Nerve Center

Linux Kernel ‘Version Final’

Do you think it’s possible for a piece of software like Linux to ever reach a final version and never need an update again and everyone would be satisfied with it? Or is kernel/OS development an endless game of cat and mouse whenever new security holes and bugs are introduced as more and more libraries are being added and more and more hardware is getting supported ad infinitum

Google Blocks Huawei From Using Android on Phones

>Huawei has been blocked from using Google software on its phones, dealing a huge blow to the Chinese tech giant. New Huawei-made phones will not have access to apps such as Gmail, Google Maps and the Google Play store. Existing phones will still have the apps but users will not be able to upgrade to newer versions of the Android operating system.

>Huawei can still use Android’s open-source alternative but it will not include Google’s own-brand apps such as Gmail. Google’s move comes after President Trump banned Huawei from U.S. networks, and the firm said today it was taking ‘steps to comply with recent government actions’.

>The move from Google deals a major blow to the expansion of Huawei and is likely to cripple its expansion.

<This is an unprecedented move that ostracizes what may currently be the best phone manufacturer in the world. Consider that there is no alternative. Phones are either iPhones with iOS or Android devices. No matter how good of an alternative to these Google apps Huawei makes, the fact that their phones don’t have official Google apps will definitely influence people looking for a new phone.

>Huawei confirmed it has developed its own operating system that could replace Google’s Android and Microsoft’s Windows should it be barred from using American-made products. The prospect of being banned from such products has intensified for Huawei in the wake of its recent lawsuit against the US government.

>“We have prepared our own operating system. Should it ever happen that we can no longer use these systems, we would be prepared,” Huawei executive Richard Yu said.

Could this be a chance for a non-Google fork of Android to enter the mainstream market?

Poettering does it again

SystemD uses rand() to generate random bytes for cryptographic purposes.


Why did XNU/Darwin fail outside of Apples own projects?

What does /tech/ think of Funtoo?

I been thinking to use Funtoo instead of Void.

It seemed better to learn how to use Portage.

Does Funtoo really work alot better or should I use Gentoo?

Is there any Funtoo users who use it?

I'm some guy who uses LMMS to make music anyways & also plays HL2 Deathmatch all night when I get tired.

You motherfuckers know your shit

So I am asking if someone could help me do a simple personal HTML where I put images and gifs and they'd be scattered around like so in the page, where I could see everything

And I'd want the page to scroll down automatically, as to showcase all the images I've put on display and if there's a possibility for the cycle to start from beginning in a loop

Right now I am using very bare bones version of:

<!DOCTYPE html>




<img src="C:\Users\Me\Desktop\images\1.jpg">

<img src="C:\Users\Me\Desktop\images\gif\2.gif">

<img src="C:\Users\Me\Desktop\images\3.jpg">



I can only scroll it down myself, the images are next to each other horizontally and theres huge gaps between the images, I don't know how to make them packed tight

I only know very basic code so go easy on me

Carolyne Spengler loves this site!

what's happening, This vast website in a weary world welcomes people like yourself to Share the word! Your fortune: horn domo domo

Challenge: Code a basic hash cracker. Any language. Any hashing algorith.

I decided password recovery / cracking would be a good subject for starting people on security related topics. For you complete /newfags/ a hash is pretty much a one way cryptographic function that in most cases is not reversible. In any modern authentication a password hash is stored rather than a plaintext password.

When you punch in your password on a web application to login the application takes your plaintext and feeds it to a cryptographic function then checks to see if it is equal to the stored value if it matches then access is granted. This way the application can function without every knowing your password.

Purpose of cracking a password hash. Recover a plaintext password user who forgot his password. There are a ton of application that can do this and I will discuss some of that later. Right now I just want to drop the basic concepts.

I'm going to do a dictionary attack against an MD5 hash for demonstration purposes. I'll go over the steps. It's actually pretty simple.

Legal disclaimer. Don't break into other people's computer systems or networks unless you have permission. You put on your own pants in the morning and you know the difference between right and wrong. If you don't know the laws where you are at look them up or consult an attorney before penetrating computers or networks that you do not own.

Alright let's have some fun.

import sys
import hashlib

myhash = sys.argv[1]
thehash = myhash.strip()
dictionary = sys.argv[2]

with open(thedic, 'r') as fa:
for pwd in fa:
newhash = hashlib.md5(pwd.encode("utf-8")).hexdigest()
print 'Trying password ' + pwd.strip() +' ------> '+ newhash.strip()
if newhash == thehash:
print '\n\n\n\nPassword Found! '+pwd.strip()

Content farms flooding search results

Whenever I search for something tech-related, I get thousands of shit-tier normie oriented content farms and tech blogs. Usually they're written by indians, offer no useful information, the pages are js laden, and whatever solutions they offer are proprietary/botnet. I have go through 10-20 pages of links before I find a page not written by a subhuman.

