[ home / rules / faq ] [ overboard / sfw / alt ] [ leftypol / edu / labor / siberia / lgbt / latam / hobby / tech / games / anime / music / draw / AKM ] [ meta ] [ wiki / shop / tv / tiktok / twitter / patreon ] [ GET / ref / marx / booru ]

/tech/ - Technology

"Technology reveals the active relation of man to nature" - Karl Marx
Name
Options
Subject
Comment
Flag
File
Embed
Password(For file deletion.)
What is 6 - 3?

Not reporting is bourgeois

| Catalog | Home
|

File: 1668576113682.png (Spoiler Image,3.22 MB, 1584x1200, ClipboardImage.png)

 

Thread for watching rocket launches and shit.
81 posts and 55 image replies omitted.

File: 1741898560328.png (387.15 KB, 1024x576, ClipboardImage.png)

Not really /tech/ but still /space/.
Lunar eclipse happens tonight, will be visible in the Americas.

File: 1748457688970.jpg (44.18 KB, 640x480, StarshipExplodesAgain.jpg)

Yet another giant leap on the road to the Moon and Mars. The Chinese will never catch up now!

I might be stupid but I still don't understand what problem starship (or even falcon9) is trying to solve

>>30027
Isn't the purpose to soak up government gibs while maximizing profit (offering a cheaper service and doing things no one else can) and inspiring-following a vision of futurism. If the vision of the future were different you'd probably get it.

Another day, another stunning SpaceX success…



File: 1734060573790.png (3.73 KB, 389x129, aisucks.png)

 

So, I'm a musician, who wants to have a musical career (a lot of communist musicians had stable careers) and meanwhile stupid porkies tell me that "no, we'd prefer if you were replaced, prole, because there if no place for people like you" and I hear, not only music, but other art, computer science, programming etc. will be replaced by AI. How do we stop this, so people are still prosperous in the real socialst societies?
493 posts and 62 image replies omitted.

>>30182
you are literally rolling dice

>>30183
(academic tard voice) playing d&d with your bros is literally gambling

>>30184
Why do you think it is so much fun?

File: 1750180682936.gif (438.81 KB, 691x641, 1691068664351.gif)

>>30181
>>30182
It's even more retarded, it's not only calling it gambling, but a gambling addiction.

>>30181
>>30185
this shit about "social networks are like slot machines" is extremely overstated. it's not completely off-the-mark, because it's true that it's somewhat like a video game skinner box, but people don't become physiologically dependent on refreshing xitter or prompting chatGPT, and in most cases, it takes the slightest friction between the user and the UX to completely destroy the habit, which is what begs the question: how many regular users of jippity would stick to jippity of it removes the free tier.



File: 1608526423381-0.jpg (185.98 KB, 1280x720, dnm.jpg)

 

Darknet markets are as close as it gets to a free market, where you can order drugs and have it delivered to you by mail. The purpose of this thread is to discuss opsec, ask for help and discuss markets in general. This thread should be fully legal as long as you don't solicit or facilitate illegal transactions, meaning:

&ltDon't beg to buy from someone
&ltDon't attempt to sell to anyone here
&ltDon't link to dealer Instagram/Reddit/Snapchat accounts. These accounts are run by either scammers or feds.
&ltDon't directly link to any market. These links could be fake scam/fed markets, designed to phish your login details and steal your cryptocurrency. Only use https://dark.fail/

The following is my personal recommendation for good opsec while conducting business, however, you must [b]read the darknet market bible[/b] (.pdf attached) after you are done with this post. If you don't read theory, it's likely you will be caught and convicted.

>Will I be 100% safe?

In theory, no. The darknet market bible, together with this thread, is meant to minimize the risk of getting caught as much as possible. If you follow the exact procedure outlined in the bible, you should be okay, especially as a small-time buyer.

