[ home / rules / faq / search ] [ overboard / sfw / alt ] [ leftypol / edu / labor / siberia / lgbt / latam / hobby / tech / games / anime / music / draw / AKM / ufo ] [ meta ] [ wiki / shop / tv / tiktok / twitter / patreon ] [ GET / ref / marx / booru ]

/tech/ - Technology

"Technology reveals the active relation of man to nature" - Karl Marx
Name
Options
Subject
Comment
Flag
File
Embed
Password(For file deletion.)
What is 6 - 2?

Check out our new store at shop.leftypol.org!

| Catalog | Home
|

 

Hardware:

* MilkV board with Gentoo Linux
* Modos paper display (e-paper display)
* Keyboardio keyboard and/or Ploopy mouse kit (custom keyboard and mouse)
* Ovrdrive USB with encrypted password manager (KeePassXC, masterpassword.app, or Bitwarden)

Software:

* Gentoo Linux with:
+ Hardened kernel
+ Refusal to install proprietary packages
+ rkhunter (rootkit hunter)
+ iptables (firewall)
+ firejail (application sandboxing)
Post too long. Click here to view the full text.
1 post omitted.

>clamav (antivirus)
is it really worth using on linux?
>GNUNet
I'm no expert but I remember reading a long time ago about how they plannd to build in backdoors for LEOin the basic framework of GNUnet. Is that still true or was it overruled?
>>33024
who could be behind this post? .gif

Wrong. Qubes OS on any compatible laptop. Install Coreboot if you're extra paranoid (unless you're afraid of actively being targeted by the Mossad, it's not worth it in 99% of cases). Use Whonix DVMs for daily browsing.
Everything you've listed probably contains some very cool security and privacy technologies, but stacking them together randomly will just make you easily identifiable on the internet, make you glow harder than an average CIA agent.
A rule of thumb for privacy/security: if your stack involves a shitton of random minor projects and custom solutions, you're probably doing something very wrong.

IDS/IPS, Honeypots, DLP, and data threat sharing mean hacktivisim is not viable.

Running frontier AI in bulk demands giant chips that create a paper trail.

Essential info for anyone going to doxx the CIA.

>>33020
The best defense is always going to be social, I feel like buying all of this shit while it might make you semi-invisible to a fed, would draw there attention just from the purchase list alone coupled with whatever activities you do on it drawing scrutiny.

OPSEC will always be king.



File: 1776179272436.png (130.73 KB, 255x255, 1775933227537[1].png)

 

What the title says. Apart from leftychan and Marxist Internet Archive, do you know any? I heard from a maoist comrades that there are (news?) websites that they could only access through Tor because they were censored in multiple countries. Do you know any? Thanks in advance

PS: I already found some news/theory magazines that are forced to host a new website every once in a while, so this counts too

>>33099
raddle.me and lemmygrad.ml



File: 1772718125696.jpg (237.69 KB, 1408x768, unnamed.jpg)

 

The other thread hit bump limit and I'm addicted to talking about the birth of the ̶a̶l̶l̶-̶k̶n̶o̶w̶i̶n̶g̶ ̶c̶o̶m̶p̶u̶t̶e̶r̶ ̶g̶o̶d̶ the biggest financial bubble in history and the coming jobless eschaton, post your AI news here

Previous thread:>>30810
38 posts and 9 image replies omitted.

>>33092
The AI community, or whatever we want to call it, seems particularly susceptible to bouts of extreme mania. It’s always either “it’s so over” or “we’re so back” with them, and increasingly, both at once.

That said the cyber risks are not novel or unexpected at all. It’s a narrow domain which LLMs have showing to be fairly good at already. Software is their strongest ability and they already were capable of discovering possible bugs with large contexts. If anything, cyber is their natural domain. I suspect Anthropic was not shocked at all that it could find vulnerabilities, they expected it to, and this plan to lower the gates on all by the elite tech bubble has been in motion for years.

>>33091
We can't really tell, because the experiment essentially rolled multiple phases of attack into one. For leveraging exploits in third party software, you would first identify what the site uses, then acquire info on or locally probe for exploits, then craft an attack, so your intrusion creates minimal noise. Other more brute-forcy approaches, like SQL injection, that rely on site configuration or closed-source software, would require diverting notice through proxies and/or carefully spacing requests.

