[ overboard / cytube] [ leftypol / b / hobby / tech / edu / games / anime ] [ meta ] [ GET / ref]

/tech/ - Technology

"Technology reveals the active relation of man to nature"
Name
Email
Subject
Comment
Flag
File
Embed
Password (For file deletion.)

| Catalog | Home

File: 1608526015238.jpg (74.01 KB, 1024x768, 31821-1.jpg)

 No.2177[Reply]

I posted this in another thread but I think it deserves its own thread.I've been seeing a lot of people saying that installing tor is super hard and difficult, and, even if you use windows it's not that hard. All you have to do is install the tor browser and go into the browser bundle files and run the executable for tor, or, just use the browser bundle.Like it's not hard at all.But, being the pros (and dirty commies that we are) we don't use fucking bourgeois Microsoft.So, I've set up a super simple and comprehensive guide to installing and using tor like a pro on Linux.This is why we use Linux.STEP ONE:Downloading tor:ctrl+alt+t: Open terminal:Sudo apt install torsudo service tor startSTEP TWO:Downloading and setting up privoxy.sudo apt install privoxyEdit the config file:vim /etc/privoxy/config(If you don't have vim sudo apt install vim)add in text at the bottom:(vim insert mode: press I)forward-socks5 .onion 127.0.0.1 9050(press escape)Type :wq (write quite)Done, ammo loaded cannons ready to fire.STEP THREE:Set up firefox to use tor:about:preferences: Network settings, Use custom proxy(Privoxy runs on port 8118) 127.0.0.1 8118Check off "Use this proxy for all protocols"Done.Takes literally 5 seconds and you don't have to inconvenience yourself by downloading a whole brand new fucking browser ONLY for the simple task of bouncing around encrypted packets through a bunch of proxies. You also don't have to live with the hellscape that is Microsoft and the billions of exploits and bugs in and written for it. (Not to mention back doors.)And before anyone starts bitching; Setting up firefox for privacy isn't that difficult.Basically turn off all telemetry and geo location, referer headers (but you will need http refer headers for 8chan) and some other shit, Guide here:https://www.privateinternetaccess.com/blog/2018/09/firefox-hardening-guide/But honestly none of that even matters unless you are a windows user or a pedophile and let's hope you aren't either one of those.Have a nice day.
47 posts and 7 image replies omitted. Click reply to view.
>>

 No.4478

>>4438
make an onion site on a vps that doesnt take any info and is operated out of 14 eyes. Keep a backup site in case u do get shut down by the company i guess. keep your database encrypted until called upon obviously if anything sensitive. Only use tor to connect to the server when configuring it. Should keep u safe, these r the basics, look into it. grugq has some case studies in some like deceased 2013 blog about cyber criminals n shit, one case study about how this pedo ring basically got away by just using yknow, standard opsec but just sticking to it well and not giving out personal info, using proxies for everything, not using VPNs for security, and shit. So nah anti-gov shit stays up unless infiltrated, cp stays up -> gets killed -> comes back, and drugs always stay up lol but who do u think really profits off that, govs r the og cartels. Anyways yeah, whatever u do just have good basic opsec and u should be fine, tor isnt horribly broken, just use it how you are told to use it by people who know their shit. i.e. dont do shit on tor u do on clearnet, dont change ur browser, close sessions frequently, dont have it full screen, ideally use whonix or sandboxing or smth, whatever. If you're super noided there's always yknow, doing it out of public wifi also, so even if its deanonymized its not tied to u
good luck anon
>>

 No.4488

The recent update for the browser bundle standardizes the screen size for the full screen browser window, so that leak is probably not that big of a problem now.

Also if using public WiFi to be anonymous, consider cloning the MAC address to something else than the one that could be traced if hotspot operators log that and can correlate the traveling of the device.
>>

 No.4548

apps
>>

 No.4549

>>4488
>The recent update for the browser bundle standardizes the screen size for the full screen browser window, so that leak is probably not that big of a problem now.
No, the recent update (10.0) completely fucks up resolution fingerprint resistance, because the rounding is buggy. 1) it doesn't round to multiples of 100 but is slightly off. 2) the window size is different between initial window and subsequent new windows.
Secondly, the canvas fingerprint resistence doesn't work anymore.
Thirdly, what you're referring to (a technique called "letterboxing") has already been part of the 9.5 version.

