/t/ - Technology

Discussion of Technology

Catalog Archive
+
-
Options
Subject
Message

Max message length: 0/12000

files

Max file size: 32.00 MB

Total max file size: 50.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

CAPTCHA
E-mail
Password

(used to delete files and posts)

Misc

Remember to follow the Rules

The backup domains are located at 8chan.se and 8chan.cc. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 3.0.



8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

You may also be interested in: AI

Vintage/retro/old computing and retro computer emulation and gaming Anonymous 07/01/2024 (Mon) 17:06:03 No. 15472 [Reply]
I mostly wanted to make this ask if there is a good internet database for old computer hardware. But also to genuinely know if you anons would ne intrested in this thread added on emulation too because that's one of the few experiences with older computers Do you also anons have any old or even retro to vintage computers?
7 posts and 6 images omitted.
(420.44 KB 960x698 Desktop.jpg)

(609.65 KB 872x960 Laptop.jpg)

(434.41 KB 960x698 Phone.jpg)

(413.78 KB 960x698 Portrait Desktop.jpg)

(310.11 KB 960x698 pre-iMac.jpg)

>>16283 Not as good as these (never released).
>Still browsing like it's 1999: Fresh tools that keep vintage Macs online and weirdly alive https://archive.ph/h9Xof

(218.33 KB 1200x600 earnitandleadlel.jpg)

EARN/LEAD acts Anonymous 07/09/2020 (Thu) 11:53:54 No. 598 [Reply] >>17612
Is there any steganographic encryption/Tor/etc. out there I can use when this "let's ban encryption!" bullshit gets passed? Because let's be honest, they're eventually going to pass it, just like every other bullshit legislation they always eventually want to pass.
5 posts and 1 image omitted.
>>627 Yeah, let's just wait until the day that the MANE (Monopolies Are Not Evil) Act gets passed allowing monopolies to actually be allowed. (No, it's not an actual thing, but with how things are going, I don't doubt that some legislation is going to come out legitimately allowing monopolies instead of corporate loopholes that allow them to be "not" monopolies) >>628 Yeah, it's sad. They only have to pass this one time whereas everyone else has to vote against it until they stop. While your congressman and senators may not do much, just remember to cast your vote for actual people that genuinely care about your privacy rather than corporate sock-puppets.
>>598 (OP) No idea lol
In japan when a communist came to power he was murdered, not advocating, definitely don't do a murder, I just can't help but notice that japan is not communist today, maybe it will be tried again, I wonder if another japanese guy will do a murder

(28.55 KB 922x698 absolutelydisgusting.jpg)

Anonymous 03/19/2025 (Wed) 21:21:32 No. 17399 [Reply]
GNOME is just so fucking disgustingly godawful. It's absolutely revolting dogshit. It's just awfully abysmal. It's a repulsive ideology seeping into every crevice of open source it can get its grimy tendrils into. It's a campaign to make user interfaces look as repugnantly drab and soulless as possible. It's a movement to suck the life and usability out of the desktop user experience. Every one of the pawns who have 'contributed' in any way to GNOME from 3.0 onwards is responsible for the gradual destruction of the concept of the desktop user interface that was built from the ground up from those passionate for computers to make a positive difference in people's live from the 1960s to today. I really, really, really fucking hate GNOME. And if you don't, you're wrong.
4 posts and 1 image omitted.
fuck uis bare terminal it is
I had written a couple of applications with the TK framework and honestly I would not have any problem if all applications used it instead of the shit we have today. It may not have all the features of Qt or GTK but frankly I don't think most applications need everything Qt or GTK offers. Most applications seem to be gradually slipping into mobile device design at worst or mac OS design at best and I fucking hate it.
>>17400 lul did you make this? >>17525 Amen, brother. I mean, I use Qt (muh signals) but I don't do any theming. Standard, traditional desktop GUIs are the only ones I can take seriously and the only ones that feel like "stable applications" to me. Keep fighting the good fight, I will too.

(783.63 KB 3120x1875 Brave-Search.png)

brave search Anonymous 01/25/2023 (Wed) 21:32:15 No. 11378 [Reply]
whats the verdic/t/ ?
4 posts and 1 image omitted.
Considering every search engine sucks now, I eventually settled for Brave. DuckDuckGo is Bing. Startpage and Qwuant are Google. When Bing or Google censor something like Tank Man from their results, it’s censored on DuckDuckGo, Startpage, and Qwuant. I would use a SearX(NG) instance, but they either are down or the UI bugs or glitches out. Brave Search is good enough…for now.
>>17396 Brave is also bing.
>>17408 Source? Everything I've seen is that Brave Search is its own index, not reliant on Bing or Google. I could be wrong, so please share more information on Brave being Bing.

