personal data stored in the United States, without prior review by a judge.

Allow the U.S. president to enter "executive agreements" that empower police

in foreign nations that have weaker privacy laws than the United States to

seize data in the United States while ignoring U.S. privacy laws. Allow

foreign police to collect someone's data without notifying them about it.

Empower U.S. police to grab any data, regardless if it's a U.S. person's or

not, no matter where it is stored.


R: 50 / I: 6 / P: 4 [R] [G] [-]

Intel CPUs Vulnerable to New 'BranchScop

>Researchers have discovered a new side-channel attack method that can be launched against devices with Intel processors, and the patches released in response to the Spectre and Meltdown vulnerabilities might not prevent these types of attacks.

>The new attack, dubbed BranchScope, has been identified and demonstrated by a team of researchers from the College of William & Mary, University of California Riverside, Carnegie Mellon University in Qatar, and Binghamton University.

[http://archive.is/zCbUG] https://www.securityweek.com/intel-cpus-vulnerable-new-branchscope-attack

[http://archive.is/5i2S3] https://arstechnica.com/gadgets/2018/03/its-not-just-spectre-researchers-reveal-more-branch-prediction-attacks/

R: 359 / I: 36 / P: 4 [R] [G] [-]

Best apps in F-droid?

R: 9 / I: 0 / P: 4 [R] [G] [-]

phone number

Are there any websites where I can get a phone number without having to use my real name?

R: 17 / I: 4 / P: 4 [R] [G] [-]

Librebooted Amd Laptops?

Will kernel 4.16.2 ever will successfully open up my encrypted harddrive with xts-aes-plain64?

Who knows?

R: 237 / I: 41 / P: 4 [R] [G] [-]



>Tl;DR: AMT is remotely vulnerable via default passwords

Tech was right again!

Sorry I keep posting ET; they're just my favorite site

R: 21 / I: 4 / P: 4 [R] [G] [-]

New Forms of Computing

Let's talk about computers.

We're starting to hit hard physical limits with our plain old transistor-based electronic computing, electron tunneling is already beginning to interfere with our attempts to make transistors smaller than 8nm or so function properly. The current culture seems to be pushing quantum computers using photon polarity or electron spin as the way forwards, but that's not the only new way of computing open to us right now. Currently I know of three other methods for new computing: Skyrmion computing, optical (photonic) computing, and memristor based computing.

Skyrmion Computing

>Leverages solid state physics and quasi-particles technically a form of quantum computing.

>Proper name is "Cavity Spintronics," part of the second quantum revolution quantum devices.

>Utilizes magnetic spin currents instead of electric currents, therefore using less energy and producing less heat.

>The magnetic swirls skyrmions have patterns much smaller than most magnetic domains, raising data density limits.

>Skyrmions have already been used to store info on magnetic material

>Room temp skyrmions exist and can possibly be used https://phys.org/news/2018-02-magnetic-skyrmion-room-temperature.html

>That means quantum computing at room temp.

>Absolute bleeding edge, active research going on RIGHT NOW!

<Absolute bleeding edge.

<Goddamn fucking complicated, condensed matter physics is no joke.

<So new that practical demonstration of this for computation is limited.

I really love the physics behind these and I really want this. Thankfully it seems pretty viable.

https://phys.org/tags/skyrmion/ Articles and papers on this, really requires your own research to get it

And here's an extremely early article to help clarify the whole "skyrmion" thing.


Optical Computing

>Basically replacing electric transistors with "optical transistors"

>We're already really good with information transfer and manipulation using light wireless communications and such.

>Photons move much faster than electrons in a circuit.

>Can also be leveraged in regular electronic computing to create hybrid computers.

>Like in using optical components to speed coordination of electronic ones e.g. coordinating processing cores.

>"Optical transistors" would have a higher bandwidth than electronic ones.

<"Optical transistors" are still theoretical, more research is needed before we can actually build one.

<Somewhat difficult to make optical to electrical conversion fast enough to prevent bottlenecks in computers

<Useful wavelengths of light are in infrared and way too big around 1000nm.

<Current workarounds bring heat problems that require extreme cooling or a new material.

I'd like laser computers, but this tech seems the least useful of the three for now.

http://archive.is/wyIzS extremetech article that actually covers this entire section


>"Memory Resistors"

>The fourth fundamental circuit element.

>Variable resistance based on previous current that has flown through it.

>Using tiny "read" charges can access a history of applied voltage.

>Was theoretical until Bell Labs found memristive properties in a material in 2008.

>Can be used for greater than binary computing due to multiple possible resistive states Largest I've heard is base-10 or so.

>Allows for easy builds of 3D devices due to structure, greatly increasing possible computing power.

>Can be used as extremely fast non-volatile memory as well as computation.

>Can more easily model neurons due to similar properties in function.

<Some people say they don't actually exist and none of this would work.

<Argument over definition of memristor and what constitutes one.

<Memristive properties only show up at nanoscale.

<Very little news and few papers about memristor tech since 2015.

<All previously announced projects seem to be dead in the water.

The closest to commercial memristor tech seems to be RRAM (Resistive RAM), which not everyone believes count.


So what do you think anon, are you wanting to switch from electronic transistor based computing?

Do you have a favorite future computer tech?

Is there anything else that might be the future instead, or do you think quantum computers are the way to go?

How long do you think we'll be using electronic transistors for if you do want the switch to happen?

R: 15 / I: 0 / P: 4 [R] [G] [-]

Ad-blocking Brave browser signs deal with Dow Jones Media Group

>Two years ago, newspapers including The New York Times, Washington Post and Wall Street Journal -- the latter published by Dow Jones Media Group parent company Dow Jones -- called Brave's ad blocking "illegal." Now, though, Dow Jones Media Group is offering a limited number of people who download Brave two years of free access to its Barrons.com website or to a premium MarketWatch newsletter.

>"As global digital publishers, we believe it is important to continually explore new and emerging technologies that can be used to build quality customer experiences," said Daniel Bernard, a senior vice president at Barron's, in a statement.

>Some publishers, perhaps seeing Brave as just another ad blocker, gave Brave a frosty reception in the company's early days, Chief Executive Brendan Eich said. But that's changed.

>"Our discussions have become much better over the years," Eich said. Dow Jones Media Group isn't the only one on board, he added. "We'll have other big publishers we're announcing as partners."


I was thinking about switching browsers to Brave when I found this. What do you guys think? Are they going to compromise the privacy of their users for these corporate deals?

R: 15 / I: 1 / P: 5 [R] [G] [-]

I have an interview for a sysadmin job tomorrow morning. What should I study to be prepared? genuine question.

R: 62 / I: 8 / P: 5 [R] [G] [-]

I'm in the process of designing my own ultra light aircraft, i need an engine between 25 and 40 hp that isn't overpriced

Its really hard to find. Do you have any tips?

R: 15 / I: 4 / P: 5 [R] [G] [-]


WTF I love Windows Spyware Edition now

This shit has been on BeOS for decades and neither GNUSTEP nor GTK nor QT support it

R: 10 / I: 3 / P: 5 [R] [G] [-]

icrosoft Windows 10 gains Linux/WSL Console copy and paste functionality

By Brian Fagioli

For better or worse, the Windows Subsystem for Linux (WSL) initiative seems to be moving full steam ahead. There are some very respectable distributions available in the Microsoft Store, such as Debian, Ubuntu, and Kali to name a few. Not to mention, Microsoft is trying to encourage even more maintainers to submit their distros with a new tool.

Apparently, some Windows 10 users have been clamoring for the ability to copy and paste both from and to WSL consoles -- a reasonable request. Well, as of Insider Build 17643, this is finally possible.

"As of Windows 10 Insider build #17643, you can copy/paste text from/to Linux/WSL Consoles!!! We know that this is a feature MANY of you have been waiting for -- our sincerest thanks for your patience and continued support while we untangled the Console's internals, allowing us to implement this feature. To ensure that we don't break any existing behaviors, you'll need to enable the 'Use Ctrl+Shift+C/V as Copy/Paste' option in the Console 'Options' properties page," says Rich Turner, Microsoft.

ALSO READ: System76 becomes GNOME Foundation Advisory Board member

Turner further explains, "This setting can be set independently for each shell or shortcut: If you pin your shortcuts to your favorite shells (e.g. Cmd/PowerShell/Linux) to your task bar, and modify the properties of Consoles launched via these shortcuts, your settings will only be made to the affected shortcuts. If you later launch the same shell via the Start menu, or the run dialog, your settings will not be found as they'll have been saved to your pinned shortcuts, not your Start menu tiles/shortcuts, or registry settings."

As you can see in the above screenshot, this is very easy to enable, and there is no reason it shouldn't eventually make its way into non-Insider versions of Windows 10. Quite frankly, it is sort of odd that this functionality wasn't included from the get-go, as it seems to be a no-brainer. Oh well -- better late than never, I suppose.


R: 351 / I: 73 / P: 5 [R] [G] [-]

Is clover OS any good?

R: 1 / I: 1 / P: 5 [R] [G] [-]



>Why people in position haven't changed the email standard to add a simple end-to-end encryption? Its hard to convince people to use GPG, as it is just unpractical to use

What needs to happen is EBD. Encryption By Default.

Users, despite the advantages of doing so, cannot be fucked to configure and keep track of all this crypto shit. They won't do it, or at least a vast majority of them won't.

Encryption needs to be transparent, invisible, something that you don't even know is there. When you go to an HTTPS website, do you have to fuck around with anything in particular? No? You just go there and it works? That's how all online communications encryption should operate. The user shouldn't even have to know it's there. But it WILL be there. Silently doing its job.

R: 70 / I: 14 / P: 5 [R] [G] [-]

Can riseup be trusted?

R: 6 / I: 0 / P: 5 [R] [G] [-]

p2p textboard design

I've implemented this most of the way (in Lua) but figured that someone would likely spot a deficiency in my design which could be fixed before I go further.

The network consists of nodes, which each "associate" with (by default) 8 other nodes which are randomly selected, and each node also stores a list of all the nodes which it knows about in the network. Each node can receive commands from clients, and then acts upon those commands. When the command involves a change to the data, the node repeats the command to each of the 8 associated nodes. The effect should be that all the nodes will eventually know of this change.

The creation of boards and posts in the network requires the completion of a simple hashcash proof of work to reduce spam. I also want to have a mechanism to remove duplicate posts, but I haven't implemented that yet (shouldn't be too hard).

Data and boards are deleted when they become old. This is to manage the size of the database.

At startup, the node has to bootstrap. This is done by having a list of "seed" nodes, one of which is almost guaranteed to be online. The node requests a list of all known nodes from a randomly selected seed node, and selects 8 of them to associate with. These 8 nodes are verified to be online at intervals of 5 minutes and if a node goes offline it is replaced by a randomly selected one from the list of all nodes.

Clients connect to the nodes using the same protocol as the nodes use to communicate with each other. Since the client and the node are separate pieces of software, many varieties of client (CLI, TUI, GUI, web etc.) may exist but I'm only going to work on the CLI version for now.

R: 44 / I: 4 / P: 5 [R] [G] [-]

ITT: silly ideas we have

I will start:

Why do we keep writing programs in plain ASCII, in text editors that come straight out of the 80's? Why don't we experiment programming without writing text? Imagine an editor where, instead of writing for loops, you spawn blocks with shortcuts? This would probably make programming much faster, as you arrange the logic much more visually. No syntax errors, fewer logic errors.

