[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip / qa] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


File: 1696342843575.jpg (335 KB, 1920x1080)
335 KB
335 KB JPG
>>101702370
This isn't your jobs thread or cert thread, it's a group therapy session. /Cyb/er/sec/urity/pri/vacy general is for the discussion of anything and everything related to cyberpunk culture, cybersecurity, and digital privacy.

--[/Cyb/erpunk]-----
The FAQ: https://sizeof.cat/post/cyberpunk-faq/
What is /cyb/erpunk? https://pastebin.com/pmn9vzWZ
How do I into /cyb/erpunk? https://pastebin.com/5tpNFQds
Huge list of cyberpunk media: https://sizeof.cat/post/cyberpunk/
The cyberdeck: https://pastebin.com/7fE4BVBg
Cyberlife: https://jinteki.industries/files/cyberlife.7z
Bibliothek: https://www.mediafire.com/folder/4m5hd2065hde8/Bibliothek

--[/Re/verse Engineering]-----
Getting into /re/: https://wiki.installgentoo.com/wiki/Reverse_Engineering

--[/Sec/urity]-----
"Shit just got real": https://pastebin.com/rqrLK6X0
Cybersecurity basics: https://wiki.installgentoo.com/wiki/Cybersecurity_-_/sec/_guide
and armory: https://wiki.installgentoo.com/wiki/Cybersecurity_-_basics_and_armory
learning: https://wiki.installgentoo.com/wiki/Cybersecurity_-_Learning/News/CTFs
Reference books (PW: ABD52oM8T1fghmY0): https://mega.nz/#F!YigVhZCZ!RznVxTiA0iN-N6Ps01pEJw
/sec/ PDFs: https://mega.nz/#F!zGJT1QQQ!O-8yiH845GN26ajAvkoLkA
EFF anti-surveillance: https://ssd.eff.org/
Other library: https://mega.nz/file/UCgEGAjb#rwNcnMAQCUUbSp8supsFvn9QEHCWUW86eLcZa16ZG4Y

--[/Pri/vacy]-----
Tools: https://www.privacyguides.org/en/tools/
Hitchhiker’s Guide: https://anonymousplanet.org/guide.html
Hardware: https://ryf.fsf.org/products
Frontends: https://wiki.installgentoo.com/wiki/Privacy_friendly_frontends
OSINT Guide: https://inteltechniques.com/index.html
Firmware: https://libreboot.org/
RMS: https://stallman.org/facebook.html

--[/hmg/ Hackerman General]-----
VM/CTFs:
http://overthewire.org/wargames/bandit/ - easy beginner
https://www.vulnhub.com/ - prebroken images
https://www.hackthebox.eu/ - super secret club
Huge info dump: https://hmg.neocities.org/
>>
epoxy on my ram and rom
>>
File: media_GTVAWulbgAAdBHc.jpg (272 KB, 1536x2048)
272 KB
272 KB JPG
About the Japanese cyberbabes...
>>101712748
>sauce, bro?
https://nitter.poast.org/ununosuke5
Not all of it is equally cyberriffic.
>>
File: azure.png (273 KB, 1402x828)
273 KB
273 KB PNG
Since this is the security thread

Pic related is the CTO of Microsoft Azure. Is he right?

https://x.com/markrussinovich/status/1571995117233504257
>>
File: 4Cyb-WIP.jpg (615 KB, 1932x977)
615 KB
615 KB JPG
We here at Deep /cyb/ Industries - International recognize the rapid sinking of our beloved /cyb/ threads and will attempt to expedite the construction of the /cyb/+/sub/ submarine & sea base, at the cost of some *minor* safety cuts. Expediency will be our number one priority.
==================News=======================
>https://thehackernews.com/2024/08/doj-and-ftc-sue-tiktok-for-violating.html
>https://thehackernews.com/2024/08/hackers-exploit-misconfigured-jupyter.html
>https://thehackernews.com/2024/08/apt41-hackers-use-shadowpad-cobalt.html
>https://thehackernews.com/2024/08/apt28-targets-diplomats-with-headlace.html
==============================================
>>101719856
/dpt/ is better able to assess the veracity of this claim.
Also, cybersecurity only exists until a competent hacker proves it does not.
He is able to do so because cybersecurity does not exist.
===================Video=======================
A.I. Joe covers some /sec/ news, including a LASER-based hacking tool.
>https://youtu.be/URYNRnwJ4HU
//TIMESTAMPS//
0:00 - Intro
0:08 - Russian Prisoner Exchange
2:09 - Adult Platform’s User Data Leak
3:18 - DNS Misconfiguration Puts Millions Of Websites At Risk
4:34 - New Android Malware
5:14 - Black Basta Develops New Malware
5:49 - 300 Indian Banks Down
>>101719114
6:24 - New Laser Hacking Tool
>LASERS your RAM & ROM - nothing personnel, kid.
--------------------------------------
7:18 - EU Petition To Keep Games Working
8:07 - OpenAI Tries To Become More Open?
===================Music========================
>https://youtu.be/AnpEWe7MlaU
>>
>>101719856
That might end up as security by not releasing anything. Redox-OS has been going for just over 9 years now, that is NINE YEARS, and it is still nowhere near as usable as Linux was after 4 years. Last I checked it was not even self hosting.
>>
>>101720249
>/dpt/ is better able to assess the veracity of this claim.
This is the security thread though

Also, this thread has cool cyberpunk OP images, while /dpt/ has anime cartoon OP images. I greatly prefer the cyberpunk OP images.

>cybersecurity does not exist
Surely it does even if it can never be perfect. Just like a building can have excellent security even if security can never be perfect.

>>101720319
Linux itself now accepts Rust code though right? And other projects have been made with it

The argument for memory safety makes sense when so many security flaws happen due to memory safety bugs
>>
>>101721206
>Linux itself now accepts Rust code though right?
Yes. Not sure how far they have gotten, Rust itself is undergoing major revisions still. Also (from LWN):
>Support for block drivers written in Rust has been merged; thus far, only the null_blk sample driver uses this support. Having this support in the mainline will make the development of actually useful block drivers in Rust easier, though; those can be expected to appear in future kernel releases.
There is a lot of Real Soon Now.

>And other projects have been made with it
Such as?
>The argument for memory safety makes sense when so many security flaws happen due to memory safety bugs
We can agree that there is indeed a problem. That does not mean Rust is the solution, much in the same way as cyanide is not considered a cure for common cold.
>>
>>101720249
>>LASERS your RAM & ROM - nothing personnel, kid.
thats what google tested their backdoor chip "tensor" with, i dont think it will have any effect on epoxied rom

i imagine the goal would be laser the rom until it rewrites some section into bootkit
>>
>>101721457
2bh I have no idea if Rust is the solution because I don't know much about it

>>And other projects have been made with it
>Such as?
Deno, a replacement for Node.js. Although maybe Deno in the near future will be overshadowed by Bun, another Node.js replacement, which is even faster, and is written in Zig.
>>
File: 1706051739085557.jpg (156 KB, 1280x1048)
156 KB
156 KB JPG
how 2 anonymously report CVE finding?
>>
>>101722752
Through a tech journalist with a good track record.
>>
File: 1659614591497245.jpg (144 KB, 1024x1018)
144 KB
144 KB JPG
>>101722945
any recommendations?
Should I dump it on a full disclosure mailing list?
How do I get the CVE number from a CNA if a journalist is involved.
>>
>>101722752
simply dont report anything or post it publicly on /g/

>>101722945
((journalist))
>>
File: 1669737092778454.png (989 KB, 1280x1480)
989 KB
989 KB PNG
>>101722977
what's the point of having a CVE if it just makes my network weaker, I don't wanna blackhat it
>>
>>101723009
>if it just makes my network weaker
patch yourself and dont give anyone else the patch
>>
File: 1668890412362063.png (1.57 MB, 1920x1080)
1.57 MB
1.57 MB PNG
>>101723047
patch is too complicated, I'd be rewriting most of the authentication for a software, and hotfix is disable a large featured webui, rather report and make em patch for me or face the wrath of skids with a weaponized .py file
>>
>>101723101
>webui
kek what kind of bloat are you running
>>
File: 1684203340675582.jpg (99 KB, 800x800)
99 KB
99 KB JPG
>>101723380
ISP router

they forked openwrt and added a normie UI, but it needed to control some aspects
>>
>>101723449
>ISP router
retardation

smash it with hammer and buy pc engines, build coreboot and linux from scratch (possibly openbsd/hardenedbsd) and slap that on it
run os in ram
>>
Nail polish on the screws, a ritual of the wise

Swap the Wi-Fi card, summon Atheros might,
Disable when you’re done, vanish into the night.
>>
File: hacker skid.jpg (335 KB, 750x608)
335 KB
335 KB JPG
taking the PNPT soon lads.
>>
so i was thinking...
what if instead of linux from scratch, could i use hurd microkernel?

i looked at it and its cool, though would replace glibc there somehow
>>
>>101723449
>rsa
yuck
>>
>>101725072
>what if instead of linux from scratch, could i use hurd microkernel?
You can, but why would you?? Debian has already a Hurd edition, it is essentially useless for anything other than showing it can be done, barely.
>>
>>101720249
>/dpt/ is better able to assess the veracity of this claim.
Only when the trolls are asleep, especially the registry dumper guy
>>
>>101725210
>but why would you
more reliable than linux kernel
>>
>>101725705
If you like the microkernel as a solution to reliability problems, you have many to chose from, including MINIX 3. See
https://wiki.installgentoo.com/wiki//aosg/_Alternative_Operating_System_General
>>
>>101725874
>TRON - killed by a Hollywood grade conspiracy
QRD?

minix is first gen microkernel, context switching is going to be awfully slow
i want templeos tier performance

most of the other microkernels are just hypervisors that run linux which is bloat
>>
>>101725934
>QRD?
Back in the 90's Japan seemed unstoppable and ruled in terms of electronics, cars, heavy machinery, consumer goods and more. Then the US heard about the OS called TRON and had a major panic. It didn't help that they also planned a CPU for the OS. The US went all in to kill it off and succeeded. The long story could indeed be turned into a movie.
>>
=== /cyb/ News:
>Neuralink Has Successfully Implanted a Second Brain Chip, Musk Says (reuters.com)
https://science.slashdot.org/story/24/08/04/2231242/neuralink-has-successfully-implanted-a-second-brain-chip-musk-says
>Neuralink has successfully implanted in a second patient its device designed to give paralyzed patients the ability to use digital devices by thinking alone, according to the startup's owner Elon Musk... [Musk] gave few details about the second participant beyond saying the person had a spinal cord injury similar to the first patient, who was paralyzed in a diving accident.
>Musk said 400 of the implant's electrodes on the second patient's brain are working. Neuralink on its website states that its implant uses 1,024 electrodes... Musk said he expects Neuralink to provide the implants to eight more patients this year as part of its clinical trials.
Also:
https://archive.is/91MDh
>>
File: 1722392329492.jpg (61 KB, 1440x810)
61 KB
61 KB JPG
>>101719856
The short answer is yes
Mind you, even though he singles out Rust as his preferred replacement, the problem he's talking about has nothing to do with Rust and everything to do with C and C++ being error-prone clown shows
Most other languages are just not like that, even in the no-GC zone, but they're usually slower than C to the point where one benchmark can totally destroy their chances of adoption
>>
>>101726466
super heavy galactic stuff
>>
Reposting the updated Data Broker Removal Links:
https://pastebin.com/3tncC0rE
>>
Lmao, back to dying at 25 replies, huh guys? I wonder what happened. Oh yeah, I fucked off. Enjoy your group therapy.
>>
>>101730676
Yeah same, cheers
>>
I HAVE ED AND MY COCK CAN STAY UP LONGER THAN THIS DEAD GENERAL
>>
File: media_FzdASW3aIAYk_Jw.jpg (443 KB, 1536x2048)
443 KB
443 KB JPG
Anyone here working with textiles or know someone who do? I just had an idea.
Earlier the Eurion was discussed. And now we are in the late summer and the swimsuit/activewear season is still going. So why not add the Eurion to some tight wear? People will take pictures - and that is where the fun starts.
>Why can't I download this picture? And why is the phone now calling the police??
>>
If you plugged into main computer of a server farm would it destroy the entire server farm?
>>
>>101732096

do those fila sneakers have proper rubber at next to road surface or are you going to feel every asswipe pebble at your feet
>>
>>101733071
I really have no idea.
>>
Updated Firefox Zero user.js
https://pastebin.com/fB8vQbd8
>>
>>101732755
no faggot
>>
>>101730676
im still here you cant kill me
>>
How survive in a dystopian future?Seem like hacking is a useless shit or i dont understand something.

