(9.08 KB 300x300 eUNBqo.jpg)
Anonymous 09/26/2016 (Mon) 14:29:26 [Preview] No. 6833 [Reply]
I was using archive.is to get a better view on sites that rely on javascript and now they've enabled CloudFlare which require javascript.

Is there any alternative to it ?
39 posts omitted.

Anonymous 02/07/2017 (Tue) 03:40:08 [Preview] No. 7959 del
(428.49 KB 1913x1080 cuckflare.png)
does anyone know the archive.is operators? someone needs to tell them to remove the pointless captcha (I hear this can be done by unblocking the country T1 (tor) in cuckflare settings). they probably don't know it's enabled because they never visited their site through tor (or maybe they're morons and actually believe the captcha accomplishes anything more than blocking legitimate users, i don't know)

Anonymous 02/17/2017 (Fri) 21:52:43 [Preview] No. 8041 del
How difficult would it be to archive clearweb webpages onto an onion website?Zeronet? I2P? Not using archive.is or web.archive.org/save/ from tor rather making a tor-based clearweb archive? That would be ideal for the archival of information to diversify.It is a natural response to the increasing allowence to censor news based on subjective standards of credibility.

Anonymous 02/19/2017 (Sun) 18:48:29 [Preview] No. 8048 del
that's not such a bad idea actually, but you'd have to specify which websites you want to archive, because you can't just scrap the whole clearnet and put it in an onion archive

(86.53 KB 1024x1024 appelbaum.jpg)
Appelbaum Anonymous 02/17/2017 (Fri) 17:47:28 [Preview] No. 8033 [Reply]
Is there any more news on the Jacob Appelbaum situation? It seems like he's disappeared off of the face of the Earth after the allegations. I find the fact that multiple witnesses have come out against the stories that were told on their behalf disturbing.

>Website comes out with a bunch of rape allegations
>Appelbaum denounces the allegations
>Appelbaum is effectively exiled from the free software community despite the lack of a trial
>multiple witnesses come out saying that the allegations made in their name were false, or at best heavily misinterpreted
>Even if all of the witnesses declare that Jake is innocent, his reputation is forever destroyed

Scary stuff.

>article by Die Zeit

>similar article by gizmodo

>statement from Jill Bähring, one of the supposed victims

Message too long. Click here to view full text.

9 posts and 3 images omitted.

Anonymous 02/22/2017 (Wed) 16:39:38 [Preview] No. 8075 del
>"if you boldly and righteously declare to people in a position of significant governmental power that they should leak sensitive internal intelligence information about immoral government activity that should be in the public realm, then are flabbergasted and elated to find that they do so; or if you are involved in any serious research which is inconvenient or dangerous to the security state;
>or if you target any individual in the chain of political hierarchy and they get wind of what you’ve done; then
>the great Eye of Sauron
>feels entitled to, and does, make a point of of trying to know every single thing you do, say and think, 24 hours out of every day, 7 days a week.


Anonymous 02/22/2017 (Wed) 16:44:19 [Preview] No. 8076 del
(138.49 KB 1477x846 frcja.png)
This from the article above is also true, everyone knows the Assange thing is bullshit. Now that he's a cold corpse, it's time to admit that he just did "the boyfriend maneuver" and only faggots would object because they have no interest in normal things like pussy. Assange RIP, may have been a Zio tool but he will shine chrome, eternal, for his love of midnight snack. Fully allowed within the lines play.

Anonymous 02/25/2017 (Sat) 08:00:24 [Preview] No. 8117 del
>everyone knows the Assange thing is bullshit
I searched the blockchain when that happened but found nothing. The only thing that still bothers me is the idea that the pre-commit hashes were for the "decrypted data", but that's known to be an inferior technique, as describe in both https://stribika.github.io/2015/01/04/secure-secure-shell.html (under "Message authentication codes") and https://lwn.net/Articles/681616/. I can't imagine Assange fucking up like that. It haunts me to this day.

Anonymous 02/27/2017 (Mon) 10:11:25 [Preview] No. 8125 del
found the markov bot

this one apparently trained specifically with anti-wikileaks propaganda

Anonymous 02/27/2017 (Mon) 14:35:36 [Preview] No. 8127 del
the only thing useful that jake made is tlsdate but that's really it.

Anonymous 09/01/2016 (Thu) 17:58:36 [Preview] No. 6599 [Reply]
Can something like this be achieved with only the command line ? https://rain.today/

I'm currently looking at sox.
4 posts omitted.

Anonymous 09/04/2016 (Sun) 14:00:27 [Preview] No. 6633 del
audacity can produce white noises...

Anonymous 02/26/2017 (Sun) 23:54:44 [Preview] No. 8120 del
>cat /dev/urandom | aplay

Anonymous 02/27/2017 (Mon) 05:36:11 [Preview] No. 8123 del
>cat /dev/urandom | aplay
Useless use of cat.
aplay </dev/urandom

Anonymous 02/27/2017 (Mon) 09:16:49 [Preview] No. 8124 del
(1.02 KB 91x17 Screenshot.png)
(23.32 KB 691x426 squint.jpg)
Is it just me? Why is that text so small?

Anonymous 02/27/2017 (Mon) 11:49:18 [Preview] No. 8126 del
yes when font changes so can sizes but does seems to be something funky about 12px ending up as 9.75px. that 75% rule is getting applied twice for some reason

(283.33 KB 480x451 _______.png)
NSA EQGRP Anonymous 08/15/2016 (Mon) 22:17:57 [Preview] No. 6271 [Reply]
Equation Group Malware Dump

PW: theequationgroup


SHA-512: 75ff32f1162d99c597d34e1004ed2e9fe261b05f10b59d113cf8327ccbe0abe79d3675c2011e7ac97a17d6e7bff6a51db8f40d137fe1ffd5a9049f29d00ce663

Sauce = github (taken down): https://github.com/theshadowbrokers/EQGRP-AUCTION/
Archive: https://archive.is/cXz4C

>!!! Attention government sponsors of cyber warfare and those who profit from it !!!!