R: 35 / I: 4 / P: 5 [R] [G] [-]

Improving /tech/ with the js jew

Would it be possible to implement some js here to detect user agents, and kick off anyone using a non-free operating system?

I'm unfamiliar with both 8ch board operation and javascript so my apologies if this is a stupid question, but it seems to be possible according to https://8ch.net/tech/res/802384.html

R: 45 / I: 2 / P: 5 [R] [G] [-]

How do you take care of your eyes?

In the last few years I have been feeling the ravages of a view affected by the light emitted from a computer screen

How you take care of your eyes?

Do you have some kind of treatment?

R: 26 / I: 3 / P: 5 [R] [G] [-]


So what is the most reliable, secure, and tried and true encryption method available? What is the best software for this in the current year+2

I've heard truecrypt has been compromised years ago, but heard that old versions of it are still secure and unbreakable. does anyone know the cutoff version for truecrypt before it became compromised? i've been saving truecrypt installation files for years. some people suggest bitlocker but an encryption program is only as good as the company that made it, and i trust microsoft about as much as a trust the NSA.

What do you guys use and why do you use it?

R: 53 / I: 6 / P: 5 [R] [G] [-]

Coil Guns

Will there be a point where it will be more practical to use a coil gun compared to normal gun power weapons?

R: 18 / I: 5 / P: 5 [R] [G] [-]

Build our future

Machine Learning thread

Dump resources for building NN here. We need Tay to come back.


R: 95 / I: 29 / P: 5 [R] [G] [-]

LibbieOS - Libbie The Free Virtual Assistant

this idea of mine has been floating around for a while, I have doubts on how well this will be received but I'll be glad if you guys like it.



LibbieOS, AKA "Libbie - The Free Virtual Assistant", is a linux distro designed to work as a free alternative to Siri/Cortana/Alexa. No need to worry about government snoops or corporate stooges watching you at every turn, Libbie does what you ask of her and doesn't need to hide anything from you!


The purpose of this distro is to provide a small operating system for embedded devices to function as a free replacement to Alexa. LibbieOS has a series of scripts that can be inputted through voice commands or text terminals to do various functions for whatever you want.

LibbieOS is based on Gentoo Linux, and can be tailored for your needs the way you want it to be.

Example Commands

run <Program>
volume <number or command>
search "<query>"
remind_me_about <date> <time>
set_alarm_for <date> <time>
help <subject>

Author's Notes

I have far too many neat ideas, too little time, and burn out on motivation. Besides, this idea was way too fun to keep holed up in my head, and I wanted to share this with you guys.

by the way, "normal" is relative.

R: 50 / I: 4 / P: 6 [R] [G] [-]

>be me

>be using proxy

>fuckyeah I'm 1337

>googling song lyrics

>"displaying results from my hometown"

what the fuck? How does it know? Should I even try to cover my footprint anymore or am I jerking myself off while only wasting my time?

R: 57 / I: 8 / P: 6 [R] [G] [-]

Actual lithium cell failure mode

You now know more about this subject than anyone else you'll ever encounter in real life

R: 6 / I: 1 / P: 6 [R] [G] [-]

Two years from now 64GB sd cards will cost $70?

R: 109 / I: 17 / P: 6 [R] [G] [-]

Google is tracking you in airplane mode without a sim


R: 2 / I: 0 / P: 6 [R] [G] [-]


I'm fucking sick and tired of it, so I'm gonna ask some questions.

What programs can I use to accessibly monitor my internet traffic?

What is something I can read about to get a handle on how routing works, and how to understand the terminology used?

How the fuck can I, someone who doesn't know how to handle anything at the data-level, understand wireshark?

Is wireshark necessary? If so, how did you begin to understand it?

How do I avoid false positives and jumping at the wind?

What other programs can I use to protect myself from potential botnets?

I genuinely want to know, I'm tired of being led by the blind, I want to see things for myself!

Finally, I'm pretty sure that astroturfers are 25% of /tech/'s problem, and the remaining 75% comes from crabs-in-a-bucket faggots who'd rather "win" and be "right" in their minds than actually ATTEMPT to look for the truth.

R: 237 / I: 37 / P: 6 [R] [G] [-]

Announcing Rust 1.24

The Rust team is happy to announce a new version of Rust, 1.24.0. Rust is a systems programming language focused on safety, speed, and concurrency.

This release contains two very exciting new features: rustfmt and incremental compilation!

For years now, we’ve wanted a tool that automatically can reformat your Rust code to some sort of “standard style.” With this release, we’re happy to announce that a preview of rustfmt can be used with 1.24 stable.

Back in September of 2016 (!!!), we blogged about Incremental Compilation. While that post goes into the details, the idea is basically this: when you’re working on a project, you often compile it, then change something small, then compile again. Historically, the compiler has compiled your entire project, no matter how little you’ve changed the code. The idea with incremental compilation is that you only need to compile the code you’ve actually changed, which means that that second build is faster.

As of Rust 1.24, this is now turned on by default. This means that your builds should get faster! Don’t forget about cargo check when trying to get the lowest possible build times.

This is still not the end story for compiler performance generally, nor incremental compilation specifically. We have a lot more work planned in the future. For example, another change related to performance hit stable this release: codegen-units is now set to 16 by default. One small note about this change: it makes builds faster, but makes the final binary a bit slower. For maximum speed, setting codegen-units to 1 in your Cargo.toml is needed to eke out every last drop of performance.



R: 47 / I: 7 / P: 6 [R] [G] [-]

Music for programming

What do you computer nerds listen to while writing programs? I'm looking for stuff that isn't distracting, and doesn't have any shitty vocals ruining my train of thought.

R: 20 / I: 2 / P: 6 [R] [G] [-]

Stratis: Redhat's take on robust, ZFS-like filesystems

So I'm sure some of you are aware by now, but if not, RedHat is flat out dropping all support for BTRFS in the future.


A shame, as BTRFS has just recently made major progress towards eradicating its only real dealbreaker, broken RAID5/6 support.

>raid56 recovery: don't use cached stripes, that could be potentially changed and a later RMW or recovery would lead to corruptions or failures

>let raid56 try harder to rebuild damaged data, reading from all stripes if necessary

>fix scrub to repair raid56 in a similar way as in the case above

It's also still got the backing of SUSE, Facebook, Oracle, and Fujitsu.

However, RedHat has decided to go for its own solution, Stratis. You can read about it in depth here


but here are their plans from their requirements list

Make features easier to use in combination with each other: thin provisioning, snapshots, integrity, redundancy, multipath, encryption, hardware reconfiguration, monitoring, and a caching tier
2. Simple and comprehensive command-line interface
(a) Simple
i. Single way to do things
ii. Do not expose internal implementation details. Gives Stratis more implementation freedom, and of little value since internals are too complex to make manual user repairs practical
iii. User typically will not use on a daily basis
A. Consistent commands that a user can guess at, and probably be right
B. Require explicitness from the user for potentially data-losing operations, such as giving a “–force” option.
(b) Comprehensive
i. User must master only one tool
ii. Helps user learn: if task not possible through tool, it must not be worth doing (or a good idea)
3. Programmatic language-neutral API for higher-level management tool integration
(a) A clear next step for users after hitting the limitations of scripting the CLI
(b) Encourages tight integration and use of all features by higher-level tools
4. Event-driven monitoring and alerts
(a) Monitoring and alert messages expressed in terms of Stratis user-visible simple concepts, not implementation details
(b) Low CPU/memory overhead to monitoring
(c) Only alert when action really is needed
(d) Fail gracefully if alerts are unheeded
5. Eliminate manual resizing of filesystems
(a) Numerous problem reports throughout the years indicate that resizing filesystems is an area where users feel unease, due to potential data loss if a mistake is made. No real reason to require the user do this any more.
(b) Simpler for DevOps
(c) Makes storage “demand-allocated”, similar to virtual memory. Current technology allows us to manage a filesystem’s actual usage up (growfs) or down (thin provisioning).
6. Initrd-capable
(a) Allows root fs, all other filesystems except /boot to use Stratis. Needed for ease of use
(b) Limited environment – no Python or DBus – but can use device-mapper
7. Bootable (planned – see 11.6)
(a) Feels like a “real” filesystem if no secondary filesystem is needed for boot
(b) Enables Stratis features to be used by system image, e.g. booting from a snapshot, and allowing /boot to grow
(c) Requires explicit support in bootloader (Grub2)
(d) device-mapper not available
8. Adaptable to emerging storage technologies
(a) Persistent memory
i. Block-appearing pmem can be used by Stratis
ii. byte-addressible pmem see 11.6
9. Implementable in 1-2 years
(a) We’re already behind, waiting another 10 years isn’t an option

R: 13 / I: 0 / P: 6 [R] [G] [-]

Linux 4.17 Offers Some Promising Power-Savings Improvements

>Of the many improvements to be found in the in-development Linux 4.17 kernel -- nicely summarized in our Linux 4.17 feature overview -- one of the features I've been anxious the most to begin benchmarking has been the reported power management improvements. Here are my initial power/performance tests of Linux 4.17 that for some systems is seeing a measurable drop in power usage, even in some cases under load while without sacrificing the performance.

>The most promising power management change in Linux 4.17 is a rework of the kernel's idle loop that may lead to some systems seeing their power drop by up to 10%+.


Also, for the first time there were more lines of code removed than added. That's because some architectures got deprecated.


R: 69 / I: 8 / P: 6 [R] [G] [-]

LineageOS decides to lose some users


tl;dr builds between 1st april and 8th april have a prank which tells the user that their device is compromised and will be used to mine crypto and it's impossible to completely shut this notification off without using root shell


Do you think it's still a good idea to install LineageOS on your mom's phone?

Too bad Replicant and Copperhead support only 1.5 devices. What do?

R: 33 / I: 8 / P: 6 [R] [G] [-]

/flpg/ Flip Phone general

Discussion regarding the all-mighty flip phones

>still wasting your hard earned money on a screen that's still too small enough for media consumption

>does what phones are supposed to do

>doesn't fucking die when you drop it

R: 18 / I: 0 / P: 6 [R] [G] [-]


Katsuhiro Harada Producer of Tekken Says Denuvo Affects Performance


R: 132 / I: 11 / P: 6 [R] [G] [-]


Working on code? Post it here!

Not working on code? Open your sh-compatible shell and type `echo $(( ( RANDOM % 145 ) + 1 ))` to choose a challenge. If you have any more of these programming challenges images, please do share.




R: 42 / I: 12 / P: 6 [R] [G] [-]

/chip/ General

Hey, anon! Have you taken the chip pill? If you are a real computer enthusiast, you care about working shit at the hardware level, right?

https://www.sparkfun.com/tutorials/93 - getting started with an ATMega328, the basis for the Arduino

http://referencedesigner.com/tutorials/verilog/verilog_01.php Verilog tutorial for FPGA


Getting Started in Electronics

Whatcha buildin', anon? Whatcha want to build?

R: 237 / I: 29 / P: 6 [R] [G] [-]

GNU/Linux is changing drastically

It seems quite clear that GNU/Linux is changing into something radically different from how it's been for the past decade or so. Truly radical changes are coming.


I'm sure a lot of you are GNU/Linux users. How do you show information about your network interfaces? How do you print your routing table? How do you view the arp cache?