Maybe better will be jump into /diy/
>>
>>101737602
thinkpad x230 with coreboot and no phone
thats how you survive
>>
>>101737602
A well stocked medical supply and, as always, the skills to use it. Too many fetishize weapons caches but few remember that medical care will be crucial. These days it looks like several fuses are lit, all heading for the big powder keg. You might get drafted soon.
Communications is crucial, get a radio transceiver and a license so you don't make stupid mistakes.
>>
I guess it is a bit late to call it news, but it is interesting what the US military is disclosing now afetr so many years:
>How America built an AI tool to predict Taliban attacks
https://archive.is/Am4hh
>In the summer of 2020 American intelligence analysts in Afghanistan got a warning from “Raven Sentry”, an artificial-intelligence (AI) tool that they had been operating for a few months. There was a high probability, the AI told them, of a violent attack in Jalalabad, the capital of the eastern Nangarhar province, at the beginning of July. It would probably cause between 20 and 40 casualties. The attack came, a little late, on August 2nd, when Islamic State struck the city’s prison, killing some 29 people.
Raven Sentry had its origins in October 2019, when American forces in Afghanistan were facing a conundrum. They had ever fewer resources, with troop numbers falling, bases closing and intelligence resources being diverted to other parts of the world. Yet violence was rising. The last quarter of 2019 saw the highest level of Taliban attacks in a decade. To address the problem they turned to AI.

This was a neural network, and it seems to project was ended, which seems suspicious. And they kind of confirm it:
>In the three years since Raven Sentry was shut down, armed forces and intelligence agencies have poured resources into AI for “indicators and warnings”, the term for forewarning of attack. “If we’d have had these algorithms in the run-up to the Russian invasion of Ukraine, things would have been much easier,” says a source in British defence intelligence. “There were things we wanted to track that we weren’t very good at tracking at the time.” Four years ago SAR images had a ten-metre resolution, recalls Mr Roy; now it is possible to get images sharp enough to pick out objects smaller than a metre. A model like Raven Sentry, trained on data from Ukraine’s active front lines, “would get very smart very quickly”, he says.
>>
Alright today I start my journey anons, for better or for worse. Let's see I'll ever be able to make money or do anything cool.
>>
>>101739081
What a u doing?
>>
>>101739098
becoming a leet haxor like you
>>
File: media_FzdASW7aYAAg6f3.jpg (518 KB, 1536x2048)
518 KB
518 KB JPG
>>101732096 >>101733196
Anyone? And page 9?
>>
The way I achieve good computer security is by only installing shit that I trust, from sources that I trust
>>
>>101741969
that is a key part of the process yes
>>
>>101741969
>he trusts
>>
>>101742048
Yeah. E.g. I trust Ubuntu because Canonical are a business who have a reputation to maintain. If Ubuntu started getting loads of security flaws then Canonical's reputation would suffer, and the shareholders would lose money.
>>
>>101742213
they can probably drop shellcode onto your computer through snap without trace and you would never notice so doesnt really matter that they have something to lose
>>
>>101742229
>they can probably
Is the concept "trust" entirely alien to you?
>>
>>101742329
yes because proper model is nobody trusts nobody

everything goes through invisible instrumentation microhypervisor

enjoy your space alien shellcode 100 remote holes
>>
>>101742363
a proper model is up to the individual, remember anyone that says you cannot trust anyone shouldn't be on the internet or using a computer because that is the actual logical conclusion to their stance
>>
>>101742622
no the proper model is nobody trusts nobody

the second you let someone in you become compromised
>>
>>101742653
friendly reminder that if you trust no one, then you shouldn't trust any firmware, software, or hardware
>>
>>101742669
you are clearly new
you havent seen the usual stuff that is posted here
>>
>>101742731
I am not new, I argue this all the time here every few weeks
>>
>>101742738
who said i trust any of that?
coreboot, epoxy, cut traces

literally ubuntu retard canonical amazon webstore nigger
>>
>>101743487
you don't seem like >>101742731
so I should tell you I am not >>101742213
>>
>>101743942
>>101743487 (You)
you don't seem like >>101742731 (You)
>>
>>101743956
a perfectly reasonable and calm response, you have convinced me anon, congrats you win the argument
>>
Do you guys have a cyber deck?
>>
>>101745060
thinkpad x230
>>
>>101742229
If they did something malicious then people would find out about it and Canonical's reputation would be ruined
>>
=== /sec/ News:
>US nears milestone in race to shield vital data from quantum hacking
https://archive.is/iMWc3
>The National Institute of Standards and Technology is poised to publish three approved security algorithms that governments and companies can use to safeguard information from the emerging threat of quantum hacking.
>While industries such as finance and telecoms are planning intensely for the transition, some other potentially vulnerable businesses have made few or no preparations.
>Hackers are able to take a “harvest now, decrypt later” approach, meaning they can steal data today and then store it until the quantum computing technology that can crack it is developed.
>>
File: 1717866153264493.jpg (48 KB, 843x947)
48 KB
48 KB JPG
just bruteforce 042
>>
>>101745060
VR is fake
>>
>>101750296
Based #Team-042 member
======================
=================/CYB/LOID/News==================
>https://cybernews.com/ai-news/nvidia-universal-robot-brain/
-----------------------------------------------------------------------------------------------
'Danger of Americans becoming reliant on CCP-controlled tech along with China's plan for world humanoid robot domination by 2027.'
>https://nypost.com/2024/08/05/business/chinese-made-humanoid-robots-raise-alarms-in-congress-stealth-army-on-our-land/
>https://www.scmp.com/news/china/politics/article/3240259/china-says-humanoid-robots-are-new-engine-growth-pushes-mass-production-2025-and-world-leadership
Original /pol/ thread:
>>>>/pol/477058861
=================/sec/News============================================
>https://cybernews.com/security/paris-2024-olympic-apps-eavesdropping-on-users/
>https://thehackernews.com/2024/08/new-android-spyware-lianspy-evades.html
>https://thehackernews.com/2024/08/new-zero-day-flaw-in-apache-ofbiz-erp.html
>https://thehackernews.com/2024/08/researchers-uncover-flaws-in-windows.html
============================Music====================================
>https://youtu.be/E9O-aN2AtEM
>https://youtu.be/Axeqsb5Q4pY
=====================================================================
>>
>page 9
/g/ should be talking about cybersecurity more
>>
>>101754424
can't, /g/ needs its board to be full of brand war threads and other stupid shit
>>
>>101754424
>follow nist/cis best practices
>run nessus
>update shit
>???
>profit!
>>
>>101754424
sir this is wendys
>>
File: media_GTr8whybcAAIGTo.jpg (143 KB, 1024x855)
143 KB
143 KB JPG
>>101754424
Be the change you want to see. Meanwhile we can enjoy more Japanese cyberbabes.
>>
File: 1715544842567527.jpg (1.06 MB, 1440x2560)
1.06 MB
1.06 MB JPG
defcon meetup?
>>
File: media_GTpA0JRaYAAJ8CG.jpg (97 KB, 1024x859)
97 KB
97 KB JPG
>>101756143
One more before I go to bed.
>>
File: RealCyberBabes.jpg (98 KB, 982x662)
98 KB
98 KB JPG
>>101754816
Correct.
>https://www.wendys.com/blog/how-wendys-using-ai-restaurant-innovation
>https://www.theverge.com/2023/5/17/23727631/wendys-robots-tunnels-underground-food-delivery
=======================================================================
>>101756143
>Be the change
Correct, but we at Deep /cyb/ Media feel the need to point out that what you refer to as 'cyberbabes' are in fact a simulacrum of real cyberbabes as shown in this /CYB/LOID/ ethereal ragazine promo picrel.
>https://www.alwihdainfo.com/China-s-achievements-in-sci-tech-innovation-lauded-by-participants-to-2024-ZGC-Forum_a131984.html
=======================================================================
So, I found an old 'piratebox' apk on an old Android phone of mine and desided to check on the status of that project, and to see what alternatives there were, if any with a cursory search and found the following:
>https://news.ycombinator.com/item?id=39602343
>https://alternativeto.net/software/piratebox/
Might come in handy when the [insert_catastrophic_scenario_here] materializes.
============================Music===========================
>https://youtu.be/wMEtsw5ykXk
============================================================
/CYB/LOID/ Rag: The ethereal /cyb/ magazine that you can only read in your mind.
>>
should i finally dedicate time to own this shit chat?
https://desuarchive.org/g/thread/100642873/#100671685

my previous posts
https://desuarchive.org/g/thread/100642873/#100673317
https://desuarchive.org/g/thread/100642873/#100673411
https://desuarchive.org/g/thread/100642873/#100675202
https://desuarchive.org/g/thread/100642873/#100675290

i want to make cheesy webm with capturing packets then decrypting them

privacy does not exist
security does not exist
>>
>>101757773
>tfc
>TFC is designed for people with one of the most complex threat models: organized crime groups and nation state hackers who bypass end-to-end encryption of traditional secure messaging apps by hacking the endpoint.

that reeks of glowies. also why use XChaCha20-Poly1305? The bonus being nonce-misuse resistance is nil and void when you are already using ephemeral keys (which they seem to be, because of their forward secrecy claim)
>>
>>101757900
>that reeks of glowies
its hobby project made by some fin, his personal website is linked on the github

https://www.cs.helsinki.fi/u/oottela/
hacking someones school project ^^

>because of their forward secrecy claim
this is what i disprove in my unparsable posts

the forward secrecy is
hash(key + i++)

if initial key is known then all plain text will be revelaed by simply iterating
>>
>>101757984
it being a one man project doesn't invalidate the claim of it reeking like a glowie honeypot. if a chat openly advertises its target audience as criminals, it usually is a honeypot.

also that's really stupid key generation indeed. wonder why he even picked x448 in the first place too; it's slower than x25519, provides only a small security margin (224 bits), albeit bigger than x25519's (128 bits).

keep us updated on the progress of your pwnage, will ya
>>
>>101758033
>if a chat openly advertises its target audience as criminals, it usually is a honeypot.
to be honest the install scripts are outdated and probably wont successfully run on todays build of qubes

whats the point of honeypot that is not active?

>provides only a small security margin
thats what you will need when thats the only key you need to decrypt all traffic ;)

also he might have used xchacha20 for computers that dont have aesni (keep physical isolation in mind)
he might have gotten confused and could have originally had in mind to do encryption on the rasp pi but then changed the mode later on (?)

>keep us updated on the progress of your pwnage, will ya
im currently in the last of iteration of my linux from scratch build
im going to rebuild every program with openmp and polly for maximum performance (i want my thinkpad to start flying when i boot)
but seemingly openmp wont build in latest llvm so thats more patching to do

funny enough llvm comes back to fuck me over like in the original post

ill either do it now to relax or after im done with the build
>>
>>101758151
>whats the point of honeypot that is not active?
introduce vulnerabilities by not updating it for a while, then it becoming active later again with said vulnerabilities maybe?

