As you get older you will realize that you were not nearly as clever as you thought you were. It will dawn on you that people were seeing right through you and, if you are lucky, you will cringe and facepalm and learn from the painful memories of those times when ...
Hi guys, I'm the new board owner. I claimed this board because it was dead and there aren't that many alt /tech/ boards on the intertubes. I'm planning on bringing new life to this board, shilling it a little here and there.
But enough about me; what do you think of this board? Any change you would like to see? I already removed all the bans and the captcha and stuff like that.
Instead of going out of the way and making extra unnecessary effort to write a garbage fail web site, why not stick with standard HTML forms and POST and always Just Work on any fucking browser made in the last 20 years?
>>14056 I filled out the paper Census form instead.
>>14166 I also file paper tax forms.
js sucks, but it's not the main issue. The main issue is that citizens should be able to comply with the law without needing a computer. My worry is that paper forms for stuff like this will no longer be used in 10-20 years.
A static IP is always better unless you are attracting some unwanted attention. Even then, a dynamic proxy in front of the static server is the modern answer.
I've run stuff back in day from home, including an email server. In today's world, it's a really bad idea. Especially so if you are trying to learn how to run something like this securely. Or, even worse, just starting out. For $5 a month you can fuck around on a low-end server with the OS of your choice off site. There's even cheaper solutions out there too. That way, when someone pwns your shit, at least your home stuff is not wide open to them.
If you want to run something strictly non-public from home, then what you want to learn is fwknop. And, probably, keep it dynamic as well.
Hak5 Rite Aid Used Facial Recognition Cameras; BootHole Hits GRUB2 - ThreatWire 10,663 views•Premiered Aug 4, 2020 https://youtube.com/watch?v=OIk58iXtUwQ [Embed] "Three have been arrested for the twitter hack, the BootHole vulnerability creates bigger problems, and Rite Aid used facial recognition technology in hundreds of stores!"
Satellite Comms Can Be Hacked; Intel Source Code Leaks - ThreatWire https://youtube.com/watch?v=HdfXpxVM0IE [Embed] 9,698 views•Premiered Aug 11, 2020 "Intel Source Code is Leaked, I’ve got news from Black Hat and DEF CON, and the NSA Warns of Location Data Exposure! "
I have Tor Browser which runs its own Tor instance. I also have Tor explicitly installed on my Linux system. Should I start up and run the Tor service in addition to using the Tor Browser, even though I technically don't need to? Is this more secure and robust and, if so, why?
Edited last time by _ on 08/05/2019 (Mon) 18:21:34.
if I want to run a home server for e-mail and streaming a video from the server to say my ps3 or something, do I need anything special? is there a good guide for retards? I have a spare computer and I'm tempted to run a debian server on there but don't really know what to do past that.
any tips or pointers or links to related materials would be helpful and appreciated. and trust me when I say I'm retarded and don't know where to start.
Anon, how secure is an untouched Linux (Mint for example), despite possible integrated security flaws? I am relatively new to Linux and overwhelmed by hardening a system although I found some good hints in this bread. But I am afraid to tear holes in my system. Where do I start learning about Linux security and Linux in general? Do I really have to read a 400p handbook about Linux file system etc? ATM I am using Linux Mint, but looking for a non-systemd distro.
When creating an imageboard site, how do you: 1. Protect it against severe Layer 7 DDoS attacks (which are far more complicated to fight than the normal Layer 4 attacks because VPS providers only protect against the latter) without relying on Cloudflare shit 2. Protect it against spammers who use a script utilizing a paid captcha solving service, rendering (built-in) captcha protections useless I've thought about this a long time myself and even asked imageboard software devs themselves but nobody knows an effective solution. I guess Layer 7/application layer DDoS attacks (which use the URL, not the IP) could be prevented by going .onion-only (which means it'll never become a busy site) but that still leaves the spamming problem.
