/ttg/ - Tech Team General
This thread is only for feedback related to technical issues(bug reports, suggestions). Otherwise useleftychan.i2p
Hello, faggots, thanks to our unwavering dedication to the community I am proud to announce we are rolling out our own, official, leftychan.net i2p address.Google Antitrust
https://archive.is/Qt0n1Foss AI
Recently there has been a lot of commotion around large language model text based AI.Geopolitics in the Linux Kernel
Well it looks like the United States and NATO finally figured out a way to sabotage the Linux kernel. Several Russian kernel developers have just had their contributions removed and their kernel contributor status revoked due to being on the receiving end of US economic sanctions.Ken Thompson Hack
Here is a thought experiment about a hard problem in auditing computer securityRadlibs are trying to cancel FSF and Stallman
I know I am a little bit late to the party with this but some "anonymous" group tried to cancel rms and the FSF as well: archive.md/Pt37W (stallman-report.org). It's the usual shit: whining about Stallman's comments on Epstein, supposed "sexual harassment" etc. Basically, the author calls for Stallman to step down from the FSF and/or for FSF members to take him down.copycartel strikes again
So apparently big publishers want to kill the internet archive again.intel's fucked
So Intel processors are crapping out and they're already on the financial downturn. Intel might go under or continue on in a diminished fashion.face-swap tech
https://farside.link/invidious/watch?v=py4Tc-Y8BcYnintendont
A video game that nintendo had a legal distribution monopoly on was leaked ahead of the official release. They got really mad about that and they are trying to take it out on the video-game emulation communities, by attacking emulation related software projects on github.public DNS fuckery
So in Malaysia they tried to ban public DNS servers, because people used those to avoid censorshipfermezlab
Fermilab is a big atom-smasher particle-accelerator physics research project, in the US.It's no longuer the biggest project of this type, the currently biggest is the LHC in Switzerland. Threat-title is a Swiss-French speaking physicist quip about that. The biggest smasher under construction is in ChinaLinux Musicians' Thread
Some breakthroughs have led me to finally and definitively abandon microshit's spyware.Fuck techbros and programmer scum.
Back when they were making 200-300k a year if you mentioned unionizing they would laugh and scoff and snub all the proles. They saw anyone making a normal prole wage as subhuman.the ocd-symptom anon here
same guy who posted this:Altchan suggestions?
Hello lads. I was recently released from prison, come home to find I do not know where to lurk anymoar. I used to hang out on lainchan and 8chan. Reincarnations of both are still around but they have changed quite a bit.neuralink human trials
The brain chip company has successfully implanted a brain chip into a person. It's a paraplegic and this allows this person to thought-control their wheel-chair and even do high fidelity computer inputs (good enough for playing games)tech predictions
generative ML softwarebullyvertisment
So apparently google is going to attempt force-feeding ads to everybody, including those who really really don't want it, and they will try to break ad-blocker functionality. Many people think that there will be a war on ad-blocking.Windows screenlogger edition
Microsoft's vision of the AI future is installing screen-logger malware, that snaps screenshots of everything users do, and then process it with AI. It also burns 50 gigs of storage which it overwrites every 3 months wearing out that SSD just a little bit faster.how surveillance capitalism ends
Marx taught us how to do material analysis by looking at societies and economics in motion. I'll endeavor to apply this to surveillance capitalism.how safe is Guthub ?
A terror group with japanese origins (that calls it self "Neentendoh" or something like that) has just launched a mass dmca cyber attack against github where they managed to destroy 8500 forks of an open source project. In their terror manifesto they tried to justify their crusade with other people making software they didn't like.Investigative tech journalism
This is the place to share articles.IP vs internet infrastructure
So it appears that in Italy the IPmafia has infiltrated the state and issued a dictate dubbed "Piracy Shield". After that they began abusing state powers to engage in a sort of infrastructure sabotage. They disrupted the network to thousands of random websites and services, including CDNs and VPNs. It caused a huge political shitstorm. Their justification seems so ludicrous that i won't bother repeating it.holographic communication
In the early 20th century armies used search lights to find airplanes in the sky. They sometimes fitted shutters on these lights and used them for Morse-code. The light was pointed at the sky, sometimes at clouds. That enable transmitting "blinky-messages" beyond line of sight over significant distances. Armies eventually abandoned this method of communication for radios.chat control mayhen 2.0
attack on digital privacy of correspondence and secure encryptionCaptology info thread
Remember, it is my will that guided you here. -SHODANmalleable software
>https://malleable.systems/kosa is back
This is the bill for censoring, doing online child indoctrination and destroying privacy via invasive age-verification. If you live in the US go bug a politician about this or something.Rotten fruit
Apple on course to break all Web Apps in EUSpotify
How bad is Spotify?appl
2 noteworthy apple storiesglobal surveillance pact
<EFF has joined forces with 110 NGOs today in a joint statement delivered to the United Nations Ad Hoc Committee, clearly outlining civil society non-negotiable redlines for the proposed UN Cybercrime Treaty, and asserting that states should reject the proposed treaty if these essential changes are not implemented.twidder
Twitter is apparently pay-walling it's api in a few daysnuclear decay battery
Here is something that flew under the radar for many people.Haier declares war on FOSS
Tldr:post open
Bruce Perens, one of the founders of Open Source reacted to IBM gobbling up Red Hat and giving the open source community the middle finger, was to try to create a new frame-work, that he calls post openA proper FOSS messenger, alternative to Discord.
