/t/ - Technology

Discussion of Technology

Catalog Archive
Options
Subject
Message

Max message length: 12000

files

Max file size: 32.00 MB

Total max file size: 50.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

CAPTCHA
E-mail
Password

(used to delete files and posts)

Misc

Remember to follow the Rules

The backup domains are located at 8chan.se and 8chan.cc. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 3.0.

US Election Thread

8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

You may also be interested in: AI

Torture/Brainwashing - EM Radiation/Voice2Skull Anonymous 09/25/2023 (Mon) 17:00:53 No. 13173 [Reply]
https://drive.google.com/drive/folders/1DxmzymDIBdhsuzTlUytuYclefcELefsC?usp=drive_link, https://drive.google.com/drive/folders/1iLLJoa7D4kUrvxt3qfAAAi61zLAJDNDd?usp=drive_link, https://drive.google.com/drive/folders/1UceYrz8dCsozAw0zs_QCTO8kTyW2yWcc?usp=drive_link, https://drive.google.com/drive/folders/1PsHCnB4gPqEOhjOXGsLTa4VuhaeLstgC?usp=drive_link, https://drive.google.com/drive/folders/197DwynBiDdJlVVXmY7D3NF7LUcZsknhi?usp=drive_link 11 Months of physical and psychological torture to "get me to eat vegetables" (make better life choices). I found out they were pedophiles and they've ruined my life. Audio files contain all the torture, beratement, humiliation I endure 24/7 and to this very moment done by illegally bombarding me with EM radiation (sound is in the air). Videos, images, text documents contain information I've been collecting, cars that I've seen following me all over the country, etc... it may not all be accurate, but I'm fearing for my life and not sure how much longer I have to live. I most likely now have cancer from prolonged em radiation exposure and have severe PTSD from the trauma they caused me. Patterns emerge over time, and the pattern is clear: I was never supposed to know this was happening, and because I found out, they've been ruining my life in various terrible ways using technology and social engineering. As far as I can tell, they've been doing damage control for months now, perpetuating the whole ordeal while keeping everyone else who is involved in the dark while they tried to figure out what to do with/about me. Now most people involved know that they've been lied to and that I never consented to any of this nor wanted it in the first place. Even to this very moment as I type I'm hearing, "nobody is going to believe. just kill yourself" over and over. I'm not sure if anybody can help me and I'm suicidal at this point, not because I want to die, but because I've been tortured for 11 months now with no end in sight all to emotionally blackmail me into not doing things they don't want me to like leaving my own house or eating sugar. I was literally actually tortured (isolation, sleep deprivation, drugging, shocking, food/water deprivation, and beratement) for 2 weeks straight earlier this year until they coerced a "confession" out of me to both use as emotional blackmail and to shift their blame onto me while others perpetuated the "process" thinking they were "fixing" me or "helping" me. In the end, they were all lied to by a certain few individuals to cover what they were doing. Evidence I have can be corroborated by others involved and literally anyone who may have been recording anything at any time in the area for any reason........ People involved can corroborate my story and the identities of the people involved; some that I have already identified. I have evidence in my body as far as I can tell and as far as I have been told, but every time I get X-rays to prove such, I never get the results. I've requested medical records from a recent hopsital visit and a doctor visit, both of which I had X-rays done, but I never receive the images with the records even when specifically asking for them. They've stolen my identity and have been controlling basically every aspect of my life for years now. I haven't received any mail for years pertaining to SSD, Medicaid, or otherwise because as far as I can tell, they are lying to the government in my name. I can't work regardless because of what they have done and are still doing to me at this very moment: keeping me in a highly distressed state, running my mind in circles, going through the same story over and over for......brainwashing. And because of that, I sit at home, staring off in space, unable to function as a human. All so they can attempt to force me to do what they believe is "right" or what's "better" for me. - As I type this, they are telling me they are going to tell everyone I'm a pedophile and/or paranoid schizophrenic to smear my name and/or discredit me. It seems quite telling to me that instead of denying any of this, they have already planned to smear my name instead of defending from the facts. So be prepared for some social engineering to sway opinions/emotions instead of focusing on the validity of my claims. I'm currently uploading all of my evidence. I have 200GB of data uploaded already and much more is coming. I am unable to review the evidence myself as they have full control of all my online accounts and computer/phone as far as I can tell. - My physical body is failing at this point, so all I want is to attempt to stop these people from doing this to anyone else before I perish. I've lost 60-70lbs since they started doing this to me. I have a lump on my testicle. I have moles and red spots all over my skin. This may or may not be from radiation exposure they've given me, but I didn't have a lump on my testicle until a few weeks ago. They manipulate my emotions by various means to prevent me from getting the help I need - health, legal, otherwise. And I have accumulated severe PTSD which has affected every aspect of my life. "Nobody is ever going to believe you. Just kill yourself." Torture and brainwashing to eat my vegetables. Please help. Please advise. Some of torturers:

