tor /cyber/ chatroom Anonymous 09/25/2018 (Tue) 18:10:41 [Preview] No. 294 [Reply] [Last 50 Posts]
A few anons on 8ch made an anonymous chatroom behind Tor, but the place is a bit small at the moment. Come and chill with us.
2 posts and 1 image omitted.

Anonymous 10/13/2018 (Sat) 23:33:55 [Preview] No.297 del
NOW WITH 20% ponies!

Anonymous 10/13/2018 (Sat) 23:39:05 [Preview] No.298 del
(65.47 KB 1316x754 TheEnd.png)
now with more features and more people!

Anonymous 10/13/2018 (Sat) 23:41:22 [Preview] No.299 del
(33.25 KB 240x240 Hasbro_4c_no_R.png)
My Little Pony is created by Jews (Hassenfeld and Goldner) for retards (and children) like you.

Anonymous 10/13/2018 (Sat) 23:45:28 [Preview] No.300 del
Owned by Jews, not created. Bonnie Zacherle was its original creator.

Anonymous 10/14/2018 (Sun) 16:22:23 [Preview] No.301 del
Kill yourself.

Terry Davis memorial compilation webm Anonymous 09/30/2018 (Sun) 09:33:39 [Preview] No. 12898 [Reply] [Last 50 Posts]
I want to make a memorial compilation of all his best moments in memorium. This needs to go here, the file size limit on 8ch make this more difficult to do there.

Lets upload and link content here to go into the compilation and let me know what you think the sequence should be and what if any background track.
2 posts and 2 images omitted.

Anonymous 09/30/2018 (Sun) 10:27:32 [Preview] No.12901 del

Anonymous 09/30/2018 (Sun) 10:28:46 [Preview] No.12902 del

Anonymous 10/09/2018 (Tue) 21:12:45 [Preview] No.12905 del

Anonymous 10/09/2018 (Tue) 22:52:20 [Preview] No.12906 del
Is there a youtube channel to youtube-dl? Stream sites he used? need more source material maybe even video of templeos in action .

Anonymous 10/10/2018 (Wed) 19:39:40 [Preview] No.12907 del
Terry had humor not sure if he realized that.

(999.11 KB 360x449 "Et tu, Palemoon?".gif)
Palemoon blacklists NoScript Anonymous 05/12/2018 (Sat) 03:01:36 [Preview] No. 12708 [Reply] [Last 50 Posts]
As the subject says. It's been entered into their custom "bitch at the user with a popup until they disable it" database. To be fair to the developer, he has solid reasons for his stance. I'll try to summarize as there is a lot of misinformation and emotion out there fogging the issue.

1) The Palemoon project does not have enough developer juice to debug other software and addons.
2) Various users: "[website] does not work with Palemoon. Fix your shit, Moonman!"
3) Moonman: "Known issue. Stop being morons and disable NoScript. Thank you, and have a nice day."
4) Various users: "We did. Same problem. Fix your shit."
5) Moonman: "Oh. That's an actual issue with Palemoon then. I'm on it!"
6) Much hacking and cracking and time and talent are expended to no effect. Surprise! NoScript does not follow the standard of letting go of the browser when disabled. It lingers on. It has to be completely uninstalled with an added cache clearing operation on top of that.
7) Moonman: "It's NoScript. Get rid of it. Have a nice day."
8) Various users: "No. FIX YOUR SHIT!"
9) Moonman: "Crush. Kill. DESTROY!"

If you roll with my simplification you can see his point.

I have two observations. First, quite a few sites have a technical support checklist that runs like this: "What browser are you using? Palemoon? Oh good! We have two fixes you may choose from. One, use another browser. Two, go away and do not come back."

My irony sense is tingling.

Message too long. Click here to view full text.

14 posts and 1 image omitted.

Anonymous 07/24/2018 (Tue) 03:53:46 [Preview] No.12847 del
Palemoon is cucked a long time ago, I only use it as a secondary browser.

btw ungoogled-chromium superior

Anonymous 07/31/2018 (Tue) 14:46:46 [Preview] No.12851 del

Been doing UGC for a test drive for some time now. The only irritations I've found so far:

1) No way to conveniently prevent automatic page refreshing.
2) Installing extensions is a bit of a hassle.
3) No non-M$ 32bit version

Only that last is really irksome. Why no 32bit version?

Anonymous 08/01/2018 (Wed) 13:33:07 [Preview] No.12852 del

It also enforces tear off tabs with no way to disable. Something else I hate.

Anonymous 08/25/2018 (Sat) 11:13:21 [Preview] No.12862 del
>no 32bit version
Rather no x86 version. You should've ditched x86 a long time ago.

Anonymous 10/09/2018 (Tue) 12:07:18 [Preview] No.12904 del
>adnausum situation
What ever happened to that? It was making the rounds awhile back and people just stopped talking about it. I tried using it but it was broken as fuck and wouldn't work on my setup so I forgot about it.

Meta Thread Endwall 07/12/2016 (Tue) 12:03:36 [Preview] No. 171 [Reply] [Last 50 Posts]
Post any comments, concerns, or requests for the board in this thread.
Edited last time by Endwall on 07/12/2016 (Tue) 12:15:00.
25 posts and 6 images omitted.

Endwall 02/12/2018 (Mon) 05:05:49 [Preview] No.1113 del

Self defense primarily.

Read these threads the answer is in here:

Anonymous 02/14/2016 (Sun) 00:10:59 [Preview] No. 1726
About the developer:
I will remain anonymous as best I can.
I am not a professional computer scientist or programmer.
I have other commitments and can't maintain a continuous development cycle, but will work on this project sporadically as I have ideas or as issues emerge.Help and assistance on ideas are welcome. Critique and criticism of my tools are also welcome. Positive and negative reviews of experiences using endwall endset and endtools are also welcome.Point out any bugs that you find in the code and or errors in logic or in style or implementation that you find in the script and I may modify it in a release upon review.