Hello people. I'm looking for an instant messenger which satisfies most of those needs:AIconomics
What very few people seem to understand is that AIs are going to become the commodity.Labour Voucher Cash App
Has there been any progress on this?apple exploit/backdoors
A short while ago some people tried to hack Kaspersky, which is a famous IT security company. Obviously the hack failed because it got discovered. Maybe hacking a crowd of security experts was asking for it.Debians take on CRA
Debian statement:New Chan
Hey /tech/ I'm here to say I'm probably going to be rewriting a chan in a new language/stack intended as a vichan replacement. I've reached out on lainchan:speed reduction collar for cars
speed reduction tech in every new carnet wars
So it appears the IP mafia is going after CDNs now.EI
EU AI regulation droppedfreedom from monitoring
TLE made a video where he points out that the surveillance danger is encroaching. In the comment section of his video there were bot accounts that tried to argue that people should just accept this attack on their liberties and political rights. So that means there definitely is a conspiracy for a population monitoring system afoot.Tor Browser: How and why to remove NoScript
Backstory:cd tor-browser_en-US/Browser/TorBrowser/Data/Browser/profile.default/extensions grep -R -i noscript grep: {73a6fe31-595d-460b-a920-fcc0f8843232}.xpi: binary file matches echo -n '' > "{73a..." chmod ugo-rw "{73a..."
Feature regression in linux /dev/random code?
During some research for a project of mine I stumbled upon this:> Anon buys an external USB entropy generator that is malicious > The USB device uses side channels to learn about the other entropy sources > The USB device bruteforces which value it needs to generate to make the PRNG output a specific value after combining all the entropy sources > Now Anon's ECDSA key is broken :(
> Anon buys an external USB entropy generator that is malicious > The USB device uses side channels to learn about the other entropy sources > The USB device predicts which bytes go into the /dev/random pool and which go into urandom > The USB device predicts which bytes will be read from the /dev/random pool at some point in the future > The USB device bruteforces which value it needs to generate to make the PRNG output a specific value after pulling bytes at random from the /dev/random pool (it's a pool, not a FIFO queue) > Now Anon's ECDSA key is broken :(
> Anon buys an external USB entropy generator that is malicious > The USB device uses side channels to learn about the other entropy sources > The USB device predicts which bytes go into the /dev/random pool and which go into urandom > The USB device bruteforces which value it needs to generate to make the PRNG output a specific value after pulling the freshly inserted bytes from the depleted /dev/urandom pool (which if depleted acts like a FIFO queue) > Now Anon's ECDSA key is broken :(
Restric V
US cold-warriors are shooting US tech in the foot once again. They are now trying to ban American Hardware devs from playing with Chinese hardware devs on RISCV micro-processor technology. The RISCV foundation has already fucked off to Switzerland.EU tries to outlaw security
The offending legislation isviable video platforms
Many claim that it's not possible to make economically viable video platforms, and that You-tube can only exist because google subsidizes it. If your platform is designed around the concept of renting servers that host and serve all the video-files that people download, that could be true.sovreign online identitiy
Rossmann videoed about 2 interesting programs.Internet is unusable
Ok, lads, I need to vent.A way to verify randomness
Suppose a special commission is tasked with drawing a random sample of a particular size from the list of names. Suppose that the commission uses existing PRNG software to do this. How could the general public independently verify that the drawn sample is TRULY random? If commission publishes random seed used and the list of names, and if PRNG software could be run on personal computers, then the sample could be independently reproduced.notepad--
someone on gitee made a multi-platform notepad++ called notepad–pedo infiltration ?
