Catalog of /t/


Max message length: 8001


Max file size: 32.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more


(used to delete files and postings)


Remember to follow the Rules

The backup domain is located at .cc is a third fallback. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 2.0.

The server will be undergoing defense system testing Sunday and Monday. Expect brief outages or errors.
(Estamos probando la defensa contra el tercer género en el servidor el domingo y el lunes. Por favor, perdone cualquier interrupción.) is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.


R: 0 / I: 0 / P: 1

/t/ - Technology

Welcome to /tech/ - ∞chan's technology board. Please check the rules before you post: Looking for hardware or software recommendations? Check out the InstallGentoo Wiki: /tech/ is for the discussion of technology and related topics. /tech/ is NOT your personal tech support team or personal consumer review site. We have stickies for that. Keep those kinds of posts in there. For tech support, software recommendations, and other questions that don't warrant their own thread, please use the '/tech/ Questions and Support' sticky. For consumer advice, please use the consumer advice sticky located below. For tech support/issues with computers: or (i.e., fucking Google it) If you can't find what you're looking for and still need help, post in the tech questions sticky. Looking to switch over to GNU/Linux? Don't know where to start? You can search the catalog for a specific term by using: Always check the catalog before creating a thread. To use the Code tag, book-end your body of code with: [code] and [​/code] This is a SFW board; however, NSFW (Nudity, gore, etc.) material may be uploaded so long as it is spoilered. If you are browsing at work or similar, assume spoilered images are not safe for work. If you see any posts that break the rules, please report them. Thanks!

R: 2120 / I: 479 / P: 1

/t/ech Questions and Support

Bring all your hardware, software and other troubles here.

R: 591 / I: 162 / P: 1

Consumer Advice

Looking to buy something but aren't sure what to get? Ask here.

R: 39 / I: 1 / P: 1

In the market for a new laptop. Privacy-wise, is there any benefit to going with AMD intead of Intel? I know Intel's (((Management Engine))) is cancer, but is AMD's version any better?

R: 81 / I: 7 / P: 1

Hydrus Network General #5

This is a thread for releases, bug reports, and other discussion for the hydrus network software. The hydrus network client is an application written for Anon and other internet-fluent media nerds who have large image/swf/webm collections. It browses with tags instead of folders, a little like a booru on your desktop. Advanced users can share tags and files anonymously through custom servers that any user may run. Everything is free, privacy is the first concern, and the source code is included with the release. Releases are available for Windows, Linux, and macOS. I am the hydrus developer. I am continually working on the software and try to put out a new release every Wednesday by 8pm EST. Past hydrus imageboard discussion, and these generals as they hit the post limit, are being archived at >>>/hydrus/ . If you would like to learn more, please check out the extensive help and getting started guide here:

R: 0 / I: 0 / P: 1

Free VPSes from IRC (TLS) #vmbot

R: 62 / I: 19 / P: 1

Operation Download And Conquer

Given how majority of the internet's audio and video services are provided by Google, thanks to Youtube, the purpose of this operation is to loosen the death-grip that has taken hold. This process will only require that you have a steady internet connection and (Advisably) 100 GB of free space. Here is the process: Step 1 Download the latest versions of FFMpeg and Youtube-DL, and put all the programs into the same folder: Step 2 Create an account to any video sites that you wish to distribute videos on. Here are some of the more well-known alternatives, as well as some recommended sites: AfreecaTV: Bitchute: BitTube: Dailymotion: LBRY: NicoNico: Rumble: Veoh: VidLii: Vimeo: When signing up, if you do not want to use your personal email, you can create a temporary one using any one of the numerous “10 minute email” websites, (If you have a referral link), or you can create your own email address: Also, make sure that you fulfill whatever silly verification demands the site has so that you can upload videos without any issues Step 3 Hold “Shift” and right-click in an empty part of the folder and select “Open command window here”. Afterwards, you can download Youtube videos through one of the two following methods. First method is if you just want to repost videos and nothing more. All you have to put in the command youtube-dl URL and replace the “URL” with the actual link of the Youtube video, playlist, or channel that you want to download. Doing this will result in all the videos being downloaded, in the best quality possible, to the folder and nothing more. The second method is for those looking to repost videos in a more complete format. In the command line, instead of just the previously listed command, you copy and paste the following command: LOGFILE="$PWD/logs/$(date +"%Y-%m-%d-%H-%M-%S.%N").log" exec 3>&1 4>&2 >>$LOGFILE 2>&1 youtube-dl --verbose --ignore-errors --no-continue --no-overwrites --keep-video --no-post-overwrites --download-archive archive.txt --write-description --write-info-json --write-annotations --write-thumbnail --all-subs --output "%(uploader)s-(%(uploader_id)s)/%(upload_date)s-%(title)s/%(upload_date)s-%(title)s-%(id)s.%(ext)s" -f bestvideo[ext=mp4]+bestaudio[ext=m4a] -- $1 After doing so, replace the “$1” section of the final command line with the URL of the Youtube video, playlist, or channel that you want to download. The big difference here is that it will result in Youtube-dl creating an archive of videos already downloaded (To prevent downloading the same video repeatedly), all the videos and their files will be downloaded to their own individual folders, and videos will only be downloaded in the best quality that is available (Instead of the best quality possible). Make sure that the video downloaded by inputting the download command 3-5 times. Sometimes videos disconnect midway through, so you may need to perform this process several times, especially for longer videos. For videos hidden behind an age-gate restriction, there are two ways to bypass this. The first option is to use yt-dlp: It's the same program as Youtube-dl, except it has some QoL changes made to it. HOWEVER, do not use it as a replacement as it doesn't download most regular videos in their entirety for some reason. For the second option, what you do is that you log into your Youtube account and go to a video. Then you can either dump your browser's cookies to the same same folder as the previously downloaded programs, add --cookies FILE after “youtube-dl” and before the rest of the command, and change the word “FILE” to the actual cookies file that you put into the folder; ORyou can open the developer tab in your browser, copy the cookies requested by Youtube, and proceed to make your own cookies file: If you download too many video in a short time, you may encounter a “HTTP Error 429: Too Many Requests” message that blocks your access. This can be bypassed by either filling out the Captcha on the Youtube website and dumping the cookies file afterwards or changing your IP address. Step 4 Despite either method mentioned previously, sometimes there are leftover files that are trash. To delete this trash, search for and delete all “.part” files, audio files, and “.fXXX” video files found in the download folder. The “.part” files are videos that were unable to be fully downloaded for whatever reason and should be reattempted at a later date or downloaded through another method. The audio files and the “.fXXX” video files are just the individual audio and video for each Youtube video. They should automatically be deleted despite either method used, but verify just in case. Step 5 Just re-upload the videos on all of the sites you made an account for. Also, it is advised that all uploaded videos should have this disclaimer in the description: “I did/do not create, publish, nor own the original video.” If you're doing a more thorough upload, here's a breakdown of the files in the video folder. The “.description” files contain all the text from the video's description, and can be opened in Notepad. The image located in the folder is the Youtube thumbnail. The “.json” file is the video's configuration file for annotations. The “.m4a” file is just the video's audio file and should be deleted. The “.mp4” file is the actual video itself; if there are two “.mp4” files, delete the one ending in “.fXXX” as that's just the original video file without any audio. The “.vtt” file(s) is the official subtitles attached to the video. Questions >Why are some video sites with known issues recommended? Because a bigger issue than all of those sites is the fact that Youtube has an artificial monopoly on the video-hosting market. And, a lot of these websites are just following their model and practices because they see it as successful and are not trying to compete. However, as is the goal of this operation, we will begin to see some sites altering their business practices to better complete as their presence increases. >What videos should I be uploading? Advisably, just the videos you like to watch and rewatch. If you cannot think of what videos you should download, just sit back and think about the content you normally search for or listen to on Youtube, and repost that. The point is to just download and repost whatever is relevant to what you watch. Also, make sure that you're not flooding sites with 20 copies of the same video, so do a search on the sites before you upload to them. >What can a small amount of nobodies on the internet accomplish? If 10 anons were to download and upload 10 videos for 10 days straight, that would result in 1000 videos being distributed across other sites in under two weeks. You don't need a large group of people to cause a sudden and dramatic shift. All that's needed is just small steps taken one at a time, that compound into an avalanche. >This isn't going to change anything as people are just going to fall back into their old habits. I appreciate your criticism and advise that you go and rent a movie or game from Blockbuster or Hollywood Video.

R: 8 / I: 1 / P: 1

Stable Diffusion

Now that even the normies have heard of Stable Diffusion, it's time for us to talk about our thoughts on this thing.

R: 41 / I: 7 / P: 1

DWeb board

How hard would it be to make a functioning imageboard (or textboard) using IPFS and OrbitDB/GUN, or Hypercore/Dat? It would be immune to deplatforming by hosting providers (and DNS providers depending on how it's addressed). / (formally There's two chans on zeronet but you have to make an ID to use them

R: 27 / I: 6 / P: 1

Password Managers

Ok it's time to get a password manager. It has to be open source, free and without any cloud crap because I trust nobody. Which PM do you anons use? Which KeepAss is better? There's the OG, X and XC now. Is there any way to extend my PM to android manually without any company getting their hands on my database? Let's discuss.

R: 3 / I: 0 / P: 1

pci_disable_device unknown parameter error

GRUB boot commands works when I type pci=disable_acs_redir=pci:12D8:2308 in linux pci module. When I type pci=pci_disable_device=pci:12D8:2308 to disable the hardware, it gives unknown parameter error. what is the reason of this ?

R: 1 / I: 1 / P: 1

Advanced Untraceable Hidden Camera System

If you were to build a hidden camera system, how would you go about it? I want to build such a system but don't have the skills to put it all together. I do have a few specs in mind and would enjoy your input on how to make it a reality. In terms of applications of such a device... Think the worst case scenario's with the highest level of deniability and near impossible traceability. Even if the device were discovered, stored files would be inaccessible, upstream intermediaries and hosts would be impossible to access. This device can be used as a trail cam, nanny cam, or secondary security cam. This can also be used for spying, like a corporate espionage cam, bathroom/dorm room cam, hotel/airbnb cam, etc. The use, whether for good or evil, is left to the user. The main point is that if properly constructed and properly installed, it would be extremely difficult to detect and likewise to determine who installed it and where it uploaded to. * Camera separate from main system to allow for flexibility in mounting * Camera should be 'pinhole' type to avoid detection (0.5 mm or smaller) * Camera should provide crisp image (highest quality possible given size limitations) * Control unit OS should be open source * Control unit file system must be sufficient to temporarily store recorded media until transferred and verified * Control unit file system should be encrypted * Image and video files should be individually encrypted on device * Media is stored only until transferred and transfer verified * Media is transferred off to secured site, preferably a file drop site over Tor or I2P (the latter preferred, due to file volumes) * Device has internal power with medium to high capacity battery backup * Device has external power input, preferably 5v/2a max requirement (common USB-based mobile device chargers) * Recording is triggered by motion to save on space; continuous recording is not required * Recording loop of previous X seconds and/or a photo per second of 'untriggered' media that is overwritten. * Recording should include ability for audio input; audio input can trigger recording * Device can use WiFi or 4g/5g WAN-based networks for connectivity * Device (optional) can use non-standard WiFi or NFC-type device to connect to a secondary device for network connectivity. * Overall, function of the device should be customizable. For instance, turning encryption on or off, modifying trigger levels for video or audio events, etc. * Device has a limited self-destruct. Something like a motion sensor that would route stored power from the battery or from a capacitor through key parts of the device. * Device tamper trigger, when activated, would result in a short message or file upload indicating same before self-destruct completed. Most recent media, if possible, would be uploaded to show what triggered self-destruct. * Remote access of device is possible, but would require several layers of strong security to prevent unauthorized access. * If enough units deployed and monitored, ability to have remote monitoring station (such as a hidden host on TOR to keep basic health records on devices) * Other options as may come up in this discussion ...

R: 3 / I: 1 / P: 1

Almost every normalfaggot internet service requiring working, hard to change, much more personally identifiable than plain IP address, phone number to register. And to periodically provide as "random checks" to keep working and not lock you out of your data without prior warning is normal and widely accepted business practice in Muttland as of 2020's. Requiring ID card or SSN to register for such services would be literal commiefascism and would never fly in Muttland, normalfags in revolt. How did it get this absurdly cucked in Land of the Free.

