[ overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / music / 777 / posad / i / a / R9K / dead ] [ meta ]

/tech/ - Technology

"Technology reveals the active relation of man to nature"
Name
Email
Subject
Comment
Captcha
Tor Only

Flag
File
Embed
Password (For file deletion.)

Matrix   IRC Chat   Mumble   Telegram   Discord

| Catalog | Home

File: 1690725830487.png ( 227.19 KB , 1088x696 , crptography.png )

 No.12345[Reply]

The regime that is occupying the UK continues it's terror campaign against encryption privacy and democracy
https://www.eff.org/deeplinks/2023/07/uk-government-very-close-eroding-encryption-worldwide

TLDR:

They are trying to make impossible legal requirements like
<privacy respecting surveillance
<secure encryption with a backdoor
Which makes about as much sense as a freedom preserving prison.

This invasive democracy destroying "internet regulation bill" has not yet passed through the institutions, so if you're living in Bongland go yell at politicians ( more than 80% of UK citizens are on your side) Maybe that'll do something.



But I'm making this thread for another reason.
Post too long. Click here to view the full text.
6 posts omitted. Click reply to view.
>>

 No.12428

>>12417
>Isn't there a way to do quasi invisible encryption that looks like random unused data ?
There are plausible deniability tactics that you can use, but they're so niche and so restricted, that you'll basically have a machine for single use. Not only that, but if the bait system doesn't look like it's used, then they're also going to suspect something. If it's serious enough for you to go that far for using systems like this, it's serious enough for them to torture you for information.
>>

 No.12429

>>12418
I don't disagree with you, but in practice, everything the state could do to a citizen for the retrieval of data they deem to be important for national security will be gotten this way. Of course, I don't delve much into the cryptonerd space because, while it is a lot of fun to think about how cool it would be for the NSA/FBI/CIA to be unable to break your system, chances are that the worst that's going to happen to it is that it gets stolen and sold for the hardware that carries it, and not for the actual information you have inside. The most valuable files I have are .rmvb files with anime from 2004. Now that was real fansubbing.
>>

 No.12430

>>12428
So you seem to be saying. That we need a political movement to create deterrence against torture. Like fore example punishing torture with the death penalty. And a similar, albeit less severe, logic needs to be applied to political intimidation. We need to take the barbaric option from the table.

>There are plausible deniability tactics that you can use, but they're so niche

I think that unbreakable encryption is basically a requirement for privacy. However not all attacks against privacy are obvious and straight forward. The attempt to make effective privacy a legal liability, is the use of law-fare against privacy. While that is crazy illegal, and requires a political correction. It would be prudent to harden cryptographic privacy to withstand more than just technical deciphering attacks.

You say that making encryption invisible is not practical enough, idk. maybe that's a technical feature that could be enhanced to make it more practical. However if that's not possible are there other options ? For example can you make an encrypted vault that spits out decoy data if a coerced cipher key is used to decode it. My priority here is about rendering coercion moot. In this example with the decoy data, the utility would be to make it futile to beat a cypher-key out of people in order to render such barbarism impotent.
>>

 No.12431

>>12429
>the retrieval of data they deem to be important for national security
Maybe that's also a lie. Maybe there is no such important data.
>>

 No.12432

>>12345s
>Since as societies we can't abandon secure and private communications because that is indispensable for democracy, how can people resist this terror once institutions go bad ?
Steganography
>Is there deniable encryption ?
Yes, steganography
>And where is this coming from, who are the criminal actors pushing for this ?
The intelligence community and fascists amongst the political class
>Are we fighting the political battles the wrong way by making general political appeals ?
That's only a tool in the toolkit
>Should we be focusing our political energies against these specific criminal threat-actors instead ?
The threat is so expansive that it would require toppling the state to uproot completely.