Your answers are probably ifconfig, route, and arp. However, these commands we've always known are being depreciated in favor of ones from the iproute2 suite, so in the future you will be typing ip addr, ip route, and ip neigh for those respective functions.



For decades, UNIX and Linux systems have used the X windows system. This is going to, in time, be replaced by Wayland. It's currently too early for a full switchover, but with both the GNOME and KDE projects, plus Debian and Fedora supporting it, it looks like it'll happen sooner than we thought. It's a huge change, and with it completely eliminating screen tearing and having much better security, I think it will be a positive one.


Speaking of security, I'm sure you're all familiar with iptables. Well say goodbye to that, because it's being replaced by nftables. This aims to be better by being more minimal, or rather just putting a lot of the code in userland rather than kernelspace. Also better syntax.


>Application distribution

For the longest time, GNU/Linux users got their software from distro repositories. Despite many users claiming this is the best way to do things, it has had some criticisms. Therefore, there have been a few projects hoping to solve the issues and make the process of getting software more friendly to users of mainstream OSes.




What do you think of these changes? Do you have any examples I may have missed?

R: 41 / I: 8 / P: 7 [R] [G] [-]

XP SP3 - 10th Anniversary

Seems only like yesterday.

R: 8 / I: 0 / P: 7 [R] [G] [-]

Open Printer Projects

Why are there no ongoing open printer projects?

There was like one guy in 2011 who was basically building a carriage around proprietary printer heads, but other than him I can't find anything.

R: 17 / I: 2 / P: 7 [R] [G] [-]

Haskell depreciation thread

Daily reminder that Haskell is a shitty language.

R: 42 / I: 9 / P: 7 [R] [G] [-]

ITT: We critique each others fizzbuzzes

#include <stdint.h>
#include <stdio.h>

#ifdef __GNUC__
#define HOT_INLINED __attribute__ ((always_inline)) inline \
__attribute__ ((hot))
#define HOT_INLINED inline

static const char *LOOKUP_TABLE[] = {

typedef struct s_div10_t
const uint32_t quot;
const uint32_t rem;

static HOT_INLINED div10_t div10(uint32_t value)
uint32_t quot = (value >> 1) + (value >> 2);

quot = quot + (quot >> 4);
quot = quot + (quot >> 8);
quot = quot + (quot >> 16);

quot = quot >> 3;

uint32_t rem = value - ((quot << 3) + (quot << 1));

quot = quot + ((rem + 6) >> 4);

if (9 < rem) rem = rem - 10;

return (div10_t) { .quot = quot, .rem = rem };

static HOT_INLINED uint32_t mod15(uint32_t value)
value = (value >> 16) + (value & 0xFFFF);
value = (value >> 8) + (value & 0xFF);
value = (value >> 4) + (value & 0xF);

if (value < 15) return value;
if (value < 30) return value - 15;
if (value < 45) return value - 30;

return value - 45;

static HOT_INLINED void printu(uint32_t value)
if (0 == value)
char buffer[11] = { 0 };

char *iter = &buffer[9];

buffer[10] = '\n';

while (value)
const div10_t div10_r = div10(value);
value = div10_r.quot;
*(iter--) = div10_r.rem + '0';

while (*iter != '\n') putchar_unlocked(*(++iter));

static HOT_INLINED void fastbuzz(uint32_t n)
const char *result = LOOKUP_TABLE[mod15(n)];

if (NULL != result)

int main()
for (uint32_t i = 1; i < 100; i++)

return 0;

R: 184 / I: 32 / P: 7 [R] [G] [-]

It seems free and open source software is dominated by liberals who won't tolerate conservative viewpoints. For example Leah Rowe and libreboot, Richard Stallman and (are examples even needed with him?), FreeBSD and plenty others with their code of conducts, and even some OpenBSD devs (https://twitter.com/phessler ; https://twitter.com/henningbrauer). Is the end product more important than the creator of it?

R: 76 / I: 11 / P: 7 [R] [G] [-]

Python a shit!

Have you ever wondered what programming language is the worst one?

My anwers is: python!

Its stupid """notation""" for many of its attributes and methods makes me laugh when I hear it should be a great languague.

It's so poorly designed and inconsistent naming style that mixes upper and lower case names and abbreviations with full names makes me laugh even more.

The ridiculous The Zen of Python is like a religion. It has also the most stupid pseudo-polymorphism that is justified by the naive duck-typing. Its dumb static methods can behave either like static ones or instance methods depending on how you prefix them or try to use them in a pseudo-derived class. python is the new brainfuck.

Just take a look at the Built-in Functions. There is a place for any or compile or enumerate but there is no place for a string! apparently it's too long to write (lol) so they made it a str; there is also a place for classmethod but there is no place for rawinput - no, this would be too easy. They've decided to call it raw_input - to hell with consistency!!!

R: 129 / I: 30 / P: 7 [R] [G] [-]

(((Diversity))) in /tech/ Funny Thread

Post funny, annoying, and interesting examples of diversity in tech.

R: 20 / I: 2 / P: 7 [R] [G] [-]

How do they make money?

R: 99 / I: 14 / P: 7 [R] [G] [-]

What went wrong?

>in the past

>little resources available on computers

>programmers still make good programs


>lots of resources available

>all programs are bloated shit and use up all memory/cpu

R: 14 / I: 1 / P: 7 [R] [G] [-]

>On a satellite image, they drew shapes around the crime scenes, marking the coordinates on the map. Then they convinced a Wake County judge they had enough probable cause to order Google to hand over account identifiers on every single cell phone that crossed the digital cordon during certain times.

>In at least four investigations last year – cases of murder, sexual battery and even possible arson at the massive downtown fire in March 2017 – Raleigh police used search warrants to demand Google accounts not of specific suspects, but from any mobile devices that veered too close to the scene of a crime, according to a WRAL News review of court records. These warrants often prevent the technology giant for months from disclosing information about the searches not just to potential suspects, but to any users swept up in the search.


Few weeks back I pointed out this was going on, that when a crime happens Google and LE pull info from all Android phones in the area looking for anything suspicious and someone here said I was wrong. I couldn't find an article about it back then to prove it but here's one.

R: 11 / I: 0 / P: 7 [R] [G] [-]

A lterEgo: A Personaliz ed Wearable Silent Speech Interface

>AlterEgo is a closed-loop, non-invasive, wearable system that allows humans to converse in high-bandwidth natural language with machines, artificial intelligence assistants, services, and other people without any voice—without opening their mouth, and without externally observable movements—simply by vocalizing internally. The wearable captures electrical signals, induced by subtle but deliberate movements of internal speech articulators (when a user intentionally vocalizes internally), in likeness to speaking to one's self. We use this to facilitate a bi-directional natural language computing system, where users receive aural output through bone-conduction earphones without obstructing a user's physical senses. This enables a user to transmit and receive streams of information to and from a computing device or any other person without any observable action, in discretion and without invasion of the user's privacy. AlterEgo aims to combine humans and computers—such that computing, the internet, and AI would weave into human personality as a “second self” and augment human cognition and abilities.



What do you think, /tech/? Will this technology replace the current input devices?

It may be helpful for non-verbal autism, according to some sources

R: 2 / I: 0 / P: 7 [R] [G] [-]

'Sup niggers. Sorry I'm two days late. Helluva hangover. So, you doing anything worth doing today? No? Here's to tomorrow. Cheers! Glug glug glug.

R: 7 / I: 0 / P: 7 [R] [G] [-]

Powering a laptop with too low a voltage

I wonder what would happen if I tried to power a laptop (no battery) with a 12 V supply when it says it needs 19 V. I've used 20 V with no problem, but that's only a 1 V difference.

Do laptops have some sort of buck/boost converter inside which correct the voltage? Or will I break the computer?

R: 97 / I: 18 / P: 7 [R] [G] [-]


>Learn about Bitcoin when it was about 10$

>Realize I could make massive bank off of it because of it's use in the drug trade online

>Be unable to buy it due to being underage at the time (only real way of buying it at the time was meeting up with some faggot and getting it there) and my family thought it was a retarded idea.

>Now it's worth 10k

>Now all hardware costs more thanks to retarded Bitcoin miners

I mean RAM is fucking over 100$ what the fuck. Fuck Bitcoin. I'll never live this down.

R: 82 / I: 12 / P: 7 [R] [G] [-]


What do you think about Julia? Will it replace R or Matlab in some of their usecases? What do you think is an appropriate use for the language?

I'm particularly interested in hearing if someone made the switch from R and if yes, why.


faster for large datasets - if needed, has REPL, can call R if you need functions from your packages, seems to also compile on Open and FreeBSD, community seems eager to produce useful packages, plotting tools seem to be capable, syntax doesn't seem to be a mishmash of ideas like R, parallelism if you need it


python-style indentation, package system uses github, function overloading, there's a C transpiler, not made to be general-purpose, dynamic typing, not 1.0 yet


takes actually longer for small amounts of data (because of JIT compiler) than similiar slower languages, development seems to break packages as of now

On a sidenote: their community guidelines seem reasonable, but I've become allergic to those.

>In particular, do not sexualize the term "Julia" or any other aspects of the project. While "Julia" is a female name in many parts of the world, the programming language is not a person and does not have a gender.

Don't sexualize the Julia, can't make this up

R: 10 / I: 1 / P: 8 [R] [G] [-]

Disassembling DOS games

The Dosbox debugger is pretty decent. It's given me enough to feed into IDA and get a foothold to begin static disasm with some hassle. But I'm wondering if there's something more powerful in terms of dynamic disasm. I know there's Softice but that doesn't play nice with Dosbox or VMs in my experience. Maybe I'm holding it wrong.

R: 123 / I: 22 / P: 8 [R] [G] [-]

Libreboot cancer

I was wondering why Libreboot hasn't been updated for years.

R: 141 / I: 27 / P: 8 [R] [G] [-]

POWER9 Benchmarks


Anyone else disappointed?

R: 8 / I: 2 / P: 8 [R] [G] [-]

Bitmessage is a distributed messaging system that uses proof of work to mitigate spam. Messages are published to a rolling blockchain which drops old messages after a set amount of time. Chans are shared addresses which participants listen to and send with so that they are anonymous. Join the "lain" chan (no quotes).


R: 5 / I: 2 / P: 8 [R] [G] [-]

CS learning thread

I started this thread since I thought that some of you anons could share some books, projects, ctf's etc...

to learn as much as possible in terms of cs and maybe even low level stuff like electronic engineering.

I mean the best way to git gud at something is to dive right into it.

So if some of you have some great ressources or project ideas to learn from please share it.

CTF list - https://github.com/apsdehal/awesome-ctf

Liveoverflow- https://m.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w

Khan Academy - khanacademy.org/ (electrical engineering)

R: 221 / I: 16 / P: 8 [R] [G] [-]

wtf javascript

This is NOT Okay

R: 95 / I: 17 / P: 8 [R] [G] [-]

What is going to replace imageboards

At first it was BBS, then it was forums, now it's imageboards, what do you think is going to be the future of shitposting ? Some kind of anonymous twitter asymmetrical 140 char shitposting warfare or a more reddit like approach ?

R: 64 / I: 14 / P: 8 [R] [G] [-]

This is your Internet Ad footprint

Every website you have visited with Facebook logged in.

Every website you have purchased goods using a FB log in with.

Every Meme video you have liked casually while giggling.

Every micro-targeting company, from YouTube sluts to hosts like Steve Colbert.

