[ 3 / biz / cgl / ck / diy / fa / g / ic / jp / lit / sci / tg / vr ] [ index / top / reports / report a bug ] [ 4plebs / archived.moe / rbt ]

Maintenance is complete! We got more disk space.
Become a Patron!

/g/ - Technology

View post   

[ Toggle deleted replies ]
File: 27 KB, 624x351, ThereIsNoThreatPuertoRico.jpg [View same] [iqdb] [saucenao] [google] [report]
65249012 No.65249012 [Reply] [Original] [archived.moe] [rbt]

Ω All are welcome here; the world is fucked and we are all in this together.

◙ Cypherpunk Manifesto >>https://www.activism.net/cypherpunk/manifesto.html

◘ Cyberpunk Manifesto >>http://project.cyberpunk.ru/idb/cyberpunk_manifesto.html

∆ Hacker Manifesto >>http://phrack.org/issues/7/3.html

± Guerilla Open Access Manifesto >>https://archive.org/stream/GuerillaOpenAccessManifesto/Goamjuly2008_djvu.txt

▓ Fables, realities, prophecies and mythology of a community:

░ What is cyberpunk >>https://pastebin.com/hHN5cBXB

▀ The importance of a cyberpunk mindset applied to a cybersecurity skillset.: >https://www.youtube.com/watch?v=pcSlowAhvUk

● Cyberpunk directory: >https://pastebin.com/VAWNxkxH

▬ Cyberpunk resources >https://pastebin.com/Dqfa6uXx

▐ Cybersecurity essentials/resources >https://pastebin.com/SCUbhpjP

Cntrl + F Basic Knowledges, Basic Training, Arms/Arm >https://pastebin.com/rMw4WbhX

▼ Endware: Heavy armor for anons, by anons >>https://endchan.xyz/os/res/32.html

⦿ Shit just got real: >https://pastebin.com/rqrLK6X0

S archive: https://textfiles.com

Cybersecurity essentials/resources:
Reference books:
>PASSWORD : ABD52oM8T1fghmY0


=== /cyb sec/ News:
>BBC - Culture - Film review: Ready Player One

>Sex doll 'brothel': Paris council to decide on future of Xdolls games centre

>Life as a cyborg

>Robot Wrangler jobs

>Staying one step ahead of the cyber-spies

>Guccifer 2.0 outed

>> No.65249036

Previous thread

>> No.65249044

Support the decentralized Internet https://github.com/mayfrost/guides/blob/master/ALTERNATIVES.md#decentralized-networking

>> No.65249072
File: 900 KB, 2000x1333, CyberSpace.jpg [View same] [iqdb] [saucenao] [google] [report]

... and I clicked the wrong pic to upload....

>> No.65249094
File: 1.19 MB, 1240x1754, mesh10.png [View same] [iqdb] [saucenao] [google] [report]

Picture related.

>> No.65249186


Will lightweight anonymity protocols finally give us anonymous torrenting? Will it make it possible to pirate stuff without having to pay for VPNs or using superslow unsuited-for-p2p Tor?

>> No.65249225


>> No.65249302

If I learned something is the more difficult you make it to find your identity, the harder you make it for people to share files to each other, if we talk about protocols.

>> No.65249395

Oh wow... Is this thing still active? i was one of the original OPs, but i never thought it would survive for this long.

>> No.65249622

Yeah, it scared me when their wiki went offline but apparently it runs on Tor. It has a team now.

>> No.65249720

Thank you anon, the first video is especially interesting.

>> No.65249768

its good anyway

>> No.65249913
File: 239 KB, 400x400, 1460336078279.png [View same] [iqdb] [saucenao] [google] [report]

>Oh wow... Is this thing still active?
Sure is, the Zeitgeist is with us.
>i was one of the original OPs,
The OP that was going to compile all the resources?
>but i never thought it would survive for this long.
It does take a lot of work though. Checked out the FAQ? It is pretty huge now, far more comprehensive than the Wikipedia article. If it is really a long time since you were here you might also want to know that there are two more FAQs on the FTP, one on /sec/ careers and one on radio tech.

>> No.65250399
File: 1.66 MB, 540x603, serveimage.gif [View same] [iqdb] [saucenao] [google] [report]

stay in the containment area >>>/mg/

>> No.65250436

>containment area

>> No.65250597
File: 4 KB, 135x225, Network.png [View same] [iqdb] [saucenao] [google] [report]

I've been thinking long and hard about how to introduce methods for profit into decentralized networking, so that it happens naturally and quickly like bitcoin did, and so far this is the system I've come up with:
>each user pays 1$ or less/ month to use the D-net
>any user can host an "inter-node" (a node between the user and the destination)
>each node that the signal passes through gets an amount of cash equal to the transmission cost (lets say 0.01c per packet) divided by the number of nodes it goes through. That means that the less nodes there are between A and B, the more each inter-node host gets payed.
>there are additional factors, such as speed of transmission (meaning that if you node takes less time than another, then your node gets more), packet size (1Mbit gets you more than 1Kbit), if your node is faster than a neighbor node it takes priority in transmitting the user packet, and thus the greater the number of packets the larger the share of "transmission fee", also proximity between nodes plays a role in the calculation.
>in essence, the plan is to move towards decentralized networking by introducing a profit, so that in the same way bitcoin mining has become a thing, so will decentralized hosting.
What do you think /hsg/? Would this work? Would this backfire? Better ways to implement outsourced networking? etc?

As a case study, lets say that there are 10 user packets going to location D (destination). There are 7 nodes. In case RED, 1 packet is being sent across 2 inter-nodes, that means that for a transmission fee of 1$ each node is getting payed 0.50$ each assuming they are equal. In case BLUE, 2 packets are being sent across 4 nodes, assuming all nodes are equal each node is getting payed 0.25$ each, which is less. Thus profiteers will improve their tech to get more cash, thus improving the network.

>> No.65250699

>What do you think /hsg/?
You might missed the thread, mate.

>> No.65250723

If each user is controlling a node then I see no barriers other than to keep the cost for the maintenance of hardware, which then yes the costs can be shared. The tough part on a decentralized network is you don't have 100% way to administrate the costs, you have to agree with neighbors. Unless you have a standard for collaboration when nodes pay for shared maintenance. Once you go past the hardware maintenance you no longer have to think on information passing through nodes do you? All administrators of nodes will have the highest authority of their independent nodes unless again you have a standard and agree certain kind of packets to pass, such as certain encrypted networks and services like a distributed youtube or something. It really depends on how much of an organization this has now.

>> No.65250748

You're all a pack of useless dirtbags. You have done nothing and will never do anything meaningful. There's no god but if there was, it would burn you.

>> No.65250783

>You have done nothing
You missed out on the FAQs that were made in this very general?

>> No.65250804

Sorry not to fit your average consumerist /g/ thread.

>> No.65250831

I'd think it would be easier to have nodes 'bid' for packet throughput by offering lower and lower prices. Of course, there is the element of speed involved, so the packet sender can optimize their network for high speed/high cost or lower speed/low cost or maybe even lowest speed/no cost.

>> No.65250849

Why did you post this?

>> No.65250855

Thanks, have a nice day! :)

>> No.65250888

Hey y'all. I'm just getting into infosec. I'm going for an OSCP this summer as a sink or swim type deal. What would people recommend before then besides the usual know networking, bash, and python shit? I've already read a lot of blog posts recommending some good vulnhubs but I'm also curious about some preparation tips people usually don't bring up.

