[ home / rules / faq / search ] [ overboard / sfw / alt ] [ leftypol / edu / labor / siberia / lgbt / latam / hobby / tech / games / anime / music / draw / AKM / ufo ] [ meta ] [ wiki / shop / tv / tiktok / twitter / patreon ] [ GET / ref / marx / booru ]

/tech/ - Technology

"Technology reveals the active relation of man to nature" - Karl Marx
Name
Options
Subject
Comment
Flag
File
Embed
Password(For file deletion.)
What is 6 - 2?

Check out our new store at shop.leftypol.org!

| Catalog | Home
|

File: 1751762900436.png (3.11 KB, 225x225, images.png)

 

>WireGuard
Written in C, so no.
>OpenVPN
Insecure (and written in C).
>Tailscore
Proprietary trash. Again, written in a lower level language.

When the fuck will somebody use Python to script a VPN protocol out of for a full tunnel client w/ access to iptables w/ default setting at "strict"? Plus run it on custom STUN servers, uses 10.8.0.53 instead of 8.8.8.8 (Google)/1.1.1.1 Cloudflare)/9.9.9.9 (Quad9) and blocks any connections to them for a fine-grained DNS control, and fully self-hosted w/ local only control. Everything else is too insecure. Oh, and also
>Tailscale leverages Google's OAuth2 for user authentication, allowing users to log in to Tailscale using their Google accounts
Lmao. The absolute state.
16 posts omitted.

This is in OCaml plus a unikernel so free of bloat: https://blog.robur.coop/articles/miragevpn-server.html


what's wrong with mullvad


If you want to go with the proxy client + VPS route, Singbox, Clash or V2ray are written in Go


https://github.com/SagerNet/sing-box
https://github.com/MetaCubeX/mihomo
https://github.com/v2ray/v2ray-core



 

Who else rayhunting? Tired of police militarization and surveillance? Watch them back!

https://www.eff.org/deeplinks/2025/03/meet-rayhunter-new-open-source-tool-eff-detect-cellular-spying?language=en



 

In the recent years, more and more platforms at starting to introduce age verification trough external services like Persona. The most recent one, being roblox, which introduced ID age verification not so long ago. We also have cases like Facebook and Linkdin. But it is just the start. Probably, soon more and more platforms will introduce restrictions and age verification trough ID.

Now the question is, how would one bypass these tools? Fake IDs, if so, how good they should be? Or is the technology even working? All the questions surrounding this are encouraged.
3 posts omitted.

I know from a friend's friend that you can use an image generator language model and photoshop to make fake photos of IDs to get around this, you just have to let your email account associated with the service's account "cook" first (e.g. let big data fingerprint it by watching youtube and creating general activity on it) so their algorithm does not recognize it as fraud

File: 1759111703465.png (335.11 KB, 1287x881, 1632443542682.png)

bump

Since this thread was last bumped things have gotten worse.
The thing that is on my mind is how would one run a site without having to follow such laws.
Like I want to run my own porn site which is the most risky category.

>>28047
this is very common if you are overemployed and want to have two different CVs. it's not "anonymously" just not tied to a real ID.

>>31416
>Like I want to run my own porn site which is the most risky category.
How about a webring instead? If a bunch of people making smut just link to eachother, there's no platform to be forced to do this to begin with.

>>31418
yeah thats one step away from just throwing up a torrent



File: 1726459786963.png (365.18 KB, 709x538, nuimageboard.png)

 

The neverending quest to rewrite vichan -

Archived threads:
https://archive.is/xiA7y
258 posts and 59 image replies omitted.

>>31541
>Cache immutable the outbox.
I wrote signature verification for the inbox and three implementation for the Person outbox.
Think I'd like it to be illegal to use an irregular cursor/page so that the cache rarely misses.
But would also like to avoid using the "skip" parameter with O(n) search of the documents.
No matter how it's implemented it seems to require a document mapping cursors to pages.

>>31548
Settled on just using a cursor and "trusting" that servers won't use irregular cursors.
Or else that it may be possible to remove services which query the origin excessively.

Further this is a singly linked implementation because Delete and Update are included.
Delete and Update requires that the pages be traversed in full to render next elements.

