/t/ - Technology

Discussion of Technology

Catalog Archive
+
-
Options
Subject
Message

Max message length: 0/12000

files

Max file size: 32.00 MB

Total max file size: 50.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

CAPTCHA
E-mail
Password

(used to delete files and posts)

Misc

Remember to follow the Rules

The backup domains are located at 8chan.se and 8chan.cc. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 3.0 (Temporarily Dead).

Ghost Screen
Hilda Anniversary Marathon


8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

You may also be interested in: AI

(121.26 KB 1280x720 defeating-microwave-weapons.jpg)

Defeating Microwave Weapons Anonymous 06/03/2022 (Fri) 11:08:08 No. 8634 [Reply]
Ptychographic X-ray laminography: No trade secret or hardware trojan can hide https://spectrum.ieee.org/chip-x-ray Every cell transmitter, phone and computer must be inspected. Silicon Trojans must perish. Freedom for all is encroached when a few cyber terrorists can freely CONSPIRE to use microwave weapons and silicon trojans. While you are distracted with THEORY, they spread the PRACTICE: surveillance, theft, sabotage and murder. Havana Syndrome is the result of hacked cell transmitters being used as a microwave weapon. Civilians are victimized daily, children included. “Havana Syndrome: Are You Next? Electromagnetic Terrorism and Cognitive Warfare” at "https://areyounext.help". The future of privacy/security is clothing made of metallized fabric to block microwave imaging (enables theft of inner speech by observing minuscule throat/face muscle movements) and block directed energy attacks. #BadBIOS #Havana Syndrome #Conspiracy Practice #Freedom #Faraday Cage #Firmware Vulnerability #Electromagnetic Surveillance >Eric Schmidt: Our report says that it’s really important for us to find a way to maintain two generations of semiconductor leadership ahead of China. China has had over 30 years to plan to try to catch up. It’s really difficult.

Message too long. Click here to view full text.

16 posts and 2 images omitted.
>>16662 > goes into your inner ear and makes them able to speak to you through some kind of device It also seems to make them able to listen from your ears too.
>>16499 I think the worst part would be the bodies reaction to it, electromagnetic waves are already known to cause depression, but what makes sense is the body responding to this with brain inflammation in an attempt to heal from the "injury"
>>16662 What else do you know about it?

(1.23 MB 3120x4160 zaghhmm7hbi21.jpg)

lightwieght linux for old processor Anonymous 06/06/2021 (Sun) 04:55:17 No. 4355 [Reply] [Last]
Really glad to see this board taking off. I want a linux distro that I can rice for my x41 tablet thinkpad. It's a pentium m, 2 gigs of ram, 1024x768 screen. I've heard some suggestions >void linux >puppy linux >debian I'm a linux noob so I don't know what I'm doing, but I'd like to learn. as far as usage I want to shitpost and maybe doodle some. I've heard some say that my browser is more important than distro as far as snappiness goes. What browser would you suggest that still has 32 bit support.
52 posts and 21 images omitted.
>As the M line was originally designed in Israel, the first Pentium M was identified by the codename Banias, named after an ancient site in the Golan Heights
(28.16 KB 500x500 16620.gif)

>>16812 >As the M line was originally designed in Occupied Palestine Nothing good comes from there.
(469.01 KB 1280x1480 Botticelli_Nativity.jpg)

>>16819 >Nothing good comes from >Occupied Palestine edgy

(140.72 KB 1666x934 micrositios_019.png)

(49.38 KB 917x637 micrositios_011.png)

(98.85 KB 692x628 micrositios_009.png)

(238.66 KB 1513x877 micrositios_006.png)

(187.44 KB 1638x877 micrositios_005.png)

