[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology

Name
Options
Comment
Verification
4chan Pass users can bypass this verification. [Learn More] [Login]
File
  • Please read the Rules and FAQ before posting.
  • You may highlight syntax and preserve whitespace by using [code] tags.

08/21/20New boards added: /vrpg/, /vmg/, /vst/ and /vm/
05/04/17New trial board added: /bant/ - International/Random
10/04/16New board for 4chan Pass users: /vip/ - Very Important Posts
[Hide] [Show All]


[Advertise on 4chan]


File: 1742798283631547.gif (117 KB, 500x350)
117 KB
117 KB GIF
Why is there no program where me and my friend have the same program installed and I type in his IP address and can send infinite amount of files to him directly and encrypted?

Why does everything need to be uploaded to some shit server first? Is there no open protocol like that? No I'm not talking about bittorrent.
>>
>>106496316
that's a VPN retard
>>
File: 1728687803687183.png (50 KB, 265x199)
50 KB
50 KB PNG
we haven't invented that technology yet. you have to mail him an ssd
>>
File: Pardner.jpg (48 KB, 194x259)
48 KB
48 KB JPG
>>106496316
It is called FIleZilla, newfriend.
https://filezilla-project.org/
>>
>>106496316
netcat
>>
>Is there no open protocol like that?
Uh openssh?
>>
I remember 25 year ago I was doing that.
You create a local server and you set a folder to share
You give your ip to your friend and he can download any file in the folder
>>
>>106496316
scp you doofus
>>
>>106496478
can i get in trouble for having that installed on my computer?
>>
>>106496539
Secure cp is just as legal as normal cp.
>>
>>106496316
Yeah, there should be some kind of 'file transfer protocol' of some sort.
>>
>>106497789
so not at all??
>>
>>106497811
I can't believe kikes managed to remove support for that in the browsers.
>>
>>106497817
Worst thing they did. Even worse than 9/11.
>>
>>106496316
Because mainly for security reasons, systems do not accept received traffic they didn't specifically ask for. If you performed an HTTP request (entered a webpage URL), it will allow the remote server to send you the requested data (the web page), but if a server just sends you a web page out of nowhere your router will tell the server to fuck off and not forward the received data to your PC. (A secondary reason is that your router won't know which PC to send the data to unless configured for it (port forwarding), and a third reason is that modern ISPs are assholes and may perform this rejection before it even reaches your router.)

In order to be able to receive unprompted requests from outside the local network, your PC would have to be open ('exposed') to internet requests (router configured to forward traffic to it, typically only traffic on a certain port) and some program needs to run to handle those requests. The first part is the main problem here; a 'solution' called UPnP exists which allows a program to tell your router to forward certain traffic to your system, but in practice this is a security nightmare (both in the sense of accidentally leaving the forwarding enabled for outdated software you didn't know you're running, and malware kindly asking the router to let malicious traffic through and actually getting its way). Any solution that makes solving this problem easy for legitimate use also makes it easy for malware and usually has a high risk of resulting in poor security configuration due to negligence ("oh I installed that six years ago no clue what it does").

Next there's the problem of authorization; you don't want just anyone with your IP to be able to upload CP to your PC. So you need to create an account or similar to make sure only your friend can upload things to your PC.
>>
>>106496316
>>106497876
Once you've configured your router to forward traffic on the right port(s) and created a user account or similar for your friend, file transfers are actually simple and there are many solutions for it, including as mentioned by previous posters FTP, SFTP and scp, as well as other solutions like rsync. Most of these do again have the problem that exposing too much or granting too much access is still problematic: where should your friend be able to write? Should your friend be able to overwrite existing files? Can your friend delete files? Depending on the solution you used you'd also need to configure things to prevent your friend from browsing other folders on your PC, and maybe you don't want him to be able to download things. But other than locking it down sufficiently it's pretty simple...

...on Linux. Many of these tools are either pre-installed on most distros or one command away from being installed. Windows to my knowledge does not have any such easy file transfer utilities (it allows easy SMB sharing, but that's local network only and you need to jump through MANY hoops to make it work remotely) so you're essentially out of luck there. It also needs to be noted that security on Windows is always iffy in general and I, personally, don't expose Windows machines to the internet any more than is really necessary. (I did have a Windows server once, 15 years ago. It got infected by a virus without any interaction on my side, and ever since then all my servers have been Linux.)
>>
https://wormhole.app/
>>
>>106497816
all linux users have cp on their pc and most seem to get away with it
>>
File: dungeon thinking.png (2.76 MB, 900x900)
2.76 MB
2.76 MB PNG
Whatever happened to IRC XDCC?
>>
you mean ftp?
>>
I love Mio so much.
My first and only waifu.
>>
>>106496316
/g/ used to have ftp servers and threads just for this
those were the days
>>
/g/ used to be tech and media literate, those were the days...
>>
>>106496316
>what is syncthing over tor/i2p endpoints
>>
>>106497986
Is this any good or does it glow?
>>
>>106496316
You can simply set up wireguard and forward a port for it. That would be the exact thing you described.
You dont even need a vpn like wireguard if you know what you are doing.

If you are behind CGNAT, things get complicated. Since you don't have control over the end router, you will need to rely on holepunching which is a neat trick to establish p2p connections.
Holepunching needs to be coordinated/signalled. VPNs like tailscale, zerotier, hamachi do this automatically with their servers and 90% percent of the time connections will be P2P if you aren't behind a very strict NAT.
If you don't want any 3rd party at all, you can self host rendevouz/signalling server that is public. Headscale is good for coordination/mesh type of things but anything will work as basic signalling, even IRC.