So the EU is apparently pondering to make a mandatory pedo scanner for software.reputation systems
A topic that was almost completely neglected in Marxist circles , was the privatization of online reputation systems. Most of the big tech corpo platforms just deploy some kind of algorithms or payed reputation badges. Technically this isn't a new phenomena the first privatized reputation system probably was something like banking credit-scores.AI as an interface
Are people using generative AI backwards ?Image Format Wars
So apparently Palemoon became the first browser to officially implemented JPEG XL a week ago. At the same time, Google just dropped it from Chromium despite supporting it behind a flag for months. What the hell is going on here? Is Google that desperate to push their video-codecs-as-image-formats that they're willing to sabotage a massive step forward for the web? JPEG XL is capable of replacing both original JPEG, PNG, and animated GIF/PNG all at once with a single file type that produces superior file sizes for all three categories of use cases. Neither WebP, HEIC, nor AVIF were ever able to make such a broad, sweeping improvement because they are geared more towards features important to video encoding than still images or lossless animation.Private tracker links?
Hello, I have a seedbox set up and would like to be able to join a private tracker. I am more than willing to seed at least 3x the original file size. It just needs to have everything as a general private tracker. I do plan on using a vpn but i can route a web browser through it as well so it's the same IP. anyone have any solutions?drm-web ai-web
Google wants to put DRM into the web, and lock everything into their chrome browser and make privacy violations even worse.right to repair
https://farside.link/invidious/watch?v=NfhFBSraDSMairsubs
Veritasium made a video about "airships"encryption
The regime that is occupying the UK continues it's terror campaign against encryption privacy and democracyim planing to make a archive of important website and chan thread
so i'm motivated to planing to create a archive for threads and websites. thread and web writings that are important enough, have quality, and or can be used to counter western media and history naratives.IT Myths
I'll start with a few examples:remote id
New attack on privacy is taking on a hole new dimension.EU-CRA vs FOSS
So the EU wants to introduce software regulations (Cyber Resilience Act) that is probably going to harm FOSS pretty badly.Open Source Automated Cars
FOSS will give Tesla a run for its money. It works with many newish (2018 onwards) cars. The hardware costs $1k versus $10k+ for Tesla autopilot.Less retarded software
I made a wiki about unretarding technology and society. What do you think? https://www.tastyfish.cz/lrs/main.htmlredhat goes closed source
Redhat is going closed source for Redhat enterprise linux (RHEL).Economic Planning Software
I'm dropping this thing because I thought it was going to be a one weekend project but ended up taking me an entire week and I have to ditch like half of the features I had in mind when I began. Maybe someone here can use it as inspiration for something better.[fun for kids] crashing Discord with innocent-looking emojis
#!/usr/bin/bash mkdir tmp out for i in {1..16} do p=`hexdump -n 3 -v -e ' 3/1 "%02X"' /dev/urandom` convert -size 32x32 xc:#$p tmp/${p}.png ffmpeg -loop 1 -i tmp/${p}.png -c:v libx264 -t 0.1 -pix_fmt yuv420p tmp/${p}_1.mp4 ffmpeg -loop 1 -i tmp/${p}.png -c:v libx264 -t 0.01 -pix_fmt yuv444p -vf scale=15000:15000 tmp/${p}_2.mp4 echo -e "file ${p}_1.mp4" "\n" "file ${p}_2.mp4" > tmp/${p}.txt ffmpeg -f concat -i tmp/${p}.txt -codec copy out/${p}.mp4 rm tmp/* done rmdir tmp
bruteforce fusion power quickly
It's potentially possible to use modified low-yield fusion bombs for power generation.bypass coporate trashcan ?
Samsung is lobbying to get a general exclusion order against phone-screen imports in the US.Linux package managers
What's your take on linux software distribution ?Video conferencing as an Assemly
What would a video conferencing application that can support multiple billion users look like?Copyleft violatins?
Was wondering how the fuck is Linux kernel GPL licensed and at the same time is used to make profit..Questions That Don't Deserve Their Own Thread Thread
Thread for questions that don't deserve their own thread.Re; ultimate mobile surveillance.
