[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip / qa] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


File: 1713281178516151.jpg (507 KB, 3852x2172)
507 KB
507 KB JPG
>>100019893
This isn't your jobs thread or cert thread, it's a group therapy session. /Cyb/er/sec/urity/pri/vacy general is for the discussion of anything and everything related to cyberpunk culture, cybersecurity, and digital privacy.

--[/Cyb/erpunk]-----
The FAQ: https://sizeof.cat/post/cyberpunk-faq/
What is /cyb/erpunk? https://pastebin.com/pmn9vzWZ
How do I into /cyb/erpunk? https://pastebin.com/5tpNFQds
Huge list of cyberpunk media: https://sizeof.cat/post/cyberpunk/
The cyberdeck: https://pastebin.com/7fE4BVBg
Cyberlife: https://jinteki.industries/files/cyberlife.7z
Bibliothek: https://www.mediafire.com/folder/4m5hd2065hde8/Bibliothek

--[/Re/verse Engineering]-----
Getting into /re/: https://wiki.installgentoo.com/wiki/Reverse_Engineering

--[/Sec/urity]-----
"Shit just got real": https://pastebin.com/rqrLK6X0
Cybersecurity basics: https://wiki.installgentoo.com/wiki/Cybersecurity_-_/sec/_guide
and armory: https://wiki.installgentoo.com/wiki/Cybersecurity_-_basics_and_armory
learning: https://wiki.installgentoo.com/wiki/Cybersecurity_-_Learning/News/CTFs
Reference books (PW: ABD52oM8T1fghmY0): https://mega.nz/#F!YigVhZCZ!RznVxTiA0iN-N6Ps01pEJw
/sec/ PDFs: https://mega.nz/#F!zGJT1QQQ!O-8yiH845GN26ajAvkoLkA
EFF anti-surveillance: https://ssd.eff.org/
Other library: https://mega.nz/file/UCgEGAjb#rwNcnMAQCUUbSp8supsFvn9QEHCWUW86eLcZa16ZG4Y

--[/Pri/vacy]-----
Tools: https://www.privacyguides.org/en/tools/
Hitchhiker’s Guide: https://anonymousplanet.org/guide.html
Hardware: https://ryf.fsf.org/products
Frontends: https://wiki.installgentoo.com/wiki/Privacy_friendly_frontends
OSINT Guide: https://inteltechniques.com/index.html
Firmware: https://libreboot.org/
RMS: https://stallman.org/facebook.html

--[/hmg/ Hackerman General]-----
VM/CTFs:
http://overthewire.org/wargames/bandit/ - easy beginner
https://www.vulnhub.com/ - prebroken images
https://www.hackthebox.eu/ - super secret club
Huge info dump: https://hmg.neocities.org/
>>
Reposting the updated Data Broker Removal Links:
https://pastebin.com/VqhVzfwe
>>
>>100136047
I dare /g/ to hack me
>>
>>100137022
sometimes i forget that the majority of /g/ is just retard teenagers like you
>>
skid general
thanks for stopping by
>>
>>100137083
Thanks for stopping by >>100137096
>>
>>100137152
that's right nigger
wait until the thread has reached bump limit and is on page 10 before you make a new one
>>
>getting cs degree in a month
how can I get into cybersecurity fast? Software engineering is so fucked in the US
>>
>>100137354
It was at the bump limit retard
>>
>>100137442
you conveniently missed the other half of what i said you mongoloid
>>
File: Jen.jpg (399 KB, 750x1000)
399 KB
399 KB JPG
Threadly reminder to read Fisheye Placebo
>Living under an authoritarian regime is not fun. Extensive censorship meant no Facebook, no Youtube, and no porn.
>Fortunately for Vance, being a hacker makes scaling the Great Firewall a walk in the park. With the free web at his fingertips, Vance should be happy but he’s not. Maybe there’s something missing in his life that porn just cannot replace.
>Maybe it’s a girlfriend.
>So it’s not weird at all to hack into the university to assign himself a hot female roommate, right? >That’s just taking fate into your own hands, or something along those lines, right?
>Too bad fate had other plans in mind and Vance is dragged into a crazy conspiracy to overthrow the government by his most-definitely-not-female roommate.
https://www.yuumeiart.com/fisheye-placebo-chapters#/fisheye-placebo-intro/

Also I want to correct Jen's dykeness with a rough dicking!
>>
>>100137354
You'll make a great hall monitor when you enter high school next year.
>>
>>100139375
you should tell an adult the adhd meds are making you impatient
>>
>>100139513
cool, and bumped
>>
>>100139558
>bumped
funny since you were talking about hall monitors a few minutes ago
>>
>>100137356
TryHackMe junior penetration tester path (do the basics before it if you don't have a background in IT) ----> Some Practice on TryHackMe ----> HackTheBox Academy ----> HackTheBox Boxes

I'll add to this and say check out this course:
https://academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course

You can also look into his associated certificate. It's basically a cheaper, and a bit more realistic exam than the OSCP in regards to conducting a pentest end to end. His certs are becoming more well-known in the industry. I work with people that got them.

I'm not a shiill. TCM helped me pass the OSCP back in the day.

Pro tip: When you do hackthebox, finish one, then watch how someone like ippsec did it to learn how someone better approaches the same target.

Stay away from MSP. Your cybersecurity career is over if you associate it with the rushed work those places do.
>>
>Best case, you mirror what you need and terminate your connection, moving locations frequently and using different networks at different distances from your center point.
Like how a drone could? Hehehe.
>>
>>100140511

drones are so game changing fr
>>
I took a fat shit
>>
File: Windows_logo_-_2012.svg.png (8 KB, 1024x1024)
8 KB
8 KB PNG
It seems Windows is a security risk. In 2022 they patched a vulnerability that had already been used in exploits for 2 years:
>When Microsoft patched the vulnerability in October 2022—at least two years after it came under attack by the Russian hackers—the company made no mention that it was under active exploitation.
https://arstechnica.com/security/2024/04/kremlin-backed-hackers-exploit-critical-windows-vulnerability-reported-by-the-nsa/
>>
>>100140374
>Stay away from MSP.
why?

.t 3 years working at MSP
>>
>>100141830
It says why. Also, from the previous thread:
>shit pay/overworked/sweatshop
>>
Tokyo in 1999
https://youtu.be/4_7ZxRvu27I?si=nmoMMpKZzttRmcuL
>>
>>100139574
That wasn't even me responding to you. Either way, if you want to see desperation, please check your nearest mirror.
>>
Russia is blocking 150 VPN providers while at the same time having the highest growth rate of VPN use in Europe.
>>
UnitedHealth Group insurance company got ransomwared:
http://archive.today/7I17j
>>
Bump.
>>
>>100140374
Other than this good answer >>100140374
I also suggest having a blog with your writeups and to participate in local CTF tournaments.

