[ home / rules / faq / search ] [ overboard / sfw / alt ] [ leftypol / edu / labor / siberia / lgbt / latam / hobby / tech / games / anime / music / draw / AKM ] [ meta ] [ wiki / shop / tv / tiktok / twitter / patreon ] [ GET / ref / marx / booru ]

/tech/ - Technology

"Technology reveals the active relation of man to nature" - Karl Marx
Name
Options
Subject
Comment
Flag
File
Embed
Password(For file deletion.)
What is 6 - 2?

Not reporting is bourgeois

| Catalog | Home
|

File: 1750530833794.jpg (26.61 KB, 267x400, 1439096-2352438739.jpg)

 

Microsoft is the CIA. Pretty much all US big tech is. Windows is a global CIA mass surveillance program via monopoly capitalism. It’s completely impossible to make Windows secure, there’s no secret registry switch. The entire thing is compromised top to bottom, and under no circumstances should anyone consent to its use. Closed source spyware monopolies are a weapon of war against us by the bourgeois state.

Open source operating systems are software communism. If we’re not willing to build and use existing forms of technological sovereignty and anti-capitalism, then we’re probably not willing to do any other forms of communism either. I hate the “No ethical consumption under capitalism” mantra. How do we expect to get out of capitalism without building alternatives? I think a lot of leftists hope a revolution will happen then just magically replace all the corrupt and bourgeois components of consumerism, using the same uninvolved passive mechanisms.

Do we really believe a windows update will just drop after some election that restores our rights, trust, openness, privacy and dignity? It must be built and owned by the people.
40 posts and 5 image replies omitted.

>>30338
Thing is there's been good posts on fedi, especially art. It's had undeniable steady growth. As the list of other options shrink, the option that fundamentally cannot die stands firm.

>>30799
It depends which project tho. I've seen this criticism directed at FOSS projects that have in fact been audited so many times that my first assumption is whoever brings it up doesn't know how to look for audits.

>>30802
>>30865
Yeah there's really no learning involved anymore. I got my dad to use NixOS with KDE and he hasn't had a single issue with it, compared to windows where he found himself confused with it weekly.

File: 1756699124936.png (125.7 KB, 640x331, ClipboardImage.png)

>>30211
Nothing matters as long as they control the hardware and CIA backdoors your chips. Internet was made by DARPA, backbone is privately owned. Solution is global 5g OpenWRT meshnet. Thats why they made up conspiracies about the beams melting your brain or whatever. They know the Chinese are trying to democratize the net.

Software is inconsequential if you cant make your own hardware. Thats why people are waking up to domestic production sovereignty. You need state level power and investment in domestic lithography not just using a different OS to play your vidya.

>>31140
Better optimized software means weaker hardware can meet expectations, but yeah hardware remains dominant in the hardware-software dialectic.



File: 1729867358619.jpeg (41.25 KB, 512x768, 90.jpeg)

 

I already accidentally locked myself out from any adult content on my computer by changing the router settings and losing access but I need help with my phone.
There is no website block option on Android. I've considered paying someone to root my phone (I'm assuming it provides deeper access to settings) and doing something to hard block any access.
help.
32 posts and 2 image replies omitted.

>>28528
I'm convinced no one who jerks off as much has played with their asshole.

Jerking off is just a bodily function, like taking a shit. If you feel like you are taking a shit too much, the solution is not to remove the toilets from your house.

>>31128
But you don't understand, they feel extreme shame at having to take a shit, so they must hold it in.

>>31129
I had a cousin that refused to shit when she was little because of that. It nearly killed her and she was forced to take medication to make her go.

Isn't there a tiny pinhole button on your router to reset it to factory settings? You should push that button so you can start jacking off again.



File: 1756509712830.webp (2.33 MB, 2528x1346, asjg9sgjs.webp)

 

Is a self-driving car really an invention that society needs? We already have a machine that was fundamentally designed for a human operator, there is no entity in the universe more well-suited to the task of driving an automobile than a human being, but now we want to try to retrofit every car with some software that replaces the human driver and will never be as good as a human driver and for what? Is driving really such a laborious and horrible ordeal for humans to endure, having to sit in a comfortable air-conditioned chair and listen to music for a while? Is it really worth wiping out an entire category of jobs that humans depend on to survive, just to replace them with software that is not nearly as well suited to the task and will likely kill people with no accountability?
1 post omitted.

