/t/ - Technology

Discussion of Technology

Catalog Archive Bottom
Mode: Thread

Max message length: 8000


Max file size: 32.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more


(used to delete files and postings)


Remember to follow the rules

The backup domain is located at 8chan.se. .cc is a third fallback. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 2.0.

Please be aware of the Site Fallback Plan!
In case outages in Eastern Europe affect site availability, we will work to restore service as quickly as possible.

(Estamos planeando la actualización del sitio 2.8 para este fin de semana, del lunes 6 al 27 por la tarde o por la noche en CST. El tiempo de inactividad será breve y luego buscaremos errores.)

8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

Board Nuking Issue should be resolved. Apologies for any missing posts.

(11.33 KB 187x270 watwat.jpeg)

Structure and interpreation of computer programmes 2022 Anonymous 05/25/2022 (Wed) 19:18:43 No. 8522 [Reply]
Found out theres an javascript version of this book i havent read it yet but iam sure its cool.Its kinda wierd they didnt use a programming language like c or c++

(127.77 KB 1200x1200 1200px-KeePass_icon.svg.png)

Password Managers Anonymous 06/01/2021 (Tue) 17:14:56 No. 4278 [Reply]
Ok it's time to get a password manager. It has to be open source, free and without any cloud crap because I trust nobody. Which PM do you anons use? Which KeepAss is better? There's the OG, X and XC now. Is there any way to extend my PM to android manually without any company getting their hands on my database? Let's discuss.
18 posts and 4 images omitted.
I mentally encrypt my passwords from plain text to AES-256, then use invisible ink to write them down on a grain of rice. Then I take the rice and hide it under a loose floorboard in my bedroom. I did lose my passwords once to a hungry mouse, but other than that, I'm pretty happy with this arrangement.
>>5658 You should cipher your written passwords. If someone were to sneak into your home they could collect all of your passwords. In the event of a raid I am capable of destroying my written passwords, however in the event of a clandestine operation to access them, I am also protected somewhat. However if pictures of the ciphered keys were taken they could be deciphered.
>>5658 >implying head is not bloat >implying head is not a single failure point >implying head is secure >never heard about meat / machine interpenetration God damn it anon, just don't use passwords.

Spurious native interrupt Anonymous 05/15/2022 (Sun) 16:21:30 No. 8449 [Reply]
When my computer is not connected to the internet, even though I formatted, changed the bios software and changed the hard disk firmware, the program opens by itself and the mouse cursor moves by itself. When I examine with the Wireshark program, an interrupt signal comes from the usb ports even though the device is not plugged into the usb ports. In this case, I am complaining. Logs are attached.
Boot to a livecd with no storage installed.

(17.16 KB 474x253 th-2382814816.jpeg)

Connect to Tor Anonymous 05/10/2022 (Tue) 14:22:14 No. 8395 [Reply]
What is the safest way to connect to the Tor-Network? Is this the safest possible way: Tails (VM) -> VPN -> Bridge -> Tor-Network
3 posts omitted.
>>8395 You seem inexperienced with anonymizing software, I will give you some advice. Connect to Tor before anything else. If you wish to obfuscate your Tor connections, use Tor bridges, don't connect to a VPN before Tor. Do not listen to the dunces telling you to connect to a VPN before Tor newfriend, by relaying your connection through another proxy before Tor you are routing your traffic through their servers before Tor, this is idiotic as that traffic can and inevitably will be linked to you. These services are not trustworthy, nor is Tor, Tor is a damn sight better than any VPN service. By using Tor to mask your IP address you are allowing yourself to hide among the countless other people using the Tor network, this is just one of the many reasons Tor is superior to normal proxies. If you must connect to proxies, chain said proxies to the end of your Tor circuit, never before. Why are you running Tails in a VM? Just use Whonix, Whonix outclasses Tails, Whonix can be run live just like Tails. There is no need to use Tails anymore, use Whonix. I would recommend running Whonix KVM to avoid Virtualbox, however it almost certainly makes no difference at all as regular Whonix is KVM, Virtualbox just acts as a paravirtualizer interface. Are you using Windows with Tails in vmware? It tends to be windowsniggers running Tails in vmware.
>>8436 You wouldn't. By connecting to a proxy before Tor you are undoing the entire purpose of using Tor: hiding among the millions of people using the Tor network. >>8470 >Because some nodes are compromised and expose your IP when in clearnet Your VPN is compromised. There has never been a privacy respecting VPN service. You can never know a VPN provider is not logging your traffic or spying on you. Tor has a far better track record than any VPN service, where are all of the people being arrested through the Tor network for crimes? Zero. Not a single one, only people who made operational security errors (like connecting to a honeypot proxy before Tor). IP leaks have rarely happened to people who used Tor properly, those vulnerabilities were also patched long ago so I don't know why people keep harping on about it. VPNs can also leak your IP, they are far more likely to leak your IP than Tor. People at risk of IP leakage now are tor users with janky configurations, and they still have a very low chance of leaking their IP. The chance is there, they should check their IP regularly to ensure it is not leaking. Everyone should do that.
>>8436 Tor relies on encryption. Encryption relies on relatively slow brute forcing. If computers improve significantly in your lifetime then you are vulnerable to anyone who can grab your traffic. Governments of the world have already claimed they grab all encrypted traffic and likely have vast processing power.