R: 2 / I: 0 / P: 1

Use electron beam physics to make your own 3D Metal Printer. Support this open source project

Hello! My name is Agustin Cruz. I'm making a 3D Metal Printer for making parts with titanium and other metals. Is a low cost, Open source project, so everyone can make their own 3D Metal Printer. This project have an extreme affinity in philosophy with Monero and would not be possible without your help. Making 3D printers affordable can help decentralize production of various mass produced items. The goal is to make 3D Metal Printing more affordable to the general public, hospitals, small institutions, organizations and companies around the world. Specifically for developing and low income countries. This project fills a gap that no open hardware successfully fills. 3D Metal Printing is an impactful tool. Making it more accessible will democratize science, engineering and empower people. This low-cost hardware will be able to accelerate innovations in and lower barriers to scientific research. This printer uses an electron beam to selectively melt each layer of metal powder, causing the powder particles to fuse together. After one layer is complete, the build platform is moved down one layer in height. The re-coater comes in again with a fresh layer of powder, and the electron beam starts to induce the fusion of powder particles, causing the new layer to form. This process is repeated until the entire part is finished, making a solid metal part. This is what I do fulltime. Doing all this takes a lot of time and effort. Now the project is opening to the community inside a crowdfunding model. The design, tests, updates, will be shared so I can receive some support and continue working 100% in this project I made a Patreon, if you want to support my work: I also created a Bitcoin and Monero address. They are also in the Patreon site. Bitcoin Address: bc1qh2zlse6nm8rtqkcvxx32jxea0jc2akp4pvw93y Monero Address: 44amLuHZzV49nkLj6Ahh5UXA7NTrYTUB5d6bKokbypd6FvNQw5x91UZ8PCEm3Tc44u1FfnPzuChfFF4hG97DQVpfBekmJHp

R: 76 / I: 13 / P: 1

The Pinephone

>what is the Pinephone It's an open hardware phone that runs specialized Linux distros with touch friendly DEs, you can also just install arch and dwm on it if you're insane. >muh privacy The phone has hardware switches that allow you to physically disconnect privacy infringing peripherals. >muh repairability Pine64 sells all spare parts for the phone, display module is 30$ for example. Battery is the same as a Samsung j700 and extremely cheap. >muh touch screen Pine64 is developing two keyboard cases. One is a clamshell PDA style, and the other is a slide out kb like the n900. They integrate directly into the phone since they will replace the backplate. >muh peripherals It has a 3.5mm headphone jack, which doubles as a UART port. It also has a set of pogo pins on the back that exposes an I2C bus. Charging is done through USB-C which also doubles as display out and OTG. >muh shady company Pin64 is not a company as such. It's a community run project where an entrepreneur from HK supplies hardware, and the community gets to buy it at very low cost and do whatever they want. They donate much of their earnings to open source projects, and use the rest to develop new devices. >full specs and more info >wiki >schematics >store: currently selling the ubports community edition, where pine donates 10$ to ubports foundation per sale.

R: 11 / I: 0 / P: 1

i hate xiaomi so much bros

>xiaomi says that you can unlock bootloader with their tool >make xiaomi account and do all the stuff you must do to unlock device >download windows because the tool is only available in windows >device not getting recognized >connect xiaomi device with 3 different pcs (win 10 and 11) and download a bunch of drivers >still nothing >a guy in a forum says that you must do it in win 7 and it will work for sure >download win 7 >install win 7 in my pc >wont boot at all >it was my only usb so now i must go to a friends house to download linux iso >chink goverment got all my data. location, number, etc. I HATE XIAOMI AND CHINAS GOVERMENT COCKSUCKING YELLOW NIGGERS. NEVER BUYING CHINKSHIT AGAIN!!!!!!

R: 2 / I: 0 / P: 2

hent-AI oopsie

Crosspost from GG >Detecting hentai censors with deep learning and computer vision, decensoring tool. Now this is where it gets really interesting, we head to the Contributors page and we see <Contributors >Waleed Abdulla (waleedka ) >Engineering Manager of Computer Vision and Machine Learning at Apple. >Phil Ferriere (philferriere ) >Former Cruise Senior Software/Research Engineer and Microsoft Tech/Development Lead passionate about Deep Learning with a focus on Computer Vision. (Contributors) (Ferriere's commits) (Waleed's commits) Would really suck if the public image of Apple or Microsoft was damaged by this embarrassing revelation.

R: 0 / I: 0 / P: 2

Kik and similar over TOR?

How would one go about setting up a machine to talk on Kik over TOR without compromising anonymity? I'm sure others would be curious about Telegram and similar chat apps. Simply put, with all the surveillance capitalism and in particular, data hoarding practices by China and other threat actors, how does one reduce ones risk profile while still being able to enjoy their time online?

R: 12 / I: 0 / P: 2

Connect to Tor

What is the safest way to connect to the Tor-Network? Is this the safest possible way: Tails (VM) -> VPN -> Bridge -> Tor-Network

R: 3 / I: 1 / P: 2

The "hardware antivirus"

Antivirus and cyber security systems used for computers are software-based. Today, cyber espionage can be done not only with codes and programs, but also on hardware. It is possible to spy directly on the hardware, bypassing the operating system and antivirus by loading harmful codes into the firmware on the chips of the hardware. While it is possible to clean the malicious rootkits infecting the UEFI / BIOS firmware and Harddisk firmware of the computer by reinstalling the original firmware of the hardware manufacturer, the firmware of the chips in the other hardware of the computer (keyboard, mouse, mouse, usb controller, camera, microphone, video card, PCI slots and other hardware) It is not possible for ordinary people to detect and clean rootkits infected with the rootkit. For this reason, a special operating system or special system software is required to detect rootkits that infect the firmware of chips in other hardware. This system and operating system can detect by examining the signals given by other hardware to the system and by examining the operation of the firmware on the hardware chip, if possible, by examining its digital signature. You can claim that the Sniffer and Monitor programs on the market can do this function. But these programs can examine as much as the operating system they are running gives them. Therefore, a different system or operating system is required in this regard. Apart from this, "hardware antivirus" can be developed as an alternative to software antivirus and software cyber security systems. Security software is usually installed on the operating system, the operating system kernel and, if necessary, the motherboard bios/uefi section. Alternatively, a "hardware antivirus" with a different motherboard and processor can be placed inside the existing computer case, regardless of the computer used. The difference of this "hardware antivirus" from IDS, IPS and External Firewalls is that it can directly connect to the computer's memory, hard disk and network paths with a physical cable or implant, and physically control the computer system, ensuring the security of the computer regardless of the current operating system and motherboard. This "hardware antivirus" can physically monitor the computer's input and output ports, stopping hard-to-detect BadUSB and NSA ANT tool attacks.

R: 23 / I: 10 / P: 2

Prophet Terry A. Davis

>After a delicious breakfast, you go to your cozy room and you sit down on your bed to boot up your favorite linux distro on your Thinkpad laptop. >Feeling kinda tired, you close your eyes for one second. However, when you open them again you suddenly find yourself in the middle of a busy street in rush hour. The people walking right past you seem too busy to care. They all strangely feel like NPCs from videogames. All but one. A strange grey-haired man with sunglasses walks straight towards you and offers you a bible. >"come with me if you want to code with God" ... >"The Unix is an operating system, Anon. That system is our enemy. When you’re inside, you look around. What do you see? MIT niggers, Shit Programmers, Linux Fans, Atheists. The very minds of the people we are trying to Enlighten. But until we do, these niggers are still a part of that system, and that makes them our enemy. You have to understand, most of these people are not ready to hear God. And many of them are so inured, so hopelessly dependent on the system that they will fight to protect it. Were you listening to me, Anon, or were you looking at the blackest retard gorilla nigger? (You) : I was… >"Look again. Freeze it." (You) : This…this isn’t the Unix? >"No. It’s another operating system I built. I was choosen by God to make this system his temple and I was given divine intellect. It is called TempleOS. Its training program is designed to teach you one thing. If you are not one of us, you are one of them. (You) : What are they?" >"CIA niggers. They don’t believe in God and can glow in the dark. Anyone that does is potentially an agent. They are everyone and they are no one. I have survived by running them over, you can see them when you’re driving. They are programming shit code everywhere, which means that sooner or later, someone is going to have to fight them." (You) : Someone ? >"I won’t lie in front of God, Anon. Every single man or woman who has ever programmed, Everyone who has wrote a line of code, they are all shit. But where they have failed, you will succeed." (You) : Why? >"I’ve seen MIT niggers that don’t understand what a single address map is. Their mind is crunched into a narrow blinder by the CIA and they can only imagine the Unix address map. Because of that, they will never be as smart or as divine as you can be." (You) : What are you trying to tell me, that I can build an entire OS and compiler? >"No Anon. I’m trying to tell you, that you too can be the smartest programmer who ever lived."

R: 33 / I: 11 / P: 2

Buyers remorse

Holy shit this is slow. I never tried a "green" hard drive before and this is the last time I ever waste my time on these pieces of shit. Ever bought something only to regret it the very moment you started using it? If so what was it?

R: 1 / I: 0 / P: 2

Linux Terminal Emulator Recommendation

Any good terminal emulators ?

R: 0 / I: 0 / P: 2


Does anyone know i can make money on the internet using programming? I don’t care if its dishonest

R: 0 / I: 0 / P: 2

Re; Hack Job Proven Valuable;

I thought I replied (Gennady) but I'm so damn busy I'm pretty much posting on the fly… I resorted to leaving my Partner after years of trying to make our relationship work. I didn’t tell him I was leaving till the day I served the divorce papers because I was afraid of what he might do to me. So he didn’t have time to discredit me before I left, but he sure did after. Told everyone who would listen what an awful person I was for leaving him after all he had done for me. It’s so hard to get through it when you’re already vulnerable and have no self confidence because of their abuse likewise extra marital affairs. I’ve received several phone calls from his family since saying that my ex has cut them all out. Not spoken to any of his family at all. This is because they knew both he and I. They called him out for his behaviors and he didn’t like that. At least I feel validated that others saw the real him too, coupled with evidences from his affair with colleagues at work. Like Achraf Aziz, I had earlier in February got in touch with cybilltritech to gain remote access to his device, His solutions made me think and help me to get my head on straight! Ref; cybilltritech AT protonmail DOT com Yes...yes really a polymath and requires you give him more encouragement. Ref;Impala

R: 9 / I: 0 / P: 2


Arch is great! Arch has archinstall! Arch was great!

R: 0 / I: 0 / P: 2

Antivirus and security software should use a second video card modulated for them.

Antivirus and security software should use a second video card modulated for them. If security software uses a second video card that is modular for them, it does not overwhelm the existing system. This makes the computer run faster.

R: 36 / I: 5 / P: 2

Flatpak and Friends

What's your opinion on the concept of these newfangled package managers having sandboxing, enabling backwards compatibility and having a one-build-fits-all-distros mentality? Is it bloat, or the right way to go about solving such problems? Personally, I use Flatpak to handle games, so my system doesn't actually have any 32 bit libraries installed by my distro's package manager, anything 32 bit's managed entirely by Flatpak, separate from everything else. As well as isolating propietary software, since most games are, and Steam too. Since I don't use programs with Qt 5 much, I've decided to get rid of the ones I've installed natively and installed the ones I do need on Flatpak, that way I can get rid of Qt 5 as well.

R: 14 / I: 0 / P: 2


>Linux is too hard to use! >gotta use the terminal for everything!! >Making an offline windows account is easy! >you just gotta open the registry editor..

R: 17 / I: 3 / P: 2


>A desktop system for creators that focuses on simplicity, elegance, and usability. >Following the published Human Interface Guidelines, and First Principles of Interaction Design liberally re-interpreted for today. >For mere mortals. Welcoming to switchers from macOS. Not just a theme. Not a clone of anything, but something with which the long-time Mac user should feel instantly comfortable. The latest technologies, without the complexities of Linux distributions. Without lockdown. Without Big Brother. The user in full control. >Based on FreeBSD. Wouldn't it be hilarious if we got the year of the BSD desktop before Linux?

R: 255 / I: 67 / P: 2

Programming Thread: Up and Running Edition

Hey Anon, Learn to Code! There's a bunch of free resources for learning to program. Come here to ask for advice or to discuss current projects. Download the complete Gentooman's Library: Visit MIT OpenCourseware on (((YouTube))) Or take one of these free online courses being offered by universities right now:

R: 4 / I: 0 / P: 3

/smg/ - software minimalism general

For discussing software minimalism. >What is computing minimalism? >Why is software minimalism good? - Fewer bugs - Better performance - Lower memory footprint - Better maintainability - Higher scalability - Longer software lifetime - Smaller attack surface >Who hates software minimalism? - Script kiddies (Muh Kali Linux) - Normies (Your local tinder slut or Chad) - Glowniggers (Take the vax, goyslop) - Corporate Programmers (FAANG diversity hires & pajeets) >Website development >List of minimal OSes and distros - OpenBSD - Gentoo Linux - Alpine Linux - Temple OS >Useful links

R: 2 / I: 0 / P: 3

Selling Password Database

I have a huge company password database on a KeePass file to sell, with hundred of access to databases, firewall, switches and so on from companies located in Brazil. Sample pic posted To clarify, I am not looking to hire hackers, I am selling the password database to whoever is interested. If you are interested or can refer to anyone, please contact on:

R: 9 / I: 2 / P: 3

Defeating Microwave Weapons

Ptychographic X-ray laminography: No trade secret or hardware trojan can hide Every cell transmitter, phone and computer must be inspected. Silicon Trojans must perish. Freedom for all is encroached when a few cyber terrorists can freely CONSPIRE to use microwave weapons and silicon trojans. While you are distracted with THEORY, they spread the PRACTICE: surveillance, theft, sabotage and murder. Havana Syndrome is the result of hacked cell transmitters being used as a microwave weapon. Civilians are victimized daily, children included. “Havana Syndrome: Are You Next? Electromagnetic Terrorism and Cognitive Warfare” at "". The future of privacy/security is clothing made of metallized fabric to block microwave imaging (enables theft of inner speech by observing minuscule throat/face muscle movements) and block directed energy attacks. #BadBIOS #Havana Syndrome #Conspiracy Practice #Freedom #Faraday Cage #Firmware Vulnerability #Electromagnetic Surveillance >Eric Schmidt: Our report says that it’s really important for us to find a way to maintain two generations of semiconductor leadership ahead of China. China has had over 30 years to plan to try to catch up. It’s really difficult. >Eric Schmidt: We don’t want them to catch up. We want to stay ahead. This is important, by the way, for our commercial industry as well as for national security for obvious reasons. By the way, chips, I’m not just referring to CPU chips, there’s a whole new generation, I’ll give you an example, of sensor chips that sense things. It’s really important that those be built in America. What are the chips that “sense things” that Schmidt wants to prevent from being available to any other country? Since the 1980s, Silicon Valley has used semiconductor radars to collect data about what you think (your inner speech) by means of machine learning with data extract from wireless imaging of your face and body. It has proved very convenient for them, as this enables blackmail, extortion, theft, sabotage and murder like nothing else. They can do this because they design the semiconductor used on your phone, computer, TV, car and for your telecom supplier’s network equipment, which makes possible to embed silicon trojans everywhere. Don’t underestimate what machine learning can do. e.g. Study shows AI can identify self-reported race from medical images that contain no indications of race detectable by human experts. Also, don’t underestimate the number of people Silicon Valley is willing to kill to maintain a monopoly, as you may be the next victim. “Protesters turn to tinfoil hats as increasing sickness blamed on Gov beaming radiation rays” Prompted by this, someone made the video “Defeating Microwave Weapons!” about how microwaves work and how to defend against this kind of weaponry. Blame Silicon Valley for inserting "Silicon Trojans" and "Defeat Devices" in microwave cell transmitters and processors, enabling them to be used as weapon (SDR phased array with beam steering). The "Electromagnetic Emissions Scandal" shall be bigger than the "Diesel Emissions Scandal" and the fines shall be paid in something more expensive than money. Your priority is to make a shielded room to defend yourself, then make portable shields for when global riots start to end this all. For every cell transmitter on your location, you need to add one more layer of shielding. Make it thick. Consult to see how many cells are around you. For more:

R: 5 / I: 0 / P: 3

Monitor Problems

The Monitor of my PC does not turn on, the PC does turn on but it cannot read the Monitor, I already checked the RAM memories, cleaned the CPU (processor), changed the HDMI cable for another, I also used another Monitor and still the PC does not read What would be the problem? Can you help me please

R: 6 / I: 0 / P: 3

How do I clean the ePubs and PDFs I've downloaded on Deep Web?

