Gentoo runs way smoother and is actually open source and compatible with most hardware. All you need is hardened Gentoo w/ Secure Boot, a custom open source RISC-V desktop SBC w/ verilog and mainline Linux support / UberDDR3 / MIAOW GPUs / OpenPHY / iCE40 FPGA, an open ath9k 802.11 Wifi PCIe, a Modos paper display and a flash drive w/ decryption key to turn it on. Use VexRiscV chips. Will still need a development board (like a SiFive HiFivePremierP550) for writing and programming the board, and soldering equipment + microscopes.Also, "fully Libre'd Thinkpads" don't exist. Even if you wiped the firmware to the SoC, you still have the display, which is proprietary, the hard drive which is proprietary (to which there's only one company on Earth that manufactures open source hard drives, and that's Raptor Computing Systems which uses them for their Talos PCs that costs $15,000, and even if you were using an open HD, you'd still need Faraday protection to prevent sidechanneling) and so on.You will also need:>Banana Pi BPI-RV2 and Wio Lite RISC-V board integrates a RISC-V microcontroller (VexRiscV, again) for modem/router functionality>FPGA/Soft-MAC Wi-Fi modules for fully open 802.11 networking experiments; setup includes an FPGA development board (e.g., Lattice iCE40 or TinyFPGA), and software stack such as Open80211, connected via USB or GPIO to SBC and optionally bridged to RISC-V boards>SiFive FE310 as an open-hardware USB-to-UART/SPI/I2C bridge replacement, plus a Bus Pirate (open-hardware) when you want a flexible serial/GPIO bridge>Connect your ethernet cables to your proprietary default ISP hardware and you can now use IP over DHCP to establish a private network connection
Gentooman reporting in
>>520177567What kind of retard shills the hardest distro to install to noobs. Fuck off you idiot.
>>520177567I've been a windows normie for 5 years. only about a year did ago did I start caring for my privacy. Is it too late? Do (they) already have everything they need?Not just the jews, by the way.
>>520177567Just get a Mac
>>520177567You'll also need open source USB keyboards/mouse you can buy that'll match the GPIO mapping (+compatible USB ports) to use for this setup that are safe from assembly-level malware (like STUXNET they used as an exploit in Iranian hardware), or NSA keyloggers. Like Keyboardio Model 01, OLKB / Planck / Preonic / other OLKB boards — open PCB designs that run QMK (battle‑tested open firmware) or many DIY/ortholinear/handwired PCBs from the keeb community w/ a Ploopy (Classic 2 / Classic) mouse or DIY mouse using RP2040 / STM32 / ATmega + open HID firmware — straightforward: buy an optical sensor (e.g., PMW3360), pair with an RP2040, and run an open HID stack (many community projects exist). Libratbag + Piper provide Linux-side configuration for many open-ish gaming mice if you must use existing vendors. Flash via a programmer (e.g., Atmel ICE, JTAG, OpenOCD) — don’t rely on vendor binary updates. QMK and Keyboardio firmware repositories make this straightforward. Use read/verify signatures and sign your firmware images + enforce verification (where the bootloader supports it) before enabling HID. If the MCU/bootloader can be fused to read‑only or locked after flashing, do so. Keep hardware debug interfaces accessible during verification so you can read flash contents and check checksums before locking.
>>520177727To touch up:>USB filtering / policy: use USBGuard (or an equivalent) on Linux to whitelist only approved USB device classes/vendor:product IDs before accepting HID input. This prevents a malicious composite device from exposing hidden endpoints.>udev rules: create udev match/deny lists to prevent unexpected USB descriptors from being used.>Isolate critical input: use a separate, minimal host (a tiny microcontroller you control) as the keyboard-to-host translator; the MCU forwards only standard HID events — no mass‑storage or DFU endpoints. The FE310 as a bridge is perfect here.>Prefer wired over wireless for security (no RF sniffing/remote firmware attacks).>Disable unused USB ports in firmware / physically block them with port locks.