How to communicate with the devil using ions ? Anonymous 05/16/2022 (Mon) 13:54:06 No. 8457 [Reply]
How to communicate with the devil using ions ? You will provide three "lead container". You will obtain sodium chloride, potassium and calcium powders. Put the sodium chloride powder in a container, calcium powder in a container and potassium powder in a separate container. Connect the "bulb that gives ultraviolet light" to lead containers. Connect the "ultraviolet light bulb" to a sound amplifier with a microphone. Give Arabic, Persian and ancient-Hebrew commands using the microphone. Satan does not know other languages.

where Sell nft gasless free ? Anonymous 05/15/2022 (Sun) 16:30:53 No. 8450 [Reply]
Where mates?

(2.21 MB 1963x2500 f4460216.png)

Operation Download And Conquer Anonymous 10/02/2021 (Sat) 13:51:54 No. 5546 [Reply] [Last]
Given how majority of the internet's audio and video services are provided by Google, thanks to Youtube, the purpose of this operation is to loosen the death-grip that has taken hold. This process will only require that you have a steady internet connection and (Advisably) 100 GB of free space. Here is the process: Step 1 Download the latest versions of FFMpeg and Youtube-DL, and put all the programs into the same folder: http://ffmpeg.org/ https://ytdl-org.github.io/youtube-dl/index.html Step 2 Create an account to any video sites that you wish to distribute videos on. Here are some of the more well-known alternatives, as well as some recommended sites: AfreecaTV: https://www.afreecatv.com/ Bitchute: https://www.bitchute.com/ BitTube: https://bittube.tv/ D.tube: https://d.tube/ Dailymotion: https://www.dailymotion.com/ LBRY: https://lbry.com/ NicoNico: https://www.nicovideo.jp/ Rumble: https://rumble.com/

Message too long. Click here to view full text.

55 posts and 19 images omitted.
>>8424 Buy my balls nigga
>>8423 The whole point to requiring your number is so that they could have your data, being able to get a temporary number or a virtual one would defeat the purpose of that now wouldn't it. If something demands your phone number to use it and refuses to function without it, it isn't worth it in the first place.
Cool, but do any of these websites have an API that allows you to upload videos? Doing the uploads by hand sounds like a waste of time. And if there was an upload API, you could just set up a process to download and upload things in the background, which is a lot more efficient.