>How much you pay for enemies cyber weapons? Not malware you find in networks. Both sides, RAT + LP, full state sponsor tool set? We find cyber weapons made by creators of stuxnet, duqu, flame. Kaspersky calls Equation Group. We follow Equation Group traffic. We find Equation Group source range. We hack Equation Group. We find many many Equation Group cyber weapons. You see pictures. We give you some Equation Group files free, you see. This is good proof no? You enjoy!!! You break many things. You find many intrusions. You write many words. But not all, we are auction the best files.
12 posts and 1 image omitted.

Anonymous 08/18/2016 (Thu) 14:17:39 [Preview] No. 6366 del
Kaspersky Lab analysis says Monday's leak almost certainly came from Equation Group.


Anonymous 08/18/2016 (Thu) 19:16:44 [Preview] No. 6372 del
>Total Received 1.72303178 BTC

Anonymous 02/04/2017 (Sat) 15:00:30 [Preview] No. 7929 del
[email protected]:~/bla/tools$ unzip EQGRP-Auction-Files.zip
Archive: EQGRP-Auction-Files.zip
End-of-central-directory signature not found. Either this file is not
a zipfile, or it constitutes one disk of a multi-part archive. In the
latter case the central directory and zipfile comment will be found on
the last disk(s) of this archive.
unzip: cannot find zipfile directory in one of EQGRP-Auction-Files.zip or
EQGRP-Auction-Files.zip.zip, and cannot find EQGRP-Auction-Files.zip.ZIP, period.


Anonymous 02/05/2017 (Sun) 08:55:25 [Preview] No. 7932 del
Did you rename the files before joining them? They need to be joined in order.

(18.15 KB 170x191 serveimage.png)
Anonymous 06/25/2016 (Sat) 13:37:23 [Preview] No. 5510 [Reply]
I have a whole free week on my hands and i want to make most of it by installing a fresh new distro. Since i value /tech/'s opinion, tought i'd ask you guys.

Been using Linux Mint fot a year, but now i want a distro that is clean and not full of software i don't need (like Mint is). Can't decide between Debian or Arch, help me maybe? I kinda have a life, so if Arch is really that high maintenance, it's out of the picture.
65 posts and 3 images omitted.

Anonymous 01/19/2017 (Thu) 21:25:09 [Preview] No. 7876 del

is it really fair to compare LOC of linux(that runs on virtually anything relevent these days) to comfy days of PDP?

linux kernel code's quality VARIES.

For portion where linus himself and experienced devs invest most of their time tend to be high quality software with lots of technical gems.

It's just vendor specific parts where codes of rather questionable quality get introduced.

Small companies throwing in whatever crap that happens to compile and hipsters who wants title of 'linux developer' spoils community and ultimately, kernel itself.

Theo might be autist but at least he applies autism for better quality most of the time.

I'm not sure what's Linus' plan with kernel anymore...what is he trying to focus on with this dumpster fire.

Anonymous 01/20/2017 (Fri) 07:09:35 [Preview] No. 7879 del
Sure, Linux has reasons to be larger while sticking to the same philosophy, but not to this extent. It's also much larger because it's so filled with features. Its size is also the result of its very different design philosophy. And I don't think that's a bad thing, but I do think that it invalidates arguments that are just "this one other part of the system doesn't follow the unix philosophy either, therefore it's shit".

anyone from egypt Anonymous 02/17/2017 (Fri) 20:46:38 [Preview] No. 8040 del
anyone from egypt

Anonymous 02/18/2017 (Sat) 17:08:49 [Preview] No. 8045 del
why do you ask?

Anonymous 02/26/2017 (Sun) 23:56:27 [Preview] No. 8121 del
bumping this

Also Manjaro offers official OpenRC support and it's developed as a user-friendly distro while offering more or less the same power as archlinux. The core team clearly lacks an understanding in security, but it's the best we have that has the potential to grow as ubuntu/mint and "reach the masses"

(2.43 KB 305x130 matrix.png)
the real open source alternative to Discord? Anonymous 02/05/2017 (Sun) 17:58:38 [Preview] No. 7934 [Reply]
there's Riot https://archive.is/7jPpt
Tox, Matrix.
4 posts omitted.

Anonymous 02/07/2017 (Tue) 00:04:25 [Preview] No. 7948 del
Google Hangouts
>Hangouts bring conversations to life with photos, emoji, and even group video calls for free. Connect with friends across computers, Android, and Apple devices.

Anonymous 02/07/2017 (Tue) 08:06:44 [Preview] No. 7961 del
Oh great, let's take Jabber, and shove it into HTML!
Federated systems are great from a technical standpoint, and nerds like me will always use them just fine. But if we want encryption to actually move out of the hands of the massives after only nerds having it for 50 years then it needs to be on fully distributed systems. Dealing with servers and configuration does not make any sense to normal people. I've tried to get my friends to use Jabber but when the "app" is called Jitsi and the sign up form is at "hot-chili.net" and add account menu says "XMPP" and I tell them to add me at [email protected] then they get confused and give up. The app, the protocol, the website are all just one amorphous thing to tech illiterate people. Which is to say, everyone who is not us.
Something like Tox is way better.

Anonymous 02/07/2017 (Tue) 14:50:51 [Preview] No. 7963 del
Why do dis fam?

Anonymous 02/26/2017 (Sun) 23:26:41 [Preview] No. 8118 del
Why not Ring, it was recently endorsed as an official GNU Project

Also Ring is god tier, not even joking, but Slack is kill. Riot just have to get the same level of attention or to get a big community

Anonymous 02/26/2017 (Sun) 23:27:34 [Preview] No. 8119 del
>Also Riot is god tier*
typo lel

(214.33 KB 2048x1365 03wbhp4n3why.jpg)
Blade Runner 2049 Anonymous 02/26/2017 (Sun) 13:06:39 [Preview] No. 219 [Reply]
So far, I think it might do the trick. What do you think?

https://youtube.com/watch?v=GDscTTE-P-k [Embed]

Anonymous 02/26/2017 (Sun) 17:46:44 [Preview] No. 221 del
Not too keen for ryan "drive" gosling, he seems to clean for a cyberpunk.