Thanks to CTFs and HackTheBox in general i now work as a penetration tester full remote in Italy at 20 years old. This sector is new, nobody gives a shit about degrees because they don't teach anything about hacking. For now, what you need is being able to hack and a way to show it off.
>>
=== /sec/ News:
The rot has just about reached the core.
>German staffer in EU parliament arrested on China spying charges
https://archive.is/rW9GF
>The arrest is the latest of several cases in which alleged Chinese spies have been unmasked in high-level parliamentary positions, including in the UK and Belgium, which have put European security authorities on heightened alert over Beijing’s increasingly aggressive attempts at political subterfuge.
>In recent weeks, German intelligence services have warned of a deteriorating security situation, with both China and Russia increasing their efforts as they seek to gain economic and technological advantages from, and political influence over, Europe’s largest economy.
Deteriorating? Seems the Germans have belatedly realised the full scope of the rot.
>The spy scandal is not the first to entangle the AfD: the party is still struggling to move on from accusations against its second candidate on the list for EU elections, Petr Bystron.
>In Belgium, members of the far-right Vlaams Belang party have been accused of working for China.
One may wodner then if also other parties are affected or if they have been shielded from publicity. After all the right wing parties are rather small.
>>
File: 4Cyb-DCR_bumpo.jpg (349 KB, 1000x667)
349 KB
349 KB JPG
>>100142581
Nice video. Make me wish I had gone there when I had the chance.
================================
Special Report:
"Hostile" Israel possesses "the third most aggressive intelligence service against the U.S.," says secret assessment.
>https://theintercept.com/2015/03/25/netanyahus-spying-denial-directly-contradicted-secret-nsa-documents/
=============Music===============
>https://youtu.be/9FvvbVI5rYA
============Video================
How /cyb/ must deal with it's enemies:
>https://nitter.poast.org/disclosetv/status/1782774321695383977
>>
>>100141491
Microsoft is so busy cramming ad space into literally every UI widget it can't even stop to think about the way it's sowing the seeds of a wholesale conflagration of the whole concept of desktop computers
In five years the market will be split between thin clients and dockable phones with nothing left in the middle
>>
>>100147079
The solution is simple, murder every single kike and leftist.
>>
>>100142581
why do people like this soulless shit?

is >>100147303 a bot? if not... did you try reading what that anon posted?
>>
>>100147132
Whoa, it jumps!
>>
>>100137354
stop being a dick to other anons
>>
>>100147425
>why do people like this soulless shit?
NTA but I used to work in Japan and visited Tokyo many times. On the surface, Tokyo looks like a concrete jungle. Look closer, and you will see that the city is more of a chaotic conurbation of numerous small villages. You can exit for instance Ueno station, and within a minute you are in comfy and quiet back streets away from the hustle and bustle of the main streets. There are hyper modern cities where 10 minutes on a bicycle takes you to farmland where the farms look like they did in 1700. Once side of a block is a quiet backwater, the opposite side looks like it is straight out of a Wm Gibson book.
>>
>>100136047
Very nice OP image!
>>
>>100148633
>conurbation
I have never heard this word before and I already like it
>>
Is uMatrix still safe to use? It hasn't been updated in three years which makes me kind of nervous.
>>
>>100149785
it hasn't been updated because the dev incorporated the same feature into ublock origin, making umatrix redundant
>>
>>100149858
I'm well versed in uBO's advanced mode, but let's not kid ourselves, it doesn't have the same matrix-style UI which is very helpful in drilling down which type of requests you want to allow or deny (JS/XSS/CSS/objects/media/frames). uBO is pretty much deny for JS/frames and then noop what you want to allow. Really not the same level of granularity. If Gorhill would simply incorporate that UI into uBO, I think that would solve a lot of issues.
>>
man conurbate
>>
Might be interesting to some:
>>>/pol/465941024
>>
>>100147858
the one being a dick is the nigger who acts too important for 4chan norms and must make his new thread early you retard
>>
>>100150817
my norms :( :(
>>
>>100150817
>muh norms
I've been here for over a decade, and I've never heard of any norm that suggests you have to wait until a general is on page 10 before creating the next one.
>>
>>100150805
The videos are sus, but the poster is also obviously religious and into occult.
>>
>>100150805
the user was created in 2023, retard
why are you linking to schizophrenic threads? you could try AT LEAST checking that shit yourself
>>
>>100151382
>the user was created in 2023
And?
>>
File: 4-cyb-SAC2045-no.love.jpg (53 KB, 711x400)
53 KB
53 KB JPG
>>100149034
OP is away on very important cyberbusiness, (I think he's having Elon insert a 4TB eMMC upgrade into his brain) but I will let him know you liked it.
>>100149924
Based uMatrix enjoyer.
>>100150805
Speaking of /pol/, this got posted there early this morning:
'A young cybersecurity research firm founder has died after she spent several days fighting for her life from being struck by a speeding SUV on the Upper East Side:'
>https://nypost.com/2024/04/11/us-news/nyc-start-up-founder-sophia-dantoine-dies-after-being-mowed-down-crossing-ues-street/

Here he is being interviewed a few years ago:
>https://youtu.be/u5rJRJb-fSc
"Honestly I don't think I'd be in [cyber]security today if it had'nt been for CTF..." -Sophia d’Antoine.

'This conversation was recorded as part of the NYU Cyber Fellows course for Introduction to Offensive Security. The aim of this conversation is to capture a perspective of an expert in the field of cyber security. This perspective helps those who are just getting started to understand the industry. Sophia made a name through capture the flag competitions and professional program analysis. Her deep technical skill and understanding of binary reverse engineering is truly inspiring.'
=============Music============
>https://youtu.be/n9ESEE3bRSM
>>
>>100151664
Gang stalking or... Just kidding, there's no such thing, it was either a boomer or an Asian lady.
>>
>>100140374
>Pro tip: When you do hackthebox, finish one, then watch how someone like ippsec did it to learn how someone better approaches the same target.
what if I can't finish one
>>
File: 4Cyb-DCR_WhatDo.jpg (52 KB, 711x400)
52 KB
52 KB JPG
>>100151751
The article says it was a 72 year old, habitual speeder who killed the young woman, who was only 30. /pol/ thought it might have been an assasination, due to something she might have uncovered, but there was no posted evidence to support that claim and the thread died early.
>>
>>100151664
>Based uMatrix enjoyer.
The irony is that uBO and uMatrix used to be the same extension many years ago.
>>
Updated Firefox Zero user.js
https://pastebin.com/iMh3rxHi
>>
>>100153880
Thank you anon!
>>
>>100149924
I agree, uMatrix being abandoned is a real shame.
>>
Uhhhhhh... bump?
>>
https://wiadomosci.onet.pl/kraj/zglosily-molestowanie-w-zandarmerii-wojskowej-byly-inwigilowane-pegasusem/dylyrsv

turns out filing complaints with your boss can result in your own nation state hacking your phone
>>
https://blogs.nasa.gov/voyager/2024/04/22/nasas-voyager-1-resumes-sending-engineering-updates-to-earth/

Who can top this hack? Who among you has ever completed such a righteous hack?
>>
>>100155726
Ew, no thank you
>>
>>100156241
Rude!
>>
>>100151877
>The article says it was a 72 year old, habitual speeder who killed the young woman, who was only 30. /pol/ thought it might have been an assasination,
I am sur ethey would
>due to something she might have uncovered, but there was no posted evidence to support that claim and the thread died early.
Do they ever need evidence?
>>
>>100156844
Hey man, don't diss pol. Not cool.
>>
>>100157010
The first time I read this I thought you were saying "don't piss in the pool"
>>
i wish we had a pool
>>
>>100150942
lurk moar
>>
>>100158942
>still no argument
feed and seed
>>
can i have 1 hacker bf please
where do i find one
no i'm not a troon
>>
=== /cyb/ News:
Also governments are realising the potential doom, and conscription is on the cards:
https://archive.is/tYhH6
Are you ready to serve?
>>
>>100158456
It's not good for your augs man, gets h20 in the brain jack.
Any fags ever consider doing projects together, like tryhackme or something?
>>
>>100159081
asl?
>>
>>100159081
Are you a girl, and how loud dew u fart?
>>
>>100159081
Fed
>>
>>100136840
>>100153880
Incredibly helpful resources, thanks!
>>
>>100136840
That's a loooot of websites dealing personal data...
>>
Yeah, those are public records, but you know what I mean.
>>
>>100161238
Most of those are just derivatives of about a dozen big ones. If you hit those, it will trickle down to the smaller ones.
>>
>>100162287
Ah!
>>
>>100156199
>he thinks space is real
kek
>>
=== /sec/ News:
This time, it is the management that will get it:
>NIS2, or How to Fight Them Cybercriminals
https://archive.is/LF50x
>The EU is at it again -- with unleashing a new raft of legislation upon world+donkey.
>The culprit of service is the second generation of the EU's Cybersecurity Directive (NIS2). The new legislation widely extends its scope to nearly any company with more than 50 employees and €10M+ in yearly revenue. On top of that, the number of industrial sectors which are deemed essential in terms of critical infrastructure doubles from 6 to 12, including ICT service management, government institutions, post and courier services, manufacturing companies, the food-processing industry, waste water management, space companies, research organisations and the chemical industry as a whole. Suppliers to these companies can also fall under the new regulation.
>>
>>100158456