See for yourself:
https://arkenfox.github.io/TZP/tzp.html
https://www.amiunique.org/
>>

 No.4567

god you people are retarded. You can't figure out how to install a fucking program through the package manager? Kill yourselves.


File: 1608526242672.png (2.06 MB, 2000x1333, Gitter-joins-Element.png)

 No.4551[Reply]



File: 1608526236979.jpg (572.3 KB, 1800x1200, Asus_ROG_Strix_GL702ZC_9.jpg)

 No.4500[Reply]

Just want to earn my paycheck to feed myself from something that will work for at least 4+ years and be durable in a chaotic home environment.

I heard stuff about how the new ryzen laptops are crazy good worth of money for the consumer. Don't know much about cpus wars.

Only want to be able to do my work fast on it without lagging under heavy load.

Will be using many many browser tabs, excel sheets, word documents, and pdf softwares. No games or anything. Just work.

What durable laptops would you suggest for these purposes in the $300-500 dollar range. I just want to fully utilize my purchasing power while buying this laptop because i'm kinda loaning the money from somebody else ;-;
12 posts and 1 image reply omitted. Click reply to view.
>>

 No.4515

>>4514
Good luck, keep us posted on what happens
>>

 No.4517

>>4514
>Will this Acer survive for 4+ years?
>Graphics Chipset BrandAMD
Avoid laptops with AMD or NVidia discrete gpus, those laptop gpus have high failure rates, often double digit percentages, unlike Intel igpus which have &lt0.1% failure rate. MAYBE the Radeon Vega igpus from AMD will be fine, but they haven't been out long enough to determine their durability. Find out what the specific GPU model is.
>Resolution HD (1366 X 768) Pixels
Too small resolution for my taste, wouldn't settle for less than 900 pixel height. See if you can find 1400x900, 1600x900, 1920x1080, etc. If the screen is glossy (which it usually is nowadays) instead of matte, you might want to also buy an laptop screen anti-glare filter.
>Hard Disk DescriptionMechanical Hard Drive
Are you unable to find one with an SSD?
>Processor BrandAMD
>Processor TypeCore i3 3220
Specs look like they're completely riddled with mistakes, find out what the actual processor is. This looks like a scam. Also I would try to make sure it's a fanless laptop.

>Will be using many many browser tabs, excel sheets, word documents, and pdf softwares. No games or anything. Just work.

You can't make money off excel/word, this isn't 1993. Expert knowledge in html, css, php, laravel, mysql, js, bootstrap, node.js, react, jquery, angularjs, vuejs, json and mongodb are the minimum requirements today (you can probably get by with just the first 7), which would take months to learn. Throw in some knowledge of http, apache, nginx, dom, xml, csv, and maybe python, django, beautifulsoup for good measure.

Post too long. Click here to view the full text.
>>

 No.4520

File: 1608526238941.jpg (814.28 KB, 2048x1536, 1501269694497-0.jpg)

A cheap used Thinkpad. That's all anyone needs.
>>

 No.4538

For the usual office work or even programming many laptops could work.
Get decent processors and enough RAM, and that should be fine, and there's isn't a requirement for the most LEET gaming GPUs.

If the operating system matters, then one with that already preinstalled could be considered. Most should have that anyways.
But libre software is good to have installed.
>>

 No.4541

File: 1608526241577.png (84.73 KB, 678x492, 1601531776030.png)

Can you believe AMD beat Intel even on laptops?

>Will be using many many browser tabs, excel sheets, word documents, and pdf softwares. No games or anything. Just work.

Though honestly you should just get an old thinkpad if you're going to do only this much. They're durable, alright.


File: 1608526089440.jpg (594.23 KB, 1920x1280, LinuxCon_Europe_Linus_Torv….jpg)

 No.3033[Reply]

https://github.com/django/django/pull/2692
https://github.com/redis/redis/issues/3185
https://issues.apache.org/jira/browse/COUCHDB-2248
https://www.drupal.org/node/2275877
https://www.drupal.org/node/343414
https://github.com/systemd/systemd/issues/9894#issuecomment-424086622
https://www.phoronix.com/scan.php?page=news_item&px=Linux-5.8-Inclusive-Terminology

For symbol names and documentation, avoid introducing new usage of 'master / slave' (or 'slave' independent of 'master') and 'blacklist / whitelist'. Recommended replacements for 'master / slave' are:
'{primary,main} / {secondary,replica,subordinate}'
'{initiator,requester} / {target,responder}'
'{controller,host} / {device,worker,proxy}'
'leader / follower'
'director / performer'

