[ home / rules / faq ] [ overboard / sfw / alt ] [ leftypol / siberia / edu / hobby / tech / games / anime / music / draw / AKM ] [ meta / roulette ] [ cytube / wiki / git ] [ GET / ref / marx / booru / zine ]

/tech/ - Technology

"Technology reveals the active relation of man to nature" - Karl Marx
Name
Options
Subject
Comment
Flag
File
Embed
Password (For file deletion.)
Required: 3 + 1 =

Join our Matrix Chat <=> IRC: #leftypol on Rizon

| Catalog | Home
|

File: 1684873783171.jpg (246.97 KB, 640x512, 128364.jpg)

 No.19683[Reply][Last 50 Posts]

Hello, I've been wanting to switch to Linux for awhile now, but I'm not sure which distro I should use. What distro would you anons recommend I use?
112 posts and 18 image replies omitted. Click reply to view.

 No.25029

>>25027
endeavour cuz space

 No.25030

>>25027
openbsd

 No.25031

>>25030
only good 4 servers imo.

 No.25032

>>25027
https://gentoo.org
>>25024
after that xz backdoor scandal anything is possible when it comes to backdoors imo

 No.25033

File: 1716525318752-0.png (1.01 MB, 1920x1080, 375pdhmxx6261.png)

File: 1716525318752-1.jpg (225.73 KB, 1600x1200, FVWM-Crystal.jpg)

>>25026
Fvwm-crystal has a lot of DE functionality working mostly out of the box, including desktop icons. Fvwm in general also has some tiling options.
>>25027
http://sabo.xyz



 No.24680[Reply]

Dead internet theory and all I know, but in recent years LLM/gpt chatbot content has been flooding the internet with low quality shit from youtube faceless automation channels to SEO product review sites flooding the first page of search engine results.

Will we reach a saturation point where the only places to find actual answers to anything will be reddit/quora or tiktok?
8 posts and 1 image reply omitted. Click reply to view.

 No.25008

>>25002
>implying it's difficult to get an AI to drop n-bombs
That's like 30 minutes of fine tuning.

 No.25019

>>24847
people are just captive to social media, they aren't addicted by any means, so likely yeah, demanding ID will probably be enough of a barrier to destroy entire userbases

 No.25021

>25019
>demanding ID will probably be enough

First they asked for your email adress. Then for your mobile phone number. And now for your ID. What makes you think, normies will quit social media?

 No.25022

>>25021
email and phone number don't tie you directly to your username to most people. i have like 15 email addresses i use for signups, in addition to an unlimited number of fake redirect addresses, and like 5 phone numbers or some shit i use for a number of things. IDs are significantly more invasive, not to mention just the general the process of verification is significantly more involved than just writing in an otp. it's just going to nuke websites that live or die by being easily accessible to lend themselves well to idle scrolling.

 No.25025

>>25022
Anon, we are talking about normies here. Social media will not die. 95% vill give their ID. They vill use Recall on Windows. And they vill be happy.



 No.20842[Reply]

Post less computery hardware you think is neat or have question about.
7 posts and 4 image replies omitted. Click reply to view.

 No.22953

Hurdy Gurdys are pretty neat. Saw a kit for building one using just wood cutouts and wax, could be a fun CNC project.

 No.22971

I like the idea of just being able to slap more hands / devices onto a clock as needed. Fill a whole wall with time related information of varying usefulness.

 No.22985

>>20850
this is tech. self powered, elegant, zero maintenance. post more please.

 No.23730

Snatch blocks, they're a pulley you can put on a rope, rather than having to thread it through. So like how zipline hooks work.

 No.25017

Calligraphy pen splitting open to draw a wide line using the arcing film of ink.



 No.24913[Reply]

what can someone do with a Rootless Nethunter install? even when trying to snoop on bluetooth devices it just gives "permission denied", and the bluetooth-arsenal isn't available on rootless nethunter either, it seems like only the Nethunter custom ROM is useful
13 posts and 5 image replies omitted. Click reply to view.

 No.24991

>>24982
>this does sound incredibly painful
it burns
>y not jus capture the hashes on ur mobile and crack them at home?
idk what hashes are but I'll crack my own wifi just for experiment
>or download a vm (i personally use an recommend qemu w/ kvm) and run kali from there
I used it to install LFS version 12.0, imma do it with kali
>https://overthewire.org/wargames/bandit
thanks I'll use it with kali GNU/ₗᵢₙᵤₓ
>>24983
I think parrot os would be better if I were a pro I feel like

 No.24997

>>24991
>idk what hashes are
Nta, but essentially hashes are a fundamental security measure. Before hashes, passwords were just kept on servers and what not in plain text. This has two main concerns: A. if a malicious actor gains accsess to the site, the passwords are right there for exploitation and B: maybe I don't trust the person I'm sending my password to. Hence, encryption was introduced. At a very simple level, hashing just involves taking a given password (doesnt have to be a password but using this as an example) and processes it through a mathematical algorithm that rearranges and/or changes the password in such a way the output looks nothing alike to the original. Modern-day hashes do this mathematical algorithm hundreds of times over, for extra security.
<Back to how this matters to you
When you scan a wifi network, such as using airdump, occasionally the wifi router will broadcast the wifi password as a hash. Otherwise, your phone wouldn't be able to connect. You can use airdump to find the hash, save it to a file, then simply upload the file to your computer, and using a software such as Hashcat, you can then crack it.

