[ home / rules / faq ] [ overboard / sfw / alt ] [ leftypol / edu / siberia / latam / hobby / tech / games / anime / music / draw / AKM ] [ meta ] [ wiki / tv / twitter / tiktok ] [ GET / ref / marx / booru ]

/tech/ - Technology

"Technology reveals the active relation of man to nature" - Karl Marx
Name
Options
Subject
Comment
Flag
File
Embed
Password(For file deletion.)
What is 6 - 4?

| Catalog | Home
|

File: 1728030622672.jpg (105 KB, 820x1024, 53y3soh1e3981.jpg)

 

(Copypasted from a previous 4chin /g/ thread as a foundation to making these generals on leftypol)
Users of all levels are welcome to ask questions about GNU/Linux and share their experiences.

* Please be civil, notice the "Friendly" in every Friendly GNU/Linux Thread *

Before asking for help, please check our list of resources.

If you would like to try out GNU/Linux you can do one of the following:
0) Install a GNU/Linux distribution of your choice in a Virtual Machine.
1) Use a live image and to boot directly into the GNU/Linux distribution without installing anything.
2) Dual boot the GNU/Linux distribution of your choice along with Windows or macOS.
3) Go balls deep and replace everything with GNU/Linux.

Resources: Please spend at least a minute to check a web search engine with your question.
*Many free software projects have active mailing lists.
Post too long. Click here to view the full text.
107 posts and 6 image replies omitted.

Flood detected; Post discarded.
question for the veteran users: does su mean "super user" or "switch user"?

>>28201
i think its "substitute user"

>>28201
suck user

>>28202
<they almost made a recursive acronym

>>27554
>>27942
one of them is not like the others…



File: 1737164069286.png (1.85 MB, 1316x823, 1664218232948537.png)

 

Have we moved past the post-digital era of the internet? According to Cramer in 2013, "‘Post-digital’ thus refers to a state in which the disruption brought upon by digital information technology has already occurred. […] this technology is no longer perceived as disruptive." At the time of writing, in 2013, this seemed to be a realistic appraisal of the situation, as digital forms of communication (social media, internet news, Wikipedia, etc.) were viewed as a part of life. The post-digital was a rejection of the techno-optimism of Kurzweil and SV, opposing the techno-hegelian view that the digital era was a simple moment on the path to the idealized singularity. Post-digitalism was coined at a time when the internet had started to lose its own foggy idealism, and was understood as having been captured in large part by corporate and state interests. DIY communities and counter-cultural trends existed, but the term 'digital' was not a disruptive element at the macro scale of society.
It seems pertinent in 2025 to reassess the term, and the era that we find ourselves in. Has internet culture become uniquely disruptive again? Media institutions have largely acclimated themselves to digital existence after the sink-or-swim period of the 2010s. Social media is seamlessly integrated into the social fabric. Baby boomer policymakes int he EU and US ahve spent thousands of hours debating cryptocurrencies, cryptography, social media, etc.
I'd like to suggest that we find ourselves instead in an era *after* the post-digital era of the 2010s, which is far more in line with the original technic/cybernetic ideals of the 1950s and 1960s. The 2010s were rapid and choatic, as was expected, but after some shuffling around, the digital and analogue components of society can no longer be differentiated, except for on the superfluous technological and material levels. In fact, it could be argued that the entirety of the human experience has been captured by digital systems. I'm hesitant to claim this is a truly cybernetic society, but it does seems that in the imperial core, systems of control and capture have become fully digital, abstract, and everpresent. The I/O systems for the information feedback loop of a cybernetic apparatus have all been established. Should we rehabilitate the field of cybernetics to understand macro systems? Obviously there is a socialist root in classical cybernetics (Cybersyn, etc.), but it might be worthwhile to reappraise Big CompPost too long. Click here to view the full text.
4 posts omitted.

>academic wank thread with tired meme imagery
oh joy

the problem of, say, the ussr was not that they didnt have better computers, you know

>>28193
Cybersyn worked :^)

>>28194
Communism isn't a matter of computer power and Allende was just some random socdem, both loved by some and vilified by others because of aesthetics.

>>28195
>Communism isn't a matter of computer power
No, but modern governance is, and communism is (among other things, of course) concerned with governance.

>>28187
wonderful wordcelling
here's a grant of $30000 for some more research into the sociological effects of post-cyber-proto-AI influence on pxple's bxdies and how it is leading us to mind-machine duality.



