Why is there no program where me and my friend have the same program installed and I type in his IP address and can send infinite amount of files to him directly and encrypted?Why does everything need to be uploaded to some shit server first? Is there no open protocol like that? No I'm not talking about bittorrent.
>>106496316that's a VPN retard
we haven't invented that technology yet. you have to mail him an ssd
>>106496316It is called FIleZilla, newfriend.https://filezilla-project.org/
>>106496316netcat
>Is there no open protocol like that? Uh openssh?
I remember 25 year ago I was doing that.You create a local server and you set a folder to shareYou give your ip to your friend and he can download any file in the folder
>>106496316scp you doofus
>>106496478can i get in trouble for having that installed on my computer?
>>106496539Secure cp is just as legal as normal cp.
>>106496316Yeah, there should be some kind of 'file transfer protocol' of some sort.
>>106497789so not at all??
>>106497811I can't believe kikes managed to remove support for that in the browsers.
>>106497817Worst thing they did. Even worse than 9/11.
>>106496316Because mainly for security reasons, systems do not accept received traffic they didn't specifically ask for. If you performed an HTTP request (entered a webpage URL), it will allow the remote server to send you the requested data (the web page), but if a server just sends you a web page out of nowhere your router will tell the server to fuck off and not forward the received data to your PC. (A secondary reason is that your router won't know which PC to send the data to unless configured for it (port forwarding), and a third reason is that modern ISPs are assholes and may perform this rejection before it even reaches your router.)In order to be able to receive unprompted requests from outside the local network, your PC would have to be open ('exposed') to internet requests (router configured to forward traffic to it, typically only traffic on a certain port) and some program needs to run to handle those requests. The first part is the main problem here; a 'solution' called UPnP exists which allows a program to tell your router to forward certain traffic to your system, but in practice this is a security nightmare (both in the sense of accidentally leaving the forwarding enabled for outdated software you didn't know you're running, and malware kindly asking the router to let malicious traffic through and actually getting its way). Any solution that makes solving this problem easy for legitimate use also makes it easy for malware and usually has a high risk of resulting in poor security configuration due to negligence ("oh I installed that six years ago no clue what it does").Next there's the problem of authorization; you don't want just anyone with your IP to be able to upload CP to your PC. So you need to create an account or similar to make sure only your friend can upload things to your PC.
>>106496316>>106497876Once you've configured your router to forward traffic on the right port(s) and created a user account or similar for your friend, file transfers are actually simple and there are many solutions for it, including as mentioned by previous posters FTP, SFTP and scp, as well as other solutions like rsync. Most of these do again have the problem that exposing too much or granting too much access is still problematic: where should your friend be able to write? Should your friend be able to overwrite existing files? Can your friend delete files? Depending on the solution you used you'd also need to configure things to prevent your friend from browsing other folders on your PC, and maybe you don't want him to be able to download things. But other than locking it down sufficiently it's pretty simple......on Linux. Many of these tools are either pre-installed on most distros or one command away from being installed. Windows to my knowledge does not have any such easy file transfer utilities (it allows easy SMB sharing, but that's local network only and you need to jump through MANY hoops to make it work remotely) so you're essentially out of luck there. It also needs to be noted that security on Windows is always iffy in general and I, personally, don't expose Windows machines to the internet any more than is really necessary. (I did have a Windows server once, 15 years ago. It got infected by a virus without any interaction on my side, and ever since then all my servers have been Linux.)
https://wormhole.app/
>>106497816all linux users have cp on their pc and most seem to get away with it
Whatever happened to IRC XDCC?
you mean ftp?
I love Mio so much.My first and only waifu.
>>106496316/g/ used to have ftp servers and threads just for this those were the days
/g/ used to be tech and media literate, those were the days...
>>106496316>what is syncthing over tor/i2p endpoints
>>106497986Is this any good or does it glow?
>>106496316You can simply set up wireguard and forward a port for it. That would be the exact thing you described.You dont even need a vpn like wireguard if you know what you are doing.If you are behind CGNAT, things get complicated. Since you don't have control over the end router, you will need to rely on holepunching which is a neat trick to establish p2p connections.Holepunching needs to be coordinated/signalled. VPNs like tailscale, zerotier, hamachi do this automatically with their servers and 90% percent of the time connections will be P2P if you aren't behind a very strict NAT.If you don't want any 3rd party at all, you can self host rendevouz/signalling server that is public. Headscale is good for coordination/mesh type of things but anything will work as basic signalling, even IRC.Test it yourself, STUN your address and exchange it with your friend, then start sending each other empty udp packets at the exact same time. it will go through.