>>520177567>Using computersYou nerds are such losers
>>520177742Arch is lightweight, flexible, and rolling-release — which appeals to tinkerers — but at its core it’s still a binary distribution that depends on proprietary firmware, closed-source drivers, and the same opaque hardware layers as any other x86 distro. It’s “minimalist,” not “libre.” Gentoo, by contrast, is genuinely source-based, auditable, and allows you to build a hardened, blob-free system all the way from the compiler flags up.Gentoo wins because it's fully source-based, you can inspect, patch, or rebuild everything with your own toolchain, uses USE flags that have fine-grained control over features and dependencies (you can strip out nonfree firmware), uses hardened profiles with hardened-sources, PaX, SELinux, and PIE/SSP, you can actually lock it down to military-grade standards and has architectural freedom, since Gentoo supports cross-compiling for RISC-V, ARM, MIPS, and more — not just x86_64.Also, Faraday cage is not needed for this setup (especially since attackers can modulate the frequency and still get you even if behind Faraday protection). If you control firmware and hardware (open RISC‑V, audited boot chain, no closed blobs), your risk of a competent attacker intentionally creating stealthy emissions is much lower, but not zero—mainly if they somehow obtain control of firmware or insert an implant.Faraday shielding helps, but the real weak points are conducted paths and unfiltered feedthroughs. For best defense, combine a modest metallic chassis with filtered power inputs, fiber external links (or none), galvanic isolation, and strict firmware provenance. That combination is far more practical and effective than an expensive full Faraday cage.Then just install packages like iptables, clamav, rkhunter, kvm/qemu, firejail, pyshark, use a custom GNU Ice Cat profile, and run all connections through a custom SOCKS5 proxy you scripted in Python w/ ChaCha20, Poly1305, X25519 and Kyber and now you're fully set.
>>520177771https://www.gnu.org/distros/common-distros.en.htmlAlso> Gentoo includes installation recipes for a number of nonfree programs in its primary package system.While Gentoo’s main tree does include ebuilds for some non-free/proprietary software and firmware, but Gentoo marks licenses in each ebuild and gives you tools to refuse those packages. You don’t have to install them if you don’t want to.
>>520177789Also, Consider adding measured boot (TPM replacement) using an open hardware root-of-trust MCU (e.g., Tillitis TKey or Nitrokey 3 running Trussed) for remote attestation if you ever network this system.You could also flash QMK with reproducible builds (using dfu-programmer with SHA256 verification), to ensure byte-for-byte consistency between source and flashed firmware.Integrate OpenWrt on RISC-V as your router firmware for total visibility and easily scriptable packet-level filtering.You could add software-encrypted ephemeral root (tmpfs + overlayfs) to limit persistence even further.
>>520177567>>520177727>word salad garbage written by a schizo moron
>>520177727How do you fix the compromised hardware backdoors?I'm personally thinking of just waiting until homemade electronics reach 90s tier and just hop onto the decentralized internet homemade network with stuxnet 2.0 when that happens.
>>520177567unless you're making your own mobo and router and never connect to the Internet this is sort of kind of performative bullshit tbqhwy, HOWEVER COMMA, this is a stepup from being a wangblows user and with common sense pro is a reasonable degree of separation.
>>520177652odds are if you have a smartphone they have it anyways, unless you're doing legitimate criminal activity that would warrant such actions I wouldn't personally worry about. just don't Google "pressure cooker and backpack" back to back.
>>520179225this
>>520177567I've actually installed gentoo.99% of you are too stupid to get that far.Don't fall for the /g/ meme.
>>520179225>with stuxnet 2.0Israeli Spyware exploiting backdoors in Windows put there by Microsoft at the order of the NSA to destroy nuclear weapons fuel enrichment centrifuges?
>>520179991>>520180069Only reliable method I know of is disposable used computers in public wifi setting that you only use once before trashing equipped with the right software setup(usually through a flash drive). The same is true for phones. Until the hardware backdoor problem is fixed your options are extremely limited. Not saying its a bad idea but...well it comes down to the backdoors. Always.
>>520180324ALL American and allied nation equipment is backdoored at the hardware level.All.Chinese shit is just backdoored in a different manner.
>>520177682poorfags cant into mac. most will have to start compiling icefox today to browse in 2 week.
people have scammed millions without any of this opsec garbage ... all you need to do is sit in russia/india/similar garbage nation. hacking in the west is just not worth it.