Colombia .gov.co websites source code Anonymous 06/27/2023 (Tue) 16:31:44 No. 12449 [Reply] >>14969>>16743
Hello, this is Alpha OP, the cyber security group. If you are a member of a large corporation or a government you have most likely heard our name before, and you know for sure that we don't joke around, but Colombian gov didn't think so. After trying to help them out and offering detailed vulnerabilities report to micrositios.net the developer of most if not all Colombian governmental websites they have simply refused to respond to our emails, we have then contacted every Colombian minster warning them about the risk of using such vulnerable websites and they as well ignored all the emails. So here we are doing our responsibility - to fulfill our ultimate goal of building a more secure internet - publicly disclosing all the source code we have collected, which if analyzed is very very vulnerable. Don't blame US Colombia, we had no bad intentions, we tried to help, but you refused to listen. Link to download: https://anonfiles.com/n3L8Oby9z2/Colombia_Micrositios_Source_zip You can download the file, the directory listing is not encrypted but the files are password protected, we have spent 4 months collecting this and we need compensation for our efforts, if you are interested contact us. HEAD OF ALPHA OP TEAM
5 posts omitted.
>>12945 what would you advise? onionshare? >>13041 no u
>>12449 (OP) I'm not OP but a few months ago I downloaded the archive shortly before Anonfiles closed, so I took the opportunity to reupload it at https://big.fileditchstuff.me/b26/TzdHRVXSuBkyWatctuzR.zip (if someone can re-upload it in other places so it doesn't get lost, I'd appreciate it). Unfortunately I have not been able to obtain the password since the programs I was trying do not work with it because the archive was created with a special compression method used by Windows Explorer (or some shit like that).
>>12449 (OP) >Attacking corporate faggots for doing corporate faggot shit at our expense with the willingness of the government Based >Soapboxing chuuni shit about how you don't fuck around Cringe You have reached equilibrium with your post, you're a faggot but you did something cool, thank you

anonymity_test Anonymous 03/14/2023 (Tue) 01:11:46 No. 11781 [Reply] >>16607
Does anyone know how I can increase my score, if possible considering all variables are no even though I am actually using a VPN over a VPN router with a SOCKS5 proxy? And can someone please explain to me, if it's an anonymity test, why do you lose points for VPN and TOR? It's taken me a bit of perfecting and tweaking to get this score, but how can I boost it to 100% clean? Cheers cunts :)
8 posts and 2 images omitted.
An explanation on VPNs: A VPN does not anonymize you. All a VPN does (in simple terms), is route your traffic over their server before routing to its destination, and vice versa. So if you use a VPN, The VPN provider mostly is easily able to uncover your real identity in case he needs to (that is, if he keeps logs, which some providers claim to not do, but we all know the PROBABLY do anyway...) A better way of using a VPN would be not linking it to your real identity by any means, such as paying in a mixed cryptocurrency, giving a fake name, E-Mail etc.
>>12582 VPNs prevent my ISP from terminating my service due to copyright infringement
>>11781 (OP) Your User Agent doesn't match your JS User Agent, so sites can tell you're spoofing it. That might be the problem.

HELP COCK.LI Anonymous 11/14/2024 (Thu) 01:27:32 No. 16526 [Reply]
HELP COCK.LI > You don't need anything but an Internet connection to use cock.li. If all you had was a library card you could use a public computer to get an e-mail account. It's a strange thing to say about a joke website, but cock.li improves access to services for marginalized people globally, without connecting into some corporate system. > I've never got so much laughter out of anything in my life than my time here. It's not even close. The funniest e-mails I've ever read were sent on cock.li, some of them to me directly. I'm the worst at responding, but I read every e-mail you send me. Every password reset request, every schizo ramble, every question, every story. > Vincent Canfield The email provider cock.li is facing legal difficulties to keep the services running. Vincent, the creator and administrator for over 2 decades has asked for donations to help with the recent challenges. He and his team have provided the service free of charge all this time. Now it's time for us to provide something in return. Daily updates about the situation will be available at: https://cock.li/index.asc.txt Main page: https://cock.li
2 posts omitted.
Update from Vincent: > Date posted: 2024-11-12 > > COCK.LI IS ON RED ALERT. > > Updates: > - Everything down for about 24 hours due to upstream datacenter outage affecting DNS. Service restored and more nameservers are in the works. > - Red -> Yellow Alert soon hopefully. > - My fellow retards: cock.li has not "shut down". You may need to read more than the first line. > - Anyone suggesting you migrate your account to Gmail, Yahoo, Proton, etc. should not have been using cock.li in the first place. Normalfags get off my fucking board. > - Feel free to migrate, I don't have any good suggestions though. Try that on Proton! > - PW changes and maybe registration will be back within a couple days. > [...] > ~!~ > > LIBERTY CANARY

Message too long. Click here to view full text.