File: 1692655966035.png ( 81.84 KB , 600x374 , emerge-desktop[1].png )

 No.12410[Reply]

Do you guys remember when you could have different shells on Windows? I 'member. They're all gone now.
1 post and 1 image reply omitted. Click reply to view.
>>

 No.12413

>>12411
I'm talking about graphical shells, anon. You used to be able to rice windows like you do GNU/Linux.
>>

 No.12414


i don't 'member, only the default ones on XP
>>

 No.12415

File: 1692720740738.jpg ( 126.33 KB , 1280x720 , maxresdefault[1].jpg )

>>12414
XP had some interesting shells. I had the Cairo Desktop on that. It was the only way to get multiple desktop spaces. Nowadays Windows comes standard with them. I never did manage to get a shell with spinning cubes and wobbly windows, though. Now that shit, I was really into.
>>

 No.12419

>>12413
What you can't do this anymore? I have 1 windows machine and it's souly for gaming.
>>

 No.12420

>>12419
I haven't found any that work on Win7, which was the first time I upgraded windows since XP, and I don't have Win11 because it won't run on my AMD chad CPU. All of my other computers run GNU/Linux except my one Windows laptop that is used exclusively for work. It's kind of sad, but the level of control MS now has over Users' computers is too much for anyone to waste time developing shells for it, especially since MS has implemented most of the features people wanted from these shells.


File: 1691375928861.png ( 183.13 KB , 907x849 , ClipboardImage.png )

 No.12378[Reply]

Hexbear and Lemmygrad are now federated
>>

 No.12379

How does this work? Aren't they only accessible over tor?
>>

 No.12383

>>12379
It's just a reddit style site but different instances of the site can talk to each other. lemmygrad is lemmygrad.ml and hexbear is hexbear.net (formerly chapo.chat which started because reddit banned chapotraphouse).

I guess as a user you can see posts from other instances and jnteract with them without leaving your instances website. Of course freedom of speech loving liberal instances are already defederating from communist ones like lemmygrad.
>>

 No.12384

>>12383
Ohhh I see.
So a a .onion website is still a .onion website but federated it can still communicate with a clear net instance.
>>

 No.12385

>>12383
So it's like mastodon
>>

 No.12386

>>12384
I think so, I haven't seen a federated onion site yet.

>>12385
Yes


File: 1624598884259.jpg ( 22.98 KB , 474x266 , windows 10 AME.jpg )

 No.9572[Reply]

Does anyone use Windows 10 Ameliorated/AME edition?

https://ameliorated.info/
47 posts and 5 image replies omitted. Click reply to view.
>>

 No.12373

>>12371
>Tho I don't know about licensing or contract law, does it have a conditional licensing feature ?
also, yes, as the use of engine is licensed, the devs can't do this "ransome-source" thing
>>

 No.12374

File: 1690872270266.png ( 7.42 KB , 267x318 , mononucleosis.png )

You boyos thought Wine was bad? Hold my beer.
>>

 No.12375

>>12374
Mono is just for C# fags making mobile apps, nobody uses this shit in linux space except maybe corpos who have C# monkeys on payroll.
>>

 No.12376

File: 1690991263053.jpeg ( 14.75 KB , 450x259 , haha.jpeg )

>>9576
always cracks me up how windows gatekeeps their stockholmed userbase cattle from the LTSC versions

sorry beta-testing pay-pigs, stable versions for business clients only
>>

 No.12377

>>12375
Sadly, a large number of game developers still use Microsoft's C# and .NET cancer, and then they release Linux "ports" over Mono.


File: 1685915877366-0.png ( 25.92 KB , 508x681 , Capturebin1.png )

File: 1685915877366-1.png ( 29.7 KB , 1060x436 , Capturebin3.png )

File: 1685915877366-2.png ( 17.1 KB , 221x592 , Capturebin2.png )

 No.12158[Reply]

so i'm motivated to planing to create a archive for threads and websites. thread and web writings that are important enough, have quality, and or can be used to counter western media and history naratives.

the archive i want to create for the threads is different from things like internet archive or things like that because i want to actually save all the file that is uploaded unlike regular archive where not every file and many that are uploaded in the thread were not saved in the archive.

if i can i want to make a website for this but i do not have any experience about creating website and coding nor can i do it. i also have special-ed mental that make me unable to learn coding like normal people so its hard.

my main plan is to use httrack and use every file format list from wikipedia and other websites, then copy that list to httrack file format selection thing

i want help from every people here, so if you can please send something
31 posts and 9 image replies omitted. Click reply to view.
>>