I'm not a security expert, but i seriously doubt LLM technology has the precision and foresight to pull any of this off. At most it could be an improvement on the types of automated attacks run by script kiddies.

>>33095
>I'm not a security expert, but i seriously doubt LLM technology has the precision and foresight to pull any of this off
yeah I think you're hopelessly naive, none of this seem particularly hard for a llm specifically tuned for it

>>33096
I don't know. Isn't it reasonably well-established, that LLMs often insert extraneous steps and will almost certainly veer off task, when operating at a sufficiently large scope?

>>32862
This was predicted by this satire website:
https://malus.sh/index.html
https://malus.sh/blog.html
>Finally, liberation from open source license obligations.
>Our proprietary AI robots independently recreate any open source project from scratch. The result? Legally distinct code with corporate-friendly licensing. No attribution. No copyleft. No problems.

The worst part about chardet is pushing the AI code to the same project, so now even the original code and license has effectively been removed and only the corporate-friendly alternative remains in existence.



 

Am probably going to be switching to Windows (first time, other than public school computers), and QWERTY for work. This means giving up a whole load of my configuration, and sort of starting computing from scratch. Found a few interesting tools to make the operating system a little more usable:

- MSMG (https://msmgtoolkit.in/) to strip down the install to something a little more manageable.
- komorebi (https://github.com/LGUG2Z/komorebi) to bring tiling windows managers to Microsoft Windows.
- shutup10++ (https://www.oo-software.com/en/shutup10) to disable much of the telemetry used by the system (if this isn't already removed by MSMG).
- AHK (https://www.autohotkey.com/) to make keyboard and mouse macros.

This is excluding typical packages with good reputation like Firefox, VLC, or FooBar2000. Just wondering what all you use to make Microsoft Windows a bit more like home.
27 posts and 2 image replies omitted.

>>27159
>>desktop linux
90% of proprietary software with a linux port only tests on ubuntu and often expects systemd, dbus, etc. to be present.
>there are multiple which are pretty good for software development (e.g. gentoo, nix, guix, etc.)
Good for software development doesn't mean le hacker distro. It means software you need for development is already pre-packaged, which is nearly always the case on debian.

>>27163
>90% of proprietary software with a linux port only tests on ubuntu and often expects systemd, dbus, etc. to be present.
It's been awhile, last heard Ubuntu was due to be phased out for PopOS! due to the Canonical Amazon deal, or something of the like. Guess shouldn't be surprised about what you're saying anyway.

>It means software you need for development is already pre-packaged, which is nearly always the case on debian.

That's fair, and Devaun (as the distro still run on my non-Mac laptop) is most familiar to me.

File: 1771813388758.png (408.43 KB, 1920x1080, Capture.PNG)

I finally got around to setting up my Windows machine configuration follows:

Native Applications and OS:
- Windows 11 IoT Enterprise LTSC
- VSCode
- Outlook
- Office 365
- Microsoft Terminal

Productivity:
- winget
- PowerToys (FancyZones for window management)
- AutoHotkey (Two scripts so far to make tiling near automatic with cursor movement)
- Python

Post too long. Click here to view the full text.

Yesterday I installed a couple more applications:
- VLC
- Syncthing
The latter lets me run sync to my phone, and between my two installs.
This also means having better backups than just my flashdrive.
I also forgot to mention that I ran Shutup10+ on my install.

I couldn't find a suitable thread, so I will post this here.

CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads
>The incident lasted from approximately April 9, 15:00 UTC, to about April 10, 10:00 UTC
https://thehackernews.com/2026/04/cpuid-breach-distributes-stx-rat-via.html



File: 1775371838826-0.png (761.73 KB, 1465x1437, ClipboardImage.png)

File: 1775371838826-1.png (932.39 KB, 1749x1393, ClipboardImage.png)

File: 1775371838826-2.png (184.17 KB, 2577x661, ClipboardImage.png)

File: 1775371838826-3.png (280.18 KB, 2057x1549, ClipboardImage.png)

File: 1775371838826-4.png (204.97 KB, 480x360, ClipboardImage.png)

 


it's because indians use use this shit a lot, so it's starting to dominate the training data set. it's joever.

It's always done this

That's hilarious.



File: 1668576113682.png (Spoiler Image,3.22 MB, 1584x1200, ClipboardImage.png)

 

Thread for watching rocket launches and shit.
94 posts and 60 image replies omitted.