>>14273 Older and simpler protocols that don't have the overhead of http, and that are much easier to write clients & servers for, and where those clients & servers can run comfortably on archaic/weak hardware that isn't full botnet garbage with bloated modern cuck OS on top of it.
And something that doesn't fail when connections timeout and host isn't reachable. NNTP is a good example here. You can make batch transfers instead of needing an active connection to a server, and the whole thing is a store & forward network, so even if some servers get DoS'd, the system is still running. The cunts would have to DoS the entire network that's distributed accross many countries and backbones, so they will just waste their time if they try. And there's also the option of doing out-of-band batch transfers (not on the regular network) to mitigate DoS at any particular node. Since the medium is text and it doesn't use much diskspace or bandwidth, you have a lot of options for viable alternative OOB solutions. That way you can keep nodes up-to-date even while they're being DoS'd, and when the cunts switch to DoS'ing a different server, the one they just left can come back online fully ready.
>>14263 As someone who runs a DDoS protection service (30k+ sites) I can tell you now that rate limiting is your best friend.
>1. Always use the latest stable version of Nginx. Learn about rate limiting in Nginx and connection limiting. This alone will stop the majority of L7 floods. You may want to have a look at OpenResty and learn a bit of LUA, it's a very powerful and very fast (when using LUAjit) way to customise Nginx to your needs.
>2. Use hCaptcha and not Google Captcha. Not only is it actually privacy respecting (or so they claim), but almost all of the paid captcha solving services don't work with hCaptcha. And don't think for a second that switching to Tor will block the L7 floods, because it won't. If anything. If anything, it makes it a lot easier to bring down your site because not only are you more vulnerable to L7 attacks, you are now once again vulnerable to L3/4 attacks.
Other helpful stuff: Just block ICMP all together, it's not needed and eats up your CPU. Look at Javapipe and their iptables blog post ti help you with blocking TCP attacks which can bypass regular L4 protection (also helps with L7 floods). Don't waste your time trying to block L7 floods with Tor. They can still bring down your circuits. The more threads/cores your server has, the easier it is to deal with L7 floods.
Remember that enough bandwidth will still bring your site down. If you have a 1Gbit port and someone is generating 1Gbps of L7 traffic, you will go down. If there's enough unique IP's and slow enough packets per second, you will go down.
Dear nodevs, As part of an ongoing struggle to maintain board culture and keep its best example alive, I have taken over ownership of this, yet another agdg bunker. As always, the board is a place to archive your progress and discuss all matters related to gamedev. This thread is for discussing the state of 8/agdg/ as a whole and planning for a more permanent place for us - especially with the ongoing removal of further boards hosting our bunkers. If you have any banners for the board, feel free to submit them here. They will be also used on other bunkers.
Western Digital used to make their own tools and utilities for their products, but now they're doing the third-party marketing-partnership fail dance with this sorry sack of shit. Instead of writing a basic utility to clone data from a competitor's drive to theirs, Western Digital puts a download link to this trial-version network-activation Acronis bullshit with a "30 day grace period" and whatnot, and then it doesn't even see the drive that is right there.
Instead of doing work, it's become all too common to look for a "win-win" partnership of some kind. If I adopted this line of thinking, then maybe instead of writing a couple paragraphs of text to post to an imageboard, I could "partner" with someone else to write them for me, and in exchange they could casually mention that if you're not quite up to typing something today, you can always swing by http://too-fucking-lame.to-do-it-yourself.com and we can work out a mutually beneficial deal!
I booted up under Linux and used dd like I should've in the first place. Fuck you Acronis, and fuck you for using them, Western Digital. Your drive better not start clicking like the brand new Seagate just did.
Fuck you in the ass with a ten-penny-nail-augmented baseball bat you condescending fuckwad. People whose code has run in ferrite-core machines have multiple computers and all flavors of OSes, even if they'd like to see gates and ballmer dead in a plane crash.