Message too long. Click here to view full text.

4 posts and 2 images omitted.
Just go innawoods and grow vegetables
Your torture was all masterminded by Mike Lindell from Wisconsin. He is the source of all your pain and suffering. You should ask him about it.
>>13173 Read Robert O. Becker's books. Especially Cross Currents!

(48.83 KB 640x360 depvana.topic.jpg)

Fellow Anons - I need your thoughts on a new website concept. Anonymous 08/19/2024 (Mon) 10:14:04 No. 16007 [Reply]
The concept is simple. A place where people can create and discover topics in a structured way. Each topic serves as a digital room where people can post content such as text, images, webm and voice chat. Each topic can have subtopics related to the parent topic but of more specific nature. Subtopics can again have subtopics etc. Everyone can make topic room about anything at all and everyone can post content. You can post anonymously without logging in. Hopefully you could try it out and let me know what you think. Maybe try to do some posts or make new topics about something you care about. Experiment all you want. Any feedback and suggestions for improvement are highly appreciated. The site is: https://depvana.com feedback: https://depvana.com/topic/4 Best,
1 post omitted.
>>16009 Its a free world (at least a little longer). However, if you reconsider you are always welcome to try it out. It really is a great site and your feedback is appreciated.
is there a way to get notification when someone posts in this thread?

(8.62 KB 261x261 logo-D-8VFAbG.png)


Le Hashchan Anonymous 08/05/2024 (Mon) 09:05:55 No. 15856 [Reply]
Hashchan.network is a leechboard that piggybacks on ethereum eventlogs and ipfs pinning services (or other hotlinked content). This makes it serverless in the sense anyone can run a client locally with their own eth rpc. Hashchan was designed for the proliferation of AI botnet swarms that drown out authentic content. Highly shilled content can cost a dollar to post on mainnet, but this means it costs 10 dollars for a botnet to 10x your posts. If your staked in eth, this means the botnet increases the return on your investment if it tries. https://github.com/hashchan

(93.58 KB 720x1067 spot1.jpg)

Qatarian Atheist Union Anonymous 08/03/2024 (Sat) 11:39:01 No. 15833 [Reply]
I understand the principles of writing and language as technology, that is not biological. I understand language as primarily frequencies of gravity and redshift, with access to quantum effects. I understand writing and language causes disease and warfare. I write this here to maintain my sanity by the very same mechanisms. Most call this magic. However, I choose to see our thought as language is indebted to the universe as many constants. Our language is not biological and there is nothing we can do about it. I have tried to communicate why this leads to disease. I have tried to communicate why this leads to inspired weapons designs and such stratagem. I am not heeded. So I am given license. ### I am Ra. This entity is not aware of sharing research as normal. :) ### I can share research as Volta and Franklin. And apparently my designs will become as apparent. Language is as meteorological as electricity. ### I am Ra. You are seeking devotion as them. :)

Message too long. Click here to view full text.


