Thread 56281 in /tech/

P56281 OPENWRT link reply
If openwrt doesn't support my modem, is it just as safe to buy a separate router, which is supported, and connect it to the modem?

Another question. Assuming I've been targeted in the past (I have) and that my current modem is compromised (it is), would it be enough to simply buy another modem? What if there is something which is done on the ISP's end that would reinfect my modem yet again? All of the devices connecting will be new.
31 replies omitted.
P94077 link reply
P56281
OpenWrt is fucking based af
P94090 link reply
> router: some zte piece of shit that I couldn't find on the site
> splitter: TP-Link - found the model but the version is not present in the version listing

I have never seen in my life any of computer hardware I bought is in the vendor sites or in the list of hardware supported by GNU. I have theories on why that is so but I'll spare you the trouble of reading another probably denpa-like bullshit.
P94097 link reply
is it fine to set my ISP router to bridge mode and have something like RouterOS/OpenWRT handle my network? can the ISP still infect my router via fiber optic?
P94111 link reply
P94097
I don't get your network topology from your post. Where is the router with OpenWRT in it?
P94112 link reply
P94111
ISP gives me an infected router with fiber optic, I place it into bridge mode, connect by ethernet to a non-glowed OpenWRT and then connect to it by lan and wifi, use it for dhcp, etc, maybe wireguard on it and so on.
can ISP infect my OpenWRT router by sending it malicious packets or injecting something into the firmware or exploting the Linux kernel?

Thread 23332 in /tech/

P23332 Uuuhhh I2P bros? What's going on? link reply
> Starting on Dec. 19 the number of tunnels in the network started to increase, and as measured at one router, it peaked at about 3x normal levels on Dec. 26.
> I2P isn't really designed to work that way
> If a popular application uses more network resources than it contributes, it has the potential to take down the entire network.


https://github.com/bitcoin/bitcoin/issues/26754

How are a few bitcoins taking down the entire I2P network???
119 replies omitted.
P93698 link reply
You can have 1 or 2 long tunnel for faster casual browsing and create a separate longer tunnel for spicy stuff.
P93699 link reply
P93698
What about the server-side tunnel length.
P94096 link reply
How does i2p deal with the glowing people problem? They have the resources to overrun the network with glowing routers and monitor it just like they do with Tor.
P94106 link reply
>Routers:[spoiler: ] dropped by significant amount
Oh... what... am I being attacked?
P94110 link reply
P94096
It is designed with "no node is trusted" idiom in mind.

The more transit traffic you have the more you are resilient to correlation attacks.

Right now DDoS is seen as more serious threat.

Thread 94101 in /tech/

P94101 Thinkpad Security, Verify if Uninfected? link reply
I bought a used [bold: Thinkpad]. It might sound tinfoily but is there a way to check if the guy bugged or infected it to deanonymize me?

Thread 93991 in /tech/

P93991 Is it a honeypot? link reply
How can a public company not be compromised especially when it's such a nice target for the glow-in-the-darks?
7 replies omitted.
P94056 link reply
P94034
I think they are recommended so that the TOR relays (including the ones run directly by the CIA) don't get your real IP. So long as you aren't too suspicious, subpoenaing your IP address would be more trouble than it's worth.

P94043
Actually no, I'm more familiar with the VPN than an anonymous imageboard poster.
P94095 link reply
P94043
>You are sending your traffic, all of it, to an unknown entity.
Isn't the path the traffic takes something like this? So the VPN is acting as a shield against a third party, wrapping the traffic.
[tex: me \implies VPN (military-grade encrypted connection) \implies Website (https, encrypted and only readable by me) \implies VPN (military-grade encrypted connection) \implies me]
P94098 link reply
P94056
> I think they are recommended so that the TOR relays (including the ones run directly by the CIA) don't get your real IP.
With VPN you are effectively extending the Tor-built circuit with a fixed, foreign entrance node. I'm not sure whether itenhances your security but that depends on your threat model.
P94099 link reply
P94095
That's correct but you didn't mention anything about your traffic metadata on your diagram.
P94100 link reply
Is there a comparison of obfs4 vs webtunnel vs VPN for hiding Tor usage from an ISP?

Thread 93848 in /tech/

P93848 private proxy link reply
How to get proxy or vpn that is not on public proxy list?
Cloudflare blocks proxies and Tor.
8 replies omitted.
P94049 link reply
P94038
You see, I2P has state of the art blocking technology: Once an evil hacker is in I2P, there is no way in the protocol to access our safe internet. The bad people on I2P instead have to resort to creating their own evil anonymous alternative to our safe internet. That means everything from hate speech to piracy. It must be terrible there.