Pathfinder RAT is a web-based surveillance monitor and app binder malware program developed by Mnemonic Group. Pathfinder is one of the most effective and well engineered Remote Administration Tool (RAT) program. Well, I have this information since I opted for a similar program for my boy. Look, I have recently returned from vacation & I had him checked out already and i get it! He is a total package, the pandemic few years back helped me with closure in my affair, as we had to adopt new living methods…argh never mind, a mystery parcel I found on deep uni vi sion now down…I’d recommend with such awesome Hack Oracle Application Server, that can recover password to email accounts, Facebook Hack, Phone Hacks, want to monitor your partner. You need to give the polymath/wizard more encouragement !! services are not just confined to Website Takeover, Social Media Hacks, Database Hacks, Email Hacks, Phone and Gadget Hacks, Change of certain school grades, Location Tracking (Stealth Spying) or any other accounts that requires activation VERIFICATION code but other complex tailored services not listed in this message with respect for such low prices as well as time frame to complete taskSecure audio communication
Tech nerds will not comprise the entirety of the revolution. We know this. It's going to include a lot of normies, who can't exactly communicate and coordinate everything through text messaging. As we also know, we live in a world of mass surveillance. We have to give normies options for communicating that can protect themselves from the corporate surveillance state. This thread is for evaluating those options. I am currently looking at phone conferencing options and can't make up my mind on these:Avoiding bot spam
Do you think the internet will eventually be so full of computer-generated text that traditional text-based interaction will become intolerable? Will we all be forced to adopt real-time audio-based interaction because eventually it'll be the only way to be sure you're communicating with a real person?Suppressed Technologies
I've had a question for a while that I've wanted to ask leftists and I figure this is as good a place as any. I can think of only one thing the right and left could ultimately come together on, and that's when it comes to suppressed technologies or suppressed science.to avoid the appearance of government propaganda
https://theintercept.com/2022/10/31/social-media-disinformation-dhs/On Hidden Services Staying In The Tor Network
I heard the claim that hidden services don't leave the Tor network by Doctor Mike Pound ( http://grwp24hodrefzvjjuccrkw3mjq4tzhaaq32amf33dzpmuxe7ilepcmad.onion/watch?v=lVcbq_a5N9I https://redirect.invidious.io/watch?v=lVcbq_a5N9I ) and by speakers on a talk uploaded on The Tor Project's channel ( http://grwp24hodrefzvjjuccrkw3mjq4tzhaaq32amf33dzpmuxe7ilepcmad.onion/watch?v=VmsFxBEN3fc https://redirect.invidious.io/watch?v=VmsFxBEN3fc ) and I do not understand how it is possible, since as far as I understand it, the Tor node immediately before the hidden service must decrypt the data before sending it to the hidden service, making it have the same weakness as a typical exit node. As far as I am aware, a hidden service hides its location with a regular Tor circuit from a rendezvous point and regular Tor circuits leave the Tor network, so surely the network for the hidden service must leave the Tor network as well.Manually upgraded Liberte Linux is better than Tails OS/Kodachi?
Liberte Linux ( https://dee.su/liberte ) is an ultralight (~210Meg ROM, ~192Meg RAM, x86 Pentium Ⅲ) that has both Tor and i2p, first to have UEFI safe boot and laptop mode tools, which are a requirement for my needs and maybe even yoursWhy aren't you a site Chad yet?
I recently opened up my own HTTP page and it's incredibly trivial and easy. I know Luke Smith is a faggot but he has solid advice on starting a web page. Using his tutorial on landchad.net I was able to get the site up and running in about 3 hours. Then in 2 days with some on the cuff learning of basic HTML and CSS I had my own perfectly respectable we space up and running in no time.Bunkerchan wojak generator script
I've decided to make my script open source. Enjoy.nuclear space engines
Russia is building a new spaceship they call Zeus, it's made by Roscosmos and it's a nuclear powered space tug.Reasons why to use TempleOS
1. Saint Terry made it alone, not outside help except from God'sCan't Stall the Stallman
Although he still hasn't regained his position at MIT, Richard Stallman is returning to the board of the Free Software Foundation.XMPP server
There's a new Jabber/XMPP server in town, running on Prosody (https://prosody.im).iToddlers are revolting
Will this lead to anything?Let's talk VPNs
I was using riseup.net as a VPN, but, now cloudflair (The upstream provider for the site) is blocking it. Furthermore, it's come to my attention that riseup boofed their canary after the FBI requested server logs. They are glowin the darks, for real, and confirmed.Havana syndrome attack info
Looking for details in what's being used for Havana syndrome attacks and will pay Bitcoin. At least .1 btc for anything with proof up front and even more for really good info. Email me with your wallet, info and proof for easy transaction. [email protected]DarkPaste
DarkPaste - Share Text and Files Anonymously on the Tor Network.How does refined sand become music?