>> No.65251009

I plan on automating the cost and payment method much like bitcoin to avoid the centralization of capital as well, to make it corruption-proof.

The plan is to create some minor overhead on the packets containing a node-to-node checksum or other automated function, which distributes cash as it passes by. Not unlike a pigeon shitting on you as it flies overhead, except the pigeon is the packet and the shit is shekels.

Another method would be to map out the path first, calculate cash for each node, and deposit that as it passes through each node.

I'm not exactly a network admin or familiar with servers all that much, but the principle still stands that there is a way to (with slight overhead) automate delivery of cash between each node as the packet passes through.

Something like this:
Data | Data bufffer | Other info | $$$$$
Data | Data bufffer | Other info | $$$
Data | Data bufffer | Other info | $$
Data | Data bufffer | Other info | Destination Reached.

I'm willing to hear ideas though, especially if you are more familiar with networking than me. The goal is to avoid bureaucracy by automating it with something like block-chain tech in order to decentralize the way to earn capital, thus maintaining the free market and attracting profiteers naturally.

A standard cost will need to be set, but after that price will go up as overall mesh quality and demand goes up. So there will be a committee to determine the set cost of 1 month worth of usage, but they won't determine which node gets how much, that's up to the machines. Starting price will probably be 1$/month/user, and will max out at roughly 30$/month/user. The reasons for such a low starting price is to make it more attractive than centralized networks, since we can manage to have the cost so low which will give us an edge in competing with them.
The specifics are foggy but i'm planning this out now so that when its implemented it doesn't go south and centralized, but still attracts profiteers.

>> No.65251023

fuck, this didn't look like reddit spacing in the reply box D^:

>> No.65251068

>Not unlike a pigeon shitting on you as it flies overhead, except the pigeon is the packet and the shit is shekels.

Your idea has some appeal, not sure the software exists or if its really that functional but sounds interesting for sure. Sounds like IMCP (the thing you use to "ping" stuff with), so there might be a way to calculate this without much programming?

>> No.65251108

*ICMP, as in Internet Control Message Protocol, sorry.

>> No.65251123 [DELETED] 

I invited a friend over to watch a homemade video I had of my wife masturbating. I had an idea he might be receptive, and after about 10 minutes of my wife rubbing her pussy on the big screen his jeans were about to rip open. I kept watching the TV and the bulge in his pants, and he slowly began to rub his dick in his jeans in front of me.

I asked if he'd fuck my wife, and he said "hell yes". I asked if he wanted to jerk off watching her, and he unzipped his jeans and pulled out a rock hard 7" cut cock. It was totally amazing to watch another guy masturbate to my wife .. I think it was the horniest thing I'd ever done.

After a few minutes I asked if I could touch it, and he took his hand away. I stroked him for maybe 5 minutes, and he kept saying how bad he wanted to fuck my wife. Out of the clear blue he said "you can suck it if you want, I don't mind at all." It was amazing.

So, all I did was ask another married guy if he wanted to see a homemade video of my wife. I guess it could have gone another direction with him sitting passively and never acknowledging his hard dick. By the way, the tape had audio and my wife is a fantastic moaner. Her orgasms are porn star quality and her pussy gets soaking wet.

>> No.65251147 [DELETED] 
File: 14 KB, 311x313, 1491208851718.jpg [View same] [iqdb] [saucenao] [google] [report]

He's trying to derail the conversation.

>> No.65251196

>so there might be a way to calculate this without much programming?
i'm certainly hoping so, such a function would make it profitable for those who wish to join, and with more people joining the public gets more involved, and before you know it we have more servers than we know what to do with and internet speeds comparable to or faster than what centrelized networks can provide, phasing them out through the free market and decentralizing the net.

Web hosts are destinations and thus "users" so they will be charged too, but differently from plebian users,, havent figured out how yet but fingers crossed this all works out and we have a D-net (or M-Net)(thats gonna be its name, its catchy and catchyness is great branding). I know there's a market for it in the public because i'm seeing half of every student at my Uni covering their cameras with electric tape, the public knows they are being watched and would hop onto a more private network if it existed and was easily accessible.

Still gonna need to figure out how to keep public opinion high without getting the infamy TOR has from pedos and other monsters... Definitely a riddle for the ages: how to make something private and secure while keeping it clean.

NSA will certainly try to get on this, thought it would be easier for them to act as destination nodes than as inter-nodes.

Your solutions to theres troubles are wanted /cyb-sec/, that's why i came to you.

>> No.65251257

If this protocol works I don't see how you can get to anonymize it since you stated a datagram will sign each packed (which in turn be the payment). Eliminating the problems of Tor, though creating a new one for anonymity.

>> No.65251292

*packet, fuck.

>> No.65251327

how does the datagram kill anonymity?

Also what problem with TOR?

>> No.65251355

You might calculate a number of hops from sender to receiver, also the problem of tor is the one you said about bad press which is related to anonymity.

>> No.65251388

Wait, how does my system eliminate the bad press problems of TOR?

>You might calculate a number of hops from sender to receiver
Nah, i plan on just having it do it as an "in the moment" kind of method, where it caculates based on past node and next node, but is blind to the full path and doesn't track the number of hops. That is of course if such a thing is possible.

Maybe i should quickly make a simulation in C...

>> No.65251462

I was assuming the anonymity is removed, therefore the bad press on anonymity you mention is removed.

Doesn't looking at the current state of the packet let you know how many hops has done if it has a decreasing header like you mention? Anyway, maybe look at the research done at GNUnet on how they implement anonymizing protocols.

>> No.65251732

I usually wait for page 7 or 8, but I'm really enjoying the G-Net conversation.

>> No.65252044

So, what happened with that outerheaven thing? that you guys hyped months ago?

>> No.65252062

The decreasing header could be used to guess the number of hops, but it won't give an exact value unless we assume all inter-nodes have the same specs.

looking into it now fampai

>> No.65252184

It fell off the net, it remains a mystery. Rumours are that the operator was caught up in some serious data breach. That or an alphabet agency bagged him.

>> No.65252390
File: 40 KB, 624x351, jpeg.jpg [View same] [iqdb] [saucenao] [google] [report]


>> No.65252392
File: 1.28 MB, 3463x1999, Daybreak_by_Parrish_(1922).jpg [View same] [iqdb] [saucenao] [google] [report]

Once again night is upon us.

>> No.65252410

> git.gternet.me uses an invalid security certificate. The certificate expired on March 20, 2018, 2:17 PM. The current time is March 26, 2018, 12:52 AM. Error code: SEC_ERROR_EXPIRED_CERTIFICATE


>> No.65252429


is this gay child porn ? wtf

>> No.65252459

was it that guy maderas? rip

>> No.65252805

Maderas is still on nullsec, larping away

>> No.65253177


>> No.65254388
File: 300 KB, 660x900, old-city.jpg [View same] [iqdb] [saucenao] [google] [report]

>> No.65255136

It's been like that a few days already mate.

>> No.65255751

Page 7

>> No.65255837

Beginning my decuking lads. So far got Firefox nice. What's my next step.

>> No.65256038

get a firewall and if possible a good vpn

>> No.65256268

Funny you mention bitcoin because what you're suggesting sounds similar to the Lightning Network being developed as the layer 2 scaling solution for bitcoin. Is there a specific use case you're interested in that requires this kind of network? If so maybe you can build an app, or "LApp" on top of the Lightning Network? It's fairly new and experimental but you'd be able to tap into the existing bitcoin network effect.