P94039
>4cuck
Actually this is Kohl property. Please direct your inquiries on the acquirement of these frogs to:
kohlchanvn6vtsujobyw4pt5naaszmxqutd5hsdatmxfe2qaqhya.b32.i2p/int/catalog.html
kohlchanvwpfx6hthoti5fvqsjxgcwm3tmddvpduph5fqntv5affzfqd.onion/int/catalog.html
P94057 ADMIN PLS FIX link reply
P94049
The file is 7zip. IDK why the chan ate the extension.
P94058 link reply
You might have to check Keep File name. Did you check that box?
P94059 link reply
P94058
Let's try!
P94089 https://inv.in.projectsegfau.lt/watch?v=kqycC4_7d_M link reply
P94037
Bully really is a Bully

Thread 93972 in /tech/

P93972 Nanonymity lore iceberg link reply
7 replies omitted.
P94012 link reply
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

P94008
thanks anon very based ngl

P94013 link reply
P93973
>[bold: Can someone redpill on this and why should I use it?]
You shouldn't use it
P94073 link reply
P94013
Why tho?
P94080 link reply
Why is custom android roms considered "false premises"?
P94084 https://inv.in.projectsegfau.lt/watch?v=P6IW6bJX0j0 link reply
P94080
They will make you gay just the frogs

Thread 82187 in /tech/

P82187 beanpill link reply
is this real
41 replies omitted.
P91428 12of7 reply link reply
P85337

P93116 https://www.dell.com/support/kbdoc/en-us/000142862/computrace-replaced-by-absolute-module-in-newest-bios-revisions link reply
>>P86204

nigga I thought CompuTrace (LoJack) was a thing of past but new compters have [bold: Absolute]

> https://en.wikipedia.org/wiki/Absolute_Home_%26_Office#Persistence
>The persistence module, installed as part of system BIOS/UEFI, detects when the Absolute Home & Office software has been removed. It ensures the software is automatically reinstalled even if the hard drive is replaced, or the firmware is flashed.


[bold: Backdoors®️ really are Backdoors®️]
P93119 rpcnet.exe link reply
P93116
Looks like Windows-only shit. This would mean that if you wipe it and put something else on that system, the system wouldn't function unless you reinstalled Absolutely Phone Home spyware.

So...a computer that won't work without Windows...where did we see that before?

People need to stop buying this crap.
P94078 link reply
P85330
-----BEGIN PGP MESSAGE-----
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=
==9gnt9SOxTK
P94079 link reply
P85330

Thread 68951 in /tech/

P68951 Disposable VM's leave traces on your HDD/SSD even after disposal link reply
>I USe DIsposABle Vm'S i'M sAFe bRUh!
>DiSp VM's nOt AnTI FoRENsiC By DeFAuLT!

https://github.com/unman/notes/blob/master/Really_Disposable_Qubes.md

>inb4 w*gger unix
>inb4 Disposable VM's really are Disposable VM's
49 replies omitted.
P87005 link reply
Why do you need GPU?
P87176 link reply
>>P87005

for 4 inches of graphics pixels fr
P87677 link reply
P87176
GPU cold be supported after GUI-vm implementation, which would contain graphics drivers and all their possible exploits.

P82126
Hardware isolation (actually, hardware+software isolation) would be desirable if there was some way to share clipboard contents including files between devices. Airgapped clipboard share is possible with generating on-screen QRs and scanning them, scanning a series of QRs if we need to transfer a lot of data. And there is such software.
Also I would prefer to isolate my whonix gateway on separate machine, obviously connected by eth so no airgap but still better then having actual clearnet connection to pc, one virtualization-escape and your IP is leaked.

I personally worry more about IntelME and same thing from AMD. Disabling and dismembering it is not enough.
Also yea chip backdoors.

P87732 link reply
>Airgapped clipboard share is possible with generating on-screen QRs and scanning them, scanning a series of QRs if we need to transfer a lot of data.

If you needed small text copy and pasting from one machine to another, maybe you could set up a one way video data (HDMI VGA, etc are two way and could carry data from one computer to another, you'd want to convert that to an analog video cord) from the computer you need to copy from to the one you need to copy to and have some text reading plugin for the stream player?

It's not that hard to just copy and paste text into a txt file, hit save to flash drive, and then switch to the other computer and open the file. It's probably easier and more reliable than some cam text reading program anyway.
P94076 link reply
P93972 brought me here and I have never used Qubes before.
How do you set up [bold: actually disposable Qubes-VMs?