The first page is always the total_items modulo the config.OUTBOX_PAGE_SIZE.
This allows every subsequent page to be cached immutable so long as the linked cursors are used.

We also drop the "partOf" parameter to avoid making the full (mutable) collection.

It's all above board with the spec too.
Only downside is the mentioned "trust" required of servers.

Wrote the Person following and followers endpoints.
Ended up not materializing the document to keep track of this.
So similar to the outbox this is just a query on the ActivityModel class.
The only real advantage to this is in bookkeeping.
It's slow because it's not really possible to cache these pages.
It should be less than 50ms (maybe less than 10ms on heavy hardware), for a page, which is probably too slow.
There is also a precondition that there be one follow not undone for any thousand.
This is to make it computationally feasible.

>>31567
It's a bit of a fail to write a federated server with mongodb in anything but typescript.
Guess there's going to be a 2.3 using fedify, mongodb, and typescript.
Think need to separate out the Activity logs from the materialized views.
This is to make the follwers, following, and like sufficiently performant.
My impression is that the client to server protocol would make things like bump ordering difficult.
So there probably needs to be a third layer to the API for a cache efficient client.

>>31583
For future reference, the private key idea is to use fordwardActivity() [^1].
And simply sign on the client side for all the relevant servers sent via a separate endpoint.
It's apparently trivial to wrap the existing fedify classes as monogodb documents with indices.
For the POST fanout use fedify/x/cfworkers [^2] including POSTing to the origin…

:[^1] https://fedify.dev/manual/inbox#forwarding-activities-to-another-server
:[^2] https://github.com/fedify-dev/fedify/pull/242



File: 1758713597538.png (38.22 KB, 736x736, ClipboardImage.png)

 

Have you ever come across legacy code and clients so shit it made you quit your job? I'm the OP from >>29629. I'm serving my notice period as of now. Never will I ever work a techjeet job again in my life. I'm fed up of looking at the absolute worst if-else/try-except hell, perpetually broken, shitly architected mess of entangled services that was assigned to me against my will. Even the individual config files are thousands of lines of undocumented json. It's such hot garbage you can't even run it locally, you need to push your changes to UAT just to see if they work. On top of that, the clients are typical middle-management assholes who always tried to blame me for their own mistakes. So, I quit on my own terms before those cunts got me fired. Atleast I have learned what not to do and saved enough to start my own thing. Will probably become a petite-bourg indiehacker or freelancer of some kind.

Also, and I say this as a jeet myself, never work for jeet clients or managers. They'd rather work you to death than make any improvements in their processes and standards, even if said improvements serve their own interests.
4 posts omitted.

hahahaha, I've had the same setting, sometimes shit code makes you want to blow your brains, it was a 20 year old .net codebase, PORTED from another company that was about selling horses or some shit, and it was adapted to handle biometric product catalogues, a CRM, i remember finding comments from 2004.

>quitting a cushy job over autismal shit
<Will probably become a petite-bourg
yeah "become" lmfao

>>31485

Staying on a job that is unfulfilling and makes you miserable just because it's "cushy" is The American Okie-Doke.

OP don't feel bad for having agency in your life.

>>31485
>>boo hoo poor me
>Won't somebody think of the african children???
Cmon man, get a grip

>>31485
Labour aristocrats are far less reactionary than petite-bourgs. Not that it matters because India is doomed anyway.



File: 1697820403212.jpg (Spoiler Image,350.18 KB, 1791x2048, 1688578954193.jpg)

 

Xfce was supposed to be THE lightweight fully-featured desktop manager but it seems fucking KDE has around the same memory footprint and performance?!
https://www.forbes.com/sites/jasonevangelho/2019/10/23/bold-prediction-kde-will-steal-the-lightweight-linux-desktop-crown-in-2020/
19 posts and 6 image replies omitted.

>>26316
low spec computers. which is the majority of computers in the third world

>>22030
>mouse girl
This has awakened something in me, what have you done?

>>22872
Just when the world needed tysontan most, he vanished.