(9.47 KB 256x256 1691590690961.png)

Anonymous 08/09/2023 (Wed) 14:18:56 No. 12716 [Reply]
/t/, meet Hare, the best programming language in the world.
9 posts and 1 image omitted.
>>15698 Came here to post this.
(51.74 KB 736x369 34atretghj.jpg)

>>15698 >Fuck you Drew. This. That homo punk is a commie and woke AF.
>>16565 so true pegasister

>>7394 Yeah whatever nigger, learn to spell.
>>7367 to be clear i dont really hate security in general im just tired of all this woke BS being shoved by "privacy respecting alternatives" they tend to be hypocrites and ban percieved far-right shit on sight even if they are telling the truth about covid >>7366 actually i use a lesser known VPN service ((protonmail)) is woke i just want something clean and BS free even though its a little bit pricy also i dont get it guys why is brave and waterfox heavily pushed by fanboys eveywhere on 4chan yet you never call them out for thier BS meanwhile we chromefags just stay still while doing our work while you lgbt advocates scream all day about DATAMINING BOTNET! >>7363 torrenting websites dont actively datamine its users nor forces them to sign up with real name also they tend to be silent about politics unlike ((free speech)) sites which are loud and obnoxious >>7374 This. i gotta love the fact that redditors act like tough vigilates whenever someones accused of being a pedo yet no one seems bat an eye when children in thirdworlders get experimented on for profit nobody seems to want to hunt them down even though the names of the CEO and company employees are in some kind of public government database list which they could easily find with time and effort what a bunch of hypocritical cowards they dont even discuss about boycotting them let alone putting it to light
>>7356 I see the opposite, LGTV+ tards are against privacy to hunt down "hate speech" and shit. You glow

(451.07 KB 1440x900 sys.jpg)

WHAT TO DO Anonymous 05/25/2023 (Thu) 23:27:36 No. 12203 [Reply] >>16302
Hi, I am 18. I use linux for 4 years. I run gentoo on my main pc, Void on my x200, and OpenBSD on my x60. I have good experience with security and networks. I like to configure servers and do network programming. I code in C, Lisp, and pure POSIX Shell. I have several servers hosted (with 0% JS, it's evil). What do you think? Am I ready for a sysadmin job or something similar, 'cause I fucking hate employee programming? I don't want to code what I don't fucking want. Please help me! PLEASE HELP MEEEEE!
10 posts omitted.
>>13272 I think its because 8kun or whatever got trending(at least in my community) and niggers are mixing up 8kun with 8chan
>>12203 (OP) None of these are skills human resources normies care about. Apply to everything and LARP your way in, but be prepared to learn javascript and docker and kubernetes and whatever trendy shit du jour happens to be in right now. You get to be picky once you build up some credentials.
what font do you use?

(450.22 KB 731x611 VideoGames.png)

First post on 4chan Anonymous 02/03/2024 (Sat) 03:48:03 No. 14540 [Reply]
This is my first post. It's a pretty funny meme I found.
3 posts omitted.
>>14935 The irony is that games are so shit these days that it causes of the qustion of who would even want to pirate them?
18tb here just for games and... vacation photos (but seriously, mostly filled with games. Steam and Yarr) Jokes on them, try harder EA (this would probably date badly once they figure some asset streaming drm bs)
thats why you delete all games and leave minecraft 1.8.8 eaglercraft.html