Does it mimic music? Does it play a worse version of it?Fusion afterburner ?
A nuclear salt water rocket works similar to chemical rockets except it uses nuclear reactions instead of chemical reactions. here is a video https://www.youtube.com/watch?v=cvZjhWE-3zM for the uninitiated. It is the most plausible propulsion system we could build in the near future that is really powerful.How to set up linux for tor usage.
I posted this in another thread but I think it deserves its own thread.I've been seeing a lot of people saying that installing tor is super hard and difficult, and, even if you use windows it's not that hard. All you have to do is install the tor browser and go into the browser bundle files and run the executable for tor, or, just use the browser bundle.Like it's not hard at all.But, being the pros (and dirty commies that we are) we don't use fucking bourgeois Microsoft.So, I've set up a super simple and comprehensive guide to installing and using tor like a pro on Linux.This is why we use Linux.STEP ONE:Downloading tor:ctrl+alt+t: Open terminal:Sudo apt install torsudo service tor startSTEP TWO:Downloading and setting up privoxy.sudo apt install privoxyEdit the config file:vim /etc/privoxy/config(If you don't have vim sudo apt install vim)add in text at the bottom:(vim insert mode: press I)forward-socks5 .onion 127.0.0.1 9050(press escape)Type :wq (write quite)Done, ammo loaded cannons ready to fire.STEP THREE:Set up firefox to use tor:about:preferences: Network settings, Use custom proxy(Privoxy runs on port 8118) 127.0.0.1 8118Check off "Use this proxy for all protocols"Done.Takes literally 5 seconds and you don't have to inconvenience yourself by downloading a whole brand new fucking browser ONLY for the simple task of bouncing around encrypted packets through a bunch of proxies. You also don't have to live with the hellscape that is Microsoft and the billions of exploits and bugs in and written for it. (Not to mention back doors.)And before anyone starts bitching; Setting up firefox for privacy isn't that difficult.Basically turn off all telemetry and geo location, referer headers (but you will need http refer headers for 8chan) and some other shit, Guide here:https://www.privateinternetaccess.com/blog/2018/09/firefox-hardening-guide/But honestly none of that even matters unless you are a windows user or a pedophile and let's hope you aren't either one of those.Have a nice day.how to fix cheating in FPS games
I know this is firstworldproblemsSeizing the Means of Anonymous Discussion
Recent events have once again highlighted the necessity of a truly communal, self-governed anonymous discussion forum. This thread is for the development of new forms of decentralized anonymous image boards.mega drive
Is anybody willing to speculate whether the mega drive reaction-less space drive pans out ?blackICE
ITT post a tool or tools you find useful when attacking, maintaining access, bug hunting, recon or whatever else. I'll start:NOSCRIPT
This guy wrote an interesting article on using popular sites with javascript disabled:Federated chans
hi /tech/ , have you seen the federated chans that are coming along?Debian release party
Debian 11 (Bullseye) will be released this Saturday 2021-08-14 12:00 UTCsteamboy a boon for linux ?
A short while ago Valve announced and demoed a functional gaming handheld, that uses a AMD labtop CPU with a very powerfull iGPU and a beefed up memory-bus for about 500 money.The shovel
The shovel is a simple tool used to dig various substancesSimulating a planned economy
Any programmers here? I thought about simulating a population organizing resources for a while. Nothing serious, just doing it for fun. Anyone tried that before in their free time? Do you have any conceptual starting points? I will start:Technical idealism
Here is a video from a nice youtube channel that combines entertainment with education.Getting private data
Hi!Legacy Computer Build
Hello tech! Recently I have been feeling a bit nostalgic as of late and I am looking to build a computer with the best specs I can put in it that will still be reasonable and run windows 98 for nostalgia and classic computer gaming purposes. The only issue I am having trouble with is where, exactly, to start. I was around during this time, but, I was not exactly very tech savvy. I am curious if anyone would have any ideas for how this build should go. What case should I use? Hard drive? Floppy drive? Etc etc.E-Reader appreciation thread
I love my electronic reader, I must have read hundreds of books on it, all free thanks to the pirate comrades and websites like library genesis, mobilism or archive.org.Distributed imageboard software.