>> No.65256387

Please tell me more about Lightning Network?

I don't really care about the method, all i want is to create a mesh-net by outsourcing it for capital. Integratng with bitcoin sounds like a good way of doing this, though i have yet to figure out how to make this accessible to the normie public and so far my best guess it some kind of contract between users and the network?

>> No.65256586

To fully understand LN you need a full understanding of how bitcoin works. More specifically, the throughput limitations of a proof-of-work open blockchain. LN is an off chain solution intended to increase the limited throughput by several orders of magnitude. LN itself is essentially a giant opt in mesh network, where a bitcoin transaction between party A and B is routed through what are called "payment channels." This essentially means the transaction amount is identified and transferred through a route of existing LN wallets/nodes. LN nodes would receive small amounts from the transaction fee pool, but it's nothing at all like the bitcoin mining reward. It's more akin to the method you've come up with, or a microtransaction, since one of the main selling points for LN is reduced tx fees. Take a look more into the project by Lightning Labs. It's definitely interesting to think of the possibilities that can be built on top of this layer that could expand bitcoin's scope from just currency/store of value.

PS buy bitcoin :)

>> No.65256827

The system sounds great especially in the context the other anon thought of. But how would the integrity of the nodes be proofen and would the transaction in the end still be approved by the blockchain making it slower again?

>> No.65256866

I don't know if I want my internet usage and comments permanently etched into the blockchain for all of posterity to decrypt or do other forensics. It's hard to have good, long-term privacy against a modestly-dedicated info hunter when using a permanent public leger.

>> No.65256896

Soon AI will be good enough to read through that leger and search for comments that match a certain person. Automated dissing, with all information in a single, sequentially arranged datastructure. Blockchain internet sounds like the NSA's dream. Don't fall for it.

>> No.65256903


>> No.65257003

Yeah, blockchains are way too centralized of a data-structure for me to trust them with the future of the internet. The future should be decentralized so that it is hard for bad actors to take control or easily monitor communications. Anyone peddling blockchains are NSA shills or trying to get rich off their crypto "investments" (gambles).
Let's not forget the punk origins of cyberpunk and work towards a decentralized future for the internet where freedom and competition in data transmission are encouraged. If we get locked into a blockchain we will lose flexibility and the ability to innovate in our data transmission. New, p2p/direct means of transmitting data will be unable to compete with the massive, ever-aging monolith of the blockchain until its eventual collapse. Let's avoid that mistake.
A decentralized, people-oriented meshnet, perhaps like >>65249094 is the smarter direction.

>> No.65257020

you've obviously never been to an art museum

>> No.65257039

4chan is basically an art museum

>> No.65257565

Both these are right, blockchain technology is not good for personal or private communication. Maybe there is a niche it can fill like contracts or other hosting of information, idk.

>> No.65257681

>is this gay child porn ?
Did you even read the file name??

>> No.65257938

Although anon you're right, you must recall that anon was talking "something alike" so maybe he can get just the LN proyect and adapt it to the G-Net. On other, matter, if for some reason our unic option would be the blockchain, /g/ created some kind of token or coin around the last winter or so. Maybe is the option to go?

>> No.65258179

>get a firewall
Agreed. I have used Smoothwall but updates seem rather slow these days. Any better solutions?

>> No.65258398

In the essentials pastebin it says get Blender. I can't find it. Anyone link me please

>> No.65258691


>> No.65258784

probably meant this:

>> No.65259274

I want to get into Cybersecurity but it only exists as a master's degree in my country (I guess)
Is it possible to find a job in cyber security by only getting some certificates like OSCP CEH CCNA COMPTIA SECURITY+ etc?
Or do I have to go through University first and then do it as a Master?
What do companies prefer?

>> No.65259513
File: 181 KB, 1465x800, in_the_cyberpunk_world_by_quarian_ira-d5c3vw3.jpg [View same] [iqdb] [saucenao] [google] [report]

Depends on your country.

Did you check the /sec/ Career FAQ?

>> No.65259976

Still researching for the FAQ, came across this one:
But, who is the author?

So, anyone here knows? The book seems rather comprehensible for an amateurish copy.

>> No.65260254

what /cyb/ things can you do with an unused macbook air

>> No.65260347

IRC server ?

>> No.65260764

I live in Cyprus if that helps
No I haven't read the FAQ, I can't find it in the resources to be honest.

>> No.65260802

install coreboot and gentoo

>> No.65260833

Most here knew Facebook was intrusive but I must admit the scope of it is still astonishing.

=== /sec/ News:
>Fleeing Facebook app users realise what they agreed to in apps years ago - total slurpage
>Facebook Messenger on Android uploaded far more than expected. Specifically: metadata for phone calls and text messages, even though they were sent with Android's default phone and SMS apps, not Facebook's Messenger apps.
Apps spying on apps? intriguing. It gets even better:
>The data slurp included Facebook app users' interactions with others who are not on Facebook – meaning people who never gave the Social Network™ permission for anything are probably profiled in its data troves anyway.

When will this horror end?

>> No.65260852

The FAQ lives here: ftp://collectivecomputers.org:21212/Books/Cyberpunk/

The /sec/ Career FAQ is a little bit below that, specifically: ftp://collectivecomputers.org:21212/Books/Cyberpunk/Security/
In both cases go for the highest numbered FAQ.

>> No.65261875
File: 1.47 MB, 1680x1050, 1421427525132.jpg [View same] [iqdb] [saucenao] [google] [report]

will night ever not be upon us?

It won't. I went through this with my mom a few years ago when I removed Google from my life. She couldn't understand why I would do that, and so I told her about the many and varied ways they record every detail of what you do. She was alarmed, being a heavy Google user, and asked me what she could do about it. "Well, you have to stop using Google", I said. "All of it?", she replied. "Search, Gmail, maps, Youtube...?" "Yes, all of it." "Well... I guess what they're doing isn't *that* bad...."

At the end of the day normies say they're concerned about privacy, and many of them genuinely are, but they won't change their ways or indeed lift a finger to get it. They all want this icky tech stuff to be someone else's problem, they want it to all be taken care of for them, so they'll continue to get spied on and exploited. Zuck knows full well that this is just a bad news cycle and that none of his revenue streams are in any serious long term danger.

>> No.65261916

Yo its knots from over at the gternet project. I have a node up and serving internet to my neighborhood using 5 raspberry pi 3s with stock antennas as meshed nodes. I need another person to set up something similar using the tools I wrote on our git to connect with and finally prove the concept.
Also our git has an old ssl cert I know. I have a full time job and haven't had time to fix it.
The project is not dead I'm waiting on yall for it to move forward. Join our IRC irc.jollo.org 9999 uses ssl

>> No.65262788
File: 1.90 MB, 800x1073, bh2kufftolb01.png [View same] [iqdb] [saucenao] [google] [report]

Alright guys, wife is killing me. She is demanding an in home security system with cameras. Ive avoided it fpr a year or so but now she wants to order them herself... so before that happens. I know wifi IP based systems are out but are there any /sec/ approved methods to having in home cameras that are realistically viewable without a dedicated playback terminal?

>> No.65263078

>/sec/ approved
>without a dedicated playback terminal

pick one.
seriously, clound connected is inheretly insecure and/or botnetted.
The other day I was wondering why mine was scanning my LAN. turns out, it wasn't hacked (not reachable from outside) but had been trojanized by the vendor appearantly. That thing had only one huge binary running - responsible for communicating with the camera chip, image processing, connection to the 'cloud' and various dubious activities.