>>13939 Macrium Reflect is free for home use with no account required. It's the only "just works" solution I've found to full disk cloning and bootable backup creation on Winblows. It's also OEM agnostic unlike whatever horse shit you've been jewed into using. Try it out and thank me later, boomer.
>>13939 Solid choice on avoiding license-cuck software. I'd recommend clonezilla as a general use "cloning" util (aka sparse imaging) since it is filesystem aware and won't take as long for drives that aren't completely full and probably work better for inexactly matching drives.
Just hope your new drive isn't SMR since WD and Seagate are sneaking these fake drives into lots of product lines including the raid marketed WD reds.
Alright, could anyone give me a basic bitch primer on dark web for little babbies? My knowledge at the moment is limited to Tor, and the onion addresses for the hidden wiki, and the onion address for Endchan. I'm starting to realize given how every site I liked has been shut down, switched domains, DDOSed, put on watchlists, or made 'registration only' on clearnet channels (a sidenote: I would have thought this would have happen to the porn sites I visit, but oddly enough, those are A-OK on clearnet) that I need to go ahead and plan for the future and just move whole-hog to Dark Web. To those who wil say I'm a little late to figuring this out: you're right. Here's what I would like if anyone can supply it:
- What are all the darkweb channels? Tor, I2P, Zeronet, Freenet....am I missing any?
- Any basic tips on general usage/quickstarts for each channel. Pros/cons of each.
- Good starter websites for each. I'm particularly interested in news/forums, and any libertarian websites.
>>13454 So Tor is basically the most secure because it's the most supported by non fed routers, that said there are enough owned routers to establish a complete chain on fed routers to locate a hidden server. So Tor really only protects users but services are still vulnerable. That's why anons are scrambling to establish a platform that's decentralised to stop censorship. However no anons want to host that shit just in case they get in trouble or are the one to be made an example of. To say Usenet and other newsgroups have run strong since fucking forever it really makes us look like a bunch of dumbshits. NNTPchan was an effective step in that direction but the format and non-centralised nature of it seemed to put off the less technical. So basically, until hosting has been figured out it's easier to just use Tor to browse clear web.
>>1379 Oh shit I thought it was fine because often I always see in any privacy sort of discussion various people basically concern trolling and saying "tor is comped" and whatnot. That back and forth is so common I thought it would be ok to have that stream of conciousness. Will post on /h4x0r/ but I am not even a skid so now its migrating info into the point I will fuck that up too. I tried enjoy the info and thank you so much for sharing the info you find sporadically. Not to mention the endwall repo and hidden service,
If i am not mistaken this board all of it started from you dumping your tips on /tech/. It was a derailment a burst I shot my load too in this thread so I thought it was in the flavor of it all but I am a BO too so I understand keeping it orginized lel.
You need the quotes for it to work, but this is an acceptable method for searching for youtube videos from the terminal. I've also made a tool called ytsrx.sh that performs a search using youtube-dl from the command line behind torsocks. Forked from tubesearch. Available in the usual locations.
Is this really that easy to setup? I compiled the thing and followed the guide. While it seems to work, I can't connect to any .loki address, even the test one from the guide. It just keeps exploring the network and then throwing "invalid pkt". I dunno, maybe i'm just retarded, but I can't get this thing to work.
>>13249 Ok, update. I finally got it to work sometime ago and i got to visit only 2 sites (links to anything else don't work, but maybe it's because of constantly changing things between releases, so whatever). But I wanted to test if i can stream some video over this and ffs i can't connect to the server no matter what. They're literally running the same code from master and dns just can't find the address (i've followed the guide on lokidocs and everything works locally and through i2p, so it's not my end). Also accessibility of other addresses like the wiki is spotty at best, so I hope it's just because of the early stages of your work, otherwise it's just a broken piece of shit.