>>520180314Homebrew decentralized internet with homemade electronics serving as decentralized hubs and homebrew computers requiring 90s tier electronics that are clean to pull off. The plans have existed for over a decade but nobody could source the clean hardware to make it happen. Its not like there is just one plan. Its been considered, tinkered with, and debated upon since...Snowden it got taken seriously?Been a long while since I last checked in. Figured I would wait until the means to make homemade eletronics reached 90s tier before I would research everything all over again and decide what I want to go with.>>520180392Exactly my point and why its single time used only from a pre owned computer that is bought with cash probably from a pawn shop or something. Hang onto to it for enough months that the seller forgets about it and recordings get wiped than you're fine. Basic bitch shit like that. Only ever works once though is the catch.Its why hackers nowadays if they don't wanna get fucked by glowniggers have to use that setup and contract out to computer or server farms whenever they need to bruteforce something. Paying out the ass for a special setup won't save your sorry ass in this environment.
>>520180222>too stupid to get that far.anon ... wasting endless hours on linux is not a smart thing to do ... its autistic.99% dont use linux not because theyre "too stupid" but because they simple dont have the time. linux is a giant retarded time sink for very little gain. everyone realizes this ... except you.
>>520177567...meanwhile the cia uses amazon infrastructure
>>520180642I worked decades in tech making over $100k per year so learning Linux was hardly a burden but rather a part of my profession.
>>520180642Really Anon? My wife loves it
At what point were back doors introduced? Weren’t computers too weak and slow to do tasks and log activity? Also are computers slowed down by these back doors or monitoring activity, and is there unusable additional power under the hood?
>>520177567>Finally I can watch Crunchyroll without the CIA knowing
>>520177637You install it exactly once, and it consists of repeating instructions from a manual. A monkey could do it if it could read
>>520177652Its never too late to start caring. Think longterm, which is better, having everything you're doing recorded or having a dead profile from 5 years ago
>>520180929ok mr 100k, you think copy pasting commands by hand into a console to install an operating system is a hard skill eh ... hmmm>>520181071
>>520177567Are you the same nigger spamming all these AI threads?
>>520180988Mid to late 00s. They were fucking everywhere and inescapable by the early 10s. Even 'apple' isn't an exception or any foreign source. Keep in mind that the worst backdoors were hardware related as they are impossible to circumvent. That is why even the Free Data crowd gave up on it until they could make their own homemade electronics. Estimates stated they needed 90s tier as that was the minimum requirement to establish a new decentralized internet.
I use arch btw.
>>520177567My guy, I use Linux, but I'm not autistic enough to set up and maintain Gentoo. Miss me with that shit. I actually want to do shit with my computer.
>>520177682>>520180510mac is for pajeets as confirmed by these comments.
>>520179225How much longer until this happens?
>>520177567Gentoo is shit because it doesn't have a system to audit the source code before and after compilation of each installed package.Therefore if someone at the other end serves a malicious tarball just for you you're fucked.>Nooo but he can't just sign itWhat if the author is the bad actor of some friend if his, or he was hacked?Also, if such system existed I could just quickly modify anything if past sources and build in an instant, which is also a cool feature.Until this gets implemented I rather use Debian.
>>520177629kys pratyush dalit
>>520182189That applies to every other distro.
>>520180929How do you make >$100k/year in IT in Latvia of all places? I make $70k/year as a senior expert.
>>520182247Exactly. Therefore Gentoo does not worth it. But for some packages I can still do manual build on Debian if I feel like it.
jeetux will never be taken seriously because of faggots like op kek
>>520177567>inb4 dumbass chuds list their cope reasons as to why they """need""" w*ndows
>>520177567Protip; dont post shit on 4chan. You are already on the list.
>>520182525This shithole didn't even have HTTPS until recently
>>520179225Impossible. The best opsec is not to put important stuffs on computer.1. cryto one time masterkey. but that too is vulnerable because it is your cpu that first receive those codes.2. You plans. Like if you are doing mass shooting or something, never put a thought about it or traces of thought about it on computer/phone.3. hoard everything and obfuscate your focus points.but truly with panopticon in place it's impossible to no compromise yourself because if they want you they can pilpul anything you have or do or have done into a naughty act. You sure didn't download any brook shield porno in any of the computer you bought ever in your life?
>>520177771>allows you to build a hardened, blob-free system all the way from the compiler flags up.Compilers use previous compilers to work. They all report back to a compiler from the the 1970s that was created by the CIA. You cannot escape the glowniggers.