File: 1758898924161-0.png (55.12 KB, 1920x1080, 473bf53504438936.png)

File: 1758898924161-1.png (45.71 KB, 1920x1080, 5b7e983b5361f72d.png)

https://oomfie.city/@anubiarts/115265721807724116
>happy KDE Linux/KDE Plasma 6.5 beta to those who celebrate

File: 1760107374386.png (162.06 KB, 1280x800, random.png)

I like IceWM and Window Maker. Both are easy to use. IceWM comes with Windows 95 clone GUI and Window Maker is different (similar to NeXT) but still just as easy to use.



File: 1759349427099.png (60.65 KB, 527x383, Email.png)

 

since the server crash ate my last thread about how to create anonymous email users over Tor in the age of cuckflare, I decided to recreate my findings from it. the goal is simple: create an email with a host that is considered trustworthy in most places online, using Tor Browser
I assume you're on a Debian-like system, including Ubuntu or Linux Mint. use a password manager like keepassx to generate unique passwords for all services. DO NOT USE ANY PASSWORDS THAT YOU USE FOR ANY OTHER ACCOUNTS. avoid using any special characters in your passwords, because configuring mutt with them seems to work poorly

for this exercise you will need Javascript enabled in Tor Browser. the middle "Safer" setting should work. perhaps in the future I will figure out a way with scripts disabled. the target of this guide is protonmail. in my experience it is considered trustworthy enough for signing up for various services
we will use a series of what I will call "springboards", where we move from a less trusted service to a more trusted one, until we get to protonmail which has rather strict standards for what it considers trustworthy for email verification

the guide below will go cock.li -> kolabnow.com -> proton.me

>level 0: cock.li

run by chvddie-adjacent people. uses colorful domain names like cock.li, loves.dicksinhisan.us and horsefucker.org, so it is generally considered untrustworthy by almost everyone. but it has the benefit of easy signup. it will therefore serve as our level 0 service. it has some hidden services:
rurcblzhmdk22kttfkel2zduhyu3r6to7knyc7wiorzrx5gw4c3lftad.onion for web
xdkriz6cn2avvcr2vks5lvvtmfojz2ohjzj4fhyuka55mvljeso2ztqd.onion for email (IMAP, POP) and chat (XMPP)
the clearnet web service tends to work better for signup for some reason, so use https://cock.li/ to sign up. using the cock.li domain for your email seems to work best - I tried using airmail.cc but had problems logging in
cock.li currently does not have a webmail. look further down for a short guide how to set up an IMAP client (mutt) that runs via Tor
you can solve the Proof-of-Work thing if you want, but it's not necessary for this guide since we only need to be able to receive email on this account. solving the PoW took 20 minutes on my crappy machine. you need to set the "Post too long. Click here to view the full text.

I also noticed reddit allows signup with cock.li emails. works best via reddit's .onion

>>31436
>mutt
at this point just connect to the imap server with the openssl terminal client. it literally adds nothing over a bash script that just grabs everything from imap and will be a point of failure because it is comically hard to setup compared what little it does

and you wasted time talking about random email providers that literally does not matter. if you want privacy use a pgp key pair. wtf is this /g/ tier nonsense

>>31438
this isn't about encrypting email. it's about getting an email without leaving any clearnet trace

>>31437
update: reddit will shadowban you for the most minor shit if you do this. better to use a more reputable provider



 

When the fuck will there be a fully open source desktop RISC-V SBC w/ mainline Linux support? The closest one is a SiFive HiFive Unmatched/Unleashed. I'm not spending $15,000 on a Talos II and nobody wants to go retro either, so this is the safest bet at having fully open source hardware on a desktop PC.

What's stopping you from using FreeBSD?

>>31411
FreeBSD is proprietary. The only two good Linux distros is Gentoo and Guix. I don't use BSD.



 

What's the deal with block-based coding? I'm surprised it's not more common for the obvious stuff like markup languages, since they're both sandwich shaped, and whenever I look into it I see it pitched as:
>no coding
even though it is, just you have premade snippets.
>usually pitched as a teaching tool rather than part of a serious workflow
which is weird beause I see node based coding, another kind of visual coding, used in gamedev and shader stuff quite regularly.
>seemingly only used for high level programming
why? like is there something low level programming languages do that can't translate to blocks?