Thread 93346 in /tech/

P93346 leaked databases link reply
Where to find leaked databases and how to download them?
After you collect databases you can make evil with them.
19 replies omitted.
P93657 link reply
P93653

SHUT UP COON!
P93703 link reply
P93349
>breachforums.st
Lol anon was absolutely BTFO by FBI
>pic rel
P93707 link reply
>>P93703
Now breachforums are restarted by the FBI and they require clearnet email to register.
P93907 link reply
Breachforums have the most databases but they are a honeypot, you cannot register.
P94033 link reply
jd-beware-of-dog.png
Databases are leaking?! Put a diaper on them lmao.

Thread 93578 in /tech/

P93578 hacked VPS link reply
How to get a VPS in anonymous way, or how to get hacked PC so you can run stuff on it?
11 replies omitted.
P94024 link reply
I would prefer to buy VPS from popular provider and pay with stolen credit card or paypal.
P94025 link reply
What about Russian, Chinese, Arab, VPS providers?
P94026 link reply
How to steal password to existing VPS and use it in quiet way, share it with someone?
P94027 link reply
>>P94025
Chinese VPS will block Tor, you will not access it with Tor.
P94028 link reply
VPS that are paid with Monero are on FBI priority list. They are monitored 24/7. You need to pretend to be a goy, not Monero hacker and pedophile.

Thread 86322 in /tech/

P86322 Google aka Gulag link reply
google-skynet.jpg
Most everyone here knows Google is very evil. From far left radicalism to privacy concerns, they have alot of power and use it for all the wrong reasons. In fact, it is very hard to use modern computing devices and not use Google. Let this thread serve as a place to alert others to their evil, stay safe from them, and work around them where possible.
24 replies omitted.
P90549 Recording your fingerprints and face link reply
The same company that created an AI to digitally genocide an ethnicity is going to record your fingerprints and face. What could go wrong?

This will make it much easier to find people and know who to send to concentration camps. Of course, it will be the first time that's ever been done in human history...oh wait, no, it's not.
P90561 https://www.gameindustry.eu/reviews/balenaetcher/ link reply
P90549
>you can set biometrics (fingerprint or face) as your purchase verification method
P90564 link reply
P90549
Russian SberBank did it before it becomes mainstream.
P93983 Forgot about the search, here's the AI link reply
Giving you loaded search results via the web wasn't good enough. Now you get the AI:

>AI-powered "Search Generative Experience (SGE)" that the company had been trialing for months is rolling out to everyone in the US. The feature, renamed "AI Overview," is here now, and it feels like the biggest change to Google Search ever. The top of many results (especially questions) are now dominated by an AI box that scrapes the web and gives you a sometimes-correct summary without needing to click on a single result.

https://arstechnica.com/gadgets/2024/05/google-search-adds-web-filter-as-it-pivots-to-ai-focused-search-results/
P93987 link reply
>a sometimes-correct summary
lol, that article is comically critical. As long a they try to monetize their search engine, it will keep becoming more and more useless anyway, AI or not. I tried to see if I could use it, but I guess it isn't available in my region.

Thread 39106 in /tech/

P39106 link reply
Linux is free if you don't value your time.
72 replies omitted.
P93647 link reply
Why is there no i2p-chan?
P93732 link reply
P93647
There was. It got spammed to shit (Kelvin chan). There's a couple others I don't remember right now.
P93958 link reply
Closest thing I know to an I2P only chan, if it even is:
Santa Muerte's board
http://7ahtbmeelrtji6zurtb7eize5xldy4hwrcsiluupnpiq7wdkqcvq.b32.i2p
P93961 link reply
P93647
i'll probably make one in 2025
i get the urge to start an imageboard every year or so
P93962 link reply
there are a few i2p only russian pseduochans still up i think

Thread 93562 in /tech/

P93562 profile of a un*x domain boomer link reply
this is peak un*x domain boomer
>is a soyjak
>uses a bunch of terminal bullshit while gaining no productivity (otherwise you would do something interesting in your academic life other than get one patch into DNS or BSD during a 30 year period)
>long autistic posts about stuff that doesnt matter like how the name of a thing was chosen
>some stupid fucking "geek" tshirt


>I am a Unix system developer from Cambridge. I work on BIND9 at the Internet Systems Consortium (isc.org).
>
>For many years I worked at the University of Cambridge at first helping to run the central email services, and in later years running the University’s DNS.