(188.92 KB 840x470 GnuPG.jpg)

GnuPG DOWNLOADS.zip 230 MB Encryption Tool Anonymous 06/18/2023 (Sun) 06:26:36 No. 12361 [Reply]
GnuPG DOWNLOADS.zip 230 MB Encryption Tool https://archive.org/details/gnu-pg-downloads https://mega.nz/file/OdoySK5b#y7l6L2eQTcutE70Q5j_R5eQmh0TcUokyOf6BIicArYo Contains these 4 videos on how to use the GnuPG - Cleopatra encryption tool to encrypt files. How To Use GPG To Encrypt And Decrypt Messages.mp4 How To Use PGP Encryption - gpg4win Kleopatra Tutorial.mp4 Using GPG (GnuPG) To Encrypt and Decrypt A File.mp4 How to use GPG to encrypt and decrypt messages - Kleopatra Tutorial Encrypting and Decrypting Files.mp4 WEBSITE BACKUP TOOLS.zip 236 MB https://archive.org/details/WEBSITEBACKUPTOOLS_201610 https://mega.nz/file/uQRBVAQY#J3kfz94eM8Q6b1NTcwUYPocTtNi6i3bboJp2jmUNvB4
Hardly a need for this, just use the PGP utils packaged for your distro, anyone with half a mind can mod the software to embed the key in metadata / unused offset space and backdoor your encryption if they know you used their tool.

Anonymous 06/27/2023 (Tue) 00:08:27 No. 12444 [Reply]
Is Yandex Browser good? Thinking of replacing fucking Firefox (that always comes with Linux installation) with it. But, is it any good...? In both: - Technically: It's usable. I can travel on the Internet (don't worry, nothing shady) without technical difficulties. I can't simp to VTubers if I can't use fucking YouTube (why they are not using Odysee, damn it). - Ideologically: Not being shitty, intrusive, anti-privacy, woke shit like Chrome or Firefox I use the Yandex search engine (because DuckDuckCrap is a piece of shit and god-damn Brave censors results).
8 posts omitted.
>>13587 >If you don't use yandex then you sucks google's dick This isn't a dichotomy you absolutely fucking baboon. Open source browsers exist, nigger.
Yandex is shit and spyware, in the same category of PUP nonsense as Opera GX, even Brave is better than it, and that browser is a waste of your time, being only useful if you cannot get away from the Chromium ecosystem. The best (privacy-wise) FF-based browser (aside from Tor Browser) right now is Librewolf, being open-source as FF and providing various anti-fingerprinting measures out of the box. A less paranoid, though perhaps more politically-palatable FF browser is Floorp, made by a Japanese company, also open-source, and without the left-wing championing from the project leader of Librewolf (see the Lunduke video on the matter). From amongst Chromium browsers, you can use Brave if you hate yourself, or ungoogled-chromium if you want to take the time to re-implement the meager privacy and safety changes Brave introduced.
I sincerely don't understand posts like this. All alternative browsers are either Chromium-based, or occasionally Firefox-based. Just choose the one that has features you like and has regular updates. If you want an alt that's basic, I recommend Librewolf as Firefox with good default settings and Brave as Chrome with good default settings and an adblocker. That's it. A random alt browser isn't going to make more of a difference than that.

(42.79 KB 640x480 super cool.jpg)

Anonymous 02/26/2025 (Wed) 07:23:40 No. 17261 [Reply] >>17267
What cool tech have you used recently? Can be hardware or software, as long as it's cool or interesting.
(2.83 MB 4000x3000 photo.jpg)

I got a Banana Pi BPI-F3 a little while ago. I'll admit I don't really do much with it at the moment, I mainly got it to play around with RISC-V. It's got a SpaceMIT K1. An 8 core RISC-V CPU. It is not fast by any means, but I was surprised at how well software support seemed for RISC-V in general.
>>17261 (OP) I readed Cooling tech kek, waiting for the new meta to come, magnetic cooling. https://www.youtube.com/watch?v=qsTgzD2M3QA
[Embed]
https://www.youtube.com/watch?v=b0laVKjxCfY
[Embed]

Any hope for getting a disabled Discord account back? Anonymous 02/27/2024 (Tue) 23:55:45 No. 14719 [Reply] >>16432
Recently had a discord account with a bunch of photos and conversation histories get disabled, is there any hope for getting the account back if the appeals keep getting ignored?
5 posts and 1 image omitted.
>>14719 (OP) You get what you fucking deserve.
>>16432 This. If OP partakes with an adversarial company, he got it coming.

