Nerve Center

So we fucking lost right? There's no possible way to avoid botnet now that we know that backdooring is possible, they can probably get you from radiowaves too. Should we just become normies now?

F-Droid bans Gab for being a “free speech zone” that will “tolerate all opinions”

The free and open-source software (FOSS) Android repository F-Droid has issued a statement saying that it won’t distribute any apps that promote free speech social network Gab because it’s a “free speech zone” that will “tolerate all opinions.” The decision comes after other apps and websites in the Fediverse, a decentralized collection of blogging and social networking projects, have attempted to censor Gab and goes against the very nature of FOSS.

F-Droid posted a statement about its decision to block Gab apps titled “Public Statement on Neutrality of Free Software” which ironically explains why F-Droid is going against its longstanding principle of staying neutral. The statement also strangely never mentions Gab by name, even though the entire statement is clearly about Gab, and instead refers to it as “a website.”

The statement starts by positioning Gab’s commitment to free speech and diverse opinions as a bad thing:

“To recap the situation: a website joined the fediverse only half a month ago that is well known to be a “free speech zone”, meaning it claims to tolerate all opinions. While in theory this might seem to be a good concept, it has serious consequences: things like racism, sexism, verbal abuse, violent nationalist propaganda, discrimination against gender and sexual minorities, antisemitism and a lot more things become popular on such instances.”

Further on in the statement, F-Droid says that as its ninth birthday approaches, it will be abandoning its history of staying neutral in order to censor Gab:

“F-Droid as a project soon celebrates its 9th birthday. In these 9 years, F-Droid’s mission was and is to create a place where people could download software they can trust – meaning only free, libre and open source software is available on its flagship repository. As a project, it tried to stay neutral all the time. But sometimes, staying neutral isn’t an option but instead will lead to the uprise of previously mentioned oppression and harassment against marginalized groups. We don’t want and won’t support that. F-Droid is taking a political stance here. F-Droid won’t tolerate oppression or harassment against marginalized groups. Because of this, it won’t package nor distribute apps that promote any of these things. This includes that it won’t distribute an app that promotes the usage of previously mentioned website, by either its branding, its pre-filled instance domain or any other direct promotion.”

F-Droid then goes on to say that “moderation” is necessary to prevent “oppression and harassment” from flourishing. This decision by F-Droid is the latest example of censorship that Gab has faced since joining the Fediverse. Prior to the F-Droid ban, numerous Fediverse apps have blocked connections to Gab servers and Google has also said that Gab’s app will be banned from the Google Play Store on July 19 unless it complies with an impossible list of demands.

The censorship Gab has faced from those in the Fediverse directly conflicts with the Four Essential Freedoms of Free Software which people in this community supposedly uphold. Most notably, censoring Gab goes against the first of these freedoms – “the freedom to run the program as you wish, for any purpose.”

Since Gab is the largest node in the Fediverse and recently passed 1 million users, welcoming Gab would likely have provided F-Droid and other developers in the Fediverse with a huge boost in new users. However, they seem willing to sacrifice both the freedoms of free software and potential user growth in order to censor Gab.

Despite this wave of censorship from F-Droid and others, some app developers are staying true to the freedoms of free software and supporting connections to Gab’s servers.

Gab has responded to F-Droid’s decision by branding them as cowards and announcing plans to fork F-Droid’s repository.

Where do we bitch about 5g

5g is USA's Credit System a la China. The 5g installations near traffic lights bomb nearby cars with a certain RF frequency to program a 'stop and go' response to anyone around. This can be used later.

I mean it's really simple programming that starts with the fundamental 'stop and go' of a traffic light.

Now imagine they don't like you. They hit you with the same 'stop' signal outside of some bar where you might pick up chicks to keep you segregated from society.

Imagine now not using a VPN and them tracking your internet usage and blasting you RF accordingly. You show an interest in guns and they hit you with positive RF signals whenever you're looking at guns online.

How much money can they steal from you using this shit? How many shootings will this shit cause? It's not just the Gov't with control of these towers. Google and Verizon both have direct control of this shit.