<i spent my life working on a DNS software and administrating it at a uni

https://dotat.at/name.html
standard autism about a name dont care didnt ask
https://dotat.at/email.html
OMG how did nobody buy dotat.at when .co.at relaxed their restriction hawhwwwywyyguuuhhhghghhhhh aaaahaaaaaugggghhhhh i cant believe it
https://dotat.at/pgp.html
>OMG LOOK I CAN SHOW OFF MY EMAILS ZOMGZOR
>actually uses that feature where you can attach multiple UIDs to a PGP key instead of just leaving the email blank like youre supposed to

https://dotat.at/@/2022-07-01-dns-compress.html
haaaauuugggghhhhwaaaaggghhwaaaaaaaaaaggghhwweeeeee

but at least he understands what sudo actually does, the retards here should go argue with him: https://dotat.at/@/2024-05-02-sudo.html
or just all the other nerds in open source, who actually believe something else and would break down if they had to come to terms with actuality
4 replies omitted.
P93639 link reply
>https://dotat.at/name.html
>standard autism about a name dont care didnt ask

using real name as a dev even

>the retards here should go argue with him: https://dotat.at/@/2024-05-02-sudo.html
I do sudo su is dat ok?
P93681 link reply
P93595
because theyre fuckjobs incapable of making the most simple things work.
the fact that people dont understand what sudo does is not a problem. the problem is that because of that there is no actual way to do isolation in any system ever built - nobody understands that its a thing thats desireable and for the 3 seconds they think about it they just conclude that sudo does it
firefox is slow buggy dogshit. even just the GUI is complete trash. why does it fucking black the screen for seconds when you fullscreen a video? because security theater, some autist had a LARP one day and nobody in the tranny community has enough brains to explain why hes wrong, plus that it be toxic to say someone was wrong.
*sh/un*x tools is slow buggy liquid AIDS with infinitely deep rabbit holes of RCE vulnerabilities.
every ecosystem like java, C, shell, Go, node, etc is pure nigger shit and the only thing they actually do in the updates youre forced to consume is add the latest feature that some soydev wants to use to dildo himself, like linters, or some "FP" feature taped on in the most stupid fucking way. just using firefox requires pulling millions of lines of code from some corporate tranny and since its riddled with bad programming techniques you have to do so twice a week or you will be exploited by websites.
these monkeys make sure there is no way to use "off the shelf" software to interface with the [[[web]]]. they still cannot solve fucking string injection vulns or confused deputies, and are only now becoming aware of the fact that having 300 dependencies gives 300 organizations an opporunity to exploit you. the fact that they hard focus on "memory safety" and suddenly ignore all other security issues is a trademark of autism and why autistic people should be banned from engineering. the fact that they didnt just python or java which also solves memory safety proves their incompetence irrevocably. rust is a shit language that is obtained when 6000 trannies pile into a think tank, its complete garbage just like all previous mainstream PLs.
DNS is garbage and youre garbage if you take it seriously, it shouldnt even exist. anyone who is "into" DNS is the dumbest fucking loser geek. and theyre harmful too because they get all like HEWWUEEUEUEHGHGUUYAUUGGH what if someone DDOSes the root name server OMG that should be 30 years of prison. and other such statist misconceptions. by extension (but not only) X.509 is also garbage. openssl is the dumbest fucking project ive ever seen. even if it was implementing a sane protocol it would still be shit software.
[bold: THIS IS WHY HAPAS ARE SUPERIOR TO WHITES]
[bold: DAY OF THE SEAL SOON]
P93731 link reply
P93681
>every ecosystem like java, C, shell, Go, node, etc is pure nigger shit
Then make your own.
>*sh/un*x tools is slow buggy liquid AIDS
And yet the day of the seal has not materialized.
>the fact that they hard focus on "memory safety"
This was your talking point a few years ago.
>DNS is garbage and youre garbage if you take it seriously
This has been fixed.
>X.509 is also garbage
The centralization is probably not a good idea, especially with the fragility it introduces. Still better than what you have produced [spoiler: literally nothing]
>openssl is the dumbest fucking project ive ever seen
Then don't use it. Oh, wait. The alternatives are made by the people that you have been criticizing as "un*x boomers"
>hapas
I notice that you still have not released any alternatives, and appear to have made no progress toward one, either. All you do is post schizo rants on imageboards.
P93750 link reply
P93731
> Then make your own.
I did. But guess what?
> And yet the day of the seal has not materialized.
Because software is not essential for living. Nobody needs IT shit in general.
P93755 link reply
P93731
wow you eat up all the dumbass plastic intellectually fraudulent shit that doesnt work because youre from america and goo goo ga ga everything we make here is just good so there hmph! you could get the special developer award at spotify
P93750
u wot