What is the solution to this? Is there a trick I don't know about that everyone else is using? I have long since stopped using jewgle but startpage and searx aren't really much better.

ThinkPad (and Toughbook) thread

IBM ThinkPad edition. As usual, the old one hit 400 posts again.

>tfw 2 of the 3 T2x ThinkPads I own have cracked palmrests

Hertha Mckendrick praises this site!

good morning, This awesome website in a dumb world welcomes people like yourself to Share the word! Your fortune: saibot domo horn

Programming general

Learning a language edition. Let's talk about our troubles and successes.

S. Korean government to switch to Linux: Ministry

The (South Korean) government will switch the operating system of its computers from Windows to Linux, the Ministry of the Interior and Safety said Thursday.

>The Interior Ministry said the ministry will be test-running Linux on its PCs, and if no security issues arise, Linux systems will be introduced more widely within the government.

>The decision comes amid concerns about the cost of continuing to maintain Windows, as Microsoft’s free technical support for Windows 7 expires in January 2020.

>The transition to Linux OS and the purchase of new PCs are expected to cost the government about 780 billion won ($655 million), the ministry said.

>Before the government-wide adoption, the ministry said it would test if the system could be run on private networked devices without security risks and if compatibility could be achieved with existing websites and software which have been built to run on Windows.

>The ministry’s digital service bureau chief Choi Jang-hyuk said the ministry expects cost reductions through the introduction of the open-source OS and also hopes to avoid building reliance on a single operating system.

Newbie Programmer

Hi /tech/, Well the thing is that i know the basics about programming (Variables, Booleans, Strings, Integers, Floats Conditionals, Loops, Functions, Classes, Inheritance, Polymorfysm) and i want to know... what's next? I feel lost right know cause i dont know what to do.

Should i get a job or what? Can you guys told me what's next once you learns the basics?

linux cannot close hanged process

>install linux

>want to close firefox because it closed window but process is still running

>press Ctrl+Alt+Delete

>nothing happens

>open start menu to find task manager or something similar

>no such thing

>type "kill firefox.exe" into cmd

>nothing happens, tells me I need to find some process ID or something

>uninstall linux

linux is bloated malware

>consider installing devuan (debian without systemd)

>installer is 4GB

>consider installing OpenBSD

>installer is 0.4GB

why is linux so bloated and shit?

why don't they provide light and fat installers?

light = kernel, one desktop environment, some crucial software

fat = few desktop environments, a lot of software

any why is linux so bloated even in standard installer?


The global VPN market is estimated to be worth 23.6 billion in 2019 according to:

However, using a commercial VPN has one key disadvantage: You have to trust the company to not keep any logs or spy on you in any other way.

There are currently several projects in crpyo trying to tackle this problem with dVPNs, the idea is very simple, you can rent out or buy bandwidth/IP addresses.

These are the three main players at the moment:

Mysterium: already has a working testnet for windows, mac and android. I routinely use it on windows and android and it works well. They were the first player in the market. Based on Ethereum.

Sentinel: They have a working version on testnet for windows, linux, mac and android. Also works really well. They also offer nodes connecting to tor for outgoing connections and are currently testing multihopping. Based on Cosmos.

Privatix: They are an existing VPN company ( is their page for their "normal" VPN) and they plan to bring over all their vpn users to their dVPN. Also working testnet on windows and linux. Also based on ethereum.

All three of them claim to be the first dVPN, however I think they are on the same level, all have working testnets, so the one that releases to mainnet first is not necessarily farther than the others.

Also all three can tap the market for residental IPs, which are currently very expensive ( is one of the leading providers and a residental IP costs 12.5 Dollar per GB with at least a 500 dollar per month commitment)

dVPNs will be able to beat both commercial VPN providers on price (because of more efficient market) and residental IP providers on price by a far margin. Also Netflix, Hulu,... lock most commercial VPNs because they come from datacenter IPs, they will not be able to do this with dVPNs, as some of them will be just normal residental IP addresses.

copypasta from /g/, what do you think about this?