Python -m http.server -p 3000Then your friends visits your ip :3000
>>106500450that's not encrypted
>>106496316You are either trolling or being extremely retarded. Since it’s 4chan, I will assume it’s the latter, so yes OP, there are in fact, MANY different ways to do exactly what you just described, each with their own caveats and pros/cons.
>>106500455I was going to write 443 but im not sure if thatd work. Either way he should set his firewall to block all traffic except his friends ip if hes paranoid.
>>106496316>Encryption>Without sharing keys over a secure channel first>Nobody calls this out/g/ moment
>>106496316check out https://github.com/9001/copyparty
>>106498146I remember some poor sap about 15 years ago set up an FTP server to share. It was misconfigured and other anons proceeded to rm -rf / the poor dude.
>>106500484you know asymmetric encryption exists for decades right?
>>106500472Your connection can still be intercepted. What you have to do is chose an encryption scheme first, share keys over a secure channel >>106500484, and then encrypt before transmission.Also remember to have the connection open at all times even when you're not active and configure a program to randomly send bogus messages(with an identifiable header post decryption to mark that it's bogus, ideally variable length), when you are not communicating to throw off any inspectors about the regularity of your connection.
>>106500518You know you still have to share keys over a secure channel for asymmetric encryption too right?
>>106500535If you want to communicate 1-on-1 with a friend, that is.
>>106500526How can it still be intercepted if you set up a firewall? The firewall isn’t there just for show.
>>106500547Nigga your packet is transmitted freely through the air, unless you beam that shit with a laser with a direct LoS to your friend's computer, somebody can read the packets without being the intended reciever. Your packet doesn't travel through friendship and magic.
>>106500535You don't need a secure channel to exchange public keys though?
>>106496316sneakernet 1:1rsync 1:256 ish
>>106500596A third party with both public keys can dilute your communication with noise unless you're smart enough to decide on a secret header after you have exchanged the keys.
>>106500613I guess it's still fair technically, so I'll concede.
>>10650058Lol it doesnt matter. Unless that person is a l33t h4xx0rz that can bypass firewalls somehow.
>>106500596Also, as an addendum btw, Your initial public key transmission can be impersonated or filtered if your communication channel is not trusted and is thus vulnerable to MiTM. Say that you're sharing your key through a chat platform, the platform can intercept that message, and change your keys with theirs and they can then essentially act as a middleman if they can intercept your packets.
>>106500640Are you dense? Just because your computer ignores messages not addressed to it doesn't mean everyone has to.
>>106500664A firewall means this address is okay all other addresses get dropped.
>>106500678and have you personally verified the address?
>>106500656Yeah, I always mistake authenticity as being granted.So you're right but I think at that point the only "secure channel" would be exchanging the public keys (or other info) physically.
>>106500678Pray tell me how you believe addresses are communicated and why an able party can't just lie?
>>106500702Well if again if you're dealing with something else an antivirus firewall might offer extra protection too.
>>106500712IrrelevantYou're placing too much faith in the address routing infrastructure or the belief that two fed vans aren't parked besides your and your friend's house right now.
>>106500689Yes.>unless you believe in skinwalkers
>>106496316>>106496332WRONG you have to figure out how to send boolean determinants via smoke signal
>>106500761you likely telnet to mac and push text and reciever sniffs all
>>106496316I remember we sent eachother mp3s and shiet on irc all the time, and everyone had their own ftp so we could download larger stuff from eachother
>>106496316https://github.com/schollz/croc
>>106501048This looks interesting and I wonder why I've never heard of it. What's the catch? Do you have personal experience with it?
>>106496334That's malware>>106496316Connect to the same network and use LocalSend or croc.
>>106500484Keys can be transferred alongside other connection information. That's how it's also typically done with 'secure' clould storage where you get something like url.com/myfile?key=ifukedyouremom to send to your friend.>>106500613>>106500656In practice the short lifetime of the key (you send the info, friend uses it two minutes later) gives the attacker no time to set up an MITM unless they already have a similar one ready they just need to change a few values on.>>106500547You seem genuinely retarded. This is the snail mail equivalent of saying 'nobody can intercept my mail, after all the address written on it is my friend's and intercepting it is a crime'. It doesn't matter how secure your or your friend's house is, some random asshole working in mail delivery can open it and see what you're sending, and even alter it.
>>106500515I wonder why /g/ no longer has open FTP servers and the like.
>>106500725Why do /g/ posters and their friends always have fed vans parked outside their house?
>>106501655To kidnap wahmen
>overcomplicating thingsJust use this, you don't even need to open ports manually, its like you're on the same network, has worked for me for 2 decades
>>106496316There are many P2P programs out there. Use them instead of making ignorant claims.
>>106496316SFTP exists
>>106501762except it's a pain to setup and you might introduce vuln. to your system.