Very pleased it isn't a remake though, and the visuals look very consistent with the original.

Anonymous 01/06/2016 (Wed) 02:59:32 [Preview] No. 2 [Reply]
Thank god there's a /cyber/ on endchan.

Let's kick this off right with a music thread.
8 posts and 10 images omitted.

Anonymous 01/31/2017 (Tue) 17:12:58 [Preview] No. 178 del
>We need more lorn

Anonymous 01/31/2017 (Tue) 17:36:10 [Preview] No. 179 del

Anonymous 02/25/2017 (Sat) 18:14:34 [Preview] No. 217 del
probably my fav

2814 - Before The Rain
https://youtube.com/watch?v=8OJdVsDAveE [Embed]

even bought the tape

Anonymous 02/25/2017 (Sat) 20:32:48 [Preview] No. 218 del
What is this buying tapes things I keep seeing? Are people actually buying cassettes? Why?

Anonymous 02/26/2017 (Sun) 13:24:47 [Preview] No. 220 del
No idea, I was big into mixtape trading back in the 90s. Had ads in magazines, met other traders irl and so on. Last year I was kinda blown away that some people still relase tapes with actual music instead of the experimental noise shit you find from time to time. So for me it's mostly a nostalgia thing now to listen to one once in a while, also I like to support the artist and get some physical item for it. So why not.

For most people i think it's just some weird vaporwave high af hipster thing though.

Endware Endwall 05/03/2016 (Tue) 08:54:28 [Preview] No. 32 [Reply]
Endware is a suite of programs geared towards internet privacy, security, and anonymity.

Endwall: endwall.sh is an iptables based firewall script designed to be implemented on any linux distribution shipped with iptables. endwall.sh is based on default drop policies, coupled with a novel strategy of passing packets on local host ports only for those enabled by the enduser. It comes with a variety of well used ports enabled with several additional port passing configurations available by uncommenting the script. It provides essential security to a new user.

Endsets: endsets.sh is a script that adds blacklisting and whitelisting functionality to endwall.sh. It depends on the program ipset. It is persistent on reboot if you enable ipset as a service. This is the recommended blacklisting tool for endwall if you are running a server or planning on opening up ports and services to the public and will require daily blacklisting of new incomming IPs.

Endlists: endlists.sh is a traditional text file list based blacklisting and whitelisting script. It has slow performance, and can't be updated on the fly. Good for <1000 ip subnets, very tedious and slow to run for more than that. Blocks the IPs by adding them as individual rules to the iptables ruleset. Works but not recommended for heavy duty on a server. May be useful for workstation use to block ip ranges if you are not opening up ports and services to public clients.

Endtools: endtools are a collection of scripts including alogz.sh, mlogz.sh, spamlogz.sh and iplookup.py. These scripts will help to service an enduser of endwall in adminstering endsets/endlists.

iplookup.py is a geoiplookup script written in python and requires python and pygeoip. It has simmilar functionality to maxmind's geoiplookup program and uses the maxmind *.dat files.

spamlogz.sh is a script that searches through log files to find flagged log entries flagged in endwall.sh, endsets.sh and endlists.sh.

alogz.sh is a daily log reading script designed to read the output of an apache http server's log output.

mlogz.sh is a daily log reading script designed to read the output of a postfix smtp server's log output.

Message too long. Click here to view full text.

153 posts and 2 images omitted.

Endwall 02/11/2017 (Sat) 23:11:21 [Preview] No. 828 del
Yeah sure. I'll start working on that next friday.

I also have a script that annotates proxies with the protocol but it's not much. I'll add the headers to it and release it next week.

>>826 I also just added --headers-on flag to endtube to turn on the hardcoded headers and overide the defaults. So this in principal returns the full functionality of the previous versions, but defaults to the defaults.

Endwall 02/12/2017 (Sun) 04:57:41 [Preview] No. 829 del
proxyload.sh version 0.12

##fixed a bug where the ssl_proxies wouldn't download, added a while loop and a check to make sure that they download. Might take longer to run but should give the correct output.

protofix.sh version 0.02

## A file to append the protocol extension to the proxies for use with endtube

$ protofix https ssl_proxies_checked.txt >> plist_ssl.txt
$ protofix socks5 socks_proxies_checked.txt >> plist_socks.txt


Message too long. Click here to view full text.

Edited last time by Endwall on 02/12/2017 (Sun) 05:04:16.

Endwall 02/14/2017 (Tue) 05:56:56 [Preview] No. 830 del
endjail.sh version 0.01

a fire jail default to apply to programs. restrict network with --no-net flag

xtrac-ytpl.sh version 0.02

Rebrand of endxtplist.sh for extracting youtube playlists into url list text file.

If you have any comments or suggestions about these files or any other files, notice any bugs, or have product requests, suggestions or ideas comment below. Thanks.
Edited last time by Endwall on 02/14/2017 (Tue) 06:04:16.

Endwall 02/23/2017 (Thu) 00:48:23 [Preview] No. 839 del
endstream.sh version 0.04

This is not a security product. It currently opperates in clearnet, but I'll advertize this here as well.

This is a live streaming application using mpv and youtube-dl but operates in the Clearnet (No Tor). This can be modified to do so if you think that streaming is fast enough behind tor, which I have found to be tedious and unuseable. You can use this on a media center computer connected to a large screen tv, or for personal desktop use. Currently it is only grabbing streams from youtube, However if you make some suggestions of other live streams that work with mpv and youtube-dl, I will add them in later releases.

I have added more channels. Some of these streams go dead after a day. But I'm sure some of these will stabalized over time. Go ahead and add your own streams from 121-140. If you know any other sources or good streams post below. Thanks.