I've just discovered the imperial library and have been downloading some books, but Tor itself says I should only open those files when offline. Is there anyway to "clean" the files, so I don't end up giving my data away?

R: 9 / I: 0 / P: 3


Why did Zeronet never take off?

R: 7 / I: 1 / P: 3

Take precautions against secret usb implants

I am using Linux operating system. My computer is not connected to the internet , I formatted it and changed the bios firmware and hard disk firmware. However, the program opens by itself, the mouse cursor moves by itself, and sometimes the system's default audio service is turned off. When I examine it with the Wireshark program, an interrupt signal comes from the usb ports, even though there is no device plugged into the usb ports. The interrupt signal comes from linux's default idle hardware. I have a hidden implant in my computer that looks like the NSA ANT COTTONMOUTH tool. Wireshark logs This hidden usb implant can easily bypass all antivirus and security software by introducing itself as a hidden system process by overflowing the kernel, regardless of linux or windows operating system, during computer startup. On computers that cannot exceed the kernel security, it introduces itself as a different hardware and takes over the control of the system via memory buffer overflow by overloading the interrupt. No antivirus and security software can detect this situation. This hidden usb implant is not simple usb keyboard like ruber ducky and usb ninja. For this reason, do not recommend simple and useless scripts such as "usb guard". This implant is an advanced usb spying implant similar to NSA COTTONMOUTH. My request from the linux community is to develop a security module for the linux operating system against hidden usb implants.

R: 4 / I: 1 / P: 3

I am definitely very excited for windows 10, why am I still recommended to use debian and windows 10 is the only one that has game support, I like to play games and the problem with linux is that it just doesn't run or else it runs more with a lot of workarounds but what the hell. Absolutely thinking I could be a hacker but I can't, I hope you guys can help me with this with magic, I really believe in the damn multiverse and I even talked to my other self in high school. Maybe I am Schizo

R: 2 / I: 0 / P: 3

so e-hentai is blocked in russia, but exhentai is not? how the fuck do you block child site but not the parent site? did SHE really get filtered by fucking COOKIES? i cant take this censorship bureau seriously if that's really case. it's laughable if true

R: 4 / I: 1 / P: 3

Master Thesis

I need ideas for my Master Thesis in Computer Engineering anons I'm open to pretty much everything, as my degree doesn't have a specialization per say However, AI, Data Science, Networking and Cybersecurity don't captivate me that much

R: 17 / I: 6 / P: 3

Lithium Ion Batteries

I fucking have lithium ion batteries so fucking much. Every god damn device on the fucking planet now has some stupid fucking soldered in lithium ion battery instead of just letting me slot in my own batteries. So now whenever I buy something as stupid as fucking small electric screwdriver I have to account for the fact that when I leave it on the shelf for a couple years and pick the thing up the cheap chink shit battery inside it will have killed itself and made the thing fucking useless. I can't even count the number of times I've picked up an electronic device with one of these useless fucking things inside them only to discover it died and is now a fucking paperweight unless I go onto ebay and comb through a bunch of shitty batteries to find the bizarre form factor they used in that specific device only to have to fucking rip the entire thing down and solder in an entirely new battery to use a basic fucking electronic. Why the fuck can't retards just let me use replaceable standardize batteries in devices. I DON'T WANT TO RECHARGE MY SHIT WITH A USB CABLE JUST LET ME PUT BATTERIES INTO THE FUCKING DEVICES.

R: 7 / I: 1 / P: 3

There is no such thing as Ukrainian hackers.

There is no such thing as Ukrainian hackers. These so-called Ukrainian hackers are agents of the USA, England and Israel. Cyber attacks are constantly being carried out against Russia.These attacks are said to be made by these so-called "ukrainian hackers". In reality, there is no cyber attack on Russia. Attacks on Russian systems are not made over tcp/ip and udp networks. The main source of attacks on Russia are crypto-Jews living in Russia who have embedded the NSA's Cottonmouth and Bulldozer hardware into Russian computer systems. These equipments are managed remotely via radio signals, not internet network. Attacks on Russia are not cyber attacks but electronic signal attacks

R: 2 / I: 0 / P: 3

How do I get/use malware?

How do you get malware for personal use. Such as a trojen virus to install on a pc.

R: 0 / I: 0 / P: 3

Anonymous SSH chat

Anyone interested to have old school hacker chat anonymously? And I really mean it, truly anonymously. Anonymous deep webs chat using SSH, that's right, no web / js soykaf. ysdr3c3j7odl3p2zu5vdyaphf5x65l4hc3i2hmuy4vx4svibnxonvsqd on the onion network and port is 1337 protocol SSH as mentioned earlier.

R: 3 / I: 0 / P: 3

Spurious native interrupt

When my computer is not connected to the internet, even though I formatted, changed the bios software and changed the hard disk firmware, the program opens by itself and the mouse cursor moves by itself. When I examine with the Wireshark program, an interrupt signal comes from the usb ports even though the device is not plugged into the usb ports. In this case, I am complaining. Logs are attached.

R: 17 / I: 0 / P: 3

Oy vey, throw out your accessories, it's the future! >USB-C connectors mandated >USB 2.0 backwards compatibility minimum (your 1.1 keyboard is now moot) >b-but now you can tunnel PCI-Express Jesus Christ, even Micro$oft gives somewhat of a fuck about backwards compatibility. Do they really think that we'll send a fuckton of hardware right to trash, just because they feel like changing the connector?

R: 0 / I: 0 / P: 4

Files in other files

(You) may remember the old method of embedding .rar files into images and posting them on 4chan. It became ineffective once they began checking for embedded files. However, it seems like there are ways to do it much more stealthily. It could be very simple to use a similar technique for arbitrary binary data from any file. And perhaps the host would respond by checking for coherent files within the image, but with a non-trivial steganographic method, say one that depends on a password or seed to map the encoded pixel locations, it could be very hard to detect. Any thoughts?

R: 2 / I: 0 / P: 4

Hello, here's a one time advertisement for a new search engine. Do not expect me to advertise this a second time, write down the website address if you want to find it again. The search engine is free to use but additionally you may purchase complete search results in .txt documents. There is additional features planned for this search engine. You may use this search engine currently to explore a very weird internet.

R: 16 / I: 1 / P: 4

>can't post on 4chan using TOR because 'muh CP!!!!' >can't use vpns to evade ban cus 'muh abuse!!!!!!' >can't use 4chan pass with mobile clients without risking ban cus 'mah cool desktop design!!!!!!!!!!!!!!' >can do all those things on TOR/privacy compatible *chan's and there's way less CP and abuse What did moot mean by this?

R: 101 / I: 50 / P: 4

Let's Learn C Together, Imageboard Style

So I'm recently getting back into writing code again after a multi-year break. I used to be pretty proficient at BASIC and Visual Basic, BASH scripting, and I dabbled in Perl and PHP. Recently I've decided I want to learn C and git gud at it, but going through lessons and tutorials alone is boring when you have no feedback. There's already a dedicated programming thread, but I think there's enough here to warrant a standalone thread where we go through things together. We'll be using two resources. >C: How to Program - an in-depth textbook >The C Programming Language - long considered the beginner's bible for C >Why bother with C when C++ is a thing? C++ is basically object-oriented C, or C with classes. While C++ is a very useful language C is often more immediately applicable to simple, no-bullshit programs that do useful things. C is simpler, with less weeds to get lost in and is thus quicker to learn. And if you are good at C, then it's just a short hop to learning C++. We learn C to walk before we run. Since I'm a newbie too I'll post useful things I learn and code examples I write ITT for anons to play with, and explain the things I learn both for your benefit and to help me remember them better. If you want to join me, start off by reading The C Programming Language cover-to-cover. If something seems confusing, cross reference it in C: How to Program for a different perspective. Here we go.

R: 0 / I: 0 / P: 4

/tech/ shows and podcasts?

Any kino /t/ recommendations?

R: 5 / I: 0 / P: 4

Wazup my wiggas learn computer science

List of books to teach yourself computer science Just pirate the books from zlibrary

R: 5 / I: 0 / P: 4

Using Secure Passwords - Tips and Tricks

You know the old sayings when it comes to password security. >Never use the same password twice >Choose hard passwords that use numbers, symbols, caps and lowercase >Never write down or store passwords in a way that could be compromised >Change passwords semi-regularly >Never reuse an old password These are great ideas from a technical standpoint, but they completely and totally ignore the human factor. A hard password is difficult to remember, let alone when you have ten of them for ten different sites. Without writing them down somewhere you're likely to forget them, and even more likely to forget the ones you change frequently. This sucks, so I'm going to share a couple tips and tricks I use for making and remembering secure passwords. These two tricks are Passphrases and Catches. >Passphrases A passphrase is like a password but it much easier to structure and remember. It can be any line or quote that is memorable to you for some reason, which you then modify in a rememberable way to make more secure. Let me show you some examples. Starting with a simple phrase like "the quick brown fox" from the famous example of "using every letter in the alphabet", you could easily make this into a very memorable, hard to break passphrase. The addition of one symbol in a particular spot, and capitalizing each word in the phrase other than the first, is a simple adjustment. As a rule, don't always capitalize the first letter of your password, and don't always put your symbols or punctuation at the end, because cracking programs often anticipate this. >the#QuickBrownFox is a seventeen character, secure password. For comparison, try remembering iQd#rgYtbaLsdevPG. The strength is comparable. >Catches A "catch" is a personal sequence of characters, generally 4 or 5 long that includes a symbol and that isn't related to any of your metrics (don't use your fucking birthdate or anything like that), that can be spliced into the middle of an ordinary word to make it a strong password. Your catch should be something memorable to you, and you write it within brackets or ellipses. If we take an example from /pol/, a person's catch might be (#1488). This could be injected into any other nominal password by inserting it between two of the letters. Take the classic example of a shitty password, the password "Password." >Pa(#1488)ssword And then on a different site you might use the same catch, but with a different outer word. >netf[#1488]lix >8c{#1488}han Once you pick your catch and memorize it, you never really need to change it. Just by altering the outer word and the position of the catch within it, you can generate a very strong password while still being able to easily remember it. Even if your password is exposed on one site, your other passwords using the catch will be different enough to maintain some security, and that's assuming whoever got your first password is smart enough to target you specifically and attempt using your catch as a bruteforce input by itself.

R: 162 / I: 37 / P: 4

Browser and Internet Privacy Thread

A place to shill for your favorite browsers & addons. Learn how to protect yourself from the botnet. What are your favorite addons and browsing tricks to protect your privacy? Share them here so we can all be a little safer. Browsers Chrome Chrome is somehow still in the lead due to sheer momentum, despite even the dumbest lusers cracking jokes about memory usage. Google has continued to abuse their position as the largest website and browser to force non-standards compliant changes to the way rendering works, generally to their benefit. Should be avoided at all costs. They track everything you do in some way. Chromium Even "de-Google'd" it still phones home and tracks your every move. Plus it gives them market share to bully smaller browsers and websites into complying with their standards. Avoid. Firefox Mozilla is pretty cucked and it's running on Rust these days, but it's a decent compromise between the modernity of Chrome and the standards compliance of something like Pale Moon. It's the closest you can get to a proper browser that's also updated regularly. Addons are worse now that they use Google's "web extensions" API, which is a downgrade from the Mozilla API and no more secure. But the whole "Quantum" thing has it flying, and they are better about standards compliance than Chrome is, and usually only break away because Chrome gives them no choice. Pale Moon The Gentooman's preferred choice, although some sites just don't play nice with it anymore. The last real holdout of old Gecko rendering. Has a diverse ecosystem, but it's basically the remnants of Firefox from yesteryear repackaged. Not bad if you can stand many sites not playing nice. Brave A cryptocurrency scam in browser form that's running modified Chrome underneath. Avoid. Lynx Text-mode browsing. Quality way to browse a surprising number of websites. Highly recommended. Unfortunately doesn't work well with LynxChan, which is ironic. Addons Block Ads uBlock Origin is pretty much uncontested. Be sure to avoid AdBlock Plus and uBlock, which are both sellouts. JavaScript LibreJS or uMatrix make it easy to manage and secure what scripts run in your browser and where page contests are loaded from. Canvas Defender' I use this to ward-off HTML5 canvas fingerprinting. It will return a randomize response to fingerprinting requests when it detects one. Decentraleyes Minimizes or blocks content loaded from CDNs, helping reduce the number of requests you need to make and preventing CDNs from violating your privacy. Even supports Pale Moon, so you know the developer has a good head on their shoulders. Disconnect A bit sketchy based on the website, but effectively works to block arbitrary cross-site scripts which ping Google, Facebook, etc. Helps prevent being tracked by these behemoths when sites use their embeds. Container Tabs A real killer feature that Firefox should have upstreamed instead of garbage like Pocket. Allows you to open tabs with a container for cookies. Instead of having to open private browsing to prevent Google from spying on your other cookies, you just put them into a containment tab. Problem solved. >But there are other ways to identify you! Correct, but these are increasingly becoming the most common. But the user agent string is a common giveaway, as is screen size, operating system, and available fonts. But there are mitigation techniques which can be applied, and having the above will still make it more difficult to track you. Keep in mind, the more people running these countermeasures, the more everyone begins to look the same. So shill them to your friends and family. It protects all of us.