>>14257 CCC died years ago like many other hacker conferences (actually does a single one remain?) when they completely caved in to the deranged leftists, feminists, and sexual perverts that have been infesting IT and Open Sores more or less in-crescendo for the past 10 years or so
since 32c3 or so it became obvious to anyone that technical topics were no longer the focus, with openings/closing keynotes strongly biased toward left-wing political bs such as climate alarmism, muh rapefugees, the behaviour-policing co-option of open sores projects and associated communities, etc. and even full presentations explicitly dedicated to feminist or neo-marxist propaganda
CCC is long dead, there should be no surprises that its corpse continues to decompose
but apart from all that evil, i have to laugh when i read that vc was beaten by some wymen. i hope he gets his lawyers to thoroughly fuck them in the ass but he still should have fought them back, or was he attacked by men too? how large was the mob
(Press the download button to download the .mp3 for the safest way to listen. Ye can also stream the .mp3 if ye set yer TOR Broswer's setting to Standard Safety in yer preferences or listen on a JS-enabled browser. But this be not the most op-sec tight way to listen
CaptainBlackbeard strongly advises against downloading anything from the Dark Seas for any reason. But mp3s be relatively harmless and will corrupt if anything nefarious be within them.)
Main Event: Apollo Creed (C) Vs. Rocky Balboa for the World Heavyweight Title
Join us for the first Super Fight in Dark Seas History as the greatest heavyweight champion boxer of our times Apollo Creed (47-0) takes on underdog club fighter Rocky Balboa (42-20) in a once in a lifetime shot at the greatest championship in the world!
CaptainBlackbeard Radio returns on Americas Birthday with our most high energy audio release yet! Join yer host First Mate Harry Stash as we take ye on a psychedelic audio journey through the Dark Seas!
This is a feature motion picture length three hour episode generously sponsored by Versus Market the top futuristic Dark Seas Market for all your Dark Market needs! This is the first professionally produced and sponsored broadcast in Dark Seas history!
Please Upboat For Visibility
In This Episode
- CaptainBlackbeard Saves America over the July 4th weekend
- Find out who really killed Tupac Shakur and what happened that night
I'm going to provide my definitions without referencing any material. This is in a personal computing context:
Privacy: What I do on my local computer only I know, the files I read from my local hard disk, the computational operations that I perform, the text files I create, the commands that I input are known only to me (the user). These operations, inputs by keyboard and outputs to my screen / monitor are known only to the user, only I know what files I observed, how I interacted with them, edited them or saved them, and what commands I inputted to the keyboard to perform these actions. Local files and operations on the personal computer are known only to the current user, and are ephemeral and gone once the computer is power cycled, unless I specifically made a log of the actions and stored it to disk intentionally.
Security: Unauthorized users, programs, or processes are not able to access read, write or modify, or know the contents of files or operations performed on the personal computer. Remote computer users can not access, retrieve, files or memory from my personal computer unless I have set up a server to do so and only within the context of the files being served. Other persons with physical access to my computing device can not operate, or retrieve files or information from the device without authorization.
Anonymity: Actions performed in public whether observed or unobserved, are either unnoticed, noticed but unreported, or noticed and reported but it is not possible to attribute the public actions to the source actor either due to lack of observable evidence, or the computational complexity. Public here means remote computers that my personal computer connects to via internet routing technologies. Public access from my computer to another computer system hosting files or serving files and content via the internet. Actions could include retrieving files, modifying files, or reading and posting text to a remote server by way of programs running on my personal computer.
People accusing each other of not grasping the separation or overlap of these concepts is perennial (comes up often). So I figured this should be sorted out in it's own thread. Post any additional definitions or links to proper definitions below.
Privacy: clean computing, no malware, no keylogging, no system logging. No shoulder surfing. No cameras in your room. No microphones in your room. No screen captures. No position tracking. Public Key Cryptography for messaging (RSA).
Security: Strong passwords, username/password access authentication, file permissions, Strong Encryption, Encrypted file systems, Encrypted files and folders. Firewalls, Access Control. Physical locks on your room, front door, windows, bars on the windows, physical key lock on the computer.
