[ home / rules / faq ] [ overboard / sfw / alt ] [ leftypol / siberia / edu / hobby / tech / games / anime / music / draw / AKM ] [ meta / roulette ] [ cytube / wiki / git ] [ GET / ref / marx / booru / zine ]

/tech/ - Technology

"Technology reveals the active relation of man to nature" - Karl Marx
Name
Options
Subject
Comment
Flag
File
Embed
Password (For file deletion.)
Required: 3 + 1 =

Join our Matrix Chat <=> IRC: #leftypol on Rizon

| Catalog | Home
|

File: 1712529672735.png (64.22 KB, 480x602, wp_ss_20240408_0001.png)

 No.24099[Reply]

This is why I don't trust nerds. Computer systems have become too complex and nobody actually knows, whats happening under the hood. When nerds say: "Bro, it's totally secure! Trust me!" Don't trust them! Don't trust computers! I have no clue how I will organize my life in the future, but I tell you this much, I will try to rely as less as possible on computers.
19 posts and 3 image replies omitted. Click reply to view.

 No.24840

>>24099
Because complex systems are simpler.
The fork() syscall is quite emblematic of this: if offers a very simple and convinient intweface for the easy case in userspace, vut the only way to implement it efficiently is with CoW, with the result that every piece of the kernel that isn't a device driver needs to know about fork() and deal with it.
The inverse case are signals: an extremely simple primitive to implement kernel-side, but they are an absolute mess to deal with in userspace.

And of course, sometimes the solution is complex because the problem it's trying to solve is complex, and no amount of RETVRN to unix will change that

 No.24841

>>24099
Bringe take. Systems should always be simpler to understand and you don't have to rely on computers to do basic-ass shit but you're overexaggerating the threat that GNU/Linux computers have compared to, say, your classcucked neighbors who'll report you for "sussy behavior." You don't even know how much you're already getting monitored just by living in a society, it's insane. There's, like, cameras and surveillance everywhere, to the point that computers are actually more private just because you don't actually have to buy political literature anymore, you can get it relatively privately through Tor. The most private way to live imho is Ted's way: you escape into the forest and don't interact with society ever again. Which is the sad reality of the modern surveillance capitalism we live in.

 No.24842

>>24839
Do you have any actual criticisms of runit?
>inb4 daemontools process supervision is LITERALLY just a while loop

 No.24858


 No.24859

File: 1715729122133.jpg (39.99 KB, 718x479, Debian-GNU-Hurd-2017.jpg)

>>24099
we urgently need to move to microkernels. Contribute to GNU HURD.



File: 1711440009416.png (12.92 KB, 482x102, 999.png)

 No.23814[Reply]

Has anyone heard about this new dating app called Duolicious? It's supposedly designed to help you meet like-minded individuals based on your personality. Sounds like a neat concept, but I can't help feeling a bit skeptical about it.

First off, how accurate can these personality assessments really be? I mean, are we reducing the complexity of human relationships to a mere algorithm? And what about privacy concerns? With all the data breaches happening these days, I'm wary of handing over intimate details of my personality to some tech company.

Plus, there's the whole capitalist angle. Is this just another way to monetize loneliness and exploit our desire for connection? It feels like these apps are more about making profits than genuinely helping people find meaningful relationships.

I'm curious to hear your thoughts on this. Do you think Duolicious is a step forward in online dating, or just another tech gimmick preying on our emotions?
21 posts and 1 image reply omitted. Click reply to view.

 No.23924

>>23923
Do you have any examples where this actually happened?

 No.23931

>>23924
Sounds like a plot of one of those bitcoin wojak omegaverse cartoons on youtube

 No.24854

Looks like all the user data has been scraped and published:
https://duoleak.acid.im/

 No.24855


 No.24856

>>24855
>not a single afab
Material explanation?



 No.24680[Reply]

Dead internet theory and all I know, but in recent years LLM/gpt chatbot content has been flooding the internet with low quality shit from youtube faceless automation channels to SEO product review sites flooding the first page of search engine results.

Will we reach a saturation point where the only places to find actual answers to anything will be reddit/quora or tiktok?
1 post omitted. Click reply to view.