Endwall 02/26/2017 (Sun) 01:48:06 [Preview] No. 841 del
endstream.sh version 0.09

I've made several changes to endstream.sh including requiring firejail. I've stablized the channel listing, and I'll update this maybe once a week to remove dead streams, but I'm not going channel hunting anymore. If there is something really good to add as a stream suggest it below. I've added streams from youtube, dailymotion and twitch.

There are about 175 channels hardcoded into it now. Bear in mind that using this in the open (Clearnet) will reveal your channel preferences to the surveillance agency. I only recomend using this on a segregated network on a media center computer setup, and only if you don't care if your streams or viewership is logged. It's a cheap media streaming multi-language cable package.

>>827, >>828
I'll work on that next Friday/Saturday, but I have midterms and assignments due over the next two weeks or so, so it might take longer to get to. Place Comments, Suggestions, Bug Reports, New Product Ideas below. Thanks.

Internet Censorship Anonymous 02/08/2017 (Wed) 01:52:49 [Preview] No. 7971 [Reply]
If you are an American, you can thank these two senators (John Mccain and Fritz Hollings) for censoring a large portion of the internet and preventing people from gaining knowledge and learning.

>"Schools and libraries subject to CIPA may not receive the discounts offered by the E-rate program unless they certify that they have an Internet safety policy that includes technology protection measures. The protection measures must block or filter Internet access to pictures that are: (a) obscene; (b) child pornography; or (c) harmful to minors (for computers that are accessed by minors). Before adopting this Internet safety policy, schools and libraries must provide reasonable notice and hold at least one public hearing or meeting to address the proposal."

It is because of them that filtering software such as IBoss exists and why schools have google integrated within their computers to force students to use their services and to use a filtered search.


How does this make you feel?
4 posts omitted.

Anonymous 02/22/2017 (Wed) 19:10:49 [Preview] No. 8077 del
I'm not for censorship but i get what he's saying, school networks are for school and not for playing games, watching porn etc. And the reason why they force students to use Chrome is likely that the lazy admin isn't foolish enough to require users to use IE, and makes use of Windows GPO to set up stuff like proxies and custom certificates (Chrome uses Windows' settings, Firefox doesn't trust Windows and has its own way of configuring this).

Anonymous 02/22/2017 (Wed) 19:13:16 [Preview] No. 8078 del

Teacherdood, you get paid by whom, state, city, or feds?

Anonymous 02/22/2017 (Wed) 21:25:47 [Preview] No. 8080 del
(1.10 MB 2048x1536 IMG_6070.PNG)
Who cares if the geniuses are multitasking and playing games while you give an inefficient slow lecture, or hand out pointless crossword puzzels as busy work which everyone will cheat on. If the sumb-fucks are not gonna study when it matters, simply hold them back and flunk them until they shape up or drop out.

Anonymous 02/23/2017 (Thu) 08:22:56 [Preview] No. 8084 del
Back when I was in high school 4chan was blocked for CP. I thought it was pretty funny. iBoss can be bypassed if you manage to get into the default iboss account on the school system; in mine, I just searched it up on the active directory and guessed the password. Administrators almost had me arrested lmao

Either way, fuckit. It only applies to school kids and even then only 8 hours of the day. For computer dorks it provides a fun game of trying to break it. As long as they don't extend it out to the "real world" and make a filter for all ISPs, I don't exactly give a shit

Anonymous 02/25/2017 (Sat) 07:55:49 [Preview] No. 8116 del
>school networks are for school
School is for indoctrination. Free yourself. >>8080 is right in that it ought to be their choice whether they misuse resources and fail because of it, but let them choose.

(90.75 KB 350x350 R-9832721.jpg)
Anonymous 02/23/2017 (Thu) 19:48:21 [Preview] No. 8097 [Reply]
I'm trying to do something but I don't know the right tool for it.
I want to get the page number from lsw and store it in a file. In this case number 96
This is an example output.
0x1a00005 st
0x180000a the.pdf - 96/181 (96 dpi)
I'm thinking of grep and regex but I've never properly used grep and seems like something too big for such a simple task.

Anonymous 02/24/2017 (Fri) 20:51:45 [Preview] No. 8109 del
Hard to tell with that little info.
sed -n 's:.*\.pdf - \([0-9][0-9]*\)/[0-9].*:\1:p'

Anonymous 02/24/2017 (Fri) 22:31:05 [Preview] No. 8112 del
I actually did it with:
grep -e 'dpi' | sed 's=.*- ' | sed 's=/.*'
but yours is way better. Thank you.

Anonymous 02/24/2017 (Fri) 22:34:20 [Preview] No. 8113 del
For some reason lynx fucked up that paste.
I basically narrowed down the line looking for dpi since, the removed everything in fron of "- " and everything after "/"

Anonymous 02/25/2017 (Sat) 04:18:51 [Preview] No. 8114 del
>For some reason lynx fucked up that paste.
It was not lynx. It was the 2 = in a row, which does RED TEXT. You should use code tags.

Anonymous 02/25/2017 (Sat) 04:28:43 [Preview] No. 8115 del
(22.46 KB sed.pdf)
You do not need to pipe grep into sed or sed into sed like that. You can give multiple commands to sed.

(1.76 MB 1298x924 1484904007282.png)
Anonymous 02/21/2017 (Tue) 12:24:23 [Preview] No. 8060 [Reply]
Does anybody know what happened to serax? I was using to as my default searcher (even though it is slower than most) but it seems to be down. I'm not sure what to use in the meantime, what do you use?
Unrelated image.
3 posts omitted.

Anonymous 02/21/2017 (Tue) 15:59:01 [Preview] No. 8066 del
Personally I use CuckCuckGo, doesnt give me any problems.

Anonymous 02/23/2017 (Thu) 14:32:52 [Preview] No. 8090 del
Works for me, i use it only in Tor Browser.

Anonymous 02/23/2017 (Thu) 19:50:04 [Preview] No. 8098 del
I've also been having problems with searx lately. I just switched to another instance. Has anyone contacted the owner ? I don't use mail.