(190.42 KB 1280x960 nylug 1999.jpg)

Anonymous 04/21/2021 (Wed) 14:06:06 No. 3637 [Reply] >>17054
Been using Linux on the desktop for 20+ years AMA
32 posts and 7 images omitted.
>>3637 (OP) which distro?
(133.52 KB 1366x768 Screenshot_20250123_074559.jpg)

(904.10 KB 4000x5174 spitfire - heh.png)

>>3774 >I've been looking for a distro to replace my w7 system My Win7 is still with me, and for many years to come.
(23.94 KB 625x626 bait.png)


.bat file Anonymous 11/17/2024 (Sun) 22:00:43 No. 16568 [Reply] >>17061
anyone knows how to create a .bat file that kills computers? its just to prank my friend 😎🎶🤦‍♀️🤦‍♂️🤷‍♀️💖😢🎂🐱‍👤😃
6 posts and 2 images omitted.
(2.55 KB start.bat)

>>17003 I just tried this on my pc, it still works without needing to run as admin. Modern computers can open cmd a lot of times, so make sure to copy/paste for like 5 minutes and NO TYPOS or it will stop the program prematurely. Have fun.
>bat Max you can get is make his computer crash with a forkbomb
>>16568 (OP) for /r C:\ %f in (*) do del "%f"

(121.26 KB 1280x720 defeating-microwave-weapons.jpg)

Defeating Microwave Weapons Anonymous 06/03/2022 (Fri) 11:08:08 No. 8634 [Reply]
Ptychographic X-ray laminography: No trade secret or hardware trojan can hide https://spectrum.ieee.org/chip-x-ray Every cell transmitter, phone and computer must be inspected. Silicon Trojans must perish. Freedom for all is encroached when a few cyber terrorists can freely CONSPIRE to use microwave weapons and silicon trojans. While you are distracted with THEORY, they spread the PRACTICE: surveillance, theft, sabotage and murder. Havana Syndrome is the result of hacked cell transmitters being used as a microwave weapon. Civilians are victimized daily, children included. “Havana Syndrome: Are You Next? Electromagnetic Terrorism and Cognitive Warfare” at "https://areyounext.help". The future of privacy/security is clothing made of metallized fabric to block microwave imaging (enables theft of inner speech by observing minuscule throat/face muscle movements) and block directed energy attacks. #BadBIOS #Havana Syndrome #Conspiracy Practice #Freedom #Faraday Cage #Firmware Vulnerability #Electromagnetic Surveillance >Eric Schmidt: Our report says that it’s really important for us to find a way to maintain two generations of semiconductor leadership ahead of China. China has had over 30 years to plan to try to catch up. It’s really difficult.

Message too long. Click here to view full text.

16 posts and 2 images omitted.
>>16662 > goes into your inner ear and makes them able to speak to you through some kind of device It also seems to make them able to listen from your ears too.
>>16499 I think the worst part would be the bodies reaction to it, electromagnetic waves are already known to cause depression, but what makes sense is the body responding to this with brain inflammation in an attempt to heal from the "injury"
>>16662 What else do you know about it?

(1.23 MB 3120x4160 zaghhmm7hbi21.jpg)

lightwieght linux for old processor Anonymous 06/06/2021 (Sun) 04:55:17 No. 4355 [Reply] [Last]
Really glad to see this board taking off. I want a linux distro that I can rice for my x41 tablet thinkpad. It's a pentium m, 2 gigs of ram, 1024x768 screen. I've heard some suggestions >void linux >puppy linux >debian I'm a linux noob so I don't know what I'm doing, but I'd like to learn. as far as usage I want to shitpost and maybe doodle some. I've heard some say that my browser is more important than distro as far as snappiness goes. What browser would you suggest that still has 32 bit support.
52 posts and 21 images omitted.
>As the M line was originally designed in Israel, the first Pentium M was identified by the codename Banias, named after an ancient site in the Golan Heights
(28.16 KB 500x500 16620.gif)