Thread 93418 in /tech/

P93418 I2P torrenting on Android phones, link reply
I know it may sound stupid, but I really want to do it, how do I do it, the simpler the better

I don't even have experience with PC Java I2P and I2PD, I only use I2PD to surf some eepsites on my phone now, Android seems to have BiglyBT, Vuze and even XD, but I don't know how to configure it, there is too little tutorial, it seems that no one uses it at all

There are some tutorials on this site-(http://i2pforum.i2p/viewforum.php?f=21&sid=1924a5f01a3f8ea5f3c8fa90e827dd28), but I'm too stupid to reproduce them

All of this is because I don't have a computer at hand, and my phone is too convenient (even I know clearly it's not secure and private at all, like a portable surveillance - telescreen and shit).

Third World ESL, which primarily&frequebtly uses Tor btw
20 replies omitted.
P93558 link reply
P93554
this, I love boosters and serving biden. IN THE NAME OF DEMOCRACY!!!!
top kek.
P93565 link reply
P93517
As someone who runs a node, I'm fine with this. If you have the capable machine and network, and want I2P to live, then yes you need to allow transit traffic, but I also want I2P to be accessible to everything including shitty intermittent mobile devices like phones and IoT e-waste. On my phone I don't run transit traffic and don't publish IP (hidden mode), but on my desktop I allow as much transit as possible with the port forwarded and not in hidden mode. Similar with BitTorrent: As a seeder I accept many will not seed, but if even one more peer seeds thanks to me, it's good.

P93523
BitTorrent must be on everything. Even if I'm just sending a file to a single person, I prefer BitTorrent over HTTP every day because it's reliable. You can just leave it and eventually it will finish. And when inevitably it becomes more than one person, it won't grind to a halt. I2P BitTorrent > OnionShare
P93607 link reply
P93418
1. Install I2P router from https://geti2p.net on your PC/VPS
2. Install Wireguard and setup VPN on your PC/VPS
3. Connect to your VPN network with the phone
4. Go to http://<local IP of PC/VPS>:7657
5. Go to "torrents" section

AFAIK it's the easiest way to torrent with Android phone.
Happy torrenting!
P93747 link reply
Any success? What did you end up doing, android-anon?
P93752 android-anon here link reply
>What did you end up doing,Any success?

Lol, sorry for not being able to deliver, I haven't had it at the moment, I would have liked to install Java+i2psnark standalone with Termux like this post, but I'm not too familiar with the former and don't know how to build the latter, and there are almost no tutorials that are bad for someone like me who hasn't learned from scratch systematically

(1.https://safereddit.com/r/i2p/comments/1an6ent/libretorrent/
2.https://safereddit.com/r/i2p/comments/16p5a89/i2pd_i2psnark_standalone/
3.https://safereddit.com/r/i2p/comments/clzbj6/newbie_question_can_i_use_i2psnark_on_android/)

>Maybe sorry for the sake of reddit, just for case reference, I remember that there was one or two tutorial for the detailed installation at i2pforum, but the version was too old for me

P93607 seems like a better idea to work for, but at the moment I don't pay for VPS, a long time ago I might have paid for the games I liked on steam, but nowadays, on many levels, such as software, all kinds of things that need to be downloaded, I always replace them with Modify, piracy, open source or even free software, 0 cost to get, except for the cost of time, long live the pirate party, long live free software

Thread 91963 in /tech/

P91963 tailscale link reply
Why has nobody made a simple version of tailscale yet?
By that I mean just some program that manages wireguard and handles NAT traversal.
2 replies omitted.
P92042 link reply
>stop being a poorfag and buy a VPS
I have that already, set up with wg-quick, with two layers of wireguard tunnels for true e2ee. Problem is that it all goes through the VPS, with tailscale the connection will be direct. I'm aware of headscale, which might hit the mark, but I feel its implementation is way more complex than it needs to be.

