/tech/ - Tech

Technology.

catalog
Mode: Thread
Name
E-mail
Subject
Message

Max message length: 8192

Files

Max file size: 80.00 MB

Max files: 5

Captcha
Password

(used to delete files and postings)

Misc

Remember to follow the rules


(74.01 KB 1024x768 31821-1.jpg)
How to set up linux for tor usage. Comrade 08/06/2019 (Tue) 23:50:13 No. 2280 [Reply] [Last]
I posted this in another thread but I think it deserves its own thread.

I've been seeing a lot of people saying that installing tor is super hard and difficult, and, even if you use windows it's not that hard. All you have to do is install the tor browser and go into the browser bundle files and run the executable for tor, or, just use the browser bundle.

Like it's not hard at all.

But, being the pros (and dirty commies that we are) we don't use fucking bourgeois Microsoft.

So, I've set up a super simple and comprehensive guide to installing and using tor like a pro on Linux.

This is why we use Linux.

STEP ONE:

Downloading tor:

ctrl+alt+t: Open terminal:

Sudo apt install tor
sudo service tor start

STEP TWO:

Downloading and setting up privoxy.
sudo apt install privoxy

Edit the config file:

vim /etc/privoxy/config

(If you don't have vim sudo apt install vim)

add in text at the bottom:
(vim insert mode: press I)

forward-socks5 .onion 127.0.0.1 9050

(press escape)

Type :wq (write quite)

Done, ammo loaded cannons ready to fire.

STEP THREE:

Set up firefox to use tor:

about:preferences: Network settings, Use custom proxy

(Privoxy runs on port 8118) 127.0.0.1 8118
Check off "Use this proxy for all protocols"

Done.

Takes literally 5 seconds and you don't have to inconvenience yourself by downloading a whole brand new fucking browser ONLY for the simple task of bouncing around encrypted packets through a bunch of proxies.

You also don't have to live with the hellscape that is Microsoft and the billions of exploits and bugs in and written for it. (Not to mention back doors.)

And before anyone starts bitching; Setting up firefox for privacy isn't that difficult.

Basically turn off all telemetry and geo location, referer headers (but you will need http refer headers for 8chan) and some other shit, Guide here:

https://www.privateinternetaccess.com/blog/2018/09/firefox-hardening-guide/

But honestly none of that even matters unless you are a windows user or a pedophile and let's hope you aren't either one of those.

Have a nice day.
47 posts and 7 images omitted.
>>4983 make an onion site on a vps that doesnt take any info and is operated out of 14 eyes. Keep a backup site in case u do get shut down by the company i guess. keep your database encrypted until called upon obviously if anything sensitive. Only use tor to connect to the server when configuring it. Should keep u safe, these r the basics, look into it. grugq has some case studies in some like deceased 2013 blog about cyber criminals n shit, one case study about how this pedo ring basically got away by just using yknow, standard opsec but just sticking to it well and not giving out personal info, using proxies for everything, not using VPNs for security, and shit. So nah anti-gov shit stays up unless infiltrated, cp stays up -> gets killed -> comes back, and drugs always stay up lol but who do u think really profits off that, govs r the og cartels. Anyways yeah, whatever u do just have good basic opsec and u should be fine, tor isnt horribly broken, just use it how you are told to use it by people who know their shit. i.e. dont do shit on tor u do on clearnet, dont change ur browser, close sessions frequently, dont have it full screen, ideally use whonix or sandboxing or smth, whatever. If you're super noided there's always yknow, doing it out of public wifi also, so even if its deanonymized its not tied to u good luck anon
The recent update for the browser bundle standardizes the screen size for the full screen browser window, so that leak is probably not that big of a problem now. Also if using public WiFi to be anonymous, consider cloning the MAC address to something else than the one that could be traced if hotspot operators log that and can correlate the traveling of the device.
apps
>>5045 >The recent update for the browser bundle standardizes the screen size for the full screen browser window, so that leak is probably not that big of a problem now. No, the recent update (10.0) completely fucks up resolution fingerprint resistance, because the rounding is buggy. 1) it doesn't round to multiples of 100 but is slightly off. 2) the window size is different between initial window and subsequent new windows. Secondly, the canvas fingerprint resistence doesn't work anymore. Thirdly, what you're referring to (a technique called "letterboxing") has already been part of the 9.5 version. See for yourself: https://arkenfox.github.io/TZP/tzp.html https://www.amiunique.org/
god you people are retarded. You can't figure out how to install a fucking program through the package manager? Kill yourselves.