Do you use block-based coding for anything, or have experiences to share about it?

Finally figured out npm and got blockly running. Perhaps I could try making a generator for rust to see if that's possible.

>>30009
Blocks are just a different interface to imperative code, which most people already know how to read as text and is trivial to learn compared to other coding paradigms (it's like a cooking recipe). Nodes in contrast represent a type of reactive programming, which is harder to grasp and in general-purpose languages can only be found as special purpose pipelines or message-based object systems. Documentation is pretty much the only advantage of blocks over text, all constructs are listed and often telegraph how they may be used.

File: 1758989054658.png (90.15 KB, 393x428, c6157cbd242c1099.png)




File: 1727021493210.png (526.5 KB, 800x600, ClipboardImage.png)

 

In recent years China has made significant strides in developing its own semiconductor industry with things like Huawei's HiSilicon, Loongson, StarFive, MilkV, etc. I would call that China outlasted the US sanctions barrage from the US. Chinese investment in fabrication technologies, while not anyway near cutting edge is getting to be near good enough. With things like Intel looking shaky and the rise of Risc-V and ARM we are steadily moving forwards towards the hopeful future of open standards, hardware and software, where most consumer computation devices will have built in Chinese backdoors instead of American ones.

>Chinese schools testing 10,000 locally made RISC-V-ish PCs

https://www.theregister.com/2024/04/05/china_schools_riscv_pc/

>Beijing issues list of approved CPUs – with no Intel or AMD

>2024 may be the year of Linux On The Arm-or-RISC-desktop as China moves away from Western tech
https://www.theregister.com/2024/03/25/china_approved_tech_list/

>China Is All In on a RISC-V Future

https://www.hpcwire.com/2024/01/08/china-is-all-in-on-a-risc-v-future/

>'The Linux of processors' — New breed of Chinese super CPUs emerge on US soil as universities back open source high performance RISC-V processors to be the next big thing in HPC

https://www.techradar.com/pro/the-linux-of-processors-new-breed-of-chinese-super-cpus-emerge-on-us-soil-as-chinese-universities-back-open-source-high-performance-risc-v-processors-to-be-the-next-big-thing-in-hpc

Post too long. Click here to view the full text.
17 posts omitted.

File: 1754438382791.png (1.24 MB, 1920x1080, ClipboardImage.png)


>>28665
Maybe if were to assume that the end goal is desktop-class R-V CPUs, whereas the more likely goal is having something between an FPGA and an off the shelf ARM SoC as a middle ground for custom chips controlling all the various IoT devices, drones, autonomous systems, etc that China actually produces

Why do you need a list of approved CPUs?

I work at a hardware company. one year ago we were talking about partnering with Chinese companies, now red scare is in full effect and my boss tols me npt to go to china "because they'll detain u" jokes on him I'll go anyway and just not mention it.

>Huawei Technologies has applied for a patent in “ternary logic”, an alternative to binary computing logic first explored in the former Soviet Union, in hopes that it could improve the design of artificial intelligence (AI) chips and help mitigate the impact of US sanctions

>The approach could be used to reduce the number of transistors on a chip and therefore reduce energy consumption, according to the patent application, which comes at a time when advanced chip designs at the 2-nanometre level are approaching physical limits.


https://www.scmp.com/tech/big-tech/article/3305201/tech-war-huaweis-ternary-logic-patent-could-solve-problem-power-hungry-ai-chips

They got through the noise problem. A step towards bridging the digital and analog.

What's even wilder is that HarmonyOS has apparently had a ternary logic support for years.



Delete Post [ ]
[ home / rules / faq / search ] [ overboard / sfw / alt ] [ leftypol / edu / labor / siberia / lgbt / latam / hobby / tech / games / anime / music / draw / AKM / ufo ] [ meta ] [ wiki / shop / tv / tiktok / twitter / patreon ] [ GET / ref / marx / booru ]
[ 1 /2 /3 /4 /5 /6 /7 /8 /9 /10 /11 /12 /13 /14 /15 /16 /17 /18 /19 /20 /21 /22 /23 /24 /25 /26 /27 /28 /29 /30 /31 /32 /33 /34 /35 /36 ]
| Catalog | Home