[ 3 / biz / cgl / ck / diy / fa / g / ic / jp / lit / sci / tg / vr / vt ] [ index / top / reports / report a bug ] [ 4plebs / archived.moe / rbt ]

/vt/ is now archived.Become a Patron!

/g/ - Technology

View post   

[ Toggle deleted replies ]
File: 124 KB, 1140x507, cyber.jpg [View same] [iqdb] [saucenao] [google] [report]
65044758 No.65044758 [Reply] [Original] [archived.moe] [rbt]

Ω All are welcome here; the world is fucked and we are all in this together.

◙ Cypherpunk Manifesto >>https://www.activism.net/cypherpunk/manifesto.html

◘ Cyberpunk Manifesto >>http://project.cyberpunk.ru/idb/cyberpunk_manifesto.html

∆ Hacker Manifesto >>http://phrack.org/issues/7/3.html

± Guerilla Open Access Manifesto >>https://archive.org/stream/GuerillaOpenAccessManifesto/Goamjuly2008_djvu.txt

▓ Fables, realities, prophecies and mythology of a community:

░ What is cyberpunk >>https://pastebin.com/hHN5cBXB

▀ The importance of a cyberpunk mindset applied to a cybersecurity skillset.: >>https://youtu.be/pcSlowAhvUk [Embed] [Embed] [Embed] [Embed]

● Cyberpunk directory: >https://pastebin.com/VAWNxkxH

▬ Cyberpunk resources >https://pastebin.com/Dqfa6uXx

▐ Cybersecurity essentials/resources >https://pastebin.com/SCUbhpjP >https://pastebin.com/VTXRAPxM

Cntrl + F Basic Knowledges, Basic Training, Arms/Arm >https://pastebin.com/rMw4WbhX

▼ Endware: Heavy armor for anons, by anons >>https://endchan.xyz/os/res/32.html

⦿ Shit just got real: >https://pastebin.com/rqrLK6X0

=== /cyb/ News - for the world is more cyberpunk than ever. ===

>Would you hack your own body?
>For some, transhumanism - the theory that the human race can evolve beyond its physical and mental limitations with the help of technology - is a crucial part of the advancement of society.

>Trump's FDA is allowing Genetic Prediction tests to go forward.

>/sci/ is guiding OP to treat its own genetic disease, got genuine replies

>/sci/ was discussing making elves

Last Thread : >>>65034028

>> No.65045028
File: 1.76 MB, 1500x800, 1504122218333.png [View same] [iqdb] [saucenao] [google] [report]

Cyberpunk threads are my favorite. I don't have anything to contribute except some images though.

>> No.65046285

bumping for justice

>> No.65046574

pf or iptables?

will I be fine with a nftables + snort setup?

>> No.65046612


>> No.65046923

I was about to try nftables on my machine. f the syntax is so good then I'll pick it up in no time.

>> No.65047183

reposting because I didn't get an answer, what would make my CTF walkthrough videos better or good?

>> No.65047223

iptables for me. Although for me they serve different purposes somehow.

They told me nftables become a disgusting piece of software although it started nice. How do you feel it?

>> No.65047259

That's the only reason I visit these desu

>> No.65047381
File: 991 KB, 3686x1791, 1455377847072.jpg [View same] [iqdb] [saucenao] [google] [report]


>> No.65047398
File: 1.77 MB, 1200x1200, 1517400139612.jpg [View same] [iqdb] [saucenao] [google] [report]

For great justice.

>> No.65047430
File: 1.87 MB, 750x750, cybfeel.gif [View same] [iqdb] [saucenao] [google] [report]

Is anyone into AI/cv ?
I just setup the environmnent to work with cv and run simple face recognition script. Planning something funny for my free time.
Do other anons have cool experiences or projects to share on this matter ?

>> No.65047554

You should train it to recognize animal faces.
Set up a bird feeder, and keep track of which birds and squirrels are eating how much food.
Be interesting to see how that might change over a season.

>> No.65047577

And after that proof-of-concept, that software sounds like it would be super useful to animal sanctuaries and shit.

>> No.65047583

I didnt use it yet just have it installed on a spare machine. Why they say is disgusting?

>> No.65047597

If I remember right, the intention was right but they it developed in a weird way? I asked it at /flgt/

>> No.65047642

Developed in a weird way? That concerns me, is a critical piece of software, if it happens the design has flaws then is as good as dead.