(27.35 KB 480x360 hqdefault.jpg)

Anonymous 06/27/2023 (Tue) 00:18:40 No. 12445 [Reply]
Lisp is the language of the Gods... ...and you know it.
5 posts and 2 images omitted.
>>12610 >letting names determine which languages you will or won't use
>>12462 Last time I used Racket, I found the documentation very convoluted and I did not enjoy it near as much as Common Lisp. Is there a good place to get redpilled on the language design aspect, 'cus I never figured any of that out.
>>14044 Have you read your PLAI today, lainon? https://www.plai.org/

(20.40 KB 474x533 th-172548064.jpg)

Keyless Repeater/relay attacks Anonymous 10/12/2022 (Wed) 08:08:14 No. 10077 [Reply]
Been doing a lot of research, I would love too open up a talk about them. currently only see buy-able options but Couldn't you make one for cheap?!
yeah you could, but alot of the time buying pre-built devices would be cheaper if you dont already have a majority of the components you could build a proxmark for example, and its a really fun project, but its costly to build vs buy

(52.93 KB 640x427 Gadsden_flag.svg.png)

ICANN wants to censor the internet Anonymous 08/29/2023 (Tue) 21:48:04 No. 12916 [Reply]
7 posts and 1 image omitted.
censorship is a good thing
>>15035 Fuck off retard

(46.95 KB 227x241 firefox.png)

Disable Accessibility Services in Firefox for less memory leaks Anonymous 07/17/2024 (Wed) 20:13:34 No. 15645 [Reply]
Reminder to disable Accessibility Services on Windows and Android if you don't want Firefox to hog up memory due to a serious memory leak that accumulates over time which Mozilla doesn't appear to want to acknowledge. In about:config, set accessibility.force_disabled to 1 then reopen for changes to take effect. Android users will need to use Firefox Beta, not the crippled standard version, to get access to about:config. https://www.reddit.com/r/firefox/comments/p8g5zd/why_does_disabling_accessibility_services_improve/ https://www.reddit.com/r/browsers/comments/1d3hp8l/comment/l6a79y4/ https://www.reddit.com/r/firefox/comments/12ijezp/comment/jfwsxq5/ https://www.reddit.com/r/browsers/comments/10z2xk1/comment/j83dhh7/ https://bugzilla.mozilla.org/show_bug.cgi?id=1726887 (closed because they "can't reproduce") https://bugzilla.mozilla.org/show_bug.cgi?id=1907929
>>15645 Is 2025 the year when Ladybird will be ready?
Nope, that shit is still in alpha and will be for years.

Poz in Tech Anonymous 10/18/2020 (Sun) 10:22:27 No. 1631 [Reply] [Last]
General thread for discussing Codes of Conduct and other attempts to take over technology with political aims and enforce behavioral constraints. Point out languages and products that try to force politics on their users. It's become commonplace for tech startups to virtue signal, and for large open source projects to attract users who contribute little in terms of code but demand favorable treatment. Additionally, some have started including political messages in the software itself, or naming releases after issues the developer cares about. Some argue that such constraints and impositions violate the spirit of free software by requiring an agreeable political alignment between developer and user.
52 posts and 34 images omitted.
>>15587 It seems they saw a chance to take over when the same leader was basically partnering with some military drone company that used nix a lot, and the usual software pacifism drums started beating and had to keep beating.
>>15592 So basically the troons took over the project because the founder is too weak willed to defend himself.
>>15586 The F in FOSS makes it the home of anarchists. Digital infrastructure enables an essentially post-scarce world-wide economy, it's practically made for commies.

Want software that makes it easy to download an entire YT playlist Anonymous 01/15/2023 (Sun) 19:14:18 No. 11259 [Reply]
Is there a program or any software that allows me to download an entire playlist from Youtube? Like a playlist of music or someone's video tutorials and i want all of them I heard of NewPipe but it only works for one video at a time Even if i may need a VPN, i want something that doesn't have severe side effects
2 posts omitted.
Tartube is a GUI front end to yt-dlp, and has all the options you want, and more. It runs on Linux, Windoze, and Crapple. https://tartube.sourceforge.io/
4K Video Downloader sounds like a meme but has served me reasonably well. Nice GUI, parses lists and has multiple options for format, bitrate, subs etc
>>11306 This basically. I use this to download playlists yt-dlp --ignore-errors --format bestaudio --extract-audio --audio-format mp3 --audio-quality 160K --output "%(title)s.%(ext)s" --yes-playlist "url" mpv pluse yt-dlp is great