it's on the roof
>>
File: 4Cyb-DCR_SchizBump.jpg (133 KB, 700x525)
133 KB
133 KB JPG
====ATTENTION: ATTENTION, PLEASE====
First, let me get this out of the way...
>inb4 go back to /pol/
My reply: Thank you for your contribution.
===============================
In about 10 minutes, (9 P.M. Eastern US time) Constitutional conservative talk show host Glenn Beck will be presenting some information about certain cyber vulnerabilites that may affect the outcome of the upcoming presidential elections. Supposedly, the info is new, and is not a rehashing of 2020. He's been hinting about this show for a while, but would not release any info until he consulted with a team of lawers and cybersecurity experts. You can read the description of tonight's broadcast here:
>https://youtu.be/FJer61LNVh8
According to him, he is waiving the subscription fee for access to the full-length special on his media site for 24 hours because, "...everyone *needs* to see this information."
>http://blazetv.com/Glenn
===============================
Hamamichi Piggumoto
Director, Deep /cyb/ Radio & TV International
====================
Get your popcorn ready!
>>
>>100151838
Start off with tryhackme or similar beginner's courses first.
>>
>>100136047
Perplexity.AI has had incredible growth the past few months; everyone should consider replacing their Google searches with Perplexity. It's essentially a ChatGPT powered search engine without the SEO spam of Google results.
https://finance.yahoo.com/news/perplexity-ai-valued-520-million-163110735.html
>>
>>100168926
based, I hope goolag goes bankrupt
>>
>>100169126
Ai will probably go down in history as what killed Gooogle, in just the same way digital cameras killed Kodak: in both cases the companies had a head start but the respective projects were killed off by management before the same technologies killed off the entire companies.
>>
>>100168926
There has to be a catch...
>>
I love cyberpunk sars!
https://files.catbox.moe/y7249h.webm
>>
What programming language is the most cyberpunk?
>>
>>100170403

brainfuck so no one knows what your code does. someone needs to write a python to brainfuck convertor.
>>
>>100159046
it's a command not an argument newfag
>>
>>100170549
Ahhh, it's a Linux reference, ya? I know Linux!
>>
>>100170403
68k assembly language
>>
>>100170403
C++ is used by the netrunners in the table-top Cyberpunk rpg.
>>
>>100170077
The first catch is that there is a huge time gap hidden between columns 2 and 3, which the interpolating curve masks even further.
>>
I'm trying to learn some reverse engineering, so I started learning about basic things for how programs operate like the stack, registers, context switching etc, but I realized I wanted to reverse engineering android applications (as well, on top of PC).

Anyone know any resources for that? from what I understand? I don't really need to learn asm for android apps because something something java smali JIT blah blah.
>>
>>100172467
From the OP:
--[/Re/verse Engineering]-----
Getting into /re/: https://wiki.installgentoo.com/wiki/Reverse_Engineering
>>
File: 1713044010798131.jpg (123 KB, 1024x1015)
123 KB
123 KB JPG
>>100136047
So i kinda slept on the privacy issues of discord, and may have left a pretty big footprint that's less than desireable.
Is it over?
>>
>>100172685
"But while it does not delete all data of deleted users indefinitely, content which remains usually is in practice difficult to delete, like hundreds of messages. Discord deletes data that identify the user to the leftover messages - like profile information. If the user left identifying messages, that's on them. If they want their data deleted, they have to delete it.

There's reliable concern over data selling because before Discord the CEO sold private data from his previous company. They are not the only ones in control anymore, but a whole board."

Thank you, Reddit.
>>
Pretty funny ham thread as a bump:
>>100167452
>>
>>100174629
Nice, I love HAM radios
>>
>>100174629
>>100174924
Neat!
>>
What is the best way to get started with HAM radio?
>>
>>100176401
>>>/diy/2785963
>>
>>100176470
Thank you, anon!
>>
I have a ssh server which is connected to an access point which is connected to a router which connects to the WAN.
I want to forward a port from my router to the ssh server.
If the server has password login turned off, only public key authentication, do I need to do anything else to make it secure?
>>
File: nothing_to_worry.jpg (826 KB, 1520x2688)
826 KB
826 KB JPG
>>100136047
Hey /sec/, recently I've been more aware of unlocking my phone and password manager in public or at my work place. You can easily protect yourself from "active" shoulder surfing by checking your surroundings before you enter the pin. But what about "passive" shoulder surfing, e.g. from a security camera. Up-close, high resolution, 360 degrees cameras have been (regrettably) around for years now. Subways, banks and offices all utilize these. Even if you trust the security and the operators of the system, what if the recordings are kept indefinitely or get stolen by a threat actor? The chances of this happening is, arguably, low. What irks me is the blind easy with which we accept this intrusion into our privacy.
In cases like these, where you need to access sensitive info in public, are fingerprint and face unlock actually more secure options? Should we defer from entering our passwords in public at all or strictly compartmentalize public and private devices, effectively restricting easy of use? Is this topic actually a non-issue?
>>
>>100176932
I think it depends on the country...
>>100170232
>>
how do i get an invite code for riseup? I dont have friends.
>>
File: catbox.png (25 KB, 838x438)
25 KB
25 KB PNG
>>100170232
>>
>>100177908
>>>/pol/466095185
But I also fart in your general direction.
>>
>>100176932
It's simple: never use any computers if there's no wall behind your back, and patiently wait for the impending prohibition of any cameras in public spaces. And of cameras in phones, too. Nobody needs them anyway. A-any year now.
>>
>>100174629
It is strange how people insist on remaining ignorant.
>>
Night is here and it is slow. You should know by now what this means: https://youtu.be/hjGZLnja1o8?feature=shared
>>
>>100168926
nah
>>
>>100182337
Why? I tried it recently and was completely blown away by it.
>>
>>100180528
Sure do!
https://youtu.be/fRmqBAJdQMM?si=DFbqQ6Zr6Ej1NoKF
>>
>>100182766
https://www.youtube.com/watch?v=aiY3gHELPzM
>>
NK hacking SK defense companies and more:
http://archive.today/42IQd
>>
>>100151664
she is hot
>>
https://arstechnica.com/security/2024/04/hackers-infect-users-of-antivirus-service-that-delivered-updates-over-http/