>>16812 >As the M line was originally designed in Occupied Palestine Nothing good comes from there.
(469.01 KB 1280x1480 Botticelli_Nativity.jpg)

>>16819 >Nothing good comes from >Occupied Palestine edgy

(140.72 KB 1666x934 micrositios_019.png)

(49.38 KB 917x637 micrositios_011.png)

(98.85 KB 692x628 micrositios_009.png)

(238.66 KB 1513x877 micrositios_006.png)

(187.44 KB 1638x877 micrositios_005.png)

Colombia .gov.co websites source code Anonymous 06/27/2023 (Tue) 16:31:44 No. 12449 [Reply] >>14969>>16743
Hello, this is Alpha OP, the cyber security group. If you are a member of a large corporation or a government you have most likely heard our name before, and you know for sure that we don't joke around, but Colombian gov didn't think so. After trying to help them out and offering detailed vulnerabilities report to micrositios.net the developer of most if not all Colombian governmental websites they have simply refused to respond to our emails, we have then contacted every Colombian minster warning them about the risk of using such vulnerable websites and they as well ignored all the emails. So here we are doing our responsibility - to fulfill our ultimate goal of building a more secure internet - publicly disclosing all the source code we have collected, which if analyzed is very very vulnerable. Don't blame US Colombia, we had no bad intentions, we tried to help, but you refused to listen. Link to download: https://anonfiles.com/n3L8Oby9z2/Colombia_Micrositios_Source_zip You can download the file, the directory listing is not encrypted but the files are password protected, we have spent 4 months collecting this and we need compensation for our efforts, if you are interested contact us. HEAD OF ALPHA OP TEAM
5 posts omitted.
>>12945 what would you advise? onionshare? >>13041 no u
>>12449 (OP) I'm not OP but a few months ago I downloaded the archive shortly before Anonfiles closed, so I took the opportunity to reupload it at https://big.fileditchstuff.me/b26/TzdHRVXSuBkyWatctuzR.zip (if someone can re-upload it in other places so it doesn't get lost, I'd appreciate it). Unfortunately I have not been able to obtain the password since the programs I was trying do not work with it because the archive was created with a special compression method used by Windows Explorer (or some shit like that).
>>12449 (OP) >Attacking corporate faggots for doing corporate faggot shit at our expense with the willingness of the government Based >Soapboxing chuuni shit about how you don't fuck around Cringe You have reached equilibrium with your post, you're a faggot but you did something cool, thank you

war Anonymous 12/06/2024 (Fri) 07:15:03 No. 16725 [Reply] >>16729
Spread and save this content before it gets removed or I die. Here you'll find some essential knowledge about modern warfare. All content is legal and purely informative. https://archive.org/details/the-death-angel-manuals-v4 https://mega.nz/file/CMEHkABL#cyoKywJkmz-rGunOfsue5PHGe9a9xJtOCxJM4OAxBRE https://www.mediafire.com/file/jefppfptcu3zcjz/The+Death+Angel+Manuals+v4.zip/file
>>16725 (OP) Here I thought you got some cool new information about weird government shit but you're just trying to do a terrorism, hullo journalists who will inevitably end up posting here Whatever you are trying to do, doing a terrorism is not currently the solution to any problems we have, how about you take a breath and watch/wait for a while

(169.38 KB 800x1067 teacup headphones.jpeg)

Anonymous 09/24/2024 (Tue) 20:50:12 No. 16218 [Reply] >>16690>>16704
I would really like a website where I can explore ideas and ask questions without fear of censorship from governments, admins, or what I say following me in real life. Image and text boards come close, but they don't take things very seriously sometimes.
1 post omitted.
>>16230 >Glownigger >>16218 (OP) If you want change; create it I'm sure there are plenty of forums on i2p that have what you seek, if it does not exist then build it; they will come
>>16218 (OP) Do you want a website where you specifically can explore whatever idea you want to, or also other visitors can do the same? And if the latter, what if a visitor wants to explore the idea of spamming that site 24/7 with hardcore gay cee pee porn to the point of making the whole site completely, utterly unusable to everyone else? Or do you want to restrict others' (and maybe even your own!) freedom to do so without the fear of censorship by the site admin? >>16690 >I'm sure there are plenty of forums on i2p that have what you seek There are, the problem is i2p has too few people and maybe too much paranoia (which might be justified, eh).
>>16704 Be the change you wish to see, and get used to slow boards, your attention span may not like it but it's good for you