Willena Lipford adores this site!

hey, This good website in a weary world welcomes people like yourself to Share the word! Your fortune: pheasant smoke dog

dbus oddities

I purge dbus from my system and then install xfce. I got it to launch by symbolically linking dbus-launch to /bin/true and exporting a fake DBUS_SESSION_BUS_ADDRESS to fake network socket linking to /dev/null. But then the xorg-server crashed on startup with the weirdest fucking message

>*insert xorg crashes here*.... dbus-launch --autolaunch=fuck you

I shit you not, that was what appeared on the command line. I grepped through my entire filesystem and the xfce source tree to no avail to find the source of this message, as it shouldn't even appear since dbus is in no fashion installed. If I unsymbolic link dbus-launch it just crashes saying dbus-launch isn't installed. If I symbolic link but don't export DBUS_SESSION_BUS_ADDRESS then it crashes without the extensions to the command, dbus-launch.

/tech/, somebody here surely has gone through this. Where is the "dbus-launch --autolaunch=fuck you" coming from? I can't find it grepping the source files I compiled myself.

Britbongistan testing facial recognition

I feel like a caged animal in my own country I didn't ask to live like this I just wanted to post memes and watch anime.


I was playing around with a usb audio dongle, and I noticed there's this very regular weak audio signal emanating from somewhere.

My first thought was a mechanical harmonic from a switchmode recharger... however it's pure sine wave signal at 1040 Hertz, with no harmonics like pulse waveforms would have, it occurs regularly every 40 minutes, and the tone is keyed at a precisely 2 Hz rate. And as you can see there's a binary value in there (or "MR" in morse code?)

Anyone heard of 1040 Hz being special? Is someone's smartphone doing that illegal advertiser subaudio surveillance shit?

Jeanie Vanek adores this site!

hi-ya, This strong website in a shitty world welcomes people like yourself to Share the word! Your fortune: saibot epic potato

/tech/ Questions and Support

Bring all your hardware, software and other troubles here.

All computers since 2003 can read your keystrokes, screen, files

Full remote backdoor available in all Intel and AMD computers since 2003

All your keystrokes, screens, files can be remotely read or modified on demand at any time by MOSSAD, even if your PC is turned off. That includes your encryption password.

Pre-PSP and pre-ME cpu's are not safe. ASF and DASH are previous versions of PSP/ME botnet. ASF --> DASH --> ME/PSP

Alert Standard Format (ASF) (also sometimes referred to as Alert Standard Forum, Alerting Specifications Forum, Alert Specification Function, etc.) is a DMTF standard for remote monitoring, management and control of computer systems in both OS-present and OS-absent environments.

>DASH provides support for the redirection of KVM (Keyboard, Video and Mouse) and text consoles, as well as USB and media, and supports the management of software updates, BIOS (Basic Input Output System), batteries, NIC (Network Interface Card), MAC and IP addresses, as well as DNS and DHCP configuration. DASH specifications also address operating system status, opaque data management, and more.

they can access your keyboard, video, mouse over the internet

Desktop and mobile Architecture for System Hardware (DASH) is a Distributed Management Task Force (DMTF) standard.

>Intel Active Management Technology is a compliant implementation of DASH.

>Intel Active Management Technology (AMT) is hardware and firmware technology for remote out-of-band management of personal computers,[1][2][3][4][5] running on the Intel Management Engine, a separate microprocessor not exposed to the user, in order to monitor, maintain, update, upgrade, and repair them.

>Intel confirmed a Remote Elevation of Privilege bug (CVE-2017-5689, SA-00075) in its Management Technology on May 1, 2017.[12] Every Intel platform with either Intel Standard Manageability, Active Management Technology, or Small Business Technology, from Nehalem in 2008 to Kaby Lake in 2017 has a remotely exploitable security hole in the ME. [13][14] Some manufacturers, like Purism[15] and System76[16] are already selling hardware with Intel Management Engine disabled to prevent the remote exploit. Additional major security flaws in the ME affecting a very large number of computers incorporating Management Engine, Trusted Execution Engine, and Server Platform Services firmware, from Skylake in 2015 to Coffee Lake in 2017, were confirmed by Intel on November 20, 2017 (SA-00086).


>AMD PRO A-Series platforms utilizing DASH manageability enable manageability features you need and want. These affordable, easy-to-use management tools and features enable remote management of client systems, whether they are powered on (in-band) with a responsive operating system (in-service), or when the clients are powered off (out-of-band) or have a non-responsive operating system (out-of-service). Our powerful management tools also offer remote diagnostics and troubleshooting, asset management, automated system startup and shut down.


