/t/ - Technology

Discussion of Technology

Catalog Archive
+
-
Options
Subject
Message

Max message length: 12000

files

Max file size: 32.00 MB

Total max file size: 50.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

CAPTCHA
E-mail
Password

(used to delete files and posts)

Misc

Remember to follow the Rules

The backup domains are located at 8chan.st and 8chan.cc. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 3.0 (Temporarily Dead).

Christmas Collaboration Event
Volunteers and Ideas Needed!

.se is now at .st!
Update your bookmarks


8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

You may also be interested in: AI

How do I clean the ePubs and PDFs I've downloaded on Deep Web? Anonymous 08/08/2022 (Mon) 23:45:11 No. 9176 [Reply]
I've just discovered the imperial library and have been downloading some books, but Tor itself says I should only open those files when offline. Is there anyway to "clean" the files, so I don't end up giving my data away?
3 posts omitted.
TAILS might leak your IP, so I would suggest using Whonix in a VM to open the files and not on spyware OSes like windows or mac
>>9462 >and not on spyware OSes like windows or mac or systemd fify

(5.38 KB 259x195 images.jpeg)

Take precautions against secret usb implants Anonymous 08/13/2022 (Sat) 08:26:27 No. 9259 [Reply]
I am using Linux operating system. My computer is not connected to the internet , I formatted it and changed the bios firmware and hard disk firmware. However, the program opens by itself, the mouse cursor moves by itself, and sometimes the system's default audio service is turned off. When I examine it with the Wireshark program, an interrupt signal comes from the usb ports, even though there is no device plugged into the usb ports. The interrupt signal comes from linux's default idle hardware. I have a hidden implant in my computer that looks like the NSA ANT COTTONMOUTH tool. Wireshark logs https://easyupload.io/eqrfr6 This hidden usb implant can easily bypass all antivirus and security software by introducing itself as a hidden system process by overflowing the kernel, regardless of linux or windows operating system, during computer startup. On computers that cannot exceed the kernel security, it introduces itself as a different hardware and takes over the control of the system via memory buffer overflow by overloading the interrupt. No antivirus and security software can detect this situation. This hidden usb implant is not simple usb keyboard like ruber ducky and usb ninja. For this reason, do not recommend simple and useless scripts such as "usb guard". This implant is an advanced usb spying implant similar to NSA COTTONMOUTH. My request from the linux community is to develop a security module for the linux operating system against hidden usb implants.
4 posts omitted.
>>9281 The important thing is not the usb, but the PCI devices group to which the usb is connected. I blocked the USB via the GRUB command line. modprobe.blacklist=xhci_pci modprobe.blacklist=ehci_pci usbcore.nousb=Y This time the PC presents itself as a different PCI device during boot up. Don't give advice to turn it off from bios because there is no "disable usb" option in bios.
Which command should we use?

Oy vey, throw out your accessories, it's the future! Anonymous 08/29/2020 (Sat) 13:05:15 No. 1178 [Reply]
https://www.usb.org/sites/default/files/2019-09/USB-IF_USB4%20spec%20announcement_FINAL.pdf >USB-C connectors mandated >USB 2.0 backwards compatibility minimum (your 1.1 keyboard is now moot) >b-but now you can tunnel PCI-Express Jesus Christ, even Micro$oft gives somewhat of a fuck about backwards compatibility. Do they really think that we'll send a fuckton of hardware right to trash, just because they feel like changing the connector?
13 posts omitted.
>>1181 >native USB 2 ports even though I don't think there's any reason to have those some usb bluetooth adapters say right on the box they need to be in a usb 2.0 port because usb 3.0 operates at 2.4GHz, which interferes with the bluetooth signal. also usb 2.0 is more compatible with stock windows 7 and earlier
>>1180 >Find a keyboard with an usb-c plug in your house. A year and a half late it may be, but the board I've been using for the past four or five years takes USB-C. The computer end is USB-A right now, but a replacement C-to-C cable would be cheap even if I'm still using this board a decade from now and I need to plug into a type C port. Don't tell me, are you using some Jew hardware with non-replaceable cables, so it needs to be thrown away and replaced entirely once the cable frays even if the actual hardware is still good? Do you do that with headphones too?
>>7910 Stop using wireless and Windows.