>thats what you will need when thats the only key you need to decrypt all traffic ;)
right, but 128 bit is already near impossible to decrypt. 224 bits is pretty much useless, and isn't worth the wasted resources.

if the goal was to protect against post-quantum attacks, it's also useless; grover's algorithm shortens 224 bits to 112, which is already more feasible to crack for an adversary that has access to a quantum computer.

but yeah, chacha20 instead of aes is already a huge boost if there's a lack of aesni.
>>
>>101758211
>introduce vulnerabilities by not updating it for a while, then it becoming active later again with said vulnerabilities maybe?
someone has their legal name attached to this project and personal webpage

if this is honeypot they would be killed really fast after its found out

or inb4 most sophisticated cia honeypot ai generated history, name, person, website, program
>>
>>101758236
surely the feds could forge an identity, no?

not that hard to create plants in the software dev world.

could've also been taken over *after* he created the project.

just my schizo ramblings kek
>>
>>101758259
>just my schizo ramblings kek
dont worry, schizo board

you now must send the guy email (listed on his website) and interrogate until he admits its cia honeypot

actually i wanted to send him email about the bad forward secrecy, never did that

you are free to find out the truth using email
beware if its the cia, your interrogation will turn into you getting interrogated
>>
>>101757489
>Might come in handy when the [insert_catastrophic_scenario_here] materializes.
nothing ever happens

uk might be burning but thats not rest of the world
when the world starts burning an android phone wont save you
>>
>>101758375
>when the world starts burning an android phone wont save you
The world's already burning:
>https://youtu.be/xnW0oi7iPQ4
-------------------------------------------------
I plan on standing under a nuke if they start to fly, if you get my drift. I thought some might be interested in battery-powered stand-alone servers serving what's left of human knowledge - if there is such a thing. Now that I think about it, there's no point. As a species, we don't seem to be capable of learning from history and thus are doomed to repeat it.
>>
>>101758671
>The world's already burning:
RIDE THE KALI LINUX

>I thought some might be interested in battery-powered stand-alone servers serving what's left of human knowledge
cia no their way to find way to plant cp on that server and get you assassinated in post apocalyptic world
>>
>>101758706
In a post-apocalyptic world, the spooks no longer exist. All that remains are those who had the foresight to prepair, or who's personalities are such that they will survive by any means necessary- Mad Max style. A few will want to preserve history books, cook books, /diy/-type books, and mags, etc. I'm cannon fodder material, but I would leave helpful liturature behind for those who are survival-minded, as I would hope someone did the same for me. Without trust, there can be no civilization. If there is to be no civilization, then I want to go out in a blaze of gore and mediocrity.
>>
>>101758897
>In a post-apocalyptic world, the spooks no longer exist.
in post apocalyptic world, there are only spooks
i can guarantee you thats what the world would look like
>>
File: 4Cyb-Thanks4StoppingBy2.jpg (338 KB, 1600x1059)
338 KB
338 KB JPG
>>101758935
>i can guarantee
So you posit detention/'re-education' camps, black-sites where those of us who knew too much are tortured to death, or broken psychologically? We are dark souls, aren't we anon? Maybe they'll toss all of us /cyb/+/sec/+/pri/ anons in the same prison camp... imagine how much fun THAT would be. Imagine the smell. lol.
>https://youtu.be/pBQDfOpWfBI
>>
>>101759075
>Maybe they'll toss all of us /cyb/+/sec/+/pri/ anons in the same prison camp... imagine how much fun THAT would be. Imagine the smell. lol.
mental asylum
the only building that physically captures this thread
>>
>>101759143
i say mental asylum because spooks could not handle any one of us

if you look at cia behaviour, they are all just normalfags with too much funding
https://youtube.com/watch?v=c1Brqr_hCgg
>>
File: CybPandemic.png (232 KB, 1231x624)
232 KB
232 KB PNG
>>101759143
>>101759172
lol. I'm glad you clarified that. I was getting some "1984" movie clips lined up.
For me, the 1954 BBC version of Orwell's 1984 is the definitive film version.
Watching your link now.
>>
File: Fig.jpg (21 KB, 554x554)
21 KB
21 KB JPG
>>101719038
How much can people gain from just your email address?

Im off work and needed some deets done for work. I have an email for work and important real stuff. Then I have one for throwaway. Coworker is doing the list and asked me for my email and gave it to her not thinking much of it.

But then o remembered her bf is a bit of a delinquent criminal type and she has told me he has done things like open accounts etc with other peoples details.

How much can I be screwed over if they do it with my details? This is my "real" email for important stuff so I have my bank and investment stuff linked to it

This coworker now has my email, name and phone number. What can realistically be done with all this. No DOB
>>
>>101737644
Do you own one? I'd love to hear about the experience.
>>
>>101760061
Most account sign ups these days require some kind of verification, i.e. clicking a link sent to your email. They could also start sending phishing emails, or try to login to your email by taking advantage of your phone 2fa. People often authorize it on reflex so if he gains access he could change the password and look through your mail for more personal info. It also goes without saying that if you're pwned and in some dataleak database he could always login that way. It really just depends his level of effort and expertise.
>>
>>101760159
it is my daily driver

thinkpad x230
bga rework to 45w quad core
fhd screen mod (kind of wish i did the 2k mod)
speakers mic webcam removed
japanese x220 keyboard

running heads firmware and qubes os
soon moving to own coreboot and linux build

it is very complicated topic, i just got computer that could run without gayware (oem bios and intel me) and very much personalized it

if i had to get computer with all the things i know now it would be ibm thinkpad s30 (rare, really lower specs, would have to port coreboot) the only reason being its cute and would suffice
https://www.thinkwiki.org/wiki/Category:S30
>>
>>101760061
>How much can people gain from just your email address?

you should try searching yourself up

there are public tools that iterate website signups to see if account exists with that email, etc
>>
Should I throw my usb drives to the trash if my computer got infected?
>>
>>101760322
no
at most reformat them
>>
>>101756412
I'm at the corpo one sadly.
>>
>>101760216
Fellow Qubes OS user here; how much memory does your x230 have, and what's it like running Qubes OS on it?

Currently running with 8gb which is enough for my setup, but I eventually want to migrate to a x230 because of amd's psp and I want more a more libre laptop.
>>
>>101761025
i dont recommend qubes os in the end
you will be under tyranny of all the linux distros
it is ok if you are ok with updating often but ive had enough

>what's it like running Qubes OS on it?
no issues, that is it does all i need
in the end i wish x230 supported ecc ram

i have maxed out ram aka 16 gigs
i run mirage firewall and kicksecure sys-net for less ram usage on idle, dom0 also doesnt relaly need the default 4 gigs

once im done with my linux build ill slap that on the x230 and migrate my qubes os onto some desktop

hp z220 / dell t1650 / kgpe d-16 gigastation all support coreboot and are viably cheap

i recommend looking into trisquel / hyperbola as alternative to qubes os unless you have very specific use case
>>
>>101761084
I've been using Qubes OS for a while now lol, I am aware of its quirks and flaws.

mirage-fw is a godsent, running with only 65mb, and my sys-net having 325mb, pretty kewl.

also, dom0 runs fine with 1572mb of RAM, anything under might become laggy when running Qubes' tools (I prefer the cli tools anyways)
>>
>>101761123
i run i3wm in dom0 in floating mode
and common software is bound to function keys

ex f1 start or focus whonix tor browser

i switched to i3wm when they changed the app launcher in xfce for some reason, it did not scale properly on 1366x768 screen

though i could switch to xfce back after fhd screen mod, i once quickly logged into xfce session and it looked ok
>>
>>101761145
Am running dwm with somee patches on top of it, all compiled from a vault qube.

Haven't used XFCE in a while, mainly because I fucking hate floating windows.

Also, tools like qmenu paired with dmenu are just too good to ignore.
>>
>>101761167
>I fucking hate floating windows
the yin and the yang
i hate tiling because i like opening dozens of windows and scattering them around, xah lee like

i tried using dwm before i3wm and i coudnt get it to feel good

funny enough im using dwm in my linux from scratch configured to imitate my i3wm qubes setup
>>
>>101762242
time to rant about how privacy and security dont exist in this thread
>>
So a cve is publicly known and not patched for months and anyone can use it on the meantime?
>>
>>101764059
I thought that the details of serious vulnerabilities aren't made public until a patch is released
>>
>>101758671
>I plan on standing under a nuke if they start to fly, if you get my drift.
Checked Nukemap lately? Outbreak of a major war is expected 2027 - 29, so WFH should be strongly encourage simply for survivability concerns.
>I thought some might be interested in battery-powered stand-alone servers serving what's left of human knowledge - if there is such a thing.
Cold storage is also a thing and also safer. As fro recovery, history shows it is faster than most people think. Most of Hiroshima buildings were made of wood and burned. One bank building nearby was made in brick and remained. People inside died but two days later, then bank was opened. I am far more worried about genetic warfare. Missiles are tracked, but a viral outbreak comes with more or less playsible deniability. There are stil many things about COVID-19 that remains unknown.
>Now that I think about it, there's no point. As a species, we don't seem to be capable of learning from history and thus are doomed to repeat it.
Some will survive. The Medieval era was quite a civlisation reset, yet humanity survived.
>>
>>101765344
>Hiroshima
Modern bombs are almost a thousand times more powerful and you don't need to be an aeronautic geneticist to figure that out
>>
>>101765371
I know. And I also know that the volume scales with the megaton rating, the area scales with MT^(2/3) and the radius with MT^(1/3), or the third root. And that is why MIRV is a thing. To wit, please consider this triplet:
https://nuclearsecrecy.com/nukemap/?t=e6d2517a70964891a3c23b8eafcc87bc
During the cold war, the expression was that the distance between German towns was 10 kT. BAMA centres are now 5 MT. And the synergy between two or more nukes is worth considering.
Still, as long as you are not next to an obvious target such as a capitol or military base, you could survive in a bunker.
>>
We live supposedly in an "information society" and yet crucial inforamtion never reaches the surface until too late, if ever, while conspiracy stuff is wall to wall.
It took 40 years before anyone discovered that the US middle class had been standing still, and that the American Dream was essentially running on fumes. How was this possible with all the analysts working in finance?
The opioid crisis caused a marked fall in life expectancy for young women, and that took over a decade before it was discovered. How was that possible with all the actuaries and an age bracket where the women were in their prime?
And now we are getting news of another big one opening up:
>Rising rates of cancer in young people prompts hunt for environmental culprit
https://archive.is/vn8kR
>An analysis last year showed that, in the G20 group of industrialised nations, rates of several cancers are rising faster among the young than among the old.
And the response? Smoothly argued prevarication:
>In the meantime, screening programmes are changing: in the US, a task force has advised breast cancer screening starts a decade earlier at 40; but experts agonise over doing something similar for colorectal cancer, because it would still miss those in their twenties and thirties.