With the absurd amount of shilling that this gets from (((influencers))) I can't help to believe that NordVPN is some kind of honeypot and/or botnet. There is no way that they can be shilling to so many influencers and have so many organic "how do I use this service" posts on the net.

I am surprised cianigger is not posting regular threads on this subject stressing people to use obviously untrustworthy software.

come tox with me~


>no tox thread

Get in here, fags, let's have a Tox thread.

Looking for Rudolph edition

>favorite client?

>is irungentoo ded?

>will file transfer ever just werk?

Let's share our Tox IDs too. I'll start:


/tech/ Blackpill general

Blackpill is bestpill. Post your strongest blackpills so that we surrender and kill ourselves quicker.


>/tech/ after 2020

>>all relevant motherboards have ME/PSP

>>Windows 10 the only supported Windows

>>all productivity software is subscription-based cloud SaaS

>>all Linux distros without systemd are irrelevant

>>*BSD coc'd

>>alternative OS unusable or nonexistent

>>5G mass-deployed everywhere

>>IPv6 widely adopted, addresses identifying your precise physical location and containing your device's MAC address

>>web browsers ban adblocking

Pale Moon says hackers added malware to older browser versions

Hackers have breached the archive server of the Pale Moon browser project and tainted older browser versions with malware.

The hack went undetected for more than 18 months, according to a breach notice published today by M.C. Straver, the Pale Moon lead developer.

The Pale Moon "archive server" is used to host older versions of the Pale Moon browser, in case users want to downgrade from the current stable version.

"A malicious party gained access to the at the time Windows-based archive server ( which we've been renting from Frantech/BuyVM, and ran a script to selectively infect all archived Pale Moon .exe files stored on it (installers and portable self-extracting archives) with a variant of Win32/ClipBanker.DY (ESET designation)," Straver said today.

The Pale Moon dev said he learned of the incident yesterday, July 9, and immediately took down the compromised archive server.

Hack took place way back in 2017

"According to the date/time stamps of the infected files, [the hack] happened on 27 December 2017 at around 15:30," Straver said, following a subsequent investigation.

"It is possible that these date/time stamps were forged, but considering the backups taken from the files, it is likely that this is the actual date and time of the breach."

The Pale Moon dev said all Pale Moon 27.6.2 and earlier were infected. Curiously, archived older versions of the Basilisk web browsers were not tainted, despite being hosted on the same server.

Ironically, the Pale Moon project missed a chance to detect the intrusion in May this year, when the original archive server encountered a data corruption issue and went down.

"Unfortunately, after the incident that rendered the server inoperable, the files transferred to the new system were taken from a backup made earlier that was already in an infected state due to the passage of time that this breach has gone undetected, so the infected binaries were carried over to the new (CentOS) solution," Straver said.

Going after cryptocurrency users

Users who downloaded files from the archive server are advised to scan their systems or wipe and reinstalls their workstations, to be on the safe side.

The Win32/ClipBanker.DY trojan is a what security researchers call a clipboard hijacker. After it infects victims it sits in an operating system's background, watching the OS clipboard. This particular variant would watch for text snippets that looked like Bitcoin addresses, and would replace them with a pre-configured address, in the hopes of hijacking transactions towards a hacker's own wallet.

The trojan had been previously analyzed in an ESET report dated March 2018. Other versions of this same malware family also had support for replacing Monero addresses.

Old Hardware Thread

The old thread passed the bump limit so I figured I'd make a fresh one. Discuss your old hardware. Are you fixing anything?

I have an IDE to mSATA adapter and an mSATA SSD coming in the mail to fix my thinkpad.

Migrating from Ubuntu/ Debian Mate to OpenBSD, CalmWindowManager. A blog.