>isn't tailscale already simple? The only suspicious part I know is they only support oauth for connecting devices.
Who knows? It's closed source.
P92048 link reply
I use Nebula Network. I like that it makes direct connections if it can. The lighthouse is only for discovery and NAT traversal. Unless things are firewalled then it can relay. However unlike Wireguard, connections are end to end encryped even when routed through a relay. You don't have to trust the relay or the lighthouse. Oh and you don't have to add every device to every client's config. Instead you have a master CA key for the network. If the device key is signed by the CA key, it belongs to the network. The whole thing works with roaming IP adresses too as long as there is constant lighthouse.
P92056 https://www.youtube.com/watch?v=PRhacBdK_Ac link reply
P92048
>traversal
How do I traverse directory trees once im inside [spoiler: with my 4 incher]

All I know is cd and cd ..
P93304 link reply
Nebula has a static host map where you can put addresses or it can use a lighthouse on some free VM. Like the other anon says it's E2EE, there is no need to trust this free host. Granted it will all be vacuumed up for the day when the MIBs can supposedly decrypt it, but that's everything we spew out on the internet these days pretty much. Unfortunately Nebula's mobile app is source-available (non-free) and costs money, but otherwise it's a pretty good solution.
Yggdrasil can be used for hosting public services where anonymity is not important.
Honestly these sort of things should be more well known, but we're past the point where anyone wants to give the little people the ability to host anything. That clown world poster up there wants you to spend $$ on some mega rich dude's yacht to manage your own virtual private network simply because the ISPs refuse to give you a public IP (not even IPv6 which costs basically nothing) without some extra $$$ like you're bribing some border official to get out of your second world hellhole, which to some 80s/90s person would sound absurd, but here we are. It shouldn't be a "market niche", it should be the ground floor reality to be able to contact other computers using your computer.
P93748 link reply
yggdrasil network.

Thread 16418 in /tech/

P16418 What Privacy Coins are worth investing in? link reply
Besides the obvious [bold: Monero] (XMR) what other Privacy Focused Cryptos are good to buy/own, not only as an investment to make money but an investment to protect ones privacy in the coming Globohomo WEF 2030 Utopia?

really looking to have (((Diversity))) with muh privacy coins.

What are peoples thoughts on these coins/crypto?:

[bold: PirateChain (ARRR)]

> (Delayed Proof of Work (dPoW) from Komodo, zero-knowledge proof (zk-SNARKs) transactions from ZCash, and the rule of enforced private-only transactions by Monero.)
> ring size or anonset of 540,000

https://pirate.black/
https://pirate.black/files/whitepaper/The_Pirate_Code_V2.0.pdf

[bold: Wownero (WOW)]

> Meme Coin like Dogecoin but a fork of monero
> ring size of 22

https://wownero.org/

[bold: Mysterium (MYST)]

> trustless powered dVPN (decentralized VPN) network that rewords its users that run nodes with Mysterium and used to pay for VPN use.
https://www.mysterium.network/

[bold: Oxen (OXEN)]

> Monero Fork that powers the Lokinet mixnet & Project
> PoS (Proof of stake)
> 1 second transaction time with "Blink" instant payments

https://docs.oxen.io/about-the-oxen-blockchain/overview

[bold: Orchid (OXT)]

> dVPN (decentralized VPN) network that rewords its users that run nodes with Orcid and used to pay for VPN use
> Multi hop dVPN

https://www.orchid.com/oxt/
https://www.orchid.com/whitepaper/english.pdf

Any other suggestions?
57 replies omitted.
P93409 link reply
P93370
besides monero what else is out there that uses CPU (not GPU) mining?
P93490 link reply
P93409
In terms of profitability QUBIC is the best right now, before that it was ZEPH. In terms of actually being a legitimate currency, nothing. Everything in the "privacy space" is infected with premine scams, asic scams, dev tax scams or all of the above.
The only CPU-mineable non-scam coin besides more seems to be darkfi, but it's still in development.
P93549 link reply
P93490
>darkfi, but it's still in development.


P93588 link reply
P93409
Wownero.
P93741 link reply
Two Haveno instances are up, but one of them apparently gave up very soon.
You are encouraged to be cautious.

Thread 61553 in /tech/

P61553 Redpill me on why should I even use these? link reply
Why should i even go outa my way to use these:
>t. [bold: Node.js]
>t. [bold: npm]


What are the benefits even?
19 replies omitted.
P93606 link reply
P93483
Based reasonable post on my lambdaplusjs? It's more likely than you think.

>Actually the more horrible it is the more desperate hiring managers will be
If I was any smarter I would learn Cobol. Motherfuckers supposedly earn insane money for pretending they "maintain" some obsolete mainframe piece of shit. When asked to implement a simple feature they estimate it will take 2 years and go back to playing pinball. Sadly I'm not smart, because I decided to work in something I find more interesting instead of living on easy mode.