File: 1664018325499.png (188.45 KB, 300x300, ClipboardImage.png)

 

Linux, Windows or Mac

You like and use, Post 'em

I'll start

7zip the best file archiver
https://www.7-zip.org/

Honeyview, Imageviewer handles all images and gifs and zip images too
https://www.bandisoft.com/honeyview/

Goodbye DPI, helps bypassing region blocks, not a VPN but it's something
https://github.com/ValdikSS/GoodbyeDPI

Post too long. Click here to view the full text.
42 posts and 4 image replies omitted.

Ratpoison. It just works. I find having a prefix key (like in Tmux) helps remember keybindings for some reason. Manual tiling is also the best way to tile because everything works just like I want. Ratpoison gets bonus points for being extra lightweight and easy to configure! Are there any other similar window managers/wayland compositors? Cagebreak is missing some features that I need (I can't remember anymore what exactly, since I haven't used it much). I also like emacs a lot! Also, some terminal programs that are useful for scripts include ripgrep, fd, gnu parallel, aria2c

>>28092
pcmanfm-qt rocks!

I also considered using Midnight Commander with libtrash alias (from Arch Linux wiki). It's a free software clone of Norton Commander.

>>18178
Have you tried Pinta?

>>17012
>zzzFM
What does it have over SpaceFM I know SpaceFM hasn't been updated for half a decade now but it just works for the most part. That has a gtk2 build in the aur but it doesn't have non udev mount tools as additional dependencies like SpaceFM. Pmount only works sometimes on SpaceFM. There's another fork which is actually maintained called SpaceFM thermitegod but it fucked up the keybindings adding more key chords also mouse support was also fucked on the AUR build but I don't know if it's intentional cause it works on some parts and those key chords seem to point that is has a more "keyboard driven" interface. zzzFM also hasn't been updated for a few years it seems.

>>16993
like an RDP client?

>>16993
termux
vnc stuff
rdp
kdeconnect
adb

How is honeyview compared to nomacs?



File: 1732570810659.jpeg (73.16 KB, 680x610, GdPOYhZXcAAfMZK.jpeg)

 

BRVTAL TRVTH NVKE SO TRVTHFVL AND NVCLEAR THAT IT INSTANTLY EXTERMINATED EVERY TECHCEL IN A 500 KILOMETER RADIUS
29 posts and 7 image replies omitted.

>>28099
+ github actions can do it automatically for you

PLEASE CAN YOU PUT THE PKGBUILD IN THE AUR

File: 1736479854577.jpg (48.84 KB, 900x720, fatpenguin.jpg)

>released only as a nix flake

Best I can do is .deb

./configure && make && make install



File: 1733800852273.jpg (70.54 KB, 602x421, 1914022147.jpg)

 

Recently my asshole father installed a bunch of cameras all over the house, after a sleepless night where he threatened to kick me out and accused me of stealing his iphone and razor. So it was either cameras or a homeless shelter. With how little privacy I have now (I used to cook food and talk to myself for hours in the kitchen, dont feel comfortable doing that anymore with big brother watching), this got me thinking about all of those unprotected security cameras that anyone can easily figure out the passwords to, and play creepy sounds/noise music to mess with people. I'm seriously considering doing this to scare the fuarrrk out of him nonstop so he'll return them.

Does anyone still dabble in this sport? I'm assuming the same methods of finding ip cameras still apply.
1 post omitted.

Uh you should probably get help from the authorities instead of trying to make the situation worst

Alot of parents want to put GPS trackers on their kids but then want to ban them from having social media accounts due to "privacy" concerns

File: 1736823925961.jpg (58.73 KB, 448x604, 1394334910185.jpg)

>>27523
Did he find his phone and shaving equipment? I can't imagine my parents installing cameras in the home. I wouldn't do that either. That's FUCKED UP.

What comic is that again.

Also get out




 

Who the fuck was it that says Lunduke was a good guy? He's a rightoid now which I already knew due to his petit bourgeois class status and that debate with Stallman on free software.

Now all his videos are about h1b and discrimination against whites and pronouns and shit.

Feels good to be vindicated as opposed to the people on /tech/ who said hes a good guy or whatevr.
14 posts and 2 image replies omitted.

>>28135
Well both of those are ramifications. They exist because it's been normalized, and thus the problem sustains itself.

>>28137
software devs aren't PB. But Lunduke, specifically is. He owned his own software company for a while

>>28144
>He owned his own software company for a while
Did this company produce proprietary software?

>>28148
it did. until he got bullied into making it open source and then it went out of business and he was forced to get a real job and he blamed the open source community for it which is why he raged at stallman

>>28167
Lunduke discovering the reality of small business under capitalism for the first time.