Let's Learn C Together, Imageboard Style Anonymous 05/02/2022 (Mon) 02:31:22 No. 8314 [Reply] [Last]
So I'm recently getting back into writing code again after a multi-year break. I used to be pretty proficient at BASIC and Visual Basic, BASH scripting, and I dabbled in Perl and PHP. Recently I've decided I want to learn C and git gud at it, but going through lessons and tutorials alone is boring when you have no feedback. There's already a dedicated programming thread, but I think there's enough here to warrant a standalone thread where we go through things together. We'll be using two resources. >C: How to Program - an in-depth textbook >The C Programming Language - long considered the beginner's bible for C >Why bother with C when C++ is a thing? C++ is basically object-oriented C, or C with classes. While C++ is a very useful language C is often more immediately applicable to simple, no-bullshit programs that do useful things. C is simpler, with less weeds to get lost in and is thus quicker to learn. And if you are good at C, then it's just a short hop to learning C++. We learn C to walk before we run. Since I'm a newbie too I'll post useful things I learn and code examples I write ITT for anons to play with, and explain the things I learn both for your benefit and to help me remember them better. If you want to join me, start off by reading The C Programming Language cover-to-cover. If something seems confusing, cross reference it in C: How to Program for a different perspective. Here we go.
98 posts and 50 images omitted.
>>8867 >Though I'm curious if I'd need to free all the elements of (Current) as well, since its just a string and not an array of structs. No, that wouldn't make any sense. Each element in the string is basically an integer, not a pointer. >its just a string and not an array of structs. Technically you've never used an array of structs, only an array of pointers. Try to make a drawing of the memory layout to understand it properly if it's confusing. Then post it so that we can bully you.
>>8870 I mean, in the struct dirent **pages line I'm dereferencing a pointer twice. I suppose it'd be more explicit to say I'm "looking at a pointer that's looking at a pointer that's pointing into an array of structs", but is the pages array created by scandir() not an array of structs? The official literature is a little obtuse as to the structure of the memory segment that scandir() creates.
>>8867 >int pick = (rand() % (randupper-randlower+1)+2); what is this shit its like this idiot pick = rand() % ((randupper+1) - (randlower-1));

Using Secure Passwords - Tips and Tricks Anonymous 05/28/2022 (Sat) 20:54:15 No. 8560 [Reply]
You know the old sayings when it comes to password security. >Never use the same password twice >Choose hard passwords that use numbers, symbols, caps and lowercase >Never write down or store passwords in a way that could be compromised >Change passwords semi-regularly >Never reuse an old password These are great ideas from a technical standpoint, but they completely and totally ignore the human factor. A hard password is difficult to remember, let alone when you have ten of them for ten different sites. Without writing them down somewhere you're likely to forget them, and even more likely to forget the ones you change frequently. This sucks, so I'm going to share a couple tips and tricks I use for making and remembering secure passwords. These two tricks are Passphrases and Catches. >Passphrases A passphrase is like a password but it much easier to structure and remember. It can be any line or quote that is memorable to you for some reason, which you then modify in a rememberable way to make more secure. Let me show you some examples. Starting with a simple phrase like "the quick brown fox" from the famous example of "using every letter in the alphabet", you could easily make this into a very memorable, hard to break passphrase. The addition of one symbol in a particular spot, and capitalizing each word in the phrase other than the first, is a simple adjustment. As a rule, don't always capitalize the first letter of your password, and don't always put your symbols or punctuation at the end, because cracking programs often anticipate this. >the#QuickBrownFox is a seventeen character, secure password. For comparison, try remembering iQd#rgYtbaLsdevPG. The strength is comparable. >Catches

Message too long. Click here to view full text.