Every game or app you used with Facebook or liked.

Every company you have liked in your local community allowed others to piggy back their target data.

This is the Internet digital fingerprint. This is how they know you better than you know you. A single click on your web journey created a whole universe of ads for your next set of minutes. An innocent email register at a social community website turned into a spawn of 10 ad companies that target you for your interest in Android software.

Watch one vice video, like one vice video, congrats, you are on Vice World Payroll. Vice France/USA/Germany/China/Japan/UK/etc. goes all over your ad info.

They used to say that our value online was 23 dollars. Welcome to the chaos of bots and algorithms, where the mastermind nets in $1,000 worth of targeted ads on you. Every like you give back is a feedback to their ad system to target you again with a new company.

People that play social game apps, like the average "MY LIFE IS UNIQUE, EXPRESS YOU WHO YOU ARE, TWO PEOPLE WON'T SHARE THIS, PROVE THEM WRONG! LIKE AND FOLLOW MY FACEBOOK PAGE LOL XDDD!!"-post and unironically shares it to their families and friends making them second hand ad potentials when their timeline goes dry, people who watch cat viral videos and actually likes them or worse: comments on them with their friends' names in tags so they can get more of advertisement; are all doomed to be worth millions of dollars worth of digital value. This was the end game, the one that kicked the bucket. When is FaceBook country coming? World's largest population and will soon be recognized as the secret demographic that shows exactly who each and everyone is.

This is why we need freedom. Even though a company/developer might not be full RMS freedom, people should consider what freedom their user has if they allow for this amount of call home services.

Pic related, my Internet identity, condensed to mere evidence of my life online. I was always the product.

R: 36 / I: 7 / P: 8 [R] [G] [-]

>no talk of the Zucc "I need a booster seat" Cuck

famalams, me ashamed

R: 35 / I: 10 / P: 8 [R] [G] [-]


Let's talk kernels, /tech/!

So let's start this off with a common argument i've seen from BSDfags and some others. "The Linux Kernel is bloated!"

But honestly, I don't see how that can be possible. I'll give ya the coreutils. Those should definitely be reworked, or better yet, fully replaced by busybox. But the kernel HAS to be as big as it is in order to have driver support for all the hardware that it can run on. If it was smaller, it wouldn't be able to have the amazing level of compatibility that it does, far superior to *BSD, and only beaten by Windows due to manufacturers being kikes.

I mean, if we're talking about microkernels, that's a bit different because you'd want the kernel to be as small as possible and all the drivers to be in userland, but for any monolithic kernel, it makes no sense to start crying bloat when there's a perfectly acceptable reason for it.

R: 49 / I: 5 / P: 8 [R] [G] [-]

Revision (Demoscene)

https://www.twitch.tv/revisionparty (sorry, no "better" stream providers AFAIK, use livestreamer or streamlink to watch)


Revision is a big, traditional easter demoparty with competitions for all kinds of demos and multimedia on all kinds of platforms, including Commodore Amigas and 64s.

Basically, demoparties are computer creativity meetings/competitions, where many programmers, musicians and graphicians have fun, socialize and show off their skills.

The first compos are beginning shortly, including the PC 64 kilobyte competition which I highly recommend everyone to see!

Discuss, ask questions, and comment the compo entries here.

R: 20 / I: 1 / P: 8 [R] [G] [-]

Do Xiaomi phones really spy on our data?

If this is true what should I do. i have a xiaomi phone.

R: 59 / I: 8 / P: 8 [R] [G] [-]

>try to learn programming with Harvard CS50 from Edx

>literally had to look up the solution to the first problem set, did not even understand completely how the solution actually works

Should I just give up? Am I too much of a brainlet to learn programming? Why is it so hard to go from the theoretical basis to actual practice?

R: 10 / I: 1 / P: 8 [R] [G] [-]

Retroshare thread? It's been a while since one of those. Retroshare is a decentralized sharing network. You just share your certificate with your friends, and there you go! Just like Facebook except it doesn't have the cancer nor the NSA nor the vapid girls nor your uncle.

My certificate:


R: 61 / I: 6 / P: 8 [R] [G] [-]

0 A.D. general

>What is 0 A.D.?

0 A.D. is a free as in freedom, open source game, inspired by Age of Empires 2. It's avaible for Windows, OSx, GNU/Linux and BSD

>Why should I care?

Because it's one of the few good FREE games, it promotes historical accuracy, it's fun to play, it has multiplayer and anyone can contribute to the game, for example if you're an historian you can check the accuracy of the civilizations, propose and help create new ones of the time period, if you can program you can help the team or create a mod yourself, if you have 3D modeling skills you can create new models for the game, etc... without having to ask permission to anyone. The game has a free p2p multiplayer.

>Why do you posted it in this board?

To BTFO all the "hurr durr there is no gayming or leenooks!!!!!".

Personally, I'm not affiliated to the team, but I think the development would be faster if more people play and contribute. Also, it would be nice to have more opponents in multiplayer.


R: 121 / I: 14 / P: 9 [R] [G] [-]

LynxChan 2.0: Magnus

LynxChan is an imageboard engine I started developing in 2015 with performance and flexibility in mind. It now powers several chans, with some having a good amount of traffic, like http://mewch.net and http://endchan.xyz

LynxChan 2.0 has entered it's beta with a stable release scheduled for 19/05.

It brings easily the biggest changes ever made in the project's nearly 3 years of existence, having completely changed templating and caching.

Now offering around 5 times better performance when serving pages and 50 times better performance when building pages it is trully deserving of a major version bump.

Along with these optimizations it includes the following features:

Links to board staff on board moderation page.

Page with details for media files, including a list of posts that use the file.

Implemented "remember me" on logins.

Thread's bump order is adjusted when replies are deleted.

Setting to configure the cache expiration of static files.

Optional headers and footers on pages.

Setting to completely hide unindexed boards.

E-mail confirmation.

Terminal command to change account's password.

E-mail notifications of reports made to content you can moderate.

Configurable limit of board message sizes.

The project's repository is at http://gitgud.io/LynxChan/LynxChan and my demo site is http://lynxhub.com

R: 38 / I: 6 / P: 9 [R] [G] [-]

x86 Virtualization on other architectures

Since 486/Pentium is free game to emulate and powerful enough to run doom, why hasn't anyone ever tried to port an emulator to hobbyist architectures like PIC32, RISC-V, or ARM, or at least take advantage of x86 emulation?

R: 7 / I: 0 / P: 9 [R] [G] [-]

I know this is old, but have you heard of project ORCHESTRA? This video talks about the NSA creating FOSS vulnerabilities and mitigating encryption on the internet. I think everyone should see this.


R: 9 / I: 0 / P: 9 [R] [G] [-]

IPFS Companion 2.2.0 brings window.ipfs to your Browser

Your node is exposed as window.ipfs on every webpage. The API aims to be compatible with interface-ipfs-core, which means websites can now detect if the property exists in window context and opt-in to use it instead of creating their own js-ipfs node. It saves system resources and battery (on mobile), avoids the overhead of peer discovery/connection, enables shared repository access and more!

R: 42 / I: 4 / P: 9 [R] [G] [-]





R: 9 / I: 4 / P: 9 [R] [G] [-]

When are backplane computers making a comeback?

R: 71 / I: 7 / P: 9 [R] [G] [-]

Best filesystem coming through

R: 84 / I: 17 / P: 9 [R] [G] [-]

x86 and PC archutecture

Is there any saving grace with the x86 PC archutecture besides backwards compatablity? x86 seems massively bloated, even compared to better and well designed CISCs like m68k. Compatabity doesn't even fully exist anymore with the advent of locked GPUs, forcing the creation of video drivers, with companies like Nvidia, forcing users to use reverse engineering to create open drivers. Also with a number of features explicitly added in because of Microsoft's word, x86 seems hopelessly tied to Windows, with Linux having to conform to their standards, like Secure Boot. And within the coming decade, Intel will rip out 16 bit BIOS emulation out of UEFI, leaving real mode absolutely useless, making the purpose of x86 null and void by being a 32/64 bit archutecture only. This is also ignoring the massive personal freedom issues like the Intel ME, SSM, and AMD PSP, which brings us to the massive duopoly x86 is controlled by, unlike ARM (even though ARM has lots of negatives by itself). Even the Raspberry Pi line of computers seems way better than the cancerous gaming reddit crowd, with their multicolor motherboards and led setups.

R: 411 / I: 20 / P: 9 [R] [G] [-]

zero terminated "strings"


When will this stupidity finally come to an end?

Even in C, it's absolutely possible to use a struct with pointer and length, and add a library with replacements for the functions which worked with zero terminated strings.

Why would anyone still use zero terminated "strings"? They make no fucking sense, almost the worst idea ever.

R: 77 / I: 24 / P: 9 [R] [G] [-]

There will never be a desktop as functional as Unity with only 500mb of memory usage.


R: 27 / I: 1 / P: 9 [R] [G] [-]

Torrent clients with a built-in search

Vuze - free version has ads

Tixati - fat, closed source

Frostwire - shitty java dependency and it can't even use the java already installed...

qBittorrent - the only good one, but a fat qt dependency

Why has this not been more adopted? There should be a gtk client with a search function.

R: 1 / I: 0 / P: 9 [R] [G] [-]

why do they insist on releasing updates without testing them?

R: 17 / I: 3 / P: 9 [R] [G] [-]

This place needs to stop bitching about programming languages

As long as you aren't programming in PHP, Javascript or C you'll be fine.

R: 27 / I: 3 / P: 9 [R] [G] [-]


I see a good deal of talk about IPFS pop up on the board from time to time, but I haven't been around to catch a good ZeroNet thread yet.

/v/ has some anons quietly experimenting with an 8chan bunker using an improved fork of Millchan/Nullchan, and it seems to be meeting with good success. Understanding that some future systems that are in the pipe will theoretically be superior, what are the particular drawbacks or vulnerabilities to using a ZeroNet site, accessed through TOR, as a failsafe for 8chan right now?

"Never let the perfect be the enemy of the good enough" and all that.

R: 3 / I: 0 / P: 9 [R] [G] [-]

Video is better when the codec and transport work together.


Salsify is a new design for real-time Internet video that jointly controls a video codec and a network transport protocol. Current systems (Skype, Facetime, WebRTC) run these components independently, which produces more glitches and stalls when the network is unpredictable.

R: 285 / I: 29 / P: 10 [R] [G] [-]

IPFS-based Imageboard

There's been some talk for a while now about the idea of putting together a properly distributed imageboard, and there have been some efforts made towards that end. However, in my view the current efforts still have a number of weak points that leave them vulnerable to targeted attacks knocking them offline. NNTPchan for instance is cool, but the way it's put together DDoSing a (relatively) small number of nodes is still sufficient to take the federation down.

For the past year now I have been slowly working on an IPFS-based federated imageboard software package. It's still in a very early state, and I was hoping to let it sit until IPFS developed a little more, but recent events have made it clear that the noose is already starting to tighten now so out the door it goes.

Github: https://github.com/smugdev/smugboard

Working instance: http://localhost:8080/ipns/client.smugchan.org/#Qmf9QKURJVU53mzmysAFAR3mj48dLXqS2rNpq2o41EugcV/tech

(You need a running go-ipfs daemon set up as per https://github.com/smugdev/smugboard#usage to actually access it)

This is Smugboard, an imageboard package with a fully distributed content layer and a maximally decentralized control layer. It is composed of 5 separate server packages handling different aspects of posting and moderation, and a client-side renderer. Each thread and board takes the form of an append-only log hosted via IPFS, with moderation taking the form of a client-side filter. Users can choose to toggle specific mods on or off (soon - UI not yet complete).