>be me

>a hwite cis male w/ penis intact

>hate the b l o a t of Linux, especially ubuntu, especially gnome

>even gnome 2 (mate), your old standby, seems bloated

>don't want to deal with gentoo suit

>hate the fragmentation

>hate the gpl

>hate the CoCk

>plan9 is literally retarded

>9front is 3edgy5me

>haiku is a forever early beta


<absolutely proprietary

>give openBSD a download

>install it on my core2duo machine

>connect to wifi with a config file


>start x with xenodm

>all of cwm's configs in one file

>so simple

>so well documented

>man [ ] pages make sense

>tmux just as good if not better than gnuScreen

>the install was a walk in the park

>easier than debian minimal tbqh

>forced me to learn vi instead of nano

>honestly it's much better

I took the BSD pill. Will you? Or will you keep taking Linus's CoCk and letting Stallman tell you what freedom "really is"???

Why is no-one promoting self-hosted XMPP instead of this autistic govt-backed pozzed Matrix garbage?

I'm hearing all of you bitch about Tor deanonymization and govt controlled nodes and the goddamned autistic pozzed Fediverse, why is no-one promoting a good old-fashioned self-hosted XMPP server with properly verified OMEMO fingerprints? I never hear anyone talk about this option but it has served me well for a long time. Is there a reason no-one considers it a viable means of communication protected against (((them)))?

inb4 "XMPP stanzas are more bloated than whatever Matrix uses because muh XML"

It doesn't make a fucking difference you idiot

Is the CCNA a meme cert or will it actually get me out of help desk to become a network engineer?

is space colonization a meme? will human realistically ever be a multi-planetary species?

hi /g/, there was a device I saw earlier in a documentary but I can't find it again, and I don't know what to search to find it, as I remember only a little about it.

It was an electric device used by the US military and it was about waves as far as I remember, it made a very creepy sound that resembled a human voice. it generated a tone that sounds like a aggressive human voice giving orders. I don't remember the purpose of the device, but it sounded like voice in minute 2:44 of this video

if any of you know what I'm talking about, can you name the device please?

pic unrelated

Beware the Social Score

What will YOU do when the Chinese Social Score comes to your nation?

Don't think for one minute that it won't. Generation Z has been raised to rate everything, from the products they buy, to the sellers they buy from, the restaurants they visit, their teachers, and even the doctors they visit. They rate their uber driver and the uber driver rates them. You have a large generation very used to the concept of rating.

The social media phenomenon has inculcated a narcissistic driven behavioural reinforcement system, by which people are nudged into group pleasing actions in return for high scores. Whether the motivation is purely rooted in vanity, or for monetary award corresponding to subscriber counts, it becomes clear that people are intimately vested in a gamification existence.

This combination of ratings and points is the underbelly for a "Social Score" system that is actually being realized in China today. Fail a test, litter on the street, say something 'politically incorrect', or perhaps staying out too late would result in demerits. Naturally, governments will issue rewards to nudge people into 'correct' behaviour. Those with low scores will be restricted from many services ranging from communications to travel; perhaps dissidents won't even have any freedom of movement! I'm sure you can imagine how such a scheme could also be tied into Universal Income.

(((They))) have primed the younger generation to accept this system, and you're kidding yourself if you think it will be met with but a handful of resistors. The question is then, how do we prevent this dystopian nightmare from emerging before it is too late?

Undress anyone in seconds!

What is GrabTheNudes?

GrabTheNudes is an Artificial Intelligence app which is able to undress anyone in just seconds.

And we are happy to inform you that our version of GrabTheNudes V2 soon will be released!

We are working very hard to improve the software continuously to make sure you will get the best experience while using our app.

If you want to be updated about our software navigate to our website and follow us on Twitter and join our Discord channel to get notified when we will release the software.

Purpose of Logo and Principle of Logo Design

Behold the most /tech/ of all /tech/ articles.

In the past several years, i realized i have a heart for logos. Probably because the nature of logo's simplicity, and often geometrical elegance, and my personal penchant toward these qualities.

Purpose of Logos

Logos, is a graphical representation of a entity. It is the visual analog of names. Logos are particularly important in our modern, capitalistic, corporate environment. Look around you, you can find tens of logos in your immediate surrounding, and recognize each of them or the company, without conscious thinking.

Logo is not a fashion statement. It has strong ties with marketing and public perception, which is a general property to anything representative, such as book covers, corporation's names, your attire.