>Client systems that support out-of-band management help IT administrators perform tasks independent of the power state of the machine or the state of the operating system. Examples of out-of-band management tasks include: 1) Securely starting up a system remotely, even if it is currently powered off; 2) Viewing asset inventory information for a system that is powered off; 3) Retrieving health information about system components even if the OS is unavailable.

(body too long)

totally not fbi

has anyone here ever successfully created an atomic weapon?

Windows 7 is ending in 2020.

I'm thinking to just keep using Windows 7.

Also what problems did Windows 7 had always?

I never seem to had a Virus/Worm/Trojan/Ransomware for almost more than 8 years.

The only reason why I'm not switching is because of VSTs. I use alot of them & have collections of it.


Thoughts on Esperanto? Any speakers? Where do you shazbots hang out?

I always associated it as being /cyber/ given the international nature while being particularly well-facilitated by the modern age.

So what's your opinion on Firefox and do you use it?

I find it fucking slow and laggy even on the fastest NVMe SSD that money can buy.

But most of all... I just want to know if people on here are as absolutely cucked as 4chans tech board, which basically has a cult following for SJW Mozilla shit - It's like being on Reddit.

LynxChan 2.2

For those who don't know, LynxChan is a new chan engine I have been developing for the past 4 years or so.

Today I started 2.2 beta. It's main feature is the comeback of archives. Not only threads can be archived manually, but also limits for replies can be set for threads to be archived automatically after these limits are passed and the thread is pruned.

On a smaller scale and a more technical aspect was the optimization of ram usage. It should have use 80% to 75% less ram. Boot times have been improved too. And the json api have been merged into the form api too, which should make for a more consolidated api.

Icecat Updated to v60.5.0ESR

New modifications to the git

git clone git://

>* Hardened privacy settings: spoof referers by default, isolate requests to first party origin, and disable sending the origin header to the HTTP server.

>* Extensions:

>"LibreJS" updated to 7.19rc3, Now with Android support!

>Added "ViewTube" + "disable-polymer-youtube" extensions, which allow to browse and play >Youtube videos without JavaScript

>"TorButton" updated to 0.1.

>"HTTPS Everywhere" updated to 2019.1.31

>Improved interface for "Reveal hidden HTML"

>"Third Party Request Blocker" configured to allow requests to subdomains of the same site, known CDN servers (this is fine since we don't send referrers or origin headers), css files, and Youtube resource servers.

>"Third Party Request Blocker" configured to prevent scripts from capturing mouse and keyboard events, as well as zero-width-character tracking mechanisms.

modern HP

There isn't anything wrong with HP's newest laptops. Many argue that HP was on a downfall ever since their first chicklet keyboard laptop made in 1999. HP is by far the most modern computer company yet, they're outappling Apple!

On the topic, most people who bought HP in the 90s didn't mind the Intel Pentium brand or Microsoft Windows 98. There was simply no alternative so people enjoyed proprietary software and Firefox was considered cutting edge FOSS.

Even to today, the most progressive companies out there use HP laptops to power their ever so diversifying companies. Lenovo is for the schools and for the government, HP is for the Soylent drinking modern businesshuman.

Post your best modern HP's that were DESIGNED to run Windows 10

Post sites that don't stink

What are some good sites that respect the client? (regardless of the quality of content on the site)


- Google captcha

- completely non-functional without JS

>crippling penalty:

- banning/captcha-walling Tor or VPN usage

- Cloudflare

- not e2e encrypted

>hard mode:


- aesthetically appealing

>beast mode:

- interactive forum with regular activity

- popular

The install Gentoo Wiki

The Install Gentoo wiki is more or less dead. I have become the primary contributor to it. (I am As the new primary contributor, I contacted bannanafish in an attempt to get admin status but he has not responded.

Anyway, we have an official wiki and none of you are taking part in it. I implore you all to begin editing it again to ensure accurate information.

DNS thread

G'day /tech/, recently I've been searching for good DNS providers and would like to gather some opinions on which on to chose. Currently I'm torn between open-DNS and Cloudflare-DNS but I'd appreciate alternate options.

Thinkpad Thoughts

I was wondering how long a used Thinkpad would last as a daily driver. I'm a more worried about battery life than anything else. Moreover where do I find a cheap x220.

Using GANs to help detect CP

So I've been looking into GANs (Generative Adversarial Networks) and how it can be used to generate human-like faces

The tl;dr is this;

There's a database of say, human faces

Then there's basically a random image generator

The image generator starts spitting images to a neural network that compares the images it spits out to the database of real human faces, the neural network then reports to the image generator how likely or unlikely that image resembles a human face from 0 (not likely at all) to 100 (very likely)

At first the image generator spits out nothing but random noise. The neural network then begins reporting a lot of 0 percents to the generation software

Over time the image generator begins figuring out how to gain higher and higher scores with the neural network. After thousands of generated images the image generator gets closer and closer to 100 percent and the faces now look more human. What was once just a random image generator has turned into something that can literally create photo-realistic faces out of thin air.