Trains would be better for mass / long distance transit, trollies would be better for residential / industrial, conveyor belts and escalators in dry spots, and horses (the OG self-driving vehicle) would be better the country / offroad.

There's no real point to self-driving cars when you have the above.

>>31100
>Is it really worth wiping out an entire category of jobs
jesus try not sounding like an insufferable middle classer so much next time

>>31105
What about disabled people? I mean some day we will cure al disabilities but until then.

>>31105
Trains are kind of a lost cause in America. We left the development of US rail infrastructure entirely in the hands of private monopolies who designed the railways for maximum profit, i.e. freight and not passengers, and now we're stuck with shitty railway infrastructure that is useless to almost everyone and costs more money to maintain than it's even worth. The government tried to make the obstinate railroad monopoly modernize America's railroads but gave up and focused on highways instead, thus the subsidized interstate highway system and the car-centric urban planning of American cities. It's too late to go back now, we're kind of stuck with what we've got.

>>31111
What about them? Be specific.



 

Hi friends,

I joined this community because leftism seems to be categorically anti-harm. In other words, it was the most wholesome board I could find.

Are you aware of any image board sites that do not host pornography, nazi-stuff, and other pernicious, obnoxious, sinister things? Examples include philosophy, book reviews, hobbies, and so on. I am most interested in philosophy.

May you be well and happy, fellow internet user.
14 posts omitted.

>>30948
>categorically anti-harm
lol philosophytards

>categorically anti-harm
"There's never any excuse to be mean" wot if theyre bourgeois tho?

>>31046
Wonder if you could have this but for the ingroup only. Sounds kinda terrible, but there could be coordination among just the people who accept the terms.

"leftism seems to be categorically anti-harm"
Theoritically only the lower left quadrant (referring to the political spectrum), though I believe that it's all bullshit

https://leftypol.org/sfw/index.html
Will show 30 most recently bumped SFW threads



File: 1751762900436.png (3.11 KB, 225x225, images.png)

 

>WireGuard
Written in C, so no.
>OpenVPN
Insecure (and written in C).
>Tailscore
Proprietary trash. Again, written in a lower level language.

When the fuck will somebody use Python to script a VPN protocol out of for a full tunnel client w/ access to iptables w/ default setting at "strict"? Plus run it on custom STUN servers, uses 10.8.0.53 instead of 8.8.8.8 (Google)/1.1.1.1 Cloudflare)/9.9.9.9 (Quad9) and blocks any connections to them for a fine-grained DNS control, and fully self-hosted w/ local only control. Everything else is too insecure. Oh, and also
>Tailscale leverages Google's OAuth2 for user authentication, allowing users to log in to Tailscale using their Google accounts
Lmao. The absolute state.
10 posts omitted.

>Written in C, so no.

This is what happens when people learn programming from internet memes instead of reading a book.

>written in a lower level language.
You want a VPN implemented through minecraft redstone? Lua?
I assumed your qualm with C was it wasn't rust / some other memory safe thing, now I have no idea your intent.

Anyone in this thread who thinks C to be inherently insecure should look at the security record of qmail, which is unmatched in the recent history of software engineering.

>>30455
Nobody tell him what the Python interpreter is written in.

Both Wireguard and OpenVPN are just protocols. What you're looking for is alternative implementations, OP.
There are user-space implementations of both protocols in languages like Rust, Go, or some other niche meme language you may worship. If you're persistent enough, there are probably some microkernel-based operating systems which can let you use these alternative implementations as low-level components of the OS - on par with original, C-based implementations.
I have to warn you though, that most original implementations of VPN protocols use C language for very good reasons:

1. Building a high-performance VPN daemon in user-space is an absolute pain in the ass on contemporary operating systems
2. Integrating higher-level languages into kernel code is pure fucking pain. The only operating system that does this correctly is NetBSD (as far as I'm aware) with their Lua modules.
3. If you're building a kernel module that's pretty much just a wrapper over a cryptographic protocol - memory safety isn't even your first concern. One of many reasons why you shouldn't roll out your own crypto, is that implementing cryptographic protocols in a way that's not susceptible to timing side channel attacks is absurdly difficult. In case of higher-level languages whose compilers/interpreters may introduce automatically generated optimizations for the resulting code - you can't really predict whether your program is going to contain timing side channels or not. Some langauges provide special constructs to explicitly allow secure cryptographic code to be written, but in most cases - it's safe to say we have far more experience with writing correct crypto code in C than in, let's say, Python.