kek
>>
=== /cyber/ Headlines:
>School athletic director arrested for framing principal using AI voice synthesis
https://arstechnica.com/information-technology/2024/04/alleged-ai-voice-imitation-leads-to-arrest-in-baltimore-school-racism-controversy/
>Red Hat Offering Up To 4 Years Extra Support For RHEL7
https://www.phoronix.com/news/RHEL-7-Four-Years-ELS-Support
>Ubuntu 24.04 Official Flavours Available to Download
https://www.omgubuntu.co.uk/2024/04/ubuntu-24-04-official-flavours-available-to-download
>US 'Know Your Customer' Proposal Will Put an End To Anonymous Cloud Users
https://news.slashdot.org/story/24/04/25/210238/us-know-your-customer-proposal-will-put-an-end-to-anonymous-cloud-users
>>
>>100184114
She WAS hot...
>>
>>100184600
i realized after i posted that
worst part is that i knew her from conferences and shit...
rip
>>
>>100166137
Anon... you've been swimming in our water cistern this whole time...
>>
File: eggman chimney.jpg (20 KB, 287x181)
20 KB
20 KB JPG
>>100184896
>>
>>100176932
BLOCK WITH YOUR HAND NIGGA
>>
>>100185166
Anon... it's not our chimney... we are sharing a wall with an orphanage...
>>
>>100184441
>updates-over-http
Whoa.
>>
File: nigger.png (11 KB, 512x172)
11 KB
11 KB PNG
http is le bad
>>
=== /sec/ News:
>GitHub comments used to distribute malware
https://lwn.net/Articles/971008/
>BleepingComputer reported on April 20 that some malware was being distributed via GitHub. Uploading files as part of a comment gives them a URL that appears to be associated with a repository, even if the comment is never posted.

>A GitHub flaw, or possibly a design decision, is being abused by threat actors to distribute malware using URLs associated with Microsoft repositories, making the files appear trustworthy.
>While most of the malware activity has been based around the Microsoft GitHub URLs, this "flaw" could be abused with any public repository on GitHub, allowing threat actors to create very convincing lures.
>>
>>100186026
Quality post.
>>
20 years since Code Lyoko, one of the earliest series with a computerized virtual reality.
>>
>>100176932
A person should be able to input the password without having to type it manually like with KeePass
>>
>>100187489
Hey, I'd drink to that! *hic*
>>
=== /cyb/ News:
>Friends, filming for TRON: ARES started 100 days ago, and not only that, but it's almost over.
https://nitter.poast.org/Tron3AresMovie/status/1783422182942457973#m
>>
>>100189897
Awesome! I hope it gets as well adapted as DUNE
>>
File: 01110011.jpg (165 KB, 1600x656)
165 KB
165 KB JPG
>>100184114
She seemed to be intelligent, articulate and knowledgable. Such a shame to loose a QT3.14 /sec/sister like this. RIP, princess.
>>100187999
I'll drink to those trips, fren! *hic*
===============================
Updoot to >>100167439. It turns out that the vulnerability in question isn't a vuln at all per se, but bad ideas. The "some" Dominion voting macine software use an encrypted SQL DB to store tabulator data on a Win10 box, "protected" HAHAHAHAHAHAAA only by the Windows logon. The best part? The decryption keys are stored in PLAIN TEXT. A live demo was performed by several /sec/ people who confirmed the "hack" is easy, and anyone physical access to the box could alter the contents of the DB, thus changing the outcome of an election.
========VIDEO==================
Does that .PDF have a byruz? Is it a legit file, or some heckerman trying to grab your digial buttocks?
'This video showcases file visualizer a tool that can show you what's inside any file visually.'
https://youtu.be/3Qs9btR0Rpc
https://binvis.io/#/
========Music===================
>https://youtu.be/8kRCgU6ZNOw
================================
Deep /cyb/ Radio: Pentesting Ears, Hacking Minds.
>>
>>100190391
>https://youtu.be/3Qs9btR0Rpc
Ah, that was entertaining to watch as a newb. The channel seems nice.
>>
Boomp.
>>
Code Neon script update (Fastman/fastmaid movie)
https://litter.catbox.moe/mbkr45.pdf
As usual, the link will expire within 72 hours of this post
This draft is 99 pages (out of 133) with the cutoff about halfway through act 3 (out of 4)
There are numerous style and formatting changes to existing material, primarily within the first 30 pages

Finally, there's a soundtrack on the way
This track was written for the sequence starting halfway down page 7 and ending at the top of page 10
https://voca.ro/1lQblIQZtgxi
>>
>>100193338
Sounds like something from Dune 2 (the game).
>>
>>100137083
stopping by status: thanked
>>
Cybernews?
More like cyberblues!

Ain't got no money... ain't got no looove...
Ain't got no sweetheart... to call my own...
Ain't got no freedom... ain't got no peace...
And a black gentleman... stole my bike...
Papada papada papada... oh yeaaaaah!
>>
>>100170077
Nope
>>
File: 4Cyb-I.Dream.of.Wires.jpg (263 KB, 1304x797)
263 KB
263 KB JPG
>>100191101
Thanks for the positive feedback. We here at Deep /cyb/ Radio AM 404 & Deep /cyb/ TV Channel 4 - International, do our best to bring our community a wide variety of content. If you make a request for a particular type of content that is thread-related, I do my best to post more of that content, along with bump pic edit requests, time permitting and if within my very limited abilites.
>as a newb
If you enjoyed that video, you might also like this video on using Wireshark from the same guy:
>https://youtu.be/zWoHJ3oGRGY
Have a song on the house (just don't take the lyrics literally).
>https://youtu.be/dSCACJq2NRM
===============================
>>100193338
Based producer.
===============================
Music:
>https://youtu.be/VZL6qHFRqJQ
===============================
Deep /cyb/ Radio: /cyb/+/sec/'s favorite non-existent radio station, powered by cybd, the cyber radio daemon.
>>
=== /cyber/ Headlines:
>Hackers try to exploit WordPress plugin vulnerability that’s as severe as it gets
https://arstechnica.com/security/2024/04/hackers-make-millions-of-attempts-to-exploit-wordpress-plugin-vulnerability/
>Servo Web Engine Now Passing Acid2 Layout Engine Test
https://www.phoronix.com/news/Servo-Passing-Acid2
>FBI warns against using unlicensed crypto transfer services
https://www.bleepingcomputer.com/news/security/fbi-warns-against-using-unlicensed-crypto-transfer-services/
>Europe plans to build 100-qubit quantum computer by 2026
https://physicsworld.com/a/europe-plans-to-build-100-qubit-quantum-computer-by-2026/
https://tech.slashdot.org/story/24/04/26/2313254/europe-plans-to-build-100-qubit-quantum-computer-by-2026
>>
>Facebook loses $3.8 billion on VR
You won't plug ME in, corpo!
>>
Not with those shit graphics you won't you retard.
>>
>He was trying to buy 3032s for his motherboard clock... But i wasn't selling any.
>>
>>100184441