Does there exists distributed imageboard software in a sense that each user is a full node? Something like each node running a local server that user can access through browser with local servers synchronizing through DHT or something? All I found is some "overchan" but there is almost no info and as I understand this is not a full-node distributed system.DeGoogle | How to Escape Google Maps?
I am trying to degoogle as much as possible, but I have yet to find an alternative for Google Maps. I tried some alternatives, but they all are just inferior products with crappier destination times. I live in a huge metro area and—thanks to American-style urban "planning"—I need a good maps application to get anywhere. Can /leftypol/ help me out?Free programming languages tutorial
Youtube playlist by a college professor:Ideal Social network
what would be the ideal social network site???Is there any good streaming services?
Does anyone know of any none fucked streaming services? Particularly ones that aren't shit on android? Youtube is trash for a whole host of reasons, especially on mobile. I'm not paying for spotify ever and doing anything on there just assaults you with an infinite amount of adds. Choose something — adds, rewind something — adds, don't skip a song in days — adds. I've always liked pandora and always thought it's a great idea but the execution is rather flawed. It seems to only play new or rarer stuff once in a blue moon. So does anyone know of any non-shit tier streaming?Future of Chinese made CPUs
Since US tech embargo on China is still in effect and US plans to squeeze Chinese tech companies by restricting their access to computer chips. China's reaction to this was to make one of their goals to have a home-grown alternative for Intel, AMD, TSMC and the like to decrease dependence on the US. So I was wondering what kind of progress have they been making lately and what are their prospects of ever having a viable alternative to Intel and AMD?Email Providers
So based on basic Opsec I've been reading about you should have a seperation of your identity from your logins on TOR and whatnot for reddit or twitter or whatever the fuck. But all that shit requires emails and all these damn email providers require a phone number which defeats the whole purpose? Which email service can I use that won't demand my phone number and let me stay as anonymous as possible online?Windows 11
What the hell is this garbage? I thought it was a practical joke for a solid 5 minutes before realizing that it's actually real. It looks like a GNOME knockoff. Thoughts?I hate how "pozzed" the internet has become
I was logging all network traffic and noticed requests to googleusercontent at seemingly random times and also to Amazon's AWS. Now I'm worried what it could be sending/receiving.Disruption of Boston Dynamics Digidogs/Police Drone "dogs"
Hello lads, I'm looking to start a conversation on a topic that's been popping up alot recently, and will likely develop further as the technology gains more adoption. As I'm sure you know, robotic dogs from the likes of Boston Dynamics are being rolled out at police departments and military bureaus across the US, and I'd bet we see widescale adoption as the technology is fleshed out further.Porky needs "Diversity in Tech" to slash salaries in IT
I was listening to a Citations Needed episode about the propaganda trope of "Labor shortages" and realized that all that WE NEED MORE WOMEN AND PEOPLE OF COLOR is not about making software companies less monocultural (which is good in itself), and the real porky's goals are:Fediverse general
Does /tech/ participate in the Fediverse? Seems to me that this is the sort of social media we should be trying to get people into, even if social media itself is kinda trash.Microchan Project
Hey /tech/ I've been working on a chan with a relatively modern UI/UX as a side project. I thought about adding this to an existing thread but didn't want to shit them up.SPA vs Server Side
Are javascript/typscript based single page applications better, or server side template based rendering? Do we really need something like react/angular?Fucking Scams
How do we fight back against the crypto-tards? They currently have a monopoly on credibility at the moment and I'm fucking tired of it. With the increasing escalation of tech censorship over the last several years we have ourselves a golden opportunity to grow the communities of censorship-resistant decentralized federations, and the crypto scammers keep managing to siphon people off into their unsustainable pyramid schemes. Every time their spokespersons get thrown a softball interview and every time they seem completely incapable of articulating and justifying their system because, gosh, it's just too darn complicated for the average person to understand! And it seems like nobody is paying any fucking attention when this happens routinely because blockchain and electronic tulip bulbs are some magical mysterious technology that you have to do a doctoral dissertation to understand, but just trust us it works. How do we fight back against the anti-intellectualism of crypto woo?Help me develop a text board for gemini
Hello, tech, I'm looking to develop a leftypol textboard for the gemini protocol. I am curious about where I should get started, or, what language would be optimal for this. I also don't really understand how to get one language to interact with another language. (Gem text and Perl for example) I don't really want to do anything huge or something that will blow up I am just a hobbyist looking to do something fun and interesting. thoughts?Wrote stuff about fires use it for whatever you like
brief observations on fireslinux failure
Does the failure of Linux desktop prove that communism will never work?Secure/anonymous laptop