(485.68 KB 1920x1080 desktopl.png)
Space##m0Wyzz 02/01/2020 (Sat) 00:56:26 No. 252 [Reply] [Last]
ITT: Post your desktop
171 posts and 57 images omitted.
>>4678 how do you get the sitting waifu
>>252 >Applefag Yikes.
>>4691 It's an Open Source project called MaCoPiX http://rosegray.sakura.ne.jp/macopix/index-e.html
(730.45 KB 1366x768 Screenshot_3.png)
(592.01 KB 1366x768 Screenshot_5.png)
(986.93 KB 1366x768 Screenshot_4.png)
trying to make my own universal dark theme

(2.06 MB 2000x1333 Gitter-joins-Element.png)
Gitter is joining Element Comrade 10/01/2020 (Thu) 16:53:28 No. 5110 [Reply] [Last]

Linux fully surrenders to SJWs Comrade 07/11/2020 (Sat) 14:34:40 No. 3221 [Reply] [Last]
https://github.com/django/django/pull/2692 https://github.com/redis/redis/issues/3185 https://issues.apache.org/jira/browse/COUCHDB-2248 https://www.drupal.org/node/2275877 https://www.drupal.org/node/343414 https://github.com/systemd/systemd/issues/9894#issuecomment-424086622 https://www.phoronix.com/scan.php?page=news_item&px=Linux-5.8-Inclusive-Terminology For symbol names and documentation, avoid introducing new usage of 'master / slave' (or 'slave' independent of 'master') and 'blacklist / whitelist'. Recommended replacements for 'master / slave' are: '{primary,main} / {secondary,replica,subordinate}' '{initiator,requester} / {target,responder}' '{controller,host} / {device,worker,proxy}' 'leader / follower' 'director / performer' Recommended replacements for 'blacklist/whitelist' are: 'denylist / allowlist'

Message too long. Click here to view full text.

70 posts and 7 images omitted.
>debian >ubuntu >fedora are from a security perspective better
(21.05 KB 852x480 glowie.jpg)
>>5089 sure thing Red Hat Inc. employee
Conceivably the glows could sneak in hidden backdoors that cannot be discerned without considerable difficulty. That won't be stopped by using hipster operating systems though. Linux is far more audited than those have been.
>>5092 Yep, this is the same issue with people using supposedly more private forks of Firefox. They end up using a much less secure web browser that also makes them much more fingerprintable.
>>5092 >>5094 Linux, the kernel is audited to hell and back. But there are many more components to operating systems than just that, and each of them adds additional surface area to an attack. The big example to call out for this is of course SystemD, which took over many functions other more decentralized manageable components did. Since it came from Fedora, a forprofit entity, it also is a reasonable source to distrust the main distros which all use it. Being able to work with several obscurer OSses would add a lot of security to whatever you're doing, since having a more varied OS ecosystem will give more hurdles to any would-be attacker. This makes things like OpenBSD, Qubes-Whonix or even Gentoo very useful in allowing at least some to keep their safety guaranteed. Similarly with Firefox, it added many more components to itself in recent years that all form additional potential entry points into the system. If the fork in question is a more stripped down version of it (which is often the case) and still takes the main security updates that are added as they are found (which is always the case), they end up being safer against attack. Your point regarding fingerprinting still stands though, but it there are many vague sidechannels that can compromise your browserprints with relative ease.