Torture/Brainwashing - EM Radiation/Voice2Skull Anonymous 09/25/2023 (Mon) 17:00:53 No. 13173 [Reply] >>16036
https://drive.google.com/drive/folders/1DxmzymDIBdhsuzTlUytuYclefcELefsC?usp=drive_link, https://drive.google.com/drive/folders/1iLLJoa7D4kUrvxt3qfAAAi61zLAJDNDd?usp=drive_link, https://drive.google.com/drive/folders/1UceYrz8dCsozAw0zs_QCTO8kTyW2yWcc?usp=drive_link, https://drive.google.com/drive/folders/1PsHCnB4gPqEOhjOXGsLTa4VuhaeLstgC?usp=drive_link, https://drive.google.com/drive/folders/197DwynBiDdJlVVXmY7D3NF7LUcZsknhi?usp=drive_link 11 Months of physical and psychological torture to "get me to eat vegetables" (make better life choices). I found out they were pedophiles and they've ruined my life. Audio files contain all the torture, beratement, humiliation I endure 24/7 and to this very moment done by illegally bombarding me with EM radiation (sound is in the air). Videos, images, text documents contain information I've been collecting, cars that I've seen following me all over the country, etc... it may not all be accurate, but I'm fearing for my life and not sure how much longer I have to live. I most likely now have cancer from prolonged em radiation exposure and have severe PTSD from the trauma they caused me. Patterns emerge over time, and the pattern is clear: I was never supposed to know this was happening, and because I found out, they've been ruining my life in various terrible ways using technology and social engineering. As far as I can tell, they've been doing damage control for months now, perpetuating the whole ordeal while keeping everyone else who is involved in the dark while they tried to figure out what to do with/about me. Now most people involved know that they've been lied to and that I never consented to any of this nor wanted it in the first place. Even to this very moment as I type I'm hearing, "nobody is going to believe. just kill yourself" over and over. I'm not sure if anybody can help me and I'm suicidal at this point, not because I want to die, but because I've been tortured for 11 months now with no end in sight all to emotionally blackmail me into not doing things they don't want me to like leaving my own house or eating sugar. I was literally actually tortured (isolation, sleep deprivation, drugging, shocking, food/water deprivation, and beratement) for 2 weeks straight earlier this year until they coerced a "confession" out of me to both use as emotional blackmail and to shift their blame onto me while others perpetuated the "process" thinking they were "fixing" me or "helping" me. In the end, they were all lied to by a certain few individuals to cover what they were doing. Evidence I have can be corroborated by others involved and literally anyone who may have been recording anything at any time in the area for any reason........ People involved can corroborate my story and the identities of the people involved; some that I have already identified. I have evidence in my body as far as I can tell and as far as I have been told, but every time I get X-rays to prove such, I never get the results. I've requested medical records from a recent hopsital visit and a doctor visit, both of which I had X-rays done, but I never receive the images with the records even when specifically asking for them. They've stolen my identity and have been controlling basically every aspect of my life for years now. I haven't received any mail for years pertaining to SSD, Medicaid, or otherwise because as far as I can tell, they are lying to the government in my name. I can't work regardless because of what they have done and are still doing to me at this very moment: keeping me in a highly distressed state, running my mind in circles, going through the same story over and over for......brainwashing. And because of that, I sit at home, staring off in space, unable to function as a human. All so they can attempt to force me to do what they believe is "right" or what's "better" for me. - As I type this, they are telling me they are going to tell everyone I'm a pedophile and/or paranoid schizophrenic to smear my name and/or discredit me. It seems quite telling to me that instead of denying any of this, they have already planned to smear my name instead of defending from the facts. So be prepared for some social engineering to sway opinions/emotions instead of focusing on the validity of my claims. I'm currently uploading all of my evidence. I have 200GB of data uploaded already and much more is coming. I am unable to review the evidence myself as they have full control of all my online accounts and computer/phone as far as I can tell. - My physical body is failing at this point, so all I want is to attempt to stop these people from doing this to anyone else before I perish. I've lost 60-70lbs since they started doing this to me. I have a lump on my testicle. I have moles and red spots all over my skin. This may or may not be from radiation exposure they've given me, but I didn't have a lump on my testicle until a few weeks ago. They manipulate my emotions by various means to prevent me from getting the help I need - health, legal, otherwise. And I have accumulated severe PTSD which has affected every aspect of my life. "Nobody is ever going to believe you. Just kill yourself." Torture and brainwashing to eat my vegetables. Please help. Please advise. Some of torturers:

Message too long. Click here to view full text.

4 posts and 2 images omitted.
Just go innawoods and grow vegetables
Your torture was all masterminded by Mike Lindell from Wisconsin. He is the source of all your pain and suffering. You should ask him about it.
>>13173 (OP) Read Robert O. Becker's books. Especially Cross Currents!

(52.93 KB 640x427 Gadsden_flag.svg.png)

ICANN wants to censor the internet Anonymous 08/29/2023 (Tue) 21:48:04 No. 12916 [Reply]
7 posts and 1 image omitted.
censorship is a good thing
>>15035 Fuck off retard

(148.21 KB 1280x1856 Asukabun smol.jpeg)

(66.14 KB 750x1000 POW Block.jpg)