Anonymous 02/23/2017 (Thu) 21:26:47 [Preview] No. 8101 del

That site exist and leads to google.

Anonymous 02/24/2017 (Fri) 21:18:32 [Preview] No. 8111 del
(66.61 KB 950x650 cuckcuckgo.png)

Anonymous 02/22/2017 (Wed) 22:05:46 [Preview] No. 8081 [Reply]

>CyberX has confirmed at least 70 victims successfully targeted by the operation in a range of sectors including critical infrastructure, media, and scientific research. The operation seeks to capture a range of sensitive information from its targets including audio recordings of conversations, screen shots, documents and passwords. Unlike video recordings, which are often blocked by users simply placing tape over the camera lens, it is virtually impossible to block your computer’s microphone without physically accessing and disabling the PC hardware.

>Most of the targets are located in the Ukraine, but there are also targets in Russia and a smaller number of targets in Saudi Arabia and Austria. Many targets are located in the self-declared separatist states of Donetsk and Luhansk, which have been classified as terrorist organizations by the Ukrainian government.

judging by the targeted countries i wonder who would benefit from something like this...

Anonymous 02/23/2017 (Thu) 04:50:42 [Preview] No. 8083 del
Really makes you think.

Anonymous 02/23/2017 (Thu) 09:55:51 [Preview] No. 8085 del
That's so interesting. I always thought of passwords by their sound as I typed them. I wonder how accurate this can be and if the keyboard used has any influence.

Anonymous 02/24/2017 (Fri) 20:53:03 [Preview] No. 8110 del
I read "cyberx" as "cyber sex"

Anonymous 10/17/2016 (Mon) 08:47:02 [Preview] No. 7137 [Reply]
some friend recommend me today to install some shit to reformat my usb now I'm kinda paranoid bout viruses right now,
I have no sleep in days
And i think this is a good option to do this


Anonymous 10/20/2016 (Thu) 07:36:45 [Preview] No. 7162 del
To format your "Ãusb", use dd:

dd if=/dev/zero of=/dev/sdx

change sdx to your interface.
If you are paranoid about your system being infected, you should reinstall your system and reflash your BIOS...
But since you don't know how to use dd to format a disk, you probably have many other security problems that doesn't include your friend's software. Encrypt your disk if you want more security/privacy.

Anonymous 02/16/2017 (Thu) 17:43:40 [Preview] No. 8030 del
(6.11 KB 255x200 what.jpg)

Anonymous 02/23/2017 (Thu) 22:10:44 [Preview] No. 8102 [Reply]


Anonymous 02/23/2017 (Thu) 22:20:16 [Preview] No. 8103 del
It is exciting to think of all the hookers who will have BTC to barter with.

Oh I mean pimps

Anonymous 02/23/2017 (Thu) 23:37:51 [Preview] No. 8104 del
btc at $1197
gold at $1249

Anonymous 02/24/2017 (Fri) 08:54:17 [Preview] No. 8105 del
Anyone have a source? Where is it now?

I thought it wasn't supposed to spike like this again. Anyone know who is causing this fluctuation? My guess is some of those russian investors.

Anonymous 02/24/2017 (Fri) 17:36:30 [Preview] No. 8107 del

(125.25 KB 500x706 anzu 9.jpg)
Anonymous 04/11/2016 (Mon) 17:29:56 [Preview] No. 136 [Reply]
Who NEET here?
7 posts omitted.

Anonymous 04/11/2016 (Mon) 17:40:27 [Preview] No. 154 del

mark 04/11/2016 (Mon) 17:41:01 [Preview] No. 156 del
Whats this all you all have awonder

mark Anonymous 04/11/2016 (Mon) 17:41:05 [Preview] No. 157 del
OH NO!!!!! we got a tiger.

mark 04/11/2016 (Mon) 17:41:37 [Preview] No. 158 del
MARKDID ITHE KILLED thatyou think are

Anonymous 02/23/2017 (Thu) 23:31:51 [Preview] No. 603 del

Online Security News Endwall 07/07/2016 (Thu) 06:09:23 [Preview] No. 149 [Reply]
See a news article or CVE bug report on an emerging computer security issue and want to share it? Post below.

I will also post links to Hak5 Threatwire videos.
Edited last time by Endwall on 07/07/2016 (Thu) 16:22:47.
382 posts omitted.

Endwall 02/18/2017 (Sat) 02:05:57 [Preview] No. 831 del
Jupiter Broadcasting

Metadata Matters | TechSNAP 306
February 15, 2017
The latest on just who has access to your private email, Dan dives deep on the GitLab Postmortem & did you know that Transport for London has been tracking your wifi? We’ve got the details.

The Cantrillogy | BSD Now 181
February 15, 2017
This week on BSDNow we have a Cantrill special to bring you! All three interviews back to back in their original glory, you won’t want to miss it. Stay tuned for your place to B…SD!

Endwall 02/18/2017 (Sat) 02:08:39 [Preview] No. 832 del
Hak 5
Steam Profile XSS Attack - Threat Wire - Duration: 5 minutes, 53 seconds.
https://youtube.com/watch?v=ZIcLFkmgFqI [Embed]

Endwall 02/22/2017 (Wed) 04:21:14 [Preview] No. 833 del
Hak 5
Operation BugDrop Targets Ukrainian Infrastructure - Threat Wire - Duration: 5 minutes, 54 seconds.
https://youtube.com/watch?v=Ap2xkiBZ9hw [Embed]

Endwall 02/22/2017 (Wed) 20:11:46 [Preview] No. 838 del
Can Foreign Governments Hack Americans With Impunity?