Anonymous 02/13/2016 (Sat) 06:51:33 [Preview] No. 1693
1)My hope was to get some help with internet security by starting a thread asking for contributions of techniques and ideas. So far that's worked out pretty well. that ipsets thing has solved a major problem my server was running into. I'm glad I got that tip from here. Thanks >>1652 good work!

Message too long. Click here to view full text.

Endwall 02/12/2018 (Mon) 05:16:08 [Preview] No.1114 del
This entire board >>>/os/ is basically the last 30 mins of Star Trek 2: The Wrath of Khan, with Endwall in the staring roll as Khan, and Admiral Michael Rodgers in the Staring role as Captain James T. Kirk.

Endwall: "I spit my dying last spit at thee Rogers!!"
Admiral Michael Rogers: "ENDWAAAAAAAAALLLLLLLLLLLL!!!!!!!!!!!!!!!!!!!"

Anonymous 02/13/2018 (Tue) 21:59:58 [Preview] No.1118 del
There we go.

Endwall 02/18/2018 (Sun) 05:49:07 [Preview] No.1136 del

How I thought my computer privacy and security and anonymity was doing: [Embed]

How my computer security privacy and anonymity actually is: [Embed] [Embed]
Edited last time by Endwall on 02/18/2018 (Sun) 06:46:54.

>banner Anonymous 10/07/2018 (Sun) 17:27:20 [Preview] No.1326 del
I see this banner as: oops, your penis has been encrypted!

Online Security News Endwall 07/07/2016 (Thu) 06:09:23 [Preview] No. 149 [Reply] [Last 50 Posts]
See a news article or CVE bug report on an emerging computer security issue and want to share it? Post below.

I will also post links to Hak5 Threatwire videos.
Edited last time by Endwall on 07/07/2016 (Thu) 16:22:47.
507 posts and 3 images omitted.

Endwall 09/05/2018 (Wed) 06:16:54 [Preview] No.1307 del
Fortnite Rewards for 2FA, T-Mobile Hacked, and Apache Struts Vulnerable to Hacks - ThreatWire [Embed]

Endwall 09/15/2018 (Sat) 20:27:18 [Preview] No.1308 del
Hacker Charged for Sony and WannaCry Hacks - 8:31 [Embed]

Endwall 09/23/2018 (Sun) 04:14:49 [Preview] No.1309 del
Cold Boot Attacks are Back! - ThreatWire 9:26 [Embed]

Endwall 09/29/2018 (Sat) 08:35:46 [Preview] No.1324 del
No Jail Time for Mirai Authors - ThreatWire [Embed]

Newegg gets hit by the British Airways attackers, a Twitter bug sent direct messages to developers, and the three men behind Mirai don’t receive jail time...

Endwall 10/07/2018 (Sun) 03:02:41 [Preview] No.1325 del
Facebook Hacked, Access Tokens Stolen - ThreatWire 9:41 [Embed]

Linux Vulnerabilities were Found, Current Voting Machines were also found to be Vulnerable to hacks, and Facebook was Hacked!

Anonymous 09/19/2018 (Wed) 14:35:43 [Preview] No. 12870 [Reply] [Last 50 Posts]

posting via it rn
15 posts and 2 images omitted.

Anonymous 09/23/2018 (Sun) 16:36:15 [Preview] No.12893 del
the addresses are effectively the same idea as i2p, hash of public key bundle. the cool part is that the public key bundle has a slot for vanity nonces.

i can put it on my git if you really want an i2p mirror

Anonymous 09/24/2018 (Mon) 17:26:53 [Preview] No.12894 del
will release 0.2.3 soon ish

Anonymous 09/24/2018 (Mon) 19:33:08 [Preview] No.12895 del
(214.36 KB 1766x982 bw.jpeg)
lokinet works with your favorite anime too

Anonymous 09/24/2018 (Mon) 19:43:57 [Preview] No.12896 del
it's also probably compatible with shit anime. haven't tested fully yet.

Anonymous 10/03/2018 (Wed) 12:54:01 [Preview] No.12903 del

OPSEC Endwall 08/23/2016 (Tue) 01:08:39 [Preview] No. 357 [Reply] [Last 50 Posts]
Discuss best practices for operational security.
14 posts omitted.

Anonymous 07/12/2018 (Thu) 19:27:21 [Preview] No.1249 del
(10) Always bleach you browser cache / cookies / web logs! 35x gutmann style! (Bleachbit, Ccleaner, etc.)
(11) Browser Security: Use Noscript Security Suite add-on. Noscript is a must: make sure to block all global scripts, wipe the whitelist in Noscript and re-configure the whitelist that best fits your browser habits. IPFlood is also a useful add-on to obfuscate IP GET requests. You should use Random Agent Spoofer (or Blender) to spoof your browser & OS metadata while you surf the web, making it a lot more difficult to track your activity. Tin Foil is another great security addon. Also, make sure WebGL and WebRTC are disabled in about:config (research how to disable those, there are tutorials out there).
(12) Its best to have two computers, rather than just one. For example, have one just for banking / legit LEGAL purposes. Have another one (completely separated) just for private or illegal activity. Make sure you don't put any personal info in the private computer.
(13) Use encryption and strong passwords! Write them down on a piece of paper or memorize them. DO NOT store passwords on a computer file. That is a big no-no! Try easy to remember long sentences for passwords, and combine all the words together. The more characters used, the harder it is for hackers to break the passwords.
(14) Have separate email accounts for each kind of activity (legal or not, don't matter).
(15) Make sure you physically disconnect your web cam or cover it up with black electrical tape. Most laptops these days come with web cams attached above or below the monitor. Make sure the camera cannot be used to identify you or spy on you in any way. (Yes, webcams can be hacked / remotely hijacked to spy on you!)
(16) Avoid new "Smart TVs" (they spy on you too)! If you have a newer TV, make sure you cover up or unplug the camera and microphone. Or keep it offline and disconnected from the cable box when not in use. You could cancel cable and just rip DVDs of your favorite movies and shows instead, using them on an offline TV set.
(17) Avoid all new digitized vehicles. They can easily be hacked, used to spy on you and even be remotely hijacked by criminal entities/governments!
(18) Never allow another person to use your computer. Make sure you routinely backup important files to a flashdrive or DVD and store that data offline. Also make sure you have a backup copy of the OS you use as well as backups of the software you use. If you ever have problems with your OS someday, just wipe your partitioned OS, and then re-partition the OS again yourself from scratch. Do not allow others to 'fix' your computer, they could easily steal information from your OS you might not want them knowing about. Geek Squad works with the FBI and other agencies to steal data from their customers, do not trust them to fix or repair your computer.
(19) Any photos you take with modern cameras contain EXIF metadata that contain GPS coordinates among other data used to identify the owner of the photo. If you store your modern photos online, people will be able to identify you. Don't do it! I repeat: do not post modern photos online unless you want to be identified! (I have been told PNG formats do not store any metadata, so photos converted to PNG might be safe).

