[ home / rules / faq ] [ overboard / sfw / alt ] [ leftypol / edu / labor / siberia / latam / hobby / tech / games / anime / music / draw / AKM ] [ meta ] [ wiki / tv / tiktok / twitter / patreon ] [ GET / ref / marx / booru ]

/tech/ - Technology

"Technology reveals the active relation of man to nature" - Karl Marx
Name
Options
Subject
Comment
Flag
File
Embed
Password(For file deletion.)
What is 6 - 3?

Not reporting is bourgeois

| Catalog | Home
|

 

what can someone do with a Rootless Nethunter install? even when trying to snoop on bluetooth devices it just gives "permission denied", and the bluetooth-arsenal isn't available on rootless nethunter either, it seems like only the Nethunter custom ROM is useful
13 posts and 5 image replies omitted.

>>24982
>this does sound incredibly painful
it burns
>y not jus capture the hashes on ur mobile and crack them at home?
idk what hashes are but I'll crack my own wifi just for experiment
>or download a vm (i personally use an recommend qemu w/ kvm) and run kali from there
I used it to install LFS version 12.0, imma do it with kali
>https://overthewire.org/wargames/bandit
thanks I'll use it with kali GNU/ₗᵢₙᵤₓ
>>24983
I think parrot os would be better if I were a pro I feel like

>>24991
>idk what hashes are
Nta, but essentially hashes are a fundamental security measure. Before hashes, passwords were just kept on servers and what not in plain text. This has two main concerns: A. if a malicious actor gains accsess to the site, the passwords are right there for exploitation and B: maybe I don't trust the person I'm sending my password to. Hence, encryption was introduced. At a very simple level, hashing just involves taking a given password (doesnt have to be a password but using this as an example) and processes it through a mathematical algorithm that rearranges and/or changes the password in such a way the output looks nothing alike to the original. Modern-day hashes do this mathematical algorithm hundreds of times over, for extra security.
<Back to how this matters to you
When you scan a wifi network, such as using airdump, occasionally the wifi router will broadcast the wifi password as a hash. Otherwise, your phone wouldn't be able to connect. You can use airdump to find the hash, save it to a file, then simply upload the file to your computer, and using a software such as Hashcat, you can then crack it.

bruh the kali-gnuI refuse to say linux vm literally almost has the same appearance as nethunter, but more tools work
>>24997
>Nta, but essentially hashes are a fundamental security measure. Before hashes, passwords were just kept on servers and what not in plain text. This has two main concerns: A. if a malicious actor gains accsess to the site, the passwords are right there for exploitation and B: maybe I don't trust the person I'm sending my password to. Hence, encryption was introduced. At a very simple level, hashing just involves taking a given password (doesnt have to be a password but using this as an example) and processes it through a mathematical algorithm that rearranges and/or changes the password in such a way the output looks nothing alike to the original. Modern-day hashes do this mathematical algorithm hundreds of times over, for extra security.
interesting, very cool I didnt know
>such as using airdump
hmm I'm gonna have to buy new hardware such as a wifi-adapter/bluetooth-adapter and etc to make this work

>>25001
>hmm I'm gonna have to buy new hardware such as a wifi-adapter/bluetooth-adapter and etc to make this work
ion hve nethunter bu i would imagine it has airdump on it, no? jus use ur phone, and if it doesnt im sure theres sum android app that'll do it for u. sure wifi-adapter's p pretty cheap, i got one for like 12 bucks off amazon, bu dont waste money when u alrdy got the tools.

>>25004
>it has airdump on it, no?
<picrel is nethunter rootless
yep it has(in aircrack-ng + airodump-ngbut they need to access the wifi/bluetooth hardware of android but it's denied in rootless afaik, thus probably requiring adapters) + all the tools kali has in the vm but most don't work because of lack of root access(sudo only works inside the chroot in nethunter, but it needs root access outside too which android doesn't have)
> android app
there's hundreds in the nethunter store but like 90% require root access (~_~;)



File: 1688233535847.png (96.01 KB, 1005x627, 1688231220702130.png)

 

Terminally online bros… it's over
61 posts and 17 image replies omitted.