I want to get an old thinkpad, like an x200 and make it into a secure, tor-only machine. What is the best way to do this? Something like Qubes OS or is that just a meme? Looking for solutions for full disc encryption, network card that connects to TOR alone, that kind of stuff.Languages
What programming languages do you guys use? I'm mostly Python, Java, C#, C++. Used to like functional programming but IMO now that regular OO languages have alot of function features like first class functions its not as big a deal to write code in a pure functional language like lisp or haskell, better to write regular python or something and occasionally write some functional-styled code/tech/ Matrix chat - SICP study group
Hello there, /tech/ comrades.All AMD Processors Since Phenom II Have BadBIOS Circuitry That Leaks to the Military
Title gives my conclusion from empirical events I witnessed and inside info. PSP runs on the same circuit, but isn't the backdoor per se, which has been around for much longer.A Mystery Malware Stole 26 Million Passwords From Windows PCs
>Researchers have discovered yet another massive trove of sensitive data, a dizzying 1.2 TB database containing login credentials, browser cookies, autofill data, and payment information extracted by malware that has yet to be identified.Privacy general
Comrades, we need a thread on privacy. Any decent activist should try ways of staying anonymous on the web and prevent being tracked by governments and corporations.General tips===* Use free software as much as you can.* Use GNU/Linux and keep it up-to-date, to be sure that you don't have unpatched security exploits* Don't use Flash Player, use youtube-dl instead for watching streaming videos online* Do not use Google, use DuckDuckGo or StartPage instead* Use a password manager like Keepass or for GNU/Linux users keepassx. Create new passwords for every site that you visit and use a strong password as a master password. A tip for easy remembering of your master password is to use a sentence. "i fucking love cookies and tits!" with extra capital characters etc. is easier to remember than some random characters and long enough to prevent brute force attacks of any kind.* Use the Tor Browser Bundle if you really want to stay anonymous.Firefox====* Go to Preferences -> History and set History to "Never remember history". * See for additional tweaks: https://github.com/amq/firefox-debloat and https://vikingvpn.com/cybersecurity-wiki/browser-security/guide-hardening-mozilla-firefox-for-privacy-and-securityAdd-ons-----------* Use uBlock Origin for preventing tracking etc. Bonus: use hard-mode to manually whitelist external domains on sites. Don't use uBlock but be sure to use uBlock Origin https://github.com/gorhill/uBlock/wiki/Blocking-mode:-hard-mode* HTTPS Everywhere* DecentralEyes: prevents CDN hosting from tracking you (Google for Jquery etc.)* Self Destructing Cookies: only allow cookies that you choose to allowOS==* Encrypt your hard drive or home partition at least* If you use GNU/Linux, you can try to restrict systemd or syslog from logging. * Use a distribution which takes security seriously. Also, be sure that you don't install a lot of things outside the repository. It will cover most of your needs.Real life tips===* Pay with cash if you canFeel free to provide tips to each other comrades!Japanese AI reconstructs thoughts based on brain activity
>“We have been studying methods to reconstruct or recreate an image a person is seeing just by looking at the person’s brain activity,” Kamitani, one of the scientists, tells CNBC Make It(…)“These neural networks or AI model can be used as a proxy for the hierarchical structure of the human brain,” Kamitani says.Linus swearing at antivaxxer
He's back.Electrical Engineering / Learning Hardware
I'm looking for recommendations on resources, learning materials, or general advice when it comes to learning about electrical engineering. Books, videos, MIT courses, you name it. I'm open to starting with the absolute basics from Physics 101, which I admittedly have not brushed up on in a while.Qubes OS
I use it daily and it's great. It never crashes on me and it's easy to use.PROGRAMMERS WANTED: SOCIAL MEDIA APP
https://github.com/ComradOrg/ComradWearable technology
I think it's moronic and doesn't have much practicality but might be used in a better way in a communist societyHardware Backdoors
Are there any laptops on the market without hardware backdoors like Intel Management Engine or AMD Platform Security Processor? There's a group working on building a Power ISA based laptop (since IBM made Power ISA open source in 2019.) This is the only modern hardware that I know of without a backdoor, but it's not in production yet. https://www.powerpc-notebook.org/faq/A half assed summary of computers and CS
Computers are machines that can perform a range of different tasks based of user input. Normally to achieve their main function they are composed of switches whom when turned on will perform a function and not when turned off that are connected through a series of wires connecting to each switch that transport electricity based off what the person wants the machine to turn on and off. We represent on and off states of computers using 1s and 0s.Google tells you what to search now too
>Be meChina’s Setting up a Hotline for Snitching on Cryptocurrency Miners
China can't stop winning.Cryptocointards are going after SSD and HDD now
https://www.storagenewsletter.com/2021/04/27/chia-driving-wild-storage-land-rush/functional programming
Functional programming was a craze.Buttcoin
I know, you're asking yourself already, how the fuck are crypto's compatible with a leftwing communist image-board? Well, first of all, fuck you, we live under capitalism and as such must exchange and purchase under the current mode of production we find ourselves under.Is OOP a meme?