>>520177567Shut up with your guerilla marketing
>>520182195I hope you get fired from your microshitter tech support job
Also this is not an actual opsec OP. We are all on the list. Whitney slightly nudges about palatir's priority over "anonymous board" which only means 4han/8ch. So expect them to have your history. You still have defense like "I only post satire on 4chan" but that works only if you hire a very powerful jewish lawyer for which you have to be jewish yourself.
>>520182735>jobi am not dalit
>>520177567why do all that shit, when you can just throw away your cell phone. get rid of your lap top. live in a faraday cage. and carry a cell phone jammer out in public. or just have something that emits some sort of strong emp pulse being an aggressive luddite seems less complicated than jumping through a bajillion hoops in order to shit post without the feeling of becoming a tracked target. im not knocking what youre doing if you understand what you are doing. but alot of people don't. most people have to pay wix or whatever to make a website instead of making their own. just like blow up some cell towers
>>520182759>post attached to dalitdia flagDoubt
>>520182830I work with a guy who refuses to get a cell phone. I think he spends all his spare time on his desktop computer, thoughbeit.
>>520182332Who says I'm Latvian?
based
Gentooman here. Excellent thread. How do you do isolation with this setup. KVM/Qemu is the only easy, maybe containers for a light alternative?For example, to achieve this I like QubesOS and their dispVM because it's super convenient. I am working on a similar setup with hardened Gentoo as dom0 (and VM template).
>>520177567You can buy a libre booted ThinkPad directly from a tranny herehttps://minifree.org/
>>520186116I use LXC containers for some things. The way I do it is I find out which files a service needs (binaries, shared libraries, stuff in /etc, /usr/share, /var/, etc.) and bind-mount that into the container, if possible read-only/noexec/nosuid/etc. It's all very hand-rolled, but with a few scripts to make it less of a hassle. This means I install and unpdate everything on the host as usual, but run it in LXC.
if they want to come after you they will just frame you. all this OPSEC shit is great at avoid the pleb tier parts of the government apparatus. since 95 when I got dial up at home no cunt has bothered me about what I do online. I never signed up for kike media. I am sure anyone that really wants to come fuck me up the arsehole will if I do anything too bad
>>520186805That's not a bad idea, but it would need quite a bit of customization depending on what you're doing. With ZFS or BTRFS, couldn't you boot from a snapshot (and you discard any change)? With `lxc.rootfs` and `lxc.rootfs.backend = dir`.I don't think we'd lose anything security wise, or?
bump
>>520182830depends what you are doing. I think most of it is pointless. many people give themselves away through some simple mistake they made. If anything I am just glad no one says anything when I say poof, fag, homo, gay, retard, mong, spastic IRL anymore
>>520187872You can set up the bind mounts directly within the lxc configuration file like so>lxc.mount.entry = /etc/foo.conf etc/foo.conf none bind,ro,nodev,nosuid,noexec,create=file 0 0>lxc.mount.entry = /usr/bin/foo usr/bin/foo none bind,ro,nodev,nosuid,create=file 0 0which binds the files /usr/bin/foo /etc/foo.conf into the container as read only with various additional restrictions.Yes, you can also use snapshots of your / and discard everything later, but you still probably want to filter some things from appearing in the container (at least your /home, probably) and also perhaps keep some state across runs. But if you do it that way there's basically a full OS in the container which at least to me defeats the purpose.
>>520177771>Faraday shielding helpskek this is why you guys still life in the basement and dont have sex
>>520188505Yes, the mounts allow to reach that purpose, the main problem is if the program you are isolating is sprawling with files everywhere in the directory.Well I see what you mean, you don't want to expose anything too identifiable with your full setup in the container for example. That's not a bad point.I was thinking mostly in terms of protecting your host while trying things in a little sandbox.So from what we discussed, I see 2 ways of going about it:- if isolating a single/few program installed via gentoo, then actually mounting all the files reported via `equery f package` is maybe not so painful and easy to automate?- if isolating often the same (set) of programs, creating template with a subvolume is maybe more convenient. At the cost of having to update them from time to time.
haha toshiba with win7 goes wooooo click click clack
Its gotten to the point where using the internet at all, despite your best efforts to remain out of sight, is not the way anymore. Just completely unplug, throw your computer away, unhook your modem, and start working out and hunting and growing your own food. Not only will you not show up on anyones radar, you will be better off both mentally and physically.