(572.30 KB 1800x1200 Asus_ROG_Strix_GL702ZC_9.jpg)
comrades, i need to buy work from home laptop so give me advice which ones are good please Comrade 09/30/2020 (Wed) 16:08:29 No. 5058 [Reply] [Last]
Just want to earn my paycheck to feed myself from something that will work for at least 4+ years and be durable in a chaotic home environment. I heard stuff about how the new ryzen laptops are crazy good worth of money for the consumer. Don't know much about cpus wars. Only want to be able to do my work fast on it without lagging under heavy load. Will be using many many browser tabs, excel sheets, word documents, and pdf softwares. No games or anything. Just work. What durable laptops would you suggest for these purposes in the $300-500 dollar range. I just want to fully utilize my purchasing power while buying this laptop because i'm kinda loaning the money from somebody else ;-;
12 posts and 1 image omitted.
>>5073 Good luck, keep us posted on what happens
>>5073 >Will this Acer survive for 4+ years? >Graphics Chipset Brand AMD Avoid laptops with AMD or NVidia discrete gpus, those laptop gpus have high failure rates, often double digit percentages, unlike Intel igpus which have <0.1% failure rate. MAYBE the Radeon Vega igpus from AMD will be fine, but they haven't been out long enough to determine their durability. Find out what the specific GPU model is. >Resolution HD (1366 X 768) Pixels Too small resolution for my taste, wouldn't settle for less than 900 pixel height. See if you can find 1400x900, 1600x900, 1920x1080, etc. If the screen is glossy (which it usually is nowadays) instead of matte, you might want to also buy an laptop screen anti-glare filter. >Hard Disk Description Mechanical Hard Drive Are you unable to find one with an SSD? >Processor Brand AMD >Processor Type Core i3 3220 Specs look like they're completely riddled with mistakes, find out what the actual processor is. This looks like a scam. Also I would try to make sure it's a fanless laptop. >Will be using many many browser tabs, excel sheets, word documents, and pdf softwares. No games or anything. Just work. You can't make money off excel/word, this isn't 1993. Expert knowledge in html, css, php, laravel, mysql, js, bootstrap, node.js, react, jquery, angularjs, vuejs, json and mongodb are the minimum requirements today (you can probably get by with just the first 7), which would take months to learn. Throw in some knowledge of http, apache, nginx, dom, xml, csv, and maybe python, django, beautifulsoup for good measure. >I just want to fully utilize my purchasing power while buying this laptop because i'm kinda loaning the money from somebody else ;-; You won't be able to pay back your loan without a real job.
(814.28 KB 2048x1536 1501269694497-0.jpg)
A cheap used Thinkpad. That's all anyone needs.
For the usual office work or even programming many laptops could work. Get decent processors and enough RAM, and that should be fine, and there's isn't a requirement for the most LEET gaming GPUs. If the operating system matters, then one with that already preinstalled could be considered. Most should have that anyways. But libre software is good to have installed.
(84.73 KB 678x492 1601531776030.png)
Can you believe AMD beat Intel even on laptops? >Will be using many many browser tabs, excel sheets, word documents, and pdf softwares. No games or anything. Just work. Though honestly you should just get an old thinkpad if you're going to do only this much. They're durable, alright.

Recycling Hardware Comrade 09/29/2020 (Tue) 20:02:46 No. 5042 [Reply] [Last]
Boomer family left me hundreds of blank floppies. (You know how Boomers love to collect things they don't use, which invariably become obsolete and become e-waste; they left thousands of blank CDs, DVDs, a zip-drive and about 6 old laptops and a few ancient desktops too. Because they refused to give anything away when they upgraded their stuff.) Any ideas for what I can do with the floppies?
>>5042 if there something importing on it you can try to back them up or try to smelt them, or glue them together to form cube or pencil holder or what ever post pics of what you made
If they still work and you don't want them sell em on eBay or gumtree or whatever Retro enthusiasts still use that shit
You could use them to backup anything important you want to last.
>Floppies Those are not good for backup, and the typical storage amount isn't much for today's applications anyways. >CDs, DVDs These could be decent media for backup, but it depends. Sometimes the data layer can be degraded, if it isn't stored properly or utilizing materials that last long.
If there are any rare, important programs on it, and they aren't already on the Archive, upload them.

Comrade 09/28/2020 (Mon) 22:19:56 No. 5015 [Reply] [Last]
WINDOWS XP SOURCE CODE GOT LEAKED
Indeed, OP. I am excited. I figure some one is going to pick this up and restore the windows xp project. We could see the rebirth of, frankly, a very nice and stable operating system. I think it will be a cool thing to witness.
The only people happy about this are nostalgic retards too dumb for Linux like >>5016 and hackers hoping to find exploits that haven't been patched yet (unlikely). I for one hope this helps the Wine project, but they probably won't touch this in fear of lawsuits. Thank you copyright law!

Comrade 07/17/2020 (Fri) 13:57:09 No. 3465 [Reply] [Last]
About to start learning Rust. What am I in for?
22 posts and 1 image omitted.
>>3756 >Secondly, they call themselves "Open"AI but they're very much not open at all This is an example of when "open" is worse than libre https://www.gnu.org/philosophy/open-source-misses-the-point.en.html
>>3763 Ill gather some resorces and make one. It might be best suited to /edu/ though.
Static linking only.
>>3465 hormone therapy
Gateway drug to Haskell