>not using https with cert pinning

ngmi
>>
Microsoft considered harmful:
>Microsoft needs to win back trust
>Years of security issues and mounting criticism have left Microsoft needing to overhaul its cybersecurity.
https://www.theverge.com/2024/4/25/24139914/microsoft-cyber-security-incidents-trust-report
>>
Speaking of VR, just found out that Carmack went to work for Facebook and right before leaving Zenimax he googled how to wipe a hard drive with magnets.
http://archive.today/paHye
>>
>>100202873
I mean at this point its no different from spyware
>>
>>100203262
Can't you just use secure erase? That's what I've done and it's supposed to be secure. Just run it a few times.
>>
>>100199564
someone redpill me on servo
>>
>>100200191
In the future, you will not get a choice. You have read Eudeamon, right?
>>
>>100200191
>Meta is losing a billion dollars on VR and AR every single month
https://www.theverge.com/2024/4/26/24142055/meta-is-losing-a-billion-dollars-on-vr-and-ar-every-single-month
>>
>>100203489
Slow going HTML renderer written in Rust with limited relevance.
>>
>>100168926
has it improved at all? I tried it back in January and about 75% of the answers were partially or flat out wrong. it was making up sources, books, and libraries that didn't exist to justify it's answer.
>>
>>100203776
I love Doraemon!
>>
>>100205373
C++ proving its better once again
>>
>>100206792
Yes, and Ladybird is hammering that in, as we speak. Rust made a lot of promises that they have never been able to keep, and the promises keep coming in still.
>>
>>100207075
Just like trannies promised that they could easily change genders now and yet have only increased their suicide rates when they realize the promise to become a woman couldn't be realized.
>>100197629
Long live /cyb/ Radio!
>>
>>100207139
Redox-OS was intended to save the world by being written in Rust, which also should make the programming fast and secure. Reality is that after 7 years it is less capable than Linux was after 4 years. They have had drama, purges and also one suicide.
Yes the Rust people keep maintaining they are so much better.
>>
>>100207139
>>100207139
Thank yeeu fren! As a reminder, there are many /cyb/ radios, but there is only one "DEEP /cyb/ Radio, AM 404 International". There is no other...
>https://vocaroo.com/1iqeZaX8gcHg
>https://youtu.be/Sm0VfsFikvc
=============================
Deep /cyb/ Radio: "Wanna kiss muhself"
>>
Seen this?
http://archive.today/2023.06.13-104904/https://crestresearch.ac.uk/resources/mining-the-chans/
>>
>>100208703
Yes and its disgusting. That's why the Internet is truly Dead
>>
>>100208703
Yes. It is yet another 'How do we kill off anything we do not like?' which there is an endless supply of.
>>
I started a fascinating book about Postmodernisn which deals with the issues with sjw and how they are used by the elites to their ends. Very insightful how they've been preparing this since the 60's
>>
>>100209245
It mentions how during the 60's there grew concern for the youth, that they would become an hedonistic, vain, capitalist society focused around consumerism over any real value as the first sjw started to appear.
That is pretty cyberpunk
>>
>>100209245
>>100209399
Any reason you wouldn't state the title right away?
>>
>>100209481
I don't want the glowies tracking me down but what the hell. Its "Cynical Theories: How Activist Scholarship Made Everything about Race" by Helen Pluckrose.
I find it funny how since the middle 60's they start to worry about the world becoming all about appearances and social influence with nothing deep underneath, perfectly predicting modern "influencers" and faggots
>>
Does anyone else here use FreeTube and is experiencing videos not load in their subscriptions at all? Just started today
>>
>>100209850
I prefer Invidious
>>
File: 1630066118253-0.jpg (47 KB, 468x487)
47 KB
47 KB JPG
The more I learn about information security, specifically network security the more miserable and paranoid I grow. How do you deal with this? Is there bliss in ignorance? Or should I go full tinfoil, ditch my smartphone and rip out my NIC?
>>
>>100210255
You should take a break, let the new knowledge settle, and have a fresh look.
>>
>>100209517
now read camp of saints and imagine the immediate future that is mix of the two with drones flying overhead
>>
You know, it just hit me that a drone in the sky is a very exposed target. Like a tank in a city, it can be hit from anywhere, a basement or a roof.
>>
File: 1714261750849396.jpg (114 KB, 1168x840)
114 KB
114 KB JPG
this general would use a skid tool to crack the password
>>
>>100137083
Wrong thread
>>100192529
>>
>>100211890
Bags of sand.
>>
while im saving up for OSCP, should i run HTB or HTS?
>>
>>100211890
042
>>
>>100210255
/g/ won't want you to know this, but if there's anything you should ditch it would be your desktop in favor of a GrapheneOS phone
>>
>>100211890
642?
>>
>>100211890
Just brute force it, it's only 1000 combinations
>>
How AI 'Understands' Images (CLIP) - Computerphile
https://www.youtube.com/watch?v=KcSXcpluDe4
>>
>>100212563
The point is to use your brain to solve it.
>>
>>100153880
based, this is much better than using memewolf
>>
>>100211925
That thread has more tech discussion than this one desu
>>
Fingerprint unlock is insecure shit, but I found an app that lets me enjoy its convenience briefly and turn it back off without deleting my prints. Highly recommended.
https://github.com/linux-colonel/AdminControl
https://f-droid.org/en/packages/com.davidshewitt.admincontrol/
>>
The future of tatoos is here:
>https://youtu.be/Bpy1zi07BKo
But wait, there's moar!
>https://mashable.com/video/electroconductive-ink-tattoo-monitor-health
==================Music===================
>https://youtu.be/uOJSE6mqkQI
-----------BONUS! Picrel Theme-------------
>https://youtu.be/ocLCLMZO6dc
=========================================
Deep /cyb/ Radio: Giddy up!
>>
>>100212327
You should have no difficulty deducing that 6 is not part of the answer
>>
>>100211890

042
Proof: exercise
>>
>>100209399
>concern for the youth, that they would become an hedonistic, vain
They hit bullseye on that. Strong men make a trong society etc. The decline is noticable for many already but not yet the majority of the population.
>>
>>100216316
It will be soon, gen alpha are all already fucking hooked to iPads and all forms of electronics which certainly is not fun, combined with the brainrot they are probably going to be inheriting their parent mental fucking illnesses

I pray to god that everyone in this thread goes outside, touches grass and goes to the gym to lead by example for their children

Listening to this and hacking AD is such a fucking blast, It reminds me of old memories
https://youtu.be/R3-MCEAmiaI
>>
File: tattooage.jpg (844 KB, 2048x1208)
844 KB
844 KB JPG
>>100213418
going to be like the tattoo studios in VIrtual Light.
tattoos with fine lines look like shit very quickly as the ink spreads out in your skin, I guess it's cool showing that it's possible though.
>>
I recommend this video if you're new to hacking or interested in certs https://www.youtube.com/watch?v=m4QO5jyEw2%45&t=117 You have to copy the link. Embed doesn't work.
>>
i gathered 3 kilos of mushrooms today
my neighbour had a visit from the police, but it's the road patrol, so maybe it's not mass mobilization for now
>>
>>100217106
I wonder how you came across this?
>>
>>100205644
Can you cite some specific examples with screenshots?
>>
>>100216443
Do you think they're making men into troons in order to weaken society? As you mention, strong men make a strong society.
>>
More than 117,000 customers of Amazon’s security camera company are eligible to receive refunds as part of a privacy lawsuit settlement.
>>
>>100218897
At least cite an article so people know more about the subject.
https://yro.slashdot.org/story/24/04/27/0537203/56-million-in-refunds-sent-to-ring-customers-settling-unauthorized-access-and-privacy-violations
>>
>>100218935
Retards with the Ring doorbell can search for the info themselves.
>>
>>100209850
Pulls Videos like Newpipe or Jaybird
Just an aggregator
>>
>>100146825
At what level were you good enough to get a job? I am able to pwn most easy boxes on HTB, but I'm not sure if I am ready for a job
>>
>>100218935
>slashdot
Better yet to use archive.is to make sure it is not memoryholed.
>>
i thought we used it to not give (((them))) any views
>>
Just keep my ports closed and I'm good, right?
>>
>>100221568
Yes make sure to keep ports 22 and 53 closed.
>>
>>100221607
better keep 'em all closed
>>
>>100197629
>Based producer.
Compliments passed along
There's more where that came from
Here's the main theme, written for scenes 2 and 3 (EST. THE CITY and INT. INTERNET CAFE)
https://voca.ro/1aZ72Wswz5Kk
We're debating whether or not the workout sequence needs an electric guitar
>>
The only port that needs to be closed for safety is the port of Bombay.
>>
>>100221799
Better discard the network card. With that the PC remains 100% secure
>>
Am I retarded or brilliant for making my PGP key with an impossible to remember password stored in keepass?
>>
>>100222483
Buy a thinkpad x230 and install heads. Write protect the flash chip. Put nail polish on the screws and take high resolution pictures to ensure signs of tampering. Do NOT use a HDD or SSD. They have DMA so a malicious firmware could do a lot of damage, use of USB is preferred since they do not have DMA. Completely remove the microphone, sound card, webcam and the WWAN card from the laptop. Remove the fan to prevent binary acoustic data transmission. Replace the default wifi card with a supported atheros card. Disable wifi when not in use, preferably by physically removing the card. Make your own independent Linux distro from scratch. Most Linux distros value convenience over security and will thus never have good security. Your only option is to make your own. Use musl instead of glibc, Libressl instead of openssl, sinit instead of systemd, oksh instead of bash, toybox instead of gnu coreutils to reduce attack surface. Enable as little kernel modules as possible. Use a hardened memory allocator. Apply strong SELinux and sandboxing policies. Restrict the root account heavily to make sure it never gets compromised. Disable JavaScript and CSS in your browser. Block all FAGMAN domains in your hosts file. Monitor all network requests. Do not use a phone. Never speak near anyone who owns a phone, they are always listening. Never use any non-corebooted technology made after 2006. Never leave your devices unattended. Tape triple layer aluminum foil all around your room as tempest shielding. Type really quietly as defense against audio keylogging. Use ecc ram to minimize rowhammer and rambleed. Encrypt everything multiple times with various different encryption implementations. Compile everything from source. Use hardened compilation flags. Always read through the source before installing something if possible. Only use the internet when absolutely necessary.
>>
>>100222723
It actually works! I learned about that in Death Note
>>
And don't forget the kitchen sink! :D