 No.25001

bruh the kali-gnuI refuse to say linux vm literally almost has the same appearance as nethunter, but more tools work
>>24997
>Nta, but essentially hashes are a fundamental security measure. Before hashes, passwords were just kept on servers and what not in plain text. This has two main concerns: A. if a malicious actor gains accsess to the site, the passwords are right there for exploitation and B: maybe I don't trust the person I'm sending my password to. Hence, encryption was introduced. At a very simple level, hashing just involves taking a given password (doesnt have to be a password but using this as an example) and processes it through a mathematical algorithm that rearranges and/or changes the password in such a way the output looks nothing alike to the original. Modern-day hashes do this mathematical algorithm hundreds of times over, for extra security.
interesting, very cool I didnt know
>such as using airdump
hmm I'm gonna have to buy new hardware such as a wifi-adapter/bluetooth-adapter and etc to make this work

 No.25004

>>25001
>hmm I'm gonna have to buy new hardware such as a wifi-adapter/bluetooth-adapter and etc to make this work
ion hve nethunter bu i would imagine it has airdump on it, no? jus use ur phone, and if it doesnt im sure theres sum android app that'll do it for u. sure wifi-adapter's p pretty cheap, i got one for like 12 bucks off amazon, bu dont waste money when u alrdy got the tools.

 No.25009

>>25004
>it has airdump on it, no?
<picrel is nethunter rootless
yep it has(in aircrack-ng + airodump-ngbut they need to access the wifi/bluetooth hardware of android but it's denied in rootless afaik, thus probably requiring adapters) + all the tools kali has in the vm but most don't work because of lack of root access(sudo only works inside the chroot in nethunter, but it needs root access outside too which android doesn't have)
> android app
there's hundreds in the nethunter store but like 90% require root access (~_~;)



File: 1688233535847.png (96.01 KB, 1005x627, 1688231220702130.png)

 No.20728[Reply]

Terminally online bros… it's over
61 posts and 17 image replies omitted. Click reply to view.

 No.23443

File: 1707924440862.jpeg (362.31 KB, 1284x1948, c7cc97548ef57b93.jpeg)

I really expected it'd be lower. That 29% is holding on for dear life.

 No.23686

twitter's CDN blacks out for a few minutes at least once a day at this point
good job firing all of those tech people, dipshit

 No.25006

Fucking LMAO what a piece of shit website

 No.25007

>>21083
>How does this even happen? It's not like the retard is implementing this by himself.
Anybody who raises concerns is fired immediately. Allegedly at his other companies they have like a whole department for tard wrangling Elmo because he's like this, so the people who actually do the work can do the work and the PR people can kiss his ass just right so he doesn't sabotage things too much.

 No.25057

Is this the service that Mr. Emerald Mine wants me to put all of my financial transactions on?



File: 1711440009416.png (12.92 KB, 482x102, 999.png)

 No.23814[Reply]

Has anyone heard about this new dating app called Duolicious? It's supposedly designed to help you meet like-minded individuals based on your personality. Sounds like a neat concept, but I can't help feeling a bit skeptical about it.

First off, how accurate can these personality assessments really be? I mean, are we reducing the complexity of human relationships to a mere algorithm? And what about privacy concerns? With all the data breaches happening these days, I'm wary of handing over intimate details of my personality to some tech company.

Plus, there's the whole capitalist angle. Is this just another way to monetize loneliness and exploit our desire for connection? It feels like these apps are more about making profits than genuinely helping people find meaningful relationships.

I'm curious to hear your thoughts on this. Do you think Duolicious is a step forward in online dating, or just another tech gimmick preying on our emotions?
34 posts and 2 image replies omitted. Click reply to view.

 No.24994

I would just abuse such a service by making a blog about trains or whatever and never date anyone from there.

>>24855
Checking profiles:
>Terrorwave Professional enabler
>play monhun w me or i'll kms
>I like sticking my dick in crazy
>Don’t talk to me if you believe 9/11 happened.
>education: Gamergate university
Not worse than twitter tbh.

 No.24995

So is this an app for channers or what?

 No.24996

>>24995
kill yourself.

 No.24998

File: 1716307694289.jpg (16.79 KB, 301x326, bullying.jpg)


 No.25000

>>24998
sorry theres a very dedicated autist who gets mad when people say "channer"



File: 1712529672735.png (64.22 KB, 480x602, wp_ss_20240408_0001.png)

 No.24099[Reply]

This is why I don't trust nerds. Computer systems have become too complex and nobody actually knows, whats happening under the hood. When nerds say: "Bro, it's totally secure! Trust me!" Don't trust them! Don't trust computers! I have no clue how I will organize my life in the future, but I tell you this much, I will try to rely as less as possible on computers.
27 posts and 4 image replies omitted. Click reply to view.