Principles of Logo Design

/tech/ Questions and Support

Bring all your hardware, software and other troubles here.

Redpill me on Windows 10, /g/. Both technical and political aspects.

Consumer Advice

Looking to buy something but aren't sure what to get? Ask here.

Elon Musk presents: Datajacks

>“Ultimately we can do a full brain machine interface,” Musk said in an announcement that was widely livestreamed. “This is going to sound pretty weird. Ultimately we can achieve a symbiosis with artificial intelligence

>In essence, the device consists of a large number of “threads” (incredibly thin wires with a handful of electrodes on the end of them) which are inserted into the brain in places where they will be able to pick up the electrical signals from individual neurons, a system-on-a-chip that receives and interprets all the data from the threads, and a “pod” worn behind the ear that then relays the data via Bluetooth to a phone or other device running the actual software that uses the neural data

>For those first human clinical trials, which Musk claims will be underway by the end of 2020, Neuralink will be attempting to use its device to allow quadriplegics to control a computer

Finally we're getting the technology part of cyberpunk

OK so hear me out.

Our modern transitors work by etching a specific serires of shapes onto scilicon and the patterns of those shapes make transitors. IT is a uniform pattern. However there is no particular reason why we have to use 1 bit transitors. For example we could use a ternary design.

What I propose is that you have an AI have complete control of how it would be etched and reward the ai when the etching produces the proper output and punish the ai when it is the improper output. Also reward the ai when the output speeds up and uses less power etc. And I propose to you that Ai will not resort to transistors. Depending on the chip you are trying to design the ai will choose an amorphous blob/shape that is optimized precicely to move the electrons how you want without any logic gates and that it will be supra ultra low power

You Can't Opt-Out of Panopticon

Post times people resist pervasive government surveillance, the more creative, obscure, or recent the better.

Camera cross-checked photos of faces of passers-by against wanted database

One man covered face before officers stopped him and took his picture anyway

He was fined £90 at scene in Romford by police who arrested three other people

General Forgotten Technology Thread

Anyone old enough to have used this? Anyone old enough to have used this and ACTUALLY used this?

QUBE was an experimental two-way, multi-programmed cable television system that played a significant role in the history of American interactive television. It was launched in Columbus, Ohio, on December 1, 1977. Highly publicized as a revolutionary advancement, the QUBE experiment introduced viewers to several concepts that became central to the future development of TV technology: pay-per-view programs, special-interest cable television networks, and interactive services.

TL;DR it was an early Cable Service owned by Warner that introduced a lot of the concepts of contemporary cable and though an example of Pay TV, they seem to have not developed the push for it.

Launched site

Hey guys I'm a 19 year old digital nomad living in Eastern Europe (but from America). I launched my first website, Tiblar. It's sort of like Tumblr but has lax rules and more privacy conscious (no ads, no external javascript/css, no logs). Here's a profile with the cyberpunk theme:

The main page:

Any feedback would be awesome. I'm working on a JavaScript free + hidden service version. Open source will come when I'm satisfied with everything. It's still in beta so more features are coming.

new programming language

What if i told you you can have a programming language that's simpler than Python and faster than C?

Share your dream computer, /tech/:

>ThinkPad 701c Body

>4:3, 1080p, small bazel, Matte IPS, can tilt 180 degrees, brightness sufficient for working outside during the day

>USB-A 3.0 ports, one USB-C (charging, data transfer, DisplayPort and HDMI), HDMI, a full-size SD card slot, a headphone/mic port, an Ethernet port, VGA and a charger (two charging options)

>Two hardware kill switches, microphone/camera and wireless/bluetooth

>8gb DDR4

>Risc-V Microprocessor, fanless



Programming General

Making something useful edition. Let's talk about our troubles and successes.


The 1 year anniversary of Terry's death is coming up, August 11th. Any special plans?


How would you implement this, and have the fastest speed possible? I tried this for learning a bit of Rust, but even using a Sieve of Eratosthenes algorithm it takes forever to fetch all the primes. Maybe it's not necessary to fetch all the primes, idk I'm not a mathematician. Wondering how /tech/ would do at this.