As noted the federation is composed of a series of append-only logs, and these are published directly within IPFS. A proper UI for this isn't done yet, but it will be possible to fork any board or thread from its current state, or from any previous state, at any time. In the event of a board going offline, the board's state still exists within the IPFS network and as long as a copy still exists in any user's cache the board will still be retrievable (in a read-only state), and can be forked and restarted from that state or any of its previous states by any other user. As the content layer works like a bittorrent swarm, the board will paradoxically load faster the more people use it.

Again, this software is still very much a prototype so expect bugs and fun, there's still plenty that needs implementing and contributions are welcome.

R: 101 / I: 12 / P: 10 [R] [G] [-]

Old Windows and the Internet

Just how dangerous would it be to connect an old Windows 98 or XP machine to the Internet these days? I've heard there are remote code execution exploits that you're vulnerable to by just being connected to the Internet at all; is there any truth to that? I'm interested to know the details of exactly how these vulnerabilities work.

R: 18 / I: 2 / P: 10 [R] [G] [-]

>you can't post with an empty password field

>Tor users don't get one by default

>need javashit enabled to use this feature

you can bypass it, but I doubt they'll allow it for long

What a wonderful world we live in, yes?

R: 44 / I: 4 / P: 10 [R] [G] [-]

Alternatives to Netflix

>A friend once asked me to watch a video with her that she was going to display on her computer using Netflix.

>I declined, saying that Netflix was such a threat to freedom that I felt uncomfortable with legitimizing it in this way.

Are there any good and free alternatives to Netflix?

R: 10 / I: 1 / P: 10 [R] [G] [-]

qpkg, a cross-platform, supplemental package manager for quick, convenient builds

Skeeto wrote a primitive package manager called quick package, and it's basically like Slackware's sbotools minus the ports tree. For obvious reasons, it's applicable to any GNU/Linux distribution and is effectively just a fairly comprehensive Unix hack.


R: 84 / I: 12 / P: 10 [R] [G] [-]

Programmer autism

>he uses riced vim/emacs when IDEs have the same functionality out of the box and just werk

>carmack uses visual studio and he is a better programmer than any of you

Explain yourselves

R: 18 / I: 3 / P: 10 [R] [G] [-]

Gambas- Open source VBS

What does /tech/ think of gambas? It's like VBS6 but open source, much more streamlined, stable and a bit simpler

R: 16 / I: 2 / P: 10 [R] [G] [-]

How do we fight this cancer (getipintel.net)



So they say that proxies are used only by bad people and this idea gets quite popular it seems. If that shit gets free as in free beer and too easy to install for average webmaster, what do we do? Is this the end of the free web and onion services & sites that explicitly say they allow anonymity are the only places to live?

R: 44 / I: 6 / P: 10 [R] [G] [-]

Dual 8 core POWER 9 verses 96 core ARMv8

>John the Ripper faster on ARMv8



R: 195 / I: 18 / P: 10 [R] [G] [-]

Now that TOX development is basically dead, can we talk about other secure and Libre Voice+Video programs.

The front-runner appears to be GNU Ring, it's a very professional program that was adopted as an official part of GNU.

It has features like group voice (and video) chat and not to mention voice and video on mobile clients; both things that Tox lacks. It can also do full-blown VOIP+SIP, but that's optional.

What has your experience with it been?

GNU Ring: https://ring.cx/

Other Viable Messaging Clients: https://prism-break.org/en/all/#video-voice

R: 55 / I: 5 / P: 10 [R] [G] [-]


Microkernel means I'm interested, beats Linux and could even beat Darwin.

Not sure about the platform, I'm in as long as it's open but it probably won't remain so under MIT. Perhaps many of the pitfalls Android falls into in regards to manufactures will be avoided.

I hate Android as a platform and I'm look forward to a fresh start on a new open platform. Android's aged API with 5 years of backwards comparability all for the sake of selling App Play store apps to 3rd worlders still running 4.4 because their devices don't get updates... Not to mention Java and the horrible multiplatform support for C and others. Even NeXT did better in' 95.

Interesting to see the Android dev team compete with the Fuschia team for relevance. Android has introduced Treble, Android Auto, a new official IDE, API "cleanups". Seems they wish to entrench Android into a permanent legacy position in order to sandbag Fuschia to an early grave before it's even out.

Speaking as an expert from Cupertino, I suspect their efforts will keep Google's existing mobile offerings strong just long enough for Fuschia to come out and replace it...

R: 17 / I: 1 / P: 10 [R] [G] [-]

Best LiveCD's Distros?

To my experience with multiple LiveCds, BusenLabs has been the best at keeping a clean system, usable with low powered hardware, while having an acceptable design.

Second would be Puppy linux in both versions more or less, but you have to be more proficient with linux to use it as a full OS.

Wich ones does /tech/ use, and for what specific purpose.

R: 17 / I: 1 / P: 10 [R] [G] [-]

The state of terminal email clients

Why in the world do you have to store your password in some cleartext file in your home directory in order to not type it every time you log into IMAP or SMTP in Mutt?.

How does Thunderbird do it? Mutt needs to do it like that.

It seems like all the CLI clients run under the assumption that you are using them on the same machine that is also the mail server. Documentation about connecting to remote SMTP and IMAP servers is always incomplete and buried deep within the documentation, instead of being the first thing they tell you about because it's not 1980 and we all mostly just connect to a remote service for this. Thunderbird makes this simple by asking you immediately on first launch to give addresses and passwords to your remote accounts to it can set them up for you. Would it really be so hard for them to have a process like this in ncurses or whatever?

I really really want to start using a terminal-based email client, mostly because after the Cliqz, Riseup, Looking Glass, and other controversies, I'm not all that trusting of Mozilla right now. However, they all just seem way too dated in their usability in relation to modern trends, in a way that goes beyond the fact that "they're terminal programs"

R: 208 / I: 36 / P: 10 [R] [G] [-]

Video Codecs

the webm is showing h265 vs av1

Webm vs AV1

which is the future?

R: 18 / I: 0 / P: 10 [R] [G] [-]

Video Downloader.

Since the new Firefox came out my old video downloader program stopped and i had to find a new one. So far I have tried several of them and they are shit! Does anyone have any idea where i can find a good one?

R: 60 / I: 25 / P: 11 [R] [G] [-]

Libreboot port to ALL AMD Hardware!?!

This is info from someone on halfchan

>inb4 >halfchan

hear me out, because this is big news!

>There was talk on the Libreboot IRC that they found a bug which effectively kills the PSP.

>IIRC, it works in everything except some of the latest CPUs, but even there they are already speculating upon finding other ways in.

>If you want more details just ask on #libreboot on Freenode, because most of this info is yet to be publically documented.

OMG I would literally suck Leah Rowe’s dick if that’s what it took for this to be released! OwO

Pic unrelated

R: 51 / I: 6 / P: 11 [R] [G] [-]

why does everyone stock overflow seem like such douche bags. I am new to C. I asked a question about a certain library and they say things like "of course" and "you should know" isn't the point of the website to help others and expand knowledge on topics aka not suck their own dicks? I rather ask questions here then on stock overflow.

R: 0 / I: 0 / P: 11 [R] [G] [-]


We find Facebook in a spot of weakness

>We don't use this to destroy FB

FB becomes Myspace

Question is what is the Plan?

R: 3 / I: 2 / P: 11 [R] [G] [-]


> GNU software has a well-deserved reputation for running on many different types of systems. While our primary goal is to write software for the GNU system, many users and developers have been introduced to us through the systems that they were already using.

> Gnulib is a central location for common GNU code, intended to be shared among GNU packages. GCC has libiberty, but this is hard to disentangle from the GCC build tree.

> Gnulib takes a different approach. Its components are intended to be shared at the source level, rather than being a library that gets built, installed, and linked against. Thus, there is no distribution tarball; the idea is to copy files from Gnulib into your own source tree.

is this a good software development practice?

R: 49 / I: 7 / P: 11 [R] [G] [-]

Analyzing Windows 10 Telemetry Deeper

Hello, I'd like to analyze the data that is sent to Microsoft further. Also before someone says Windows user, I'm not, I'll just make a VM for that. I'll be doing it mostly out of curiosity because I want to see what's in there. Any help, suggestions or ideas would be appreciated. Maybe we could all come together and make something easy to setup for people so that they can analyze their traffic themselves, which might be a big punch in MS's face if something is found that shouldn't be there. So, my idea would be the following:

1. Make a Windows 10 LTSB VM

(Optional) Configure everything according to the article: https://docs.microsoft.com/en-us/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services

and try to find out what is sent on minimal level, which I would have great interest in. Please note that MS uses for the telemetry-level "Security" the word "includes," so at the end they could still potentially send anything, which is a big concern.

2. Make a certificate for the domain microsoft.com and add it to the certificates.

3. Use a DNS server that redirects the resolution-requests for microsoft.com to something that is under my control (for example an Apache server set up with the private key).

4. Log all the traffic that goes to the server and decrypt it with the private key.

Might that work? Anyone tried something like that?

R: 85 / I: 14 / P: 11 [R] [G] [-]

A message to UI designers and devs

Hi, I'm posting here on /tech/ because where else can I rant a little? Who knows maybe some of you do UI work and this may touch your thoughts. I'm a dinosaur and I'm still not using touchscreens. And I won't live long enough to use Johnny Mnemonic style VR headset and gloves neither. Anyway here goes:

* Don't make buttons, menus, gauges and other stuff appear and disappear. Disable or enable (grey out) if you must, but never make them ghost in and out from nowhere.

* Don't resize the dialog or its controls automatically. Resizing stuff should be left manual, up to the user.

* If your program or webpage has a "mobile" version then it's assumed that the other version is for desktops: this means mouse and keyboard. Stop giving desktop users your touch optimized interfaces when a mouse pointer is 1000x more accurate than any phonefag's greasy finger.

Thank you very much, have a nice and productive day. Alternatively I'll see you in hell!

R: 33 / I: 4 / P: 11 [R] [G] [-]

Hydrus users and questions

Is hydrus botnet? It's github page redirects to a MITM'd cianigger/hypno.is version of github and the dev may or may not be a furfag. The software itself uses python and opencv which may or may not be botnet even if brainlet/pajeet tier. From my initial inspection it doesn't seem like botnet outside of the whole source code being MITM'd thing.

R: 83 / I: 7 / P: 11 [R] [G] [-]

Which is it?

foo (bar)


foo ( bar )

R: 18 / I: 0 / P: 11 [R] [G] [-]

So I've been thinking about possibly starting up a business.

And I was wanting to know how hard it would be to make a successful server hosting business in the current market?

R: 9 / I: 0 / P: 11 [R] [G] [-]


What do you anons think about termux?