File: 1707924440862.jpeg (362.31 KB, 1284x1948, c7cc97548ef57b93.jpeg)

I really expected it'd be lower. That 29% is holding on for dear life.

twitter's CDN blacks out for a few minutes at least once a day at this point
good job firing all of those tech people, dipshit

Fucking LMAO what a piece of shit website

>>21083
>How does this even happen? It's not like the retard is implementing this by himself.
Anybody who raises concerns is fired immediately. Allegedly at his other companies they have like a whole department for tard wrangling Elmo because he's like this, so the people who actually do the work can do the work and the PR people can kiss his ass just right so he doesn't sabotage things too much.

Is this the service that Mr. Emerald Mine wants me to put all of my financial transactions on?



File: 1711440009416.png (12.92 KB, 482x102, 999.png)

 

Has anyone heard about this new dating app called Duolicious? It's supposedly designed to help you meet like-minded individuals based on your personality. Sounds like a neat concept, but I can't help feeling a bit skeptical about it.

First off, how accurate can these personality assessments really be? I mean, are we reducing the complexity of human relationships to a mere algorithm? And what about privacy concerns? With all the data breaches happening these days, I'm wary of handing over intimate details of my personality to some tech company.

Plus, there's the whole capitalist angle. Is this just another way to monetize loneliness and exploit our desire for connection? It feels like these apps are more about making profits than genuinely helping people find meaningful relationships.

I'm curious to hear your thoughts on this. Do you think Duolicious is a step forward in online dating, or just another tech gimmick preying on our emotions?
34 posts and 2 image replies omitted.

I would just abuse such a service by making a blog about trains or whatever and never date anyone from there.

>>24855
Checking profiles:
>Terrorwave Professional enabler
>play monhun w me or i'll kms
>I like sticking my dick in crazy
>Don’t talk to me if you believe 9/11 happened.
>education: Gamergate university
Not worse than twitter tbh.

So is this an app for channers or what?

>>24995
kill yourself.

File: 1716307694289.jpg (16.79 KB, 301x326, bullying.jpg)


>>24998
sorry theres a very dedicated autist who gets mad when people say "channer"



File: 1712529672735.png (64.22 KB, 480x602, wp_ss_20240408_0001.png)

 

This is why I don't trust nerds. Computer systems have become too complex and nobody actually knows, whats happening under the hood. When nerds say: "Bro, it's totally secure! Trust me!" Don't trust them! Don't trust computers! I have no clue how I will organize my life in the future, but I tell you this much, I will try to rely as less as possible on computers.
27 posts and 4 image replies omitted.

>>24457
I think you might want to use a computer with a core2duo CPU or older(doesn't contain Intel ME), or with a AMD FX cpu or older(doesn't contain AMD PSP), or any RISC-V cpu but emulating the x86 architecture to run x86 programs in it will be absolute torture and unreliable
>>24456
except mine lol
>>24944
not even gentoo officially supports it so I doubt that it'll actually happen too

>>24963
>Having met the initial design goals of working as a multiprocessing, distributed system capable of functioning on heterogeneous hardware, the Mach project moved on to the next step: weaning BSD out of the kernel space entirely. Mach 3.0 was intended to be a true microkernel system that could support an external operating system (like BSD) living outside the kernel space. Theoretically, Mach would be even able to host multiple external operating systems at the same time.
>Attempts to accomplish this failed spectacularly. The performance issues involved with pulling operating system functions out of the kernel developed into an intractable problem. Designing and optimizing a microkernel in general was found to be outrageously complex. Further, the basic concept of a microkernel was found to be poorly suited to the needs of general purpose computing.
>While some microkernels work very well for what they were designed to do, it became increasingly obvious by the mid 90's that the basic premise of Mach to act as a microkernel and host potentially any operating system as a personality outside the kernel… was at a technological dead end. Consequently, the Mach microkernel, and all the projects intending to use it as a microkernel, eventually faded into oblivion.
http://www.roughlydrafted.com/0506.mk1.html
To be fair unix has many characteristics that make designing a practical microkernel particularly hard. QNX seems to have got it right, but it has been languishing as a closed-source embedded platform for decades now.

>>24965
the performance problems with microkernels have been getting less and less important over the years. cpus have many cores, are colossally faster, and they also increase in speed at a greater rate than storage, so they spend most of their time waiting for storage to respond, so that becomes the bottleneck instead of ipc. also there's been CPU architecutral improvements, such as x86-64 adding the SYSCALL instruction, which is basically hardware acceleration for task switching.