My concept for a GAN run CP bot is to reverse the process.

Build a database of CP (controversial, might need some approval body) the train the neural network based on this database like normal. BUT instead of having an image generator, we simply feed it images other people have reported as CP (say, on an imageboard) and then the neural network compares the image, if its greater then 90 percent likely to be CP, then the bot bans the user. If its less then that, the AI flags a human moderator to check on it to see if its a false report and take appropriate action.

Basically use GANs to take some burden off of human moderators, very useful for websites like 8chan itself, without having to have a continuous growing internal CP database which would be more impractical and perhaps more controversial

What do you guys think of my idea?

Rest In Piss, SJW-browser.

S to spit on it's grave.

/Tor dissusion General/ - how the fuck do you make a tor bridge edition

Hey /g/ was hoping some one on here could link me to a step by step guide of how to install a obfs4 tor bridge on a Linux debain stable disto. I've tried following the offical guide that torproject has put up, but keep getting error messages relationg to missing packeges. This can also be a Tor dissusion general

4 years of Rust

On May 15th, 2015, Rust was released to the world! After 5 years of open development (and a couple of years of sketching before that), we finally hit the button on making the

attempt to create a new systems programming language a serious effort!

It’s easy to look back on the pre-1.0 times and cherish them for being the wild times of language development and fun research. Features were added and cut, syntax and keywords were tried, and before 1.0, there was a big clean-up that removed a lot of the standard library. For fun, you can check Niko’s blog post on how Rust's object system works, Marijn Haverbeke’s talk on features that never made it close to 1.0 or even the introductory slides about Servo, which present a language looking very different from today.

Releasing Rust with stability guarantees also meant putting a stop to large visible changes. The face of Rust is still very similar to Rust 1.0. Even with the changes from last year’s 2018 Edition, Rust is still very recognizable as what it was in 2015. That steadiness hides that the time of Rust’s fastest development and growth is now. With the stability of the language and easy upgrades as a base, a ton of new features have been built. We’ve seen a bunch of achievements in the last year:

>We have been StackOverflow’s “Most loved programming language” 4 consecutive years in a row

>We opened up a whole new area of development for stable Rust: embedded development

>Rust+WASM went from an experiment to a usable product, making rustc the first compiler with focus on supporting WASM

>We shipped a new language edition: Rust 2018

> passed a billion downloads and has over 25,000 crates available

>There’s now over 100 meetups around the world, in 42 countries

>6(!) new conferences were spun up (RustRush, RustCon Asia, Oxidize, Rust LATAM, Colorado Gold Rust, RustLab Italy)

This list could go on and on. While the time before and after release was a time where language changes had huge impact how Rust is perceived, it's becoming more and more important what people start building in and around it. This includes projects like whole game engines, but also many small, helpful libraries, meetup formats, tutorials other educational material. Birthdays are a great time to take a look back over the last year and see the happy parts!

Rust would be nothing, and especially not winning prizes, without its community. Community happens everywhere! We would like to thank everyone for being along on this ride, from team members to small scale contributors to people just checking the language out and finding interest in it. Your interest and curiosity is what makes the Rust community an enjoyable place to be. Some meetups are running birthday parties today to which everyone is invited. If you are not attending one, you can take the chance to celebrate in any other fashion: maybe show us a picture of what you are currently working on or talk about what excites you. If you want to take it to social media, consider tagging our Twitter account or using the hashtag #rustbirthday.


Consumer Advice

Looking to buy something but aren't sure what to get? Ask here.

Build Linux Kernel 5.1.2

Some of you have probably noticed a security bulletin floating around. Basically you can send specially crafted packets to TCP port and gain remote code execution on Linux versions prior to 5.0.8

Compiling Linux 5.1.2. Easy enough.



unxz -v linux-5.1.2.tar.xz


gpg --verify linux-5.1.2.tar.sign

gpg --recv-keys 79BE3E4300411886

gpg --verify linux-5.1.2.tar.sign

tar xvf linux-5.1.2.tar

cd linux-5.1.2

cp -v /boot/config-$(uname -r) .config

apt-get install build-essential libncurses-dev bison flex libssl-dev libelf-dev

make menuconfig

#if you need to make changes do so otherwise just exit.