TLDR; go for a professional CCTV or be prepared to fund the hardware with your data

>> No.65263199
File: 54 KB, 970x645, 02 - Installation.png [View same] [iqdb] [saucenao] [google] [report]

>wifi IP based systems are out
I'd advise to couple any wifi system with a deauth catcher (anything that will intercept and alert if someone is fucking with your wifi, you won't be able to block it because the standard must be supported by both router and client. Too rare. You can get an idea of what I'm talking about from SYWorks waidps. Old and overkill for the task, but a neat one if you didn't know about it.).

Same goes for blackout detection (old android or old laptop with working battery, simple script to get charge status, if it detects that socket has been pulled off (it happens with a blackout) trigger the alarm. Assuming you are on a diy setup, probably you can't have battery backup. Just in case...

If you are "that" kind of paranoid guy, you can use the old droid to also monitor for MNC, LAC, CID and prevent imsi catchers to sinkhole your 3g alarm trigger (ye you better have one, if they blacked you out, probably internet will be gone, unless you use a backup mobile router on batteries or even said droid with a sim. But mobile is still a liability)

For the rest, get some raspis and webcams, and set up yourself. Tons of guides out there, but I think you'll want to have fun and make it. Once the hardware is "open" (rpi are not totally open) the only limit is your imagination. You can even install OpenCV and do some great shit like people or pet recognition.

>> No.65264003

>They all want this icky tech stuff to be someone else's problem
It might be that it now has passed the tipping point. It is getting coverage on BBC World News and not in a good way:

=== /sec/ News update:
>If I’ve got your number, so has Facebook
>Suddenly lots of people are waking up and asking themselves questions about Facebook. How much data am I sharing with the social media giant? Did I really give permission for it to be collected and stored?

The significane is about to dawn:
>And, even more seriously, have I handed over my friends' data to be stored on some Californian server?
>I am one of those people and what I've discovered has left me somewhat shocked. Over the weekend I got hold of my Facebook data. It's easy enough, you go to settings, then general account settings and click on download my data.
>An hour or so later an email arrived with a link to click and I was downloading a 675MB folder chronicling all of my life on the network since I signed up in 2007.

>But then I clicked on a file called contacts. I was taken aback to find my entire contact list, thousands of phone numbers. Now this was not limited to Facebook friends and included many people in the public eye who might be disturbed to find that their private numbers were stored in this way.
He is a journalist and now it is blindingly clear that much of contact confidentiality is completely blown, as in shared with FB and countless alphabet agencies who were more than eager to share it back with British agencies. I think we should consider all "anonymous" tip offs to be totally, utterly and completely compromised at this point.

And journalists have a lot more leverage in such cases than Joe Anonymous.

>> No.65264107

I've used both rkhunter and chkrootkit. The former says I have 10 possible ones; chkrootkit says I might have ebury. Rkhunter says I have 6 suspect files too.

wat do
I reformatted Linux just a few days ago, but earlier I didn't get 10 warnings..

>> No.65264320

Anyone know how I can translate raw wireless USB HID packets into something human readable? I want to be able to understand the keystrokes.

>> No.65264592

>Suddenly lots of people are waking up and asking themselves questions about Facebook. How much data am I sharing with the social media giant? Did I really give permission for it to be collected and stored?
Lets hope they are really asking themselves that question. We thought normies will never care.

>> No.65264867

They'd better learn, and learn quickly.

With companies such as 23andMe plus CRISPR/Cas9 people will know their genetic makeup in greater detail than ever and this is high value information for everyone, from police and intelligence to schools and insurance companies. If (or rather when) that leaks out for a few hundred thousand people the implications will be enormous up to an including being shunned by insurance and pension funds. And there will be breaches.

>> No.65265039
File: 123 KB, 640x480, daybreak2.gif [View same] [iqdb] [saucenao] [google] [report]

>will night ever not be upon us?
Probably not. Unless it is summer beyond the polar circle in which case you get a few months long day with no night.

But here we are and night is once more upon us. And we again await Daybreak.

>> No.65265257

Just discovered the Harvard CS50 series of lecture videos and problem sets. Learning from a high energy guy explaining complex topics in accessible ways is much better than reading a bunch of web pages or text books. I've learnt more about C in the last couple of days than I ever would in a million years of browsing /g/.

>> No.65265489


>> No.65265970

do NOT buy bitcoin right now guys

>> No.65265994

Not relevant to the thread, but I always wanted to move to the North of Europe. For cold weather and low sun time. Also nice internet (Yeah, priorites, right?)

>> No.65266744

The problem is that they'll want to have their cake and eat it too. The solution is "you can't use Facebook", but they'll find that unacceptable, to great a loss of convenience. They'll demand that Something Be Done so that they can keep their Facebook, but have some regulation be made proscribing what it can collect and store. So some ridiculously inadequate and yet simultaneously over-complicated law will be drawn up and duly passed, which Facebook will duly ignore or work around. And then the normies will say "Gee, glad that's solved" and go back to sleep about privacy until we come back here in a few years.

A few radicals will demand that Facebook be broken up, but they won't do anything to prevent other companies, Google first in their ranks, to ply the same ad-selling business model that led to this. Even in Europe, with the GDPR and all, they'll never dare pass a law stating flatly "personal information may not be collected, used, or sold for any marketing purpose".

>> No.65267383

its that anon.
Not sure how to implement monetary gains, but i do know that the free market is the key to decentralizing the net (or at least, a key) so the utilization of monero or some blockchain technology may be inevitable in this scheme. However, the net itself isn't a blockchain, its financially supported by one.
I certainly will look into LN tech to see how it works and if it can be adapted in such a way as to make an anonymous ledger of some sort. In other words, if ledgers are involved the plan would be to record exchanges of cash only, and not the exchange of the data itself, in a sense. As noted before i am not too familiar with server technology, but i have already begun looking into it. Speaking of...

p2p isn't scalable as far as i am aware, and GNet is more focused on file sharing and shared accountability than anonymity and regular internet. Honestly at this point i doubt my system could scale as of yet, in fact ISP's are probably here to stay far into the future, but the hope is to create some kind of move to a less centralized lan, even if wan stays largely unchanged in the future. I don;t see many people using the mesh net for this purpose either, since most people want to use it for the normal internet, at which point someone or another will need to get in contact with an ISP, unless i'm wrong on wan or the true scale of the mesh net.

Speaking of, where's that map of all the local nodes and their approximate location?

Now there's an idea! this M-net idea of mine may start small, but God willing those seeking a profit will start establishing bridges between locations on land, and mayhaps even someone will be crazy enough to put their own geostationary satellite in orbit! at this point such dreams are merely hopes, but if there is profit to be made then anything is possible, and that is why i will find a way to make the mesh-net profitable, so that normies hop on the bandwagon like they did with bitcoin and spread this.

>> No.65267611

Get in the gternet irc tomorrow. We are doing this work already and could use help

>> No.65267695

Learning crypto at uni. Any personal projects to undertake that put things like asym crypto, hashing and all that in practice? I was thinking of setting up PGP for some emails and maybe signing up with keybase and experimenting with that. Cheers everyone

>> No.65268179

what time?
Also i am a busy man, so i can't dedicate all my time to this.

>> No.65268233

What's the IRC?