(678.50 KB 1920x1440 rsq8R2Q[1].png)
Bypassing Twitters' Phone Number Registration Comrade 04/24/2020 (Fri) 13:18:50 No. 1371 [Reply] [Last]
Anyone know of a reliable way to get a fake phone number for when social media accounts force it upon you? I keep trying those 'receive SMS' websites but all the numbers are already used by the time I get to them. Also, you don't need to remind me how they all spy on you, I know, I just need this to conduct business directly with clients, nothing more.
4 posts omitted.
you don't have to have a phone number, just email them twice that your phone number doesn't work and they'll unlock your account
>>1371 Have you been locked? Are you a furry artist or something?
>>1401 Twitter will just randomly lock your account at times.
>>5011 OP if you try this out report back about it working or not please

(5.75 KB 256x256 t56756756.jpeg)
Let's talk VPNs Comrade 01/27/2020 (Mon) 15:36:01 No. 119 [Reply] [Last]
I was using riseup.net as a VPN, but, now cloudflair (The upstream provider for the site) is blocking it. Furthermore, it's come to my attention that riseup boofed their canary after the FBI requested server logs. They are glowin the darks, for real, and confirmed. What VPN would you suggest anon? What VPN, if any, do you use. I was thinking of routing all my traffic over tor, but, currently the site still blocks tor traffic. Help me out guys, I feel naked, thanks.
53 posts and 1 image omitted.
>>4900 Would like to echo the same problems. Can't we have a temp ban on tor posting after a raid or something? Or at the very least make tor posting without pics/files always okay. Then make photos a captcha thing? What's the worst that could happen if you allow tor text posting? I mean if frequent posting became an issue put a cooldown on the threads so that they can only get posted to every 10 seconds or something. This gives jannies enough time to see if there is a problem. Making tor posting so annoying is definitely an mistep imo for an obscure leftist chan. I've also thought about this >>4646. No pol-tard wishing to raid is going to know that these boards are less protected. Anyways I think we should all agree here that text-only tor posting should be unhindered.
>>4900 >For me "block bypass" works 99% of the time. Good for you, but what about posting pics? It's also probably only because Cloudflare doesn't have the resources to block all Tor nodes (yet), but they can block all proxies on proxy lists even if there's a delay between them appearing on said lists and them getting blocked as "known spammer" IP's. Obviously most of them haven't been used for spam on this site, but they're blocked on every site that uses Cloudflare. These are the proxy sites I know of, whose proxies are all blocked within a day or two in the rare case where one works at first: https://www.sslproxies.org https://proxy-list.org http://www.proxylisty.com http://www.freeproxylists.net It's good if the block bypass works for Tor, but especially on a site like this it's pretty fucked that anonymity must be compromised at all. 8chan used Cloudflare but didn't implement Cloudflare's spam blocks (except after raids), at least when I still posted there. I just tried as a test to post on 8kun with a proxy and a VPN and it works, too. If a hangout for far-right white supremacist terrorists can do that, why can't a mostly reasonable left-wing site?
>>4904 I totally agree about imageposting, that's something that frustrates me too, although sometimes it still works if you're lucky. I've even been thinking of using Whonix+VPN setup just to bypass that, but it's not worth the trouble. >It's good if the block bypass works for Tor, but especially on a site like this it's pretty fucked that anonymity must be compromised at all. In what way is anonymity any more compromised when using "block bypass"? Mods can see that your posts come from the same exit node, it's all IP-based AFAIK. Nothing stops your from creating a new circuit or restarting your Tor Browser session.
>>4905 >it's not worth the trouble Ideally there wouldn't be any trouble at all in the first place... >In what way is anonymity any more compromised when using "block bypass"? That's not what I was referring to. I meant blocking proxies and VPN's is fucked up since that compromises anonymity. It's not really this site's fault but rather Cloudflare's spam blocking, but I think having Cloudflare's spam blocking on a site like this is pretty fucked up to begin with. I mentioned 8chan and now 8kun not having those, when its users are constantly advocating for violence based on race, gender, etc... so why does a far more reasonable site like this need those kinds of anti-spam measures? If the block bypass worked with all proxies, VPN's and Tor nodes, then that'd be great, but it doesn't. It's good if it usually works with Tor, and for me the consequences would most likely be only a fine in the worst case so I don't need a proxy like I said and which is how I'm posting here right now, but I assume >>4635 for example is referring to more serious consequences. How can the proletariat of the world unite if uniting is made hardest for those who need it the most?
So I've literally just tried over fifty proxies today and none of them worked even after doing the "block bypass" captcha. All still gave the exact same error message: >Your IP was recognized as a known spammer. Cloudflare has really rammed up those anti-proxy "defences", it seems. Good to see people on /gulag/ are complaining about it too, but will that actually accomplish anything?

Delete
Report

no cookies?