You faggots use it? It is the technically superior of the darknets.

Linux does not support CD (Compact Disc) in 2019

>install linux in 2019

>insert CD (Compact Disc)

>nothing happens

>want to open My Computer, there is no such thing

>open "file manager" instead

>my CD is not present there

>uninstall linux

linux is nigger shit made by brain damaged unix niggers. it's not surprising they have 0% desktop market share. they are biggest failure in human history

/tech/ bombs big tech over internet

what if some /tech/ people that hate Intel, Apple, Adobe, Facebook, Microsoft etc started sending fake bomb threats to those companies? Would they lose money? Would that be illegal?

what else could such people do to those companies to punish them?

Just asking out of curiosity, I am not a law expert

Are you really a programmer? Show us your own 8ch downloader then.

Here's mine.

The Current State of Linux

The Linux community is going to have to nut up and face the hard facts now.

>Windows is still superior for every day uses

>The Linux community is often stereotyped as the 'neckbeard' kind, because they are

>Little to no talent is entering the freeware and open source scene compared to commercial/corporate field

>Fewer and fewer people are utilizing Linux systems to the maximum potential it offers

Ubuntu has been a mess ever since GNOME 3. Linux Mint is seeing a slowly declining user base, Manjaro was experiencing a rising user base but is beginning to stall, and all the while-

<Microsoft Windows 10 continues to blossom, despite being loaded in malware, adware, and spyware

How can we, the Linux community, begin being seen as professional and knowledgeable computational specialists instead of overweight smelly fat guys with naked anime loli body pillows? C'mon guys, we gotta step up our game here. Linux will eventually fade out otherwise, its a wonder it hasn't already.

Banners And Custom Command Shell

I've been messing around with some python and doing reverse tcp shells and shit like that. I won't post that code because shit's not done. But today in the midst of other autism I came up with some things you might find useful for customizing a shell.

Firstly I'm going go over how to make a banner or ascii art. You do it manually and cool if you are into that. But here's a cheater way to do that with python. You can scroll down and copy the script and paste it to a file and save it as

Then grab an image from your collection of dank memes. Line drawings work the best. I was going to figure out how to get a grid of pixels from an image and then use colorama and convert it to color blocks in terminal which would be kinda cool but not genuine ascii art.

Open your image in GIMP >> image >> scale image. Then scale to pixel size that roughly matches the rows and coloumns of your terminal Window.

I did this the Kekistan flag just to see what I could come up with. Came out alright.

python --file /kekflag2.png --scale .5 --out kek.txt --cols 128 --morelevels

You will have to fuck around with this a bit to get the image scale in characters to display right in terminal and look decent.

Once you get the command line syntax you can cat the text file and see what it looks like in terminal. It probably won't look like you want it to at first keep trying different things. The scale option can be floating point so try like .5 .7 if the image takes up to many columns vertically to display correctly.

Once you have the skeleton of what you want. Open up with text editor and manually edit and tweak things to make it look just right.

Have fun with this.

/pol/ infestation

Is the board owner ever going to ban the /pol/ shitters that are ruining this board?

Shill thread

can someone shill a good watch for me,thinking about getting an old school pebble or is that too soy?

Where do we bitch about 5g

5g is USA's Credit System a la China. The 5g installations near traffic lights bomb nearby cars with a certain RF frequency to program a 'stop and go' response to anyone around. This can be used later.

I mean it's really simple programming that starts with the fundamental 'stop and go' of a traffic light.

Now imagine they don't like you. They hit you with the same 'stop' signal outside of some bar where you might pick up chicks to keep you segregated from society.

Imagine now not using a VPN and them tracking your internet usage and blasting you RF accordingly. You show an interest in guns and they hit you with positive RF signals whenever you're looking at guns online.

How much money can they steal from you using this shit? How many shootings will this shit cause? It's not just the Gov't with control of these towers. Google and Verizon both have direct control of this shit.

hey guys I have some photos that NOBODY MAY EVER SEE where can I hide them?

I personally need to look at them about once a week so I can't bury them or anything but NOBODY ELSE CAN EVER LOOK AT THEM or terrible things will happen to me.

what can I do?

tor /cyber/ chatroom

me and some other anons have been talking about /cyber/ chatrooms in privacy thread. we have tried tox but it turned out pretty bad. since then ive been making an tor chatroom. im happily inviting you to try it, it looks promising to me. i want this to be /cyber/ chatroom, not mine or yours or anybodys, this is our chatroom. there are no names, nothing. i would like to improve it furthermore, im open to ALL ideas. also, when an more experienced and trustworthy anon appears, i would like to give him the whole chatroom to operate.


you should download tor if you dont have it already. it gives you very good protection and anonymity. then go to the .onion below and bookmark it when you are there so you dont lose it


hidden gems

What is some underrated/unknown software that you use a lot?

i'll start:




What VPN do you use /g/?