File: 1752600034757.png (516.82 KB, 720x934, GooglepheneOS.png)

 

GrapheneOS cannot be fully trusted because it runs on Google's proprietary hardware stack, which remains a critical vulnerability. While GrapheneOS markets itself as a privacy-focused alternative, its security is undermined by the fact that it operates on devices like Google's Pixel smartphones—hardware designed and controlled entirely by Google. Unlike other OEMs, Google does not merely integrate off-the-shelf components; it designs its own processors (e.g., Tensor chips) and develops the closed-source firmware and software that power them. Other manufacturers receive binary blobs from chipmakers, which they cannot modify, but Google retains unilateral authority to embed hidden functionalities or surveillance mechanisms directly into the hardware-software ecosystem.

This means Google could inject malicious code into the processor’s firmware—code that operates independently of Android (and thus independently of GrapheneOS itself). Such malware would run at the hardware level, bypassing the operating system entirely and evading detection. If Google exploits this capability in its proprietary GApps, the same logic applies to the foundational software controlling its processors. Since GrapheneOS cannot audit or modify these closed-source components, users are left exposed to potential backdoors.

If you trust GrapheneOS on Pixel devices, you must also trust Google’s closed-source hardware stack—the very same infrastructure that could enable pervasive surveillance. In that case, there is no meaningful distinction between GrapheneOS and stock Android; both rely on Google’s opaque technology. Conversely, if you reject GApps and Google’s data harvesting, you cannot reconcile that distrust with reliance on Google’s hardware. To truly deGoogle, you must abandon devices where the manufacturer controls the silicon itself.
66 posts and 15 image replies omitted.

>>30907
Why not a pinephone
>uber
Don't they have a browser webapp?

>>30905
>massive anti-GOS shilling

Where? Go to Reddit, Youtube or any mainstream plattform, the, are all pro Gos. Mainstream media is promoting and advertising Gos on a massive scale: "These phones are so secure, police can't break them!"

I have to own a smartphone for my job and the software my company uses is only on IOS, therefore I must own an iPhone to continue being employed. I have already lost my right to choose which devices or software I will or won't use in my work life, does it really make any difference if I take some principled stand against proprietary software during my free hours? Is everybody in the world supposed to quit their jobs if their jobs force them to use proprietary software?

kinda seems like a privacy oriented OS on your voluntary government sponsored wiretipe is not a thing

There are issues with GrapheneOS worth discussion, but most of what someone seems to be posting in this thread is very badly misinformed.

Pixels, like the Nexus before them, were the "developer focused" phone that got AOSP and similar development for it primarily, instead of contesting with whatever bullshit Samsung wanted to drop atop it, or how Samsung or Verizon decided to stop updating your OS or firmware in a year or two etc.
>Pixel hardware
Pixel hardware is exactly as proprietary as the rest of mobile hardware. Do you think that a Qualcomm Snapdragon chip is magically FOSS top to bottom? Hell, most Tensor chips were basically Samsung Exynos which again were certain proprietary bits. Like all other phone SoC, there are licensed bits and proprietary hardware elements, as well as closed baseband firmware and the use of binary blobs etc. This is common with just about any device. Do I wish it was different? Absolutely and we should leverage Google, Qualcomm and others into shipping more open hardware if possible, but there's nothing magically more locked down or suspicious with the Pixel line vs other manufacturers.
>but uh what if its compromised, i don't have any evidence it is but if it was it could be reading everything and saving everything etc
There's literally more evidence that Chinese made smartphones from their major companies have vacuumed up tons of data vs those from other brands, yet you're worried about a hypothetical like this? There's more evidence for and wider hypothetical potential for a lot of the chinese devices using chinese chips made in chinese factories etc.

These are issues with GrapheneOS and Pixel that are worth critiquing fairly, but nothing like what is being discussed here.



 

Thread for questions that don't deserve their own thread.
I wanna buy some headphones to go outside i don't want to spend more than 100€ on them. I want them to be mostly durable and secondly to have good sound quality, also i don't want to look like a jackass while wearing them, any suggestions?
509 posts and 66 image replies omitted.

Does anyone have recommendations for learning threat modelling that's not corporate nonsense and not limited to cloud microservices and other web applications?