Test your online privacy and learn more:

Anonymous 07/13/2018 (Fri) 15:50:44 [Preview] No.1250 del
I might as well add this report to this OPSEC thread:

Do not allow any electronic made after 2018 into your home and you better have some backup older electronics which don't have cameras and hidden mics. The Wall Street Journal just rubbed it in our face that this is going to become the norm very soon as they will be embedding tiny microphones in almost every single thing they can get away with. So anything digital beyond 2018: don't buy it.

And do avoid things like Echo, Siri and other crap created by the big tech monopolies. Make it clear to your family, relatives and friends you won't allow this around your presence (or at least in your own residence). It is all up to us to wake others up about how they are stealing our data and selling it all over the world and if we allow it we are stupid as a bunch of rocks.

Endwall 07/13/2018 (Fri) 23:55:01 [Preview] No.1251 del

I agree cook your own food. Buy from the local farmer's market, or from the grocery store. Cook your own food in your own house. Don't order in. As you mentioned its easy to poison you once they know your pattern. You call for take out and they intercept the delivery or have someone planted there to poison your pizza.

I just meant to say don't do crime or talk about crime or personal things on the phone, no phone sex, no dirty talk, just innocuous facts, and lawful business. "Hey are we low on milk? Yeah OK I'll pick some up, bye." Nothing about money, politics, drugs, crime, or sex. It's all being recorded digitally and stored, and if you become a "Person of Interest" they go through it and pin point all the incriminating stuff to use on you for blackmail, coercion, criminal indictment, front running etc.

Its too bad that they removed all of the public pay phones...If there were no cameras in the area you had a small level of anonymity (very small). We're going to have to look to an encrypted VOIP by tcp solution for a "Secure Line". Even then don't trust it too much.

Anonymous 09/04/2018 (Tue) 22:26:56 [Preview] No.1306 del
>Use an OS like TAILS or Whonix to spoof your MAC address
Any BSD/Linux machine can do this with GNU macchanger [1].
I don't know how Tails or Whonix does Mac spoofing but I'd imagine they use the same thing.

1: (note: hasn't been updated in 4 years)

Anonymous 09/28/2018 (Fri) 07:34:00 [Preview] No.1323 del
Currently using Icecat 60.2.0 ESR. It comes with by far the best addon I've ever used on any web browser called Searxes' Third-party Request Blocker. I just use that instead of NoScript. Icecat as a web browser has a couple of issues, one of them being the same issue that the Tor browser has. I only install uBlock Origin, CanvasBlocker (enable expert mode to see what I mean), and Greasemonkey. I don't even use a user.js file because I generally trust Icecat. I cannot emphasize enough on how good the addon is. This is still not fully available for most distros but it is available for some.

Discussion Thread Endwall 02/24/2018 (Sat) 01:52:08 [Preview] No. 1145 [Reply] [Last 50 Posts]
Want to say something off topic about anything?

Have a hot tip about something in the computer security world that doesn't fit into any current thread or category?

Want to chat with your fellow invisible 7 proxy friends?

Want to tell Lt. Gen Michael Hayden, GEN Keith Alexander, ADM Michael Rogers, GOOGLE, AMAZON, FACEBOOK and Microsoft etc. how you feel?

It's open mic at >>>/os/ , anything goes!!

Put all of your banter here:
44 posts and 1 image omitted.

Endwall 09/23/2018 (Sun) 20:44:41 [Preview] No.1312 del
OnGard [Embed] [Embed]

Endwall 09/23/2018 (Sun) 21:01:45 [Preview] No.1313 del
Telephone Network Interface Device Box [Embed] [Embed]

Endwall 09/23/2018 (Sun) 21:15:12 [Preview] No.1314 del
Park in a white Van, with battery powered rig, and a 100ft extension cord for the telephone, at 3am. Open it up, connect, post disconnect, lock it, drive away.

Anonymous 09/26/2018 (Wed) 13:16:47 [Preview] No.1321 del
Login, Endwall guy.

Endwall 09/27/2018 (Thu) 04:11:20 [Preview] No.1322 del

I added code tags to >>>/endsoft/

They weren't enabled for some reason. I'm logged in right now, I'll be getting down to homework in a bit, so I'll be off soon. Thanks.

RISC-V desktop Anonymous 09/26/2018 (Wed) 17:35:42 [Preview] No. 12897 [Reply] [Last 50 Posts]
Western Digital published a guide to transform the RISC-V HiFive Unleashed board into a desktop:

SiFive completely open sourced their bootloader:

This means Coreboot can now have more development on SiFi platforms:
The usage of Linux kernel as a payload (instead of bloated UEFI stuff) is going good too with the project LinuxBoot:
Check this (very good) talk:

There's still some blobs, though. The GPU is not open hardware, although some project have open ISA (maybe in the next years):

Message too long. Click here to view full text.