Why is this board so dead?

Someone do something REEEEEEEEEEEE

SHAttering 2 - The second SHAppening

From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1

A chosen-prefix collision attack is a stronger variant of a collision attack, where an arbitrary pair of challenge prefixes are turned into a collision. Chosen-prefix collisions are usually significantly harder to produce than (identical-prefix) collisions, but the practical impact of such an attack is much larger. While many cryptographic constructions rely on collision-resistance for their security proofs, collision attacks are hard to turn into a break of concrete protocols, because the adversary has limited control over the colliding messages. On the other hand, chosen-prefix collisions have been shown to break certificates (by creating a rogue CA) and many internet protocols (TLS, SSH, IPsec).

In this article, we propose new techniques to turn collision attacks into chosen-prefix collision attacks. Our strategy is composed of two phases: first, a birthday search that aims at taking the random chaining variable difference (due to the chosen-prefix model) to a set of pre-defined target differences. Then, using a multi-block approach, carefully analysing the clustering effect, we map this new chaining variable difference to a colliding pair of states using techniques developed for collision attacks.

We apply those techniques to MD5 and SHA1, and obtain improved attacks. In particular, we have a chosen-prefix collision attack against SHA1 with complexity between 266.9

and 269.4 (depending on assumptions about the cost of finding near-collision blocks), while the best-known attack has complexity 277.1. This is within a small factor of the complexity of the classical collision attack on SHA1 (estimated as 264.7). This represents yet another warning that industries and users have to move away from using SHA1 as soon as possible.

Post yfw Bittorent and Git still use SHA1

/cyber/'s VPN of Choice?

Sup /cyber/,

Streaming videos and browsing dissenting sites is getting riskier every day. VPNs will soon become a necessity to maintaining our free-travel across the net.

I was recommended this:

Does /cyber/ know anything better?

TempleOS General - /tosg/

Just installed this fine piece of software, feels like being digitally baptized.

Browser ENGINE Thread

/tech/ has always been known for it's in depth browser threads, but how often do we really look under the hood and discuss the rendering engines that run these browsers and do most of the actual heavy lifting of displaying a webpage? Right now there are three main browser engines:

Webkit: Made by apple. Written in OOPC. Used by Safari. Has official Gtk+ binding for ease of use by pajeets. as easy as gtk+ can be, anyway. Also has external projects making bindings in many other languages.

Blink: Made by google. Originally forked from webkit. Written in C++. Used by Google Chrome. As far as I am aware, there are no bindings for it. If you want to roll your own browser with it, you better know what you're doing.

Gecko: Made by Mozilla. Infected with Rust. Used by Firefox. It used to be good before Mozilla went full retard. Like blink, there are no bindings for Gecko.

Other engines of note:

NetSurf: Originally built for RISC OS. Programmed in ANSI C. Doesn't have HTML 5 support, and is just starting to get Javascript support.

Goanna: Forked from Gecko. Used by Palemoon. Like Gecko used to be before Quantum and the webextensions bullshit.

Servo: Mozilla's experimental engine. Extremely infected with Rust.

Cyberpunk in 2019

Is cyberpunk imageboard culture dead?

/g/punk and Lainchan and /cyber/ were great websites when they first started, but the wave of traffic and fans has long since gone downhill. Is Cyberpunk dying out within imageboard culture? Or is there just less visibility of it due to external factors?

There haven't been many posts on /cyber/ or even /g/'s /cyb/ threads in the past year.

How do I replicate this style?

FODCOM seems to really be interesting when it comes to design. How do I replicate stuff that he does? Asking for a friend here

Why the hell is the GNOME shell written in Javascript?

I thought it was just the extension engine but no, Javascript has literally permeated the entire thing, this is completely absurd. No wonder it's so slow.

Last Words

It's good to be king… Maybe I'm just a bizarre little person who walks back and forth.

Choosing the right VBR bitrate for video encoding

What is arguably the best means to determine the VBR bitrate you should use when encoding video? I understand that there are standard ranges that are typically accepted as good quality in that you can barely tell the difference between the encoded and source version, but what about people like me who want to make painstaking effort in ensuring you can't tell even with the video paused and up close?