File: 1711397721208.png (Spoiler Image,114.22 KB, 864x486, ClipboardImage.png)

 

this is something we've always known was going to happen at some point. Now of course the Internet and big sites will still exist(YouTube, Facebook, and Twitter) but it will become like television was, a lot more sanitized. There won't really be any real speakers on those sites, just spectators, most rebel sites will be removed other than the enforced squeaky clean ones and I've made peace with that.
104 posts and 7 image replies omitted.

>>26585
>Read the books I hav
>Play games from the 00's and early 2010's.
>Lift heavy weights.
>Smoke and drink profusely.
>Radicalize people against capitalism

>>23849
no dude you dont get it were doing a heccin communism by posting garbage on the internet dude were like rebels or something!!!!!!!!!!!


Listen to this man, hes got the right idea >>26672

File: 1732391125416-0.png (142.92 KB, 955x870, 1732059467677332.png)

File: 1732391125416-1.png (496.5 KB, 811x556, 1732058271207523.png)

This is just the beginning of the internet

>>23870
Cringe



File: 1734549509277.png (37.74 KB, 532x224, ClipboardImage.png)

 

so how did google just make a tld?
did they buy it or smth? does it relate to the dns somehow? im genuinely curious how the process for something like that would go and i thought i'd hit up you guys to see if there was any collective answer

>>27865
It's part of the gTLD new shit
They had to apply to ICANN iirc, and pay $185,000 registration fee and then they pay renewal fee every year.
Next round of applications is next year.

I think it's just the same process as others nTLDs like ".xyz", ".fun", etc
They just chose to not resell domains under their .google and don't make any profit from it.



File: 1726886895975.jpg (209.62 KB, 1400x933, burnt-onion-bacon-jam-11.jpg)

 

Recent reports indicate that German law enforcement has successfully deanonymized users of the Tor network.

Sources:

https://www.malwarebytes.com/blog/news/2024/09/tor-anonymity-compromised-by-law-enforcement-is-it-still-safe-to-use

https://www.ndr.de/fernsehen/sendungen/panorama/aktuell/Investigations-in-the-so-called-darknet-Law-enforcement-agencies-undermine-Tor-anonymisation,toreng100.html

According to the Tor Project, they maintain that Tor remains a secure option for users. They attribute the deanonymization incident to vulnerabilities in an outdated chat application called Ricochet, rather than flaws within the Tor network itself. However, I’m not very tech-savvy and wonder what the real implications of this situation are. Do the updates to the Tor protocols mentioned actually address the problem?

Sources:

https://blog.torproject.org/tor-is-still-safe/

https://blog.torproject.org/announcing-vanguards-add-onion-services/
Post too long. Click here to view the full text.
12 posts omitted.

>>26452
The whole thing with TOR nodes has always amused me. People are putting their faith in a network of crypto entrepreneurs to dilute the network of feds running many nodes? Don't you think the US + allies could capture those nodes considering their resources?

>From: Anonymous <[email protected]>
>Subject: Statement from Ricochet-Refresh Regarding The Recent Stories in German Media About Alleged Timing Attacks Affecting Our Users
>Newsgroups: alt.privacy.anon-server, alt.2600, alt.cyberpunk
>Followup-To: alt.privacy.anon-server
>Date: Wed, 25 Sep 2024 18:50:20 -0000 (1 day, 4 hours, 34 minutes ago)
>Organization: To protect and to server
>
>Statement from Ricochet-Refresh Regarding The Recent Stories in German Media About Alleged Timing Attacks Affecting Our Users
>
>Wednesday 18 September 2024
>
>Several German media news outlets have run a story about law enforcement agencies allegedly breaking the anonymity provided by Tor and, with it, Ricochet-Refresh.
>We would like to answer some questions on the matter to clarify the facts from the hype.
>
>1. Are you aware of cases where Ricochet users were de-anonymised? If so, how? We are not aware of any cases where users of the current version of Ricochet-Refresh have been de-anonymised. (Including this alleged case, since no evidence of such was provided to us).
Post too long. Click here to view the full text.

why the fuck are my (you)s still there while using Tor browser after clearing all site data and refreshing the Tor circuit?

>>26446
>Do the updates to the Tor protocols mentioned actually address the problem?
It seems like the vanguards thing should make it a lot harder for feds to pull off, but it doesn't "fix" it. Though with privacy this is usually the best you get, a lot is just stacking odds in your favor so much that it is effectively safe. Same with cryptograhy. That said, a real fix could be a random delay added every hop, and maybe packet padding if this is the type of timing attack they pulled off.