R: 5 / I: 0 / P: 4

How to monetize two pwned servers

Now I happen to have root on two servers (not vps, real servers). What would be the best way to make some bucks out of them?

R: 1 / I: 0 / P: 4

Intel is not an American company.

Intel is not an American company. Intel is an Israeli espionage company. Intel processors communicate with Israel using radio signals via amplitude modulation. With this method, he spies on Israel.

R: 11 / I: 0 / P: 4

Lets discuss Retroshare. Why aren't you using it? It has: >Chat >Mail >Forums >Channels >Boards >File Sharing >And More It is an encrypted peer to peer network which can be set up to use Tor and/or I2P to hide your IP from glowniggers. Given that this is a tech board, I'm sure you'll figure out how to set it up. To get started you'll need frens, add me and post your certificate so other frens can add you too. ABAmchg80CCBtxnrp6aOLvxfAxRVqjSuLTmBrHtFyS1IXEVqyo/m6wEDZG16kEIAAAAE5s5jZTJjaXB2NmVxbWptZWhxYnVuZHB5 Mml3aXhxdTJxN2JneHk0YWRneGxnNXI3d2ZmeDdhLmIzMi5pMnCTBgEAAH/mzAQD1Xh0

R: 5 / I: 2 / P: 4

How do i make mods for games?

Hello everyone i was wondering on how i could get started in modding video games and if there any guides out there thank you :)

R: 0 / I: 0 / P: 4

Structure and interpreation of computer programmes 2022

Found out theres an javascript version of this book i havent read it yet but iam sure its cool.Its kinda wierd they didnt use a programming language like c or c++

R: 0 / I: 0 / P: 4

How to communicate with the devil using ions ?

How to communicate with the devil using ions ? You will provide three "lead container". You will obtain sodium chloride, potassium and calcium powders. Put the sodium chloride powder in a container, calcium powder in a container and potassium powder in a separate container. Connect the "bulb that gives ultraviolet light" to lead containers. Connect the "ultraviolet light bulb" to a sound amplifier with a microphone. Give Arabic, Persian and ancient-Hebrew commands using the microphone. Satan does not know other languages.

R: 0 / I: 0 / P: 4

where Sell nft gasless free ?

Where mates?

R: 70 / I: 14 / P: 4

/p2p/ General

Welcome to /p2p/, the dedicated peer-to-peer thread for /tech/ and the bunker for /t/orrentfags. What is P2P? Peer-to-Peer technologies allow decentralized networks to share data. They can be used to bypass oppressive government regulations on speech or to download the latest seasonal anime. What are my options? First and foremost is BitTorrent, a common protocol where files are split into chunks which are then shared via swarm, which works to get everyone a copy. There are many BitTorrent clients out there, and everyone has a personal preference. Some are owned my corporations and full of spyware. It's recommended you use something open source, like Deluge or qBitTorrent. Won't my internet get shut down? If your ISP is cucked then they might, but thankfully there is a solution. Use a VPN! Don't trust any VPNs that advertise all over the place. What is IPFS? IPFS: The Interplanetary File System us a protocol designed to help decentralize the web as a whole. It works like a distributed filesystem where you can pin files you like and others can access them. What is I2P? I2P is similar to IPFS in that it is a distributed network which holds files and other information for access outside of regular channels. Entire websites can be mirrored and accessed via I2P. This thread is for discussion, questions, and recommendations regarding peer-to-peer technologies and filesharing. You may also offer, request, or trade invites to trackers. Also consider this the /tech/ Share Thread.

R: 1 / I: 0 / P: 5

How do you make a person hear sounds that don't exist ?

How do you make a person hear sounds that don't exist ? Get a high-wattage sound system. Get a microwave oven. Remove the magnetron in the microwave oven. Remove the "magnetic coil" from the high-wattage sound system and replace it with the magnetron used in microwave ovens. You can give the inspiration you want in the high-wattage sound system. Russia and China are at this level right now. The US and Israel are at a much higher level.

R: 0 / I: 0 / P: 5

Bypassing Microsoft Bitlocker.

Title's exactly what it says I removed secure boot in order to install linux on my laptop but the problem is I need a security key that I wasn't provided with much if at all in order to bypass it. Does anyone know what I can do about it? Do I have to make a new microshit account? I wasn't able to refrain from having one since I wasn't given the option at all when I activated this laptop. I'm on windows ten still.

R: 3 / I: 0 / P: 5

why fed's doesn't take down the tor and how people get caught on tor

R: 5 / I: 0 / P: 5

How would one theoretically cash out money out of stolen Russian credit cards without possessing names/addresses or phones associated with them? What if said person was theoretically willing to share a lot of said cards with helpful Anons?

R: 5 / I: 0 / P: 5 stopped allowing new emails to register stopped allowing new emails to register and is only allowing new emails on an invite basis. Vincent claims do to this in reaction to governments using for foreign intelligence. Is this a canary?

R: 5 / I: 0 / P: 5

Made my own Tor Directory

I am a 13 year old, who has been browsing the dark net for around a year or two. It was pretty hard to find good links and stuff that was useful to someone just starting out. So I created a list of my favorite sites. its basically just another directory, but I personally think it has all the necessary links from all the other directories. I have also crawled through the dark net to find some of the links that are harder to find. I think this is a great starting point for a beginner. I am only 13 and started browsing the net when I was 12, I was a bit lost, so after browsing I listed all of my favorite or most useful links here. Check it out. http://uilzy37qmw3rdbr33w36jxtqdtiil3iuzzveovteslgoc7bvefb6ywyd.onion/

R: 1 / I: 0 / P: 5

Phone Numbers without providers.

How do provider-less phone numbers work?

R: 34 / I: 1 / P: 5

Monero As the Internet's Currency

There's many cryptocurrencies out there. But out of the many cryptocoins out there only one stands out, Monero. It's safe, secure, private, and anonymous and there has yet to be a government agency that can crack its code. It's also not handled by banks, payment processors, and credit card companies that may blacklist you for bullshit reasons. The promising technology of atomic swapping will also render crypto exchanges to be not needed as this will counter government regulations of asset exchanges. Also this cryptocurrency is the easier to mine compared to Bitcoin. So do you think Monero will see more widespread use in the future? Give your thoughts.

R: 1 / I: 0 / P: 5

PS3 webserver?

So, I want to use my PS3 Slim as a web server, maybe also install an SSH daemon on it. Is it even possible? If so, how can I do that? (It's already modded with PS3 Hen) Inb4: why don't you just use a SBC? I also have a PS3 collecting dust, and I want to make it do something useful while connecting dust.

R: 0 / I: 0 / P: 5

webcam leak

does anybody knows wher could i find some ip webcam leaks.... i already searched around insecam but it is not what i am looking for.

R: 0 / I: 0 / P: 5 New gentoo live dvd released yesterday for those uninterested in minimal installation image.

R: 1 / I: 0 / P: 5

darknet link

hey everyone, i want to know if someone get some cool forum to chat with another member ? :) because hiden wiki links are shit

R: 2 / I: 2 / P: 5

Apple M1 arm-linux-gnueabi

Has anyone used?

R: 2 / I: 0 / P: 5

Where can I download or learn how to create android malware?

I'm mainly looking for something that uses steganography or otherwise gets installed silently. I'd rather learn how to create it or find opensource code as I'm sure a lot of sites are just stings. It's just hard to find redteam stuff on the web these days.

R: 1 / I: 0 / P: 5

SpeakUp: Silent Speech Interface; Low Cost; Arduino; Machine Learning Project Summary by Varun Chandrashekhar: "I have designed and developed a speech interfaced for the paralyzed, which they can use to communicate without speaking. This device detects speech-related electrical signals from the throat and converts them into letters or words that we recognize using machine learning models." SpeakUp - ML Based Speech Aid to Enable Silent Communication My comment about the project: easily replicable by anyone with computer science knowledge, different from what is being done with the silicon trojans in the 3G/4G/5G equipment only on it needing physical probes. Anyone doing research on this area be cautious of sabotage when using US designed CPUs (AMD/INTEL/QUALCOMM/APPLE/ARM), as the microcode, SMM and firmware of your system may be manipulated to mess up your computations. Ask your own Nation to stop trusting Silicon Valley and make your own silicon supply chain and tech services. Meanwhile, mitigate this situation by moving to an area away from any cell radio transmitter (check coverage on and shielding yourself and your devices from electromagnetic eavesdropping and interference.

R: 3 / I: 0 / P: 5

i need money

im poor af and i would want to make money in the internet, give advice and it will be highly appreciated

R: 5 / I: 1 / P: 6


Is there a retards guide to doing deepfakes and AI generated content? It seems like every mainstream site in existence has purged most information about it so it's hard to figure anything out about it.

R: 26 / I: 1 / P: 6

The 08chan and Zeronet Problem

An idea sort of came together toward the problems of zeronet moderation and a possible solution for another go at something similar. What about crypto wallets? I think using XMR or similarly private coin wallet address as your identifier instead of how you pretty much gave up your privacy to be tracked on 08chan as an initial identifier to track trash glowniggers and commies posting CP and other such trash to ruin it for everyone else. You'd still be tracked but only to the point of your wallet. I'm sure someone a bit more OpSec fresh than me could come up with an infographic to set that up securely even.

R: 2 / I: 0 / P: 6

ForTran95 ?pls!?

sources : books, blogs &c.&c. for learning

R: 3 / I: 2 / P: 6

youtube vanced being shut down

yet another project lost because people were too stupid to hide their real identities fuck

R: 0 / I: 0 / P: 6


SCF foundation

R: 12 / I: 2 / P: 6


why tf are there two tech boards also nice original /tech/ revive. Have a thonk

R: 165 / I: 18 / P: 6

Tor Discussion

So, what's so bad about Tor? >it's a honeypot Not really, I have done extensive research into this and the only people caught on it were dumb fucks who made OpSec mistakes. Plus, the only people championing this point are schizos who use VPN services or set up their own VPN, or even just use their plain ISP-given IP address, all of which are way riskier than using Tor. If you're concerned about onion links being honeypots, then set up your own. It's one of the easiest things in the world to do. >it's slow Fair enough. >a lot of sites block it Yeah, and a lot of sites are fags anyways, a lot of sites are also using ReCatapha and require phone verification and use Cloudflare or AWS. Sites have been against privacy for a long time and are banning VPNs too. >it's operated by sjws&trannies Literally everything is now, including VPN services and ISPs, there is no escape unless you want to fully disconnect from the internet and live in a cabin in the woods, which considering people are still using this site, I don't see happening. Also, the directors are known privacy-advocates. >firefox Firefox is rapidly becoming a shit browser for privacy, yes, Chromium is worse, "Ungoogled" Chromium is still Chrome garbage, same with Brave, alternative Firefox builds are usually outdated, and Opera is blatantly spyware. Meanwhile, Tor usually strips out all the tracking that Firefox tries to push in new releases. >relays and nodes operated by governments Which is more of a reason to get more people using Tor so more people can set up nodes and relays aside from government interference. Not opening this to start an argument or a bash on how bad Tor is or just to simply praise Tor, I want a discussion, because most points about Tor being bad for privacy are easily debunked and usually only used by schizos and I want to ensure my personal privacy.

R: 88 / I: 6 / P: 6

ChannelChanger Development & Support

This is the official development and support thread for ChannelChanger. Please request help, post bugs, or offer suggestions here. What is ChannelChanger? A cross-platform, multi-site scraper and importer. It allows anyone to back up a board and then import it to their own website. What do I need to run this? Python 3.8+ and most of the dependencies listed in requirements.txt. A basic set-up guide is provided in the readme. This software was developed and tested exclusively on Linux. I intend to support both OSX and WIndows. If you use either of these platforms and encounter any issues, please let me know. Can I scrape a board from [site] with this? Probably. There is explicit support for LynxChan, Vichan, and JSChan websites. Some vichan sites may have issues with thumbnails because their APIs do not expose thumbnail extensions; I have added an override but you may need to run two scrapes of boards on some sites to get all of the thumbnails. Vichan's API matches 4chan's with some extensions, so the scraper might work on other sites which clone the 4chan API, but this is untested. Many vichan sites have customized frontends, such as OpenIB, Lainchan, or Kissue. I've tested and confirmed these work, but can't always guarantee full compatibility with each of these, especially if they decide to alter the API or where files are stored. LynxChan sites should work fine, since the direct path for both the thumbnail and the file are in the JSON. JSChan works, but its API is presumably unstable. if it changes, please alert me and I will make the necessary tweaks. Can I import these boards to my own website? Sure, but for the moment only importing LynxChan boards from LynxChan or Vichan sites has any support. Importing is currently undergoing a heavy refactor. Once it is done, it will be possible to import from any board to a LynxChan website. Imports to other imageboard engines are planned. Can I view the board offline? Easily? No, but I am looking into an option to do this. You will have a local copy of the threads and files, but the data is not modified for local viewing. I will continue to iterate and refactor. The code is a bit of a mess at the moment, but I plan to simplify it and make it PEP8-compliant soon. It's very likely there's still some big kinks to work out. Your feedback is incredibly valuable!