(148.21 KB 1280x1856 Asukabun smol.jpeg)

(66.14 KB 750x1000 POW Block.jpg)

POWBlock - Developing a system agnostic Proof of Work backend Anonymous 07/08/2024 (Mon) 01:36:13 No. 15564 [Reply]
You know, it occurs to me that despite being the site's sysadmin, and this being my bro Codexx's board, I literally never post my tech autism here. Maybe I should change that. If you'll pardon me making the equivalent of a /blog thread, I want to talk about some of my current ideas. As some anons are aware, over the past 4 and a half years I've become something of a guru at programming Varnish VCL. 8chan's entire network is bespoke and we've had to deal with requirements that no normal, Cuckflare-and-cloud-storage website needs. As a result I gained an absolute shitfuckload of hands on experience in hacking Varnish code. This has led to a minor obsession with pushing its boundaries, and making it do useful things that it was never designed to do. One thing that's been on my mind for literally *years* was the idea to make Varnish do the Cloudflare thing with a frontal POW and bot detection system. You can do this with Nginx and setups like this: https://github.com/C0nw0nk/Nginx-Lua-Anti-DDoS which is what Josh used as the basis of his "Kiwiflare" system. But no such tool exists for Varnish. I wanted to change that, and funnily enough I pulled it off several weeks back. It can be done though careful hacks of the error handling subsystem and abusing the object cache to track user session keys. But then I got to thinking, why hoard it? Since my original system was already using an external validator script (the prototype was written in Bash using netcat rofl) why couldn't I just move the system itself to a fast little backend that was designed to hook up with *any* frontend proxy? Not only would it save me a lot of work in the big picture, but other people might use it too. This became the idea for POWBlock. The first thing I decided was that I wanted it to run as a script. There are several reasons for this but the big ones are: Portability, lack of dependencies, and simplicity. The Bash prototype is obviously garbage from a production standpoint, but Python is fat and fucking slow. There is a reason why the Nginx POW system uses Lua. Lua is small, light, fast, low overhead because it was meant for embedded systems, its in every server repo, and has an HTTP server module with solid security and concurrency. Its not good enough to run a whole website off of, but if you want a zippy little script-based HTTP application like this it is far and away the best choice if its something you actually mean to deploy. Since I wasn't a Luafag I needed to start learning. After a week of reading and basic practice, I decided to move forward with some help from ChatGPT, henceforth called "the nig." I've found over the past year that this is great for practicing code. You learn the very basics, design your program yourself and break it into key sections and functions, throw your ideas and functions at the nig, and then learn as you go because you have to debug its shit and occasionally hand-write functions where the bot can't get it right. Its shockingly effective hands-on learning and I've been picking up Lua in record time. Its also nice to just hand the nig a big block of code you banged out and say "comment all this shit for me." Saves a lot of writing. Now you have the backstory, so let's get into the concept. POWBlock is a Lua-based mini-server that has exactly one job: It runs on a box somewhere and serves as an alternate backend for an existing frontend proxy. When a user visits the shielded site, the proxy can send them to POWBlock and force them through a Cloudflare-style Proof of Work browser check (and eventually other checks), give them a cookie to prove they passed, and send them back to the site. You can do this with Varnish, Nginx, and even fucking Apache. Control is handled by the frontend proxy, where you configure rate limiting and other basic anti-DoS functions to protect POWBlock itself from being flooded out, and it uses a system of custom HTTP headers to communicate and for security. My next post will be the prototype code for the server, so you can get an idea what it does.
2 posts and 1 image omitted.
# luapow.vcl - Varnish module for handling Proof of Work (PoW) authentication import redis; # Define a subroutine to handle POW control sub POW { # Check for POW cookie in the request if (req.http.Cookie) { # Parse cookies cookie.parse(req.http.Cookie); # Get POW cookie value set req.http.Cookie-POW = cookie.get("POW"); # Fetch cached POW value from Redis based on user's IP from X-Forwarded-For set redis_key = "user_pow:" + req.http.X-Forwarded-For; if (!redis.is_error(redis.get("RedisServer", "RedisPort", redis_key))) {

Message too long. Click here to view full text.