 No.24697

>>24680
>The Internet*
<*YouTube
<*Search Engines
It's killing the core web, the web as a whole is thriving as a result.
>Will we reach a saturation point where the only places to find actual answers to anything will be reddit/quora or tiktok?
Those were never sources of answers to begin with. Wikis and forums reign and will continue to do so.
>>24696
>The Internet*
<*Major™️©️®️ Platforms
Non-issue, new sites like fedi instances just ask you write about yourself and ban you if you turn out to be a bot. This is just going to result in the return of manual account approval, not IDs.

 No.24846

>>24696
>At the very least every major platform will implement a requirement to prove you're a real human being before you're allowed to create an account.
why cant it lead to the end of social media

 No.24847

>>24846
Because people are addicted.

 No.24848

>>24680
It's already like that, I have to put "reddit" at the end of every search to find anything meaningful and even then it's full of random bots recommending shit

 No.24849

>>24846
Because people would just move to fedi and forums and stuff. They had to think up a scenerio where the status quo remained resiliant, but with video essay fearmongering aethetics.
>>24847
People are stubborn.* Words mean things, misusing them benifits thinktanks.



File: 1715257950544.png (320.2 KB, 896x880, ClipboardImage.png)

 No.24803[Reply]

Of course they're all just CIA honeypots.
4 posts omitted. Click reply to view.

 No.24808

>>24806
Tuta is very dank, that's my home base for all of my Firefox Relay free accounts, where I make various services prone to locking me out forward my mail to. Doesn't requite an email and if you have a shady IP they just make you wait 3 days to use your new account. Also, there's no searching on free versions! So you'd better know your way around any spam you add haha.
Can't vouch for their security at all but unlike ProtonMail hadn't ALREADY HEARD ABOUT THEM SELLING PEOPLE OUT lol

 No.24814

It's good for temporary emails that aren't instablocked.

 No.24819

>>24803
It's all based on trust, everyone should operate on that axiom.

 No.24823

It's not a honeypot. Protonmail is not an anonymity service. Nobody will ever go to jail for you.

 No.24845

TBF what country could an email server be based in that WOULDNT have to do this shit legally?

If the alternative is hand over the IP address or go to prison im not surprised this shit is what happens



 No.24613[Reply]

Former Israeli Malware Distributor Kape Technologies Now Owns ExpressVPN, CyberGhost, Private Internet Access, Zenmate, and a Collection of VPN “Review” Websites.

Do NOT use ExpressVPN! It is not only an Israeli company that does work for the IDF, it is also a slimy company that auto renews your subscription without your consent even if you turn off auto renew.
22 posts and 2 image replies omitted. Click reply to view.

 No.24827

>>24824
when i say anonymous, i mean da proxy dont frwd ur request to whtrvr service online w/ ur ip address linked to. yes, there may b sun fag on the other side in Indonesia (i nvr use any proxy originatin from one of the Five Eye countries, i.e. australia, canada, u.k., n.z., an burgerland, an neithr shld u), whose loggin my ip adress to sell on Breach. bu for smaller scale crimes, such as torrentin an proxying for better connections, such as against a firewall, the damage risk is minimal an idrc. i only use proxies that r registered as anonymous, v.s. one dat's transparent, and wut i mean is this:
https://en.wikipedia.org/wiki/List_of_HTTP_header_fields
r u familiar w/ this? "transparent", non-anonymous, proxies r ur traditional proxies which will format ur requests that u put thru the proxy as "X-Forwarded-for: [URIPADDRESS]". anonymous proxies, on the other hand, won't include this in the http header, bu they might myb include a "Via" to indicate dat its a proxy. u can test whether ur proxy does this by runnin it against websites that'll test wut data the proxy sends bck, like this one:
https://www.whatismyip.com/proxy-check/
>>24822
i do agree with this Anon howeva, if ur stupid and doin RLY stupid shit online, u should not just frwd ur criminal shit thru sum rando's computer, this is a RossUlbrict-lvl opsec mishap. in those cases, use Tor, i2p outproxies (when the network actually works an doesn´t crumble to one malicious actor, like literally a coupla days ago), or Mullvad.

 No.24831

>>24827
Thank you for the information, though it's rather hard to read what you wrote. But yeah, that makes sense that it's better for a lower threat model, I might consider using this. Is it more private than using Mullvad though?

 No.24832

>>24794
.onions are also great for punching through NATs and it's anonymous. That's how onionshare works.