>> No.65269093
File: 94 KB, 601x508, intel.jpg [View same] [iqdb] [saucenao] [google] [report]

Is there any way to compress this into a single tl;dr for a newfag?

I want to find a VPN service that is Dedicated rather than shared that I can set up fulltime accounts and emails on without having to worry about other users in the VPN network being able to possibly sniff packets etc and compromise my passwords.

How can I most secure/harden a Win 7 machine from outside connections or telemetry?

I really need some basic bitch steps so I can prevent the leaking that is already happening before I start using a VPN service.
Any advice?

>> No.65269129

Can somebody walk me through these?
Are these important steps to take?

>disabling Ipv6
>disabling WebRTC
>Using custom DNS on VPN
>disabling Teredo
>turning off multi homed name resolution

Do I need to do all of this, and if so, how?

>> No.65269198

I'm working on a project at work involving 3 raspberry pis, plus I have one at home. The project will be over in May and the raspis will be coming home with me if they survive the trip to the stratosphere. I can set something up then to test, sorry I can't help sooner. I'll hop in IRC later this week if you want to discuss details. I work 8am-12am MTW and don't have time for much else right now.

>> No.65269212

>disabling Ipv6
Please don't do this

>> No.65269269

I just heard it was necessary to prevent DNS leaks

>> No.65269325

LN is actually semiprivate. Since it's an offchain solution to scaling that means not every transaction will be recorded on the permanent blockchain ledger. Only two transactions are recorded- the opening and closing of a payment channel. Once the channel is open, you can theoretically have an infinite number of transactions that will not be recorded on the blockchain, but rather mediated through multi sig smart contracts. It's only once the transacting parties decide to close a channel that the final balances between these parties is recorded on the blockchain.

I'm not sure how exactly this can be used to help what you're trying to achieve, but it should clear up some issues regarding Lightning Network's privacy in regards to what is in recorded on the blockchain.

>> No.65269523

the more i hear about LN the more i like what its got going.

>> No.65270171

can you put it in a nutshell please?

>> No.65270233

time to install again.
What did you install that didn't come from your paket manager?
Is there anything available to the internets?
As for ssh, you use cert auth, right?

>> No.65270276

look into mousejack

>> No.65270586

>The problem is that they'll want to have their cake and eat it too.
So far that has been the case, yes. And still many online newspapers use FB for verification and even for discussions after articles, feeding even more intel into FB. Now, however, it is clear that they have effectively betrayed every single one of their sources. And that should have been a sufficient wake up call.

>> No.65270866

Another anon here. Trying to explain this to myself and other brainlets so we can follow up the thread.
Which last anon said about LN meant that all the transactions between nodes will not be recorded. Which ones will be? The first and probably last, since it opens and closes the channel and it is necessary. In the meantime, the first anon wants to use this (more than?) average anonymous technology not only to make the connections more secure but also to take a shared benefit among said nodes, so the infrastructure can be at least maintained.
The issue is that even if people say blockchain is a decentralized techonology, we didn't see it working that way nowadays with cryptocoins, which makes this way something to be researched deeply to not fall in same errors.
Did I miss something?

>> No.65271038

I don't want to be a retard with my security so it would help a lot

>> No.65271885

Do you have a firewall? It should have deep packet inspection (such as Snort) and also be on a separate physical computer.

>> No.65272445
File: 142 KB, 744x1052, orbitology.png [View same] [iqdb] [saucenao] [google] [report]

Beyond the polar circle you get 24 hour days in the summer but also 24 nights in the winter. Far from everyone can handle this.

There was a plan to put a giant mirror in space to light up the night side, pic. related.

>> No.65272501

>There was a plan to put a giant mirror in space to light up the night side, pic. related.
Call me dumb but even if they had their reasons, I won't see it as a good thing. I mean, light usually means heat. This long long night is having place at really cold locations. I won't see it as a good thing to add more heat to a cold zone that already has a long light exposure once a year.

>> No.65272551

>"Yes, all of it."
It's your fault, you fucking autist.
It's like you're working for googbook or something.
Normies are going to continue being firmly in the botnet, while the only people that can educate them keep autistically thinking it's an all-or-nothing situation.
Every bit less data helps.
Replace Gmail with something else? Now goog doesn't have all your emails on a silver platter.
No google account? Now they'd need to burn extra resources to correlate all the shit they'd be getting for free.

Every bit helps, it's like defense in depth. You dumb fucks are helping gookbook do its shit by propagating this perfect solution fallacy to the poor non-tech populace that happens to care at least a bit about privacy.

>> No.65272722

Given that Google drops cookies from everywhere including advertising and YouTube plus other services they have and given they use ever-cookies, it means denying them email is just a tiny part of the problem. For instance how many know people use Google for fonts?

To be free from Google you need a rather severe policy, probably text only.

>> No.65272814

>To be free from Google
is nearly impossible for normies
"Don't let perfect be the enemy of good"
FFS don't be so retarded. You tell non-tinfoilers "stop everything jewgle, and install this dozen of extensions, and don't browse on yo phone, and use a dumbphone, and don't carry a phone with you, and wear a facemask at all times, and ...", what do you think they'll say?
Instead, get them on board with the most likely thing they'll agree with.
E.g. "use uBlock Origin, gets rid of those annoying ads".
Once they're used to that and show interest in privacy, something like "swap Gmail for provider X, with this 3-click export".
Then, when they get used to that and ask for more, get them to clear their browser data and not log into google outside of incognito windows.
And so on.

Please, I beg you, read up on "perfect solution fallacy", because your approach is counterproductive for the people you're trying to help, and potentially yourself.

>> No.65272892

yes, of course it's everybody's job to spoonfeed normies that shouldn't be using things they can't comprehend in the first place.
this isn't carebear general

>> No.65272927

>it's everybody's job to spoonfeed normies
Of course it's not.
Whining "normies dont care bout privacy" when you present it in the worst possible way just pisses me off, since you're doing all privacy-oriented individuals a disservice.
Do you get that? Your autism is literally making privacy more difficult, and the big guys don't even need to pay you to sabotage it.
You talking to normies about privacy is a net negative, is what I'm saying.

>> No.65272998

>Call me dumb but even if they had their reasons,
Real reasons are probably lack of money. Also steering a huge object in L3 is hard, like a sailboat in a fast river; gravity pulls you toards the Sun and Earth - Moon system and solar wind and light pressure act in the opposite direction.
>I won't see it as a good thing.
Upside would be more daylight, less need for lighting and more photosynthesis and potentially greater crop yields.
>I mean, light usually means heat.
Heat radiation in the form of infrared light isn't interesting here, mainly visible light, and red and blue in the narrowest scope. There is very little heat in this optical window compared to the full optical bandwidth of sunlight which is about 1 KW / m^2. You also have to factor in the reduced need for street lighting.

>This long long night is having place at really cold locations.
You still get great full moon light in the polar winter.

>I won't see it as a good thing to add more heat to a cold zone that already has a long light exposure once a year.
If you look closer at the lower diagram you will find a blue ellipse casting a shadow. That is an infrared filter, to keep daylight but trim down on heating. I vaguely remember that just a few square kilometres is enough to have a real impact on global heat balance.

>> No.65273114

Oww, the bad physics/astronomy knowledge here is painful. I'm going to tackle this comment this afternoon on my lunch break.