Would you really have to find a frame with a section that contains lots of data, run it through multiple encodings, and compare each one? Or is there really truly a gold bitrate standard that is good for everyone, including me?

RMS was always right: Adobe Tells Users They Can Get Sued for Using Old Versions of Photoshop

>Adobe is warning some owners of its Creative Cloud software applications that they’re no longer allowed to use older versions of the software. It’s yet another example of how in the modern era, you increasingly don’t actually own the things you’ve spent your hard-earned money on.

> Adobe this week began sending some users of its Lightroom Classic, Photoshop, Premiere, Animate, and Media Director programs a letter warning them that they were no longer legally authorized to use the software they may have thought they owned.

>“We have recently discontinued certain older versions of Creative Cloud applications and and a result, under the terms of our agreement, you are no longer licensed to use them,” Adobe said in the email. “Please be aware that should you continue to use the discontinued version(s), you may be at risk of potential claims of infringement by third parties.”

> he doesn't use bedrock linux

> he doesn't have 15 distros installed simultaneously

Why bitch about different peoples' distro choices when you can just have them all?

Tell me your story

Share your experiences with this awesome community. How did you become interested in programming? Why did you decide to learn programming? Where has this knowledge brought you in life?

modern HP

There isn't anything wrong with HP's newest laptops. Many argue that HP was on a downfall ever since their first chicklet keyboard laptop made in 1999. HP is by far the most modern computer company yet, they're outappling Apple!

On the topic, most people who bought HP in the 90s didn't mind the Intel Pentium brand or Microsoft Windows 98. There was simply no alternative so people enjoyed proprietary software and Firefox was considered cutting edge FOSS.

Even to today, the most progressive companies out there use HP laptops to power their ever so diversifying companies. Lenovo is for the schools and for the government, HP is for the Soylent drinking modern businesshuman.

Post your best modern HP's that were DESIGNED to run Windows 10

Command-line programs in the current year

Seriously, why do programs that operate strictly via command line exist in the current year? These days, anyone with at least two brain cells to rub together can create even the most rudimentary UI consisting of checkboxes, dropdown lists, and text boxes. In the time it takes you to write an insanely-long documentation that explains every single command line and its proper syntax, you could create a UI that is intuitive and self-explanatory.

This beef comes from me trying to figure out how to use exiftool.exe to remove all tags from an image EXCEPT for the orientation tag. No, this thread is not for you to tell me how to do it since I have since figured it out, but to serve as an example of the bullshit that is command-line-only applications. Here, take a look at the documentation for this program:

You cannot convince me that all of that is completely necessary. Just make a fucking UI. Otherwise, fifty other people will create their own variations of a wrapper for your exe, you will list each and every fucking one of them on your shitty website that looks like it crawled out of the year 2000, and I guarantee that you WILL NOT update your list to remove the 90% of wrappers that fall out of date or become defunct because the developer abandoned them. So now I have to scour a list of wrappers and download/install/use multiple ones before I find the one I want to use that also fucking WORKS.

If you are wanting the exe to serve as a sort of API then also write a wrapper for it rather than make someone else slog through your wall of text to figure out how to do it themselves. At the very least, create a switch metadata file that provides 1) the data type required for each switch (string, number, date, boolean, etc) and 2) any dependencies and interdependencies between switches that others can use to auto-generate their UIs. This way, you can make changes to your metadata file and everyone else's UI would update automatically if they were smart enough to leverage it.

tl;dr: Anyone who creates command-line-only utilities in the current year needs to kys. Prove me wrong. Pro tip: ██████████

Was I pwned?

I just received this email claiming that my PC has been compromised for months and my data is about to be sent to all my contacts.

Has any of you received something similar? It does come from my very own mailbox so it is possible someone else has the password; but his claims seem kinda strange considering I don't reuse passwords, especially not the password.

So how likely are these claims? Should I burn all my devices now?

uBlock adds blocklist which blocks

>Add Energized Blu Go as stock multipurpose list

>A merged collection of hosts from reputable sources. #StayEnergized!

This merges multiple blocklists together, including which includes a filter for

Are we living in the absolute worst time for technology so far in history?

>Windows is full botnet and a disgusting piece of bloatware

>Last "good" windows OS is at the end of it's run

>No Linux desktop has picked up the slack as hoped

>No phones are safe to use

>No phones are free

>5G on the horizon to both give you cancer and track your position at every street corner

>HTTPS cash-grab in full swing

>Every website must have gtag or fb pixel

>No advances in hardware for years

>No advances in network services in years

Has it ever been worse than this and what can be done to make things better?