 No.24836

>>24831
mb itz the burger in me, i type weird. i mus admit i can't be much help to u here as ion use Mullvad vpn, but i'm doin my own research rn on their website, accessible here: https://mullvad.net/en/servers
<issues of physical safety
when i peruse their server list, it seems a majority of their servers r in the five eyes nations, and/or European countires. my concern lies w/ the physical security of these locations. sure, myb mullvad could decline indicments an fed requests for data from their personal logs, but can mullvad personally ensure the safety of the physical server locations? ik in the past darnket websites, such as AlphaBay and Hansa, housed they servrs in Europe and these were eazily seized by Euro-Glowies. with hoppin on Asian-none-of-the-above countries proxies listed on spys.one for instance, i can atleast kno that there's a very probability they won't be physically raided.
>issues of digital safety
i would imagine that due to the paid nature of Mullvad, it would be safer for communicatin w/ another anon ur criminal stuff. bu again, threat models r important here. if ur worried about encryption and keepin ur mssgs to other Anons safe, employ PGP an don't rly on ur client's encryption methods!! the recent icognito market scam is a good example of this.

 No.24837

>>24836
Thanks a lot, anon. You did a good job.



File: 1711913146322.png (406.67 KB, 2256x1441, ClipboardImage.png)

 No.24006[Reply]

Frontend tutorials and resources https://neocities.org/tutorials
General tutorials for both frontend and backend https://www.w3schools.com/default.asp
Old Geocities gifs https://gifcities.org/
Free subdomains http://freedns.afraid.org/domain/registry/
Free static site hosts https://neocities.org/ https://pages.github.com/ https://surge.sh/
2 posts omitted. Click reply to view.

 No.24679

Should I make a blog from scratch?

 No.24682

>>24679
Honestly, in trying to do it not from scratch, from scratch is the easiest route. Get a good handle on html and stuff before trying to do static site generators, if you even find you need them.

 No.24689

Front-end deez nuts oooo

 No.24691

File: 1714745745844.jpg (183.25 KB, 1500x1000, nimbus-roman-no9-l-02.jpg)

>>24006
Nimbus Roman has always been my favorite font distributed with ghostscript.
Lately i've been using Iosevka Term and Etoile from https://typeof.net/Iosevka/ as terminal fonts. All of their font families are very compact and legible (though the nerdfonts distribution made a questionable choice with the @ character).

 No.24828

https://eloquentjavascript.net/
artsy javascript tutorial
good for non-programmers



File: 1696000507736.png (396.64 KB, 445x843, 1695988153734.png)

 No.21737[Reply]

Is the FSF going to die with him? That's sad to think about.
67 posts and 13 image replies omitted. Click reply to view.

 No.24791

Noooooo

 No.24792

>>24790
Is GNUnet faster than Tor? Because it might be its advantage when it comes to anonymizing repositories. Otherwise Tor is still better. Using I2P would still be ideal but I haven't seen any distros providing any I2P mIrrors.

 No.24797

>>24782
best example of a meme being more informative than any paragraph
>>24784
>This made me uninstall Guix.
why?

 No.24800

>>21737
he just posts a bunch of libshit on his blog anyways. seeing my fat uncle die of cancer while quoting Bill Maher has really destroyed the taboo around the subject to me
it doesn't trigger the Hollywood reflexes in my brain any longer. die you old chomo, dieeee

 No.24802

>>24800
Not appreciating what the person has done because of their bs political opinions is one the problems with modern politics, you are part of the problem. Yeah, his political opinions may be extremely liberal but I don't care because his contributions are based af, we wouldn't have libre software without him and his strong determination in fighting against proprietary software. And I don't expect him to have sophisticated political opinions: even the greatest scientists can have the stupidest political opinions possible just because they live in a bubble.



File: 1608526010241.jpeg (573.58 KB, 1140x500, cyber_security.jpeg)

 No.2111[Reply][Last 50 Posts]