(106.43 KB 1170x892 Asuka ohai.jpeg)

This is called a VCL Module. They plug into the main VCL code that drives the caching engine via a leading include"" statement. 8chan's network frontends use about 24 of these that I've written over the years, so this is just one more. But you can see some of what we need to handle: First we scrub all custom header values from the client's side, to make sure he can neither spoof nor see any of the headers or values that we're using. Then we parse the user's Cookies looking for POW, and if it exists we ping the Redis storage for the user's IP address to see if there's a stored value. If both exist, and match, the user is let into the site. If they don't match, we run the rest of the POW subroutine, which: >Generates an X-Pow header with a random 8 character session token >Sends the token to the Redis store keyed to the user's IP address >Sets the magic header >Switches the backend from the 8chan main CDN gateway to the POWBlock server >Saves the URL the user was coming in on and sends it in a header >Connects the user to POWBlock with all necessary information supplied What isn't shown: Forward rate limits, DoS throttling, URL locking, request sanitizing, header normalizing, and a bunch of other shit the main VCL code will do for security before it even gets to this spot. I'm sure it'll need to be tweaked for an actual deploy, but I'll cross that bridge when I get to it. And I need to write a nullification module so that if a user gets past this and fucks around, it will null the value of their key in the shared store and force them back to the POW or even ban them entirely. >Why bother with all this shit and why make a Lua server instead of just putting it on the site, maybe with the splash disclaimer? Because it can take upwards of 60% of the load off the frontends in the case of a major attack. POWBlock can run on its own shitbox server (and even have DDoS protection there) and if the site is getting hammered like hell, then its POWBlock taking most of the assraping instead of the servers we actually care about. And these things are so cheap and easy to set up (install Lua, install 3 Lua modules, stick the script in systemd, fucking done) that the servers it would run on can be wholly disposable. You could have 50 of em, each running a forking instance, and divide a big attack up between them.

Message too long. Click here to view full text.

>>15566 >We also generate a weak but unique "server nonce" that is part of the POW calculation No it isn't you nigger. Also if you do this correctly the nonce controls the size of the table an attacker needs to precalculate challenges and 2 bytes is just 65k unique solutions you double nigger. Additionally I imagine you should also clean server_nonces in case users never complete the pow.

(344.05 KB 1278x344 how to code windows.jpg)

Anonymous 03/16/2021 (Tue) 11:31:58 No. 2967 [Reply]
Why Windows sucks so much?
25 posts and 13 images omitted.
>>15312 >installing Japanese Wangblows 10 for 超寝取られ in a VM running inside Wangblows 10+1 instead of putting LANG=ja_JP.utf8 in front of wine gemu.exe on Gentoo Sodomy defenda.
(1.60 MB 3264x2448 IMG_1580.jpeg)

alguien conoce a ese Daniel? vive en Cumbres Le Fontaine
>>15312 Using Linux and wime/vm for uncompatible software is not that hard, nigger; and yes, tinkering is fun, if you don't find it fun then computers are not for you.