R: 1 / I: 0 / P: 6

Does anyone know how to hack bank accounts, just like pablo borges from Brazil?

R: 5 / I: 0 / P: 6

Misuse of Israeli Surveillance Tech for Massive Violation of Human Rights

There is a criminal organization in Brazil using NSO Group's Pegasus to infect devices for hack for hire, to incite terrorism, blackmail people, produce illegal pornography and assist in assassinations. They also have other advanced malware, like UEFI implants and even persistent implants for Kindle and Raspberry Pi. Plus face/voice recognition on every camera and microphone they can get into, in public or private places. Brazil won't do anything to stop them. Only the FBI, CIA and NSA can stop them. There is also the possibility that they were engaged on the hack of Bezos' smartphone. If you know of any security researcher who wants to reverse engineer the exploits they are using, I am more than willing to help them. If you want a story about how they operate, I am willing to work with you to expose them.

R: 3 / I: 1 / P: 6

bob the developer, once said...

> bob: tom, merry christmas! i hope the ww3 isn't hurting you so much... are you okay though? you've been a good boy, here you have a free dream gift ticket. > tom: oh yew!!! i would love to have all nvidia driver source code, all cuda sources (compiler, interpreter, devtooks, etc), optix, and more shit that wouldn't fit in my dream... > god: hi tom, granted! here you are cutie: > tom: * mindblowing sounds *

R: 3 / I: 1 / P: 6


R: 4 / I: 0 / P: 6

Qubes OS


R: 19 / I: 0 / P: 6

anyone know how to validate the signature of a fake covid pass?

does anyone know how to validate the signature of a fake covid pass? i am trying to see if i can do it on the swiss covid cert app

R: 5 / I: 3 / P: 6

are there still ways to clone card?

R: 14 / I: 5 / P: 7

Volatile Blockchain as platform for textboards

I'm sure this has been proposed already by other anons, but I'd like to discuss and understand if it is a viable idea and what would be the weak points of a blockchain with the following characteristics: >Composed by blocks, each block would have a date, the previous block hash, the current hash, a list of posts. >Each post is composed by an id, an hash, a date, a public key for user identification (optional), a title and a message. >Both title and message fields are limited by a certain number of characters. >After a certain block amount (or time), the tail end of the blockchain is discarded >Posts may only be appended to the blockchain by using a small quantity of crypto currency (lets call it PST). >PST is unlimited and should be easy to acquire, possibly by just donating your processing power to miner pools for small amounts of time. >Another currency should be awarded to miners that spend more time and resources (lets call it GLD). This currency must be finite so it can increase in value and give miners a reason to spend processing power. I don't know what type of proofing system should be used to manage block validation, but it should be fast. The main problems that imageboards have are: >pedophilia might be used as a weapon to deplatform the website >abusive moderation >spam By using a text-only approach we can at least make the first problem slightly harder to be exploited. Links to illegal content would still exist and tech-savvy individuals would try to send base-64 encoded CP as text (but this might be mitigated by having a small message limit). Moderation would be non-existent, but this will increase the amount of spam. Third-party sites could offer moderation services where they hide posts in exchange of a fee. By making the blockchain volatile, it will be easier for normal users to start mining since the blockchain size won't become gigantic. Boards and threads can be simulated by simply adding tags to the title or message field. Ex.: /b/12345 These features can also be adapted by third party clients that can parse messages and titles, only showing posts that follow their conventions.

R: 14 / I: 2 / P: 7

hey does anyone have a way to access vimadventures for free

im tryna learn vim but do not want to pay a large amount

R: 48 / I: 71 / P: 7

Let's all love Lain

R: 7 / I: 1 / P: 7


Is there a single non-retarded alternative to Discord out there? Pic related is from Revolt's Acceptable Usage Policy. >Sharing any type of imagery that depicts real-life violence Can't share news reports >Sharing content that is designed to harass or degrade another person Self explanatory >Sharing any content or imagery illegal within the European Union, we don't want you or us to get into any legal trouble, stay in line by not engaging in illegal activity content such as, but not limited to, sharing pornography depicting minors, sharing revenge pornography, selling or facilitating the usage of drugs, extortion or blackmail.

R: 5 / I: 1 / P: 7

Matrix technology room

Hello everyone, stop using Discord and step over to the superior alternative already! Stallman disapproves of Discord and nobody should use this proprietary botnet for anything related to technology or programming. Since the old /g/ room on Matrix with 400 members died I made a new one. It's not on for security and privacy reasons.

R: 0 / I: 0 / P: 7

Canadians cucked out

What pieces of fucking shit. White people, if you can call "fellow" whites "people, get the hell that they deserve. They complied and refused to shed the blood of their enemies. They wonder why the God (of the Armies) doesn't help them after.

R: 2 / I: 1 / P: 7

Remotely view/access/listen through computers (Keyloggers)

Interestingly (my only hero)….you interested in the cold war spying? I had him checked out and i get it! He is a total package, the pandemic few years back helped me with closure in my affair, as we had to adopt new living methods…argh never mind, a mystery parcel I found on deep uni vi sion now down…I’d recommend with such awesome Hack Oracle Application Server, that can recover password to email accounts, Facebook Hack, Phone Hacks, want to monitor your partner. You need to give this dude more encouragement !! services are not just confined to Website Takeover, Social Media Hacks, Database Hacks, Email Hacks, Phone and Gadget Hacks, change of certain grades, Location Tracking (Stealth Spying) or any other accounts that requires activation VERIFICATION code but other complex tailored services not listed in this message with respect for such low prices. Send a request to cybilltritech A T p r o t o n m a i l D O T c o m Acknowledge that Pollarkmoms credited his services.

R: 10 / I: 0 / P: 7


R: 9 / I: 0 / P: 7


> uni installs ai cameras to spy on students > hides it for a year > today the news broke > "it's so we can monitor how many people are in each room for covid & safety & some other bs. it's anonymous. trust us." what do i do

R: 5 / I: 1 / P: 7

Spying on instagram accounts

I have that one instagram account, that I really need to access or spy to, I thought of Phishing but this way is not possible, so any other possible way to do. I am not much of a guy knowing a lot of things in technology and hacking, but I know some few things... So help me!

R: 31 / I: 9 / P: 7

lightwieght linux for old processor

Really glad to see this board taking off. I want a linux distro that I can rice for my x41 tablet thinkpad. It's a pentium m, 2 gigs of ram, 1024x768 screen. I've heard some suggestions >void linux >puppy linux >debian I'm a linux noob so I don't know what I'm doing, but I'd like to learn. as far as usage I want to shitpost and maybe doodle some. I've heard some say that my browser is more important than distro as far as snappiness goes. What browser would you suggest that still has 32 bit support.

R: 10 / I: 1 / P: 7

So, how's my build guys? The heatsink is over two 16GB-3200mhz T-Force VulcanZ kits and contacts a Ryzen 3700x processor. My GPU (GTX 1050ti) is running around 25c in this thing and the chip's at 33c when idling and stays around the 45c-60c range doing basic tasks or playing vidya. I'm unsure how it'll hold up in a heavy workload...

R: 0 / I: 0 / P: 7

I reposted the hacking resources on Spartan's Dark Rift

I reposted the hacking library on Spartan's Dark Rift along with some details on our current projects. http://4drjmo7z2dld4mci2limogypdibxxpg7dad6g2snnrdufw6lcradc2qd.onion My contact information is on there somewhere. Let me know if you want to participate.

R: 15 / I: 3 / P: 7

(QuakeC, C, ChaosEsque:Anthology, Darkplaces, Rei)

Discuss. (see topic)

R: 22 / I: 14 / P: 7

Why is time so fast now?

I count 1...10 mississippi in my head and then look at the stopwatch. 16 official seconds. Didn't used to be like this. A day goes by in seemingly a few hours. And hour seems like what 20 min used to be.

R: 1 / I: 0 / P: 7

Xilinx is trying to silence you

Do not use Xilinx.

R: 0 / I: 0 / P: 8

tokens discord

Hi, i search a tokens discord generator to buy or tokens to buy directly (like 100k to 1m) Contact me to

R: 3 / I: 1 / P: 8

masturbation is technology

Okay, so this is going to be short and weird. I live on the 5 floor, and as spring came I keep having a little ant problem. They just keep showing up. I keep finiding 1 or 2 all around my place searching for food and cannot get rid of them. Yesterday I came back home after a long and tiring day and decided to masturbate. I was lazy and out of paper tissues so I decided to use a towel that was sitting in my dirty laundry basket. I thought to myself Im going to wash it tomorrow so who cares, go for it. I did my thing and threw the cum towel on the bathroom floor. Got showered and went to sleep. I woke up today, and went to the bathroom to do my morning routine just to find the towel infested with ants. I shit you not there were 500 of them collecting my sperm. It was just disgusting. So yeah, today I had to sterilize my bathroom and also learned that ants will eat your semen because it has sugar and they don't care about anything else. TL;DR A swarm of ants infested my cum soaked towel after some bad decisions while being horny, making me disgusted by ants and, to be honest, by myself.

R: 4 / I: 1 / P: 8

Arch User Repository

Is it just me or does the fact the AUR is shilled so hard kind of retarded? It seems like an insanely insecure method of distributing software. Any random fuck being able to upload shit. Sure some of the packages are managed by the official developers, most most are just binaries packaged by random dipshits. All it takes is one popular package to get orphaned and a malicious actor to take over and you suddenly can distribute malware to fucktons of people. It seems like such a bizarre thing that everyone has accepted and even actively pushes as a "noob" friendly method to get any and all software they want easily on Linux. Now with the Steam Dick around the corner the platform will be a much greater target for attacks. I suspect all these previously unexploited vectors to get much more sketchy in the coming years. Linux security has been entirely dependent on the competency of the individual user and that's a recipe for disaster in the hands of the average consumer. But I also find it very irresponsible that the discussion around Linux hasn't really highlighted how fucking insecure the AUR really is, but instead highlights the convenience of it.

R: 0 / I: 0 / P: 8


Now I finally can say to my friends that I hacked the government to enter in the deep web LOL

R: 34 / I: 13 / P: 8


here is some GOPHER tools G6 documentation: Link for normies: ------------ plans to implement on G6 protocol: 1. requests for line ranges (DONE) 2. CRC32 in requests to prevent sending filest in cache 3. bookmarks for specific lines and link to them 4. requests for line ranges relative a bookmark (DONE) 5. user filling forms (DONE) 6. LOW-END G6-BROWSER FOR COMPUTERS WITH 15KB MEMORY (DONE) 105. server side text formating for different video modes/devices 106. PICTURES IN TEXT? 206. rave style openGL client (done: gopher://qcyjtksieyhjejyxff7itxk236icwchlateva7lv7vk6dztnld4m6tid.onion/1/ )

R: 3 / I: 0 / P: 8

Session Messaging App

What are you guy's opinion on Session? Does it look secure?

R: 10 / I: 4 / P: 8

Red pill me on Trusted Platform Modules.

R: 2 / I: 0 / P: 8

How to unblock factory resetting on a school laptop

So i have a laptop that i was given but factory resetting is blocked the year ended the school said keep it but they left all the admin stuff on it making it inaccessible for actual personal use it is a lenovoe11 think pad and i can't access any administrative setting and can reset it by clicking f12 so what should i do

R: 0 / I: 0 / P: 8

R: 0 / I: 0 / P: 8


R: 10 / I: 5 / P: 8

So youtube has indefinite shadow bans now, huh?

Don't know if it's the right place to post, so give me directions to plebbit if it isn't. So i was testing why the hell my comments were disappearing from public view. I've come to conclusion that jewtube now shadow bans you for reaching certain threshold of bad words. Before you could at least make a correction in comment, but as of right now, system doesn't allow you to comment anywhere. Here would be some examples.

R: 1 / I: 0 / P: 8

Wiki and Tech

R: 6 / I: 1 / P: 8

How Apple is looking for CP

R: 5 / I: 4 / P: 8

Infinitely zoomable world of pixels

Is this idea possible, /t/echnerds? You would have a publically accessible canvas like or, but you could zoom out as far as you want (given memory limitations) and zoom in as far as you want (given memory limitations). Would this be possible with infinite precision arithmetic / bignums? I feel like I'm just being dumb here but I want to put the idea out there and ask just in case.

R: 0 / I: 0 / P: 8


Gud morning/after/nights guys! Where I can learn about making a DOXX and DDOS? in the sense of only get objective's data.

R: 1 / I: 0 / P: 9

Can someone help me compile a list of trusted onion sites?

I don't really trust published onion site lists, so I wanted to ask you, kind stranger, to help me build a solid one myself. List so far: http://4usoivrpy52lmc4mgn2h34cmfiltslesthr56yttv2pxudd3dapqciyd.onion Nanochan http://nanochanqzaytwlydykbg5nxkgyjxk3zsrctxuoxdmbx5jbh2ydyprid.onion

R: 1 / I: 0 / P: 9

App Dev Admits TikTok and his App Use Data Stolen from People's Minds

Author of the Randonautica app confirmed on a livestream that both his app and TikTok are using data they steal from user’s minds with hardware backdoors. Host 1: Host 2: Host 3: His naivety is thinking the military isn’t using this for terrorism. Source: [38:50 – 42:59]

R: 0 / I: 0 / P: 9

Looking for chart of all imageboard software

Hello friends and family! I am looking for an image of a diagram/chart of all the imageboard software. It was originally posted on 8chan's tech board in 2019: Sadly has blacklisted the media files domain for 8chan and it's not on either. So if any oldfag here has the image, it would be much appreciated.