Tails
Tails is an Linux-based operating system that runs entirely on your RAM and is wiped when PC is powered off. If the cops intercept your item, conduct a controlled delivery and seize your machine, they will not be able to find evidence linking you to the package and you can deny involvement via a lawyer.
You will want to install the Tails operating system to a USB flash drive with at least 8GB of storage. Personally, I'd go for USB 3.0, with at least 16GB storage for persistent volume purposes, or even 128GB or more if you want to store the Monero local node on it. You also need a PC with at least 1GB RAM to run Tails. The bible contains a guide for installing Tails in [b]2.A.2 Installing Tails[/b]. You can download it here:
Post too long. Click here to view the full text.
85 posts and 7 image replies omitted.

>>21346
>p2p that doesn't inherently suck ass on every level?
Isn't that pretty much everything other than blockchain?

>>21346
So you don't know how Monero works. Unlike bitcoin, transactions cannot be tracked back to you. When you are controlling a node, you can wipe/not save all the logs you want. Nobody is forcing you to keep logs on yourself lol

bohemia/cannabia might be exit scamming

localmonero is dead

Archetyp got taken why do these morons host shit in Germany?????

Also Europol put out the most cringey fucking page of all lmao



File: 1748879958296.jpg (321.79 KB, 1280x1280, 3e37vnj6l0t21.jpg)

 

Suckless seems like a great way to transition from rice to programming.
A good set of training-wheels for the bicycle of the mind.
However there's something extremely pathological about not wanting well designed and implemented features.
It's like cachexia from voluntarily avoiding healthy fats.

This isn't to advocate feature creep, which is ugly and doesn't add to the design of the system.
In rejecting big systemic components which integrate they may even make things more complex.
This is something like having a small standard library, avoiding RPC, or even loose coupling of components.
Implementing these can reduce duplication, and reduce complexity, while allowing more to be achieved.

Everywhere the minimalist takes something rich and make it small.
22 posts and 3 image replies omitted.

>>30164
cant imagine being a bigger loser than caring what some dying website thinks. same retardation as people who refuse to watch a movie or play some game because of "the fandom"

>>30165
It's not that I care, it's just observably the case that throughout the 2010s to 2025 the advocacy and support for software minimalism has depended more on political reasonings than technical ones.

>>30167
and your evidence for this is fucking 4chan?

>>30168
Why are you getting so heated over it? Advocacy for minimalism isn't found in many places beyond 4chan and some IRCs, most of the tech industry doesn't abide by software minimalism principles and thus neither do tech forums advocate for it outside of generally expressing annoyance with how slow software has gotten.

>>30169

not true, just look at youtube, for example. or. ironically, places like discord… plenty of people that want their pseudo-minimalism. (real minimalism is going outside and touching grass btw)



File: 1749730345228.webm (634.18 KB, 1280x1024, wm.webm)

 

This might not sound that impressive, but i've just managed to get program-agnostic rio-style window creation working flawlessly in FVWM. Previously it was a flickery, unreliable mess of xdotool commands, but now it's spawning every window iconified, hooking into the window creation event to set geometry from my rectangle selection program and deiconifying it to its correct position.

If you could keep track of all terminals and from which one a particular program is spawned, you might be able to reach true rio emulation closer than even the plan9port version.

Desktop and window management general, i guess.
4 posts omitted.

>>30155
>Keeping track of terminals
you have to keep track of what the terminal does, or of all fork calls for that matter, not the terminals themselves

>>30157
I have a very specific scheme in mind, which i'd hoped would be aided by something like inheritable x properties, but since they don't exist a kludge it is:
/etc/profile runs a script writing the window id to /run/foo/$$. If a new window is spawned, get the process id with _NET_WM_PID (fails with 9term, so much for icccm compliance), then walk up the process tree using ps until encountering a process in /run/foo containing the window id with which to set the correct geometry.