>>33060
They're doing a flyby
Btw the approach starts in about 45 minutes and the flyby will take about 8 hours

>>19294
I work for a space related company and I confirm this sentiment, it is hell and all I can think about is putting money aside so I can flee, it's all a grift and the only real utilitarian goal is mass surveillance. Sabotage all space companies if you can.

>>33082
>it's all a grift and the only real utilitarian goal is mass surveillance.
Curious what you mean by this. Is it that the companies are grifting the govt dollars using 'SPACE' as a cover to develop mass surveillance? is it that the technologies are dual-use?

>>33082
>the only real utilitarian goal is mass surveillance
hey now, there is also big military value for the empire in it, not mentioning its usefulness for regime change!
recently learned that simply maintaining starlink will cause as much carbon emission as the entire global plane travel emissions, but if its for allowing the US military and their proxies to have high speed internet to control their drones I guess its all worth it!

>>33083
old school surveillance satellites are problematic because they're very expensive and cant maintain constant observation due to (obviously) being in orbit and going all around earth and having limited field of vision, and its pretty easy for the target to know when they could be possibly watched
starlink started to send some surveillance satellites among their constellation, which would have the advantage of being very numerous and everywhere so able to maintain constant surveillance. Ofc you dont easily get optical image as good as the old school spy satellites that are hubbles telescopes pointed at earth (although there are techniques to combine many lower res images to get a better one), but you can maintain constant monitoring everywhere, watch other emissions (infrared and other EM emissions), and the target cant know they are being watched or easily pick out the spy ones among the regular starlink sats



File: 1775885575063.png (730.75 KB, 1228x820, 1775861227071436.png)

 

Windows Defender, the built-in antivirus running on every Windows machine, has a working zero-day exploit with full source code sitting on GitHub. No patch, no CVE, and confirmed working on fully updated Windows 10 and 11. A researcher who says Microsoft went back on their word just handed every attacker paying attention a privilege escalation that takes any low-privileged account straight to NT AUTHORITY\SYSTEM. On Windows Server the result is different but still serious: a standard user ends up with elevated administrator access.

The vulnerability is called BlueHammer. On April 2nd the researcher posted the public disclosure on a personal blog, and on April 3rd the full exploit source code went live on GitHub. Both published under the alias Chaotic Eclipse, also known as Nightmare Eclipse, with a message to Microsoft's Security Response Center that comes down to: I told you this would happen.

Before getting into the technical side, there is a backstory here worth knowing.

In late March, the same researcher opened a blog with a single post explaining that they never wanted to come back to public research. Someone had made an agreement with them and then broke it, knowing exactly what the consequences would be. The post says it left the researcher without a home and with nothing. A week later, BlueHammer went live on GitHub with a message that specifically thanks MSRC leadership for making it necessary. That is not someone annoyed with a slow review process. That is someone with nothing left to lose.

* * * * *

Now to the exploit itself, because this one is genuinely worth understanding.

BlueHammer is not a traditional bug, and it does not need shellcode, memory corruption, or a kernel exploit to work. What it does is chain five completely legitimate Windows components together in a sequence that produces something their designers never intended. Those five components are Windows Defender, Volume Shadow Copy Service, the Cloud Files API, opportunistic locks, and Defender's internal RPC interface. One practical limitation worth knowing: the exploit needs a pending Defender signature update to be available at the time of the attack. Without one in the queue, the chain does not trigger. That makes it less reliable than a push-button exploit, but it does not make it safe to ignore.

Here is how the attack chain works.
Post too long. Click here to view the full text.

>Here is what to do right now.

<blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah

or, install linugz



File: 1775817852431.jpeg (6.56 KB, 172x124, IMG_0765.jpeg)

 

>France has incorporated Linux desktops into its national digital-sovereignty strategy. DINUM, France’s Interministerial Digital Directorate, announced a transition from Windows to Linux workstations.

>According to an official government press release, this change is part of a broader initiative to reduce reliance on non-European digital technologies (source, in French).


>The government’s statement is notably direct. The section on workstation evolution confirms that DINUM will replace Windows with Linux systems. The press release also requires each ministry, including public operators, to develop a plan by autumn 2026 addressing desktop systems, collaboration tools, antivirus software, AI, databases, virtualization, and network equipment.