>>30698
Start with
https://www.schneier.com/
You'll have to dig through the archives a bit since he's gotten distracted by the new shiny toy, but it is all there

>>29869
I would choose Creative Commons Attribution-NonCommercial-ShareAlike.
https://creativecommons.org/licenses/by-nc-sa/4.0/

Need a new phone, I hate all the os that come preinstalled and just want lineage. Is the oneplus 9 pro still a good option for a few years or do i go with oneplus 11? 11 seems more expensive for less gain.

I'm looking for an old imageboard script that has two colors to the left of every reply, one for the post and one for reference. Is anyone aware of what this is? Just remember an esoteric screenshot from ages ago.



File: 1728030622672.jpg (105 KB, 820x1024, 53y3soh1e3981.jpg)

 

(Copypasted from a previous 4chin /g/ thread as a foundation to making these generals on leftypol)
Users of all levels are welcome to ask questions about GNU/Linux and share their experiences.

* Please be civil, notice the "Friendly" in every Friendly GNU/Linux Thread *

Before asking for help, please check our list of resources.

If you would like to try out GNU/Linux you can do one of the following:
0) Install a GNU/Linux distribution of your choice in a Virtual Machine.
1) Use a live image and to boot directly into the GNU/Linux distribution without installing anything.
2) Dual boot the GNU/Linux distribution of your choice along with Windows or macOS.
3) Go balls deep and replace everything with GNU/Linux.

Resources: Please spend at least a minute to check a web search engine with your question.
*Many free software projects have active mailing lists.
Post too long. Click here to view the full text.
188 posts and 17 image replies omitted.

>>30708
BSD Init has startup and shutdown scripts, which are kind of like the scripts runit uses to emulate sysv runlevels. Otherwise runit uses an entirely different service supervision model than BSD, which only has sysv-style init.d (rc.d in their case) and inittab.

AUR Chaos malware: an analysis
>https://www.mh4ckt3mh4ckt1c4s.xyz/blog/aur-chaos-malware-analysis/

* There were malicious packages in Arch User Repo that installed remote access tool (RAT).
* The known malware packages are: librewolf-fix-bin, firefox-patch-bin, zen-browser-patched-bin, minecraft-cracked, ttf-ms-fonts-all, vesktop-bin-patched, ttf-all-ms-fonts.
* There might be even more malware on the AUR!
* Be sure to always review all package PKGBUILD files, even when you are updating AUR packages that were previously to be known to be good.
* I suggest using rua or yay AUR helper because they can show diff views of AUR packages.


>>26557
I would just run FreeBSD if you want to use it. You could also use Slackware but I think FreeBSD or some more mainstream GNU/Linux distro is better, since package management is painful on Slackware.

>>30936
>Be sure to always review all package PKGBUILD files, even when you are updating AUR packages that were previously to be known to be good.
If they can pull malware directly from the PKGBUILD, they might as well go all the way and pull a legit-looking source from a compromised mirror. At this point you're better off getting the upstream source and handpicking any patches you need yourself.

Given that the distro refers to many AUR packages in its wiki and those especially would be maintained by relatively trusted community members, they should have made a PKGBUILD repository with barebones vetting already. Arch retardation syndrome strikes again!

>>30936
>>30937
Having read the article, the perpetrator seems to have been discovered very much because they were an amateur. As i already mentioned, a smart attacker could have inserted the suspect code directly into the program source, which could either fork unprivileged malware, like a miner, or try to gain root privileges through an install wizard invoking sudo or any privilege escalation 0day.

>>26557
It depends on what specific features of FreeBSD you are looking for in a Linux distro.

If you want a BSD init system, the only distro I know of that uses BSD init is CRUX; Arch used to use it, being originally based on CRUX, but has long since moved to systemd. The other init systems on Linux like SysV, openrc, and runit are all totally different systems from BSD init.

If you want ZFS, you can set up OpenZFS after the fact on any Linux distro, but if you want ZFS-on-root right out of the box then FreeBSD and Ubuntu are the only OSes I know of that provide that in their installers.

If you want jails, there's not really any equivalent to that on Linux, there's containerization and things like Docker but they work in a fundamentally different way than jails.

If you want a lightweight minimal OS that adheres to KISS principles and doesn't use systemd, there is Alpine Linux, Void, Gentoo, etc.