>> No.65047649

Let me dive into archive and I will give you some links.

>> No.65047690

nftables was designed as a "modern" replacement for iptables
besides 2 or 3 features regarding vpn it pretty much werks already as such.
since I didn't want to learn obsolete tech, I just started with nftables
and snort seems reasonable to complement

anything I'm missing?

>> No.65047782
File: 58 KB, 1008x720, my body is ready.jpg [View same] [iqdb] [saucenao] [google] [report]

fugg... I like this idea. Not much wildlife here to test, but I like this concept and if I don't start with birds, I can do as well with cats and dogs.

>> No.65047928

The replies I got

Extra information I got:

So after diving for a while, actually they told me nftables was a piece of shit but they never stated why. On my side now, the only matter that seems to happen was the fact that was being developed. So I must take my words back.

>> No.65047937

Cyberpunk has nothing to do with cybersecurity

>> No.65047959

Sounds like anti-marketing, spooky. Thanks for the info man.

>> No.65047975

No issue man. I like to do this kind of thing because it lets me check if I learnt something right or not. Keep going and tell us how nftables comes up. If we will have to migrate as it seems the case, it would be nice to be learning about it.

>> No.65047985

wew, looks like for once I made a decent enough choice

>> No.65048195

Finally my favourite and comfiest thread is back, thanks bros

>> No.65048540

Agreed. It is also one of the very few generals that has in the last few years actually made something, the FAQs.

>> No.65048685

I guess it must now be at least 2 hours since the last major malware revel. So here is another one.

=== /cyb/ /sec/ News:
>Slingshot malware uses cunning plan to find a route to sysadmins
>The malware, dubbed Slingshot by researchers at Kaspersky Lab and showcased at the firm’s Security Analyst Summit, resides in Mikrotik routers – presumably on the principle that the only people who access the devices are an organization’s IT team. It’s not known how the malware gets onto the router, but it contains a malicious dynamic link library that’s capable of pulling in all kinds of nasty attack tools.

>The malware also appears to have had a long lifespan – the code was tagged as Version 6.x and text notes in the software suggest it was developed by an English speaker. Kaspersky thinks that the amount of time and money it would have taken to write Slingshot strongly suggests it was developed by a nation state.

Especially interesting is how very specific this malware is: it works against one single brand of routers. It would therefore not be too much of a stretch to assume there is one such malware for each and every brand of routers out there. They just haven't been found, yet.

>> No.65048733

Checking the brand, MikroTik, it seems someone is hard at work to wipe out all traces about it on Wackypedia:

>> No.65048841

actually, if it was nation-state level, it could be that it was developed for one specific kind of router to target one particular nation or facility.

If you make a virus that only works on the type of hardware your enemy uses, it won't be easily turned against you

>> No.65048903
File: 365 KB, 1920x1080, 1*DceCB_l5br6Tio7Qg-zkrA.jpg [View same] [iqdb] [saucenao] [google] [report]

given all the latest pretentious bullshit-tier threads like /mg/, even /handsome men general/ was getting interesting. Really glad you guys are back, this is the single best thread in the board. I'll sit back and quietly lurk.

>> No.65048924

I visit /mg/, textpunk lives in there

>> No.65049011

shotas and a bunch of kids who pretend to know the shell live there. Sometimes some good post comes up but it's pretty rare. Let's keep this in topic.

Newb question: if my router has every external port closed and a firewall configured properly, do I still need a firewall on every other running machine in the lan? Or having the router compromised automatically compromises any machine in my network?

>> No.65049182

someone shop in dwarf fortress plz

>> No.65049322

Bumping the thread with a silly question:

If I have two machines/containers/VM/whatever, on two IP on the same lan, but I want to run web services on both of them, how do I do it to reach it from outside the lan? They both can't run on the same port on the router, right?

>> No.65049519

What could be a good and reasonably cheap VPS that I could run VPN over, that would respect my privacy? I locate in EU.

>> No.65049702

For anyone not LARPing nearly as much:

>> No.65049773

That thread is a joke

>> No.65049824

This thread is a joke.

>> No.65049912

Didn't you say cyb has nothing to do with sec? After that two post they seem really linked.