POWBlock - Developing a system agnostic Proof of Work backend Anonymous 07/08/2024 (Mon) 01:36:13 No. 15564 [Reply]
You know, it occurs to me that despite being the site's sysadmin, and this being my bro Codexx's board, I literally never post my tech autism here. Maybe I should change that. If you'll pardon me making the equivalent of a /blog thread, I want to talk about some of my current ideas. As some anons are aware, over the past 4 and a half years I've become something of a guru at programming Varnish VCL. 8chan's entire network is bespoke and we've had to deal with requirements that no normal, Cuckflare-and-cloud-storage website needs. As a result I gained an absolute shitfuckload of hands on experience in hacking Varnish code. This has led to a minor obsession with pushing its boundaries, and making it do useful things that it was never designed to do. One thing that's been on my mind for literally *years* was the idea to make Varnish do the Cloudflare thing with a frontal POW and bot detection system. You can do this with Nginx and setups like this: https://github.com/C0nw0nk/Nginx-Lua-Anti-DDoS which is what Josh used as the basis of his "Kiwiflare" system. But no such tool exists for Varnish. I wanted to change that, and funnily enough I pulled it off several weeks back. It can be done though careful hacks of the error handling subsystem and abusing the object cache to track user session keys. But then I got to thinking, why hoard it? Since my original system was already using an external validator script (the prototype was written in Bash using netcat rofl) why couldn't I just move the system itself to a fast little backend that was designed to hook up with *any* frontend proxy? Not only would it save me a lot of work in the big picture, but other people might use it too. This became the idea for POWBlock. The first thing I decided was that I wanted it to run as a script. There are several reasons for this but the big ones are: Portability, lack of dependencies, and simplicity. The Bash prototype is obviously garbage from a production standpoint, but Python is fat and fucking slow. There is a reason why the Nginx POW system uses Lua. Lua is small, light, fast, low overhead because it was meant for embedded systems, its in every server repo, and has an HTTP server module with solid security and concurrency. Its not good enough to run a whole website off of, but if you want a zippy little script-based HTTP application like this it is far and away the best choice if its something you actually mean to deploy. Since I wasn't a Luafag I needed to start learning. After a week of reading and basic practice, I decided to move forward with some help from ChatGPT, henceforth called "the nig." I've found over the past year that this is great for practicing code. You learn the very basics, design your program yourself and break it into key sections and functions, throw your ideas and functions at the nig, and then learn as you go because you have to debug its shit and occasionally hand-write functions where the bot can't get it right. Its shockingly effective hands-on learning and I've been picking up Lua in record time. Its also nice to just hand the nig a big block of code you banged out and say "comment all this shit for me." Saves a lot of writing. Now you have the backstory, so let's get into the concept. POWBlock is a Lua-based mini-server that has exactly one job: It runs on a box somewhere and serves as an alternate backend for an existing frontend proxy. When a user visits the shielded site, the proxy can send them to POWBlock and force them through a Cloudflare-style Proof of Work browser check (and eventually other checks), give them a cookie to prove they passed, and send them back to the site. You can do this with Varnish, Nginx, and even fucking Apache. Control is handled by the frontend proxy, where you configure rate limiting and other basic anti-DoS functions to protect POWBlock itself from being flooded out, and it uses a system of custom HTTP headers to communicate and for security. My next post will be the prototype code for the server, so you can get an idea what it does.
2 posts and 1 image omitted.
# luapow.vcl - Varnish module for handling Proof of Work (PoW) authentication import redis; # Define a subroutine to handle POW control sub POW { # Check for POW cookie in the request if (req.http.Cookie) { # Parse cookies cookie.parse(req.http.Cookie); # Get POW cookie value set req.http.Cookie-POW = cookie.get("POW"); # Fetch cached POW value from Redis based on user's IP from X-Forwarded-For set redis_key = "user_pow:" + req.http.X-Forwarded-For; if (!redis.is_error(redis.get("RedisServer", "RedisPort", redis_key))) {

Message too long. Click here to view full text.

(106.43 KB 1170x892 Asuka ohai.jpeg)