My issue is not that there are conspiracies, it is rather that it takes such a long time before serious news reaches the surface. Why is that? I am also disturbed that the most serious discussions on what is going on in the workd is on 4chan. Idiocracy rules elsewhere.
>>
>>101765344
>The Medieval era was quite a civlisation reset, yet humanity survived.
First off, there is a shit ton of "world" that is not the Western Roman Empire. There was never a question of humanity surviving an event localized to Europe and the Mediterranean.
Second, the Medieval era wasn't even that much of a reset for Europe. Yeah, long-distance trade routes declined and that did hurt the economy. But there was gradual technological advancement in agriculture over the Medieval era. Other than regional calamities like famines (worsened by the weakness of long-distance trade) and the plague outbreaks, population grew steadily over the calm years.
To give an example of security-related technology that came out of the middle ages: international banking! The Templar order created a deposit banking system where you could reclaim money at a different location than you originally deposited it.
They are only the "dark ages" because writing became a little less popular until the Romance languages other than Latin figured out how they wanted their writing systems to work.
>>
File: 4-Cyb-EndGame.Control.jpg (87 KB, 854x688)
87 KB
87 KB JPG
>>101765344
Hmmm. You just reminded me that the likehood of the next world war may very well involve biological and cyber weapons. This would make the most sense as attribution would be difficult and would leave valuable infrastructure intact for the invaders. So much for my hopes of going out in a blinding flash of light and being vaporized. Your right, though. Humanity will go on, but the costs will be high. Like they say, 'Hard times make strong men, strong men make good times, good times make weak men, weak men make hard times.' I just wanted to make memes.
>>101765764
>it takes such a long time before serious news reaches the surface. Why is that?
I think we both know why that is.
==================Music=================
>https://youtu.be/VW_lLQTqdUM?t=22
>>
How does deleting/recovering files and using programs like bleachbit work exactly? Like if I deleted a folder and its contents a few weeks ago and now I'm using bleachbit to wipe the drive entirely, would someone still be able to recover the files I deleted without bleachbit? Is there another program I should be using?
>>
File: 4-Cyb_CyberPolyBros.png (172 KB, 1072x739)
172 KB
172 KB PNG
>>101766328
While we can give you a technical explanation, it's simpler for you to watch this very short clip:
>https://youtu.be/ieP5Ei3jqFg?t=52
You are encouraged to learn the proper use of tools like this by running your own tests by copying some files to a flash drive (noting what they are), delete them both conventionally, and with a tool like BleachBit and see if you can recover the files with a tool like TestDisk. There is no substitute for hands-on learning and personal experience.
>>
>>101766923
Thanks, I'll start there. It's nothing super serious, just giving a computer away to a family member so I want to make sure the weird stuff is hard enough to find. No pizza or classified documents or anything like that to worry about. Just weird drawing references and erp chat logs, really.
>>
File: 4Cyb-CybCmdCtr.jpg (423 KB, 2068x1403)
423 KB
423 KB JPG
>>101767000
In your use case, you'll be fine. BleachBit is a great tool. If you ever need to recover files, TestDisk & PhotoRec are awesome:
>https://www.cgsecurity.org/wiki/Main_Page
You might want to run the latter tools on some old drives you come across or have lying around and prepare to be amazed at what you can find. I have done this with used drives that were supposedly 'securely erased' and have been able to recover small, but significant pieces of info from them. Since your giving the computer away (very nice of you), I'd recommend wiping the drive, and install the target OS fresh. I get lots of gear from /trashing/ and donations, and routinely check for usable applications, and data, but nothing personal. This includes a willingness to show folks how to wipe drives for reuse, rather than destruction.
>>
>>101767175
Thanks a bunch.
>>
>>101760061
Me? I have several email addresses for different purposes
>>
File: 4Cyb-CATSploit.jpg (619 KB, 1836x1315)
619 KB
619 KB JPG
Prove you have a soul
Express your thoughts in Haiku
If not, you're a bot
===========================

==----------==</cyb/ku>====--------==
Cyberdecks are memes
LEDs replaced neon
Cyberpunk is dead

==-----------==</sec/ku>====-------==
My OPSEC on point
'Hack the planet' is my call
I live to break code

==-----------==</pri/ku>==-------------==
Glue my RAM & ROM
Spooks observe from afar
They watch as you fap
==----------------------------------------------==

================Interdasting================
World of Haiku: 'The Next Generation of Cybersecurity Learning'
'Entering the World of Haiku is the first step to acquiring the critical, real-world skills needed to become a cybersecurity professional. This is the first and only gamified cyberpunk experience that teaches you real-world hacking skills and tools as you advance through the game missions.'
>https://product.haikuinc.io/haiku
=================Music===================
>https://youtu.be/XDVMh190XH4
>>
So say a person were to want to make their own matrix server, would it be possible to run all of the data on that thing through RAM? Also can someone even further decentralize a homeserver setting up requirements like that?
>>
>>101770231
run irc, matrix relies on persistent storage
or ssh chat or netcat chat

>>101767000
>Just weird drawing references and erp chat logs, really.
post the logs
>>
>>101770837
I need turbonormies to be able to use it is the main thing and I know matrix has guis for those fags to use
>>
>>101769295
>Prove you have a soul
>Express your thoughts in Haiku
>If not, you're a bot
Hey, that's a haiku itself. Nice.

I'm too lazy to write my own haiku though.
>>
>>101769295
>>101771004
Thanks for the remind!
I feel awfully greedy now.
Dreaming for knowledge.

Thank you regardless,
The soul of the machine lives,
Though no empathy.

Interfacing, rough.
My brain has no use for wires.
Instead, I am blind.
>>
>>101770930
you can try to tmpfs some directories then but probably will fuck everything up
>>
>>101771179
O7
I salute you sir,
I thank you for your service.
May you live forever.
>>
File: 4Cyb-Cyberpunks.jpg (1.31 MB, 2978x1985)
1.31 MB
1.31 MB JPG
>>101771004
Well, at least you're honest about being lazy- a very human trait.
>>101771090
ERROR: Syllabaic overflow in line 2.
Please reformat and try again.
>>
>>101771090
>Thanks for the remind!
>I feel awflee greedy now.
>Dreaming for knowledge.
>>
>>101771601
WARNING: Linguistic heckerman detected in line 2. 
Possible #Team-042 infiltration detected.
Error Code:4C 4F 4C 20 75 20 67 6F 74 20 6D 65.
Executing Ham Sandwich counter-measures.

>https://youtu.be/UAO86Iru53s
>>
>>101766133
>Hmmm. You just reminded me that the likehood of the next world war may very well involve biological and cyber weapons.
Some thoughths on how it may start:
https://www.bohicablues.com/wp-content/uploads/2024/08/C50-021-Because-This-is-How-It-Starts.jpg
>>
throw back to coppers and code since uk is on fire right now

https://vocaroo.com/16aKgpWKSMc0
>>
File: 4Cyb-RideOrDie.jpg (3.36 MB, 3890x2166)
3.36 MB
3.36 MB JPG
>>101772214
Your linkrel reminded me of the opening scene in that '28 Days Later" film. Kinda made my hair stand on end.
>https://youtu.be/n8FbMY-quW4
>>101772307
DJ Cygnus in the house!
>>
>>101772352
im thinking of making coppers and code 2

/pol/ has been spamming police live chats for the past day

my soul has been trapped by llvm compiling linux from scratch all day

but ill solve microshit captcha and make another suno account (last one got banned)
>>
File: DJ_Cygus.png (91 KB, 359x381)
91 KB
91 KB PNG
>>101772411
Look forward to it fren.
>>
>>101772352
Well, when you look at who can attack whom, and without scoring an own goal, things get complicated. Israel cannot attack Arab neighbours since Jews and Arabs are part of the semitic group of peoples and might risk self destruction. The US, being the melting pot, cannot attack anyone without scoring a few million dead in own goal. It certainly takes a peculiar mind to contemplate the extermination of a billion or so. Yet the risk remains, such as with edgelords with limited concerns about collateral damages.
Equally disturbing, too few realise that genes are embodied data, two bits per base pair, and even fewer think clearly about genetics in term of data security. From what I could find, only Putin has banned transfer of genetic data to other countries, while the West leaks like a sieve. I am not sure what happens in China.
>>
File: WhatWillYouDo.jpg (267 KB, 558x1303)
267 KB
267 KB JPG
>>101772536
>Equally disturbing, too few realise that genes are embodied data
Indeed. I was resently listening to a podcast on a very related issue.
An excerpt from "The Secret Teachings" with Ryan Gable for show date 8/1/20:

"...As for BLOOD SCREENING, hospitals and states say it is for preventing disease from spreading. What they don’t tell you is that the state keeps that blood and either trades it, sells, barters with it, or gives it away, to biotechnology companies, drug companies, laboratories, and even the Pentagon..."
>https://www.spreaker.com/episode/baby-body-and-blood-8-1-24--60889350

Whatever the case may be, we can be sure that globohomo despots and technocrats have no meaningful sense of morality and I would not be surprised to learn that there are dark sites where highly illegal human experiments of all kinds are conducted for any and every purpose. Anyone who desputes this is seriously and woefully ignorant.
>>
>>101772850
>globohomo despots and technocrats have no meaningful sense of morality
True. They do instead have a sense of self preservation. And that is not always enough.
As a thought experiment, one can imagine Iran thinks it is time to up the game against Israel and goes gentics. Initial reports might show it worked but a week later the Middle East is missing half a billion Arabs. And there are about another 4 million Arabs in the US, with poor prospects. Persians, however, are not Arab, so they will survive, and in any case they are not that friendly with Arabs. Depending on the scope of the genetic key used, this could move east and into Pakistan, India and Bangladesh, scoring another 1.5 billion in collateral damage. This could easily get out of control. And what happens in the power vacuum left after nearly everyone in a country is killed?
No matter if COVID-19 was a weapon (prototype) or not, it has showed the world how to make a gentic weapon. And it is strange how little work is don't on protection. I see western nation intelligence agencies are recruiting as if there is no tomorrow, but even a search does not show any elevated interest in genetic security. Weird, in a disturbing way.
>>
>>101772850
I guess it's the time
I am now become Luddite.
FOSS Freedom Fighter.
>>
I just got 4 text messages from an unknown number talking about not being able to attach (paystub) and then a picture of a computer screen and "last paystub."
I don't know what was on the picture, I didn't open it, I reported spam and deleted it.
My question is, what's the angle here? If I had responded would it have sent a phishing link? Was it just to see if my number is good? I guess I'm not conniving enough to see why anyone would do this. My wife thinks you can get a virus from looking at the picture in the chat. I don't see how this is possible, but I deleted it all the same.
It seems to me if you could get android to run software just from reading a text then it would happen a lot.
>>
>>101772535

COPPERS AND CODE V2 MASTER BRANCH **OUT NOW**

https://voca.ro/1oVg3JxuEnmP

Hopefully we will get V3 one day.
>>
>>101771538
I am lazy, yes
Really fucking lazy, true
Here is my haiku
>>
>>101773300
Checked
>even a search does not show any elevated interest in genetic security. Weird, in a disturbing way.
I can almost guarantee that the research is there, but NOT for general public to see. This is why we need hackers, leakers, and whistle-blowers in my view.
>>101773317
>>101773620
>
Running VK bot tests- Haiku integrity check status: PASS.
Based humanoids detected.

*Opens /cyb/er bunker gate*
>>101773455
That was fast!
PLEASE consider uploading your work to honkfm along with lyrics.
=====================Music========================
>https://youtu.be/v_IGMHH9gJw
>>
>>101773868
>I can almost guarantee that the research is there, but NOT for general public to see.
True, you have well known sites such as Porton Down, unofficially known as Mordor. While the contents and scope of research is secret (well, we are talking about mega-death and dubious legality here) there are still things in the open such as job ads. I am not looking for a new job but even to me it is obvious that intelligenc agencies are on a massive recruitment drive. And there is nothing to be found for military gene technology jobs. Complacency or extreme stealth? You decide.
>>
File: 359187251.jpg (149 KB, 640x960)
149 KB
149 KB JPG
>>101774077
Double-checked
>Porton Down
I was unfamiliar with this research facility. A quick search lead me to this:
>https://www.theguardian.com/science/2004/may/06/science.research
Makes me angry and sad. You can try to "redpill" normies, but at the end of the day, people are so brainwashed or uninformed that one cannot convince them of these truths until something happens
to them.
>>
>>101774272
The US is rather open, and has admitted to some rather disturbing experiments on handicapped children one would expect might not always be missed if/when the experiment went off the rails.
The UK, in contrast, loves secrecy, and has forcenturies had an upper class that considered the rest as barely subhumans. If those tests were done on airmen, I suspect far worse was tested on prisoners etc. who just disappeared afterwards.