>Python is very popular with (...) just want to get something that works (...) etc
Also IT security, which is a very based type of IT. The same low-level people who read assembly half of the day often want to script some shit or write an exploit and they use Python instead of some autist minimalistic language of choice.

>For the same reason really, some highly mathematical algorithms are a lot simpler to implement in functional programming languages
Tbh Haskell is a meme. It is a great language, and the possibility of abstracting stuff away is insane, but it:
* was originally created by academics for academics and it shows. You have fucking Bifunctors, Arrows and combinators in the standard library, but can't make a fucking network request.
* community is no better. People like inventing new abstractions on top of the shitton of abstractions already there (lenses, prisms), instead of working on a good useful libraries
* laziness was a mistake and don't fucking deny, even the authors agree. It lets you elegantly do useful things like "infinite list of prime numbers", while fucking you over when doing things nobody needs like "processing text without leaking 10GB of memory and spinning GC 1000 times a second".
TLDR cool elegant language that filters out normies and without enough polish.
F# is OK tho.

P61553
>Why should i even go outa my way to use these:
I assume it's a bait so I didn't reply before, but:
* nodejs a javascript implementation. You use it to run javascript without a browser .
* npm is a Node Package Manager, google next time before asking (i hope you know what package manager is).
No need to thank me.
If you want to ask a follow up question, feel free.
P93610 link reply
>I would learn Cobol
Often the language "back then" is different than today. I ran into this with Ada and Pascal on VAX/VMS. ADA.Text_IO back then was just "Text_IO".

There's alot of old machines still plugging along. Yesterday I was reading an article about people still buying floppies, because those systems are still doing useful work and need them. There was a train control system that had to be rebooted, daily, off of a floppy.
P93614 link reply
P93606
> but can't make a fucking network request.
cabal install network
> People like inventing new abstractions on top of the shitton of abstractions already there (lenses, prisms)
Never used them (besides microlens and apecs)
> instead of working on a good useful libraries
warp, vector, beam
> laziness was a mistake and don't fucking deny
{-# LANGUAGE Strict #-}
[spoiler: LOL, just use IO/ST]
P93616 link reply
P93606
> laziness was a mistake and don't fucking deny, even the authors agree.
> uses as an example a problem which Haskell literally excels in
P93618 link reply
P93605
They still unironically use Python while there is Ruby

Thread 93063 in /tech/

P93063 OpenBSD appreciation thread link reply
Let us appreciate and discuss OpenBSD.
14 replies omitted.
P93449 link reply
I'm a noob myself, but I needed a simple daemon program and I just copied the i2pd rc script from ports and rewrote it to fit my needs. Place it in /etc/rc.d/
If your program already runs as a daemon it should work, use rcctl to manage it.

#!/bin/ksh

daemon="/usr/local/bin/hackermand"
daemon_flags="--anonhackerproxy=127.0.0.11337 --hack-cia=true --hack-nsa=true"

. /etc/rc.d/rc.subr

rc_cmd $1
P93500 link reply
P93277
What should I see in my ifconfig? I've tried everything I could find. Also tried adding the ipv6 address to /etc/mygate.

lo0: flags=2008049<UP,LOOPBACK,RUNNING,MULTICAST,LRO> mtu 32768
index 3 priority 0 llprio 3
groups: lo
inet6 ::1 prefixlen 128
inet6 fe80::1%lo0 prefixlen 64 scopeid 0x3
inet 127.0.0.1 netmask 0xff000000
vio0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500
lladdr *
index 1 priority 0 llprio 3
groups: egress
media: Ethernet autoselect
status: active
inet * netmask 0xffffff00 broadcast *
inet6 fe80::*%vio0 prefixlen 64 scopeid 0x1
inet6 *::1 prefixlen 64
P93506 link reply
P93449
Do you not have x/inetd?

P93500
dhclient -6 -v vio0
should get you an ip6 address if SLAAC isn't on for some reason.

dhclient -P -v -6 vio0
should get you a prefix you can paste ip6 addresses from, if allowed by your ISP. I'm assuming vio0 is talking to whatever is next in the network. 'inet6 *::1 prefixlen 64' looks like you have an address. What's the route look like? Use whatever tool shows the route and check for a proper gateway. Whatever is at that gateway needs to forward your traffic.
P93509 link reply
P93506
OpenBSD doesn't have ip6 dhclient, it seems.
>'inet6 *::1 prefixlen 64' looks like you have an address.
The address is there because I manually added it in the /etc/hostname.vio0 file, following this guide from the internet.
>The IPv6 address can be set in /etc/hostname.vio0. Make sure you take the IP address from Hetzner's web interface. It is shown as *::/64 as you have the entire /64 available. I generally pick ::1:
>>inet6 2001:db8::1/64
>>The IPv6 gateway can be set in /etc/mygate:
>fe80::1%vio0