Anonymity: Face masks, hoodies, wigs and sunglasses, motor cycle helmets, black track suits, camouflage. Tor, I2P, Proxies. Typewriters, cork bulletin boards with tacks and push tacks, No cameras, no voice recognition, no facial recognition. Dead drops of floppy disks and USB sticks, SD cards. Sneaker nets. Voice modulation/ modification dsp technologies, talking like Batman etc. Text to speech...etc.
I feel that personal computing privacy is the root of the other two concepts. If there is a key logger or other related malware on your system (screen shot grabbers etc), your passwords are not secure (system and encryption), your actions and intentions are known, and your "Anonymous" discussions online through IM and message board posting, and potentially offline (dead dropping your manifesto that you typed on your computer) are also observable.
Privacy: When I'm in my house I draw the blinds on my windows, and I can go into my shower, strip my clothes and shower naked, nobody can see what I'm doing except for me. My walls form a visual privacy barrier, the running water masks the sound of my humming and whistling. (Thermal imaging cameras can defeat this form of privacy).
Security: While I'm showering upstairs a delivery man comes to the door with a parcel, he rings the doorbell, and nobody answers, from this he infers that there isn't anyone inside, and he tries the door handle to open the door. It's locked with 2 deadbolts, so it doesn't open. There are no open windows, and the windows are all barred up with security bars. (Brute force or lock picking can defeat this form of security).
Anonymity: After finishing my shower, I open the front door and take the parcel in, and open the exterior, inside is a note with an address and some instructions, and another parcel. I put on a wig with a fake mustache and beard, sunglasses and a hoodie. I put on a black track suit and a motorcycle helmet, and go outside to my motorcycle and then I change the license plate to another stolen license plate belonging to another motorcycle owner that I stole earlier that day (borrowed). My motorcycle is the most common manufactured brand, model, and color averaged over the last 10 years. I proceed to drive at the speed limit to arrive at a house address mentioned in the note, to deliver the parcel that was placed at my front door by the delivery man. I place it at his front door in a special lock box, and then I drive home. Unless I was followed, hopefully the entire transaction was anonymous. (defeated by being tailed, traced, tracked, or by camera surveillance network).
Regular anonymity for most people, means walking out your front door with no face masking apparatus, jumping in your car (with your license plate), going to the store, buying milk, being on camera, paying with a credit card, and driving home. But nobody cares, since everyone needs food right? You are just one of many food eaters, not very unusual, so it goes unnoticed / unreported. (What most people think the internet is like...until you find out your were very wrong and uninformed about the danger...).
What's the safest possible way to browse the internet anonymously and safely? There's a thread on /tech/ with the endwall developer talking about proxychains, and that seems pretty cool. Some of the links to proxy lists seem dead, and I have found some online but why should I trust these random 'free' proxies?
What about proxychains over VPN? I'm currently using Mullvad which is alright, and I'm curious about more security if need be. Does a VPN -> proxychain -> TOR connection work? Sounds horribly slow in theory, but I think we all know that privacy comes at a cost in our current world.
I suppose I could call this a 'VPN/proxy/TOR general thread.'
Use Digital Research DR DOS if you don't like Microsoft. I have retail copies of MS DOS 5.0 on 5.25" floppies from 1991, and MS DOS 6.22 on 3.5" floppies retail from 1994. NSA\CIA\FBI etc don't have a time machine and can't time travel and insert malware into the base system retroactively.
DOS is a Single Tasking 16 bit Operating System programmed in x86 assembly; only 1 process on the top of the stack at a time. No keyloggers, runs in 384 KB of memory.
You'll have to audit 2-3 pieces of software ( a driver for a 3com or Intel NIC, and links 2 browser ) and compile using Borland Turbo C, or get a GCC compiler for DOS. www.delorie.com/djgpp
Get a 486, or 386 with 16MB RAM install DR DOS or MS DOS, a NIC, a packet driver and the binary for Links, or compile it your self, set it to route through port 9050 on your tor router (running on Linux/UNIX). With that you'll be free to post whatever you want, nobody will know what you're doing on your computer, and if tor (or whatever comes next) works properly, then you'll be anonymous.