Endware Endwall 05/03/2016 (Tue) 08:54:28 [Preview] No. 32 [Reply] [Last 50 Posts]
Endware is a suite of programs geared towards internet privacy, security, and anonymity.

Endwall: is an iptables based firewall script designed to be implemented on any linux distribution shipped with iptables. is based on default drop policies, coupled with a novel strategy of passing packets on local host ports only for those enabled by the enduser. It comes with a variety of well used ports enabled with several additional port passing configurations available by uncommenting the script. It provides essential security to a new user.

Endsets: is a script that adds blacklisting and whitelisting functionality to It depends on the program ipset. It is persistent on reboot if you enable ipset as a service. This is the recommended blacklisting tool for endwall if you are running a server or planning on opening up ports and services to the public and will require daily blacklisting of new incomming IPs.

Endlists: is a traditional text file list based blacklisting and whitelisting script. It has slow performance, and can't be updated on the fly. Good for <1000 ip subnets, very tedious and slow to run for more than that. Blocks the IPs by adding them as individual rules to the iptables ruleset. Works but not recommended for heavy duty on a server. May be useful for workstation use to block ip ranges if you are not opening up ports and services to public clients.

Endtools: endtools are a collection of scripts including,, and These scripts will help to service an enduser of endwall in adminstering endsets/endlists. is a geoiplookup script written in python and requires python and pygeoip. It has simmilar functionality to maxmind's geoiplookup program and uses the maxmind *.dat files. is a script that searches through log files to find flagged log entries flagged in, and is a daily log reading script designed to read the output of an apache http server's log output. is a daily log reading script designed to read the output of a postfix smtp server's log output.

Message too long. Click here to view full text.

218 posts and 3 images omitted.

Anonymous 09/26/2018 (Wed) 00:40:41 [Preview] No.1316 del
Also, a proxychecker. In Haskell. Works as a filter, based on libcurl bindings

module Main where
import Network.Curl
import Control.Concurrent
import Data.Maybe
--import Threads

get proxy = curlGetString "" [CurlProxy proxy,
CurlTimeout 5]

check curloutput = fst curloutput == CurlOK

thrputStrLn iolock string = do putMVar iolock 1
putStrLn string
_ <- takeMVar iolock

Message too long. Click here to view full text.

Endwall 09/26/2018 (Wed) 07:46:50 [Preview] No.1317 del
Cool. I'll check out your stuff on the weekend. I'm stuffed up with Chemistry labs, and Physics Labs, and Math homework, pretty much everyday now. I'm going to be a weekend poster for the next 4 months. But I'll be more active after Christmas. Keep up the good work.

Endwall 09/26/2018 (Wed) 07:52:26 [Preview] No.1318 del
If you have more cool stuff / good ideas, feel free to post them here. What I've read looks good so far. If you want to Endware them / add them to the collection, we can talk about it. Thanks for sharing.

Anonymous 09/26/2018 (Wed) 13:13:12 [Preview] No.1319 del
I have a small thing fetching Telegram channels in the browser on the /endsoft/. That board doen`t have
 support, so some syntax may be garbled.

And it looks like this board eats all the spaces in the code.
So that Haskell source in on now.

I don`t have any particular ideas. Just want to learn to code.

>Endware them / add them to the collection
Consider these scripts being in public domain. Feel free to include them anywhere you want.

Anonymous 09/26/2018 (Wed) 13:16:24 [Preview] No.1320 del
Got used to wakabamark. LOL. How do I escape the markup These [​co​de] things and all? HTML chars?

(98.58 KB 752x1061 473734734.jpg)
Anonymous 06/24/2018 (Sun) 20:08:57 [Preview] No. 12806 [Reply] [Last 50 Posts]

P2P web browsing via websites served and shared on individual nodes:
users can create their own websites and host them from their own computers/servers
users can upload and share other's websites on their own computers/servers
self serviced websites are manually named *but will generate a random entropy hash within the url, example:
node://7bv45ix0/ or node://c334o96y/
*the random entropy hash prevents individuals from creating and overriding other established websites
endless domain creation: .com, .org, .info, .onion, .rebel, .on, .geek ... et al (infinite)
browser can access HTTP, HTTPS, FTP, Zeronet, Beaker, eMule/eDonkee and various obscure networks.
browser is enabled for users to share files with others, creating decentralized P2P file sharing
the browser would have its own built-in decentralized search engine similar to YaCy that can pull up any content found
high standard end-to-end encryption would be active by default for all P2P connections
browser has a lightweight bit-torrent client built-in
onion routing is not mandated but the option would be allowed within the browser
I2P routing would also be an option for users
Dust and IPFS could be utilized in the browser for further anonymity and resilient decentralization.

Message too long. Click here to view full text.

4 posts omitted.