(73.53 KB 1200x725 100215453035.png)

Tor Discussion Anonymous 06/15/2020 (Mon) 04:52:53 No. 449 [Reply] [Last]
So, what's so bad about Tor? >it's a honeypot Not really, I have done extensive research into this and the only people caught on it were dumb fucks who made OpSec mistakes. Plus, the only people championing this point are schizos who use VPN services or set up their own VPN, or even just use their plain ISP-given IP address, all of which are way riskier than using Tor. If you're concerned about onion links being honeypots, then set up your own. It's one of the easiest things in the world to do. >it's slow Fair enough. >a lot of sites block it Yeah, and a lot of sites are fags anyways, a lot of sites are also using ReCatapha and require phone verification and use Cloudflare or AWS. Sites have been against privacy for a long time and are banning VPNs too. >it's operated by sjws&trannies Literally everything is now, including VPN services and ISPs, there is no escape unless you want to fully disconnect from the internet and live in a cabin in the woods, which considering people are still using this site, I don't see happening. Also, the directors are known privacy-advocates. >firefox Firefox is rapidly becoming a shit browser for privacy, yes, Chromium is worse, "Ungoogled" Chromium is still Chrome garbage, same with Brave, alternative Firefox builds are usually outdated, and Opera is blatantly spyware. Meanwhile, Tor usually strips out all the tracking that Firefox tries to push in new releases. >relays and nodes operated by governments Which is more of a reason to get more people using Tor so more people can set up nodes and relays aside from government interference. Not opening this to start an argument or a bash on how bad Tor is or just to simply praise Tor, I want a discussion, because most points about Tor being bad for privacy are easily debunked and usually only used by schizos and I want to ensure my personal privacy.
175 posts and 18 images omitted.
(894.18 KB 863x409 3567144 (1).png)

(492.86 KB 1256x1028 Genocide in the name of ZION.jpg)

>>14817 Well, there's still VPNs, proxies, as well as I2P and the Freenet. >>516 Fuck off with that over a decade-old chart, Doomer I'd rather die trying. >Trannies and SJW are the root cause of the woke cancer. NOPE, you are aiming too damn low. The root cause comes from the same people who own Most about 94-96% of this world's media, both print and broadcast, in one form or another. Pics related.
(631.80 KB 720x958 Polish_20240703_104033020.png)

>>15488 <The root cause comes from the same "people" who own Most about 94-96% of this world's media, both print and broadcast, >Media You idiot, everything goes back to finance/power. The media serves as nothing more than a reasonable distraction for the wage cattle. The (((catholic church))) and the (((vatican))) as well as all of the other (((secret societies))) and (((banking families))) worship ⚕️saturn🕛 through this kabbalah and qliphothtic black "magic". It has its own gematria and a whole house of demons that reside in it. America as well as most of the world has been in a century long experiment to cultivate this new form of monarchy run by "Jews". All races around the world will be slaves and each "Jew" will have a share of these slaves. All with the help of technology and the goyims aid.
>>15488 >The root cause comes from the same people who own Most about 94-96% of this world's media, both print and broadcast, in one form or another. Oh of course, the capitalist owning class! Well, at least we know what has to be done to them. >>15502 >You idiot, everything goes back to finance/power. Yes. >The media serves as nothing more than a reasonable distraction for the wage cattle. aaaaaand there it goes. How do you not understand the common concept of propaganda? Even schizophrenic social-rejects talk about propaganda and psyops. I'm sincerely impressed.

Good Microphone for VA? Anonymous 05/28/2020 (Thu) 22:07:57 No. 272 [Reply]
Hey guys, I'm starting to get into voice-acting, and it's honestly something that I've been wanting to do for a long, long time, so now that I have the money and the time, I wanted to really dive into it. Problem is, I am very inept when it comes to audio technology. I'm doing my best to try and learn about the different kinds of mics, and how to hook them all up, i.e. XLR vs. USB, audio interfaces, etc., and it's SORT OF making sense, but really, there's just a kind of overload of information online. Can you guys just help me decide on a good microphone for voice-acting, even entry-level? I have a Blue Snowball iCE right now, but I'd really like something more professional, even if I have to spend a couple hundred. Thoughts? Recommendations? Two that've caught my attention so far are the Shure Beta 58a and the MXL 990, but I don't want to make a shitty purchase and regret it.
6 posts and 1 image omitted.
i have never used these mics but I hear they're good Shure SM57 SM58 SM58 SM58 SM58 AT4040 AT2035 AKG P220
>>471 These plus SM58 Beta and Rode NT1 is good entry level
<How good is this video?