>The prime factors of 13195 are 5, 7, 13 and 29.

>What is the largest prime factor of the number 600851475143 ?

I'm a Senior Software Engineer and it took me 12 hours to implement an O(n) sorting algorithm using a linked list in C, a programming language I have been using for a decade now.

I kept on forgetting to reassign the contents of the head address when an item was being added to the head of the list.

I want to die inside.

Found a website

Can someone explain this site?

Does Mozilla have any jewish in their leadership?


I just stumbled upon mastodon an open source microblogging (aka twitter) replacement. As far as I can tell the users of this software stack are either foreign (specifically Japanese) or from the LGBTQ. Why haven't conservatives or the "alt-tech" people tried using this platform yet? It seems to be fairly open, and obscure.

/tech/ webm thread

Been a while since we've had one of these.

What's the political preference of g?

do you think your preferences in software affects your preferences for politics?

Hackers breach FSB contractor, expose Tor deanonymization,etc

Hackers have breached SyTech, a contractor for FSB, Russia's national intelligence service, from where they stole information about internal projects the company was working on behalf of the agency – including one for deanonymizing Tor traffic.

The breach took place last weekend, on July 13, when a group of hackers going by the name of 0v1ru$ hacked into SyTech's Active Directory server from where they gained access to the company's entire IT network, including a JIRA instance.

Hackers stole 7.5TB of data from the contractor's network, and they defaced the company's website with a "yoba face," an emoji popular with Russian users that stands for "trolling."

Hackers posted screenshots of the company's servers on Twitter and later shared the stolen data with Digital Revolution, another hacking group who last year breached Quantum, another FSB contractor.

FSB's secret projects

Per the different reports in Russian media, the files indicate that SyTech had worked since 2009 on a multitude of projects since 2009 for FSB unit 71330 and for fellow contractor Quantum. Projects include:

Nautilus - a project for collecting data about social media users (such as Facebook, MySpace, and LinkedIn).

Nautilus-S - a project for deanonymizing Tor traffic with the help of rogue Tor servers.

Reward - a project to covertly penetrate P2P networks, like the one used for torrents.

Mentor - a project to monitor and search email communications on the servers of Russian companies.

Hope - a project to investigate the topology of the Russian internet and how it connects to other countries' network.

Tax-3 - a project for the creation of a closed intranet to store the information of highly-sensitive state figures, judges, and local administration officials, separate from the rest of the state's IT networks.

BBC Russia, who received the full trove of documents, claims there were other older projects for researching other network protocols such as Jabber (instant messaging), ED2K (eDonkey), and OpenFT (enterprise file transfer).

Other files posted on the Digital Revolution Twitter account claimed that the FSB was also tracking students and pensioners.

Some projects came to be, were tested

But while most of the projects look to be just research into modern technology – which all intelligence services carry out – there are two that appear to have been tested in the real world.

The first was Nautilus-S, the one for deanonymizing Tor traffic. BBC Russia pointed out that work on Nautilus-S started in 2012. Two years later, in 2014, academics from Karlstad University in Sweden, published a paper detailing the use of hostile Tor exit nodes that were attempting to decrypt Tor traffic.

Researchers identified 25 malicious servers, 18 of which were located in Russia, and running Tor version, the same one detailed in the leaked files.

The second project is Hope, the one which analyzed the structure and make-up of the Russian segment of the internet.

Earlier this year, Russia ran tests during which it disconnected its national segment from the rest of the internet.

SyTech, the hacked company, has taken down its website since the hack and refused media inquiries.


Just Fuck a Language Up

>C without pointers

>Haskell without monads

>Java without exceptions

>Python without whitespace

DeepNude source released

>The original DeepNude Software and all its safety measures have been violated and exposed by hackers. It no longer makes sense to hide the code. DeepNude uses an interesting method to solve a typical AI problem, so it could be useful for researchers and developers working in other fields such as fashion, cinema and visual effects.

>This repo contains the core algorithm, not the user interface.

if an image is edited and overriden several times in an image editor, then opened in notepad and edited there also several times, making the file corrupted and unable to open, then deleted, would it still be possible to recover it?