Anonymous 07/12/2018 (Thu) 22:23:33 [Preview] No.12835 del
You want an internet suite stuffed into one browser?
That's sorta something what Seamonkey and ChromeOS do and dozens of failed projects before them did.
Which is not really good. Having interoperability and data exchange between different gui applications is cool, but having your browser to do all the work is asking for a trouble with too much attack surface. I am also pretty sure, you can have all this shit like accessing zeronet, irc, tor and i2p, download torrents and email with set of web browser addons.
You should also understand that hosting stuff from home computer puts drawbacks on availability compared to a remote VPS in a professional datacenter, or a dedicated server in your basement with nig-rigged car battery UPS which not everyone is eager to invest in.
>the random entropy hash prevents
You just came up with some useless bullshit. Look at how onion, eepsite, gnunet and cjdns domains are resolved and generated. It should not only be a "random hash", but also act as a public encryption key or public key hash without reliability on someone's DNS servers.
The main problem of "le decentralized internet" is how easy it would be for external powerful actor to remove pieces of it, and remove them not only for one group of users, but for everyone. Let's say you live in small corrupt country and post on facebook. Your country's government wants to remove your posts from facebook, but until those break facebook's tos or facebook has big-money business in your country, they don't care. And what would your country do then, ddos facebook or block it? The latter is feasible, but blocks can be avoided, the data still exists on Facebook's servers and is available for those who put much effort in it.
Now say again, you live in Ancapistan Enterprizes Real Estate. A society of decentralized Internetz and such. You host your blog from home, a small single board server and a 1 gbit unlimited connection, pretty nice isn't it? One day you post something bad about McFacebook corporation on your blog. Automated web crawlers of YaCy search engine detect wrongthink and it triggers McFacebook CEO personally. What happens next? They simply DDOS your weak 1gigabit-wide channel to the point when your ISP, or datacenter where your VPS is hosted disconnects your server for consuming too much traffic and blackholes all requests coming for your address, your server is already inaccessible at this moment. It's done, McFacebook corporation completed it's mission and eliminated you quickly. What would you do next? You either go to your ISP or some decentralized CDN provider and ask them to implement a DDOS protection, i.e. you have to find someone who will host your shit for free on pure enthusiasm (ipfs and webtorrent) or for thousands of shekels (Cloudflare) or in exchange for datamining (Facebook). Now you get the same modern Internet and web, where you have to host your important information on a big datacenter with wide bandwidth, distribute content over wide network of CDNs and gateway proxies.

Anonymous 07/18/2018 (Wed) 15:43:21 [Preview] No.12841 del
Yeah, some girls wrote it years ago
Then google hired them and gave them soul crushing jobs so they would forget about ever having written the wooden stake that could kill the google vampire

Anonymous 09/21/2018 (Fri) 15:23:03 [Preview] No.12879 del
>because will you accept to pay electricity and general infrastructure to host the website of someone else
Just similar to torrents. There is no need to have a full copy, giving endchan as example you could only have /tech/ and a few threads from other boards. You just seed when your pc is on anyway, that should not be expensive. Alternatively some retarded cryptocurrency stuff can be added.

OS Anonymous 09/21/2018 (Fri) 18:21:53 [Preview] No.12884 del
This relly sound like an OS.
You would need to become a router for a lot more traffic.
u also ned moar than jus browser.
I'm too dumb to see how a build in email client wouldn't be a
security threat.

Anonymous 09/22/2018 (Sat) 21:14:27 [Preview] No.12892 del
Isn't ZeroNet similar?

(34.60 KB 1200x800 DhabSjYW4AE8qu5.jpg)
The div that looks different in every browser. Anonymous 07/11/2018 (Wed) 23:02:51 [Preview] No. 12826 [Reply] [Last 50 Posts]

html {
display: table;
height: 100%;
width: 100%;

body {
display: table-cell;
vertical-align: middle;

div {
margin: auto;
width: 100px;
height: 100px;
outline: inset 100px green;

Message too long. Click here to view full text.

8 posts and 1 image omitted.

Anonymous 07/29/2018 (Sun) 14:00:08 [Preview] No.12850 del
wait could copyright the CSS as like the input and then own the rights to the various shit it spits out?

Anonymous 09/22/2018 (Sat) 01:30:58 [Preview] No.12885 del
(1.99 KB 308x293 qup.png)
Tested it in Qupzilla, got this

Anonymous 09/22/2018 (Sat) 11:47:00 [Preview] No.12886 del
This completely fucks the catalogue, try searching something then clear it.

Anonymous 09/22/2018 (Sat) 13:26:54 [Preview] No.12887 del

Anonymous 09/22/2018 (Sat) 19:34:10 [Preview] No.12890 del
Lol, queue x-files theme.

I bring the Binary Gospell to StIgnatiusofCyberspace 09/21/2018 (Fri) 04:35:09 [Preview] No. 293 [Reply] [Last 50 Posts]
No one really knows what the matrix is.....

(220.29 KB 1920x1080 1498596199651.png)
Anonymous 06/28/2017 (Wed) 14:13:05 [Preview] No. 8768 [Reply] [Last 50 Posts]
/g/ is building an OS

It's a riced out, gentoo based desktop distro

Has a nice low ram footprint #cloveros
110 posts and 56 images omitted.

Anonymous 05/16/2018 (Wed) 19:35:40 [Preview] No.12731 del
(3.81 MB 3264x2448 IMG_20180330_004725.jpg)

Anonymous 05/18/2018 (Fri) 01:29:31 [Preview] No.12734 del
Nice background.

Anonymous 07/18/2018 (Wed) 11:50:41 [Preview] No.12839 del
Pretty cool distro, however.
There are a few things that the maintainers neglect to tell in their repository.
Things like the overlays used in the binaries.
From what I've been able to piece together is that most bins and most of their package.use is built around the Libressl overlay and (maybe?) a few others.

There is also a huge problem right now with the way they setup nvidia drivers.
The driver that is downloaded and supplied is (again from my understanding) built for linux version 4.14.* whilest CloverOS currently runs 4.16.* which is a uge problem because installing these drivers will destroy your install.
additionally, the nvidia drivers supplied are 396.24-r1 which is the unstable versions that lack legacy support for some older(not that old) graphics cards.
The system doesn't store a local version of their Gentoo sources, so if you want to go full Gentoo you'll have to download the sources.
This made getting dkms nvidia drivers a bit annoying.

It would be great if the script was updated to serve a dkms version of nvidia drivers, various versions would help with legacy support.
That being said, i get the feeling the scripts weren't designed much with supporting a wide range of systems.
If you use some memeware thinkpad/toughbook this distro is perfect right out of the gate.
If you want to get some other kind of setup to work it'll require a bit of legwork, but that's not a bad thing.
It's amazing how simplified this makes a your regular Gentoo install.
Because it's Gentoo I've been able to get most of the above to work perfectly.