>>24966
>they spend most of their time waiting for storage to respond, so that becomes the bottleneck instead of ipc
IPC is memory-bound in a badly designed microkernel. In Mach, many messages need to be copied from one process space to another. QNX extensively uses shared memory and provides more streamlined message passing semantics in general. AmigaOS circumvents the issue entirely by not having memory protection.

>>24839
No it's not.



File: 1716165948604.png (6.78 KB, 500x250, Oekaki.png)

 

Im posting this from my ereader

>>24958
Very cool, one with ink?

>>24960
>very cool
Thanks
>one with ink
Yes
The tolino vision 6



 

>*makes websites unusable in your path*
18 posts and 1 image reply omitted.

>>23199
I mean they're not the ones DDOSing everyone so far as I know

>>23203
"this is a dangerous neighborhood" says the cloudflare henchman "there was a ddos attack not far from here the other day"

>>23205
leftypol was actually DDOSed multiple times though

>>22355
Humiliation ritual

>>22355
How do i install it on my router



File: 1715257950544.png (320.2 KB, 896x880, ClipboardImage.png)

 

Of course they're all just CIA honeypots.
7 posts omitted.

It's not a honeypot. Protonmail is not an anonymity service. Nobody will ever go to jail for you.

TBF what country could an email server be based in that WOULDNT have to do this shit legally?

If the alternative is hand over the IP address or go to prison im not surprised this shit is what happens

>>24803
Just use gorilla mail

>>24936
>Just use gorilla mail
most of their domains is blocked by companies in the kno. plus, their website throttled sending capacities for tempmail. it's good for a throwaway, bu i wouldnt advise any furthr.
>>24803
also side-note tbh- if ur usin Protonmail for shady shit (ion kno what the Spanish guy didnt i aint read the article), u gotta b usin PGP in all ur emails, no questions round it. it'll b hard 4 glowies to book u w/ jus a random series of letters and numbers tied to ur name.
>Of course they're all just CIA honeypots.
orrrrrrrrrr normal websites that jus conceed to the heel of the boot? sounds more likely.

>>24803
>opsec? nah, I just trust company X lol
most people are like that
ultimately any email provider can work as long as you assume they're an adversary and act accordingly



 

Former Israeli Malware Distributor Kape Technologies Now Owns ExpressVPN, CyberGhost, Private Internet Access, Zenmate, and a Collection of VPN “Review” Websites.

Do NOT use ExpressVPN! It is not only an Israeli company that does work for the IDF, it is also a slimy company that auto renews your subscription without your consent even if you turn off auto renew.
24 posts and 2 image replies omitted.

>>24794
.onions are also great for punching through NATs and it's anonymous. That's how onionshare works.

>>24831
mb itz the burger in me, i type weird. i mus admit i can't be much help to u here as ion use Mullvad vpn, but i'm doin my own research rn on their website, accessible here: https://mullvad.net/en/servers
<issues of physical safety
when i peruse their server list, it seems a majority of their servers r in the five eyes nations, and/or European countires. my concern lies w/ the physical security of these locations. sure, myb mullvad could decline indicments an fed requests for data from their personal logs, but can mullvad personally ensure the safety of the physical server locations? ik in the past darnket websites, such as AlphaBay and Hansa, housed they servrs in Europe and these were eazily seized by Euro-Glowies. with hoppin on Asian-none-of-the-above countries proxies listed on spys.one for instance, i can atleast kno that there's a very probability they won't be physically raided.
>issues of digital safety
i would imagine that due to the paid nature of Mullvad, it would be safer for communicatin w/ another anon ur criminal stuff. bu again, threat models r important here. if ur worried about encryption and keepin ur mssgs to other Anons safe, employ PGP an don't rly on ur client's encryption methods!! the recent icognito market scam is a good example of this.

>>24836
Thanks a lot, anon. You did a good job.