R: 34 / I: 3 / P: 11 [R] [G] [-]

Hey /tech/, I've been looking for any social media alternatives for my family and friends to use since thanks to the facebook shit a lot of them have gotten really spooked and it would be a good opportunity to get them off botnet once and for all. So I've been looking around for different kinds of sites and came upon the Diaspora Foundation (https://diasporafoundation.org/) I also found one that shilled privacy for a fee but this one interested me since it seems that it uses decentralized "pods" used by users so it seems like it would be more secure and private as well as being free. However I still came here due to A: The completely free thing seems to be almost too good to be true which I later found that it got most of its funding from a kick starter. B: Zuckerberg himself funded the kickstarter with an undisclosed amount along with god knows who else. C. During 2011 there was a bit of shady shit going on with the company suddenly asking for money in a donation campaign, the pay-pal freezing for no reason half-way through and then just a bit later the Creator, Ilya Zhitomirskiy killed himself with an exit bag with no real discernible motive. The next year in 2012 the staff announced a new direction with the program in improving the chat and that same year all development went in the hands of the community. Call me paranoid but its still possible to mess with open-source stuff and put stuff under the radar right?

R: 5 / I: 0 / P: 11 [R] [G] [-]

youtube gets jihaded on

[tor users cant post images]

• Three people were injured by gunfire, one of them critically, in a shooting at YouTube’s headquarters in San Bruno, Calif., on Tuesday afternoon.

• The San Bruno Police Department identified the attacker, who died of an apparently self-inflicted gunshot wound, as Nasim Najafi Aghdam, who was in her late 30s.

• President Trump has been briefed and tweeted “thoughts and prayers” to the victims.

The gunshot victims were taken to Zuckerberg San Francisco General Hospital, the only Level 1 trauma center in San Francisco. Brent Andrew, a spokesman for the hospital, said at a news conference that a 36-year-old man was in critical condition, a 32-year-old woman in serious condition and a 27-year-old woman in fair condition.

Ms. Aghdam’s gender is noteworthy because mass shootings are almost always perpetrated by men. An F.B.I. study released in 2014 found that, from 2000 to 2013, women were responsible for only six of 160 mass shootings in the United States.

>We’re also aware of the misinformation being spread on Twitter. We’re tracking, learning, and taking action. We‘re working diligently on product solutions to help. https://t.co/V8vmxgFkmR

> — jack (@jack) April 3, 2018


R: 18 / I: 1 / P: 11 [R] [G] [-]

It's happening

>the blockchain meme

>Normalfags are becoming more aware of the dangers of the facebook botnet

>It's even starting some discussion about google

We're finally getting to that stage of the cycle, the normalfags are starting to consume our old memes, perhaps the blockchain is the worst part, but at least it comes with some decentralization.

R: 28 / I: 0 / P: 11 [R] [G] [-]

Let Amazon control your door

The media is really shilling this concept now.


R: 13 / I: 1 / P: 11 [R] [G] [-]

so when hurd?

R: 11 / I: 0 / P: 12 [R] [G] [-]

How secure are regular botnet users?

How safe is the average normalfag from basic tech attacks? The main advantage of botnet tech is that it has the motivation to try and make even clueless idiots as safe as possible, but how effective is it?

Let's assume a reasonable normalfag adversary like a non-targeted criminal attack or a pissed off skiddie who can google tutorials. The target uses Google services, Facebook services and twitter on their phone and laptop (WiFi).

I assume the most effective attack would be a simple phish (send bait link, "You must sign in with Facebook to view this full page.") but would any other attacks really work? Enforced HTTPS would make a MITM attack difficult and these sites would be good at detecting unusual login activity. Would an evil twin + MITM redirect attack even be effective for the mobile apps?

R: 76 / I: 14 / P: 12 [R] [G] [-]


Capitol Hill wants Facebook’s blood, but President Trump isn’t interested. Instead, the tech behemoth Trump wants to go after is Amazon, according to five sources who’ve discussed it with him. “He’s obsessed with Amazon,” a source said. “Obsessed.”


R: 16 / I: 1 / P: 12 [R] [G] [-]


ITT share your Mastodon account or other Mastodon accounts you would recommend

R: 37 / I: 1 / P: 12 [R] [G] [-]

System Shock for Mac Classic

System Shock for MetroWorks has been GPL'd.

You can port it forward to Carbon or Cocoa and Intel, or port it to Windows, GNU, BSD, Haiku, and even homebrew consoles.

Big deal, source ports soon?

System Shock for MetroWorks has been GPL'd.


R: 36 / I: 5 / P: 12 [R] [G] [-]

Anyone else hyped for Ryzen 2?

I definitely am, replacing my 4670k system with a 2700X. Moar coarz here I come!

Too bad RAM prices are fucked right now, oh well.

R: 149 / I: 33 / P: 12 [R] [G] [-]

Somewhat serious BSD discussion

Illumos et al also very welcome, of course. No licensetalk.

What BSD are you using and why? What were the compelling arguments for it? What applications do you wish were on your BSD - do you virtualize or dual boot for it? Are you happy with your BSDs audio capabilities?

Also: GCC or Clang?

>NetBSD is 25 years old today, celebrate by giving your old hardware a new life!

>NetBSD plans for 2018: http://www.netbsd.org/gallery/presentations/mef/PDF/NetBSD-2018-AsiaBSDCon.pdf

>OpenBSD native hypervisor progress & future: https://www.openbsd.org/papers/asiabsdcon2018-vmm-slides.pdf

>pkgsrcCon 2018 for free, no tickets - 07. - 08.07. in Berlin: http://pkgsrc.org/pkgsrcCon/2018/

>"A week of NetBSD #1": https://www.geeklan.co.uk/?p=2256

>FreeBSD and NetBSD projects take part in Google summer of code

>OpenBSDs sndio is also supported by FreeBSD, NetBSD, Linux: http://www.sndio.org/

>Last posts I saw on Chromebook support on BSDs was a while ago (no touchpad and WiFi support) - did anyone try it?

>Somewhat niche, Resources on OpenBSD gaming:



#openbsd-gaming on Freenode (Quake players seem to be somewhat active)

R: 17 / I: 2 / P: 12 [R] [G] [-]

Freenom DNS

free domain names are nice, but "anonymous" DNS??

Real or fake? I think their focus on "ads" is reason for doubt.


I'm currently using opennic dns, only problem is I have to switch servers every once in a while on my router, which I find out when websites stop loading...

R: 48 / I: 17 / P: 12 [R] [G] [-]

Need Linux books

I have been searching for hardcopies of books that I can buy in a bookshop.

They need to be Debian based and ideally would be in depth about setting up bind 9, apache 2, postfix 3.2, SSH, and Samba.

I cant find books relating to the versions I have installed and seem ancient and appear mostly to have been written back in 2003 -2007

Anyone out there know of any books dealing in these servers and versions and related to debian

R: 14 / I: 1 / P: 12 [R] [G] [-]

What's /tech/ies' opinion on JCL?

R: 118 / I: 19 / P: 12 [R] [G] [-]

Happy Birthday, RMS!

Today is RMS' birthday.

May /tech/ wish him a happy 65th!

R: 113 / I: 5 / P: 12 [R] [G] [-]

seL4: The future of security

seL4 is the world's first operating-system kernel with an end-to-end proof of implementation correctness and security enforcement.

This project is a mathematically-verified bug-free microkernel system that supports x86 and ARM, and aims to be general-purpose.





Genode OS, an OS framework that supports seL4 and other kernels:


seL4 is already being used and researched by the military for avionics and helmet displays.

R: 102 / I: 4 / P: 12 [R] [G] [-]

Web Devs are destroying everything that was learned in the 70s


And BSD fags thinks that GNU/linux is bloated.

>Hey, I got this new web project, but to be honest I haven’t coded much web in a few years and I’ve heard the landscape changed a bit. You are the most up-to date web dev around here right?

>-The actual term is Front End engineer, but yeah, I’m the right guy. I do web in 2016. Visualisations, music players, flying drones that play football, you name it. I just came back from JsConf and ReactConf, so I know the latest technologies to create web apps.

>Cool. I need to create a page that displays the latest activity from the users, so I just need to get the data from the REST endpoint and display it in some sort of filterable table, and update it if anything changes in the server. I was thinking maybe using jQuery to fetch and display the data?

<-Oh my god no, no one uses jQuery anymore. You should try learning React, it’s 2016.

>Oh, OK. What’s React?

<-It’s a super cool library made by some guys at Facebook, it really brings control and performance to your application, by allowing you to handle any view changes very easily.

>That sounds neat. Can I use React to display data from the server?

<-Yeah, but first you need to add React and React DOM as a library in your webpage.

>Wait, why two libraries?

<-So one is the actual library and the second one is for manipulating the DOM, which now you can describe in JSX.

>JSX? What is JSX?

<-JSX is just a JavaScript syntax extension that looks pretty much like XML. It’s kind of another way to describe the DOM, think of it as a better HTML.

>What’s wrong with HTML?

<-It’s 2016. No one codes HTML directly anymore.

>Right. Anyway, if I add these two libraries then I can use React?

<-Not quite. You need to add Babel, and then you are able to use React.

>Another library? What’s Babel?

<-Oh, Babel is a transpiler that allows you to target specific versions of JavaScript, while you code in any version of JavaScript. You don’t HAVE to include Babel to use ReactJS, but unless you do, you are stuck with using ES5, and let’s be real, it’s 2016, you should be coding in ES2016+ like the rest of the cool kids do.

>ES5? ES2016+? I’m getting lost over here. What’s ES5 and ES2016+?

<-ES5 stands for ECMAScript 5. It’s the edition that has most people target since it has been implemented by most browsers nowadays.


<-Yes, you know, the scripting standard JavaScript was based on in 1999 after its initial release in 1995, back then when JavaScript was named Livescript and only ran in the Netscape Navigator. That was very messy back then, but thankfully now things are very clear and we have, like, 7 editions of this implementation.

>7 editions. For real. And ES5 and ES2016+ are?

<-The fifth and seventh edition respectively.

>Wait, what happened with the sixth?

<-You mean ES6? Yeah, I mean, each edition is a superset of the previous one, so if you are using ES2016+, you are using all the features of the previous versions.

>Right. And why use ES2016+ over ES6 then?

<-Well, you COULD use ES6, but to use cool features like async and await, you need to use ES2016+. Otherwise you are stuck with ES6 generators with coroutines to block asynchronous calls for proper control flow.

>I have no idea what you just said, and all these names are confusing. Look, I’m just loading a bunch of data from a server, I used to be able to just include jQuery from a CDN and just get the data with AJAX calls, why can’t I just do that?

<-It’s 2016 man, no one uses jQuery anymore, it ends up in a bunch of spaghetti code. Everyone knows that.

>Right. So my alternative is to load three libraries to fetch data and display a HTML table.

<-Well, you include those three libraries but bundle them up with a module manager to load only one file.

The rest in the Link.

R: 281 / I: 42 / P: 12 [R] [G] [-]

Blazechan Thread #3

last thread died.

Blazechan is the blazing fast imageboard software, written in Python. It aims to reach the feature parity of the current imageboards while maintaining a clean codebase and speed. It's currently in beta.

Testing/development instance: https://dev.nextchan.org/

Production instance: https://nextchan.org/

Current version: Beta 0.10.0

Currently (04/11/2017) working on:

- Extension system (75% done)

- Captcha

- Flood detection

- Roles section of panel

Please post feature suggestions and bug reports here.

I can be reached at admin@nextchan.org or #nextchan on Rizon.