>This initiative extends beyond a standard desktop migration. France positions Linux adoption as part of a broader policy focused on sovereignty, interoperability, and reducing dependence on foreign vendors. As the announcement comes directly from DINUM, which oversees digital strategy across ministries, it holds greater significance than a local pilot or isolated administrative project.


>And as you can see, this is a big deal. It is not a leak, rumor, or unofficial plan. It is a formal declaration from one of Europe’s largest governments, explicitly designating Linux as the replacement for Windows workstations as part of a broader interministerial strategy.


>The extent of the transition will depend on ministry-level plans due later this year, but France has clearly made Linux desktops a key component of its national digital-sovereignty agenda. For now, there are no specific details about which distributions will be used, as that decision will apparently come a bit later.


So ultra rare France W?
I wish China does the same, shame how many Asians are ultra cucks to Microsoft besides North Korea obviously since they use Red Star OS.

File: 1775820320777.png (523.57 KB, 864x1788, gendbuntu.png)

They have been using glowbuntu for a while btw

It's surprising that more bourgeois governments aren't adopting their own national OS distros and internets. It's multipolarity time guys, everyone using Windows is so 2010s.

Amerikkka is already 10 steps ahead because the CIA put backdoors in all Linux distros decades ago.
>I wish China does the same
China banned foreign government hardware and software years ago but I suspect that HarmonyOS has NSA backdoors in it as well. All computer software is built on American hardware and American standards. If it's not bugs planted directly on the hardware then it's software backdoors all the way down because they have broken every means of encryption since the 90s. For example elliptic curve cryptography was sabotaged for decades but people only found out in 2013 because of Snowden.

>>33075
Western glowies are not that omnipotent and competent, and China has its own linux backdoors people were recently seething about though. But in the end if you are a half competent government agency you can mitigate most of the risks, the threat is more for institutions which don't spend much resources on cybersecurity

It's a good think but knowing how europe works this shit is gonna take 25 years



File: 1772824009590.jpg (Spoiler Image,69.3 KB, 828x899, zjbozttmwrg41-3231798122.jpg)

 

Except maybe for hardware stuff.

It is the most shit work I had, it's depressing, boring and soulcrushing.

Even when you think "neat, this cool shit isn't even being used for military shit", you will be wrong and sooner or later the company will be complicit in the murdering of poor people and in the continuation of the surveillance state.

Right now I'm just a grunt in the machine and all I can think about is that I have to get out. The pay is decent so I'll just crush my soul on a daily basis so I can get out of this place, it is the first time in my life I've been able to put some money on the side so I can't get myself to quit just yet, I also need a plan.


Tech won't save us, industrial society is doomed to fail and we will have to create a communist scavenger society from the debris.

File: 1775598649835.png (3.38 MB, 2000x1500, trvke.png)

>>32827
>Even when you think "neat, this cool shit isn't even being used for military shit", you will be wrong and sooner or later the company will be complicit in the murdering of poor people and in the continuation of the surveillance state.
Thermotrvkvlar bomb. Two years ago my company was talking about partnering with big Chinese organizations. A year ago we pivoted to sucking off Uncle Sam's MIC.

>>32827
Every job is shit. Hedonistic treadmill and all that.



 

What software do I need for vtubing? Ofcourse i'm expecting some nice foss thing.

Do i need a beefy pc?

Don't judge me, you are on this board as well

Thank you nerds

For the streaming part: https://obsproject.com/

And I'd say start with a png model before trying to do anything fancy with layers:
https://kaiakairos.itch.io/pngtuber-plus
https://veado.tube/

As for the fancy layers option:
https://denchisoft.com/
https://live3d.io/
https://snekstudio.com/
https://inochi2d.com/
https://us.iriam.com/

/trash/ has a general for this that might be worth checking out:
https://boards.4chan.org/trash/thread/82111488



Delete Post [ ]
[ home / rules / faq / search ] [ overboard / sfw / alt ] [ leftypol / edu / labor / siberia / lgbt / latam / hobby / tech / games / anime / music / draw / AKM / ufo ] [ meta ] [ wiki / shop / tv / tiktok / twitter / patreon ] [ GET / ref / marx / booru ]
Previous[ 1 /2 /3 /4 /5 /6 /7 /8 /9 /10 /11 /12 /13 /14 /15 /16 /17 /18 /19 /20 /21 /22 /23 /24 /25 /26 /27 /28 /29 /30 /31 /32 /33 /34 /35 /36 ]
| Catalog | Home