(master password written on a label on a sink as a fake product serial number)
>>
>>100222658
>using anything other than your brain to store passwords
ngmi
>>
Is there any point in trying to de-google by going Graphene, if I still have to use a gmail account for work, and I have a Pixel that I've already used with stock Android and that old google account? Will it even compromise my non-google accounts to google if I do so?
Like, is Google going to think "Oh john.smith stopped using the stock android device with IMEI 123 and is now logging in to Gmail from a device with Graphene, that means IMEI 123 is john.smith's Graphene now" and tag anything coming from it as being me?
Do I have to buy a used Pixel that's not associated with me to fully de-google?
>>
File: XV.gif (160 KB, 1152x900)
160 KB
160 KB GIF
Latest Ubuntu is out. ANyone made a /cyb/ spin of it?
>>
What happened to the OpenAI chat that you could access without an account? Now it's saying you have to register.
>>
>>100218522
why are you asking a troon?
>>
>>100225243
Because I am a troon too
>>
=== /cyber/ Headlines:
>Pegasus Spyware Used on Hundreds of People, Says Poland's Prosecutor General
https://yro.slashdot.org/story/24/04/27/2124238/pegasus-spyware-used-on-hundreds-of-people-says-polands-prosecutor-general
https://apnews.com/article/poland-spyware-pegasus-nso-group-israel-413bb3cb27daac011d52b524c6d16160
>US Post Office phishing sites get as much traffic as the real one
https://www.bleepingcomputer.com/news/security/us-post-office-phishing-sites-get-as-much-traffic-as-the-real-one/
>America's Commerce Department is Reviewing China's Use of RISC-V Chips
https://yro.slashdot.org/story/24/04/28/2235258/americas-commerce-department-is-reviewing-chinas-use-of-risc-v-chips
https://www.reuters.com/technology/us-is-reviewing-risks-chinas-use-risc-v-chip-technology-2024-04-23/
>>
>>100140374
>MSP
Managed Service Providers or something else?
>>
>>100146825
I'm just a little older than you and finishing a cybersecurity degree in Italy, bruh you are living my dream rn. Aside from studying for the degree I'm grinding ctfs like an autist.
Can you tell more? Like how did you get hired, what was your cv like, was it through ppl you knew or was it an offer made to you.
>nobody gives a shit about degrees because they don't teach anything about hacking
this is true, but look at it from another perspective, why would they
like imagine if each year there were hundreds of students basically capable to hack shit, nothing good would come out of this
would you say get OSCP and a good htb rank is still a non meme way to make bank here? I always imagine that elsewhere was better for cybersecurity and specifically pentesting roles.
>>
File: 1714341091056619.png (202 KB, 404x507)
202 KB
202 KB PNG
Please give link to Delete Yourself website. Am very drunk and cannot find
>>
>>100176816
Yes, but I would still recommend moving ssh to a non standard port to avoid thousands of bots trying anyway.
>inb4 dat’s security through obscurity!!!
no you’re a retarded gorilla nigger kys
>>
>>100176932
meds for schizophrenia
>>
File: RADICAL.png (13 KB, 72x109)
13 KB
13 KB PNG
>>100208703
lmao
>>
>>100226377
Are you referring to this? >>100136840
>>
>>100211890
Solution is 042

>cant be 6
>2 is in position three
>0 has to be position one
>4 is the only option for position two
>>
>>100226270
=== /cyber/ Headlines:
>Bezos, Other Amazon Execs Used Signal - a Problem for FTC Investigators
https://yro.slashdot.org/story/24/04/28/2140203/bezos-other-amazon-execs-used-signal---a-problem-for-ftc-investigators
https://www.seattletimes.com/business/amazon/jassy-bezos-other-amazon-execs-used-signal-messaging-app-a-problem-for-ftc/
>>
>>100224500
>and tag anything coming from it as being me?
Not this probably, but yes, if you're using your old account on a new device, you expose it.

>>100224596
It was like three days ago.

>>100226300
Yes. It's just outsourcing, they don't have high standards.
>>
>>100228912