Oh, and have you heard of Gruinard?
>>
File: Bill-Gates-Revealed1.png (2.15 MB, 1027x1551)
2.15 MB
2.15 MB PNG
>>101774662
>Gruinard
No, but just ran another quick search and learned it's sometimes referred to as the "island of death". It's all so tiresome. The world must be washed in the blood of tyrants, talmudists, and other kinds of faggotry.
>>
>>101774077
Porton Down is based. Apart from when they carried out human tests in the past, but I don't think they do that now.

Porton Down is what allows the UK (my country) to identify chemical weapons used by hostile states.
>>
>>101774851
>the "island of death"
Yes, that's the one. So you can probably see why I am so concerned about recent development. And it does not help that COVID-19 tracking is being closed down, while the trend is in fact slowly increasing during a season where a decline would be expected.

One positive story, before I go to bed: Churchill wanted to douse anthrax spores over Berlin, but thankfully was persuaded not to do so by his generals. The tests at Gruinard show that had they used anthrax over Berlin, the city would be uninhabitable to this day.
>>
>>101774892
>Porton Down is what allows the UK (my country) to identify chemical weapons used by hostile states.
OK, so one more story before I kip in: war correspondent Kate Adie had been to the Gulf during the war, and was shown a machine that supposedly could detect any chemical warfare agent and not be tricked by any other chemical. So she asked to test this, and got the goahead. She pulled out her perfume spray, and gave the machine a healthy dose. It was impressive how quickly everyone got into NBC their gear as the alarm was triggered by her perfume.
>>
File: 1722887633475581.webm (1.48 MB, 1024x1024)
1.48 MB
1.48 MB WEBM
>>101775005
>One positive story, before I go to bed: Churchill
I've been learning about his diaries and he realized he fought the wrong enemy, acknoledging the talmudist were the real enemy. Rest well, fren. Thanks for the company, and conversation.
>Verification not required.
>>
>>>/pol/477389709
>>
File: tip.png (27 KB, 618x451)
27 KB
27 KB PNG
>>
File: PXL_20240808_001836281.jpg (3.96 MB, 4000x3000)
3.96 MB
3.96 MB JPG
just came from defcon shoot, someone had a cyperpunk flamethrower
>>
is librewolf a recommended browser?
>>
>>101779399
That's a lot of brass on the ground. Puts a smile on my face.
>>
>>101779399
You gonna pick up that brass, anon?
>>
>>101775101
Spooky video. Interesting to see that AI viddeos have the same problems as AI images early on, such as with hands and feet.
>>
what's safer ethernet cable to the router or wifi
>>
>>101780465
No, it's a meme. Use the real Firefox with this user.js >>101734741
>>
>>101782290
Ethernet cable is safer, by far. It does not leak signals far outside your home. It is normally also faster since it doesn't rely on clogged up frequencies shared with counless other users plus non-Wifi services such as BT and Zigbee, or even non-data related stuff such as microwave ovens.
>>
>>101766328
Unless you use BleachBit's specific wipe options, your files can be recovered.

See: https://docs.bleachbit.org/doc/shred-files-and-wipe-disks.html
>>
>>101780465
yeah, its a lot less cancerous than stock firefox and also patches out things you can't change with a user.js like >>101782556 says.

all in all, it's the best option we have now, before the internet fully goes to shit and we all migrate to gopher or gemini
>>
>commute 2 hours to the next city because i forgot to delete a word document on an internet cafe's shared folder not affected by derpfreeze that contained my personal data
It's only been a day, but I hope no one fucking saw it.
>>
>>101719038
Reporting from Blackhat:
https://www.theregister.com/special_features/blackhat_and_defcon/
Pay attention to the dates though
>>
>>101719856
>CTO of Microsoft Azure
You have no idea who that guy really is... Do you?
>>
>>101737602
I work for a massive corporation. A bank, specifically. So selling out is an option.
>>101742213
>because Canonical are a business who have a reputation to maintain
Cloud strike and Intel are businesses that had reputations to maintain.
That said, I think the scale of a business can help with reliability. Tech startups are too gung-ho, and massive corps are so silo'd and outsourced that communication and intent sometimes breaks down.
I'd like to experience the middle ground one day.
>>101752036
I'm having fun with it, though it's on a normierig with a 4070TI super running windows 11 that I had a local tech guy build. And I torrent games without a VPN or antivirus and play on my quest 3.
So ah... Might have a couple security vulnerabilities here or there. Enjoying Alyx and just chilling in VRchat, and some asymmetrical combat games with my friend when he's in the country where one of us is a giant floating god head (VR) and the other is an itty bitty jetpack knight zipping around (laptop).
>>101758897
>In a post-apocalyptic world, the spooks no longer exist
Really? With funding that isn't recorded for early days, training and connections for the initial fall, facilities and a guiding common principle for 'reimagining' the organisation for the new landscape, you think glowies disappear? On a long enough timeline, sure, maybe. Reads as optimistic to me. But like today, they're a small group trying to manage a large one, so their relevance as a threat is real low. Scaling up with the grandeur of your schemes.
>>
One more post before I have to go for a while.
>>101769295
/corpo/ku
Product consultant
Never met an end user
Just regulations
>>
File: b54afdc58d6c5a2f.jpg (202 KB, 1332x850)
202 KB
202 KB JPG
>>101769295
remove brain and deed through
severed net collapsing brilliant stars and withers
what remains is permanently disfigured

time passes in and over
portal crosses minds and deeply touches mine
will i never die again

stronger yet oddly far away
distant light carry me across the gate
soon is not fast enough
>>
File: 4Cyb-NiceTry.jpg (119 KB, 1000x718)
119 KB
119 KB JPG
>>101781893
I look forward to the day when a fully autonomous mannequin tries to talk me into buying an outfit.
>>101785644
VK bot test initiated - Haiku integrity check status: PASSED

*Opens /cyb/er bunker gate*
Welcome back, fren.
>>101785644
VK WARNING: Replicant detected. Analyizing recited baseline: Poetic intergrity check status: PASSED. Continuing to monitor for baseline deviation.

"Citizen '5644, you're welcomed to visit and stay with us as long as you like, but at the first sign of trouble you will be retired. Nice digits, btw... oh, and keep your location transponder on at all times. We've had a few subversive skinjobs get though and cause problems. Thank you, for your cooperation."
========================News============================
Roh-roh Shaggy:
>https://thehackernews.com/2024/08/0000-day-18-year-old-browser.html
>https://thehackernews.com/2024/08/new-phishing-scam-uses-google-drawings.html
>https://thehackernews.com/2024/08/fbi-and-cisa-warn-of-blacksuit.html
========================Video============================
New Hated One vid: GOOGLE IS AN ILLEGAL MONOPOLY
>https://youtu.be/79ichE_LmLQ
========================Music============================
>https://youtu.be/kdIZ_QApnT4
>>
>>101786276
>I look forward to the day when a fully autonomous mannequin tries to talk me into buying an outfit.
That brings up another issue: when will people dress like it is 2024?
>>
>>101786276
ALERT: VK Scanner Self-Integrity Test FAILED. Duplicate/mismatch AUTH-keys issued. 
WARNING: vK..sKnnr entr*** vioLAtioN err0r..
KERNEL PANIC:
VK Scanner l0cked inUNSAFE race cont!t0n -
REBOOTING...


>>101784269
Sir, the VK Scanner was reportedly hacked by #TEAM-042 and allowed >>101785644 to get through the /cyb/er bunker gate with an access token that was meant for you. Sorry to keep you waiting.

>>101786407
The future of fasion will be a government issued, ill-fitting uniform made from recycled plastics and yard waste. Only the elite class will be allowed to wear what they want, and only if thier social credit score is high enough. Your picrel is a pleasurebot that will be made for the elite class as well. It will be a rental, subscription-based, connected gynoid that will make conventional women obsolete. Full, real-time, interative telemetry will ensure customer satisfaction. They will be superior because they will be AI-enhanced, and remote "piloted" by men in an operations center in Bombay, India.
>>
>>101719856
No, he's not right. Languages can try to baby programmers all they want, but if someone writes shitty code it'll become a shitty program. C can and already has been used in life and mission critical areas based off of guidelines like MISRA C and with high-assurance compilers such as CompCert. Rust is a politically-charged piece of crap without firm standards like C89/C99 (These will NEVER change and will still be around 40 years from now) and lacks a mature ecosystem.
Anon, a lot of c-class executives are just dumb faggots with MBAs and the right connections. They know how to talk and surround themselves with yes men. Don't trust shit they say.
>>
>>101786859
Yeah, if this guy had literally ANY qualifications in the tech industry beyond a rubber stamp MBA and a laundry list of dicks he sucked to get a cushy job, it is unthinkable he would ever fall for this """safety""" snake oil
>>
File: 1364618628200.jpg (187 KB, 616x820)
187 KB
187 KB JPG
still learning about VPNs. I keep hearing mixed takes on them

>They help keep you secure, establishing tunneling, and preventing ISP and others from looking into whatever you're browsing

vs

>They're insecure, you're just trading one company for another on who has access to where you're browsing.

I want to get better at digital hygiene and privacy, as well as safely navigate darkweb for non-censored news regarding both tech/vulns discussion forums. I've tried researching through a handful of video topics about VPNs and the general idea I'm getting is to try and do extensive research on each, until you find one without sus backgrounds, and a record of upholding customer privacy.

Any advice?
>>
>>101786759
no energy flow
left your port undefended
hydrate you dumbass
>>
File: 4-Cyb_MT-Valis.jpg (1.11 MB, 1200x1920)
1.11 MB
1.11 MB JPG
>>101787284
VK Scanner v2, ©2024 Piggumoto Cyber-Heavy Industries, Inc. 
Running Haiku intergrity check...
Status: PASSED.
WARNING: Possible #Team-042 member detected:
Disposition: DETAIN,QUESTION,SEARCH...
Keyword Detected; 'hydrate' - Running AD....

"Thirsty? Why not try some Mount VALIS™ powdered water substitute! It's virutally delicious!"
>*Gate opens VERY slowly*
>>
>>101787278
If you use a VPN, you need to trust it as it acts as a new ISP; it can read ALL data that does through them.

Your ISP and anyone snooping on the internet can still see that you connect to them, but (hopefully) your VPN uses encryption so it's impossible to read.

But the VPN can read everything, and if you're doing illegal stuff, it can be linked to you. But that's only if the VPN keeps logs.

Personally, I would use proxy into a VPN I own, which then uses Tor to retrieve everything. By using my own server as a VPN, I know that it's not logging anything (provider logging is out of the scope, but am jusy saying), and Tor is to cloak my VPN's IP.

Just use a reputable and known zero-logs provider and you are gucci. I've seen Mullvad recommended the most.
>>
>>101779399
So does it use the flame as a transport medium to electrify shit? Or how does that work? Overkill if you ask me but sometimes that needed.
>>
File: 1405639799692.png (198 KB, 498x499)
198 KB
198 KB PNG
>>101787610
I'll look into Mullvad and any zero-log providers, ty anon.

Excuse my low-level tech illiterate brain but; if you own the VPN server, even if you're proxying back into it, that server still has to access the internet through an ISP.

Is this not a long way around equivalency of using your own computer to connect to it's own server then ToR?

Wouldn't the ISP your private VPN server is connected to, be aware that it is under your name, even when the VPN masks its IP?

And isn't there also a possible flaw if the proxy you originally connected to early on in the chain, be compromised to begin with?

I don't anticipate myself to partake in illegal activities to begin with, but the idea that if I'm browsing a site that discusses cybersecurity breaches/vulns that also acts as a marketplace for illegal activity, illicits a feeling of insecurity both emotional and technical.

I'm also just cynical and paranoid.
>>
>>101788026
>I'll look into Mullvad and any zero-log providers, ty anon.
cheers

>that server still has to access the internet through an ISP.
right, in that case you need to buy the server from an offshore provider. it also needs to be bullet proof, if you want to be ignore any subpoenas from the feds and stuff.