>>30158
Wait, i think i've found a near-perfect solution. Terminals mimicing xterm will set the WINDOWID environment variable, so for every non-terminal child process you could get the parent terminal with an SUID script like:
#!/bin/sh
strings /proc/"$1"/environ | grep '^WINDOWID=' | cut -d= -f 2-

>>30152
That's cool and I don't want to sound like a dick but have you considered using 9wm or Wio? They are Rio-like WMs for Linux.

>>30174
In rio only the plan9 terminal (which gets its geometry passed in plan9port) can be created this way. As you can see from the xterms, which don't accept pixel coordinates, my scheme works for every program. Also notice the sloppy focus in the video, what you don't see are the 3x3x5 virtual desktops, so there's that. My next step is programming keybindings that align with my emacs muscle memory to work, but the scripting language is finicky and a module would clearly be overkill.



 

News from the radio (from like 5 mins ago): instagram is running an ad to promite a law at the european level to force ID verification to download stuff from the app store. Why? Because "teen safety".

I did a quick google search and was able to find this https://about.instagram.com/it-it/approvazionedeigenitori

> Instagram is therefore calling for European legislation that would require age verification and parental approval in app stores, where apps are normally downloaded.

> We are actively collaborating with other industry players, policy makers, civil society, parents and experts in support of this initiative.
> A survey conducted by Morning Consult indicates that three out of four parents in the eight European countries surveyed ( France, Italy, Denmark, Germany, Spain, Poland, Ireland, and the Netherlands), are in favor of legislation requiring parental approval for teen app downloads.

Anyone else?

>teen safety
i will state i am opposed to such things, for obvious reasons

My boomer parents and some of their friends unironically think internet id shit should be enforced on every website and not doing so is some huge legal oversight. Things looks bleak for us evropans.



File: 1608526010241.jpeg (573.58 KB, 1140x500, cyber_security.jpeg)

 

Comrades, we need a thread on privacy. Any decent activist should try ways of staying anonymous on the web and prevent being tracked by governments and corporations.General tips===* Use free software as much as you can.* Use GNU/Linux and keep it up-to-date, to be sure that you don't have unpatched security exploits* Don't use Flash Player, use youtube-dl instead for watching streaming videos online* Do not use Google, use DuckDuckGo or StartPage instead* Use a password manager like Keepass or for GNU/Linux users keepassx. Create new passwords for every site that you visit and use a strong password as a master password. A tip for easy remembering of your master password is to use a sentence. "i fucking love cookies and tits!" with extra capital characters etc. is easier to remember than some random characters and long enough to prevent brute force attacks of any kind.* Use the Tor Browser Bundle if you really want to stay anonymous.Firefox====* Go to Preferences -> History and set History to "Never remember history". * See for additional tweaks: https://github.com/amq/firefox-debloat and https://vikingvpn.com/cybersecurity-wiki/browser-security/guide-hardening-mozilla-firefox-for-privacy-and-securityAdd-ons-----------* Use uBlock Origin for preventing tracking etc. Bonus: use hard-mode to manually whitelist external domains on sites. Don't use uBlock but be sure to use uBlock Origin https://github.com/gorhill/uBlock/wiki/Blocking-mode:-hard-mode* HTTPS Everywhere* DecentralEyes: prevents CDN hosting from tracking you (Google for Jquery etc.)* Self Destructing Cookies: only allow cookies that you choose to allowOS==* Encrypt your hard drive or home partition at least* If you use GNU/Linux, you can try to restrict systemd or syslog from logging. * Use a distribution which takes security seriously. Also, be sure that you don't install a lot of things outside the repository. It will cover most of your needs.Real life tips===* Pay with cash if you canFeel free to provide tips to each other comrades!
259 posts and 25 image replies omitted.