>> No.65273230

I'm not the anon you've been replying to but felt the need to chime in because excessive handholding is getting nowhere too imo

>> No.65273269

>is nearly impossible for normies
I would go further: it is practically impossible for most people and still hard for people who work in the field. Google has a gigantic range of servers, services, names and IP numbers and you have to block every single one of them to get out of their clutches. And they have been very good at what they have done.

>> No.65273314

I live in northern europe. Ask away if you have questions.

>> No.65273330

Which country in particular?

>> No.65273537

If you don't want to give up the country tell me if it is more into nordic zone, or more like the north coast or something like that.

>> No.65273760

You have to be careful about the terminologies here.

Northern Europe is mostly everything north of the Alps
Nordic countries are Iceland, Norway, Sweden, Finland, and Denmark
Scandinavian countries are Norway, Sweden, and Denmark
Scandinavia is very strictly speaking the peninsula comprising Norway and Sweden.
Denmark is sometimes added to Scandinavia for reasons of very similar language/culture/ethnicity/etc.

>> No.65273765

in terms of sbc things, would you recommend working with a raspberry pi of some description, or are there better ones out there albeit with less support?

>> No.65273924

Bump please

>> No.65274024

I've never heard anything about Iceland. Neither good or bad beside that they incarcerated their bankers for the crisis lol

>> No.65274898

It is well worth a visit. Dramatic landscape, huge glaciers, hot springs and more. The era of slaying polar bears using long swords is long gone.

I was thinking "pastoral punk" might fit but I see the term is already taken. https://satwcomic.com/icelandic-cookbook

>> No.65275941

Its Finland. Southern Finland. If you arent familiar with any nordic languages I recommend moving to sweden. They are quite good at english, and swedish is easy to learn if you already know english

>> No.65276255

That's something it always concerned me. I would love to move to Nordic countries since 10 weather + 10 internet + 10 politics but language barriers always concerned me above of everything. More if you also say English is not my mother language.

What can you say about Finland? I can try to specify if you think question is too vague.

>> No.65276537

Different guy from >>65275941 here.
Climates vary enormously. Norwegian west coast is wet. Really wet. Sweden and Finland are much drier. Denmark is really flat and windy but milder than Norway.

Scandinavian languages are not too hard to learn and if you come from a country in the Germanic language group it should be easy. If you understand one of the Scandinavian languages you will also (mostly) understand the other Scandinavian languages.

Finnish language is however very different. It is also complicated. The good news is that if you can learn Finnish you can then learn any language.

Internet is pretty good though I think Finland has the best standard. Sweden has the notorious FRA law that allows wire tapping of all traffic in transit.

Politics differ and I think Sweden has more political correctness than their neighbours and has a bit of dystopia going in parts, without the cyber parts.

>> No.65276925
File: 3.89 MB, 5152x2896, IMG_20180323_191607.jpg [View same] [iqdb] [saucenao] [google] [report]

Yeah this guy knows what hes talking about. I mainly recommended Sweden because they arent very concerned about language, so youll be able to get a job without knowing the official language, in Finland that would be almost impossible.
As for the laws and regulations I dont know too much about the situation in sweden. Our countries are kind of like a daycare. Very detailed and tight regulations to keep people from hurting themselves. Fortunately its pretty easy to stretch those limits if you put in some effort. If you keep out of the infamous ghettos in sweden like Rinkeby etc. youll never notice the dystopia part.
The nature can be very beautiful when its not raining. pic related. OC from about a week ago.

>> No.65277071

>Sweden has the notorious FRA law that allows wire tapping of all traffic in transit.
Only Sweden has this kind of thing? As far as I got from you, guy:
Best Internet: Finland, then other countries.
Best Politics: Sweden, then other countries.
Less Language Issues: Sweden, then other countries, Finland last.
Amd I wrong?

>> No.65277101

>Our countries are kind of like a daycare
I (Burger) knew a guy who emigrated from Norway for just that reason. Someone asked him why he would ever leave a Scandinavian country and he said "Here, I can go to the store and buy milk at 2am if I want to. There'll be a place open and no law telling me I can't"

>> No.65277495

>excessive handholding is getting nowhere too imo
No argument there, it definitely has many downsides, especially for the handholder.
The only thing I'd wish that privacy folk do is refrain from scaring those on the fence by sperging out with all-or-nothing nonsense.
Agreed, as a possible worst-case scenario. This is why it's even more important to avoid focusing on "complete ungoogling or nothing", and try to make progress battle by battle, bit by bit.

>> No.65277572

>Best Politics: Sweden
From last winter:
"‘Gender-equal’ snow removal procedures left Stockholm paralyzed"
If you don't mind the overhead of navigating a more PC-heavy environment, sure.
The general feeling I get is that they're the USA of Europe in the PC dept, in some cases going to further extremes (e.g. making race/ethnicity-related statistics illegal or something of the sort).
This might be /pol/ biased though, so as usual - do your own research. Just offering a counter opinion.

>> No.65277793

>>Sweden has the notorious FRA law that allows wire tapping of all traffic in transit.
>Only Sweden has this kind of thing? As far as I got from you, guy:
Officially only Sweden has this in Scandinavia. Realistically we do not know. An din any case we assume both Americans and Russians tap all the networks all the time.

>Best Internet: Finland, then other countries.
Probably true.

>Best Politics: Sweden, then other countries.
Not sure about that. My impression is that they have a lot more PC issues than the rest of Scandinavia

>Less Language Issues: Sweden, then other countries, Finland last.
Norwegian and Swedish are about the same though Sweden has about twice the population than Norway so Swedish has that advantage. Danish has a rather strangulated plummy pronunciation that is hard to do and hard to understand at times though in writing the languages are about the same. Finnish is one of the hardest languages on this planet.

Finnish culture and temperament are unique. Read Kalevala to see.

>> No.65277868

I don't mind PC actually, unless it gets out of hand like "We were gonna hire you but we're on our men cup" and that kind of things. As some anon said, I will try to avoid the ghettos and such.

>Norwegian and Swedish are about the same though Sweden has about twice the population than Norway so Swedish has that advantage.
I was more about what you (or the other anon) said about getting job without the official language.
At the moment, seems like I did not make a wrong idea about Nordic countries.

>> No.65278181

Why should I stop using Google's services? I have adblockers on all my devices and a phone with Lineage OS and no gapps. I don't see how Google could profit from my data, except by selling it to other companies but even then I don't see how these companies could profit from it

>> No.65278353

Sweden has long since gotten to the point where where it's pretty common for white people and men to be openly discriminated against jobs in certain industries, particularly tech and tech related stuff. In a lot of manual labor related jobs it's common to discriminate against non-immigrants and well integrated immigrants.

Take this as someone from a neighboring country that speaks the language and has thus had a very good view into what goes on in Sweden; They may have been a very nice place to migrate to back in the 60s, 70s and 80 (about half a million Finns did just that back during that time), but with the way things have evolved in the last couple of decades Sweden is not a nice place for first world immigrants anymore. It's not that nice for third world immigrants either, but at least considerably better than their home countries.

>> No.65278610

So you won't see a good option moving from a 1st world country to Sweden in the foreseeable future then?

>> No.65279451

See at the bottom >>65249094

>> No.65279480

Ah sorry, I've seen this picture so many times I overlooked it

>> No.65281150
File: 97 KB, 1024x751, CyberSuit2.jpg [View same] [iqdb] [saucenao] [google] [report]

Emergency cyber girl bump.

>> No.65281893

Page 8. Night has come. Good night my fellows.