>Is this not a long way around equivalency of using your own computer to connect to it's own server then ToR?
not really, as your ISP can now only see the traffic inbetween your device and the server; no Tor traffic is seen.

>Wouldn't the ISP your private VPN server is connected to, be aware that it is under your name, even when the VPN masks its IP?
Yes, the VPN is connected to you, so you must buy it cash (which Mullvad allows) or with an anonymous cryptocurrency, like Monero (which Mullvad also allows).

>And isn't there also a possible flaw if the proxy you originally connected to early on in the chain, be compromised to begin with?
Right, but it can also happen that your VPN is compromised, or your entire Tor circuit consists of backdoored servers.

Create a threat model, and pick your tools based on that.
>>
>>101788101
>>101788026
Also, paranoia is good, it keeps you on your toes. But too much is unhealthy, and starts too lean into the schizo side (what if the government has installed UEFI malware on this Thinkpad x230 I bought off ebay? type shit)
>>
File: 1411355420775.jpg (363 KB, 726x803)
363 KB
363 KB JPG
>>101788101
>>101788126

Treasure trove of advice. I appreciate all of it, anon. Thank you.
>>
File: 1715635086582802.png (839 KB, 1600x1125)
839 KB
839 KB PNG
>>101788339
keep up the learning anon, if you need anything, I am almost always lurking in these threads
>>
>>101787278
>>101788026
botnet avoid

use internet only when needed
>>
>>101788501
some threat models call for different strategies, eg; you need to stay in contact with somebody for 24/7 to release files if they ever miss a day of contact, or; you need to monitor something every second.

but yeah, in almost every other case, avoiding the internet is the best. but you still require a proper and secure setup for when you *do* access the internet :)
>>
Are there any cyberpunk bars on this planet, like in a cyberpunk game? Same style.
>>
=== /sec/ News:
The Raspberry Pi FOundation just launched a new chip:
>Raspberry Pi Pico 2, our new $5 microcontroller board, on sale now
https://www.raspberrypi.com/news/raspberry-pi-pico-2-our-new-5-microcontroller-board-on-sale-now/
They make bold claims on security:
>The cornerstone of the RP2350 security model is signed boot. If security is enabled, it is only possible to boot a binary if it has been signed using a private key, with a hash of the corresponding public key stored in OTP. Preventing an attacker from running arbitrary code greatly complicates the task of extracting OTP contents, including cryptographic keys used for code protection.
>Other vendors’ track record in implementing boot security is pretty dismal. Broad-market microcontrollers often lack effective countermeasures against modern fault-injection attacks, such as those employed in LimitedResults’ Debug Resurrection attack on Nordic nRF52 devices, and Chris Gerlinsky’s work on bypassing Code Read Protection in NXP LPC family devices.
>While RP2350 uses several techniques, including hardware fast glitch detectors and our patent-pending redundancy coprocessor, to protect control flow and data integrity against fault-injection attacks, we fully expect to find, and fix, flaws in our boot process. And we want to find these flaws early, before RP2350 is deployed in critical applications.
>Ahead of launch, we commissioned NewAE and Hextree to audit our security architecture. And now we’re offering a $10,000 bounty for the first confirmed break of our signed boot process. This will run for a month in the first instance: we may extend the window if no flaw is found, or offer further bounties for further distinct flaws. Full details of the bounty program can be found here.
>>
>>101788526
just use public wifi
>>
>>101788690
anybody can snoop on public wifi, you still need a VPN.

and also a long-range WiFi antenna, because you don't wanna be recorded as public wifi usually means public place, in turn meaning cameras.

also, mac spoofing is useful in that case, new MAC everytime you connect
>>
If at one point I get ads beamed into my forehead I will force myself to stop breathing.

defibrilator .............. OK
heartrate ................. STABLE
rebreather module v04/2 ... GO

Drone lmn0p_section-4 resumed function
Status: Prime directive, shitpost.

>Na uh. Not yet.
>>
>>101788728
>you still need a VPN.
no you dont stop making up requirements
>>
File: 1721678418644675.gif (145 KB, 680x846)
145 KB
145 KB GIF
Is it true that some cybersec workers don't use Linux in the workplace?
I'm getting made fun of for using Kali to learn/work on.
>>
>>101789102
they probably read this mental illness guide

https://madaidans-insecurities.github.io/security-privacy-advice.html

>Captcha: JJJJ
>>
>>101789099
whatever makes you sleep, if you don't want/need to use a VPN then don't, easy as that.

>>101789102
Ehh, I would say they work with Linux, but don't neccesarily use Linux. My team all uses Windows, except me and another guy, but they all work with Linux because of our servers.

I wouldn't personally use Kali, because it's bloated, slow and gets in my way more often than not. But for learning, it's awesome.

But all it does is present you with all the tools you *might* need in a fancy way. Alpine Linux, with just the tools you need works the same as Kali Linux with everything preinstalled.

Just ignore those pricks and use what is the most efficient for you.
>>
File: 1701235108901110.gif (1.23 MB, 297x312)
1.23 MB
1.23 MB GIF
>>101789378
>My team all uses Windows, except me and another guy, but they all work with Linux because of our servers.
You do red team or blue?
This entire time I've been under the assumption that Linux was almost universally used in cybersec. Wtf.
Do you use gui's with windows? Which programs? Am I wasting time learning cli's?
>>
>>101789488
>I've been under the assumption that Linux was almost universally used in cybersec. Wtf.
ignore him hes obvious ameriturd shilling vpns (HONEYPOTS)

americans use windows 11 because its "most secure"

if you were in military you would be forced to run linux under microhypervisor
>>
>>101789488
I enjoy doing basic red teaming, but my team is not doing much cybersec. We're just a small startup, so basically everything's on me lol. I do educate them on whatever I can though.

I try to stay within the terminal, because I am more comfortable with it. And you should be, not always will the machine you're pwning have RDP or VNC available, and you'll be left with a SSH connection and a bash shell. Learn the basics on how to navigate around a system, some lolbins maybe, all that stuff.

My toolset mainly consists of vim for editing and programming, dropbear's client for ssh, nmap for scanning, and some selfwritten tools (mainly for interacting with API's such as shodan or censys for easy scanning or other misc stuff). Not much, really.

>>101789523
Sure, I'm an ameriturd with no knowledge at all. Nothing but a shill, advocating for setting up your own secure VPN to bask in the pros that it provides, while also letting you know of the cons.

Also. Windows 11 isn't the most secure, it's just that it works and is a standard. But Linux is also used, I think the NASA uses Linux for the ISS, and a lot of their systems.

A lot of science labs also use Linux, or a distribution specifically for handling all that data.
>>
>>101789640
>own secure VPN to bask in the pros that it provides
>vpn
>secure
AHAAHAH
fuck off snakeoil salesman next you are gonna bring up proton
>>
>>101789523
us corps use windows because it makes it easy to spy on your own employees. no one gives a shit about security and they get hacked all the time
>>
>>101789672
thats why i said most secure in quotes
>>
>>101789662
ProtonVPN? Hell no, I have stated multiple times you need to either 1) pick a reputable no-logs VPN or 2) setup your own vpn using wireguard or openvpn.

Do you even read my messages before spouting stupid shit?

>>101789672
That too, outside of Redhat's RHEL there is no good industrial Linux distribution (debatable, but I've seen RHEL being used the most).

But a lot of employees also seem to be using regular Linux for their workstations, no? I've seen my uncle use regular Debian on his laptop (Installed it for him) and he's allowed to do so, granted he takes his security seriously.
>>
>>101789640
>it's just that it works and is a standard.
Would you say MOST cybersec orgs use windows over Linux?
I legitimately thought it was majority Linux. If CLI stuff makes up a minority of the work cybersec does then the job is seemingly way easier than I thought initially.
>>
>>101789739
>reputable no-logs VPN
reputable no-logs mossad software
iq?

>setup your own vpn using wireguard or openvpn
now you have to pay for second network to stay "secure"

there is no "no logs vpn" because all internet cables are wiretapped

stop shilling snakeoil
>>
>>101789746
>then the job is seemingly way easier than I thought initially
most cybersec retards are just scam artists who give the most snakeoil recs so they can keep their scam going
>>
File: 1692920344775184.png (187 KB, 698x400)
187 KB
187 KB PNG
>>101789746
That reallly depends on the field, I don't know for sure.

I'd say; for servers, definitly not. For workstations/personal devices, most likely.
Linux experience is a different thing however.

You are gonna be using the cli a lot though, for tools such as nmap, sqlmap, netcat, metasploit etc etc. So it's best to know and not need, then need and not know.

>>101789769
Funny how I said something about going full schizo mode before (>>101788126), and you are here coming with the "all internet cables are wiretapped" shit.

I think my point has been proven, and you are retarded. And possibly even a fed, here to derail the thread.
>>
>>101789828
>I think my point has been proven, and you are retarded. And possibly even a fed, here to derail the thread.
you do realize it has been publicly known all internet cables are wiretapped since 2013 right newfag?

>going full schizo mode
minimizing networks where your 1s and 0s go through is not "schizo"

you are the fed shilling that you should route your information all over the internet so it doesnt miss a wiretap
>>
>>101789847
See >>101788526
>but yeah, in almost every other case, avoiding the internet is the best. but you still require a proper and secure setup for when you *do* access the internet :)

Again, have you even read my previous posts?
>>
>>101789866
>dont use the internet but when you do make sure you use a vpn
fuck off retard
>>
>>101789882
Right, ad hominem.
>>
>>101789906
>has to curse me with some latin spell because he knows hes wrong
>>
File: media_GToCH_vaoAAbqqR.jpg (794 KB, 4096x2733)
794 KB
794 KB JPG
So we are back on page 9. Nighthcore will hopefully save us once again: https://youtu.be/CSbC7MHZ5ik
>>
did invidious shit the bed again?
>>
>>101791186
yes just stop using jewtube
>>
File: shillkilling.png (17 KB, 289x287)
17 KB
17 KB PNG
>>101778170

REBOOT THE TEMPLE BY DJ CYGNUS **OUT NOW**

https://voca.ro/178pyr38HA2r

I DONT KNOW WHAT HAPPENED PAST 2:30 TIMESTAMP
ACTUAL GHOST IN THE MACHINE?
>>
>>101783620
Ah fuck, I missed you. I was ghere too. Would have been good to talk with an anon. A lot of the talks sucked.
>>
>>101791888
I'm not the anon that went to BH, I just posted a link to news articles by El Reg
would love to BH once in my life, though

>A lot of the talks sucked.
seems to be a common trend these days... there doesn't seem to be anything new in security anymore, sadly
>>
>>101793224
It's not that there weren't good talks, I really liked a few few of them. But it's just that a lot of them are really eh. Like "How Hackers Changed the Media (and the Media Changed Hackers)". The presenters are reporters, this shit isn't novel or interesting, they aren't even tech people. Or "The Fundamentals of Cyber-Insurance". Like ok, relevant to the field but really? The people there should either a)know about it because of their position, or b) not care because it's not their business yet.
The trainings are still good and there still are really excellent talks but the appeal of "I spoke at Blackhat" on a resume is far to alluring for some cooperate go-getters to pass up.
Like with everything, mileage may vary.
>>
>>101793647
>"How Hackers Changed the Media (and the Media Changed Hackers)". The presenters are reporters, this shit isn't novel or interesting, they aren't even tech people.
>"The Fundamentals of Cyber-Insurance"
ah, I see. I consider those talks fillers... but blackhat is well known for being very "industry-friendly" (and expensive af) so allow a lot of bullshit like that. otoh, defcon is well known for being more hacker friendly, though I guess it's not the same thing it used to be.
>>
File: 1713503587805775.png (5 KB, 324x156)
5 KB
5 KB PNG
>>101719038
a while back i remember seeing a link for a website that basically tracks all IoT devices that are open to the public and lightly secured. does anyone know the site?
>>
before death
>>
VALIS anon here. Just checking in to make sure the site's working for everyone using it and seeing how the thread's doing. Unfortunately still not stable enough in meatspace to regular here again but I do want my resource running well for you guys.