can't imagine what they would need signal for...
>>
>>100229472
>You got the kids? Bring some Takis too, the spicy ones.
>>
File: 1701732243932293.jpg (214 KB, 1152x768)
214 KB
214 KB JPG
>>100156199
I'm honestly glad/impressed that they've kept that little nigga going for so long. Voyager I and II are one of those few programs where the taxpayer has actually gotten their moneys worth.
>>
>>100170403
Assembly.
>>
BITCHEEEEEES
>>
=== /sec/ News:
HUMINT is not going out of fashion
>‘Honeypots’ and influence operations: China’s spies turn to Europe
https://archive.is/VThah
>Brest is a rainy industrial port, pounded by the Atlantic, that is home to the French navy and its submarine nuclear deterrent. It has also witnessed a remarkable number of weddings in recent years between female Chinese students and the seamen who work at its naval bases.
>>
>>100231837
Fucku dat yerro pussy Francua!
>>
>>100230081
Yes, preferably 68k (>>100171029) or 6502. There is also microcode, which make sthe Gigatron interesting. Extanding that to a 32-bit processor would be intriguing.
>>
>>100211890
>https://www.theverge.com/2024/4/25/24139914/microsoft-cyber-security-incidents-trust-report
>Longtime Microsoft reporter Mary Jo Foley called for Microsoft to “stop selling security as a premium offering,”
Yes, but... how can we profit then? Everything must be sold as an additional subscription!
>>100211890
Make one with four. Do it. More logic puzzles! Fuck it, make one with SEVEN.
(Don't do seven thanks that makes it a giant workbook exercise and I am not that smart).
>>100222723
>Use musl instead of glibc, Libressl instead of openssl, sinit instead of systemd, oksh instead of bash, toybox instead of gnu coreutils to reduce attack surface
Yeah ok kneeling.jpg
In all seriousness aside from coreboot gj - now recommend some encryption that is nuke proof and off the grid. Even Xchacha20-blowfish isn't good enough here (by way of obscurity). Maximumpill us, oh great one.
>>100226270
Nice sources, cheers!
>>100208703
>4. Innovative tactics are warranted
Given the limitations of traditional tools, more out-of-the-box tactics should be considered. One such tactic would aim at gradually making these boards less interesting for their users.
One way to achieve this would be to regularly post content that looks genuine (using the right language, imagery, etc.) yet is meaningless – this would dilute the message of these boards and make their threads uninteresting, thereby reducing their attractiveness and sense of community
HNNNGGGHH explains a lot lol. Pity that "content" is likely better than 4chan's average coontents.
>>100231837
>Brest is a rainy industrial port, pounded by the Atlantic,
Well with those honeypots those breasts might receive a pounding if you catch my drift guffaw guffaw
>>
File: 1666824384350.png (132 KB, 800x600)
132 KB
132 KB PNG
>>100233638
>More logic puzzles!
Here you go. Hard mode: Show your work.
>>
>>100233734
3 silver keys:
Probability of sucess is 1 - prob of failure, where failure is (1-0.75)^3 = 0.015625
So success is 0.984375.
>>
>>100233734
21
>>
=== /sec/ News:
>Almost every Chinese keyboard app has a security flaw that reveals what users type
https://archive.is/biuJC
>The vulnerability, which allows the keystroke data that these apps send to the cloud to be intercepted, has existed for years and could have been exploited by cybercriminals and state surveillance groups, according to researchers at the Citizen Lab, a technology and security research lab affiliated with the University of Toronto.
>>
>>100233734
{{3 \choose 2} \cdot 3^2 + {3 \choose 3} \cdot 3^3 \over 4^3} > {3 \over 4}
9/8 > 1
cmon where's the catch
>>
>>100233986
If you aggregate probabilities less than one, you should not reach a result exceeding 1.
>>
>>100233857
You're right, but your math is wrong. You need to use the binomial formula to calculate the probability of 2 silver keys working plus 3 silver keys working. Essentially:
https://www.wolframalpha.com/input?i=%283%21%2F%282%21%283-2%29%21%29*0.75%5E2*0.25%5E1%29%2B%283%21%2F%283%21%283-3%29%21%29*0.75%5E3*0.25%5E0%29
>>
>>100234166
Huh? If you're talking about the 9/8 thingy, it's a ratio of probabilities.
>>
File: butimaybedumb.jpg (10 KB, 185x450)
10 KB
10 KB JPG
>>100233857
Uhh you missed the "2 working silver keys" bit budnetski
9.375% advantage to one
I did this before but was afraid of looking dumb. My working is picrel. Perhaps I am dumb LOL.
>>
>>100234358
Seems like you're in agreement with >>100234206
>>
Bumps.
>>
Seems like the very definition of Solarpunk is in more flux than I had dreamt of: https://youtu.be/UVlBmdvIC6s?feature=shared
>>
Tech that comes with weak passwords such as “admin” or “12345” will be banned in the UK under new laws dictating that all smart devices must meet minimum security standards.

It means manufacturers of phones, TVs and smart doorbells, among others, are now legally required to protect internet-connected devices against access by cybercriminals, with users prompted to change any common passwords.

Brands have to publish contact details so that bugs and issues can be reported, and must be transparent about timings of security updates.

It is hoped the new measures will help give customers confidence in buying and using products at a time when consumers and businesses have come under attack from hackers at a soaring rate.
>>
>>100237254
>innefficient solar energy instead of nuclear
>everyone has his own homestead ranch with tons of free space and nature eveywhere
Solarpunk follows Cyberpunk.
Solarpunk is only possible in a world where you have removed 9/10s of the population.
It is scary to me for a different reason. It's probably the endgame of the elites.

The utopian vision is colonizing space and avoiding overpopulation by spreading across the stars, while using clean nuclear fusion.
>>
>>100239017
>Solarpunk follows Cyberpunk.
Yes. The way I read it, Solarpunk was a protest against the endless dystopian doomscrolling of Cyberpunk.
>Solarpunk is only possible in a world where you have removed 9/10s of the population.
That and vast amounts of very cheap energy. It is strange so few notice the lack of population in the Solarpunk videos and images. At least in Yokohama Kaidashi Kikou it was hinted there had been a population decline caused by an unstated disaster.
>It is scary to me for a different reason. It's probably the endgame of the elites.
China would probably be happy to delete Africans and take over the entire continent. How would the US react? What once was science fiction is now quite possible with genetic warfare.
>The utopian vision is colonizing space and avoiding overpopulation by spreading across the stars, while using clean nuclear fusion.
Combined with AI doing all work and the population ending up on Basic Pay, how would the world end up? Tribal warfare or everyone turning to artists, philosophers and gentleman scientists?
>>
You know it is time: https://youtu.be/c4OU6SuTVeI?feature=shared
>>
Notesnook new logo is ugly as shit
Thank god they finally added linking though
>>
Wanted to know some things about using an old phone with my one everyday simcard to hide my identity from corporations.

A phone's IP is very dynamic right? It's also not my residential IP address. I wanted to know if I used an old phone that was factory reset with no personal info on it, and I download a zuck app from the aurora store, can zuck figure out who I am? Can the app get my phone number? Would I need to use public wifi instead?
>>
>>100240687
>A phone's IP is very dynamic right?
Yeah, but your other data is not, like IMEI.
>Can the app get my phone number?
Yes.
>Would I need to use public wifi instead?
Yes, in a popular place.
>>
=== /cyber/ Headlines:
>FCC Fines Wireless Carriers $200 Million For Sharing Customer Data
https://news.slashdot.org/story/24/04/29/1946256/fcc-fines-wireless-carriers-200-million-for-sharing-customer-data
https://www.lightreading.com/wireless/fcc-issues-200m-in-fines-for-at-t-t-mobile-verizon-for-selling-location-data
https://arstechnica.com/tech-policy/2024/04/fcc-fines-big-three-carriers-196m-for-selling-users-real-time-location-data/
>Collection agency FBCS warns data breach impacts 1.9 million people
https://www.bleepingcomputer.com/news/security/collection-agency-fbcs-warns-data-breach-impacts-19-million-people/
>Roku Wants To Use Home Screen For New Types of Ads
https://entertainment.slashdot.org/story/24/04/29/2135237/roku-wants-to-use-home-screen-for-new-types-of-ads
https://thestreamable.com/news/roku-wants-to-use-home-screen-to-new-types-of-ads-to-customers-while-also-improving-content-discovery
>Account compromise of “unprecedented scale” uses everyday home devices
https://arstechnica.com/security/2024/04/everyday-devices-are-used-to-hide-ongoing-account-compromise-campaign/
>>
>>100242609

windows is adding ads to the home screen, roku is adding ads to the home screen, i fucking hate marketers. pihole is a gift.
>>
>>100243700
the answer isn't pihole, the solution is to use software that doesn't spy on you or push ads to begin with
>>
>>100243746
The marketing plague will not even begin to abate until it is heavily taxed by the state, rather than treated as a tax-refundable "cost of doing business"
>>
>>100216513
I've never understood why people do this when it's literally attacking your immune system:
https://www.youtube.com/watch?v=nGggU-Cxhv0
>>
>>100244456
>published 4 months ago
Give it time.
>>
>>100243700
We definitely need a /cyb/ spin, >>100224596, perhaps based on the stable Trinity DE.
>>
>>100136047
>https://www.privacyguides.org/en/vpn/
>Using a VPN will not keep your browsing habits anonymous
What's their basis for this claim?
>>
>>100246687
>It's important to remember that a VPN will not provide you with absolute anonymity, because the VPN provider itself will still see your real IP address, destination website information, and often has a money trail that can be linked directly back to you. You can't rely on "no logging" policies to protect your data from anyone who is able to protect. If you need complete safety from the network itself, consider using Tor in addition to or instead of a VPN.
https://www.privacyguides.org/en/basics/vpn-overview/
>>
>>100246917
https://web4africa.com/vps-hosting/
Unironically host your server in Africa.
Please save me impoverished black people (literally... fucking save us please)
>>
>>100246917
So basically 'trust no one, even yourself' type of thing

Why would they recommend audited VPN companies then turn around and say to not trust them, what's the point then?
>>
in the jungle the mighty jungle
a negro tends my vpnnnnn
>>
>>100246687
>What's their basis for this claim?
Virtual Private Networks (VPNs) can help with privacy, but they do not necessarily provide true anonymity. VPNs work by encrypting your internet traffic and routing it through a remote server, which can hide your IP address and location. This can help protect your privacy by making it more difficult for others to track your online activities.