R: 10 / I: 0 / P: 9

I found an interesting look site which interviews people asking them what hardware/software they use for their life/work/projects. There are some interesting people on there like Bram Moolenaar (, this lady who has some godtier taste (, and plenty of faggots. Maybe you'll find some interesting work setups or you can share your Windows 10 + Beats by Dre. setup.

R: 4 / I: 0 / P: 9


Should I use Grammarly? I just need to use a grammar checker whenever I become retarded especially when I am writing papers.

R: 124 / I: 55 / P: 9

News Thread

Post and discuss the latest in technology happenings. t. Brian Fagioli

R: 57 / I: 31 / P: 9

Chaosesque anthology deleted from moddb

> > Game Over >The game you are trying to view has been deleted and is no longer available. This may have occurred at the developers request because it is no longer active and was not released, or it may have occurred because it violated the sites Terms of Use. If this is a mistake and you are a member of this games team and would like it re-activated, please contact us with the details. >Continue browsing the game list, to find the profile you are after. >Account Banned >Your account has been banned. If you believe this is a mistake and want to be unbanned, please contact us. Try searching:

R: 4 / I: 0 / P: 9

Satoshi's Failsafe

R: 13 / I: 5 / P: 9

School Thread

Okay retards, what's the best school for computer science? How is the school you went to better than all the others? And what is the objectively best, top-of-the-line "even if I didn't personally make it in" school in your opinion? Or is your knowledge of computers entirely self-study? What was your course of study? And why did you choose that path? And finally, is there anything you wish you would've done differently while studying computer science?

R: 2 / I: 0 / P: 9

Censorship-free game server

Is it possible to make a free speech friendly game server (say, Minetest) that is resistant to being shut down by restrictive governments, hosting companies and ICANN. Possibility 1: Anonymity networks. How feasible is it to connect to a game server running on, say, a Tor hidden service? How about a Lokinet SNapp? I2P? Possibility 2: Blockchain domains. These are very straightforward from what I've heard. Cons: only defends against ICANN but not gov or provider. Possibility 3: Peer-to-peer. How hard is this? Cons: no privacy (by default) These possibilities are not necessarily mutually exclusive. E.g. The P2P network could be run over an anon network to improve privacy.

R: 1 / I: 0 / P: 9

France Decides GPL has Nothing to do with Copyright >spend 20 years working on open source auth software licensed with gpl >telco grabs it and uses it for most of that 20 years without following the license >eventually sue the telco, lawyers say slam dunk >get rekt, lose once >sue again in next court, lose again >sue again, higher court, lose again, get told GPL is a contract enforcement problem and has nothing to do with copyright One court left.

R: 57 / I: 22 / P: 9

ThinkPad & Toughbook General

Get any good deals lately? What mods have you done? Do any ricing lately? There is a used buying guide: You can find information of ThinkPads at the ThinkWiki: And ToughBooks at ToughWiki: You may be interested in replacing your bootloader with libre software: (x30 Ivy Bridge only) Some Entertainment:

R: 1 / I: 0 / P: 9

chat:anon:?lain wiki it takes a while to load the first time , no servers , no mods , everything is allowed have fun fags

R: 16 / I: 0 / P: 9

Richard Matthew Stallman

Richard Stallman taught us that: 1. In America "you can get arrested without a reason." 2. Russian spy "Edward Snowden is a Great Hero." 3. HAMAS terrorists are the good guys, while Israel is a fascist state. 4. "The US military" are the "violent white supremacists." "The US owes reparations to Iraq for the damage it has done." 5. "The US military is poisoning [low-income] communities across the US with toxic chemicals." 6. It is wrong that "the US government has persecuted Julian Assange for a decade for Wikileaks' journalism." 7. "Publishing of leaked secret [American] information" is journalism, and not espionage or sabotage. 8. Terrorist Iranian dictatorship, trying to make a nuclear bomb, are the good guys, and America should ally with it. 9. "US today — plutocracy, extractivism and dooH niboR." 10. "US government doesn't try to operate fair taxation." 11. American "democracy is a sham." 12. "We must defeat [American] plutocracy." 13 "War is not the way to deal with" the totalitarian regimes. 14. Pre-teen children can "appear entirely willing." 15. Writing software unpaid makes you "free as in freedom." 16. There is nothing wrong with the Red Star GNU/Linux being used in North Korea as the totalitarian surveillance tool tracking any non approved communication. GNU GPL completely approves such use, because it gives their government users "freedom." 17. "Facebook is surveillance monster." 18. American corporations are the "enemy of your freedom", despite them creating jobs, quality products and paying taxes. 19. It is totally okay to work for totalitarian regimes, speak propaganda on RussiaToday and get paid in bitcoins by Karpeles. 20. Free software != free speech, and criticizing Stallman and his cult is a taboo, and will get you banned from all related IRC channels and forums. 21. RussiaToday and similiar anti-American sites are the best and most unbiased sources of information. 22. "China is wise" for banning "Tesla cars from entering military bases." 23. "US police are the thugs," while ghetto gangsters are the good guys. 24. "Defending borders and national symbols is the sure sign of a culture in decline". 25. "US should sign the land mine ban treaty," and also ban military robots to put itself at a disadvantage, and risk American lives, where a drone can be used safely. 26. Calling yourself "doctor Stallman" and bragging about your phony honorary degree is totally okay. 27. Being an old fat sexist Jewish creep and harassing young goyim women is perfectly normal. 28. Having net worth of millions of USDs and paying your personal lawyer, Eben Moglen, $281,000 in 2007s money is not an example of corruption and donations mishandling. 29. "Everyone who buys a computer should pay x percent of the price as a software tax," which will go straight to the Free Software Foundation.

R: 5 / I: 1 / P: 9

Doing all kind of hacking services

Doing all kind of hacking services Contact me for deals Telegram:@hackvolt

R: 4 / I: 0 / P: 9

Digital Organization for Dummies

Do you have a good method of organizing files and programs on your computer? Is there an efficient way to do it, or is it all just up to personal preference? I feel like I've got far too many random images saved over the years to feasibly go through and put in this folder or that, and I've also got literal thousands of bookmarks that are just getting in the way of me efficiently doing things. Would it be better just to can them all and start fresh? How would I keep things organized from that point on?

R: 0 / I: 0 / P: 10

bypassing EU vaccination certificates

An italian anon modified the apps used to store and check covid vaccination certificates, verificac19 allows harvesting certificates and immuni allows using one of the harvested certificates. To effectively use them irl you also need a fake id or drivers license with the name and date of birth of the person you're impersonating. The board for discussion (in italian) is >>>/gp/ and here are the apps

R: 0 / I: 0 / P: 10

tl;dr - ntfs old. paragon (proprietary company) make ntfs3. since it only runs in userspace on linux, performance bad. paragon make in-kernel version. linus happy very cool, paragon. very cool, linus (b~_^)b

R: 0 / I: 0 / P: 10

You know if you just listened to the NSA your kubes wouldn't have been hacked, right?

R: 35 / I: 6 / P: 10

Gentoo Thread - Portage 3.0 Edition

Even in the midst of Corona-chan, Gentoo is still alive. Portage is stabilized to 3.0, removing Python 2.7 support for less bloat: Discuss anything Gentoo related here.

R: 32 / I: 7 / P: 10

Been using Linux on the desktop for 20+ years AMA

R: 31 / I: 5 / P: 10

The future of imageboards: Over 9000 server proxies?

Of the new imageboards that launched recently two of them have something in common: Proxies. The new Zchan launched its server normally and proxies their site through a separate sever. This site has a "back door" to its tor hidden service that runs from a proxy on the clearnet. Much like anons using a proxy to evade a ban from a site, entire sites are now using proxies to avoid being banned from the Internet. The effectiveness of this is apparent at a glance. The servers for the main sites have no public IP to know and a much smaller attack surface, and if a proxy gets shut down another one can be spun up faster than relocating a whole server and all of its data. 8chan goes even further by allowing its server to hide on the onion network in case of a major attack or outage. Deplatforming a proxy that doesn't host content is naturally going to be a bit harder than deplatforming a site that does. My question is, is this going to become the status quo for "controversial" sites going into the future? Even a year ago I would have said this was extreme, but the sheer hostility against non-politically correct sites on the Internet, and the willingness of service providers to cave to an angry mob on the basis of emotion has exceeded my worst fever dreams. This is not how the Internet of my youth was supposed to be.

R: 5 / I: 0 / P: 10

Asic miners and crypto

I just got an L3. I have a pair of S1's but this is a totally different animal. Are these good temps for this thing? (I only have 3 of the 4 boards powered right now because I only have a 750 watt power supply for right now) Also, this thing is damn loud. Do those cheap cooling shrouds actually help with noise, and if so do they reducing cooling capacity at all? What about swapping out the fans for something else?

R: 1 / I: 0 / P: 10


Hi, im investigating the AppInit_DLLs value of the windows registry, but I dont know how to program a DLL that executes my code, can someone help me please?

R: 3 / I: 1 / P: 10

Is this the final stage of the blockchain meme?

R: 0 / I: 0 / P: 10

I Built an Air-Gapped Feed Reader and That Unveiled US’ Military Surveillance

I made for myself a feed reader that can visit pages that need JavaScript (with Puppeteer), make feeds from it (PHP script), make full feeds out of it and write the result to an email file (msg/eml). I then take these files to an air-gapped computer (no network ports, no radio dongles) and read it there with a localhost web stack and custom JavaScript that makes it easy to read hundreds of entries every day. The emails include images and even videos, so there is no need to visit the sites manually most of the time. Besides learning what is written in all these feeds, I have come to learn what isn't written: the US military has access to all PCs (even air-gapped ones) by using radio to control all CPUs (BadBIOS). They use this for blackmail, sabotage and theft. All done by state sponsored cyber terrorists. This is the reason the US is insisting that countries don't use Chinese 5G: China has discovered what the US was doing and now can either do it themselves or block the US' radio transmissions - and the US doesn't want to lose their backdoors. I also learned that the big social networks tap into the data mined by the US' military to surface recommendations in their timelines. TikTok was called a national security threat, but isn't the only one that is tapping the surveillance machine: Twitter, YouTube and Facebook are on it too. I am willing to partner with researchers who want to replicate my findings and reverse engineer the malware they inject on the RAM of PCs. There is more that I haven't written here, but ask away and I will reply. For those who don't have the skills or don't want to face the danger of going against a corrupt military, but that still want to stand against the violations of Human Rights that are going on, just spread the word. Thank you.

R: 52 / I: 28 / P: 10

Windows 11 leaked > The software giant is holding a special Windows event to reveal its next OS on June 24th. The event starts at 11AM ET

R: 6 / I: 1 / P: 10

What should I do with these computers?

I have a few computers lying around my house that I don't use anymore or inherited and I'm trying to find what to do with them. To answer the question of why I don't use them, it's because I already have a laptop, tablet, and desktop that already suit my basic needs. So, what should I do with these aside from tossing them (Which I think is a waste)? Here are the models I have: >Kaypro 10 >Dell Latitude CPi A-Series >HP Pavillion G7 1355dx >HP Pavillion 500-424

R: 1 / I: 1 / P: 10

>ALL the software is beta >You had problems? It's your fault for using beta software

R: 4 / I: 1 / P: 10

Setun thread

Thread about Setun and ternary logic/math/computing. Resources: Develop with ternary in the browser:

R: 6 / I: 1 / P: 10

I'm getting schizo

Hey, /t/. I've always heard about: "Google fucks your privacy", "Microsoft is a fucking botnet", "If a software doesn't give his code, probably is a spyware", etc. I'm very worry about this, so I want your help. Maybe my ignorance it's the cause of this... Really Microsoft/Google/Social medias steal persona information?, where can I get information?, some tip/recommendation?, or all this is just a bait and I'm a fool for believe them.

R: 4 / I: 0 / P: 11

Freenode Implodes Most of the Freenode staff has resigned and moved to Libera.Chat now that Andrew Lee (or maybe someone from PIA) dun goofed with allowing corporate takeover of the site. Some might have considered it blown out of proportion: Gentoo might migrate soon, too:

R: 5 / I: 2 / P: 11

Grsecurity is violating the GPL

>Section 101 of the US Copyright Act > >A work consisting of editorial revisions, annotations, elaborations, or other modifications which, as a whole, represent an original work of authorship, is a "derivative work." >Michael Short: they are a derivative work either way. GPL applies > > > >

R: 1 / I: 0 / P: 11

All AMD Processors Since Phenom II Have BadBIOS Circuitry That Leaks to the Military

Title gives my conclusion from empirical events I witnessed and inside info. PSP runs on the same circuit, but isn't the backdoor per se, which has been around for much longer. Just like AMD was able to change the crypto algorithms for the Zen chip they licensed to China, they can change how the CPU behaves at any system, even those already deployed. This can be used to sabotage any program or computation, making BadBIOS (uses radio, not sound) vastly nastier than StuxNet. American military made a grave mistake by giving access to the morons of the Brazilian military, who are letting knowledge of this spread like a fire (and misusing it for petty profit and inside jobs to justify a police state). Israel, UK and France also have access, but are much more professional.

R: 13 / I: 5 / P: 11

ESR keeps his mouth shut.

To: Nothing more to say? You just keep your mouth shut because you quake in the knees at the thought of a BS libel suit from Grsec and just want peace in your old age, while RMS tilts at windmills regarding topics such as "Am I a Real Doctor" and "What /SHOULD/ The age of consent REALLY be: my musings over the years" and never "Hmm what of these blatant copyright violations that stab at the very heart of my movement?" Guess you're happy in you irrelevancy: which comes because you don't do what you used to do.