Probably going to wipe the Gentooman Library in a few months because it is apparently a DMCA nightmare still, even stripped like I have it, and I really can't deal with that shit right now. So if you want anything there, grab it now.
>>
>>101796464
running this to download

wget2 -e robots=off -r -np --max-threads=10 https://valis.moe/files/Technology/Gentoomen%20Library/
>>
File: PXL_20240809_071306538.jpg (1.72 MB, 4000x3000)
1.72 MB
1.72 MB JPG
>>
>>101796528
How to contrinute new files?
>>
=== /sec/ News:
>USPS Text Scammers Duped His Wife, So He Hacked Their Operation
https://it.slashdot.org/story/24/08/09/0032216/usps-text-scammers-duped-his-wife-so-he-hacked-their-operation
>The flood of text messages started arriving early this year. They carried a similar thrust: The United States Postal Service is trying to deliver a parcel but needs more details, including your credit card number. All the messages pointed to websites where the information could be entered. Like thousands of others, security researcher Grant Smith got a USPS package message. A couple of days earlier, he says, his wife called him and said she'd inadvertently entered her credit card details. Over the course of a few weeks, Smith tracked down the Chinese-language group behind the mass-smishing campaign, hacked into their systems, collected evidence of their activities, and started a months-long process of gathering victim data and handing it to USPS investigators and a US bank, allowing people's cards to be protected from fraudulent activity.

>In total, people entered 438,669 unique credit cards into 1,133 domains used by the scammers, says Smith, a red team engineer and the founder of offensive cybersecurity firm Phantom Security. More than 50,000 email addresses were logged, including hundreds of university email addresses and 20 military or government email domains. The victims were spread across the United States -- California, the state with the most, had 141,000 entries -- with more than 1.2 million pieces of information being entered in total. "This shows the mass scale of the problem," says Smith, who is presenting his findings at the Defcon security conference this weekend and previously published some details of the work. But the scale of the scamming is likely to be much larger, Smith says, as he didn't manage to track down all of the fraudulent USPS websites, and the group behind the efforts have been linked to similar scams in at least half a dozen other countries.
>>
bump
seriously no one cares about cybersec in this board lmao
>>
>>101796464
Damn, good shit in there, thanks Anon
>>
>>101798628
Step 1. Read >>101796464 carefully.
Step 2. Contact him at nvv(dot)moe with your proposal.
Step 3. Tell him Deep /cyb/ Radio AM 404 - International sent you, and enjoy 10% off a box of Replikka® CHIXX™. Digi-licious, IOT-connected* nutrition substitute.

Because he is currently in another dimension, alternate reality or checking his mail a turbulent and unstable meat-space vortex, he may take a long time to respond.
========================Video===========================
A.I.Joe delivers some news:
>https://youtu.be/CHgVzLNjwWE
00:34 - CrowdStike reveals the cause of outages
01:54 - Critical solar power grid vulnerability
02:45 - Phishing bypasses Microsoft safety warnings
03:49 - Windows update allows downgrade attacks
04:52 - Delaware hospital breached by a ransomware gang
05:50 - Google admits disclosing information to the government
06:24 - Browser vulnerability puts you at risk
07:11 - North Korean laptop farm disrupted
07:54 - A cyberattack kills two cows
08:41 - Defcon and Blackhat
=========================Music===========================
>https://youtu.be/t6KFfYdNPh8
>>
>>101801214
What? There is plenty of security news here, in fact one just above your post.
>>
>>101801627
>There is plenty of security news here
??? they are posted by, like, one or two people, and they post it to bump the thread because the thread has been almost been archived many times already
>>
>>101801918
>??? they are posted by, like, one or two people,
Does that matter?
and they post it to bump the thread
I posted a few of those, not to bump but just because I saw interesting news I hoped would be of interest to people here.
>because the thread has been almost been archived many times already
It is still alive, that is what counts. Compare this to the rest on the /g/ catalogues, and you will see most threads are pure drivel.
>>
>>101802512
>It is still alive, that is what counts. Compare this to the rest on the /g/ catalogues, and you will see most threads are pure drivel.
... I compare this general to many other ones and this one sucks dick. no one posts technical stuff, the news usually come from mainstream media instead of specialized or more knowledgeable sources, we always get a bunch of """cyberpunk""" crap and fiction talk, and now there is this anon >>101801609 trying to shill their stuff here.
even with all of that, it feels like half this thread is kept alive by bots and a very small group of people and is always hitting page 10. that means there is no actual interest in cybersec from outsiders beyond
>I want a cybersec job because of the money
>>
File: 4Cyb-DEFCON24.jpg (102 KB, 1356x643)
102 KB
102 KB JPG
>>101802576
>trying to shill their stuff here.
Ask me how I know you're new here- go ahead, ask . . .
Also, we are not obligated to fetch news or anything else for (you). Try contributing to the thread if you don't like what you see.
>>
>>101802720
>Ask me how I know you're new here- go ahead, ask . . .
HAHAHAHAHAHA
I've been here before this mixed general was a thing, you fucking faggot. in fact, I was one of the anons that would go to /cyb/+/sec/ and tell them that the thread was /LARP/+/cert/ general, that /cyb/ had nothing to do with /sec/, and then, when someone merged a bunch of threads, I told them to merge /cyb/+/sec/ too because all of the generals related to privacy and security were failures lmao

>Try contributing to the thread
I'm not gonna do that precisely because I see no interest in the technical stuff. I'd gladly contribute if there was ANY INTEREST in pentesting/ethical hacking/bug bounties, but literally no one cares. the questions people make here are usually about certs and generic privacy stuff
>>
>>101802800
i'm just waiting for somebody to mention maldev stuff, that's the stuff that interests me
>>
File: PXL_20240809_071312986.jpg (1.12 MB, 4000x3000)
1.12 MB
1.12 MB JPG
>>101802847
be the change you want to be, what are you working on, what do you want to learn, post a news article etc
>>
>>101802863
can't really talk about the stuff I'm working on ;), but I do want to learn more about how peer to peer malware works, and all tle lesser known types, like hybrid peer to peer, federated.

I can post some articles, but I don't have any recent ones, only ones I bookmarked because I found them interesting/educational.
>>
>>101802847
>>101802908
the reverse engineering general that pops from time to time is more akin to that IMO, and that one usually has people talk about technical matters, but as everything related to reverse engineering, there is little activity, which means it dies quickly in this board
there are tons of RE-related channels in telegram, I suggest looking for groups there. also, there is an active subreddit (or at least was active some years ago)
>>
>>101803362
yeah, I'm not a fan of Telegram; homemade encryption, cancer UI, no proper cli tools, also not as secure as it seems.

I'll be on the lookout for the RE generals though, thanks
>>
>>101802576
>fiction talk
I, for one, completely stopped doing that, and now the general is a mcfucking ghost town
Maybe I should be asking you sluts for help with CIA agent character designs?
>>
File: 4Cyb-MetaRape.jpg (153 KB, 1020x441)
153 KB
153 KB JPG
>>101802800
You're in the wrong place if you think you're going to have deep meaningful discourse here. While it does happen from time to time, this usually occurs because someone will share something interesting, and others will sometimes follow suite.
>I'm an oldfag
Yet, you seem to forget where you are. I replied to your post because you seem to be under the impression that I have porducts to 'shill'. If you actually read through these threads, you'd get the joke. I'm not interested in having a meaningless argument with you, but if you're going to accuse someone of being a shill, you should know what you're talking about, and clearly case of my posts, you do not. No need to reply.
Thank you, for contacting the station.
>>101803634
>CIA agent character designs
If you look at the current crop of alphabet soup employees in the news, you'll find a treasure trove of memeable character ideas if you are writing fiction, or making memes. They are characatures of themselves. If you were being sacastic, well- you got me.
>>
For anyone who isn't LARPing on this thread. Whats your favorite object oriented language, to research deserialization vulns?

I personally spend a lot of time researching custom c# deserializers (and deserialization libraries) but have spent no time on java deserialization. Has anyone spent anytime on more obscure object oriented deserializers that aren't just c#/java (or python for that matter, the fspickler doesn't count)
>>
>>101803836
>If you were being sacastic
No, I'm unironically trying to give these characters different faces because (unlike most of the other characters in the script, such as pic related) they're otherwise indistinguishable on account of wearing identical suits
The maids have the same problem but are still less of a priority because most of them are interchangeable and never talk
>>
File: a-pose.png (843 KB, 1200x1400)
843 KB
843 KB PNG
>>101803998
>pic related
Fucking shit, didn't upload
>>
File: 4Cyb-ASCII-Bros.jpg (3.47 MB, 2353x2270)
3.47 MB
3.47 MB JPG
>>101804009
Is this you, FASTMAN screenwriter anon? Without context, I can't really suggest anything other than what I've already stated. What are you working on specifically? Artwork?
>>
Stagnation is an occasional topic here.
>Agile is Killing Software Innovation, Says Moxie Marlinspike (theregister.com)
https://developers.slashdot.org/story/24/08/09/1418217/agile-is-killing-software-innovation-says-moxie-marlinspike
and
https://archive.is/mRAsH
>There's a rot at the heart of modern software development that's destroying innovation, and infosec legend Moxie Marlinspike believes he knows exactly what's to blame: Agile development. Marlinspike argued that Agile methodologies, widely adopted over the past two decades, have confined developers to "black box abstraction layers" that limit creativity and understanding of underlying systems.
>"We spent the past 20 years onboarding people into software by putting them into black box abstraction layers, and then putting them into organizations composed of black box abstraction layers," Marlinspike said. He contended this approach has left many software engineers unable to do more than derivative work, lacking the deep understanding necessary for groundbreaking developments. Thistle Technologies CEO Window Snyder echoed these concerns, noting that many programmers now lack knowledge of low-level languages and machine code interactions. Marlinspike posited that security researchers, who routinely probe beneath surface-level abstractions, are better positioned to drive innovation in software development.
>>
>>101802908
Gonna post some of my bookmarked articles. They're mostly technical deep dives of malware and exploits and the like:

https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/
https://blog.qualys.com/vulnerabilities-threat-research/2021/01/04/technical-deep-dive-into-solarwinds-breach
https://blog.netlab.360.com/an-analysis-of-godlua-backdoor-en/
https://www.stratosphereips.org/blog/2019/4/12/analysis-of-a-irc-based-botnet
https://www.stratosphereips.org/blog/2020/4/29/rhombus-a-new-iot-malware
https://www.synacktiv.com/publications/krustyloader-rust-malware-linked-to-ivanti-connectsecure-compromises
https://www.zscaler.com/blogs/security-research/dreambus-botnet-technical-analysis
https://www.fortinet.com/blog/threat-research/ddos-for-hire-service-powered-by-bushido-botnet-
>>
>>101802576
>page 10
That just means we know how to spice our food.
>>101803634
>pic related
>>101802863
Can you do something cool with the badges?
>>
>>101803634
>help with CIA agent character designs?
Why? I thought this was the favourite place for the NSA crowd.
>>
Okay /sec/, I may have asked this here some months ago, I can't remember

Do you reckon old CPUs are insecure? Because they no longer get microcode updates to fix severe vulnerabilities?
>>
File: test render.webm (2.4 MB, 1920x1080)
2.4 MB
2.4 MB WEBM
>>101804161
>FASTMAN
Why do you keep capitalizing it like that?
But, yeah, it's me
I promised you guys the worst Blender shit you've ever wrinkled your faces at in abject disgust, and I intend to deliver, at least once I've figured out how the fuck to pose shit
>>
File: agent_head_sculpt.jpg (45 KB, 1920x1080)
45 KB
45 KB JPG
>>101806464
They are fictional characters in a fictional story where some luminescent goons try to rendition a digital nomad who's running all over Japan
I posted WIPs of the screenplay here a few times, and the thread about it on /3/ is still up
>>>/3/984037
Anyway I'm trying to design faces for the agents that aren't just actors who played agents in The Matrix
>>
IDA Pro 9 beta leaked:

https://wetransfer.com/downloads/a816d090f3cdd746067098ac982633af20240809172827/40238d

Installer is signed, but there are no cracks out yet. Making one is probably a good beginner project.
>>
File: Brain2Txt.jpg (800 KB, 756x3243)
800 KB
800 KB JPG
>>101806768
>capitalizing
IIRC, I've seen it written that way, and thought that how it's stylized.
Have you considered generating a generic face using a service like https://thispersondoesnotexist.com and mapping it to a generic uncontoured head? Almost like inflated ballons? LOL. The render looks fun. Cringe is the new cool, so I look forward to it.
==================Music=====================
>https://youtu.be/8Hn8FdVSgVY
>>
>>101801559
of course anon, all for the pursuit of knowledge. Once I can get some more storage space, I'll have some very fun files for you guys contributed by another anon. Some of you will likely know what I'm talking about.