What is punk in this day and age?

Is being opposed to the capitalist class while not giving in to idpol trickery (that includes white nationalism) is most based form of punk that could exist today anons?

ThinkPad (and Toughbook) thread

IBM ThinkPad edition. As usual, the old one hit 400 posts again.

>tfw 2 of the 3 T2x ThinkPads I own have cracked palmrests

What's a scripting language that doesn't suck?


90% of the stdlib is unusable, the syntax is sensible, it's completely useless for anything other than its logical operators which literally anything can do better. For instance sh has a large amount of different kinds of expansion you can use to augment your logic.

Because at least it can get you there with logical operators and whatever you should be using it for will be providing you with nonstandard functions, at least it can be a garbage (but less so than the alternatives) extension language which was its original goal.

Also one of those things that are basically undocumented, and no the horrible manuals on the website or the cashgrab books (thank fuck I pirated them) don't count.


Best syntax except for the fact that even in POSIX builtins it's completely ignored by half the commands (look at getopts syntax for instance). Otherwise you can literally just say "do thing" and it does thing, WOOOOOOOW. No idea how everything else screwed this up so bad.

The ksh manual for instance is 2000~ lines and after that you already know POSIX shell + some bourne/korn extensions, and how limited it all is sadly.

Can't even fucking do argument splitting without requiring you to write an incomprehensible dirty hack, specially if you want to have long opts and will turn into a dirty hack one way or another if your script does anything but run commands in series.


Go back to India.

I'm going to try perl now and if it's shit too I'm not aware of another scripting language.

I don't know what else to try, everything so far is unusable, at least sh works sorta, unlike python and lua which are too shit for even that.

This is wrong

This is wrong. This disgusts me. It should disgust you too. They're adding the recently born to Panopticon. Kill all normies! Fuck the ZOG! Educate the masses! Go into stores to steal and destroy their stock of this! Petition your elected leaders!




Post your current desktop, I'll go first. Taken with an external camera for added aesthetic value.

Hi, i am with the Haiku project here.

If you never heard about it: “Haiku is an open-source operating system that specifically targets personal computing. Inspired by the BeOS, Haiku is fast, simple to use, easy to learn and yet very powerful.”

The project have serious lack of manpower, this is why am i here.

Haiku and the HaikuPorts project searching for devs and experts for the following areas:

- CPP developers

- Go port developers

- Python experts

- driver developers

- marketing magicians

- media related developers

- infrastructure operators

- translators

And many more!

Join today! and

Sorry if this unrelated here.

I stay hete to answer your eventually questions.

Thank you guys!

Is github a free speech git repository or should I move my gamedev github to an alternative?

I want to make some politically incorrect games about jews, niggers and even make child rape games.

Is github safe for this or will they delete my github because of that?

Intel announces new /dev/null Chip

Intel has announced a new version of its /dev/null/ chip to be released the first quarter of 2021. The chip is an improvement on the former chip, the last major revision of was in 2006.

The device, named "E-Devie", is designed to "more effectively" remove the data from the machine more effectively, via an LED to flash to dispose of the data securely.

The chip itself is a standard 8 rail computer chip (replacing the four-rail technology from 2006) functioning with an inductance of the low 4 ohms. It is said that the chip will be compatible with all currently released chipsets by Intel, including IA_64.

Raspberry Pi 4 has been announced. It looks like it's using VC5 because there's actually 1GB 2GB and 4GB versions.

ARM Cortex-A72 @1.5GHz, Wifi, Bluetooth, GbE, and USB3, as well as 2 micro HDMI ports.

Making a USB Swiss Army Drive

So I am going overseas for some time and I am trying to set up a flashdrive with whatever software I need (I'm cheap and can't get a hard drive at this point).

So far I just have some freeware, portableapps, and some customization tweaks. I have some archives of "hacks/computing" zips I found, but I do not trust the source enough to download (all my security programs says its severe risk).