File: 1755099358255.gif (692.79 KB, 768x256, rain.gif)

 

Is there any reason to stick with jpg/png formats over things like webp/avif. Atleast for webp software support that once was not there now is. I'm not just talking about web, but in general bulk storage also.

AVIF is a mess from a technical standpoint. designed by committee. it doesn't just store a straight up image, no no no. it splits the image up into chunks, each of which can be stored using any codec supported by the format. this is a huge hassle for the internal data model for many project, for example ffmpeg
WebP is OK, but getting support for it everywhere seems to be slow going. I'm not convinced it's sufficiently better than cjpeg to justify widespread use. JPEG itself has many features that improve its compression that no one uses for some reason. like pyramidal coding

>>30836
to elaborate on this:
https://calendar.perfplanet.com/2014/mozjpeg-3-0/
>Mozilla has done a study of image formats and concluded that WebP and JPEG XR are not a big-enough improvement over well-optimized JPEG. In the study only HEVC (H.265) was significantly better, but it’s a patent-encumbered format, so it can’t be used freely (shhhh!)

>>30806
>>30836
webp seems ok to me. I guess avif is technically more fancier, but it has no support. both can do lossy and lossless so that's not an issue

It just werks™



 

Saw Mental Outlaw's videos on the tor network. Thought I'd give it a try. Evidently, it is filled to the brim with exit scams and glowie pedobait. And I found it funny how Tordex/Torch admins try to justify not censoring such garbage.

>The search results on Torch are not censored because we believe trying to censor the dark web is counter productive and a waste of resources. Our philosophy is people have the right to do anything they want and live with the consequences, Torch should not decide what people do with their lives even if it’s morally wrong. We’re a search engine not your conscience.


>If you would like to advertise your hidden service please check our our advertising rates.


Yeah right, it's because of TRVE freedumbs n sheeit, it totally doesn't have anything to do with advertising scam websites to horny pedos and making money off of it.

Funny tangent aside, if there are any useful resources related to cybersec/privacy/tech on tor, please let me know. I'd like to get something useful out of it.
21 posts and 2 image replies omitted.

>>24007
Tor is useful, it does its job pretty well. But the only need i had from it was to buy acid from Dr. Seuss and MDMA from Archetyp (before it closed). Only the acid was useful, that's how i became a Marxist-Leninist.

The fact of the matter is, tor is a very slow and shitty network and the only thing people use it for is child porn and buying/selling drugs and fbi sting operations and timecube-esque crankery.

>>30875
Nah, it could be useful. It used to be a lot slower than nowadays btw. Its use would benefit an insurrection in a vast manner. Used with PGP it's an even better perspective.

>>30884
>Its use would benefit an insurrection in a vast manner.

You can look at existing authoritarian regimes as sort of a testbed for what works and what doesn't work when it comes to bypassing censorship and hiding your identity from the authorities. From what I've gathered, people usually use VPNs to bypass censorship in countries like China and tor is not really a viable option because all the public tor nodes get identified and blocked by the Great Firewall, thus you can't even connect to the network at all unless you know the ip address of a private node; it's easier to just hunt around for some obscure VPN service that the Great Firewall hasn't detected and blocked yet than to look for an entry-point into the tor network which is much slower than a VPN and harder to obfuscate what it is due to all the multi-hop routing making it obvious that someone is using tor, on top of that tor nodes are often banned from many internet services due to being abused for spambots and ddos attacks etc.

Relevant keywords:
>Operational Security
>Information Security
>Communications Security
>Signals Intelligence
>Social Engineering

Software:
>Tor
>I2P
>Tails
>Linux-based operating systems

There is no magic bullet:
>https://support.torproject.org/faq/
Post too long. Click here to view the full text.



Delete Post [ ]
[ home / rules / faq / search ] [ overboard / sfw / alt ] [ leftypol / edu / labor / siberia / lgbt / latam / hobby / tech / games / anime / music / draw / AKM ] [ meta ] [ wiki / shop / tv / tiktok / twitter / patreon ] [ GET / ref / marx / booru ]
[ 1 /2 /3 /4 /5 /6 /7 /8 /9 /10 /11 /12 /13 /14 /15 /16 /17 /18 /19 /20 /21 /22 /23 /24 /25 /26 /27 /28 /29 /30 /31 /32 /33 /34 /35 /36 ]
| Catalog | Home