Posted by: DividedBy0 February 21, 2017

A lawsuit being heard by the US Court of Appeals for the District of Columbia Circuit seeks to answer the question of whether foreign governments can hack Americans with impunity. In the case of Kidane v. Ethiopia, lawyers for the Electronic Frontier Foundation (EFF) and the law firm of Jones Day and Robins Kaplan are representing a man from Maryland, who is going by the pseudonym of Mr. Kidane, in a lawsuit where Mr. Kidane alleges the government of Ethiopia infected his computer with spyware. The lawsuit alleges that the secret malware, known as FinSpy, allowed the government of Ethiopia to conduct wiretaps on his Skype calls and monitor everything he and his family did on the computer for a period that lasted months. The court has allowed the man to use a pseudonym that he had used in the Ethiopian community, because the Ethiopian government has a history of punishing the family members of people who dare to oppose it. Mr. Kidane was born in Ethiopia and moved to the United States 20 years ago, where he sought asylum and became an American citizen. Kidane became infected with the spyware after he opened a Word document that was sent to him by agents of the Ethiopian government. After opening the document, FinSpy was secretly downloaded onto his computer from a server with an IP address located in Ethiopia. All activities, including Skype calls, keystrokes, passwords, e-mails, chats, and web browsing was monitored, recorded, and uploaded to a command and control server with an IP address located in Ethiopia and controlled by the Ethiopian government. FinSpy is developed and marketed by FinFisher, formerly known as Gamma International, a company based in the United Kingdom. It is part of a line of “IT intrusion” software made by FinFisher, which are only sold to government agencies. Their software is frequently used to spy on activists around the world. Kidane continues his lawsuit, which is being appealed. Recently, attorneys for Mr. Kidane argued before a 3 judge panel that the lawsuit should be allowed to continue. Under the Foreign Sovereign Immunities Act, foreign governments are only liable for acts committed within the United States. Kidane’s attorneys argued that his computer was located in Maryland and remained there the entire time it was being spied upon. Attorneys for Ethiopia argued that they should not be held liable because they did not have a human agent who was physically located within the United States. One of the judges on the panel asked the attorneys representing Ethiopia if they believed that they could be held liable for mailing a letter bomb to the United States, or for remotely hacking a self driving car in the United States and causing it to crash. The attorneys for Ethiopia responded to the judge’s question by saying that they believed they could not be sued for such actions. Kidane was spied on from at least late October of 2012 until March of 2013. The lawsuit was originally filed in February of 2014. Previously in the case, a federal court ruled that foreign governments could not be held liable for wiretapping American citizens within the United States. The DC Circuit Court is expected to rule on the appeal within a few months.
Edited last time by Endwall on 02/23/2017 (Thu) 20:15:32.

Endwall 02/23/2017 (Thu) 20:09:19 [Preview] No. 840 del
Jupiter Broadcasting

State Sponsored Audiophiles | TechSNAP 307
February 21, 2017
The details on the latest WordPress vulnerability, then the surprising, or perhaps not so surprising takeover of a cybersecurity firms website & watch out, hacker’s may be using your microphone to steal your data!

Bloaty McBloatface | BSD Now 182
February 22, 2017
This week on the show, we’ve got FreeBSD quarterly Status reports to discuss, OpenBSD changes to the installer, EC2 and IPv6 & more! Stay tuned for your place to B…SD!
Edited last time by Endwall on 02/23/2017 (Thu) 20:14:37.

Anonymous 02/23/2017 (Thu) 19:50:20 [Preview] No. 8099 [Reply]
read and learn famzies

Anonymous 02/23/2017 (Thu) 19:58:43 [Preview] No. 8100 del
>If a killer app could be a book, this is it. Would you like the power of invisibility?

(4.89 MB 500x281 1446448543096.webm)
Webm thread Anonymous 05/23/2016 (Mon) 23:08:37 [Preview] No. 3991 [Reply]
Post your /tech/ related webms
20 posts and 17 images omitted.

Anonymous 02/23/2017 (Thu) 15:22:34 [Preview] No. 8092 del
>but it is the same amount of trust involved
>How so?
>I'm not saying that by using a
>'nix OS you dont have to trust
>anyone, you do

Yeah like automatically downloading every damn thing you need a la sudo? I mean I used it when I was told to, sure I know how to remote into unix blade in retail stores and navigate all these fake ass virtual systems, yeah, it's fucking exciting as all fuck, don't get me wrong. I am fully vested in social security, I worked my whole fuckin life in IT, and I can live on < 1000 dollars a month. I live in a /pol/ based mentality, this tech board cannot understand, forgive me for abusing this thread. I pray OP will delete my posts.

>there's still mostly proprietary
>hardware if nothing else, BUT
>there's definitely not the same
>amount of trust involved when
>you're using Windows.

After I wrote the above posts, I realized that, I love being baited by a snipey comment like that, "fuckin windows users" I have heard it my whole life from the old days. But see, when baited, I just eat the bait, the fisherman, everything. It's fun for me. Yet, not so much fun for the fishers.

Message too long. Click here to view full text.

Anonymous 02/23/2017 (Thu) 17:56:46 [Preview] No. 8093 del
(96.86 KB 1024x682 malibus.jpg)
I've met many sound engineers in my work as an independent recording artist, and most of them were meaningless overpaid faggots.

Anonymous 02/23/2017 (Thu) 18:11:33 [Preview] No. 8094 del


but thy have to slum for work like all editors and end up cutting dome fag pr0n eventually, oh the horror stories I hear from career editors. Is video or audio engineering really even an actual job that people get paid for? Wow, that's awesome I guess. But the suffering of editing other people's worst video work, is painful, so, maybe pain taken, factors into this equation? We can assume faggoty means weak and petty and not an allusion to sexual prefs.

Anonymous 02/23/2017 (Thu) 19:13:06 [Preview] No. 8095 del
That is being over dramatic. You would not be surprised how little some of these musicians know about technology. If you can quickly compliment thee clients desired sound then you are acting as that artists foundation and can control that artist completely for that en-devour. is the artistic intent that they pay you to captain. That is the feeling of power. Now when someone wants you to do something that is artistically bankrupt a lot of these guys fill it in with their kikeling virtue memeing.Disrupting that dynamic by whatever means necessary is the pleasure that is received.

Anonymous 02/23/2017 (Thu) 19:19:34 [Preview] No. 8096 del

Hmm, not webm related but that was some good stuff. but

> kikeling virtue memeing.