R: 323 / I: 149 / P: 13 [R] [G] [-]

80s/90s technology

Post some cool or nostalgic stuff

R: 55 / I: 17 / P: 13 [R] [G] [-]

Name 1 icon theme that is as complete and elegant as Numix

>flat but not lifeless like others

>support for basically every program ever made

>elegant, beautiful, simple, but modern all combined into one icon pack

<not just disabling icons all together

R: 29 / I: 1 / P: 13 [R] [G] [-]

Google services doxxing

A European debate website is being attacked by Antifa sending links to a Google form that masquerades as an innocent questionnaire.

What I want to know is: Can a Google service access data/metadata from other Google products that are running simultaneously?

""The obvious issue here is DOXXING""

R: 1 / I: 0 / P: 13 [R] [G] [-]

I've been looking for cheap Chinese Bluetooth heart rate monitors, I want to read the raw data and translate it to CSV, or alternatively have an app that allows me to export the data in some common format such as xml. So far I only found models with a lot of extra functionalities such as SMSnotifications and generally some kind of integration with Android phones which should make for a complicated protocol (over Bluetooth) which in turn would be time consuming to reverse engineer. Any suggestions on how to accomplish this?

R: 70 / I: 2 / P: 13 [R] [G] [-]

Please explain to me like I'm an autistic faggot why do these things suck:





R: 3 / I: 0 / P: 13 [R] [G] [-]

Removing the PSP module on AMD

Now there's a way how to remove 90% of ME module, How about removing the PSP module in AMD board. Obviously disabling the PSP functionality from bios is not the solution. Any board hackers here found out how to remove the PSP botnet?

R: 63 / I: 8 / P: 13 [R] [G] [-]

Cock.li vs Gmail?

Cock.li is probably made by some basement dweller from 8ch.net while google is a giant corporation who I know reads through all my in encrypted emails.

What do you prefer /tech/ and why?

R: 128 / I: 23 / P: 13 [R] [G] [-]

Do you look up to anyone in tech?

Do you have anyone who inspires you?

R: 50 / I: 3 / P: 13 [R] [G] [-]

OCaml thread

This is the best language ever. Prove me wrong.

protip: you can’t.

>inb4 no multiprocessing

It sucks but it’s not painful.

>inb4 not pure

Pure haskal code is shit.

R: 51 / I: 10 / P: 13 [R] [G] [-]

About to finalize my lock pick set, should look something like this except im riveting and gluing some steel handles to triple the thinkness.

Do you guys have any advice on hardening?

I'm thinking of heating them up to critical heat after ive shaped them, then dunking in water. and sanding them down.

Happy browsing.

R: 21 / I: 4 / P: 13 [R] [G] [-]

What is correct way of putting comments into code for C/C++? It often makes me really annoyed because I use comments often as separators for larger chunks of code and it all gets messy. Simply writing //Something is terrible way of commenting something and so is multiline comment describing every little obvious bullshit.

Are you happy about how comments work in C/C++? Is it sufficient enough for you? Doesn't your code get ugly and messy? Any advice for me how to comment like white person and not MIT nigger?

If you would pick best syntax/style to write comments from any language, which one it would be?

R: 26 / I: 2 / P: 13 [R] [G] [-]

Anyone know of any free image DNA hash programs/libraries?

Over the years, I've accumulated hundreds upon hundreds of dupe images as a result of using different applications to sync my phone and digital camera to my computer, several of which wanted to have their way with my images like rotating, resizing, etc. This means using a traditional hash algorithm would be useless since the data itself has been altered. If I could use image DNA, it would make finding duplicates far more reliable.

I can write my own program to perform the file scan itself, but would need a DLL or some library that I can leverage in my program to calculate the image hash.

R: 405 / I: 138 / P: 13 [R] [G] [-]

Krita 4.0 released

Features include:



R: 7 / I: 1 / P: 13 [R] [G] [-]

The Future of The GPU Market

A thread to share view points and comments on the future of this line of hardware, either based on recent events or in entertaining wild dreams, come on /tech

just be yourself.

R: 11 / I: 2 / P: 13 [R] [G] [-]

Xoroshiro128+ BTFO

Xoroshiro128+ Fails PractRand Even When Truncated

Although I know a lot of effort went into Xoroshiro128+, and there are many good things that have come out of its development, I am sad to say that on balance I feel it has too many flaws to be worth recommending—there are many better choices. In this post, I'll dig a little deeper into some of its flaws.

Let's begin with what we already know:

* John D. Cook showed that it fails PractRand with just a couple of seconds of testing, and before that Chris Doty-Humphrey, author of PractRand, showed that it didn't just fail “binary rank” tests, it also failed the DC6 test which is a short-medium range linear test.

* Daniel Lemire showed that it fails TestU01.

* I showed that it is trivially predictable.

* I showed that it is visualizing smaller-scale versions of the scheme shows clear flaws.

But are the flaws superficial and easily ignored, or more troubling than that?

Evolving Author Caveats

The authors of Xoroshiro128+ do acknowledge some of these flaws. The source code admits (somewhat obliquely) that it fails PractRand's binary-rank tests, but suggests that the problem is confined to just the lowest few bits. Over time, however, these claims have been progressively weakened. The source for this generator used to say:

>with the exception of binary rank tests, which fail due to the lowest bit being an LFSR; all other bits pass all tests.

On 14 October, 2017, the comments in the source were revised to say

>with the exception of binary rank tests, as the lowest bit of this generator is an LSFR. The next bit is not an LFSR, but in the long run it will fail binary rank tests, too. The other bits have no LFSR artifacts.

Less than six weeks later, on 29 November 2017, the comments were revised yet again, to what is now their current wording (archive):

>with the exception of binary rank tests, the lowest bit of this generator is an LFSR of degree 128. The next bit can be described by an LFSR of degree 8256, but in the long run it will fail linearity tests, too. The other bits needs a much higher degree to be represented as LFSRs.

This version is quite a climbdown—from saying the other bits have no LFSR artifacts to admitting that actually, yes, they do. But the implication remains that only the lowest few bits fail statistical tests in practice. If that is the case, it means that using Xoroshiro128+ to generate 48-bits of randomness (throwing away not just the lowest two bits, but the lowest 16) is fine. But you have to wonder: is that really true?


Of course, few people bother to run a test that lasts 30 weeks and consumes half a petabyte of random numbers, but the point remains, Xoroshiro128+ has detectable flaws even if you throw half of its output, 32-bits, away.

It seems reasonable to surmise that you only throw 16 bits away, leaving 48 bits, you'll see statistical flaws sooner. When I get around to it, I'll test that out too, but even if it's less than 30 weeks of testing, it might need more than the typical week of testing to unmask the issues.

It's my understanding that Vigna mostly dismisses linearity-related failures as overly technical, and has even gone so far as to argue with the author of PractRand as to whether BCFN and DC6 are valid tests at all (even though other PRNGs pass them just fine). But I'd rather use a PRNG where you don't have to worry as much. There are plenty of them out there, including some very old ones.

I left out the Tests sections. Read them here:



R: 32 / I: 4 / P: 14 [R] [G] [-]


What does /tech/ think of openwashing? Pic related.

>A review of usage of the word "open" in the contexts of open content, open educational resources, open access, open data, open knowledge, open source, and open standards reveals that the community understands "open" to mean two things: (1) Free access to the content, resource, journal article, data, knowledge artifact, software, or standard, and (2) a formal grant of rights and permissions giving back to the user many of the rights and permissions copyright normally reserves exclusively for the rights holder.

>When you see an individual, organization, or company claim that their software is "open," check to see if their software is licensed under an OSI approved license. If it is not, they are openwashing.

>When you see an individual, organization, or company claim that their content is "open," check to see if it is licensed under a Creative Commons license, another license that grants you the 5R permissions, or placed in the public domain. If it is not, they are openwashing.

Source: http://openwashing.org/

What can be done to remedy it?

Have Open Source cucks finally realized their efforts in employing 'more business friendly' language and distancing themselves from Free Software to avoid the ambiguity of the term have been an exercise in futility, sometimes even counterproductive?

R: 37 / I: 0 / P: 14 [R] [G] [-]


Is this a field worth getting into? What are the prerequisites? What are the most important things/subjects/technologies/products to learn about (and in what order/to what depth)? What are the possible career paths/different positions and how does day-to-day work generally look like? How well is the field (and associated jobs) expected to be resilient against being eroded by general current and future trends in technology?

R: 26 / I: 6 / P: 14 [R] [G] [-]

Non-backdoored SSDs

Whilst going full libreboot and modding a QX9300 into a T500, slow hdd storage is painful too a price to remain full libre.

We know for a fact, that all Sandforce controllers and basically every product from WD and Seagate are backdoored.

You can isolate it using USB 2.0, but it's too slow.

Non Western Sata SSDs it is then.

All chink government PCs use Renice and/or Runcore SSDs, since the chinks wrote their own controller and built it themselves backdoor free.

I have seen those two recommended often.

Anyone got experience or with those? Any other suggestions?

R: 95 / I: 29 / P: 14 [R] [G] [-]

The Floppy Disk

>the teaspoon of removable media

>small, thin, cheap

>write protection switch

>perfect for text files

>usable forever if reformatted

>secure wiping by fridge magnet

>paper labels with your name

>gone too soon

R: 62 / I: 3 / P: 14 [R] [G] [-]


How "good" is this to use?

I've been toying around with v3.2 and it doesn't require virtualization to work until v4.

My T500 has options to enable VT-x but for some reason it won't boot or install with them enabled.

It seems I've looked just about everywhere as to why that is, but have yet to find a reason.

I'm probably just blind or stupid.

Their "compatibility list" is such a mess of "yeah sure it will work trust me".

Their latest "Qubes Air" which is some cloud computing version of qubes even talks about how hard it is to find a compatible laptop to get everything working, especially since v4 is going to require virtualization.

R: 36 / I: 2 / P: 14 [R] [G] [-]

what's /tech/'s opinion on dragonflybsd? seems like a pretty nice BSD to me

>inb4 "cuck license"

R: 34 / I: 10 / P: 14 [R] [G] [-]

Video Editing Software/Platforms

I like how Sony Vegas and Adobe Premeire have the market cornered on professional video editing. Whereas areas like 3D modeling and graphic effects have free proprietary software. What's more, even if you pirate Gaygas and Pissmeire, they're bloated and take forever to boot up, making people shy away from doing so in the first place.

Guess nobody's got big enough balls to make their own Linux-centric GIMP or Blender equivalent. That, or I've never heard of such thing yet.

R: 154 / I: 27 / P: 14 [R] [G] [-]

CryptoPonzi BTFO

Bitcoin Mining Was Just Banned in a Small Town



R: 48 / I: 3 / P: 14 [R] [G] [-]

Child abuse imagery ‘found within Bitcoin’s blockchain’

>Child abuse imagery has been detected in Bitcoin’s blockchain, according to a new study. The discovery potentially puts cryptocurrency users at risk, as anyone who downloads a blockchain could be held liable for illegal content.

>Researchers from RWTH Aachen University in Germany and the Data Protection Research Institute at Goethe University in Frankfurt found 1600 files, including texts and images, on blockchain. Among the data were instances of illegal pornography and serious privacy violations, the team says.

There goes your coins. NSA niggers at the behest of Jew bankers have been working hard to end the small success they had, but I must admit, that's a clever way to render it illegal and verboten in the minds of the general public.


R: 87 / I: 10 / P: 14 [R] [G] [-]

The future

What will happen?