Comrades, we need a thread on privacy. Any decent activist should try ways of staying anonymous on the web and prevent being tracked by governments and corporations.General tips===* Use free software as much as you can.* Use GNU/Linux and keep it up-to-date, to be sure that you don't have unpatched security exploits* Don't use Flash Player, use youtube-dl instead for watching streaming videos online* Do not use Google, use DuckDuckGo or StartPage instead* Use a password manager like Keepass or for GNU/Linux users keepassx. Create new passwords for every site that you visit and use a strong password as a master password. A tip for easy remembering of your master password is to use a sentence. "i fucking love cookies and tits!" with extra capital characters etc. is easier to remember than some random characters and long enough to prevent brute force attacks of any kind.* Use the Tor Browser Bundle if you really want to stay anonymous.Firefox====* Go to Preferences -> History and set History to "Never remember history". * See for additional tweaks: https://github.com/amq/firefox-debloat and https://vikingvpn.com/cybersecurity-wiki/browser-security/guide-hardening-mozilla-firefox-for-privacy-and-securityAdd-ons-----------* Use uBlock Origin for preventing tracking etc. Bonus: use hard-mode to manually whitelist external domains on sites. Don't use uBlock but be sure to use uBlock Origin https://github.com/gorhill/uBlock/wiki/Blocking-mode:-hard-mode* HTTPS Everywhere* DecentralEyes: prevents CDN hosting from tracking you (Google for Jquery etc.)* Self Destructing Cookies: only allow cookies that you choose to allowOS==* Encrypt your hard drive or home partition at least* If you use GNU/Linux, you can try to restrict systemd or syslog from logging. * Use a distribution which takes security seriously. Also, be sure that you don't install a lot of things outside the repository. It will cover most of your needs.Real life tips===* Pay with cash if you canFeel free to provide tips to each other comrades!
247 posts and 24 image replies omitted. Click reply to view.

 No.24742

>>24709
glow
>>24738
lol is this true? vry funny if so. however i dont see y israel/NSO needs a backdoor for the phones. they already own all the celullar towers. so in a theoretical world were hamas ain't an Israel proxy, and they rly is playin cat and mouse, can't they jus man-in-middle crack the channels and chats? is there sum insane Chinese-encryption scheme im unaware of?

 No.24744

>>24709
Go back, feds.
>>24740
Is it as safe as an i2p outproxy?

 No.24745

very good tip indeed.

 No.24752

>>24744 (me)
Wait a sec. Why not just use an i2p outproxy instead of a VPN or proxychains? VPN leaks your IP address to your VPN provider and your VPN usage to your ISP provider. And VPN through i2p adds an extra performance hit. And proxychains are static unless you constantly change them yourself, neither do they provide encryption. And VPNs and proxies weren't designed for anonymity in the first place. So what do VPN through i2p and proxychains do better that an i2p outproxy does not?

 No.24798

>>24742
>lol is this true?
yeah there was some reports at the time
>they already own all the celullar towers
exactly, which is why the reports seemed like bullshit
>>24745
>very good tip indeed.
what is a very good tip?



 No.17738[Reply]

https://nitter.net/photomatt/status/1594587024245260289

Tumblr is going to joining the fediverse soon.
14 posts and 1 image reply omitted. Click reply to view.

 No.24750

>>17739
I think wordpress has proprietary modules. Threads has some retarded algorithm right? Is it "open source" software interfacing with unknown server shit like other Meta open source stuff is AFAIK?

 No.24759

>>24706
>>full of glowies, defence contractors, libertarians, zoophiles and pedophiles
And the difference with regular social media is…?

 No.24761

I think wordpress has proprietary modules. Threads has some retarded algorithm right? Is it "open source" software interfacing with unknown server shit like other Meta open source stuff is AFAIK?

 No.24783

>>17743
wikipedia says ostatus turned into gnusocial, which is the ancestor of fediverse activitypub

 No.24786

>>24761
even if Threads was open source that's like saying you're fine with having AIDS because its DNA has been sequenced



File: 1715028880742.png (40.61 KB, 427x400, 08e.png)

 No.24781[Reply]

I want to tighten my opsec. I figured the best way is to try to get experienced hackers to try to bust me, as unwise as that might sound. is there a website, forum or community where you can ask people to pwn you?


Delete Post [ ]
[ home / rules / faq ] [ overboard / sfw / alt ] [ leftypol / siberia / edu / hobby / tech / games / anime / music / draw / AKM ] [ meta / roulette ] [ cytube / wiki / git ] [ GET / ref / marx / booru / zine ]
[ 1 / 2 / 3 / 4 / 5 / 6 / 7 / 8 / 9 / 10 / 11 / 12 / 13 / 14 / 15 / 16 / 17 / 18 / 19 / 20 / 21 / 22 / 23 / 24 / 25 / 26 / 27 / 28 / 29 / 30 / 31 / 32 / 33 / 34 / 35 / 36 ]
| Catalog | Home