 No.12351

>>12349
No. I just used an in-built Kate function for moving all strings into one line, that's it.
>>

 No.12352

>>12351
wait so, wizard, you telling me that it is complete ? no deleting thing ?
>>

 No.12354

>>12352
yes ?
>>

 No.12364

>>12351
i will take it as a yes
>>

 No.12370



File: 1681485277429.jpg ( 62.53 KB , 900x500 , ancient comp.jpg )

 No.12079[Reply]

I'll start with a few examples:

>Proprietary Software can be secure

This is a slight of hand. In theory proprietary Software can of course be secure, but in praxis there is no way for you to find out which proprietary software is or isn't secure. So from the perspective of the user proprietary software can't be considered secure because there's no reliable way to tell.

>Proprietary Software is harder to hack because the source-code isn't open

This is a security by obscurity fallacy, that for some inexplicable reason is still in circulation. Exploitable software bugs are usually found by examining the behavior of executable binaries not the source code.

>Open source is secure

Not by default, there is no automatic security-magic in publishing code on git-hub/lab. However open-sourcing code means that it can be subjected to broad public scrutiny and hence it becomes possible for the users to know which software is or isn't secure.

>Security and privacy are not the same

This fallacy is widely parroted even by the security community. You, the human is a part of your computer security, without privacy, attackers can potentially learn enough about you to figure out psychological hacks to compromise your computer security by tricking you.

>Unbreakable cryptography

This is usually wrong in praxis because it doesn't factor in that most people will give up their cypher-key after the "low-tech-biological-deciphering-algorithm" broke their pinky-finger. Cryptography can only be considered secure if the encrypted-data-vault is obfuscated as random bits on a storage medium so that the existence of the encrypted data can be denied.
4 posts and 2 image replies omitted. Click reply to view.
>>

 No.12353

>>12346
>Am i missing something ?
Yes. It was done not with a smartphone but a stationary PC.
>>

 No.12356

>>12353
>stationary PC.
So a desktop box ?

Assuming the user hasn't plugged in a mic or a low impedance headphone, what are you using as microphone ?

Those cheapy speaker boxes that people usually use, have classD amps, while, efficient, low cost with reasonable audio fidelity, they have a terribly high noise-floor. I doubt that you can get usable audio capture from that.
A class-D amplifier or switching amplifier is an electronic amplifier in which the amplifying devices (usually MOSFETs) operate as electronic switches, and not as linear gain devices as in other amplifiers. They operate by rapidly switching back and forth between the supply rails, using pulse-width modulation and pulse-density modulation to produce a pulse train output.

That leaves the motherboard-beeper, which usually is just a piezo connected to a 5v IO pin that goes high-low-high-low square-wave at 500Hz. Can you get audio capture from that ?
>>

 No.12358

>>12330
You need to ascend anon, for your home wifi you need to disable the password, then set up some utility to clear up/reset the IP connection logs daily, and now you have plausible deniability on any download/connection that you make from your house

So far as phones and etc, ofc it is all fucked, but you can set up your home connection to be quite resilient against your internet provider snooping on you
>>

 No.12359

>>12346

You can just desolder the microphones/speakers (they have more than one), Snowden has got some youtube videos showing how it is done. Then if you want to have phonecalls you just plug in a set of earbuds and talk through there

You need then to research your phone model to see if you can disable the GPS and other things. But at these points the weakpoint stops being you, and it becomes wherever other retard that still uses whatsapp you are working with to setup the coup detat/assassination/thievery etc
>>

 No.12362

>>12359
>You can just desolder the microphones/speakers (they have more than one), Snowden has got some youtube videos showing how it is done. Then if you want to have phonecalls you just plug in a set of earbuds and talk through there
Interesting stuff

>to setup the coup detat/assassination/thievery etc

Lol imagine announcing a coup d'état by using phones, rather than couriers. Even technically super sophisticated spy agencies don't trust their communication technology for the sensitive parts of their operations.