>>520182332By lying or glowing
>>520189335Yes, I do it this way for running individual services like tor. If you just want to to prevent some program from spewing files everywhere it's not the way to go.>mounting all the files reported via `equery f package` is maybe not so painful and easy to automate?That works, but will usually mount many files unnecessarily, like things from /usr/share/doc, for example. If that doesn't bother you it's mostly harmless, though. I have a script that prints out all the shared libraries required to run specific binaries. Other than that it's usually just configs in /etc or a few directories in /usr/lib or /var that need to be mounted for things to run so it's not too bad to do this semi-manually. Maybe one day I'll write some code to automate it more. In principle it's a nice way to manage container services.
>>520177567 (OP)You missed that regardless of your hardware, without purchasing the most recent GRE kernel patches, which have to be purchased from a for-profit research group now, the Gentoo hardened kernel is still compromised. Gentoo is also now part of the network of linux distros who's orgs financials are managed by a non-profit that "invests" donations for them, allowing "sponsors" to purchase ingress insertion into mainline releases, so you have to use a release from before they accepted the arrangement.
>>520189335>>520190097>equery f packageeasier done with #emerge --root=/container/dist package --ask
>>520177567>be me>go out>see 10/10 qt3.14> adjust my Arch Linux hoodie, swallow hard>"hey, uh… you look like someone who appreciates… freedom.">rizz her smoother than a pacman -Syu with --noconfirm>"i have a hardened Gentoo rig at home. RISC-V. custom kernel. No proprietary blobs. Also, I compile my own mesa.">fast forward to my room, RGB off (real users don’t need RGB), CRT humming like a 90s dial-up>"Holy shit, is that a HiFive Premier? You’re not just using it, you’re...">"Writing u-boot from scratch, yeah."> she shudders as she looks at my Faraday protected open hard drives. >"You cross-compiled your toaster, didn’t you."> she can’t wait to fuck me by now> "Show me your make.conf," she demands> she jumps me> cum buckets> shitwassocash.jpg
>>520190576lol'd
>>520180642Distros like Ubuntu and Mint are so easy and automated, even a black woman could do it over a weekend.>Not secure or entirely FOSSYes, but it's not Windows
>>520177771Is this you?>muh Faraday protectiongo touch some grass you retard
>>520191309would
>>520177567>>520177727>>520177742>>520177771>>520177789>>520177804Great story bruh. If you think I understood what you wrote, then you're greatly mistaken, nerd.
>>520186116post it.>inb4 only retards compile/use chromium
>>520191654>bruhniggers need not apply.
>>520191777Factually, only retards use chromium. Also use distcc and eventually make your binpkg of shit like this.
>>520177727Uuhm. So is there like an App?
>>520180069>start torrenting >internet sends me letters to stop or consequences >not open letters>download terabytes of vidya from the russians>letters saying theyre gonna turn off my unternet>not read them>internet was turned off for 1 hour at 4 am>letter informing me they upgraded my internet plan for free>i now have faster internet
>>520191867LFS > Gentoo anyway, noob.
>>520182741I said the N word once here. Is it over?
>>520177637This, also I’m not doing that level of opsec just to say nigger, kike, and troll glowies on a Mongolian fiip book appreciation website. I’ll rawdog it with an iFag because I want them to know just how much I hate them from the bottom of my soul.
>>520193051lmao ok "bruh"
>>520193442Check mate, mate.
>>520177804WHY DO YOUR POSTS READ LIKE CHATGPT
>>520191096it's still not good enough last time I installed mint. I just use it so I can run glftpd with minimal effort. still using the GUI to install shit instal always the great
Or, you could keep your politically sensitive beliefs/actions in the real world, which is virtually untraceable by comparison
>>520177567Excellent effort by op.
Gentoo is the only linux distro I consider any good. Other distros are just houses of cards held together by super glue. I use gentoo for my computing needs and there is nothing special about it, the meme "install gentoo" is stupid too I think installing gentoo is easy and simple. Gentoo literally just works while other distros break all the time.
>>520177567They sounds annoying. I'll rather just ai and barely login to anything :(
>>520177567I have been running devuan runit for the past decade, i dont wanna go full schitzo plus you probably stick out like a sore thumb to glowies if you jump so many hoops just to shitpost and draw dicks on gimp
>>520177567Rate my OPSEC
>>520181071that work for that set of hardwareits not like you ever run into issuesjust works, like an apple product, just copy and pastsimpledumb fucking faggot
>>520177567Bah I'm good, all I need from a computer is to run FL Studio and VSTs without headaches
>open scource>the only actual opsec it has is that there is not enough users to steal data outStellar.