Post too long. Click here to view the full text.
70 posts and 7 image replies omitted. Click reply to view.
>>

 No.4530

>debian
>ubuntu
>fedora
are from a security perspective better
>>

 No.4531

File: 1608526240252.jpg (21.05 KB, 852x480, glowie.jpg)

>>4530
sure thing Red Hat Inc. employee
>>

 No.4533

Conceivably the glows could sneak in hidden backdoors that cannot be discerned without considerable difficulty.
That won't be stopped by using hipster operating systems though. Linux is far more audited than those have been.
>>

 No.4535

>>4533
Yep, this is the same issue with people using supposedly more private forks of Firefox. They end up using a much less secure web browser that also makes them much more fingerprintable.
>>

 No.4544

>>4533
>>4535
Linux, the kernel is audited to hell and back. But there are many more components to operating systems than just that, and each of them adds additional surface area to an attack. The big example to call out for this is of course SystemD, which took over many functions other more decentralized manageable components did. Since it came from Fedora, a forprofit entity, it also is a reasonable source to distrust the main distros which all use it.
Being able to work with several obscurer OSses would add a lot of security to whatever you're doing, since having a more varied OS ecosystem will give more hurdles to any would-be attacker. This makes things like OpenBSD, Qubes-Whonix or even Gentoo very useful in allowing at least some to keep their safety guaranteed.
Similarly with Firefox, it added many more components to itself in recent years that all form additional potential entry points into the system. If the fork in question is a more stripped down version of it (which is often the case) and still takes the main security updates that are added as they are found (which is always the case), they end up being safer against attack. Your point regarding fingerprinting still stands though, but it there are many vague sidechannels that can compromise your browserprints with relative ease.


File: 1608526235235.jpg (206.54 KB, 1024x1024, 1024px-Back_of_floppy_disk….jpg)

 No.4485[Reply]

Boomer family left me hundreds of blank floppies. (You know how Boomers love to collect things they don't use, which invariably become obsolete and become e-waste; they left thousands of blank CDs, DVDs, a zip-drive and about 6 old laptops and a few ancient desktops too. Because they refused to give anything away when they upgraded their stuff.)

Any ideas for what I can do with the floppies?
>>

 No.4486

>>4485
if there something importing on it you can try to back them up or try to smelt them, or glue them together to form cube or pencil holder or what ever post pics of what you made
>>

 No.4487

If they still work and you don't want them sell em on eBay or gumtree or whatever

Retro enthusiasts still use that shit
>>

 No.4529

You could use them to backup anything important you want to last.
>>

 No.4534

>Floppies
Those are not good for backup, and the typical storage amount isn't much for today's applications anyways.
>CDs, DVDs
These could be decent media for backup, but it depends. Sometimes the data layer can be degraded, if it isn't stored properly or utilizing materials that last long.
>>

 No.4536

If there are any rare, important programs on it, and they aren't already on the Archive, upload them.


File: 1608526109804.png (55.58 KB, 1200x1200, 1200px-Rust_programming_la….png)

 No.3273[Reply]

About to start learning Rust. What am I in for?
22 posts and 1 image reply omitted. Click reply to view.
>>

 No.3560

>>3552
>Secondly, they call themselves "Open"AI but they're very much not open at all
This is an example of when "open" is worse than libre
https://www.gnu.org/philosophy/open-source-misses-the-point.en.html
>>

 No.3561

>>3559
Ill gather some resorces and make one. It might be best suited to /edu/ though.
>>

 No.3564

Static linking only.
>>

 No.3642

>>3273
hormone therapy
>>

 No.4467

Gateway drug to Haskell


File: 1608525938059.png (678.5 KB, 1920x1440, rsq8R2Q[1].png)

 No.1308[Reply]

Anyone know of a reliable way to get a fake phone number for when social media accounts force it upon you?
I keep trying those 'receive SMS' websites but all the numbers are already used by the time I get to them.