File: 1690593101635.jpg ( 69.34 KB , 1200x800 , ankle-monitor.jpg )

 No.12338[Reply]

New attack on privacy is taking on a hole new dimension.

https://invidious.protokolla.fi/watch?v=BAiQnq6h6ao
https://www.youtube.com/watch?v=wKegmu0V75s
TLTW:The US congress has proposed a law that would require rc-drone pilots to broadcast the location of their rc-drone and their own location.

Never mind the drone stuff, this would be a precedent of mandating a tracking beacon that broadcasts your location. Such a mandate so far only exists for convicted criminals that have to wear a tracking ankle-monitor.

I think this is so egregious, that surveillance has to be re-categorized as a form of attack or assault. We ought to grant people a right to self-defense to preserve their privacy, analogous to the right to self defense against physical attacks. People should be granted the right to use very assertive measures to protect their privacy. (Going beyond the current passive defense of privacy)

Obviously privacy means the absence of surveillance
>>

 No.12339

>>12338
Having a transponder that squawks on a certain code is already standard in aviation, this seems like it's extending it to drones. I'm not that worried tbh.
>>

 No.12340

>>12339
I'm not opposed to a requirement of transponders for commercial drones. If those delivery drones ever become viable, there will probably arise a need for dedicated drone airspace corridors and possibly even some kind of flight-control system that directs what flight routes drones can take to prevent collisions.

However none of that is really relevant here. This law has a requirement for hobby drone pilots to not only have a drone-transponder, but in addition they also have to broad-cast the location of their person. This is a mandate for a personal tracking device.

Outside of a commercial setting, neither your personal stuff nor your person should be subjected to any kind of surveillance. And any attempt of subverting personal privacy should be frustrated with effective means.


File: 1690247406471.jpg ( 59.06 KB , 763x572 , eu barrier against foss.jpg )

 No.12325[Reply]

So the EU wants to introduce software regulations (Cyber Resilience Act) that is probably going to harm FOSS pretty badly.

The politically stated goal is improving software security. However it's not likely going to achieve this, they are introducing costly security certification. Which to me appears more like a scheme to pay somebody to take responsibility, rather than actually improving engineering quality. It might also have a psychological factor like a secular version of asking a priest to bless your technology. And it kinda looks like a anti-competitive regulatory burden that favors large firms over smaller ones. It is unclear to me whether or not there is malicious intent behind this or not.

This process might make sense for large corporate software monopoly dinosaurs that still do proprietary release dumps. This legislation will probably give an unfair advantage to those business models. The irony here is of course that proprietary software lacks the openness that would allow for public code auditing, which is a vital part of modern software security. Proprietary trust me bro security/obscurity is low quality and a bit anachronistic at this point. The net-effect of favoring this could be decreased software security.

If you listen to the FOSS advocates they want to have exemptions for open-source so the C.R.A. would not undermine FOSS projects. This is reasonable because at least it wouldn't make anything worse. The security praxis of infrastructure relevant FOSS project has improved a lot in recent years and is comparably decent atm.

What would actually improve software security in the FOSS world is more code audits, you could have an EU wide census about which software is commercially deployed and then prioritize funding security-bug-bounty programs that specifically target these. This scheme is effective because the cyber-espionage-agencies do exactly that for their weaponized software exploit acquisitions. I don't understand why they wouldn't copy what already works.

I think that if they don't fix this it will lead to walling FOSS out of the EU, with the resulting brain-drain from FOSS projects looking for regulatory environments that aren't hostile.

more detailed information here:
https://news.apache.org/foundation/entry/save-open-sourcePost too long. Click here to view the full text.
>>

 No.12328

This definitely is a blow to the organizational capabilities of FOSS since the EU explicitly states that it will be affected. I don't think that development could realistically go underground at this current scale either. There will likely be a mixed bag of compliant larger devs and noncompliant smaller ones but it will be fuckey for sure if it happens.
>>

 No.12329

>>12328
It kinda depends on what is motivating this. If they really just want better IT security and it's not their goal to suffocate FOSS, they'll likely go back and fix the broken aspects of this, and it'll be temporary damage.

But if this is a monopoly move to kill off smaller competitors we have to start teaching FOSS companies how to bully back. I kinda thought that proprietary and FOSS software could co-exist now, it looked like the proprietarians had given up their war against FOSS, if that turns out to be false, it's better to just preserve FOSS and get rid of the predators that threaten it.