I am currently going through my first OOP course in Uni and I can't shake of the feel that this is an overhyped meme. Sure, it is very useful in certain cases, say if you are making a video game or some other big project, but it just seems useless for day-to-day coding where you are just trying to execute a specialized instruction. I just don't encounter a situation where I would have that many different type of semi-related objects that it would warrant the use of family hierarchies and etc. Am I just too unexperianced with coding and miss something, or is OOP just not that amazing as its made out to be?Barron Samedit
https://blog.qualys.com/vulnerabilities-research/2021/01/26/cve-2021-3156-heap-based-buffer-overflow-in-sudo-baron-sameditWobbly: an app for 21st century workers’ power.
Wobbly is a workplace organising platform, being designed and prototyped by a small voluntary team of developers. It’s a communication and coordination tool, with structures and processes modelled on the IWW’s organising style (hence the name, coming from the IWW nickname). We’re creating a space for energetic, powerful, and democratic unions to win struggles, grow.Searx
I know that if I run my own instance of searx is the most private way to search things up. But what about public instances of searx like search.snopyta.org, are they any safer than just using pure duckduckgo? Because I am still trusting a 3 party with my data, the only other advantage that I see using a public instance of searx is that is completely open source. Are there any other positives?digital hygiene
I find myself drawn into obsessively wasting my time on the internet. i used to be more productive when i didnt have a smartphone but now, the itch of having distraction at my fingers every single minute of every day has tanked my attention span and drags my attention away whenever i do work.FUCK THESE THINGS
I HATE ANTI-DESIGN MAKING/bot/
Discussion of automated bots and scripts.Making free software and keeping it free
Spin off from >>7090Lawmakers call YouTube Kids a ‘wasteland of vapid’ content
https://apnews.com/article/susan-wojcicki-2dd9c3b6f6044950db817c1092a87296Tor hidden services
Know some good shit on Tor? Let us know. Whether it be substitutes for clearnet services, or just the .onion domain for whatever, or just something cool.Duckduckgoes Onion is now defunct.
Well apperently the retards at duckduckgo.com refused to update their v2 address in time for the new year, meaning, now their onion doesn't work. I'm quite upset by this. Anyone serious about privacy would have had to updated a long time ago. Are their any other search engines like duckduckgo with an onion domain?/darknetmarket/ general
Darknet markets are as close as it gets to a free market, where you can order drugs and have it delivered to you by mail. The purpose of this thread is to discuss opsec, ask for help and discuss markets in general. This thread should be fully legal as long as you don't solicit or facilitate illegal transactions, meaning:EU might pass regulation requiring replaceable/removable batteries in smartphones
https://www.digitaltrends.com/computing/eu-wants-iphones-replaceable-batteries-at-what-cost/SCOTUS likely to rule that APIs are copyrightable
https://arstechnica.com/tech-policy/2020/10/googles-supreme-court-faceoff-with-oracle-was-a-disaster-for-google/Gab leaks just dropped
The team at Distributed Denial of Secrets released a new leak today, 70GB of Gab posts. Check it out: https://ddosecrets.com/wiki/GabLeaksBrain to machine interface
What do you think about BMIs and relatively recent advancements by companies such as Neuralink? For those of you who don't know what BMIs are, it's a technology that implants electrodes from a chip inside your brain to read neurological activity and possibly send electric signals to your brain in an attempt to interface with computers.Why didn't imageboards use a framework?
VIchan was forked from tinyboard, the earliest commits I can find from it are from 2011 or 2012. Laravel's first release was in 2011, Codeigniter was in 2006, Symfony came out in '05, Zend came out in '06, CakePHP in '05.Open IB API
Some anon here earlier was talking about making a standard API for chans/imageboards?