Also, you don't need to remind me how they all spy on you, I know, I just need this to conduct business directly with clients, nothing more.
4 posts omitted. Click reply to view.
>>

 No.1334

you don't have to have a phone number, just email them twice that your phone number doesn't work and they'll unlock your account
>>

 No.1336

>>1308
Have you been locked? Are you a furry artist or something?
>>

 No.1374

>>1336
Twitter will just randomly lock your account at times.
>>

 No.4466

>>4465
OP if you try this out report back about it working or not please


File: 1608525831336.jpeg (5.75 KB, 256x256, t56756756.jpeg)

 No.118[Reply]

I was using riseup.net as a VPN, but, now cloudflair (The upstream provider for the site) is blocking it. Furthermore, it's come to my attention that riseup boofed their canary after the FBI requested server logs. They are glowin the darks, for real, and confirmed.
What VPN would you suggest anon? What VPN, if any, do you use. I was thinking of routing all my traffic over tor, but, currently the site still blocks tor traffic.

Help me out guys, I feel naked, thanks.
53 posts and 1 image reply omitted. Click reply to view.
>>

 No.4385

>>4384
Would like to echo the same problems. Can't we have a temp ban on tor posting after a raid or something? Or at the very least make tor posting without pics/files always okay. Then make photos a captcha thing? What's the worst that could happen if you allow tor text posting? I mean if frequent posting became an issue put a cooldown on the threads so that they can only get posted to every 10 seconds or something. This gives jannies enough time to see if there is a problem.

Making tor posting so annoying is definitely an mistep imo for an obscure leftist chan.

I've also thought about this >>4273. No pol-tard wishing to raid is going to know that these boards are less protected.

Anyways I think we should all agree here that text-only tor posting should be unhindered.
>>

 No.4388

>>4384
>For me "block bypass" works 99% of the time.
Good for you, but what about posting pics? It's also probably only because Cloudflare doesn't have the resources to block all Tor nodes (yet), but they can block all proxies on proxy lists even if there's a delay between them appearing on said lists and them getting blocked as "known spammer" IP's. Obviously most of them haven't been used for spam on this site, but they're blocked on every site that uses Cloudflare.

These are the proxy sites I know of, whose proxies are all blocked within a day or two in the rare case where one works at first:
https://www.sslproxies.org
https://proxy-list.org
http://www.proxylisty.com
http://www.freeproxylists.net

It's good if the block bypass works for Tor, but especially on a site like this it's pretty fucked that anonymity must be compromised at all. 8chan used Cloudflare but didn't implement Cloudflare's spam blocks (except after raids), at least when I still posted there. I just tried as a test to post on 8kun with a proxy and a VPN and it works, too. If a hangout for far-right white supremacist terrorists can do that, why can't a mostly reasonable left-wing site?
>>

 No.4389

>>4388
I totally agree about imageposting, that's something that frustrates me too, although sometimes it still works if you're lucky. I've even been thinking of using Whonix+VPN setup just to bypass that, but it's not worth the trouble.

>It's good if the block bypass works for Tor, but especially on a site like this it's pretty fucked that anonymity must be compromised at all.

In what way is anonymity any more compromised when using "block bypass"? Mods can see that your posts come from the same exit node, it's all IP-based AFAIK. Nothing stops your from creating a new circuit or restarting your Tor Browser session.
>>

 No.4391

>>4389
>it's not worth the trouble
Ideally there wouldn't be any trouble at all in the first place…
>In what way is anonymity any more compromised when using "block bypass"?
That's not what I was referring to. I meant blocking proxies and VPN's is fucked up since that compromises anonymity. It's not really this site's fault but rather Cloudflare's spam blocking, but I think having Cloudflare's spam blocking on a site like this is pretty fucked up to begin with. I mentioned 8chan and now 8kun not having those, when its users are constantly advocating for violence based on race, gender, etc… so why does a far more reasonable site like this need those kinds of anti-spam measures?

If the block bypass worked with all proxies, VPN's and Tor nodes, then that'd be great, but it doesn't. It's good if it usually works with Tor, and for me the consequences would most likely be only a fine in the worst case so I don't need a proxy like I said and which is how I'm posting here right now, but I assume >>4262 for example is referring to more serious consequences. How can the proletariat of the world unite if uniting is made hardest for those who need it the most?
>>

 No.4459

So I've literally just tried over fifty proxies today and none of them worked even after doing the "block bypass" captcha. All still gave the exact same error message:
>Your IP was recognized as a known spammer.
Cloudflare has really rammed up those anti-proxy "defences", it seems. Good to see people on /gulag/ are complaining about it too, but will that actually accomplish anything?