What would you guys suggest I install? I have a 256 GB capacity (~238gb) and preferably want things that can work on ANY computer (namely Windows and Linux) regardless of the computer's state.

How to get a solid foundation in compsci mathematics

This guide assumes you forgot everything from highschool. No you don't have to learn any of this in order to program you can just start hacking around every .c file in your git source clone and see what happens. Why would you want to learn math? Because it will change your thinking. You won't be easily fooled by bullshit, you will have tools to sort through obvious logical fallacies. You will be able to optimize programs and create your own algorithms. You will be able to estimate. Above all, you will be able to solve problems using computation which is what computer science is all about. And least of all, you will get paid more than anybody else without this knowledge so if your goal is shekels then read on. Note: DO THE EXERCISES. You won't learn otherwise. Books instead of video lectures were chosen because they've lasted 30+ years some of them in relevancy in the field, also lectures disappear all the time like when MIT nuked all one prof's Physics OCW lectures because he tried to pickup a student, setting a precedent that at anytime this information can disappear. Read a book nigga.

Math Preliminary

Basic Mathematics by Serge Lang

Buy/Pirate this book (he's dead). It's highschool math, from the perspective of a Mathematician. You will learn up Pre-Calculus and be prepared for rigorous proofs later.

An Introduction to Mathematical Reasoning" by Peter J Eccels

This changes you from rote drilling and being a human calculator in highschool to learning what math actually is, and what proofs do. Excellent, excellent book.

How to Solve It by G. Polya

How to do proofs, written in 1940s and still for sale in every Chapters/B&N bookstore to this day because it's the best proof helper that exists.

Welcome to Proofs

Calculus" by Spivak

Actually, you are learning ANALYSIS, in addition to calculus. Torrent the 3rd edition w/the answer book. This is a fucking hard assed book, you may be better off reading "Advanced Calculus" which is actually easier, as the intro points out that Spivak's exercises are difficult as shit:

Discrete Math Intro it also comes with lectures on jewtubes Doing real discrete math and probability.

Linear Algebra by Friedberg, Insel and Spence

Get the latest version (piracy). It's proof centric, this will come in handy later when you need to understand some Linear applications and don't know how something works so can revert back to your training in LA in proofs. LA is heavily, heavily used in all game programming. Also in cryptography and numerous other CompSci fields.

Competitive Programming

ITT we discuss Competitive Programming , is it useful ? have you tried to be part of team >> etc.

Audio Hardware Thread


What AMPs are you faggots using? I'll be getting an HD 6XX soon and is currently looking for an AMP. I'm currently looking at the Fiio E10K and the K3 but don't know the difference between the two. Any amps you'd recommend?

Gonna make a custom keyboard layout

wanna make it:

> both ergonomic and efficient for typing for long periods of time

> good for using traditional emacs bindings with

what should i research in order to know what to do?

Ubuntu will drop 32-bit x86 arch entirely. If you ever needed an excuse to ditch this absolute joke of a disto in favor of the one they've been copying for years, now would be a good time.

systemd free distro

what is the ultimate systemd free distro?

too many of them

doesn't have to be linux, so bsd or other shits also allowed

requirement: has to support web browser. the only acceptable web browser to use is Tor Browser. so it has to support it

Is it possible to get burnt out on computers?

Is it possible to get burnt out on computers? Im 34 and I have no motivation to learn to code. I want to get outdoors but getting outdoors doesnt pay.

There's a website called "AI Portraits" which is being shilled on multiple boards (including at the bare minimum, /b2/ and /v/) and even cuckchan.

Does this website glow-in-the-dark? I believe it could be to archive who uses the chans or maybe just what they look like.

Adblockers block 8ch from loading

Hi guys. All of the adblockers are now blocking this site from loading. Do you know what list(s) the site has been added to?

How do we defeat this latest attempt?

Is Gab Social Safe?

Since their has been quite a controversy around this site. Is it possible that the government has gotten involved and Gab social is now secretly giving away all our information to the government? And this some front-ploy. If not, is the site even worth using anyway? I don't like signing up for shit

Static/Dynamic Linking and the Administrator and User

So there’s this sort of debate in GNU/Linux between Static and Dynamic linking. Really this is also framed as a debate between musl, which lists static linking as a selling point, and the popular glibc, which afaik dropped static support and only does dynamic linking.