<Selling personal data becomes illegal


<The botnet dystopia

R: 5 / I: 0 / P: 14 [R] [G] [-]

Virgl3d, hardware accelerated graphics in guest.

I finally got this up and going with Gentoo+qemu/kvm/virt-manager, I figured I would report the results in case anyone had their hopes up for this.

It's so slow it's unusable. Don't get your hopes up. With the host integrated intel hd graphics pulling 10k in glxgears, virgl3d pulls 200fps inside of the guest. It's using the gpu based on measured cpu usage and the guest saying virgl3d is enabled. Software rendering on the same host/guest measures at 1000 fps. Virgl 3d is so slow it causes almost unusable mouse lag.

Has anyone had better results with this? Presumably with a beastly GPU the performance might be better than software rendering.

R: 13 / I: 0 / P: 14 [R] [G] [-]

Intel Files Patent For Energy-Efficient Bitcoin Mining Hardware

>Intel is exploring the creation of specialty hardware for mining the popular cryptocurrency Bitcoin, according to a U.S. patent application released Thursday.

>The patent, filed on Sept. 23, 2016, describes a Bitcoin mining hardware accelerator that may include a processor core with a hardware accelerator coupled with it.

[https://archive.fo/t90UW] https://crn.com/news/components-peripherals/300101461/intel-files-patent-for-energy-efficient-bitcoin-mining-hardware.htm

Other related news:

>AMD and NVIDIA making cryptocurrency mining cards

[http://archive.is/0CZ34] https://www.tweaktown.com/news/57896/amd-nvidia-making-cryptocurrency-mining-cards/index.html

>Samsung made a special chip for mining cryptocurrency

[http://archive.is/slEuO] https://www.engadget.com/2018/01/31/samsung-asic-cryptocurrency-mining-chip/





R: 43 / I: 9 / P: 14 [R] [G] [-]

Unsafe Firefox operations

Since I am officially not welcome on the Mozilla bug tracker, I'll just drop it here and maybe this eventually reaches the right people.

So, let's play a game. When you choose "forget about this site" in the context menu of an item in the history window, do you think that the saved passwords for this site (if you had any) would be kept?

The answer is: no, you will lose them

There's also no confirmation dialog when doing this, nothing.

Do you guys think that this is good for users?

R: 62 / I: 12 / P: 14 [R] [G] [-]

Microsoft Bans any Offensive Speech in Skype, as Well as Other Services


> if found violating its rules, the users will forfeit their account balances, any content licenses they may own, and their Xbox Gold Membership time if they run afoul of these new rules.

>Microsoft didn't respond to questions about what it believes to constitute "offensive language," and how it determines when someone's account should be suspended or banned. The company also didn't reply to questions about what prompted these recent changes in its Service Agreement.

>Microsoft clarified some of the issues for us and said that "Microsoft agents do not watch or listen to your Skype call." However, the company didn't clarify whether or not software or machine learning algorithms are used to monitor Skype calls or other services in real-time for Service Agreement violations.

>In the full text of the agreement, Microsoft included the following paragraph, to which the above paragraph refers:

<Don’t publicly display or use the Services to share inappropriate content or material (involving, for example, nudity, bestiality, pornography, offensive language, graphic violence, or criminal activity).

>One of the issues with banning of accounts, especially if the violation isn’t too severe, is that such action could represent a major disruption to a user’s life.

For instance, Microsoft has been encouraging users to use Microsoft accounts to log-in to Windows instead of using local accounts. It has also encouraged users to encrypt their laptops using the same Microsoft accounts, where the keys are stored by default. Those keys can’t be recovered without the Microsoft account, so the user would no longer have access to the laptop’s data if the account was banned. The same user may also be using Outlook and Office 365 with their main Microsoft account, too.


R: 29 / I: 2 / P: 14 [R] [G] [-]

holy shit

>be me

>sheltered ubuntu and mint user for 11 years

>every minimal distro i've tried never just werks like ubuntu/mint

>finds archlabs

>everything works

>200mb memory usage

fuck all you /g/entoo niggers, i'm about to install this shit

R: 28 / I: 2 / P: 15 [R] [G] [-]

Mastodon Friends

Any of you use Mastodon? I'd like to make some friends through it but don't know anyone else who uses it. Furthermore, I want to get my IRL friends to start using it but need some experience with it before I make that happen.

If anything, I'll be your friend. For free.

R: 43 / I: 5 / P: 15 [R] [G] [-]

Why are the free as in speech options so dismal?

I needed to get a smartphone for my job and have been doing what little I could to prevent companies from making money by datamining me. But the libre options available in places like F-droid are pathetic. Many can't even open PDF or music files from my SD card while the programs that make money snooping around my phone do.

If people like me who are aware and willing to use free as in speech options and support it wherever possible are having this much trouble, there is no way this movement is going to grow let alone survive.

R: 26 / I: 2 / P: 15 [R] [G] [-]


>eoma68 claims to be free

>eoma68 claims to be modular



what does tech think

R: 4 / I: 0 / P: 15 [R] [G] [-]

What's your longest up time?

R: 5 / I: 0 / P: 15 [R] [G] [-]

MavenApache - Java

Hello. I need guidance regarding an assignment from free pre-internship program for Java that i just joined. I wasn't able to get to the first meeting because I had an exam that i couldnt miss, so now i'm pretty much left empty-handed and I have to complete it in less than 20hours.

Our first assignment is in the picture.

I have to make use of "Maven Apache" to complete this task. I barely started learning Java and now I paused that process to learn what and how to use Maven. How would u create this app? I'm not asking for source code or anything. Just how would u approach this? What would u use (if you were to use basic things from Java) ? I don't need to do any testing with Maven, yet, nor adding dependencies. How would u go for this Java app (newbie style of course) ?

I'm really a beginner to this whole thing, but I also want to learn and hopefully make my way a little higher. Thank you.

R: 41 / I: 14 / P: 15 [R] [G] [-]

>middle click a link

>it doesn't just fucking open in a new tab

R: 133 / I: 48 / P: 15 [R] [G] [-]


who wants to late night drunk code

R: 17 / I: 0 / P: 15 [R] [G] [-]

A world where everything has already been programmed...

A world where no 'reinventing the wheel' is possible. How would it look like?

R: 77 / I: 7 / P: 15 [R] [G] [-]

Oracale Vs Google Back From The Dead

Do you use Java? Did you make money? You now owe Oracle money!

Oracle kept on reopening the case until they found a judge stupid enough to deem Java APIs as not fair use.


Clojure? Scala? Kotlin? All use Java API's as well, Oracle has destroyed the entire ecosystem in one fell swoop.

R: 14 / I: 3 / P: 15 [R] [G] [-]

Imageboards + Security

Realistically speaking, how (in)secure is risky shitposting or viewing/replying in illegal or suspicious threads on 4chan, 8chan and other imageboards?

I figure that 4chan is obviously less safe (no TOR, archives, subpoenas+logs, Google CAPTCHA) but is it even a realistic risk so long as you aren't messing with football or exploding vans?

R: 67 / I: 5 / P: 15 [R] [G] [-]

Best secure email provider?

Obviously you're never going to keep out Big Brother, but what's the best email provider to keep corporations like Kikerosoft and Jewgle out of your business?

R: 5 / I: 0 / P: 15 [R] [G] [-]

AV1 finally finalized


FFMPEG getting support ready.


This is it gentleman. Time to start reencoding your chinese cartoons.

R: 47 / I: 5 / P: 15 [R] [G] [-]

Saving and Verifying the Internet

The big problem with the web archive sites, is that they must comply with DMCA takedowns on a regular basis, they are susceptible to censorship.

The big problem with saving the page yourself, is that it can't be verified, nobody trust's you.

This made me think, what if a site was created, that does nothing but archive and share the hashes? The site downloads the web page and all it's content like a normal archiver would, but instead of sharing the site, it simply shares and store's the hash, but delete's the content.

A user would create the archive on thier own with a format that matches the archive verification site. The user would then request the site to verify and and archive the hash. The user would not upload their version of the archive, the site would generate it on it's own. The user would then check that their hash match's the verification site's hash (which it should if everything went smoothly).

The user would then be able to freely share this webpage, and avoid censorship, and this shared web page could be verified as accurate by anyone that wants, just like archive.is and the rest are assumed to be accurate with the contents of their archive, only the archive site only verifies that hash.

I wanted to bounce this idea.

The big keypoint here, is weather or not a hash is considered copyrighted content. If I hash a proprietary file, or website, or anything else proprietary, is the hash still protected by the original file's copyright? Everything I've been able to find on this says no.

The other issue is matching the format between the user's browser and the verification site, so that the hashes line up in the first place. maff & mht look like they are dead. This would require a good amount of work, but there are already extentions to save the web page into a single file,



There aren't as many as I thought there would be, but they do exist, save page WE is GPLv2, so the method they use to create the single page archive could be copied verbatim on the verification site, or a new format could be created (I'm thinking something like just tar the output of the browser's "save complete page", the folder and the file, not sure if that would line up cross browser), for use on the verification site, and the user's browser via webext.

Is this idea worth exploring? Do you think anyone would bother to use it, or just continue to deal with archive.is and the like's censorship?

R: 75 / I: 9 / P: 15 [R] [G] [-]

Why are websites so shit?

Because it is 2018 and people have forgotten how to static HTML. All that lovely rendering code in your browser goes unused as people rewrite it in Javascript, badly; or even in C++ and then compile to web assembly, that’s all the rage now, because why stick with one layer of abstraction when you can involve three?

Oh, and of course everyone rolls their own, so that website with the dancing pigs not only has its own stack, but also one for every ad and tracking network it pulls in. It takes a whole lot of javascript to provide that transparent pixel!

The situation is no better on the server side, of course. Why write static HTML for your pageful of text when you can have a web framework pulling C++ from a SQL database, compiling it to web assembly on the fly and vomiting forth to the browser just in time because someone might want their flying unicorn background to have different colour sparkles and pointing those people at a different static location is just gauche.

No, I’m not bitter, far from it. It all makes work for the working man to do.

R: 20 / I: 1 / P: 15 [R] [G] [-]

Fraudulent Web Traffic Continues to Plague Advertisers...

Adobe found that about 28% of website traffic likely came from bots and other “non-human signals”


In a recent study, Adobe found that about 28% of website traffic showed strong “non-human signals,” leading the company to believe that the traffic came from bots or click farms. The company studied traffic across websites belonging to thousands of clients. Adobe is currently working with a handful of clients in the travel, retail and publishing industries to identify how much of their web traffic has non-human characteristics. By weeding out that misleading data, brands can better understand what prompted consumers to follow their ads and ultimately visit their websites and buy their products.

“It’s really about understanding your traffic at a deeper level. And not just understanding, ‘I got this many hits.’ What do those hits represent? Were they people, malicious bots, good bots?” said Dave Weinstein, director of engineering for Adobe Experience Cloud. While hardly the first study of online fraud, Adobe’s findings are one more indication of how the problem has roiled the fast-changing ad, media and digital commerce industries, while prompting marketers to rethink their web efforts. Non-human traffic can create an “inflated number that sets false expectations for marketing efforts,” said Mr. Weinstein.

R: 81 / I: 17 / P: 16 [R] [G] [-]

>30 years ago

every single 10 year old that had a home computer in his house knew how to program in BASIC


adult in his early 20's who uses a computer for almost everything doesn't even know what a variable is

what happened?