WTF either you are a kike or you have virtue. I don't buy into recent faggy terms or chanisms, like virtue signal etc, means jack shit to me.

This is kinda fitting tho that we have a cross spectrum thread on tech board about webms and windows versus unix old farts, music engineer versus musician, heh, reminds me of that skrillex song with some dude talking about how no one is a musician if you can't play guitar. I mean, I am bout as good at guitar as I am at nixy stuff, but still, can I play along, yes, can I set up a BF2 server yes. Can I make and upload a webm? Hmm only just recently, thanks to some germans.

(195.81 KB 1600x1009 ja0.jpg)
(30.10 KB 400x400 ja1.jpeg)
Jacob Appelbaum leaves the Tor Project Anonymous 06/03/2016 (Fri) 23:57:29 [Preview] No. 4587 [Reply]
The fuck is up with this, /tech/?

Tight-lipped statement from Tor Project management (Shari Steele): https://web.archive.org/web/20160603234207/https://blog.torproject.org/blog/jacob-appelbaum-leaves-tor-project

Slanderous accusations on twatter: https://web.archive.org/web/20160603234349/https://news.ycombinator.com/item?id=11831629

Link mentioned by someone on the mailing list:
234 posts and 62 images omitted.

Anonymous 09/11/2016 (Sun) 13:38:30 [Preview] No. 6699 del
archive.is i aint clicking that shit nigger

Anonymous 09/12/2016 (Mon) 12:28:54 [Preview] No. 6711 del
>archive.is meme

let's centralize all links to 1 website so we can data mine ALL links posted on chans

Anonymous 09/12/2016 (Mon) 12:47:18 [Preview] No. 6712 del
(334.02 KB 982x3268 yawnbox.png)

It's an account from a person who was in Jacob Appelbaum's apartment when he raped "River".

He's friends with Jake so it's very biased.

Anonymous 02/22/2017 (Wed) 22:14:43 [Preview] No. 8082 del

(100.44 KB 350x350 R-9824211.jpg)
Anonymous 02/21/2017 (Tue) 15:45:49 [Preview] No. 8064 [Reply]
So my second hand x220 just arrived and all works fine except the backlight adjustment buttons. No biggie. Just set up some aliases that change /sys/class/backlight/intel_backlight/brightness.

Thing is I noticed a power folder in intel_backlight. Do I manually need to change power usage depending on the value of brightness or is it done automatically ?

/sys/class/backlight/intel_backlight/power/control is set to auto but ../power/runtime_enabled is set to disabled.

That kernel flag from the archwiki x220 page doesn't work.

Anonymous 02/22/2017 (Wed) 07:47:04 [Preview] No. 8070 del
I'm trying my best to remeber dealing with power when I was working at Intel, so bear with me.

The 'power' directory is for runtime power management and coresponds to a device going into a sleep state when it is idle (this is *not* the same as suspend to RAM). This directory exists for most devices (I was mostly fiddling with USB devices). In this case a sleep state makes sense for a device such as USB keyboard or mouse, since the device may not be being used and should enter a sleep state (but it's usually fucky and misses the first keypress or motion so it's usually disabled), but I have no idea what it would mean for a monitor. I'm guessing that changing that brightness doesn't count as entering a different *state*, so any power savings from changing the brightness is automatically done by the component; the only time runtime power management states may come into play is when your monitor shuts off due to inactivity (this is my guess, not confirmed).

See Documentation/power/runtime_pm.txt for more.

Hope that helps.

Anonymous 02/22/2017 (Wed) 20:29:41 [Preview] No. 8079 del
That helps a lot. Thanks for pointing me in the right directioin.

Secure OSes Anonymous 05/09/2016 (Mon) 18:21:17 [Preview] No. 37 [Reply]
What is the best OS option for a secure setup?
How do OpenBSD and Linux with patches compare in terms of the security they offer?
50 posts and 1 image omitted.

Anonymous 01/12/2017 (Thu) 20:45:27 [Preview] No. 788 del
why no linux-libre kernel for alpine
what are they trying to hide

Anonymous 01/15/2017 (Sun) 22:12:14 [Preview] No. 798 del

if you don't know how to compile kernel, don't buy hardwares that requre firmwares to work properly in the first place

Anonymous 02/22/2017 (Wed) 05:27:00 [Preview] No. 834 del
(2.77 MB 287x191 feels.gif)
I use a Librebooted laptop with Debian that has FDE enabled. I also have a GRUB password set up. Works well enough.

If you're going full tinfoil, then use a Librebooted machine with an OS you've made yourself and remove the networking hardware. Encrypt with Twofish to make brute forcing harder for the attacker.

Anonymous 02/22/2017 (Wed) 05:59:54 [Preview] No. 836 del
Epic thread doods, thanks for bouncing.

https://youtube.com/watch?v=EjbQ-BDh4PU [Embed]

Anonymous 02/22/2017 (Wed) 06:08:36 [Preview] No. 837 del
I didn't use GRUB because of the claims behind being easily accessible through hitting backspace a specific number of times to being the password. I don't have 100% FDE also because of that claim. I'm also worried that if I update to a newer version of GRUB some time in the future that it won't be compatible with Libreboot. To ease my paranoia, I made myself use syslinux instead, but of course, it's no real solution either.

Hardware Endwall 09/18/2016 (Sun) 18:31:31 [Preview] No. 580 [Reply]
Discuss hardware and alternative hardware concepts to increase computer and online privacy and security.
Edited last time by Endwall on 09/18/2016 (Sun) 18:50:04.

Anonymous 12/24/2016 (Sat) 17:47:43 [Preview] No. 740 del
Lynxchan installation tutorial

Anonymous 02/22/2017 (Wed) 05:31:33 [Preview] No. 835 del
(23.44 KB 500x327 dunno.jpg)
RISC-V looks pretty cool.

(29.73 KB 1172x380 logoText.png)
Anonymous 11/08/2016 (Tue) 12:47:02 [Preview] No. 7324 [Reply]
I'm running an instance of Tokumei that some of you wanted, I do not host the tor SFTP anymore.