Test it yourself, STUN your address and exchange it with your friend, then start sending each other empty udp packets at the exact same time. it will go through.
>>
Python -m http.server -p 3000
Then your friends visits your ip :3000
>>
>>106500450
that's not encrypted
>>
>>106496316
You are either trolling or being extremely retarded. Since it’s 4chan, I will assume it’s the latter, so yes OP, there are in fact, MANY different ways to do exactly what you just described, each with their own caveats and pros/cons.
>>
>>106500455
I was going to write 443 but im not sure if thatd work. Either way he should set his firewall to block all traffic except his friends ip if hes paranoid.
>>
>>106496316
>Encryption
>Without sharing keys over a secure channel first
>Nobody calls this out
/g/ moment
>>
>>106496316
check out https://github.com/9001/copyparty
>>
>>106498146
I remember some poor sap about 15 years ago set up an FTP server to share. It was misconfigured and other anons proceeded to rm -rf / the poor dude.
>>
>>106500484
you know asymmetric encryption exists for decades right?
>>
>>106500472
Your connection can still be intercepted. What you have to do is chose an encryption scheme first, share keys over a secure channel >>106500484, and then encrypt before transmission.

Also remember to have the connection open at all times even when you're not active and configure a program to randomly send bogus messages(with an identifiable header post decryption to mark that it's bogus, ideally variable length), when you are not communicating to throw off any inspectors about the regularity of your connection.
>>
>>106500518
You know you still have to share keys over a secure channel for asymmetric encryption too right?
>>
>>106500535
If you want to communicate 1-on-1 with a friend, that is.
>>
>>106500526
How can it still be intercepted if you set up a firewall? The firewall isn’t there just for show.
>>
>>106500547
Nigga your packet is transmitted freely through the air, unless you beam that shit with a laser with a direct LoS to your friend's computer, somebody can read the packets without being the intended reciever. Your packet doesn't travel through friendship and magic.
>>
>>106500535
You don't need a secure channel to exchange public keys though?
>>
>>106496316

sneakernet 1:1
rsync 1:256 ish
>>
>>106500596
A third party with both public keys can dilute your communication with noise unless you're smart enough to decide on a secret header after you have exchanged the keys.
>>
>>106500613
I guess it's still fair technically, so I'll concede.
>>
>>10650058
Lol it doesnt matter. Unless that person is a l33t h4xx0rz that can bypass firewalls somehow.
>>
>>106500596
Also, as an addendum btw, Your initial public key transmission can be impersonated or filtered if your communication channel is not trusted and is thus vulnerable to MiTM. Say that you're sharing your key through a chat platform, the platform can intercept that message, and change your keys with theirs and they can then essentially act as a middleman if they can intercept your packets.
>>
>>106500640
Are you dense? Just because your computer ignores messages not addressed to it doesn't mean everyone has to.
>>
>>106500664
A firewall means this address is okay all other addresses get dropped.
>>
>>106500678
and have you personally verified the address?
>>
>>106500656
Yeah, I always mistake authenticity as being granted.
So you're right but I think at that point the only "secure channel" would be exchanging the public keys (or other info) physically.
>>
>>106500678
Pray tell me how you believe addresses are communicated and why an able party can't just lie?
>>
>>106500702
Well if again if you're dealing with something else an antivirus firewall might offer extra protection too.
>>
>>106500712
Irrelevant
You're placing too much faith in the address routing infrastructure or the belief that two fed vans aren't parked besides your and your friend's house right now.
>>
>>106500689
Yes.
>unless you believe in skinwalkers
>>
>>106496316
>>106496332
WRONG you have to figure out how to send boolean determinants via smoke signal
>>
>>106500761

you likely telnet to mac and push text and reciever sniffs all
>>
>>106496316
I remember we sent eachother mp3s and shiet on irc all the time, and everyone had their own ftp so we could download larger stuff from eachother
>>
>>106496316
https://github.com/schollz/croc
>>
>>106501048
This looks interesting and I wonder why I've never heard of it. What's the catch? Do you have personal experience with it?
>>
>>106496334
That's malware
>>106496316
Connect to the same network and use LocalSend or croc.
>>
File: hello i'm the recipient.png (1.19 MB, 2000x1600)
1.19 MB
1.19 MB PNG
>>106500484
Keys can be transferred alongside other connection information. That's how it's also typically done with 'secure' clould storage where you get something like url.com/myfile?key=ifukedyouremom to send to your friend.

>>106500613
>>106500656
In practice the short lifetime of the key (you send the info, friend uses it two minutes later) gives the attacker no time to set up an MITM unless they already have a similar one ready they just need to change a few values on.

>>106500547
You seem genuinely retarded. This is the snail mail equivalent of saying 'nobody can intercept my mail, after all the address written on it is my friend's and intercepting it is a crime'. It doesn't matter how secure your or your friend's house is, some random asshole working in mail delivery can open it and see what you're sending, and even alter it.
>>
File: genuine mya-nee.png (59 KB, 198x184)
59 KB
59 KB PNG
>>106500515
I wonder why /g/ no longer has open FTP servers and the like.
>>
>>106500725
Why do /g/ posters and their friends always have fed vans parked outside their house?
>>
>>106501655
To kidnap wahmen
>>
File: Hamachisoftware.png (38 KB, 250x393)
38 KB
38 KB PNG
>overcomplicating things
Just use this, you don't even need to open ports manually, its like you're on the same network, has worked for me for 2 decades
>>
>>106496316
There are many P2P programs out there. Use them instead of making ignorant claims.
>>
>>106496316
SFTP exists
>>
>>106501762
except it's a pain to setup and you might introduce vuln. to your system.



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.