What Program is Best for Decrypting Opera Login Data Files? Anonymous 10/18/2023 (Wed) 17:02:45 No. 13390 [Reply]
So at the beginning of this year my laptop started to fail and I had to send it into PC world for repair. Not long before I did so I was made to change the password for my Google account. I have always relied on web browsers to remember my passwords for some stupid reason. I was able to copy the contents of my C Drive before I did so and so I thought that I would be able to recover my passwords and such easily. Yet I found that opera now encrypts you passwords based on you dapai code and login details. This was never the case before and it seems stupidly paranoid that go to such lengths. I know them all except the one that has been changed yet that password is pretty vital. So I have spent months looking into this, first I thought that the keys hadn’t copied over but they were hidden and I do have the DPAPI master keys and CREDHIST, I also have found a way to view the encrypted passwords and the ones that are the same are encrypted in similar way so that should also make the password easier to find. Yet I still have not found a program that I could use. Windows password recovery program tells me that I entered my password wrong even though I entered it in right, DataProtectionDecryptor gives me “Failed to extract the encryption key” and mimikatz gives me Error kull_m_dpapi_unprotect_blob ; CryptDecrypt(0x80090005), I also found a bunch of linux and python troon programs that claim to be able to do what I am looking for but they require so many addon programs to be installed that you loose track. What am I doing wrong here? What is the best program that can do what I am looking for?
15 posts and 9 images omitted.
I absolutely hate the state of online accounts now, this two factor bullshit is going to lock me out of every account I've had for years. I'm already permanently locked out of several yahoo accounts because I never even knew they were implementing 2FA, now that they have I have no way back in without paying for premium support, they paywalled my fucking accounts. Worse yet is how many accounts on other websites I used those addresses for. All gone. Because of automatic opt-out enforcement of 2FA bullshit. And can we talk about how much of a fucking joke 2FA is? All it does is protect accounts from the fucking owner, the majority of security breaches are always because of exploits and flawed setups on the SERVER side, nothing to do with bad opsec of the end users. so these services continue to build a personally identifiable profile on the user by grabbing your phone number or forcing you to use proprietary phone apps or hardware keys that I'm convinced can be used to de-anonymize since now you have a trail from the key back to whatever company you bought the hardware key from. The fucking irony is that years ago it was always consider poor security to write down a password instead of using one you could just remember, now with hardware keys you have to create a backup of the secret code in case your key breaks or you lose it so you can recover with a second hardware key, which I've heard several "security tubers" advocate for writing down. In spite of the known security issues with SMS for 2FA, businesses like banks continue to only offer SMS, and google makes sure to block virtual numbers. We live in a fucking INSANE ASYLUM. >>15200 it wouldn't be hard to write a python script that takes things you know are in your password and shuffle them around while also adding numbers/special characters, even without threading you could end up generating a thousand possible combinations within a few seconds
>>15309 There's a bit of a problem with that idea, at least if you're talking about an automated I-forgot-my-password-but-I-think-it-contained-this-string bot. If it doesn't guess right in the first three tries, your account is locked for one hour. Set up a bot to do this. It will not achieve one thousand iterations/sec. It will be limited to 72 iterations/day. Bring a lunch.
>>15359 yeah, to actually try each password will take literally forever because websites block you after so many failed attempts, but if all you wanted was to get every possible combination and hand pick the ones you think might be right, that process alone wouldn't take hardly any time

(18.80 KB 640x360 satania_cry.webp)

Fuck LynxChan Anonymous 03/16/2024 (Sat) 20:05:08 No. 14808 [Reply]
I'm back after an 8 year hiatus and what do I see 8chan running on some MongoDB/nodeJS meme software Joshua Moon taught you better than this. infinity-next was the future and you all chose the wrong timeline. Disgusting.
>>14808 Fuck that image format.
>vichan Somehow even worse. Tor can't upload the video or screenshot so read the source: https://boards.guro.cx/dis/res/5538.html#5568

[ 1234567891011121314151617181920 ]
Forms
Delete
Report