>I don't think that development could realistically go underground at this current scale either.

Yeah it's kinda hard to have a secret organization that wants to be fully transparent to the wider public.

>This definitely is a blow to the organizational capabilities of FOSS

I guess FOSS would turn into a programmers guild, where only guild members get source access and maintain the FOSS principles internally but not externally. At least that way organization would be maintained.

>There will likely be a mixed bag of compliant larger devs and noncompliant smaller ones but it will be fuckey for sure if it happens.


One thing to consider is that China has been super effective at poaching talent from Taiwan ever since the US began it's crackdown on microchips. There's even a Chinese graphics card company that was formed by a bunch of former NVIDIA employees that got screwed over in the chip-purge. The Chinese basically created a special economic zone that pretty much allowed these people to import the Taiwanese legal framework with long term legal guarantees.

If this is indeed the inquisition preparing to purge FOSS, it might be possible to survive in a Chinese special economic zone until shit goes back to normal. It would be kinda ironic if the Very American concept of freedom that are underpinning FOSS ideals end up getting preserved by the "muhauthoritarians".


File: 1622825249568.png ( 1.22 MB , 1796x1132 , two-onroad-transparent-01.png )

 No.8984[Reply]

FOSS will give Tesla a run for its money. It works with many newish (2018 onwards) cars. The hardware costs $1k versus $10k+ for Tesla autopilot.
https://github.com/commaai/openpilot/wiki
13 posts and 3 image replies omitted. Click reply to view.
>>

 No.12313

>>12281
I think someone's already done it. There is certainly an effort to bring open source ECUs to the market for many engines, and this being LS-powered, I'm sure one exists already. I would like to see an electric version. In fact, I'm very interested in electric buggies, because I would like to take one for night hunts and shoots. Right now I'm really just heavily considering an electric bike or motorcycle.
>>

 No.12315

>>12313
>Right now I'm really just heavily considering an electric bike or motorcycle.
At the moment you're best bet might be to go for an electric bicycle, you can get relatively open technology, for motors, controller circuits and battery packs.

Louis Rossmann the youtube repair-guy said the stuff from this shop is open and reasonable quality
https://ebikes.ca/product-info/grin-products/phaserunner.html
https://em3ev.com/

here's a forum for ebikes
https://endless-sphere.com/sphere/
>>

 No.12321

>>12315
Thanks, anon. That might actually be a better choice, considering I don't have to go and get the license. I always like the stuff by Rossman. That manlet knows what's up.
>>

 No.12322

>>12321
Consider sharing how it went in case you decide to build an electric bicycle
>>

 No.12324

>>12322
Will do. The area I'm working in certainly lends itself to an offroad electric bike, and it might be easier to carry to and from.


File: 1690063465405.png ( 869.42 KB , 996x744 , alien.png )

 No.12318[Reply]

I made a wiki about unretarding technology and society. What do you think? https://www.tastyfish.cz/lrs/main.html
>>

 No.12319

seems interesting
can you fix dead links like for example this one https://www.tastyfish.cz/lrs/countercomplex.html i kinda wanted know what countercomplex means
>>

 No.12320

>>12319
Dead links are articles I haven't written yet, they should appear as red. For countercomplex see http://countercomplex.blogspot.com/.
>>

 No.12323

>>12318
I read the section about licenses , and i still don't understand why you consider publicdomain CC0 licenses to be better than copy-left and FOSS licenses.

Wasn't FOSS and copy-left created specifically because it was possible to modify public domain works and then close off the modified version.
>>

 No.12505

I see a blank web page and can't even rightclick -> view source.
Is this spam?


Delete Post [ ]
[ overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / music / 777 / posad / i / a / R9K / dead ] [ meta ]
[ 1 / 2 / 3 / 4 / 5 / 6 / 7 / 8 / 9 / 10 / 11 / 12 / 13 / 14 / 15 / 16 / 17 / 18 / 19 / 20 / 21 / 22 / 23 / 24 / 25 / 26 / 27 / 28 / 29 / 30 / 31 / 32 / 33 / 34 / 35 / 36 ]
| Catalog | Home