This is called a VCL Module. They plug into the main VCL code that drives the caching engine via a leading include"" statement. 8chan's network frontends use about 24 of these that I've written over the years, so this is just one more. But you can see some of what we need to handle: First we scrub all custom header values from the client's side, to make sure he can neither spoof nor see any of the headers or values that we're using. Then we parse the user's Cookies looking for POW, and if it exists we ping the Redis storage for the user's IP address to see if there's a stored value. If both exist, and match, the user is let into the site. If they don't match, we run the rest of the POW subroutine, which: >Generates an X-Pow header with a random 8 character session token >Sends the token to the Redis store keyed to the user's IP address >Sets the magic header >Switches the backend from the 8chan main CDN gateway to the POWBlock server >Saves the URL the user was coming in on and sends it in a header >Connects the user to POWBlock with all necessary information supplied What isn't shown: Forward rate limits, DoS throttling, URL locking, request sanitizing, header normalizing, and a bunch of other shit the main VCL code will do for security before it even gets to this spot. I'm sure it'll need to be tweaked for an actual deploy, but I'll cross that bridge when I get to it. And I need to write a nullification module so that if a user gets past this and fucks around, it will null the value of their key in the shared store and force them back to the POW or even ban them entirely. >Why bother with all this shit and why make a Lua server instead of just putting it on the site, maybe with the splash disclaimer? Because it can take upwards of 60% of the load off the frontends in the case of a major attack. POWBlock can run on its own shitbox server (and even have DDoS protection there) and if the site is getting hammered like hell, then its POWBlock taking most of the assraping instead of the servers we actually care about. And these things are so cheap and easy to set up (install Lua, install 3 Lua modules, stick the script in systemd, fucking done) that the servers it would run on can be wholly disposable. You could have 50 of em, each running a forking instance, and divide a big attack up between them.

Message too long. Click here to view full text.

>>15566 >We also generate a weak but unique "server nonce" that is part of the POW calculation No it isn't you nigger. Also if you do this correctly the nonce controls the size of the table an attacker needs to precalculate challenges and 2 bytes is just 65k unique solutions you double nigger. Additionally I imagine you should also clean server_nonces in case users never complete the pow.

(344.05 KB 1278x344 how to code windows.jpg)

Anonymous 03/16/2021 (Tue) 11:31:58 No. 2967 [Reply]
Why Windows sucks so much?
25 posts and 13 images omitted.
>>15312 >installing Japanese Wangblows 10 for 超寝取られ in a VM running inside Wangblows 10+1 instead of putting LANG=ja_JP.utf8 in front of wine gemu.exe on Gentoo Sodomy defenda.
(1.60 MB 3264x2448 IMG_1580.jpeg)

alguien conoce a ese Daniel? vive en Cumbres Le Fontaine
>>15312 Using Linux and wime/vm for uncompatible software is not that hard, nigger; and yes, tinkering is fun, if you don't find it fun then computers are not for you.

Good Microphone for VA? Anonymous 05/28/2020 (Thu) 22:07:57 No. 272 [Reply]
Hey guys, I'm starting to get into voice-acting, and it's honestly something that I've been wanting to do for a long, long time, so now that I have the money and the time, I wanted to really dive into it. Problem is, I am very inept when it comes to audio technology. I'm doing my best to try and learn about the different kinds of mics, and how to hook them all up, i.e. XLR vs. USB, audio interfaces, etc., and it's SORT OF making sense, but really, there's just a kind of overload of information online. Can you guys just help me decide on a good microphone for voice-acting, even entry-level? I have a Blue Snowball iCE right now, but I'd really like something more professional, even if I have to spend a couple hundred. Thoughts? Recommendations? Two that've caught my attention so far are the Shure Beta 58a and the MXL 990, but I don't want to make a shitty purchase and regret it.
6 posts and 1 image omitted.
i have never used these mics but I hear they're good Shure SM57 SM58 SM58 SM58 SM58 AT4040 AT2035 AKG P220
>>471 These plus SM58 Beta and Rode NT1 is good entry level
<How good is this video?