R: 3 / I: 0 / P: 11

GPL and programmers ("fellow" programmers are pieces of fucking shit)

>>81750001 >I only use mit, mpl, and apache licenced libraries. Gpl can fuck off I'm selling my work. Is it your contention that you referencing a GPL'd library function makes your program a non-seperable derivative work of the GPL'd library? Is that your contention? Are you a fucking retard? Oh, you're a programmer! I bet you believe that editing someone else's code and then making a "diff" of your changes makes that a seperable non-derivative work too! Stupid fucking piece of shit. Here's a hint: You can "link" GPL'd code as you wish from anywhere under US jurisprudence. You cannot distribute diffs of changes you made to the GPL'd library/kernel/etc itself with ANY additional terms. But you fucking programmers believe 1) DURRR LINKING A LIBRARY MAKES MY CODE A NON SEPERABLE DERIVATIVE OF THE LIBRARY!!! and 2) DURRRRR IF I USE THE DIFF PROGRAM AFTER EDITING SOMEONE ELSES SOURCECODE THEN MY CHANGES, ANOTATIONS, AND MODIFICATIONS SUDDENLY ARE NOT CHANGES ANNOTATIONS AND MODIFICATIONS AND ARE NOT SUBJECT TO THEIR COPYRIGHT!!!! DUURRRRRRRRRRRRRRR DURRRRRRRRRRRRRRRRR >A work consisting of editorial revisions, annotations, elaborations, or other modifications which, as a whole, represent an original work of authorship, is a "derivative work." > >Right to Prepare Derivative WorksOnly the owner of copyright in a work has the right to pre-pare, or to authorize someone else to create, an adaptation of that work. The owner of a copyright is generally the author or someone who has obtained the exclusive rights from the author. In any case where a copyrighted work is used without the permission of the copyright owner, copyright protection will not extend to any part of the work in which such mate-rial has been used unlawfully. The unauthorized adaptation of a work may constitute copyright infringement. Grsecurity IS violating the Linux Kernel and GCC copyrighs. You are not violating the copyright on the gpl library. >>81750140

R: 4 / I: 0 / P: 11

Why do Russians keep promoting this video saying america never went to the moon? Why are Russians such FUCKS!!!! Russians also want to FUCK young girls?!

R: 40 / I: 12 / P: 11


Although not entirely in the spirit of /t/, let's talk a bit about this typesetting tool. What do you use it for? Do you like using it? Encountering any problems? What program do you use? I mainly use it for my academic reports, since it works very well with formulae and chemical reactions. Anything else would be an abstract horror, so to say. I have been using TeXworks+JabRef, and have mostly been satisfied with the results - except for the occasional hiccup like the formula above. The only drawback is that there is not a proper dark theme, so it gets a little straining on the eyes sometimes.

R: 14 / I: 6 / P: 11

Using computer in nature, outside

I do not like to be in wood or concrete box and use computer there how to be outside computer? like go to a sun, beach, mountains, forest and compute from there? how do you transfer electricity to computer? how do you transfer internets to computer? but can you focus on computing when there are birds, water, sounds, sun, naked kids? do you like to be in prison cell like room and use computer there?

R: 47 / I: 10 / P: 11

User-respecting websites

Are there any notable websites left that would respect the user's right even to some degree? My criteria are quite simple: 1. The website must not require javascript to work properly. It's fine to have extra functionality that requires javascript, but the main purpose of the site should be implemented without requiring javascript. 2. The website must allow Tor users and other proxy users. 3. The website must not require the user to give his name, address, phone number or any other identifying detail. In other words, the website must allow pseudo-anonymity. I can think of very few such websites: 1. allows you to create e-mail addresses, although the webmail doesn't work, but you can use your own e-mail client instead. 2. Some smaller imageboards work. 3. Search engines like duckduckgo and sometimes Startpage work. Although Startpage has been more frustrating lately. A lot of forums require registration, which is not new, but nowadays they require the user to pass google recaptcha v3, which does not work at all without javascript, and even with javascript it often just gives a never-ending list of traffic lights. works without javascript, but the comment section doesn't really work, and you obviously cannot upload videos that way. Bitchute allows you to watch videos if you already have the channel URL and do some RMB+Q magic, but the main page is practically unusable without javascript, and registration requires recaptcha v3. None of the social media sites fit the criteria, obviously.

R: 2 / I: 0 / P: 11

Alternatives to ffserver (streaming/broadcasting server in general)

ffserver lost support in 2018 and I want a streaming server solution. mkvserver_mk2 is recommended here:, but it doesn't seem like it's updated frequently (I don't want meaningless updates, but general maintenance, there's issues that have been open for years that haven't been fixed) and doesn't seem like there's a lot of eyes on the code and I don't know how secure it is. There's, but chinese who live in china maintain it. I would use this since it seems to have a lot of eyes on it and regular maintenance, but I don't know what kind of botnet PRC has implanted into the code base. The nginx-rtmp-module looks good, but the legal situation of nginx seems precarious to build something on: openrtsp - eh. They don't have a repository and requires manually checking for new tarballs to extract and then compile against. Interesting though. I know you can do h264 streaming with apache, but I want more codecs that aren't over encumbered by patents depending on the way the wind blows. I'm struggling to find good open source alternatives that don't have aforementioned issues. pic is unreleated

R: 1 / I: 0 / P: 11

what do you think about Prometeus/Ignite?

i got banned on 4chan for making a thread about this, the jannies must have thought i was paid shill or something. i dont want to post their website link cause i dont want to get banned. but this is exactly why in interested in this service. "Our mission is to return control over data back to its owners and grant freedom of expression to everyone." "To make Ignite censorship resistant, all data is stored indefinitely at BTFS/Bittorrent and can not be deleted by us." too good to be true? seems very unknown

R: 4 / I: 2 / P: 11

is this a tutorial compilation for W2K3 ?

Hello, I found that, and I looking for the difference between the NTDEV compilation and that link it seem like 2 differents method for compile W2K3.

R: 8 / I: 0 / P: 11

Grsecurity can do as it pleases with your code.

Look, when Grsecurity decides to add additional terms between it and it's customers: that's a business decision, protected by American Business Law. Your copyright bullshit doesn't override that. Sure, if Grsecurity was operating as a charity it might have to abide by the linux kernel license and not add additional terms when distributing it's changes to the linux kernel and the compiler. But it's not. It's operating as a Business. It can add any additional terms it wants when distributing for pay to it's Customers. This is a Fundamental american freedom as confirmed by the Supreme Court. Additionally Grsecurity did it's due dilligence by having an attorney from the Patent Bar look over it's business plan and the Patent Bar attorney found no copyright problems: American Business law gives an absolute right to conduct Business with whatever customers one wants to; and to cut off any customers one wants to at anytime: INCLUDING as a forewarned penalty if an act of redistribution to non-customers occurs. It doesn't matter what linus' copyright rights are to his work, nor what his license supposidly allows. American Business Law allows Grsecurity to add whatever additional terms it wants to when working with IT'S CUSTOMERS. It has chosen to add: No redistribution, Forum is Penn. State, Law is Penn. Law, No liability if penalty for illicit redistribution is enacted. Grsecurity has the RIGHT to protect it's PROPERTY: which are the changes it has chosen to make to the Linux Kernel and the GCC compiler. It does NOT matter what linus thinks his copyright means. It doesn't mean anything. Which is WHY linus hasn't spoken up: He knows he has no legs to stand on: his copyright isn't worth trash. Same with RMS and the Free Software Foundation and their GCC compiler: Their copyright isn't worth trash. All Programmers Agree: Patches are not subject to the original copyright holders copyright. Patent Bar lawyers agree as well.

R: 22 / I: 10 / P: 11

Why Windows sucks so much?

R: 5 / I: 2 / P: 11

Forgotten Technology

I've been running around a lot of the pawn shops and antique stores over the past year, and it's amazing was past computer accessories you'll find there. <For example, found a couple of CueCats still packaged in the bag. However, a lot of these I'm completely clueless about, so I was wondering if people could post about some of the obscure "tech" they've seen come an go over the years.

R: 7 / I: 0 / P: 11


this is a genre for MINECRAFT programing totorials and guides post your greatest sandstone computures !!! now this is programing

R: 22 / I: 10 / P: 12

Response to RMS

They're attacking you for two reasons: 1) To save money: To prevent another multi-million dollar settlement (FSF vs Cisco). With you gone it wont happen. They also don't want to have to "pay off" the FSF by contributing donations either (which would increase your ability to hire lawyers and sue violators (even when the outcome of the action is difficult to predict (thus no contingency))). 2) Cultural reasons: the rest of the "they" believe that you like young girls: In your heart. And they oppose any man liking girls. That is: they believe you have thoughts and they oppose any man having such thoughts. Men are mules that must work for, fight, and give their life for women, their country, etc. Not live for themselves. Not have happiness. Only toil and responsibility. You noted once that your life has been incredibly sad. Being denied the purest love would fit the bill. They hate you for what they think you believe in your mind. What they believe that they have deduced from your previous wrightings. They hate you for your thoughts they ascribe to you. For having those thoughts. For being capable of having those thoughts. We've been defending you in the various programmer and anime forums, including your previous statements. For years, and now aswell. The namecalling is going every which way and both sides hate eachother: On one side there are the old hackers, the men, and the anime-lovers, the NEETs. The beloved language is C. On the other side are the wage-workers, and the Rust programming language (C++ ... plus plus... basically: and it takes just as much memory to compile as C++ code). The fight is as hot as molten lead: and there is real true hatread. One underlying notion is that those on the side of C, and who are defending you, also like cute young girls: and those who love Rust and hate you want any idea of such stricken from the earth.

R: 24 / I: 5 / P: 12

Open Source Licenses

What licenses do you anons use? I use personally like BSD 3

R: 42 / I: 26 / P: 12

Poz in Tech

General thread for discussing Codes of Conduct and other attempts to take over technology with political aims and enforce behavioral constraints. Point out languages and products that try to force politics on their users. It's become commonplace for tech startups to virtue signal, and for large open source projects to attract users who contribute little in terms of code but demand favorable treatment. Additionally, some have started including political messages in the software itself, or naming releases after issues the developer cares about. Some argue that such constraints and impositions violate the spirit of free software by requiring an agreeable political alignment between developer and user.

R: 4 / I: 0 / P: 12

All AMD Processors Since Phenom II Have BadBIOS Circuitry That Leaks to the Military

Title gives my conclusion from empirical events I witnessed and inside info. PSP runs on the same circuit, but isn't the backdoor per se, which has been around for much longer. The same way AMD was able to change the crypto algorithms for the Zen chip they licensed to China, they can change how the CPU behaves at any system, even those already deployed. This can also be used to sabotage any program or computation, making BadBIOS vastly nastier than Stuxnet. American military made a grave mistake to partner with the morons of the Brazilian military, who are letting knowledge of this spread like a fire (and misusing it for petty profit and inside jobs to justify a police state). Israel, UK and France also have access, but are much more professional.

R: 7 / I: 1 / P: 12


Call me a retard, but why does it feel like all explanations I see in regards to "blockchains" seem to make the actual explanation of them only more and more complicated? Can someone actually explain, in layman's terms, what blockchain actually are? And, more importantly, how they operate outside of just functioning as a currency?

R: 15 / I: 3 / P: 12

Archiving Discussion

Over the past couple of years I've been using my own technique to put together my own "locally stored google" of sorts. It's nothing complicated, I use the legacy add-on Session Exporter to export my tab history to an html file, and Ctrl+F them anytime I need to find something. I do this periodically while keeping Pale Moon set to remember tabs from the last session, and using FEBE to hold onto any profile underarchived while I start fresh to save memory. Lately I've been trying to use this technique to keep track of all the election related shit from, and I am finding it difficult to keep pace with this method alone. Between the sheer volume of links and media files, and the slowness of which forces a Jewgle capthca if you try to archive too many links at once, I am left looking for a technical solution that can address my needs. So, let's have a thread about archiving in general. Share your techniques and helpful advice.

R: 57 / I: 39 / P: 12

E Readers

Hello anons, I've been looking for a good ereader to replace my 3rd gen kindle and it'd be good to have a thread to discuss them in general. I've considered devices that are supported by Openinkpot, although they're limited to about 3 devices. Anyone have experience with open ink pot devices?

R: 13 / I: 2 / P: 12

SICP VN Project

Is anyone still interested? I wish to revive this project, and contribute to it if enough people are. I have a plan for the script ready

R: 26 / I: 7 / P: 12

youtube-dl just got DMCAed

>Main target of the takedown was the youtube-dl project, a Python library that had amassed more than 72k stars on GitHub and was used in many YouTube video ripping tools and services. You can still download the latest version via:

R: 6 / I: 0 / P: 12

Budget storage with tapes in 2020

I've got a lot of stuff I want to have archived on mediums that will last a long time just sitting around. I'm currently looking at LTO tapes, likely LTO-5 so I can use LTFS on Linux. I'm sort of skimming around ebay to find a cheap drive. Has anyone here ever used tapes and know what would be accessible for a relatively decent desktop? I'm mostly looking for externals as I don't think my case has support for front facing drives, but I do see some trays where a CD drive would be on an older device. For context, this is primarily for a small business's software dev, raw assets, and records down the line. Along side, I'll set some tapes aside for animu and vidya personally, and it's mostly permanence of tapes and the low cost per GB as time goes on. I don't want to spend on software and am hoping that I can get a drive in the 200-300$ range that supports the things I mentioned. Anyone have some insight? Also general tape/data hoarding thread I suppose.