>>101798628
follow >>101801609
basically.
Email me letting me know what you want to upload first so that I know to check my email regularly for the files. Once I reply, I'll be ready to receive whatever. There's some stuff I have to decline because god damn I hate lawyers, but I'll upload pretty much anything.

which reminds me /cyb/ anon can you send me the last meme batch? I didn't get the last few, they expired while I was away.
>>
File: media_GTlBcmvbUAABauD.jpg (1.27 MB, 2731x4096)
1.27 MB
1.27 MB JPG
>>101807899
>There's some stuff I have to decline because god damn I hate lawyers, but I'll upload pretty much anything.
I try to avoid that too but there are many files so things may inadvertently slip through.
>which reminds me /cyb/ anon can you send me the last meme batch? I didn't get the last few, they expired while I was away.
Is that related to the 4 Cyb_library files sent via Catbox?
>>
File: 1723166058191.png (129 KB, 825x817)
129 KB
129 KB PNG
>>101791824
TOTAL DESTRUCTION **NOW OUT**

1. https://voca.ro/194Dlk1SwfSd - THIRD TEMPLE
2. https://voca.ro/195OlPKb1htu - GHOST IN THE MACHINE
3. https://voca.ro/17pjbjj0Dbwm - CONFIG_CRYPTO_SERPENT_SSE2_586
>>
>>101786407
Some zoomer girls already dress that way
>>
File: g_bingo.png (977 KB, 1280x1480)
977 KB
977 KB PNG
>>101723009
This is really irritating, I almost won except I habitually say "no homo" before getting railed by my bf's (femme) cock
>>
>>101809966
>he doesn't have a classic thinkpad
get out of this thread and don't return
>>
>>101723009
>omosexuality
I know this is a typo, but...
>>
>>101806231
those are staff badges aka goon badges so it lets you do whatever, consider it privilege escalation
>>
THE OFFICIAL /cyb/+/sec/ MEETUP WILL BE SATURDAY NIGHT AT THE BELLAGIO
KEEP YOUR EYE ON THE DISCORD ANNOUNCEMENTS FOR THE ROOM NUMBER
>THE OFFICIAL /cyb/+/sec/ MEETUP WILL BE SATURDAY NIGHT AT THE BELLAGIO
>KEEP YOUR EYE ON THE DISCORD ANNOUNCEMENTS FOR THE ROOM NUMBER
THE OFFICIAL /cyb/+/sec/ MEETUP WILL BE SATURDAY NIGHT AT THE BELLAGIO
KEEP YOUR EYE ON THE DISCORD ANNOUNCEMENTS FOR THE ROOM NUMBER
>THE OFFICIAL /cyb/+/sec/ MEETUP WILL BE SATURDAY NIGHT AT THE BELLAGIO
>KEEP YOUR EYE ON THE DISCORD ANNOUNCEMENTS FOR THE ROOM NUMBER
THE OFFICIAL /cyb/+/sec/ MEETUP WILL BE SATURDAY NIGHT AT THE BELLAGIO
KEEP YOUR EYE ON THE DISCORD ANNOUNCEMENTS FOR THE ROOM NUMBER
>THE OFFICIAL /cyb/+/sec/ MEETUP WILL BE SATURDAY NIGHT AT THE BELLAGIO
>KEEP YOUR EYE ON THE DISCORD ANNOUNCEMENTS FOR THE ROOM NUMBER
>>
File: PXL_20240810_000102090.jpg (1.56 MB, 4000x3000)
1.56 MB
1.56 MB JPG
>>101811651
fuck discord post it here please

PS goons got pwn3d
>>
File: 1623150694139.jpg (29 KB, 600x503)
29 KB
29 KB JPG
Can images contain viruses? And if so, what can I do to keep the image and purge the shit from it? I go through a company that scans old film to digital but I've heard of shit like computers being infected and then spreading through files that computer makes/handles, such as images.

Would using ExifTool to strip basically everything except the most basic info get rid of anything hidden in the file that could be a virus?
>>
>>101719038
SOCIAL MEDIA SECURITY
is it better to have different emails for each account ?
tutanota/ tuta allows different email names but they are tied to the original email. Would it be better to have unconnected emails ?
Lastly, best way to post on "certain sites" and hide your IP.
>>
>>101812390
Definitely better. If you want multiple email addresses, look at something like AnonAddy where you can have a near infinite amount and they'll forward everything to your real email. You can custom name them, so they can be "instagram(at)jimmysmith.addy.to" or something.
>>
>>101812144
look at file formats and how they are handled in software
>>
>>101814334
Well, they're just regular jpgs, so nothing stands out about that. The image viewer would be Windows 10 default and it might be edited in Photoshop to remove damage to the scans.
>>
>>101786759
>The future of fasion will be a government issued, ill-fitting uniform made from recycled plastics and yard waste.
So, denim?
>Only the elite class will be allowed to wear what they want, and only if thier social credit score is high enough.
They already are into spandex (sadly also the MAMIL).
>Your picrel is a pleasurebot that will be made for the elite class as well.
We had a rapidly deteriorating discussion where I live about wealthy West End men marrying women that are well above average looking, having children that inherit the looks and the wealth, propagating this to an ever increasing degree down the generations. People were suitably outraged.
>It will be a rental, subscription-based, connected gynoid that will make conventional women obsolete. Full, real-time, interative telemetry will ensure customer satisfaction.
The elite will still select their females.
>They will be superior because they will be AI-enhanced, and remote "piloted" by men in an operations center in Bombay, India.
Now that will be a massive turnoff.

>>101809927
I see some activewear around here, but mostly in the West End.
>>
>>101788018
NTA but probably same as steampunk, just a normal flamethrower with decorative crap stuck on.
>>
File: Punkisms.jpg (1.07 MB, 1080x3380)
1.07 MB
1.07 MB JPG
>>101815751
Not Dieselpunk?
>>
>>101726229
The US weaponized the USD against Japan to fuck them up. The Japanese didn't see that coming with the effect that their living standards were suppressed. Not really decreasing but their growth was suppressed and if everyone around you earns a dollar every day and you just a quarter you become poorer.
>>
File: Gold-Standard Body type.jpg (269 KB, 1672x1194)
269 KB
269 KB JPG
>>101719038
Bluepill me on SimpleX. Why should I use it over Session or Signal? In depth comparisons and schizo rants are welcome and appreciated
>>
>>101818191
Are you sure about that? I worked in Japan in the 90s, and depending on who you ask, the bubble burst in 1991 or 1995.
Most Japanese had a modest lifestyle and little changed after the bubble burst. What did change, was that the big corporations had to scale down, but even the job market was not that bad. The peak of 5.5 percent was much lower than many Western countries ended up with (and that is after extensive data massaging).

And there is no doubt that the US stopped the Japanese trade growth. In hindsight one may wonder if this contributed to the stagnation we see.
>>
>>101812638
Thx anon
>>
File: *sip*.jpg (111 KB, 1122x1122)
111 KB
111 KB JPG
Any chance someone here grabbed tilib90.zip from the IDA leak before they took it down? Got some old TIL files I need to update, doesn't seem archive.org grabbed it though sadly
>>
You'll Be Replaced And You'll Be Happy [The Hated One]
https://www.youtube.com/watch?v=m645VYVE0TU
>>
I keep seeing that occupytheweb guy on X feed. Is he legit? His posts are cringe as hell with the "master" and "wisdom" larping shit. Checked his profile and it's full of him retweeting his own tweets or some random shilling his courses.
>>
>>101820516
Shave off the shilling, save 2 minutes
Shave off all the verbiage where he tells us what he will tell us (but only at the end): save another 5 minutes
Shave off speculations: save another 3 minutes,
.... leaving a single minute, max, of real contents.
>>
I Downloaded 3 Billion Leaked Records From the Dark Web [Mental Outlaw]
https://www.youtube.com/watch?v=bkpfUKP7T-Y
>>
How can /cyb/ knowledge be monetized?
>>
>>101821991
"Knowledge is power." That is even more true today than when the expression was coined a few thousand years ago. With knowledge, you will be prepared when opportunities knock.
You should also consider ethics. Often it limits how and what to monetize.
>>
>>101822434
Can you provide examples of “knowledge”?
>>
>>101822572
there are examples from /scg/, at >>>/sci/16316200 such as the FAQ:
https://sciencecareergeneral.neocities.org/
STEM people tend to go with what is technically correct. The world, on the other hand, goes for fear, superstition, greed, laziness and outward appearances. So understanding things like organizational theory is a big advantage. I must admit I should have read up on that a lot earlier than I did; it would have saved me a lot of grief and (over)time.
>>
File: 1708615965266049.jpg (6 KB, 250x235)
6 KB
6 KB JPG
qrd on the defcon badge controversy? what's going on?
>>
>>101823925
Defcon hired some gay lesbians to make a badge on a stupidly short timeline and tight budget
They worked overtime to get it done and sent monthly bills for their work
As soon as manufacturing started, Defcon told the designers they were over budget so they wouldn't pay any of the bills
Then they scrubbed the company's name from the credits (literally, they used CNC machines to remove them from the plastic enclosures)
The firmware guy thought this was stupid and put in an easter egg that shows people the name of the hardware design company, so they at least get paid in exposure
Defcon found out about this right before he went up on stage to give a talk about the badges, told him he was disinvited from the convention, and then when he went on stage anyway they sent a security detail to remove him
And just for good measure they called the cops on him
So, as you can see, it's fucking nothing
>>
>>101824069
What a clown show. And these guys work on security??
I guess next year there will be a sex check for all contractors, and not like in the olympics.
>>
>>101824218
Defcon isn't even real, everyone who goes there is a crisis actor
>>
>>101824069
are there any non-cringe technical conferences left at all?
>>
>>101824293
Sure:
https://ccdcoe.org/cycon/
https://ccdcoe.org/news/2024/locked-shields-2024-demonstrated-the-real-power-of-cooperative-defence/
Invitation only, I presume.
>>
File: 1710454045268946.jpg (5 KB, 250x167)
5 KB
5 KB JPG
>>101824549
>estonia
>>
This thread is actually going to make it to the bump limit for once. Nice.
>>
>>101825122
No it's fucking not, don't you lie to me
>>
>>101824245
Didn't the have Kamala show up this year? As a counter to Blumpf appear at the bitcoin conference,
>>
>>101818606
stop using others people software and backends fucking retard just compile netcat from libessl and chat using it over tor
>>
>>101818606
its the best option avaliable on both android and ios.

If briar would work on ios that would be best
>>
stop using technology to communicate
just run up to people and scream
>>
>>101826280
netcat runs anywhere
enjoy your "apps" cattle
>>
new >>101826562



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.