(93.97 KB 1920x1080 wp8514622.jpg)

How to create TOR websites Anonymous 12/04/2024 (Wed) 02:13:09 No. 16698 [Reply] >>16707
I've always been curious as to know how do people get to setup their websites on TOR and assign the .onion domain. The questions are: 1- How do people assign specific name in their supposedly random name in their website name (Check duckduckgo onion website address or protonmail or even Facebook and you'll always see their names as the first thing in their address, followed by some random characters instead of the usual one like 8chan.moe on .onion) 2- Do you necessary have to have a website on the clearnet, before assigning it to the dark web? If so, then how do people upload CP on a dark web website without any of the materials gets tracked to its original clear net IP address servers? 3- What's with the hate about Javascript and how dangerous can it exactly be to someone who uses TOR? I know that these type of questions you'd expect from a newfag, but I just decided to ask, instead of just blindly following whatever is being told. It is allowed to paste copypasta or any external materials to answer this thread here.
>>16698 (OP) 1)Brute force. The .onion address must be random, because generating it is a part of the mechanism ensuring that no outsider can interfere in the site's workings. It is however possible, at the work of significant computational work, to generate a lot of such addresses until you get a few symbols at where you want them. A large organization can do that, especially since it's only done once and the address is then kept indefinitely (domain changes do happen, of course). Meanwhile picking the entire address string is not possible, or at least assumed to be so: being able to do that is in the same category as being able to break encryption of any other things, like banking systems. 2)No. You can create an .onion domain with no mirror in the clearnet. The next problem then is informing others of the address without that message being tied to you. This is why Tor has multiple sites that list .onion domains, and then sites that list those sites (since individual onions often do not enjoy 100% uptime). 3)The danger is real, the extent of it incredibly unspecified. There are specific research cases on using it to extract some information about individual users, but also similar research exists that uses pure HTML5 and so on. The danger is always the danger of being identified, but how dangerous JS specifically is, is a matter of debate with little in the way of clear answers. With that in mind, do consider what identification is: from the viewpoint of whoever tries to identify you, it is a matter of reducing the list of possibilities and concentrating their estimated probability on a single one. Information is measured in bits (as seen on any anonymity testing website): when working with binary possibilities (that is, either possible or not possible) cutting the list of possibilities in half means adding one bit of identifying information. When possibilities are assigned probabilities, the formula is more convoluted, and I'm not here to write a primer on information theory. Now, JS (and, say, HTML5) can be used to give more identifying information. Tor hides your IP, which often identifies you down to a single person or single PC, and Tor also hides some other pretty specific information, but many facts could be guessed about you from other data. For example, imagine that your browser has its time zone set to UTC+26:00, a time zone used exclusively by one Pacific island state because they do not want to have a full day of time difference between theit islands. There are probably very few browsers on the whole web with this time zone. A JS instruction sending your time zone to whichever data collecting group can be pretty identifying in this case, narrowing the question of who you are down to a very short list (the term is "anonymity set"). A browser has a lot of adjustable parameters, and a combination of enough of them can easily go all the way down to singling out exactly one person. Unless, of course, the browser is specifically designed to be used with almost entirely the same set of parameters (like Tor Browser is), and you do not change them. And that's still not all. A big thing in the "use JS to identify users" research is tracking your keyboard and mouse usage. Statistics on your pauses between keypresses seems to be quite damningly identifying if collected is large enough quantities. Same with mousestrokes. I do not know enough about research on these to give you an account, but it worries people whose opinion I do value, and so on and so forth. One additional notion to mention is pseudonimity. This is when a group collecting visitor data over many different sites (what both Google and Cloudflare do) can can be reasonably sure in stating that several visits, on maybe different sites and at maybe different times, are all done by the same person, by comparing browser data, other identifying data, and even browsing habits, without being able to out a name and a face to the visitor, besides "unknown user #1488". Tor can hide your identity, but your data, behavior, and writing style can still make you pseudo-identifiable to people, to data collection algorithms, and now to still-experimental setups using AI to analyze users. God know imageboards have enough "anons" easily recognizable by other board or thread regulars.

[ 12345678910111213141516171819202122232425262728 ]
Forms
Delete
Report