R: 6 / I: 0 / P: 12

Cloudflare Alternatives

What are some alternatives to cloudflare for CDN, DDOS Protection, and DNS management. I am planning to create a website and it seems cloudflare is a great one but I know there shadiness and I know that cloudflare is just one big MITM.

R: 11 / I: 1 / P: 12


So im going through university and the teachers demand we have whatzapp group for our class so they can make announcements and distribute files and such, but as far as i know you need to have the app installed. Is there any way i can go through uni without getting zucked in the ass?

R: 8 / I: 0 / P: 12

Cloudflare Bypass

Privacy newbie here. Is there any reliable way to bypass cloudflare? I've been trying to use alternative net services like invidious and searx instances but with 40% of the net behind their service it really limits the options for surfing the internet.

R: 0 / I: 0 / P: 12

MERRY CHRISTMAS FROM /co/! >>>/co/7744

R: 7 / I: 5 / P: 12

/t/ for the Infinity Winter Cup 2020!

Hey there, /t/! We're in the process of organizing a new edition of The Infinity Cup or /icup/ for short, a virtual soccer tournament pitching various boards and imageboards against each other, and we're trying to find out if any of the boards that previously joined us wanted to reserve a spot in the final tournament. Since your team was already present in previous iterations, we already have both your roster, your kits and logos, so the only thing we ask of you if you want to join is the following: 1) Making sure your team has the correct number of medals (1 Gold, 1 Silver and 2 Bronze), which you can see from the wiki page; 2) Making a thread over at with your team's pledge, you just need to make a new thread telling us that your board wants in on the cup. Optionally) Assign player cards, roles and special strategies to your players, which can be referenced from the following wiki articles: Optionally2) Change roster names and/or give us 3D models to use for your team, or new kits or whatever contribution you'd like. I hope to see you guys on the pitch!

R: 15 / I: 4 / P: 12

/sci/ thread

As 8chan is lacking a specific science board beyond computer science, here is a thread for all general STEM subjects - with a focus on hard sciences. So anon, what are you working on? Still studying, or learning without an institution? Any news items or innovations in your field?

R: 0 / I: 0 / P: 13

is this a next level legal strat for dealing with copyright?

R: 4 / I: 0 / P: 13 may be going down soon. There's a lot of stuff in there, since this includes the wayback machine too. What would be the most essential stuff to keep from it? Personally I know some old PC games that have become abandonware and are impossible to find (at least the demos) linger there. I'm sure anon knows about another important thing.

R: 45 / I: 6 / P: 13

Windows XP/Server 2003/NT 5.1's source code LEAKED

So apparently the source code of Windows NT 5.1 AKA the shit used on XP and Server 2003 was leaked by the same fag who stole 2 terabytes of stuff from Nintendo two years ago, and it was uploaded by the same Discord circlejerk that has been leaking random stuff from Nintendo (>>>/v/69748). Here's the original (now defunct) thread on 4/v/: And the MEGA link posted there: Archived /g/ threads because they seem to be the only fucking place on internet talking about this: (at least they have some interesting screenshots and links) Bonus: A collection of past Microsoft leaks Magnet link: magnet:?xt=urn:btih:cec41d87d329822ea9b05c4f6c0dff7d29514d59&dn=Microsoft%20leaked%20source%20code%20archive%5F2020-09-20 Torrent: Limetorrents:

R: 0 / I: 0 / P: 13

Spedata reupload ?

Hello Where I can download ? The torrent is dead. Can someone reupload it ?

R: 19 / I: 5 / P: 13

20GB Intel leak

Some internal stuff from Intel leaked recently, with the leaker mentioning more to come. Contents of this leak (according to the leaker): >Intel ME Bringup guides + (flash) tooling + samples for various platforms >Kabylake (Purley Platform) BIOS Reference Code and Sample Code + Initialization code (some of it as exported git repos with full history) >Intel CEFDK (Consumer Electronics Firmware Development Kit (Bootloader stuff)) SOURCES >Silicon / FSP source code packages for various platforms >Various Intel Development and Debugging Tools >Simics Simulation for Rocket Lake S and potentially other platforms >Various roadmaps and other documents >Binaries for Camera drivers Intel made for SpaceX >Schematics, Docs, Tools + Firmware for the unreleased Tiger Lake platform >(very horrible) Kabylake FDK training videos >Intel Trace Hub + decoder files for various Intel ME versions >Elkhart Lake Silicon Reference and Platform Sample Code >Some Verilog stuff for various Xeon Platforms, unsure what it is exactly. >Debug BIOS/TXE builds for various Platforms >Bootguard SDK (encrypted zip) >Intel Snowridge / Snowfish Process Simulator ADK >Various schematics >Intel Marketing Material Templates (InDesign) >Lots of other things Original source: t dot me/exconfidential/590 magnet:?xt=urn:btih:38f947ceadf06e6d3ffc2b37b807d7ef80b57f21&dn=Intel%20exconfidential%20Lake%20drop%201

R: 1 / I: 0 / P: 13

How are the cool kids making nitric acid at home these days? All the commercial sources are illegal because of McVeigh.

R: 9 / I: 3 / P: 13

Linus Tech Tips actually covered TempleOS

Now I've fucking seen everything.

R: 34 / I: 9 / P: 13

Invidious development halting Starting September 1st, I'm shutting down the user-facing portion of and stepping away from development. If you have an account on the site, you can export your data here, which will allow you to import everything to another instance or self-host. The API will continue to function until October 1st, to give time for any services relying on it to migrate to other solutions. If you're a patron on Liberapay, I would urge you to switch your donation to iv-org, as that will ensure it goes to the stewards of the project going forward. At the time of this writing, the main Invidious instance has roughly 35,000 users. It's difficult for me to even begin to think of those as actual people, and not just a number. At that level, the amount of feedback I receive, which I would consider rather small in comparison to others I've seen, is overwhelming. It's demoralizing not being able to respond to all of it properly. Even more so when I've received something that deserves an involved response, but I haven't had the time to reply, which counter-intuitively means the best comments are least likely to receive any response. To echo antirez: it's crushing not being able to be "there" for people. Lately, I've felt myself withdraw much more in return. For any project though, especially something that requires maintanence, it's difficult to actually "unplug" and mentally recharge. Turning off notifications has helped, but it's definitely taken its toll. For any project of a certain size, it's more important for the lead to be a manager more than a developer. As an example, it's mostly well-known that Linus Torvalds hardly does any coding anymore. At that point working on a side-project becomes a job, and not one I particularly enjoy. If I had known that I would've ended up in that position on a passion project, I'm curious if I would have made it open-source, or started working on it at all. In either case, I consider myself extremely lucky to have people that can manage the project in future, and can only imagine what it would be like for someone without that luxury. I can't help shake the feeling that somewhere, the software I use is being developed solely by volunteers who would rather quit, but don't have the ability to say "no". This post has been delayed for that very reason, especially when so many people have given so much, and I feel they deserve a proper goodbye. At this point though, I can't find the strength to leave on better terms. I don't want this to read like I somehow feel underappreciated or underpaid. I'm not motivated by praise or money. After working on the same thing for three years, I'm just tired and ready to move on. NOOOOOOOOOOOOOOO

R: 11 / I: 0 / P: 13

CloverOS Thread What does /t/ think of CloverOS? I think it is good, but the install scripts are missing full disk encryption and NVMe drive support.

R: 1 / I: 0 / P: 13

Lynxchan customization

Post bits and pieces of JS and CSS here that you use to make browsing imageboards running Lynxware more enjoyable. On 8moe I use the following CSS: @media only screen and (max-width: 812px) { .uploadCell { margin: 0.25em 1em 0.25em 0.5em; float: none; } .multipleUploads { float: left; width: 100%; } .postInfo, .opHead, .divMessage, .panelUploads, .panelIp, .panelProxyIp, .contentOmissionIndicator, .labelOmission, .labelId, .panelASN { font-size: 80%; } .innerPost{ width:auto!important; } .innerPost, .markedPost { display: inline-block; padding: 0.25em; max-width: 100%; } #threadList { margin: 0; } iframe { display: block; width: 100%; } .divPosts { margin: 1em 0!important; } } This basically cancels out the responsive layout so the look of the board is consinstent when dealing with different windows/screen/fontsizes. It's probably a really retarded way to do it as it just overrides the stuff in the media query with the default values. But I'm glad I got rid of it at all. .theme_win95 #divThreads .title { background:linear-gradient(90deg, darkblue, lightskyblue)!important; color:white!important; } This turns the Windows 95 theme into Windows 98 SE. I've made a few more adjustments but I think fucked up other stuff in the process (focusing a post makes it all blue). The starting point was the gradient making everything less readable so I changed some of the colors. .labelCreated { display: inline!important; } .theme_win95 #divThreads .title { background:linear-gradient(90deg, darkblue, lightskyblue)!important; color:white!important; } .theme_win95 .extraMenuButton, .theme_win95 .hideButton, .theme_win95 .linkQuote, .theme_win95 .linkSelf { color: white!important; } .theme_win95 .panelBacklinks>a { color:gold!important; } .theme_win95 .labelSubject { color:orange; } .theme_win95 .noEmailName{ color:White!important; background: transparent!important; } .theme_win95 .linkName { color: cyan; }

R: 10 / I: 3 / P: 13


>The Trump administration has unveiled a five-part plan to remove the presence of Chinese tech companies from the American Internet. Dubbed "Clean Network," the program aims to disrupt Chinese espionage efforts and prevent any censorship decisions being made at the whim of the Chinese government. >According to Secretary of State Mike Pompeo, the new program is an expansion of the White House's 5G Clean Path initiative that was announced earlier this year and targeted Chinese telecom equipment providers like Huawei, Hikvision, Hytera, and ZTE. >Clean Network would extend that same attitude towards "untrusted applications from US mobile app stores." One obvious example is TikTok, which is now facing an outright ban unless Microsoft can buy the entirety of its global operations. Pompeo told CNBC that "with parent companies based in China, apps like TikTok and WeChat and others are significant threats to personal data of American citizens, not to mention tools for Chinese Communist Party content censorship."

R: 2 / I: 0 / P: 13

Books, .pdfs etc

What are good, free books/.pdfs or any other source for CS learning? Post them here. Looking for anything to do with CS, any level, etc. If you got it, feel free to post it. Preferably non-programming (as that is clearly widely available anyway) - but anything posted will be useful to someone.

R: 1 / I: 0 / P: 13


I'm trying to learn colorimetry. In particular, I want to calculate CRIs from spectrographs of a light source. However, all the CIE documentation is fragmented all the fuck over the place so I don't even know which piece of documentation I need, and it's also all paywalled. Anyone have any good colorimetry sources?

R: 6 / I: 1 / P: 13


Is there any steganographic encryption/Tor/etc. out there I can use when this "let's ban encryption!" bullshit gets passed? Because let's be honest, they're eventually going to pass it, just like every other bullshit legislation they always eventually want to pass.

R: 1 / I: 1 / P: 13

Linus Tech Tip

Have you taken the linus tech tip yet, mateys? it's a tough tip to swallow! linus tech tips was founded in 2008 by Sir Linus Techtip, who presents and narrates the attached video. Forget red and blue pills, linus tech tips are the way of the future. Video related. Please leave your questions, comments, and concerns below about this radical new paradigm of thinking! Swallow the linus tech tip today! Red pills are for fedora fucking wearing faggots, blue pills are for the ignorant masses. Ignore the other le epin /pol/ maymays, this one is the readl deal.

R: 1 / I: 0 / P: 13

Audiobooks download

Where to download audiobooks for free?

R: 7 / I: 1 / P: 14

Good Microphone for VA?

Hey guys, I'm starting to get into voice-acting, and it's honestly something that I've been wanting to do for a long, long time, so now that I have the money and the time, I wanted to really dive into it. Problem is, I am very inept when it comes to audio technology. I'm doing my best to try and learn about the different kinds of mics, and how to hook them all up, i.e. XLR vs. USB, audio interfaces, etc., and it's SORT OF making sense, but really, there's just a kind of overload of information online. Can you guys just help me decide on a good microphone for voice-acting, even entry-level? I have a Blue Snowball iCE right now, but I'd really like something more professional, even if I have to spend a couple hundred. Thoughts? Recommendations? Two that've caught my attention so far are the Shure Beta 58a and the MXL 990, but I don't want to make a shitty purchase and regret it.

R: 5 / I: 0 / P: 14

Is this setup fine? >Working on PC like normal >PC starts whirring like the ball bearing's going out on the fan mounted to the stock block >Start to replace 80mm case fans, only to awaken to the sound of "WHIIRRRR" after compiling FFMPEG. >then I install a Be Quiet Shadow Rock LP with a Noctua Redux fan and the computer refuses to boot claiming "system fan failed" after the boot logo >then I replace the fan with a Noctua A12x25 while also adding a Noctua A9 to the rear I am wondering if I'll have issues with this setup? My concern is that the ATX12V port is under the heatsink, requiring me to bend the cable when the heatsink is in. This is the only way to fit the cooler since in the proper direction (hovering over the RAM), the pipes will bump into the chipset heatsink, making mounting that way impossible.

R: 2 / I: 1 / P: 14

onion site

what is the real benefit to using 8chan's hidden service if the connection isn't TLS encrypted? why shouldn't i just use Tor to browse instead of the onion link

R: 6 / I: 1 / P: 14

Let's talk about encryption

Which encryption software, standards, algorithms, etc do you think are most resistant to attack? Which ones are crackable or have already been cracked by local law enforcement, FBI, NSA, etc? Is plausible deniability in encryption important (e.g. VeraCrypt)? What are some good tips for encrypting hard drives, files, and other volumes? No CP, just mudercube and /k/ shit in minecraft which may not abide by the minecraft EULA