 No.24964

>>24457
I think you might want to use a computer with a core2duo CPU or older(doesn't contain Intel ME), or with a AMD FX cpu or older(doesn't contain AMD PSP), or any RISC-V cpu but emulating the x86 architecture to run x86 programs in it will be absolute torture and unreliable
>>24456
except mine lol
>>24944
not even gentoo officially supports it so I doubt that it'll actually happen too

 No.24965

>>24963
>Having met the initial design goals of working as a multiprocessing, distributed system capable of functioning on heterogeneous hardware, the Mach project moved on to the next step: weaning BSD out of the kernel space entirely. Mach 3.0 was intended to be a true microkernel system that could support an external operating system (like BSD) living outside the kernel space. Theoretically, Mach would be even able to host multiple external operating systems at the same time.
>Attempts to accomplish this failed spectacularly. The performance issues involved with pulling operating system functions out of the kernel developed into an intractable problem. Designing and optimizing a microkernel in general was found to be outrageously complex. Further, the basic concept of a microkernel was found to be poorly suited to the needs of general purpose computing.
>While some microkernels work very well for what they were designed to do, it became increasingly obvious by the mid 90's that the basic premise of Mach to act as a microkernel and host potentially any operating system as a personality outside the kernel… was at a technological dead end. Consequently, the Mach microkernel, and all the projects intending to use it as a microkernel, eventually faded into oblivion.
http://www.roughlydrafted.com/0506.mk1.html
To be fair unix has many characteristics that make designing a practical microkernel particularly hard. QNX seems to have got it right, but it has been languishing as a closed-source embedded platform for decades now.

 No.24966

>>24965
the performance problems with microkernels have been getting less and less important over the years. cpus have many cores, are colossally faster, and they also increase in speed at a greater rate than storage, so they spend most of their time waiting for storage to respond, so that becomes the bottleneck instead of ipc. also there's been CPU architecutral improvements, such as x86-64 adding the SYSCALL instruction, which is basically hardware acceleration for task switching.

 No.24968

>>24966
>they spend most of their time waiting for storage to respond, so that becomes the bottleneck instead of ipc
IPC is memory-bound in a badly designed microkernel. In Mach, many messages need to be copied from one process space to another. QNX extensively uses shared memory and provides more streamlined message passing semantics in general. AmigaOS circumvents the issue entirely by not having memory protection.

 No.24969

>>24839
No it's not.



File: 1716165948604.png (6.78 KB, 500x250, Oekaki.png)

 No.24958[Reply]

Im posting this from my ereader

 No.24960

>>24958
Very cool, one with ink?

 No.24961

>>24960
>very cool
Thanks
>one with ink
Yes
The tolino vision 6



 No.22355[Reply]

>*makes websites unusable in your path*
18 posts and 1 image reply omitted. Click reply to view.

 No.23203

>>23199
I mean they're not the ones DDOSing everyone so far as I know

 No.23205

>>23203
"this is a dangerous neighborhood" says the cloudflare henchman "there was a ddos attack not far from here the other day"

 No.23206

>>23205
leftypol was actually DDOSed multiple times though

 No.24956

>>22355
Humiliation ritual

 No.24957

>>22355
How do i install it on my router



File: 1715257950544.png (320.2 KB, 896x880, ClipboardImage.png)

 No.24803[Reply]

Of course they're all just CIA honeypots.
7 posts omitted. Click reply to view.

 No.24823

It's not a honeypot. Protonmail is not an anonymity service. Nobody will ever go to jail for you.

 No.24845

TBF what country could an email server be based in that WOULDNT have to do this shit legally?

If the alternative is hand over the IP address or go to prison im not surprised this shit is what happens

 No.24936

>>24803
Just use gorilla mail

 No.24939

>>24936
>Just use gorilla mail
most of their domains is blocked by companies in the kno. plus, their website throttled sending capacities for tempmail. it's good for a throwaway, bu i wouldnt advise any furthr.
>>24803
also side-note tbh- if ur usin Protonmail for shady shit (ion kno what the Spanish guy didnt i aint read the article), u gotta b usin PGP in all ur emails, no questions round it. it'll b hard 4 glowies to book u w/ jus a random series of letters and numbers tied to ur name.
>Of course they're all just CIA honeypots.
orrrrrrrrrr normal websites that jus conceed to the heel of the boot? sounds more likely.

 No.24955

>>24803
>opsec? nah, I just trust company X lol
most people are like that
ultimately any email provider can work as long as you assume they're an adversary and act accordingly



Delete Post [ ]
[ home / rules / faq ] [ overboard / sfw / alt ] [ leftypol / siberia / edu / hobby / tech / games / anime / music / draw / AKM ] [ meta / roulette ] [ cytube / wiki / git ] [ GET / ref / marx / booru / zine ]
[ 1 / 2 / 3 / 4 / 5 / 6 / 7 / 8 / 9 / 10 / 11 / 12 / 13 / 14 / 15 / 16 / 17 / 18 / 19 / 20 / 21 / 22 / 23 / 24 / 25 / 26 / 27 / 28 / 29 / 30 / 31 / 32 / 33 / 34 / 35 / 36 ]
| Catalog | Home