(47.49 KB 1360x768 Anonymous.jpg)

Advanced Untraceable Hidden Camera System Anonymous 05/14/2022 (Sat) 19:29:00 No. 8443 [Reply]
If you were to build a hidden camera system, how would you go about it? I want to build such a system but don't have the skills to put it all together. I do have a few specs in mind and would enjoy your input on how to make it a reality. In terms of applications of such a device... Think the worst case scenario's with the highest level of deniability and near impossible traceability. Even if the device were discovered, stored files would be inaccessible, upstream intermediaries and hosts would be impossible to access. This device can be used as a trail cam, nanny cam, or secondary security cam. This can also be used for spying, like a corporate espionage cam, bathroom/dorm room cam, hotel/airbnb cam, etc. The use, whether for good or evil, is left to the user. The main point is that if properly constructed and properly installed, it would be extremely difficult to detect and likewise to determine who installed it and where it uploaded to. * Camera separate from main system to allow for flexibility in mounting * Camera should be 'pinhole' type to avoid detection (0.5 mm or smaller) * Camera should provide crisp image (highest quality possible given size limitations) * Control unit OS should be open source * Control unit file system must be sufficient to temporarily store recorded media until transferred and verified * Control unit file system should be encrypted * Image and video files should be individually encrypted on device * Media is stored only until transferred and transfer verified * Media is transferred off to secured site, preferably a file drop site over Tor or I2P (the latter preferred, due to file volumes)

Message too long. Click here to view full text.

archinstaller Anonymous 05/14/2022 (Sat) 15:40:23 No. 8442 [Reply]
Arch is great! Arch has archinstall! Arch was great!
>>8442 Install Gentoo

(58.88 KB 600x675 show_me_the_booty.jpg)

(843.85 KB 1200x1839 blackbeard.jpg)

(70.42 KB 1024x1024 IPFS.png)

/p2p/ General Anonymous 05/06/2020 (Wed) 02:13:46 No. 23 [Reply] [Last]
Welcome to /p2p/, the dedicated peer-to-peer thread for /tech/ and the bunker for /t/orrentfags. What is P2P? Peer-to-Peer technologies allow decentralized networks to share data. They can be used to bypass oppressive government regulations on speech or to download the latest seasonal anime. What are my options? First and foremost is BitTorrent, a common protocol where files are split into chunks which are then shared via swarm, which works to get everyone a copy. There are many BitTorrent clients out there, and everyone has a personal preference. Some are owned my corporations and full of spyware. It's recommended you use something open source, like Deluge or qBitTorrent. Won't my internet get shut down? If your ISP is cucked then they might, but thankfully there is a solution. Use a VPN! Don't trust any VPNs that advertise all over the place. What is IPFS?

Message too long. Click here to view full text.

67 posts and 14 images omitted.
>>7454 IIRC I2P-Bote hid metadata better. But it seems to be abandoned.
>>7457 Might be a place from which to bootstrap a node list?
>>7457 damn thats gay. gave me false hope. i2p also easy to censor and block as case with china evidenced that there are more tor users than i2p users. i2p is too pozzed it has no obfuscation whatsoever and your isp can see your router wide in the open >>5382 can i send them money in envelope from russia how would that look like, wouldnt that be too sus (for russian customs that is) and what about conversion rates or do i just send dollars?

How do you make a person hear sounds that don't exist ? Anonymous 05/12/2022 (Thu) 20:08:50 No. 8422 [Reply]
How do you make a person hear sounds that don't exist ? Get a high-wattage sound system. Get a microwave oven. Remove the magnetron in the microwave oven. Remove the "magnetic coil" from the high-wattage sound system and replace it with the magnetron used in microwave ovens. You can give the inspiration you want in the high-wattage sound system. Russia and China are at this level right now. The US and Israel are at a much higher level.
they would just need to listen to my music because i aint making it anymore lul

(19.23 KB 330x467 zeronet.png)

Zeronet Anonymous 01/03/2022 (Mon) 10:15:10 No. 6936 [Reply]
Why did Zeronet never take off?
4 posts omitted.
>>6936 good logo = glow-ware
>>6937 >>7870 Because in order to let you talk to people, you have to be able to reach their computer. It's no different than how 8moe is only anonymous between posters. The server has to be able to see you or else you wouldn't be able to post on the site. And with Zeronet being decentralized, there is no master server to keep track of anything, so each site had to independently issue an identity key so that it could talk to your computer. Those keys are trivially easy to delete and request, which makes spam impossible to limit. Furthermore, being decentralized means there are no mods and no mod tools for the removal of spam - each user has to delete it from his or her copy themselves, which is a lot of work. tl;dr imagine 8moe being spammed across every board at a rate of two to four thousands posts per hour, 24 hours a day, there are no mods, and you can only hide one post at a time. Zerochan was forced to use a third party ID service that limited users to 1 ID per IP address to stop the spam, but the damage was already done.
>>8378 Thanks anon. I wonder if proof of work could solve the spam problem. That's how Aether does it. >>7872 Wouldn't solve the CP problem though.