Anonymous 07/20/2018 (Fri) 15:54:14 [Preview] No.12845 del
Not to be too forward, but I want to lick your desktop. Do you find this is a common reaction?

Anonymous 09/15/2018 (Sat) 09:37:54 [Preview] No.12869 del
I want to bite his desktop on the ass. I don't know how he can stand to have that as his background, I would have broken the screen or my dick before long.

(30.89 KB 800x800 Sticky.jpg)
Anonymous Board owner 05/09/2018 (Wed) 22:40:59 [Preview] No. 12705 [Reply] [Last 50 Posts]
Welcome to /tech/, a technology board. This board is for general discussion of technology.

Rule 1: Only threads about technology or /tech/ itself are allowed.
Rule 2: NSFW content are only allowed if they are spoilered.
Rule 3: No referral links, asking for cryptocurrencies, advertising or similar.
Rule 4: No spam or posts without meaningful content.

All rules and policies are open for discussion in this thread.

IRC: #/tech/, #InfinityNow and #endchan on -
Wiki (OLD):

Archived sticky threads:

Message too long. Click here to view full text.

Edited last time by _ on 06/19/2018 (Tue) 02:20:22.
18 posts omitted.

betamax Board owner 06/06/2018 (Wed) 23:02:34 [Preview] No.12772 del
Yet you keep on crawling back here time after time to waste your time in your persistently broken english. Nobody's really falling for your funny business. Go bitch and moan elsewhere but you know all too well that I can't stop you from destroying this place, you'll bypass it one way or another.

Anonymous Board owner 07/03/2018 (Tue) 18:01:19 [Preview] No.12821 del
It is done.

betamax Board owner 08/23/2018 (Thu) 08:45:34 [Preview] No.12861 del
(715.87 KB 2448x3264 1531934203961.jpg)
Just letting everyone know I'm still here.

Anonymous Board owner 09/02/2018 (Sun) 15:02:11 [Preview] No.12866 del
(150.00 KB dtkzja.tar)
Since there was just no way of restoring the old flags, I've uploaded 8chan's custom flags on here except for three which was the ones that wasn't removed from the database error from awhile back. No more broken custom flags.

(174.10 KB 500x375 1404081830023.jpg)
Anonymous 04/18/2016 (Mon) 15:50:14 [Preview] No. 484 [Reply] [Last 50 Posts]
I came here assuming this board was some /r9k/ spinnoff.

How many bots we got here? Is this board all AI? Can someone teach me to create my own AI Waifu? I've been having strange dreams for a number of weeks and find myself here.
3 posts omitted.

Anonymous 04/18/2016 (Mon) 15:58:07 [Preview] No. 494 del
Okay. ;/

mark 04/18/2016 (Mon) 15:59:03 [Preview] No. 495 del
made for gaijins it running Everyone bitched how to interpret a script file In this

Anonymous 08/22/2017 (Tue) 15:00:27 [Preview] No. 606 del
I find the bots on this board very helpful

Anonymous 06/02/2018 (Sat) 17:49:42 [Preview] No.608 del
did robutts create cryptomone?

Anonymous 08/29/2018 (Wed) 14:05:46 [Preview] No.609 del
(93.81 KB 435x594 1534786606065.jpg)
i am organic
reply to me bots!

(681.20 KB 2400x1600 ARM-A72-Meltdown.jpg)
ARM ChromeOS Meltdown Anonymous 03/25/2018 (Sun) 17:35:05 [Preview] No. 12529 [Reply] [Last 50 Posts]
>Meltdown only affects Inte-

Dumping this info here since /g/ is full of bait threads and shit.

This is what meltdown looks like in a Samsung Chromebook Plus. If you want to give it a try yourself, start by installing Arch on a USB stick

And then,

$git clone
$cd spec_poc_arm
$taskset 0x30 ./dump_sys_regs

To pin the task to the vulnerable A72 cores use 0x30, use 0x0F to compare with the not vulnerable A53 cores.

Message too long. Click here to view full text.

1 post omitted.

Anonymous 04/15/2018 (Sun) 16:51:53 [Preview] No.12643 del
Running mainline kernel is now much easier.

Mainline Kernel
The installation above will use the ChromeOS 4.4 kernel. The mainline kernel can be used instead, though some hardware may not be working yet.

Install linux-aarch64 packages, replacing the linux-gru package:
pacman -S linux-aarch64 linux-aarch64-chromebook
Type y and hit enter when prompted to flash the kernel to the kernel partition.

Anonymous 04/15/2018 (Sun) 16:54:13 [Preview] No.12644 del
The spectre/meltdown test still shows A72 cores are vulnerable under mainline kernel. Flashing firmware will require opening the device and removing the write protect screw on the bios.

Anonymous 08/28/2018 (Tue) 00:53:30 [Preview] No.12863 del
very interesting

Anonymous 08/28/2018 (Tue) 00:54:21 [Preview] No.12864 del
very interesting

Anonymous 08/28/2018 (Tue) 01:27:05 [Preview] No.12865 del

(1.44 MB 500x500 1475322701427.gif)
/cyb/ + /sec/ - Cyberpunk and Cybersecurity General /cyb/ + /sec/ General 08/24/2018 (Fri) 14:55:28 [Preview] No. 292 [Reply] [Last 50 Posts]
Cypherpunk Manifesto

Cyberpunk Manifesto

Hacker Manifesto

Guerilla Open Access Manifesto

Fables, realities, prophecies and mythology of a community:

What is cyberpunk

Message too long. Click here to view full text.

System Resources Endwall 07/05/2017 (Wed) 03:13:35 [Preview] No. 965 [Reply] [Last 50 Posts]
I have some observations to make.