What is wrong with redditors? Why are they trying to whitewash apple?

https://redlib.astrial.org/r/privacy/comments/1kzv848/i_requested_all_my_personal_data_from_apple/

tfw theres definitely llms scraping the leftypol api trying to assign all the posts to actual user personality profiles. seems kinda easy on slow boards. based on punctuation, mispelled words, grammar, vocabularly, dates, effort. if you make 3 posts in 3 threads in the same 30 minutes. it's highly likely a script can match those three and assosciate them with you in that time frame. at that point, with the context of 3 posts. it has enough information and a profile of you now. that it can make educated guesses as to who made that new post, and successfuly assign them to you, growing the profile.

>>30143
Don't even need an llm for that. I do it myself to some posters based on their posting hours, reply times, interests, typing, etc.

>>30036
Doesn't installing all of the privacy-enabling shit just end up flagging you to the feds as someone with something to hide? I remember hearing somewhere that the UK government was having ISPs record all IPs that accessed the Tor website, for example.

>>30143
Try anonymouth?

>>29917
>is Protonmail secure?
They will give at least some data to law enforcement, if you do activism. Riseup is better, if you can get invites. Protonmail is still better than gmail or outlook, tho.



 

Thread for questions that don't deserve their own thread.
I wanna buy some headphones to go outside i don't want to spend more than 100€ on them. I want them to be mostly durable and secondly to have good sound quality, also i don't want to look like a jackass while wearing them, any suggestions?
504 posts and 65 image replies omitted.

>>30017
Was using DeepSeek for this some if you end your question with "using only quotes by author from a reputable source" such as "Lenin" from "marxists.org" it did a descent job from an uninformed perspective. It sometimes elides and then you can request "give me the full paragraph of the quote". My guess is that you'd be better off just doing a wget –spider for pages and then find and grep.

>>30017
I think the problem would be somewhat solved if you could limit searches to a particular domain, so even if the LLM gets quotes wrong, you can see where it got its shit from

File: 1748901088077.png (107.51 KB, 260x194, ClipboardImage.png)

>downloads a paid program.
>thinks they're going to help.
>breaks critical functionality including to restrict access to paid users.
>anything good they've got is probably from NSA tooling; not even their own stuff.
>probably has a keyboard that looks like pic rel.
>uploads in a format painful for everyday users.
>gives it away.
I hate software crackers.

>>30083
>do nothing but be a cracker and goon endlessly.
>never leave their basement even defying standard responsibility.
addendum.

Useless piece of shit YouTube started adding playlists and "&start_radio=1" to certain search results and it's bugging me, I have to delete it before passing it to mpv, is there any way to get rid of it?



File: 1730738664897.png (13.12 KB, 270x270, telegram.png)

 

i recently came to possess a printed out slide deck detailing an nsa collection program against telegram. i got it very accidentally, i live in a building with many national security-types and found the printout in the trash area. sounds crazy, not sure who's it was or why they took it out of a secure facility, but weirder things have happened. in a past life i used to work in government and even held a security clearance at times, and the program seems plausible to me. not going to post the slides themselves, don't want anyone to get in trouble, but i have no problem summarizing.

* the nsa collection program is called JUICYSTUFF. sometimes abbreviated JUST or JUST*. the program has buckets for different targets. JUSTRUMORS = russia, JUSTCHAOS = china, JUSTDISORDER = north korea, JUSTINSIGHT = iran, JUSTHAVOC = violent extremist organizations, JUSTMIRE = rest of world, JUSTSILENCE = telegram bots, etc.

* the program primarily uses two technical tools, TEMPTINGBAKE, sometimes abbreviated TEBA, and HUNTINGGLASS. both work by spoofing target users when interacting with telegram servers.

* TEMPTINGBAKE is the more sophisticated tool. given a telegram user id, it can collect the user's contact list, messages and media. it can only collect content accessible and readable on telegram servers so not things like secret chats. because its so sensitive nsa limits it to a few hundred targets per day. there are thousands of targeted users on TEMPTINGBAKE collection so most are collected every several weeks.

* HUNTINGGLASS requires a user id and additional telegram key information associated with the target user. nsa can usually provide this from other data holdings. it collects the same information as TEMPTINGBAKE.