(1.38 MB 3094x2744 Lilly1.jpg)

Bypassing Microsoft Bitlocker. Anonymous 05/12/2022 (Thu) 00:30:26 No. 8412 [Reply]
Title's exactly what it says I removed secure boot in order to install linux on my laptop but the problem is I need a security key that I wasn't provided with much if at all in order to bypass it. Does anyone know what I can do about it? Do I have to make a new microshit account? I wasn't able to refrain from having one since I wasn't given the option at all when I activated this laptop. I'm on windows ten still.

Anonymous 10/27/2021 (Wed) 16:15:02 No. 5923 [Reply]
why fed's doesn't take down the tor and how people get caught on tor
>They use it too >Operational security blunders, human errors
>>5923 >why fed's doesn't take down the tor same reason doctors dont cure disease, theyd rather hit up your healthcare plan for a lifetime of "treatments" instead. why would feds unemploy themselves? >>https://arstechnica.com/tech-policy/2012/04/the-hidden-side-of-your-soul-how-the-fbi-uses-the-web-as-a-child-porn-honeypot/
fed is my country already made tor access illegal and hard to get to. so it's blocked. makes it 3rd country in the world to block tor 1. china 2. iran 3. russia who is gonna ban tor next?

(1.44 MB 1643x2048 2.png)

Anonymous 02/28/2022 (Mon) 08:18:16 No. 7607 [Reply]
How would one theoretically cash out money out of stolen Russian credit cards without possessing names/addresses or phones associated with them? What if said person was theoretically willing to share a lot of said cards with helpful Anons?
2 posts omitted.
>>7676 State employees and their families. Don't think I have anyone big but if I did I wouldn't know.
this is Putin smiling! lol
>>7687 united russia parliament then?

(218.79 KB 600x600 CommunityEditionUBports.png)

The Pinephone Anonymous 05/18/2020 (Mon) 09:17:14 No. 114 [Reply] [Last]
>what is the Pinephone It's an open hardware phone that runs specialized Linux distros with touch friendly DEs, you can also just install arch and dwm on it if you're insane. >muh privacy The phone has hardware switches that allow you to physically disconnect privacy infringing peripherals. >muh repairability Pine64 sells all spare parts for the phone, display module is 30$ for example. Battery is the same as a Samsung j700 and extremely cheap. >muh touch screen Pine64 is developing two keyboard cases. One is a clamshell PDA style, and the other is a slide out kb like the n900. They integrate directly into the phone since they will replace the backplate. >muh peripherals It has a 3.5mm headphone jack, which doubles as a UART port. It also has a set of pogo pins on the back that exposes an I2C bus. Charging is done through USB-C which also doubles as display out and OTG. >muh shady company Pin64 is not a company as such. It's a community run project where an entrepreneur from HK supplies hardware, and the community gets to buy it at very low cost and do whatever they want. They donate much of their earnings to open source projects, and use the rest to develop new devices. >full specs and more info https://www.pine64.org/pinephone/ >wiki

Message too long. Click here to view full text.

71 posts and 10 images omitted.
(137.11 KB 322x320 ClipboardImage.png)

>>7464 Wow very beautiful
>>7464 >bad pics are black gorilla niggers in bad lighting >"good" pics are mostly light skinned mutts in good lighting such technology <second pic Some based intern must have snuck that in because that's a comical lack of self awareness.
>>7464 It's just niggers, fags and cripples from here on out until the end of time, isn't it?

[ 123456789101112 ]
Manage Board Moderate Board Moderate Threads