Its pretty much anonymous microblogging with freedom of speech intended. Go mad.
16 posts omitted.

Anonymous 02/20/2017 (Mon) 07:44:07 [Preview] No. 8051 del
>reCAPTCHA is effective, easy for end users
no. fuck off with this shit. your site was completely broken shit when you spammed it on 8ch/tech/, with beliefs like this no wonder. since you can't even stray from coding "user friendly" bullshit like HN UX hipsters do, your site will never be useful to anyone who cares about privacy or security

Anonymous 02/21/2017 (Tue) 04:44:05 [Preview] No. 8059 del
Once again, I am not Walrus. My site was not broken, and I did not spam /tech/.

reCAPTCHA *is* effective enough. Google offers a difficulty slider when you generate an API keypair and the maximum difficulty is enough for nearly any site (I can barely solve them as a human). The minimum is quite good too; in practice even a dumb captcha whose answer is always the same keeps out nearly all spam.

reCAPTCHA *is* easy for end users. Many just need to click on a check box.

Obviously a captcha can't be perfectly effective and easy for end users at the same time, but reCAPTCHA's difficulty slider lets individual Tokumei sites decide what balance they want.

Regarding privacy and security, reCAPTCHA is very good. With the minimum difficulty settings we recommend, it can be solved without JavaScript using the Tor Browser Bundle. If you'd read the Tokumei site instead of just skimming torvalds.xyz and assuming Walrus is responsible for everything, you would know we shill Tor hard. Tokumei's site index recommends privacy-conscious sites that support Tor. We will index any sites that configure reCAPTCHA to be unusable with Tor with a 0/5 free speech rating.

I write user-friendly software with good UX not because I am a hipster (I personally hate material design) but because I am selling my software to users. For most users, material design is friendly. For the rest, I provide an excellent API so you can post from the command line or write your own interface. The material web interface also provides an easy way to install custom CSS to strip material bits you don't like. I don't know what else you want.

If you think Tokumei is HN hipstershit, you have not read a line of code.

Anonymous 02/21/2017 (Tue) 15:52:23 [Preview] No. 8065 del
So, why then you would give your users website visit info to Google if dumb captcha with fixed answer is enough (and unless someone goes after spamming your very specific site it holds true)? Why not make locally generated captcha like this website does? I dislike how exactly captcha is implemented here (see lynxchan thread, >>7569), but it is many times better than privacy-invading Google's "service".

Anonymous 02/21/2017 (Tue) 17:22:41 [Preview] No. 8067 del
>So, why then you would give your users website visit info to Google

Unless users ignore our recommendation to use TBB, we are not giving any useful info to either the Tokumei site host or to Google.

In the edge case that a user trusts a Tokumei host enough to access a site over the clearnet (either the site is served over the clearnet directly or they use a gateway) but does not trust Google, you have a point.

>if dumb captcha with fixed answer is enough

For Tokumei sites where this is enough, indeed this should be used over the tokumei-recaptcha apps.

>Why not make locally generated captcha like this website does?

Because captcha is complex and Tokumei is not HN shit. This nodeshit website depends on fucking ImageMagick.

But for clearnet hosts that want to avoid pinging Google and don't care about back end complexity, sure, a local captcha app would be good.

Message too long. Click here to view full text.

Anonymous 02/27/2017 (Mon) 19:35:42 [Preview] No. 8129 del
what the fuck. how can anyone be this stupid (assuming they're not a shill)?

captcha slider is meaningless. it is a concept made up to make customers feel good about themselves.

>I write user-friendly software with good UX
No, you missed the irony. UX is not a legitimate field. It's a term thrown around by charlatans to pretend user interface design is too hard for developers and needs professional people trained in CYBER-PSYCHOLOGICAL interaction and what not. Then it provides a set of doctrines about how to design user interfaces, and the result is completely retarded shit, such as your site. At this point I can't even remember what your site looked like because it was down every time this thread got bumped, but it was twitter tier buggy unusable slow garbage.

>The material web interface also provides an easy way to install custom CSS to strip material bits you don't like. I don't know what else you want.
No you don't understand, your site was shit and hardly worked at all. See post on 8ch/tech:
>I had JS off initially, so clicking "SPEAK FREELY" would bring me to a page with a post form which silently fails. Going again with JS, if you look really hard (or I suppose smart phone users might notice it right away), there's a pencil button at the bottom right. But then it still silently fails. I even tried the .onion domain and same result.

>reCAPTCHA *is* easy for end users. Many just need to click on a check box.
Yes, users who use the same cookies and IP for months at a time. When you tie personal identity to every transaction you make on the internet, captcha is redundant. You do not need Google to implement such a trivial feature. 4chan had this feature a decade before the G.

>Because captcha is complex and Tokumei is not HN shit.

Message too long. Click here to view full text.

(3.78 MB 640x480 legit_info_video.webm)
Mariana's web Anonymous 06/29/2016 (Wed) 14:21:41 [Preview] No. 5643 [Reply]
Have you been to the Mariana's web? :^)
18 posts and 3 images omitted.

Anonymous 10/09/2016 (Sun) 11:09:05 [Preview] No. 7028 del

Who is it?

Anonymous 10/10/2016 (Mon) 08:29:24 [Preview] No. 7035 del
A namefag from back in the days of torchan.

Anonymous 10/11/2016 (Tue) 03:30:37 [Preview] No. 7050 del
No, but I have been to Marinara's web.

Anonymous 02/21/2017 (Tue) 03:05:16 [Preview] No. 8058 del
It's not real. I've seen terrible things on the internet, but stuff that's truly important is kept hidden extremely well. If the US military for example were to have something similar to Tor but more secure and someone like you found out about it, they'd burn it to the ground and use whatever backup technology they had in case of such an event. If there are super secret organizations or sites out there, you will never find them. I've been digging for years, and I've found some really spoopy shit, but still nothing that truly shocked me.