2 posts omitted.
>>8561 >being this retarded password breaches happen all the time you moron https://haveibeenpwned.com/
>>8560 >A passphrase is like a password but it much easier to structure and remember. Not so great if shoulder surfing is in your threat model
How about just slapping your hands on the keyboard, selecting a section that's 8-32 characters long, writing it down, and burning the paper after the 20th time you use it? And/or intentionally add characters that are absent from standard keyboards such as £, ¥, ü, ç, æ, ø, and so on.

(642.83 KB 1138x1078 firefox.png)

(59.52 KB 256x256 pale_moon.png)

(13.26 KB 262x119 libre_js.png)

Browser and Internet Privacy Thread Anonymous 08/13/2020 (Thu) 06:48:58 No. 984 [Reply] [Last]
A place to shill for your favorite browsers & addons. Learn how to protect yourself from the botnet. What are your favorite addons and browsing tricks to protect your privacy? Share them here so we can all be a little safer. Browsers Chrome Chrome is somehow still in the lead due to sheer momentum, despite even the dumbest lusers cracking jokes about memory usage. Google has continued to abuse their position as the largest website and browser to force non-standards compliant changes to the way rendering works, generally to their benefit. Should be avoided at all costs. They track everything you do in some way. Chromium Even "de-Google'd" it still phones home and tracks your every move. Plus it gives them market share to bully smaller browsers and websites into complying with their standards. Avoid. Firefox Mozilla is pretty cucked and it's running on Rust these days, but it's a decent compromise between the modernity of Chrome and the standards compliance of something like Pale Moon. It's the closest you can get to a proper browser that's also updated regularly. Addons are worse now that they use Google's "web extensions" API, which is a downgrade from the Mozilla API and no more secure. But the whole "Quantum" thing has it flying, and they are better about standards compliance than Chrome is, and usually only break away because Chrome gives them no choice. Pale Moon The Gentooman's preferred choice, although some sites just don't play nice with it anymore. The last real holdout of old Gecko rendering. Has a diverse ecosystem, but it's basically the remnants of Firefox from yesteryear repackaged. Not bad if you can stand many sites not playing nice.

Message too long. Click here to view full text.

159 posts and 36 images omitted.
>>8535 You are almost certainly a mentally ill autist that is either a homosexual or a pedophile If you are this invested in internet browsers.
>>8536 Say that to my face not online and see what happens

(18.14 KB 256x256 retroshare-symbol.png)

Anonymous 10/25/2021 (Mon) 16:36:44 No. 5889 [Reply]
Lets discuss Retroshare. Why aren't you using it? It has: >Chat >Mail >Forums >Channels >Boards >File Sharing >And More It is an encrypted peer to peer network which can be set up to use Tor and/or I2P to hide your IP from glowniggers. Given that this is a tech board, I'm sure you'll figure out how to set it up. To get started you'll need frens, add me and post your certificate so other frens can add you too. ABAmchg80CCBtxnrp6aOLvxfAxRVqjSuLTmBrHtFyS1IXEVqyo/m6wEDZG16kEIAAAAE5s5jZTJjaXB2NmVxbWptZWhxYnVuZHB5 Mml3aXhxdTJxN2JneHk0YWRneGxnNXI3d2ZmeDdhLmIzMi5pMnCTBgEAAH/mzAQD1Xh0
9 posts omitted.
Is it possible to use Retroshare on Tails? Or should I avoid it?
>>5889 >Chat that's the first reason that comes to mind
>>5889 >Why aren't you using it? Its UI is horrible.