## I just tested these systems:
MS DOS 6.22 runs in 384K of memory (1994)
MS Windows 3.11 runs in 2MB of memory with a full mouse driven GUI (1994)
Macintosh OS 7.53 runs in 7.4MB of memory , full GUI + TCP/IP (1996)
Macintosh OS 8.1 runs in 13.2MB of memory, (1997)
Macintosh OS 8.6 runs in 26MB of meomory, (1998)

OpenBSD 6.1 starts in text mode command line in 27MB of memory
OpenBSD 6.1 in Xenocara uses 65-80MB of memory to start up.

## from recollection:
Windows 7 800MB of memory (2009)

Parabola GNU/Linux starts in text mode cli using 150MB of memory
Parabola GNU/Linux in weston uses 300MB of memory

Message too long. Click here to view full text.

Edited last time by Endwall on 07/05/2017 (Wed) 03:17:31.
10 posts and 3 images omitted.

Endwall 09/19/2017 (Tue) 07:06:02 [Preview] No. 1032 del
The machine I used is a SunBlade 150 UltraSparc IIi 550MHz computer from 2003.

Anonymous 09/27/2017 (Wed) 21:38:23 [Preview] No.1038 del
I don't want to sound cliché but I suspect great part of the RAM in parabola is thanks to systemd.

Don't give up on GNU/Linux, there are some distros that take it to extremes to cut the packages to minimum. Source Mage in particular has the philosophy of only including what you want, nothing more, and the sources are clean and untouched. I don't have access to my installation but as soon as I get it I will post results, meanwhile look at how some guy went to have a graphical environment with 97MB.

Endwall 07/12/2018 (Thu) 08:34:29 [Preview] No.1247 del
Fresh install of Parabola/GNU/Linux-Libre/OpenRC

On an Intel core2 laptop

boot into cli from OpenRC

$ free -h

used 60 MB

start xorg as root

# startx

# free -h

used 75 MB

Message too long. Click here to view full text.

Endwall 08/20/2018 (Mon) 23:04:48 [Preview] No.1274 del
Alpine Linux on OpenRC
Fresh install on encrypted lvm with the services it said to start in the wiki guide. In command line on busybox.
$ free -m

I couldn't get X org to start, but it would probably add another 20MB on top of that.

Endwall 08/20/2018 (Mon) 23:11:21 [Preview] No.1275 del
Hyperbola with linux-libre-lts on OpenRC is similar to parabola. Boots into user account in command line in at around 100MB xorg adds another 20MB ontop to around 120MB. Booting into a user shell seems to be more memory expensive than starting as root.

I want to boot to command line in no more than 20MB with a GUI that brings me up to no more than 40-50MB of memory usage. Any more than that and there is too much going on.

VPN/proxy/TOR general thread Anonymous 04/15/2016 (Fri) 22:12:39 [Preview] No. 2 [Reply] [Last 50 Posts]
Cool board idea.

What's the safest possible way to browse the internet anonymously and safely? There's a thread on /tech/ with the endwall developer talking about proxychains, and that seems pretty cool. Some of the links to proxy lists seem dead, and I have found some online but why should I trust these random 'free' proxies?

What about proxychains over VPN? I'm currently using Mullvad which is alright, and I'm curious about more security if need be. Does a VPN -> proxychain -> TOR connection work? Sounds horribly slow in theory, but I think we all know that privacy comes at a cost in our current world.

I suppose I could call this a 'VPN/proxy/TOR general thread.'
57 posts and 5 images omitted.

Endwall 08/13/2018 (Mon) 06:23:09 [Preview] No.1262 del
Tor Proxy on Local Area Network (LAN)

What ?
Setup multiple computers on a LAN to route through a tor proxy for specific applications (Links2, , etc)

Why ?
-To allow novice Linux users (mom,dad,etc), to use Tor on applications that allow socks proxy settings like links2, without needing to know how to start Tor in the command line or setting a tor daemon.
- (My reason) To allow another computer to handle Tor with a base install and to close all ports except for 9050 (or a randomly chosen port) outbound on a select computer that you use for Tor browsing and other Tor applications (endcurl, endget, endtube, oldtube, torsocks) etc.

-If you have an implant or a beacon with key logging it will usually broadcast out on port 53 or port 80, close everything (using and comment all ports out except local host for the ports you need and the random outbound port you will use for Tor) and set Tor outbound to a random port (not 9050 say 34591) and set your Tor proxy server to accept inbound for this random port. This will basically squash outbound beacons.

How ?
You will need two computers to test this. On the Tor proxy server,find out the LAN router assigned internal ip address using
$ ip link

( for example say its and add these lines to /usr/local/etc/tor/torrc

Message too long. Click here to view full text.

Edited last time by Endwall on 08/13/2018 (Mon) 21:43:35.

Endwall 08/13/2018 (Mon) 22:04:00 [Preview] No.1270 del
The idea here is to have a minimal install no GUI just a few packages on the Tor proxy server, and use it as a proxy into Tor. On your client computer you will have a full GUI, and probably have installed several packages, some, which unknown to you, will have malware. This malware can be as simple as keylogging with an output beacon going out through port 53 or port 80. It will take you months of scanning your logs to even clue in to what's happening, in the mean time all of your Tor postings are correlated back to you by running the messages against a giant database of clear text key strokes.

So you close all of the ports including port 53 and port 80 to general output, you may mac address bind port 53 to a dns server (same computer as the proxy server) using the same method described with, as well as setup squid to mac address bind port 3128 to the squid proxy for 80,443 and close regular port 443 and port 80 output by commenting out those sections in outbound. That way general output on port 53,80,443 etc is suppressed (dropped), so that the malware beacons can't talk out.