So different C koders have different views on this, but I wanted to see what this might mean for the recipients of the compiled binaries. What would this mean for the end user or an admin in handling their systems. How would performance change? Would anyone have to do anything different? What about compiling a program that’s not in the repos and has no packaged version? Does that change?

Which one is truly better for everyone in the long run?

Why does Tor posting break every other day?

I realize it's not the fault of anyone on /tech/, but why can't they impose the Tor image and captcha restrictions on the regular server and let us post through there?

Is the .onion server just an excuse to break Tor posting every other damn day of the week? Seriously, I legitimately never seen a website that breaks as often, not even for sites hosted in somebody's old Pentium in a moldy garage.

All computers since 2003 can read your keystrokes, screen, files

Full remote backdoor available in all Intel and AMD computers since 2003

All your keystrokes, screens, files can be remotely read or modified on demand at any time by MOSSAD, even if your PC is turned off. That includes your encryption password.

Pre-PSP and pre-ME cpu's are not safe. ASF and DASH are previous versions of PSP/ME botnet. ASF --> DASH --> ME/PSP

Alert Standard Format (ASF) (also sometimes referred to as Alert Standard Forum, Alerting Specifications Forum, Alert Specification Function, etc.) is a DMTF standard for remote monitoring, management and control of computer systems in both OS-present and OS-absent environments.

>DASH provides support for the redirection of KVM (Keyboard, Video and Mouse) and text consoles, as well as USB and media, and supports the management of software updates, BIOS (Basic Input Output System), batteries, NIC (Network Interface Card), MAC and IP addresses, as well as DNS and DHCP configuration. DASH specifications also address operating system status, opaque data management, and more.

they can access your keyboard, video, mouse over the internet

Desktop and mobile Architecture for System Hardware (DASH) is a Distributed Management Task Force (DMTF) standard.

>Intel Active Management Technology is a compliant implementation of DASH.

>Intel Active Management Technology (AMT) is hardware and firmware technology for remote out-of-band management of personal computers,[1][2][3][4][5] running on the Intel Management Engine, a separate microprocessor not exposed to the user, in order to monitor, maintain, update, upgrade, and repair them.

>Intel confirmed a Remote Elevation of Privilege bug (CVE-2017-5689, SA-00075) in its Management Technology on May 1, 2017.[12] Every Intel platform with either Intel Standard Manageability, Active Management Technology, or Small Business Technology, from Nehalem in 2008 to Kaby Lake in 2017 has a remotely exploitable security hole in the ME. [13][14] Some manufacturers, like Purism[15] and System76[16] are already selling hardware with Intel Management Engine disabled to prevent the remote exploit. Additional major security flaws in the ME affecting a very large number of computers incorporating Management Engine, Trusted Execution Engine, and Server Platform Services firmware, from Skylake in 2015 to Coffee Lake in 2017, were confirmed by Intel on November 20, 2017 (SA-00086).


>AMD PRO A-Series platforms utilizing DASH manageability enable manageability features you need and want. These affordable, easy-to-use management tools and features enable remote management of client systems, whether they are powered on (in-band) with a responsive operating system (in-service), or when the clients are powered off (out-of-band) or have a non-responsive operating system (out-of-service). Our powerful management tools also offer remote diagnostics and troubleshooting, asset management, automated system startup and shut down.


>Client systems that support out-of-band management help IT administrators perform tasks independent of the power state of the machine or the state of the operating system. Examples of out-of-band management tasks include: 1) Securely starting up a system remotely, even if it is currently powered off; 2) Viewing asset inventory information for a system that is powered off; 3) Retrieving health information about system components even if the OS is unavailable.

(body too long)

absolute test

Creating an AI?

I've heard of tensorflow and shit, but I'm too much of a fucking brainlet to actually try. I just wonder if it's possible. I know it'll take a while to actually develop a personality, but I figure it should be able to grow with proper interaction.