* total telegram users targeted is in the 10s of thousands. tasking users is managed by an internal nsa jira instance. the target management aspect of the collection program is called JUDICIOUSHARVEST.

* nsa runs the program for the whole us intelligence community and the five eyes.

fair to have some skepticism about this, would love to see if any anons have heard of this program (i hadn't) or have ideas for figuring out accuracy. i hope the fact that this was printed means someone else out there with more knowledge is trying to get the word out. there's too much organizing that unfortunately happens on telegram not more secure methods imo, so i consider this as a warning. maybe telegram even tacPost too long. Click here to view the full text.
3 posts omitted.

>27051
And yet, you only know about the veracity of the Snowden leaks because of journalists.
Sure they work for corporate overlords with all the auto-censoring that comes with it, yet what I said is still true. Maybe you're not old enough to remember the hundreds of leak about the 5 eyes program that only a few believed to be true a few decades ago. They chose to believe them without any proof, they were right in the end but that doesn't make it very smart to believe everything posted on the Internet, it's on the same level as believing any other unsourced conspiracy theory.

>27052

>Have you seen what Snowden's slides looked like? They can easily be faked, they're not that interesting. The only way to verify OP is through doxing OP, and that's dumb to want.
And that's why we need journalists, people paid to work hours to verify the authenticity of them lmao.
Do you really think they received the slides and decided to post them straight away? No. It took 3 weeks for the first article to be posted, and they were halfway into his trove 6 months later. Because they searched for sources, analyzed metadata and discussed with Snowden in order to, at least, verify some info were real.
There's dozen of uni papers about the challenge of verifying those leaks, which goes into more details.

>The only way to verify OP is through doxing OP, and that's dumb to want

No. Most whistleblowers don't get prosecuted, we only focus on Snowden, Winner and Assange because they leaked massive troves and did mistakes, turning them into martyrs in some ways. Medias did not know how to properly leak & verify their leak at the time and some did mistakes, like sharing slides with hidden watermarks directly with the NSA and exposing their source. But by now they have developed guidelines to not make the same mistakes and assume everything is watermarket or contains small typos to detect the source of the leak.



Post too long. Click here to view the full text.

>>27054
>it's on the same level as believing any other unsourced conspiracy theory
Only if you lack nous

>>27050
Just put it up anonymously. If what ypu are saying isvtrue your post has already been flagged for posting all the names of their programs in your post. You know they have web crawlers too right?

>>27056
Good thing he's only LARPing

It's over, Telegram is now a honeypot
https://xcancel.com/Peter_Nimitz/status/1932849162350944514
> German court documents yesterday revealed that French intelligence has access to all of Telegram's internal data now, thanks to Durov. They are freely sharing it with other intelligence & police agencies, so warrants aren't even needed.



 

From https://krebsonsecurity.com/2024/10/the-global-surveillance-free-for-all-in-mobile-ad-data/
>The Mobile Advertising ID or MAID — the unique alphanumeric identifier assigned to each mobile device — was originally envisioned as a way to distinguish individual mobile customers without relying on personally identifiable information such as phone numbers or email addresses.

>However, there is now a robust industry of marketing and advertising companies that specialize in assembling enormous lists of MAIDs that are “enriched” with historical and personal information about the individual behind each MAID.


>Some vendors offered only a handful of data fields, such as first and last name, MAID and email address. Other brokers sold far more detailed histories along with their MAID, including each subject’s social media profiles, precise GPS coordinates, and even likely consumer category.


>How are advertisers and data brokers gaining access to so much information? Some sources of MAID data can be apps on your phone such as AccuWeather, GasBuddy, Grindr, and MyFitnessPal that collect your MAID and location and sell that to brokers.