What Program is Best for Decrypting Opera Login Data Files? Anonymous 10/18/2023 (Wed) 17:02:45 No. 13390 [Reply]
So at the beginning of this year my laptop started to fail and I had to send it into PC world for repair. Not long before I did so I was made to change the password for my Google account. I have always relied on web browsers to remember my passwords for some stupid reason. I was able to copy the contents of my C Drive before I did so and so I thought that I would be able to recover my passwords and such easily. Yet I found that opera now encrypts you passwords based on you dapai code and login details. This was never the case before and it seems stupidly paranoid that go to such lengths. I know them all except the one that has been changed yet that password is pretty vital. So I have spent months looking into this, first I thought that the keys hadn’t copied over but they were hidden and I do have the DPAPI master keys and CREDHIST, I also have found a way to view the encrypted passwords and the ones that are the same are encrypted in similar way so that should also make the password easier to find. Yet I still have not found a program that I could use. Windows password recovery program tells me that I entered my password wrong even though I entered it in right, DataProtectionDecryptor gives me “Failed to extract the encryption key” and mimikatz gives me Error kull_m_dpapi_unprotect_blob ; CryptDecrypt(0x80090005), I also found a bunch of linux and python troon programs that claim to be able to do what I am looking for but they require so many addon programs to be installed that you loose track. What am I doing wrong here? What is the best program that can do what I am looking for?
15 posts and 9 images omitted.
I absolutely hate the state of online accounts now, this two factor bullshit is going to lock me out of every account I've had for years. I'm already permanently locked out of several yahoo accounts because I never even knew they were implementing 2FA, now that they have I have no way back in without paying for premium support, they paywalled my fucking accounts. Worse yet is how many accounts on other websites I used those addresses for. All gone. Because of automatic opt-out enforcement of 2FA bullshit. And can we talk about how much of a fucking joke 2FA is? All it does is protect accounts from the fucking owner, the majority of security breaches are always because of exploits and flawed setups on the SERVER side, nothing to do with bad opsec of the end users. so these services continue to build a personally identifiable profile on the user by grabbing your phone number or forcing you to use proprietary phone apps or hardware keys that I'm convinced can be used to de-anonymize since now you have a trail from the key back to whatever company you bought the hardware key from. The fucking irony is that years ago it was always consider poor security to write down a password instead of using one you could just remember, now with hardware keys you have to create a backup of the secret code in case your key breaks or you lose it so you can recover with a second hardware key, which I've heard several "security tubers" advocate for writing down. In spite of the known security issues with SMS for 2FA, businesses like banks continue to only offer SMS, and google makes sure to block virtual numbers. We live in a fucking INSANE ASYLUM. >>15200 it wouldn't be hard to write a python script that takes things you know are in your password and shuffle them around while also adding numbers/special characters, even without threading you could end up generating a thousand possible combinations within a few seconds
>>15309 There's a bit of a problem with that idea, at least if you're talking about an automated I-forgot-my-password-but-I-think-it-contained-this-string bot. If it doesn't guess right in the first three tries, your account is locked for one hour. Set up a bot to do this. It will not achieve one thousand iterations/sec. It will be limited to 72 iterations/day. Bring a lunch.
>>15359 yeah, to actually try each password will take literally forever because websites block you after so many failed attempts, but if all you wanted was to get every possible combination and hand pick the ones you think might be right, that process alone wouldn't take hardly any time

(108.81 KB 600x400 cicada-husks.jpg)

P2P Imageboard Anonymous 02/29/2024 (Thu) 02:50:00 No. 14729 [Reply]
Sup /t/ I've been working on getting a p2p imageboard functioning for a while and I decided to start fresh more recently with a new project. It's still not fully featured per se, but I feel like releasing it in it's current form since it's still functional and I want to see if it works in the wild. Hopefully you'll be able to see the existing boards and start posting. https://gitgud.io/threshold862543/gladden To install: >install node and yarn (or npm instead of yarn) >run "yarn build" to get the dependencies >run "yarn start" to start the server And you can add whatever boards you like. This basically works like a torrent. Moderation is local, so you can delete files and posts that you don't like, but it won't be deleted for others necessarily (unless everyone else blocks them and there are no more seeders). "Subscribing" to others as moderators so you can trust them to delete for you is also possible I just haven't hooked it all up yet.
4 posts and 3 images omitted.
This already existed in a way via Millchan on Zeronet. >>15280 An idea that I had to fix this was to split every file into two parts, a "file" and a "key", with checks on both sender and recipient to make sure that no user ever possessed both the key and file for the same object at the same time, and that when a file was browsed by a user only then would the network also seek out the key and decode it. But it had to be implemented in a particular way. You can't just encrypt a file because possessing "encrypted CP" is still CP, so the idea was that the file would actually be split somehow, like a pattern of alternating bytes, such that the "file" and "key" were each half of the completed object and not merely an encoding scheme applied to the whole.
>>15298 What about a setting (perhaps on by default) for holding images in RAM only, and only while you have the thread open? Is it still a problem since you technically download and upload the data despite not having it on hard drive?
>>15335 Yeah, exactly. If you had the file, and you browsed the site and it tried to load that file, then your system would request the key from someone and then hold it and the resulting completed object in memory only.

[ 1234567891011121314151617181920 ]
Forms
Delete
Report