>> No.65281906

What happened to the libertarian techno-future we were promised?

>> No.65281981

We fell asleep at the switch because we thought we'd won. We were the hares, the governments were the tortoises. We should have been building things like Tor and Let's Encrypt and cryptocurrencies as soon as we won the first war in the 1990s.

>> No.65281993

Can we get it back? Is it even possible?

>> No.65282024

Is it better to just use a modern Linux kernel patched with KSPP linux-hardened stuff (SElinux, App Armor, Knock, Etc) or use the old Grsecurity patch? And If I should go grsec should I use https://github.com/headslive/linux-heads or https://www.hyperbola.info/packages/community/x86_64/linux-libre-lts-unofficial-grsec-knock/ or maybe https://github.com/minipli/linux-unofficial_grsec ?

>> No.65282036

I need some help cracking hashes /cyb/. I downloaded the email/password list from the Myspace leak, but cant seem to crack the hash. Heres an example of whats in the list:
544292:[email protected]:544292:0x0B57CF1E0F27E0EA876726FCAB0A1AAEB9DFFC0F:''
Any help would be appreciated.

>> No.65282164

It'll be an uphill battle but it's far from hopeless. Honestly what I worry about most is how few people these days seem to value privacy, freedom, and independence. That's the biggest problem for any flavor of libertarianism, cyber or otherwise - the amount of people who would much prefer to surrender their liberty in exchange for being taken care of.

I'd lean more towards trusting something that's mainline over something that isn't. It'll have more eyes on it, more people attacking it, more people patching it. If it really worries you you could go and build your own kernel with stuff you don't need disabled.

But really all of this should be your second- and third-line defense-in-depth stuff. You don't say what the role of the machine is gonna be, or what your threat model is, but you should spend most of your time on the most obvious paths of attack. With a desktop that's the web browser, with a server its anything that accepts connections from other computers. Kernel exploits are sexy, but most breaches use, or start at, much more mundane stuff.

>> No.65283526


>> No.65283841

Gun control is an example of this, people are literally marching to have their rights taken away.

>> No.65285694

>Finally get a response in my job search
>It's for a fucking vendor making software for the Department of Defense and claiming it's open source.

Well fuck there's one interview process i'm just not going to give a fuck about.

>> No.65285983

Well, DoD, or at least parts of it, have done a few such things in the past. Also TOR has roots in defence.

Airforce Dreamworks once ran a very open project: https://spacesolarpower.wordpress.com/

>> No.65286747

I'm travelling to the UK soon. Does this general suggest a VPN? I'll only be travelling with a mobile device

>> No.65286787

>cant yell fire in a full theater

>> No.65286904

=== /cyb/ culture News:
>The Rise of Dismal Science Fiction
>To understand our economic system, we need speculative stories.
>After William Gibson coined the term cyberspace in his 1984 novel Neuromancer, it almost immediately entered our everyday vocabulary. A play on information theorist Norbert Wiener’s idea of cybernetics, cyberspace became shorthand for the world inside our networked computers, that digital landscape where we met to chat, play games, and exchange intimate secrets. Today, cyber is part of our political language, too, used to describe everything from digital warfare to online intelligence gathering. What often gets forgotten about the origin story of this term is that Gibson wasn’t just talking the future of computers, but of a world where tech corporations rule every aspect of our lives.

Not sure I can agree with the analysis in the rest of the article but this seems to be what some believe, like
>Ed Finn, who heads the Center for Science and the Imagination at Arizona State University, believes we’re using fantasy to confront fears rather than erase them.
>The original Blade Runner is a nightmare about endless recession, and Isaac Asimov’s celebrated 1950s Foundation series was partly about saving the galaxy with sound economic programs.

Historical revisionism or reinterpretation?

>> No.65287049

Humans mastered everything related to ignore and forget. So I'm agree with the "we use fantasy to confront fears rather than erase them"

>> No.65287079

I take it you are enjoying the mother of all lunch breaks, right?

>> No.65287196

>discover government is pushing cybersecurity apprenticeships
>none available in my state (Georgia)

Fuck. Back to searching for SOC monkey jobs it is.

>> No.65287219

Linux-hardened since unofficial grsec doesn't have meltdown and spectre fixes.

>> No.65288179

Page 9 folks.

>> No.65288298

>Why did you post this?
Because I could?

>> No.65288313
File: 65 KB, 1280x855, CyberSuit1.jpg [View same] [iqdb] [saucenao] [google] [report]

Thanks for bump. It has been rather quite here this week. Few images, even.

>So I'm agree with the "we use fantasy to confront fears rather than erase them"
So how do we overcome the fears? Random chance? Or proof that it is the autists that bring the world forward?

>> No.65288343

>So how do we overcome the fears?
The matter that I think it tries to cover it is about living among or with our fears, instead of precisely overcome them.
>we confront instead of erase
At least that's what I think it says. That we put it next to bed while living.

>> No.65288368

The autists bring the world forward, but the normies keep the world together. Balance is key.

>> No.65288874

Over time we have overcome a lot of fears, medieval religious fears (still seen in many parts of the world), feat of bad health( child birth was high risk once upon a time), irrational fears and more. There have been a lot of set backs but we have had about 10,000 years of mostly progress.

>> No.65289403
File: 32 KB, 466x366, Extensions.png [View same] [iqdb] [saucenao] [google] [report]

Can someone review my privacy scheme?
Im using cookie autodelete to delete all cookies, except from a few sites I want to remember logins from. All white-listed sites are set to automatically only run in their own container using Firefox's container extension.

>> No.65289735
File: 250 KB, 1285x1600, 830e1c75-fa9b-4040-a63f-ad15e7c96115..jpg [View same] [iqdb] [saucenao] [google] [report]


>> No.65290035

just went past a speed trap and snoop snitch went off
they're bored aren't they

>> No.65290952

Well, okay, you have the basics down, an ad-blocker and cookie management. Make sure and enable all the extra filter lists in UBO and test that that cookie management is actually working. Decentraleyes, good.

I havent used your UA switcher myself. There's two schools of thought on this, one says UA spoofing is useless and just adds extra entropy and that you should instead try to "blend in". (This is the Tor browser model) The other says that a unique fingerprint isn't much of a problem if the fingerprint changes and one can't be tied to the next. Personally I'd install uMatrix and let it do the UA spoofing. It's worth using both uMatrix and UBO since uMatrix gives you more fine-grained control of what is allowed from where, even if you use UBO's advanced mode.

The other things you might want are something to handle referrer strings (I use refcontrol, be warned that it's default is a blacklist - you have to change it to blocking or spoofing by default) and either HTTPS Everywhere or Smart HTTPS. I also have a redirect skipper, which you might want because pretty much every search engine (even DDG) puts that shit in its results links to track what people click on.

Also have a look through the ghacks user.js project. All sorts of shit crawls around under the about:config rock. This is where you get rid of telemetry, the safebrowsing crap that tells google what URLs you request, the DNS prefetcher that looks up URLs before you click on them, etc.

I don't have any recommendations for you on containers. I don't have them since I'm on 52 ESR.

>> No.65292068

Are sex bots cyberpunk? >>65283045

>> No.65292713

Again on page 8.

Here is a review of Cyberpunk games: https://youtu.be/mg9GNU1V8_0

Do you agree to this one? The FAQ is a bit short on this topic.