>>520195102looks good to me fren. i have the same except using windows xp
>>520195102>location services ONew
>>520195345>>520195385Interesting, the printscreen key is disabled while I have the taskmanager processes open, I was gonna show you guys
>>520182574so if i had a chunk of crypto worth stealing, as soon as i plug in my wallet i could be going ass forward in a corn field?
>>520196008uhhhh guys
>>520177567Nigger i spent so much time on Windows with spyware installed that the Jews probably know how many ass hair i've got
>>520182525
>>520196065haha suck it bill fag, you little kike goblin
>>520196776you use edge?
>>520177567Great guide for people out and about, but this is /g/, we're all retards here, we need technical solutions for the retarded, so I will make a brief summary as the local technomancer (who is also a retard codelet) on how to be safe from prying eyes in a simple way, for retards like myself>Faraday your pc and use a wired connection out to a secured routerI don't remember how you secure your router because it's been like 2 years, but this is important, your router is at this point the one middleman between you and the internet, so make sure it's clean>Connect from that router to public wifi via a wifi extender, or any connection you have access to that is not your own, and does not identify youWith these two steps you are anonymous on the internet, now here's some other shit to do if you are serious and on someones shitlist>have metal walled homethe vast majority of weird spy hoodoo does not work through metal walls>Do not have your home office in a room with a windowFeds can read the vibrations of the window to gain information from inside>Do regular bug sweeps of your homeJust common sense shit really, there is no guarantee you will actually pick them up, but it's worth tryingAnd in my opinion the most important of all of this>PHYSICAL SECURITYall these tech measures mean jack shit if officer fat can just walk into your home and look at your files, lock your door nigger, lock the room its in, have a happy little bookcase that opens into somewhere hidden, install pc components caseless under the rafters of your floor, get creative, without physical security cyber security is useless, at least to the lay man, because retards like us will never have full control of our system and must assume it is compromised in some wayOh and use a secure OS like Qubes or something
>>520197308Yeah, I have nothing to hide. Can you decipher these cryptic texts?
>>520196776>Intel CPUIt's over britbro, they are already cooking your brain with their havana weapons
>>520197536Feds can't do shit, they have no power here. I'm maxxing and still the lord protects me. THEY RAPE AND MURDER CHILDREN IN SATANIC RITUALS, EVERYONE IS ENSLAVED
>>520177567keksounds like what a jeet will go through to hide his shameful scat fetish browsing (as if people wouldn't already assume he has a scat fetish for being a jeet)
>>520196057Steal the cpu/computer. Plug it to hacked wifi. Do you crypto stealing. Hopefully it's not a big/important sum and they ignore you.
>>520193315It's not that bad. Pornos and lustful images are risky as you can't verify the age but they can assign an age.
>>520197405>This is /g/Correction, this is *not* /g/(also fuck /g/ they hate real tech threads)I want hex maniac to give me her milkies
>>520192212I have 1030 tabs open. Firefox, librewolf could not handle even the half of it.
>>520197977i don't want it stolen from ME i never keep large chunks to avoid attention but...time got away from me
>>520198227>1030 tabs openHoly, how many redeemings are you trying to stop?
>>520177567Noobs
>>520193324basedthey can chug my dirty 1st amendment balls
>>520177567Linux is backdoored. Computers aren't safe at all. You want real privacy? Touch grass.
>>520180642the fallacy here is you waste all your time shitposting on 4chan and consider it productive. Just admit you were filtered or you're a lazy faggot, no one will really care that much but obvious lies aren't cutting it
>>520200475>It's not very productiveFor you
>>520200093If you have an Intel CPU or a post 2015 AMD you're being spied by Mossad anyway, you might as well just install Windows 11 and turn on all the widgets
>>520200093This. Linux has rsyslog and filebeat
>>520182332You’re in a socialist gibsmedat shithole. At least you got that free healthcare
>>520177567>all you need is wifi to shrink your testiclesnty
>>520182574>stuffsgood morning sirs
>>520177727Brother just buying a few of these components will get a glownigger into your house and cameras installed.
>>520177567@grok provide a detailed parts and todo list, tailored to my context. Also give an assessment of that anon's statements, are they useful?
>>520193324BasedHell yeah brudder