Steps they could have taken to mitigate vulnerability: (first of all - it's hard to tell if they got deanonymized via the server, as a server admin or smth, or as a user?) 1. not connect directly to the Tor network, connect to a proxy/VPN (that you own and run, and set up anonymously, and which you use for other activities as well; e.g. route all traffic on a multi-use device thru VPN) first. 2. control the first tier of guard nodes (as hidden service), set them up anonymously and everything, in a country not friendly to your gov. This isn't a 100% fix but the article mentions coercing the guard node owner… if it's you then just pack it up at that point and they have nothing. 3. not showing online status on the fucking app lol, it seems like that might be what really got them in the end

Downsides to these mitigations: 1. they could have the company that owns the server your proxy runs on snitch on connections and de-anonymize you (just the fact that you connected to a Tor node and when), or they could attempt to hack it and take it over even. 2. Again they could just ask the company to monitor the servers and snitch on you. Putting it in an unfriendly country might remove some of LE power, and you owning the server means they would have to escalate beyond just asking nicely and would give you a heads up potentially, but this isn't a total fix. 3. They still had to find the guy's IP first. They could have attempted escalating to other methods to correlate that he was the one posting, when and where. But it would deprive them of an easy thing to bring to the courts.

Overall, Tor isn't suited for use against an imperialist state actor. It's security thru obscurity, plus encryption. Vast majority of nodes are in 14 eyes. Nym net is a cool project trying to fix that (read the Sphynx protocol white paper it's really cool,Post too long. Click here to view the full text.

>>26513
>a network of crypto entrepreneurs
What are you talking about lmao



 

Assembly language has been completely phased out by now. Now everybody uses Python, Java and C. The only two general purpose operating systems that were released in the 21st century that were written in assembly language that have any modern support are MenuetOS (released in 2000), KolibriOS (a fork of MenuetOS) and BaremetalOS (released in 2008). Everything else is Unix-like now, with the exception of Windows. You also have TempleOS (released in 2013), but that lacks modern compatibility and isn't general purpose either. Everything else is just a fork of a preexisting legacy operating system that was (like HaikuOS, which is just some BeOS clone or 9Front, which is some fork of Plan 9 From Bell Labs). I wonder if someone autistic enough was able to make one for the mobile platform just as some bizarre experiment?
17 posts omitted.

>>28140
>assembly is an annoying and pointless level of abstraction
Never did low level award

>>28103
all operative systems released ever have some % of assembly because there are things that most compiled languages can't do. sure, you could write a compiled language capable of representing a 100% of OS code, but in practice it is easier to just use llvm or gcc and embed the assembly you can't achieve with the regular compiled language

I think zig 0.5 could do it, but the newer versions can't, because they removed the compile-time parameters to programmatically manipulate the esp and ebp registers for naked subroutines. still, even if you use a compiled language you have to know assembly to understand what you are doing. it is not like user-space software where you already have some base abstractions so you can and should focus on higher level concepts, when you write an OS you are implementing the "abstraction" so you have to be familiar with the "concrete"

>>28141
Strictly speaking, anon is correct that assembly language is still an abstraction, on modern cpus the instructions are implemented in microcode and for both modern and old CPUs an instruction requires decoding and could involve more than one cycle to achieve, because the barebones of computing is still connecting/enabling/disabling pieces of circuitry to achieve different states per cycle that work out to what we'd consider an add or a mov instruction.

>>28150
Strictly speaking anon did not call it an abstraction, but a level of abstraction. But even before you start trying to peek into the internals of a CPU, assembly is different from machine code in some ways, for example it has labels, an abstraction over offsets.

>>28151
Abstractions are only really noticeable when they conflict with some state of the layer below and the logic of the abstraction in question is broken. Most assemblers don't use particularly leaky abstractions, so these cases are few but they do happen.

Consider RISC V, a particularly braindead ISC. Immediate instructions encode on parameter in the instruction itself, that has a size of 16 bits. Now what happens if you specify an integer larger than 2^16-1 for such an opcode and feed it to an assembler. Does it throw an error, warn you about it, inform the programmer in literally any way? No it just happily takes the modulo and makes you wonder why your ANDI instruction produced a zero. The shift instructions also only take unsigned arguments, contrary to every sane ISC, and silently coerces the second source register to unsigned.



Delete Post [ ]
[ home / rules / faq ] [ overboard / sfw / alt ] [ leftypol / edu / siberia / latam / hobby / tech / games / anime / music / draw / AKM ] [ meta ] [ wiki / tv / twitter / tiktok ] [ GET / ref / marx / booru ]
[ 1 /2 /3 /4 /5 /6 /7 /8 /9 /10 /11 /12 /13 /14 /15 /16 /17 /18 /19 /20 /21 /22 /23 /24 /25 /26 /27 /28 /29 /30 /31 /32 /33 /34 /35 /36 ]
| Catalog | Home