File: 1608526192510-0.png (62.41 KB, 768x768, rss.png)

File: 1608526192510-1.png (1.73 MB, 1920x1053, tor-rss-smplayer-mpv-FUCK-….png)

File: 1608526192510-2.png (1.65 MB, 1920x1053, tor-rss-smplayer-mpv-FUCK-….png)

 No.4074[Reply]

Replacing registration on major, datamining, media hosting sites [b]with secure, sleek, easy RSS set-up[/b] Bunker/tech/ alpha draft

RSS SETUP (tor + QuiteRSS)
>Install: quiterss and tor
>Stylize: Options->Fonts and Colors->Colors: stylize to your own liking
>Secure QuiteRSS: Tools->Options->Browser-> untick "embedded browser" and leave the "external browser" empty, under 'Content' untick everything
>Torify: Tools->Opt.->Network Connections: SOCKS5, proxy server: localhost, port: 9050
>Go to desired Youtube channel page (or visit it via https://invidious.snopyta.org , which may be taken down soon)
>Right-click and pick View Page Source (or for invidious copy the unique channel ID which is already copy-pastable from the URL; it's the last string of text after "/channel/")
>For Youtube, when at the View Page Source page, ctrl+f "/channel/" and pick the unique channel ID
>Insert the unique channel ID (which looks like 'aAi1SEieasu124dSdsa45Ddas') into the end of the following RSS-ready link:
https://www.youtube.com/feeds/videos.xml?channel_id=[b]ENTER_UNIQUE_ID_HERE[/b]''''
For Soundcloud see bottom of this post
>Paste the completed channel link into your RSS reader.

Post too long. Click here to view the full text.
55 posts and 4 image replies omitted. Click reply to view.
>>

 No.4440

>>4439
same question, just want to know if someone managed to fix the broken bunkerchan rss feeds
>>

 No.4444

The connections themselves are only as secure as your connection setup. It's your job to use a vpn or set up tor for all your traffic, if you feel the need to do something like that for youtube feeds and streams. Since this only handles feeds, and watching or downloading the streams themselves is done with another program, presumably you already have your preferred security measures set up for that other program, so route this one through the same setup. For adding extra fluff to the request headers to hide in the crowd you can use GetFeed.get_headers. The default request looks like this:

GET /feeds/videos.xml?channel_id=… HTTP/1.1
Host: www.youtube.com
User-Agent: …
Accept-Encoding: gzip
Connection: close

and the equivalent for invidio instances.
>>

 No.4448

Bongino is in the process of moving to Rumble (.com) because YT's SJW tendancies are disheartening, and eventually will necessitate the move.

But Rumble's /c/&ltuser> page is, no surprise, nothing like YT's channel feed.
And I can't code my way out of a box. Any chance of QuiteRSS updating to interpret Rumble's feeds?
>>

 No.4449

>>4448
Hmm. There's this
http createfeed.fivefilters.org/index.php?url=https%3A%2F%2Frumble.com%2Fc%2FBongino&in_id_or_class=video-item–a&max=5&order=document

But it can't, for example, tell what the video is called, nor will it play/show pictures internal to Qrss but choosing the &ltno title> to be opened externally brings up the latest video.
Doesn't at this time show any of the other videos in the channel though; not with those settings.


File: 1608526088541.png (368.59 KB, 680x838, dangerously based.png)

 No.3025[Reply][Last 50 Posts]

I've decided to make my script open source. Enjoy.
https://pastebin.com/raw/pajZ4N2x

Edit: This script has been banned on leftypol, hobby, tech, edu, games, gulag and anime. But you can still post with it in this thread, I guess.
290 posts and 108 image replies omitted. Click reply to view.
>>

 No.4794

File: 1608526269992.png (408.59 KB, 656x979, d4ec685edffbf585351df94335….png)

add
>>

 No.4799

>>

 No.4804

File: 1608526271141.png (195.93 KB, 820x986, (you).png)

>>

 No.4827

OP can you add a back massager button for when my back hurts
>>

 No.5096

Is this thing over, OP? Script needs some burger election edits.


Delete Post [ ]
[ overboard / cytube] [ leftypol / b / hobby / tech / edu / games / anime ] [ meta ] [ GET / ref]
[ 1 / 2 / 3 / 4 / 5 / 6 / 7 / 8 / 9 / 10 / 11 / 12 / 13 / 14 / 15 / 16 / 17 / 18 / 19 / 20 / 21 / 22 / 23 / 24 / 25 / 26 / 27 / 28 / 29 / 30 / 31 / 32 / 33 ]
| Catalog | Home