>>24625
I kneel

>>24836
exactly what i thought looking at their server list. recently adding thailand and indonesia is comical. oh well, at least it was good for torrenting before port forwarding was removed. i didn't even work through the media backlog by the time i needed to torrent again and noticed how much slower it was



 

Linux, Wikipedia, Mozilla Firefox, Signal… I've always believed, that these were the "good guys" in the tech world. I have believed, that there is a countermovement against BigTech. I remember, ten years ago, I actually donated regularly to Wikipedia, because I believed in their mission of free knowledge and shit. But in the last months, I found out that all these "alternative" and "non-profit" projects and organizations are deeply intertwined with BigTech. It's over. There was a time, when people thought, that television would bring light to the world. It didn't, it actually brought darkness to the world. And I was one of those people, who believed, the internet would bring light to the world. Now I realize, it was a mistake, just like television.
11 posts omitted.

>>24877
Wikipedia only allows information from "trustworthy sources" (mainly mainstream media). Caring about wikipedia's conflict of interest instead of those of its sources is rather pointless.

>>24906
I think, Snowden should apologize for shilling this glowware so hard. I don't even think he did it on purpose, but he clearly made a mistake.

>>24929
I think Signal works for a lot of people. I just don't trust it personally
the reason Snowden isn't dead likely has more to do with him being protected by the FSB since it's in Russia's geopolitical interests

>le epic unibomber
how did i know this was gonna be /g/ tier anti-FOSS FUD even before i read the text

>le epic unibomber
how did i know this was gonna be /g/ tier anti-FOSS FUD even before i read the text



 

So you have this technology that is effectively electronic cash, you get to send any amount of money with all the benefits of cash and without all the problems of a centralized middle man service. but still after about a decade not enough people believe in crypto as a currency. the hate from the left is especially strange.
>muh energy crisis
YouTube alone is more of an energy blackhole than all of crypto combined. you think streaming 4K@60fps video 24/7 world wide is sustainable? or even 1080p?
instead of fighting the banks, normalfags keep voting for laws that restrict crypto, because of muh think of the children!
93 posts and 5 image replies omitted.

>>23288
>electronic cash
>all the benefits of cash
Real QQ, are you retarded? Are you allowed to leave your home? Are you over the age of, idk, 15?

File: 1715864080743.png (39.36 KB, 900x329, lm.png)

https://localmonero.co/blog/announcements/winding-down
>After almost 7 years of operation, due to a combination of internal and external factors, we have made the difficult decision to close our platform.
>We're extremely thankful for the love and support we've received over the years. We couldn't have done it without you. We love you all ♥
>LocalMonero has been around for most of Monero's life. Fortunately, the Monero ecosystem has matured a lot over these years, and with the imminent launch of Haveno and other DEXs like Serai, atomic swaps, the coming addition of FCMP (full blockchain anonymity set replacing rings of 16) as well as the continuing and rapidly accelerating development of the Monero protocol, we're confident that Monero's future is bright, with or without our platform.

R.I.P. king

>>24871
saw a video on this, big ripz. placd a numbr of ordrs via this site, shit suckz. tho i imagin via the nature of the decentralized, peer-to-peer nature of the site, another will emerge. itz jus a matta of time.
in addition, to any Anons hve any recommend alternatives 2 the site? thx.

Computer-cash is dark magic, 99.9999% do not understand, how it functions. You can't control, what you don't understand. It is even in the name, "crypto" means you don't know what is going on. Only the top elite knows how it functions, the crypto-priests. Stay away from dark cyber-magic, you can't compete with the crypto-priests.

>>24873
>Computer-cash is dark magic
wait til anon discvrs crytpo currency is jus decades-old math and encryption an there's a multitude of resources online to educate themselves, haha. srzly tho anon, it's not a dark magic. sure it may be complex, bu id hapy to point u in the right direction twrds educational resources.
>Only the top elite knows how it functions, the crypto-priests. Stay away from dark cyber-magic, you can't compete with the crypto-priests.
lulz, r u familiar w/ the gentleman who burnt himself in midtown-manhattan? u may b a fan of his research.



Delete Post [ ]
[ home / rules / faq ] [ overboard / sfw / alt ] [ leftypol / edu / labor / siberia / latam / hobby / tech / games / anime / music / draw / AKM ] [ meta ] [ wiki / tv / tiktok / twitter / patreon ] [ GET / ref / marx / booru ]
[ 1 /2 /3 /4 /5 /6 /7 /8 /9 /10 /11 /12 /13 /14 /15 /16 /17 /18 /19 /20 /21 /22 /23 /24 /25 /26 /27 /28 /29 /30 /31 /32 /33 /34 /35 /36 ]
| Catalog | Home