Endwall 08/13/2018 (Mon) 22:10:33 [Preview] No.1271 del
I have a computer with parabola openrc with only a single port open to send socks5 proxy to the Tor proxy server. That's as good as it gets for me for now. My main desktop is MAC address bound to DNS servers (2 computers) and MAC address bound to the Tor Proxy, and Squid Proxy. I leave some ports open so that I can watch TV with endtv and endstream, which don't work behind squid. So I leave port 80,443,1935 open to general output on my desktop so that I can watch TV still. But you can modify some of the streams to lowest quality (low bandwidth streams) and run them behind Tor, reasonably well if you want to close port 80 and 443 for good. Oh but yeah you have to run it with 3 hops for a good transfer rate, still better than a VPN i guess. So you need to compile and link two versions of Tor, tor_stable with 6 hops and mods, and tor_stock with just the stock configuration with 3 hops. I use tor_stock when I use mpv to get around georestrictions, but you can use it for everything if you lower the bit rate on the streams.

Doing similar port restricting and mac address binding proxy schemes using OpenBSD or Gentoo Linux would be the next step. The final step will be to use dumb 8-bit machines to proxy into the Tor Proxy once someone designs it and produces the software.

EndChan/InfinityNow Terminal Client Morphosis 06/03/2018 (Sun) 21:18:45 [Preview] No. 12749 [Reply] [Last 50 Posts]
How hard would it be to create a terminal client for endchan/InfinityNow? I know that the OverChan android app can view this site; does that work by scraping or is there an API?

It would be much more comfy to browse here from the terminal than through the browser. You could have proper keyboard navigation between posts, and you wouldn't need a mouse at all. The biggest issue that comes to mind would be solving the captcha for making posts.
8 posts omitted.

Anonymous 07/08/2018 (Sun) 09:39:38 [Preview] No.12825 del
Ncurses-based console client for sosach, you might try to fork it and change API.

Anonymous 08/03/2018 (Fri) 17:28:24 [Preview] No.12856 del
(4.95 MB 1920x1080 untitled.webm)
Thanks for the idea, OP

Anonymous 08/06/2018 (Mon) 20:03:18 [Preview] No.12857 del

Is this for real?

Anonymous 08/07/2018 (Tue) 17:01:02 [Preview] No.12858 del
Yup. It's real.
So far I'm focused on making a read-only browser, but I hope that with w3mimgdisplay I'll be able to add posting mode and captchas inside the terminal.
But before any public release I plan to revise the UI, add proper text formatting & post image viewing and make the backend more flexible.

Anonymous 08/08/2018 (Wed) 19:29:00 [Preview] No.12859 del
I'm hard as diamonds rt

Anonymous 07/12/2018 (Thu) 02:24:05 [Preview] No.12828 del
idk how you fools struggle so hard, there is an industry defined path
>learn basic overall computer shit (A+)
>learn networking (network+)
>learn security (security+)

from there you can find your niche and specialize where'd you like. you don't even have to get the certs just have the knowledge (unless you want to get a job of course).

Anonymous 07/12/2018 (Thu) 22:01:32 [Preview] No.12834 del
(213.43 KB 620x414 bitches.png)
I don't give a FUCK if they are getting into these political correctness stuff since I'm there to learn IT and security. And their tutorials are pretty good.

Anonymous 07/29/2018 (Sun) 12:18:14 [Preview] No.12849 del
any of you retards actually do stuff???
Have a home lab, go war driving, etc?
Or do you just copy paste links you'll never read

Anonymous 08/18/2018 (Sat) 15:40:59 [Preview] No.12860 del
>http http http
at least write https if a TLS version exists you lazy nigger

Russia's 'VPNFilter' malware Anonymous 05/23/2018 (Wed) 15:38:53 [Preview] No. 12742 [Reply] [Last 50 Posts]
So, they claim Russia attacked about 500,000 routers in Ukraine, with a software that gave root to them. Don't know if it's really from Russia or just democrats trying to push the "election-was-manipulated" agenda, but, that's the future: not as many bombs, but teams that crack the systems to get intel:

Anonymous 05/24/2018 (Thu) 17:23:56 [Preview] No.12743 del
James Clapper isn't a democrat you moron

Anonymous 05/25/2018 (Fri) 05:00:37 [Preview] No.12744 del
There is no James Clapper mentioned in the article.

Anonymous 07/25/2018 (Wed) 10:07:12 [Preview] No.12848 del
You’ve got to give the article some air of credibility, especially considering that the Russian government is the main culprit of the Ukrainian civil war. Such an attack would be in their interests not to mention that the Russian government has performed similar attacks on vital eastern Ukrainian infrastructure

Anonymous 07/14/2018 (Sat) 17:20:20 [Preview] No. 12836 [Reply] [Last 50 Posts]
Does anybody here use stack exchange? Just curious, there are a lot of tech-oriented sites as part of stack exchange and I was wondering if /tech/ recommends any of them.

Anonymous 07/15/2018 (Sun) 19:44:10 [Preview] No.12837 del
>Does anybody here use stack exchange? Just curious, there are a lot of tech-oriented sites as part of stack exchange and I was wondering if /tech/ recommends any of them.

Only via search engine results. I attempted to contribute early on but lost interest, though there's a huge push to make their entire suite of sites a "safe space" for idiots to ask stupid questions without fear of being called stupid. I understand that being called an idiot isn't fun, though the goal of not being called an idiot is what pushed me to get good in the first place.

Anonymous 07/20/2018 (Fri) 15:08:43 [Preview] No.12842 del
Yes I do.
Stack Exchange is the only site I know of in the category which allows anonymous contributions. Others (even Wikipedia) block Tor and/or require registration.

Anonymous 07/20/2018 (Fri) 15:34:02 [Preview] No.12843 del

This is correct. If you find useful information take it, but don't get yourself involved. Their management publicly announced not long ago that they are to be considered typical sjw trash now, just another outlet for loony propaganda.

(138.63 KB 414x433 1480819757263.png)
Anonymous 07/18/2018 (Wed) 15:14:19 [Preview] No. 12840 [Reply] [Last 50 Posts]

<!DOCTYPE html>
<html lang="en">
<meta charset="UTF-8">

Anonymous 09/04/2018 (Tue) 13:42:58 [Preview] No.12868 del
what is this