However, VPNs do not completely eliminate your digital footprint or "fingerprint." Your device's characteristics, such as its operating system, browser, and hardware configuration, can still be used to identify you, even when using a VPN. Additionally, the VPN provider itself may have access to your online activities and could potentially share or log that information.

To achieve a higher level of anonymity, you would need to use additional tools and techniques, such as Tor, cryptocurrency, and advanced privacy-preserving technologies. These can help obfuscate your traffic and make it much more difficult to trace your online activities back to you.

In summary, while VPNs can enhance your online privacy, they do not necessarily provide complete anonymity. Understanding the distinction between these two concepts is important when selecting the appropriate tools and strategies to protect your digital identity and activities.
>>
>>100247918
>a negro tends my vpnnnnn
Go enjoy your AWS hosted server then and tell me how Jeff Bezos' cock feels.
>>
>>100247912
They don't say that, you're reading it wrong. You're probably new to this and as many newbies want to know the definitive "best" way to do things, when there are several, from using a proxy to using a burner phone. The options obviously depend on what are you planning on doing. These guys recommended Tor, but there are issues with Tor too. I avoid it, for example, because using it would actually attract unwanted attention to me.
They are saying that VPNs are fine, but have their cons too, just like every other tool.
>>
>>100247151
>Africa
How far does the Chinese dragnet extend?
https://en.wikipedia.org/wiki/2018_China%E2%80%93African_Union_espionage_allegations
>>
>>100248073
>https://en.wikipedia.org/wiki/2018_China%E2%80%93African_Union_espionage_allegations
I couldn't give a shit about China as they don't create national policy or partake in policy networks that inform it. The US does.
>>
In terms of tracking, is it enough to just open Google, Facebook links in incognito or does it still leak info? I know it stops cookies but does it stop tracking period?

I'm on ungoogled chromium with uBlock + decentraleyes.
>>
>>100248880
>incognito
That still leaks, your fingerprint remains.
>>
>>100248880
Are you for real? Yeeeezuuuus....
>>
>>100248880
>decentraleyes
Garbage extension. At least use the better version, LocalCDN.
>>
>>100249289
>firefox exclusive
>>
Is pyarmor8 one of the more difficult obfuscations to reverse?
>>
>>100249321
Are you retarded?
https://chromewebstore.google.com/detail/localcdn/njdfdhgcmkocbgbhcioffdbicglldapd
>>
>>100250407
>>100251003
Yes, no, maybe.
>>
>>100248880
>open Google, Facebook links
If you don't have those domains blocked in your DNS, you've already lost the battle.
>>
File: 4Cyb-Con.4.U.jpg (365 KB, 1332x852)
365 KB
365 KB JPG
===========AutonomousMusicProgramming============
>https://youtu.be/Ut5YADLNJrE
>https://youtu.be/e0L5EI_dzYM
>https://youtu.be/qsmGXc6cQLY
>https://youtu.be/ZRjN52U-gJw?t=28
==============================================
Deep /cyb/ Radio: Hindsight is 20-20.
Foresight is also 20-20, for those with eyes to see.
>http://groupelavigne.free.fr/russell1953.pdf
>>
>>100240650
>Notesnook
Oooh, nice.
>>
>>100240650
Added:
https://wiki.installgentoo.com/wiki/KnowledgeManagementSystems
>>
>>100248125
So you haven't heard about secondary intelligence? Alice talks to Bob, and Eve (CN) listens. Faye (US) has been tapping Eve for years and hoovers up everything from Eve. Faye informs her friends in 5 eyes, including Mata Hari (FR) who wastes no time in informing her greasy lover (RU). So within a dfay, everything has been lost.

French leaders consider themselves reincarnations of Napoleon, and no doubt scream 'Pour la France' even when taking a dump. To them it is all the better if they can dump on the US or the UK, and couldn't care less how many NATO soldiers die.
>>
>>100246685
>perhaps based on the stable Trinity DE
It just had a major update, and the screenshots are looking good:
https://www.trinitydesktop.org/screenshots.php
>>
=== /sec/ News:

>WhatsApp scam: More than 100 arrested in Spain for 'son in trouble' fraud
https://www.bbc.com/news/world-europe-68931214
>More than 100 people have been arrested in Spain accused of stealing thousands of euros from WhatsApp users by claiming to be relatives in distress.
>Police said those arrested were part of a criminal group that fraudulently received nearly a million euros in total through the scam.
>The arrests took place between February and April, El Pais newspaper reported.

>Hacker jailed for blackmailing therapy patients
https://www.bbc.com/news/articles/c97znd00q7mo
>One of Europe's most wanted cyber criminals has been jailed for attempting to blackmail 33,000 people whose confidential therapy notes he stole.
>Julius Kivimäki obtained them after breaking into the databases of Finland's largest psychotherapy company, Vastaamo.
>After his attempt to extort the company failed, he emailed patients directly, threatening to reveal what they had told their therapists.
>At least one suicide has been linked to the case, which has shocked the country.
>Kivimäki has been sentenced to six years and three months in prison.
>In terms of the number of victims, his trial was the biggest criminal case in Finnish history.

>23andMe: Profiles of 6.9 million people hacked
https://www.bbc.com/news/technology-67624182
>Hackers have been able to gain access to personal information from about 6.9 million users of genetic testing company 23andMe, using customers' old passwords.
>In some cases this included family trees, birth years and geographic locations, the company said.
>>
>>100255115
we love bbc here
>>
>FCC Fines Wireless Carriers $200 Million For Sharing Customer Data
>23andMe: Profiles of 6.9 million people hacked
They deserve it.
>>
>>100256378
nigga 200 million aint nuffin
>>
No Escape: EVERY US Carrier Sold Your Location Data with 0.02% Penalties from the FCC!
https://www.youtube.com/watch?v=mdZt7ox1DDs
>>
new bread baking
>>100258383
>>100258383
>>100258383
>>
>>100258390
desperate faggot
>>
>>100258390
This is a troll post, he inserted a fake YT link that is NSFW. I'll make a new one in a moment.
>>
File: 1536527854358.jpg (18 KB, 400x311)
18 KB
18 KB JPG
Real one is here, and fuck that troll.
>>100258888
>>100258888
>>100258888
>>
>>100258390
I bet you think you're real proud of yourself
>>
>>100258390
kys you sick faggot
>>
>>100258390
alright i admit that yt link bait was gemmy
>>
File: 1704037827454278.jpg (83 KB, 461x494)
83 KB
83 KB JPG
As a retard, how important is it to change my router beyond the basic practices like naming, password update and just updating firmware? My router is kinda old and there's no more firmware support. Don't know if it's worth buying a new one
>>
>>100259880
>As a retard
ask in the new thread
>>100258383
>>100258383
>>100258383
>>
File: 1714532882464694.png (1.67 MB, 756x1008)
1.67 MB
1.67 MB PNG
>>100258903



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.