So here's the output of netcat -rn, the gateway for some reason is the lladdr of the vio0 interface.
Internet6:
Destination Gateway Flags Refs Use Mtu Prio Iface
default fe80::1%vio0 UGS 1 53 - 8 vio0
myipv6::/64 myipv6::1 UCn 0 0 - 4 vio0
myipv6::1 *lladdr vio0* UHLl 0 57 - 1 vio0
P93524 link reply
P93500
>inet6
Do fags even?

Thread 48212 in /tech/

P48212 Invidio.us clones or youtube CDN were probably distributing malware through .mp4s probably. link reply
You might have noticed corrupted .mp4s being downloaded from some of the invidio.us mirrors about a year ago and maybe they still are.

These videos had corrupted segments to them that when you played them cut audio or video.

This should be impossible unless the CDN they were coming from were distributing hashes for modified files or the browser downloading function was defective or tampered with because before a download completes it checks associated meta data for the file being downloaded which includes hashes that enable the downloader to re-request packets that got corrupted when passing through the telecom network.

Meaning, to get a corrupted .mp4 file you just downloaded from an invidio.us clone, either the CDN must be distributing hashes for the corrupted file or your browser's download function has to be compromised.

I suspect youtube has been distributing malware exploits in .mp4 files to target the computers of people using invidio.us clones because it's not realistic that my browser's download function was compromised as I boot to ram and use a clean live boot every time I turn on the computer. Meaning, the CDN I was downloading videos from was sending hashes for the apparently corrupted files to ensure they were downloaded, indicating malicious intent.

Or maybe I don't understand something on the technical side of things? Maybe the mirrors directed to a non-youtube CDN, I didn't actually check at the time and probably should have.
5 replies omitted.
P93410 link reply
>You might have noticed corrupted .mp4s being downloaded from some of the invidio.us mirrors about a year ago and maybe they still are.

How tf would you even know?
>These videos had corrupted segments to them that when you played them cut audio or video.
oh well if they were webm you could have been fucked by that exploit in libvpx buffer overflow

>or your browser's download function has to be compromised.
imagine not using yt-dlp even


P48216
>unless it's used as boot to ram from my perspective
What about overlay-root that boots to ram when you want it to?

https://github.com/Kicksecure/grub-live
P93412 link reply
P48215
>It's possible some of the invidio.us clones were malicious and were directing downloaded not to youtubes CDNs, but to a malicious server.
>implying youtube's own CDNs can't be malicious


P48212
>I suspect youtube has been distributing malware exploits in .mp4 files to target the computers of people using invidio.us clones
How can this surprise literally anyone? Youtube has been trying to fuck up yt-dlp and invidious users for at least 6 years by now. Why do you think yt-dlp has to be updated constantly for it to work? It's a total state of war
P93414 link reply
P93412
> Why do you think yt-dlp has to be updated constantly for it to work?
Not objecting your statement but yt-dlp gets updates more rare than once a month.
P93447 link reply
>poojeet CEO
>open-source projects interfere with saar's profits
>kindly send the needful virus post haste
P93471 link reply
>>P93412
>Youtube has been trying to fuck up yt-dlp and invidious users for at least 6 years by now.

No, they didn't.
They could easily ban yt-dlp fingerprint and require yt-dlp to run an actual headless firefox with selenium.

They don't even ban Tor for some reasons.

Thread 88489 in /tech/

P88489 12of7 link reply
omg thats so dumb first of all i read the info and then the man when i need to recall something i forgot from the info SO is botnet
second of all tar is fundamental to un*x and i remember every flag in tar by heart, if you need to look it up ur a poser. omg so dumb windows users r dumb omg do u even TEXT MODE bro i bet u dont even know how to tar -tf u prolly have to double click it to see whats in it like a nigger
21 replies omitted.
P93169 link reply
P93144
>Yeah I'm 1337


P93197 link reply
P93169
Yeah, I hacked it. That was me.
P93254 link reply
P93197


P93264 link reply
P93254
Hehe, yeah breh. I was behind 7 proxies so don't worry, they didn't get that hard drive.
P93273 - 5 HP link reply
P93264
>proxies
>hard drive


uh niggren dat dont even go together irrc
try curl ssh and wget + beautifulsoup4 + proxychains
x