How do i make mods for games? Anonymous 05/16/2022 (Mon) 22:28:15 No. 8459 [Reply]
Hello everyone i was wondering on how i could get started in modding video games and if there any guides out there thank you :)
2 posts and 1 image omitted.
>>8459 well if they dont provide a public API for people to modify the game behavior with then you'll have to get a binary analyzer tool like ghidra or IDA and start reverse engineering the program. Find out where & how it loads stuff, where important memory structs are allocated, how the game logic runs, etc. Then simply patch bytes in the original program to add your own behavior. You can also just try to decompile the entire thing and modify it like that, this is how most java programs are modded, but thats not such an easy process for native programs like this game but maybe its still possible idk never tried. I recommend watching this: https://www.youtube.com/watch?v=w7gBkVXuDSQ&list=PLpnX4b2uRf5-_aLRjuIpav2Zh45C4f2QH
You missed the golden age of [everything] development, there's no going back. https://web.archive.org/web/20040524034647/http://collective.valve-erc.com/

(1.44 MB 1643x2048 2.png)

Anonymous 02/28/2022 (Mon) 08:18:16 No. 7607 [Reply]
How would one theoretically cash out money out of stolen Russian credit cards without possessing names/addresses or phones associated with them? What if said person was theoretically willing to share a lot of said cards with helpful Anons?
2 posts omitted.
>>7676 State employees and their families. Don't think I have anyone big but if I did I wouldn't know.
this is Putin smiling! lol
>>7687 united russia parliament then?

Cock.li stopped allowing new emails to register Anonymous 05/21/2021 (Fri) 21:24:08 No. 4144 [Reply]
Cock.li stopped allowing new emails to register and is only allowing new emails on an invite basis. Vincent claims do to this in reaction to governments using cock.li for foreign intelligence. Is this a canary?
2 posts omitted.
yes because big tech doesnt work directly with governments, theyre literally going to use a literal fucking joke server run by a literal nobody who has access to literally all of their emails how fucking retarded are you, literally vacccine yourself
dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/wiki/E-Mail
I'd help the fellow anons out, but I never made a cock.li account to begin with, but I'd definitely help you out otherwise.

Deepfakes Anonymous 03/23/2022 (Wed) 23:58:45 No. 7882 [Reply]
Is there a retards guide to doing deepfakes and AI generated content? It seems like every mainstream site in existence has purged most information about it so it's hard to figure anything out about it.
2 posts and 1 image omitted.
>>7895 sad cringe losers that get all their info and opinions from the jewtube
>>7895 The same people that think design patterns that sidestep / mitigate OOP are elegant. programming instructors at the community college level tend to breed this counterproductive cargo-cult mentality, but it slowly crept into acadamia as well. To be fair, 'OOP' is the only word they can summon when trying to convey "modular design", "abstraction", "orthogonal design"; their heart is at least in the right place. For many its a rite of passage and they can't imagine any other paradigm, its basically the programming equivalent of circumcision. Its similiar to language teachers trying to get students talking in a formal / polite manner before learning to talk casually. OOP boils down to memorizing terminology, and testing can be done with multiple choice, text-book authors love it, colleges make shit tons of cash off it, etc.
>>7895 OOP is interesting until you realize that it's for mouth breathing fags

(139.33 KB 2184x1344 thinkpad.png)

thonk Anonymous 04/26/2020 (Sun) 20:45:43 No. 7 [Reply]
why tf are there two tech boards also nice original /tech/ revive. Have a thonk
9 posts and 2 images omitted.
>>7685 Could you explain better please?
>>7684 I can give you basic html and css for free just mail me Zxweedxz@mail2tor.com

(161.67 KB 1280x720 MAGAAAAAAAAA.jpeg)

Q PREDICTED THIS!!!!! Q SAID THE VACCINE IS THE KEY THE VACCINE MAKES YOU SUPERHUMAN AND ANYONE NOT VACCINATED WILL DIE FROM THE VIRUS RELEASED BY THE SPACE FEDERATION TRUMP KNEW THIS! THATS WHY HE MADE THE SPACE FORCE AND STARTED PROJECT WARP SPEED TO SAVE HUMANITY TRUMP LITERALLY SAID THE VACCINE IS MAGA THE VACCINE IS BASED AND REDPILLED MAGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
CIA nigger faggot shit
wow, thats cring