Free to read what you want from the internet, and post what you want to the internet.
>But but it's not FREE software, > It's not GNU. Precisely, I don't get copyright (legal) freedom, but I get actual (physical) freedom in the real world. > But you could download an exploit; your system isn't secure.
Don't download and run anything from the internet on the DOS computer if you want it to remain with integrity. Just text reading and posting. Use it as a communications tool. Build a different computer for DOS gaming or use DOS Box on Linux/UNIX.
The ultimate step is to build an 8-bit computer with a soldering iron (RC2014), launch a browser in a community audited version of CP/M, connect by socks 5 proxy to a unix computer running tor with 12-15 hops, and use a text browser for the web and and irc client in text mode. Proxy out to Tor or I2P or whatever the next super duper anonymity router is. In the mean time do this with DOS. This won't be a solution for the everyman or for the newbie, but it will be a solution for the serious thinking man.
>>1541 Anything you can do to isolate the tor daemon from the system or its running processes will help. I'm running it as a user with a custom torrc. If you can first run firejail or bubble wrap, or chroot it and get the tor daemon to still function it might help. I consider the linux/unix environment potentially hostile to the user and a potential source of packet inspection. Basically linux can be used to keylog the users and destroy the anonimity factor in real time or in post analysis. If there is key logging with an output beacon on your machine, you don't have privacy, and Tor Browser isn't going to help you with anonymity. If there is malware that can mess with the tor daemon as it's running, then it might be wise to try to isolate the process, so yeah probably a good idea. I'll try running it with firejail it probably won't work. If you get a setup like that and find it beneficial, please post the steps and instructions here. Thanks.
>hurr durr js bad >yet somehow does not have any problem with this horseshit where if JS is off and you press post and it opens a new page to fill out a captcha which if you fail you have to go back and hit refresh >hurr durr js bad >yet somehow does not have any problem with what happens when you disable JS on 8gag: the post button opens a download dialog to get a text file saying "please go to https://sys.8kun.top/dnsbls_bypass.php to fill out a captcha" <hurr durr thats only 8kun >it was like that on 8gag since the beginning >8cuck has also pointlessly required referer [sic] header, which is the sole reason (((googzilla))) waited until 2020 to deprecate it >instead of proper style everyone and their dog has been able to get right since the 90's: having a captcha right under the post field >also requires cookies whereas above would only need a cookie if you want to post twice with the same ephemeral session
>>14153 Welp, I'm really scratching my head on this one.
1) The Mac gives me "Select CD-ROM Boot Type" error and while I keep reading 'lol, just hold 1 and press enter at the exact right time bro' I can't seem to press return at the correct time, the 1 bit works because it shows as the selection so at least in theory it should work. Will probably try this a hundred more times. 2) I can't seem to make a bootable usb from the guix iso, so installing on another system and just inserting the drive is a no. UNetbootin is normally a sure win but I'm getting nowhere.
>>14128 I am using Trisquel currently. It actually stalls for like 3-5 minutes every time I shutdown whilst it waits for all the systemd networking to hang itself. Not a comfy OS at all. Thankfully they switched to MATE though, because current GNOME is a fucking joke.
I'm at a stand still currently. The Mac must be in worse shape than I thought. I tried just using my current drive which is efi but no good. So I thought of trying a Mac osx install DVD, no good, still gives the bug. Basically, unless I can figure a way around this fucking bug, this thing is never going to boot anything.
Does anyone happen to know, is there anything different or special about the efi a Mac needs versus PC? I don't think so myself so I'm wondering if there is a problem with the drive cable in the Mac.
My other option is libreboot which would solve the disc bug but I need a r-pi or something to flash the board.