>> No.65292744

Thank you for your reply,
On user agent switchers; I will definitely not blend in, using Linux and and all... by best bet will be a switching agent. I have it set up to do so.
I have just installed uMatrix. and i will check it out. it looks quite promising. I hope it will be a smooth experience once its set up completely. I do have a few questions; you recommended a referrer string spoofed. Is the one in uMatrix not sufficient? Also, how does uMatrix handle UA spoofing?

>> No.65292911

uMatrix has a referrer-spoofing thing, but it's just an on/off checkbox. At least in my version, maybe the New Webextension Order has some additional features. I use Refcontrol since 1.) I don't want the referrer spoofed only on third-party requests, I want it blank wherever possible. Yes, blocking referrers for first-party requests is, technically, pointless, they aren't giving the website you're on any information that they couldn't already get from their web server's logs. But I like the idea of doing it anyway because it makes it that much more difficult for them to collect their "analytics". and 2.) I have run into a few sites that it breaks. You'd think nobody would be daft enough to depend on referrers being accurate on the modern web, but I've run into places that do. Hence I want a whitelist.

uMatrix's UA spoofing has the same drawback of no whitelisting, but for UAs I haven't found it to be a problem. It's a setting on the same page, and it has a list of UAs that it'll pick from, and a link to a page with a regularly-updated list of common UAs. And it can automatically switch do a different one every X minutes, so I reckon its good enough.

Also bear in mind that your camouflage doesn't have to be perfect, just good enough to fool the observer. Technically spoofing your UA doesn't hide the fact that you're using Linux, because things like TCP fingerprinting can tell operating systems apart. (Go read the nmap docs if you're curious about how) But in practice that's difficult and invasive to set up, so few places do. They rely on the UA and whatever some third-party browser-fingerprinting scripts tell them. Some of those fingerprinters are pretty good - but only if their script runs.

>> No.65293182

What is a safer way to install Ubuntu?
Without Internet access then put on firewall asap, then all those updates
With Internet, updating your distro as it installs, then putting on a firewall?

The given situation is that the IP address is known, and the PC uses Ethernet without a hardware firewall available.

I realize this is retarded and contra-productive to ask here to some extent, but if someone could give an input and back it up why you believe one option is safer than the other one, that'd be really awesome, really.

>> No.65293208

I couldn't find it, reason being: It as been removed as of 1.1.14

"Privacy-wise flawed user agent switcher removed

User agent spoofing as been removed. This was planned since a long while. The bottom line is that user agent spoofing for privacy purpose is best left to a dedicated extension, and really your best choice privacy-wise is probably to rely on Firefox's recent fingerprinting-resistance feature." -gorholl on githb

I guess ill keep using my current extension.
Thank you for your information, much appreciated.

>> No.65293246

unless you're online without a router or have an attacker in your lan you're good to go.
the default install shouldn't have any outward facing services anyway

>> No.65293254

Well the firewall on the machine itself should be a backup. Your router should be protecting it from inbound connections from the get-go. What's your threat model here?

>> No.65293256

First, go for debian if you want security.
Second. what exactly are you afraid of during install?

>> No.65293357

No router here, again, it's Ethernet-plugged.

>Your router should be protecting it from inbound connections from the get-go. What's your threat model here?
The given situation is that the IP address is known, and the PC uses Ethernet without a hardware firewall available.

>Second. what exactly are you afraid of during install?
I'm afraid that while everything is up-to-date, something could've gotten on my distro since the firewall is disabled by default.

>First, go for debian if you want security.
Why is Debian safer?

>> No.65293558

>Second. what exactly are you afraid of during install?
The scenario I wrote! I don't which is safer. I'm afraid my pc can be remotely hacked if I don't have my firewall on right away if someone pings my IP all the time; if I install if offline and put it on right away, I don't know if there are security holes since it's unpatched/un-updated.

>> No.65293611

Debian has an excellent security team that rolls out patches super fast and with high priority.The packages are somewhat outdated, but are super stable and thoroughly tested.

How are you not behind a router? where is the Ethernet cable leading to? are you on a public network? By whom is your ip known?

>> No.65293676

Well, you're unlikely to be pwned during the time it takes to set up the OS, even if there have been patches between now and when the image was built, and even if you're directly plugged into an internet connection with no NAT or firewall. This ain't 15 years ago where I got malware on a fresh Win2000 install within 30 minutes waiting for SP4 to download. But, if you're worried, download a full install image on a safe computer, install it offline, set up a firewall or anything else you want, then connect it to the internet and update it.

The other guy is (mostly) just being a distro elitist. Ubuntu doesn't have a bad security record. They do have a worrying privacy record though.

>> No.65293730

>How are you not behind a router? where is the Ethernet cable leading to? are you on a public network? By whom is your ip known?
It's just plugged into the wall.

>By whom is your ip known?
I've been told people have geoscanned my neighborhood, not an important detail of this, I'd rather just focus on how I can secure myself.

Thank you, I'll do this.

>> No.65293772

Im far from a debian elitist. im using, and have used a lot of distros. Im just saying that if security worries you this much go for a more secure distro whether it be SentOS, Debian or Fedora...
The reason i suggested Debian is that anon, presumably is already familiar with Ubunt.

On a side note. the only reason Ubuntu is somewhat secure is that it leeches off of Debian. They took what is good, and made it worse.

>> No.65293798

m8, that port is the gateway to the fucking wide open internet, are you retarded?

>> No.65294046

I'll admit I'm a fucking noob.

So nothing but a hardware firewall will do, then? And how'd you stay safe in a public areas? If SSH isn't enabled, how could someone go on and hack me if all ports are closed.

>> No.65294354

Yes you'll be fine.
Getting hacked lies mostly in badly written or un patched software on your system. Using a system firewall (gufw) reduces the attack surface. Also a less is more mindset is good to have. Having less software installed equals less points of entry.
Do you need to have flash installed? would be a good example. What ever you do have installed must be kept up-to-date.
If you want to take it to the next level look into SELinux. and look up recent guides about "security hardening" your installed distro,

Also use a VPN to secure your internet traffic.
you could pipe it trough your home, look into openVPN. You cloud also get a subscription. NordVPN for example. Proton offers a free but limited VPN service

>> No.65294514

It's the background checks and government thumb up your asshole I can't stand.

I explicitly filter out jobs that have even the mention of "security clearance" in the description so this jobs description was already worded deceptively as far as i'm concerned.

I'm not going to help some government organization streamline their killing process and then act as if I should be grateful that i'm allowed to help them do it. I'm not going to judge the dudes who do it because it's a job but i'm responsible for my own soul.

>> No.65295051

Thanks for the info, appreciate it

>> No.65295059
File: 187 KB, 600x338, dexcosplay5.jpg [View same] [iqdb] [saucenao] [google] [report]

Most "secrets" are there to prevent people from knowing someone made a major mistake. Expect more contractual secrets around F-35 than technical secrets (assuming the Chinese did not in fact exfiltrate all secrets already).

Also some seem to sprinkle "secret!" like some kind of pixie dust over projects to make them more sexy. normally it is rather boring.

As for streamlining killing processes, did you check out the FAQ on RMA? You might find that of interest.

>> No.65295365


>> No.65295432

Endchan seems to be down, anyone knows something about it?
Wanted to check out the Endware link but my FF tells me its not available :/

>> No.65295504
File: 270 KB, 1024x768, Autumn Leaves.jpg [View same] [iqdb] [saucenao] [google] [report]

Name (leave empty)
Comment (leave empty)
Password [?]Password used for file deletion.