(747.16 KB 1170x2532 sdfsG)

anyone know how to validate the signature of a fake covid pass? Anonymous 11/04/2021 (Thu) 11:26:22 No. 6054 [Reply]
does anyone know how to validate the signature of a fake covid pass? i am trying to see if i can do it on the swiss covid cert app
16 posts omitted.
not enough info given, OP this system varies widely from locality to locality EU implementation: https://blog.hqcodeshop.fi/archives/516-Decoding-EU-Digital-COVID-Certificate.html https://github.com/panzi/verify-ehc/ Suppose you could set up your own key server, sign your own QR code using the same RFC method, and have your QR code route to a static page. This guy has a good idea: >>7031 It would not hold up to scrutiny, such as a server-based key-exchange authorization, but it would be a "good enough" forgery for most people (who do not look at URLs or anything else as they're trying to get you through some line.) Or just wait like one-two months because the narrative has already broken down.
>>7493 >make a local server on your android phone with Termux >open local host with your browser >show the certificate to the police officer >??? >profit
>>7506 imagining they scan the QR code you show them with some homosex phone-app, it would need to be hosted somewhere I am presuming a social interaction here because I have never been in this situation

Volatile Blockchain as platform for textboards Anonymous 10/30/2021 (Sat) 22:31:55 No. 5982 [Reply]
I'm sure this has been proposed already by other anons, but I'd like to discuss and understand if it is a viable idea and what would be the weak points of a blockchain with the following characteristics: >Composed by blocks, each block would have a date, the previous block hash, the current hash, a list of posts. >Each post is composed by an id, an hash, a date, a public key for user identification (optional), a title and a message. >Both title and message fields are limited by a certain number of characters. >After a certain block amount (or time), the tail end of the blockchain is discarded >Posts may only be appended to the blockchain by using a small quantity of crypto currency (lets call it PST). >PST is unlimited and should be easy to acquire, possibly by just donating your processing power to miner pools for small amounts of time. >Another currency should be awarded to miners that spend more time and resources (lets call it GLD). This currency must be finite so it can increase in value and give miners a reason to spend processing power. I don't know what type of proofing system should be used to manage block validation, but it should be fast. The main problems that imageboards have are: >pedophilia might be used as a weapon to deplatform the website >abusive moderation >spam By using a text-only approach we can at least make the first problem slightly harder to be exploited. Links to illegal content would still exist and tech-savvy individuals would try to send base-64 encoded CP as text (but this might be mitigated by having a small message limit). Moderation would be non-existent, but this will increase the amount of spam. Third-party sites could offer moderation services where they hide posts in exchange of a fee.

Message too long. Click here to view full text.

11 posts and 4 images omitted.
>>6257 That just begs the question: why is it an inappropriate technology to use in this instance?
Do you guys worry about mass surveillance?
>>7484 Yes, and while you can take some precautions, up to and including refusing to own a phone, if you're that autistic, we all at this point know about PRISM and 5eyes, so it's less "worried" and more "a disagreeable part of the regime" or perhaps "fact of life." One can assume things are tracked by any number of parties and stored forever, and you just have to do your own opsec: the opposite of security is convenience and you have to pick and choose depending on your requirements what amount of the Internet you are willing to use and how you use it.

(34.61 KB 500x500 DELETE.jpg)

hey does anyone have a way to access vimadventures for free Anonymous 07/27/2021 (Tue) 09:49:18 No. 4946 [Reply]
im tryna learn vim but do not want to pay a large amount
11 posts and 2 images omitted.
>>7455 neovim is less gay and lighter
>>7470 mg is less gay and lighter
>>7472 >less than 200KiB that is impressive (although I would have to use eVil mode if anything) does it support the same plugins as gnu emacs or is it just a standalone editor without the extensions/frills?

[ 123456789101112131415161718192021 ]
Forms
Delete
Report