>A user’s MAID profile and location data also is commonly shared as a consequence of simply using a smartphone to visit a web page that features ads. In the few milliseconds before those ads load, the website will send a “bid request” to various ad exchanges, where advertisers can bid on the chance to place their ad in front of users who match the consumer profiles they’re seeking. A great deal of data can be included in a bid request, including the user’s precise location (the current open standard for bid requests is detailed here).


>The trouble is that virtually anyone can access the “bidstream” data flowing through these so-called “realtime bidding” networks, because the information is simultaneously broadcast in the clear to hundreds of entities around the world.


>The result is that there are a number of marketing companies that now enrich and broker access to this mobile location information. Earlier this year, the German news outlet netzp
Post too long. Click here to view the full text.
10 posts and 3 image replies omitted.

Consider not running shitware on your phone, thats half the battle

Yes, it sure is hard being a non-tech-savvy person who doesn't want to participate in all the bullshit.
>just don't run that on your phone
Well, tell the average joe how he can simply opt out of all that. Apple wants $1,000 for a phone, and Android phones won't even activate without a Google account. Average Joe me isn't going to break out the tiny screwdrivers and take apart a phone. He's not going to plug it into some computer and run safe mode or whatever and reassign directories or "break", "crack", "unlock", "root", or anything else because I'm not able to understand ANY of that. Even the simplest of those kinds of tutorials assume a great deal of tech knowledge, interest, and experience. I do have some interest but at my age it's not easy to dive in and learn how everything works.
I'd just like to have a flip phone with a keyboard on it. That's it. I don't want internet or GPS but everyone makes me text and I have to, even for work. I hate texting but there's just no getting out of it.

Every smartphone makes you sign up with software people outside of the phone network. They made these fucking side deals so you can't just use the phone without tying your entire identity to your number and some online presence. They want you to sync all your shit together. They want your phone and television and all your addresses and everything in a cloud somewhere. And we've already seen how this can be exploited. And yet 99% of people just do what they're told.
>nothing to hide
Well then come right in!!! Have a look and a listen!! Because me not having anything to hide is the exact same as being an exhibitionist you can watch and hear as better to advertise to. Sure, it's not anyone real actually listening. So who cares that the technology is there? It's such a blessing for ME that something is always listening for me to address it for MY benefit. What a beautiful future we have. I guess I'm supposed to be impressed. I guess I'm supposed to feel like Tony Stark with Jarvis there to assist me. Record me, LEARN from me so you can better serve me. Is that something I'm supposed to be okay with or even excited about??
Fuck all of this. I hope there's a massive EMP and we have to start over. Really rather we just voluntarily freeze technology anywhere between the 1970s and 2000. That'd be just fine by me. In fact, just eliminate the internet altogether. At this point I see morePost too long. Click here to view the full text.

>>29694
THIS
I fucking hate the "it's a you problem" retards. thinking in terms of individual actions doesn't make sense (and I find it odd to hear this in a lefty forum). they are tracking the whole population. if someone wanted to go after you and you had all the measures in the world to avoid tracking, they could go through your family, friends or coworkers. your careful use of your phone would be of no use.

>>29385
this is also why the "passkey" shit that pushes biometric identitification is promoted so hard.

and normoids will all willingly queue up to give their biometric data away and then in 10 years act like this was such a surprise???!!?! omg muh privacy!! why isn't someone doing something??!?!

>>30005
elaborate, please. does that shit send your fingerprints to some Google server or something?



Delete Post [ ]
[ home / rules / faq ] [ overboard / sfw / alt ] [ leftypol / edu / labor / siberia / lgbt / latam / hobby / tech / games / anime / music / draw / AKM ] [ meta ] [ wiki / shop / tv / tiktok / twitter / patreon ] [ GET / ref / marx / booru ]
Previous[ 1 /2 /3 /4 /5 /6 /7 /8 /9 /10 /11 /12 /13 /14 /15 /16 /17 /18 /19 /20 /21 /22 /23 /24 /25 /26 /27 /28 /29 /30 /31 /32 /33 /34 /35 /36 ]
| Catalog | Home