>> No.65049942

As an antithesis, perhaps. All the more reason for us to part ways. Anyone who isn't a LARPer, head to /hmg/ now!

>> No.65049974

I meant, they both are a joke. It was waay easier.

>> No.65050036

You're a joke too, for caring.

>> No.65050049

I care because. . .

>> No.65050061

>... I am a joke.

>> No.65050231

Care to expand on that?

>> No.65050303

Well, consider the following:
>1) Cyberpunk implies allowing government control.
>2) As we're well aware, the government cannot accurately control the Internet.
>3) To believe in cyberpunk and cybersecurity is an oxymoron as one implies that you DO NOT understand information technology, whereas the latter implies that you do.
>4) This synthesis of seemingly discordant words MUST be a joke.

>> No.65050305

Land of Woz is supposed to be a Cyberpunk comics. Anyone got the collection? Seems much has been lost.

>> No.65050360


>> No.65050374

The premises
>1) Cyberpunk implies allowing government control.
Does it?? In fact the government is close to invisible in most Cyberpunk literature, movies and comics. Just where did you get this idea from?
>2) As we're well aware, the government cannot accurately control the Internet.
Governments seem fairly able to shut it down. It just hurts society more than it hurts those they want to control. Also governments seems rather successful in monitoring everything.

A conclusion from a broken premise is usually wrong but can still be interesting.
>3) To believe in cyberpunk and cybersecurity is an oxymoron as one implies that you DO NOT understand information technology, whereas the latter implies that you do.
Indeed this is a mistake. Security, cyber or otherwise, is about risk assessment of degrees, not an absolute. Crypto will most likely be broken, you just chose the settings so that the information to be protected will be safe for a given period of time.

Also you have the choice of not connecting your internal network to Internet at large. I am confident I am not the only one who have worked under such settings.

>> No.65050427

Now for my rebuttal.
>*Takes stand at podium.*
>1) Fuck you.
>2) Fuck you.
>3) Fuck you.
And for my closing statement.
>4) Fuck you.
>*Steps down from podium.*
Thank you all for your time, I feel very honored to have spoken here today.

>> No.65050446

Yep, this guy's a troll.

>> No.65050523
File: 92 KB, 469x428, umad.jpg [View same] [iqdb] [saucenao] [google] [report]


>> No.65050597
File: 908 KB, 1830x2698, image.jpg [View same] [iqdb] [saucenao] [google] [report]

I like the digital nomad vibe from carrying around "decks" and jacking in from the back alleys.
Anyone have /cyb/ hardware? Would be slick to find a little netbook and install a BSD without X.

>> No.65050775

Correct, they can’t both be on the same port from the router.
If this were my setup, I would just use two different static port forwarding rules, I.e. Externalip:80->host1:80 and Externalip:8080->host2:80
If that doesn’t work you could lump both websites into a single Apache server using virtual hosts

>> No.65050787

>Externalip:80->host1:80 and Externalip:8080->host2:80
Thought on this, but this won't work from phone since ISP gives randoom IPs when you use data. Am I mistaken?

>> No.65050833

What does your phone have to do with it? If you’re using it as a client, it’s fine. The only IP that matters is the evertnal of the router

>> No.65050861

>What does your phone have to do with it?
That "External IP" will differ every time I try to connect from mobiel connection. Although I think maybe I missread your explanation.

>> No.65050891

Sorry for the typo, phone posting. Why is your router using a mobile connection?
If that’s truly the case, you could use a DDNS service like dynu which will automatically update a dns name every time your external address changes

>> No.65050903

Ok, I'm seeing I fucked up.. Let me explain.
Mobile -> Router -> Server
When you said "External IP" you meant router's one?

>> No.65050931

>Putting the butt into rebuttal.

>> No.65051039
File: 3.67 MB, 4032x3024, ABA5DFCF-EC19-4B7C-A3DD-7539DA226027.jpg [View same] [iqdb] [saucenao] [google] [report]

I’m assuming you have two web servers behind a router, which is attached to the internet, and that you would like to reach those web services from outside your lan (I.e. from the internet) on your phone. In which case, it doesn’t mater what your phones ip address is. Just forward ports on the external interface of the router to the two internal hosts. In the example I doodled, this would be a rule like forwarding>

>> No.65051056

Okay, so I was understanding it right. I already forwarded ports for a few services so this makes me feel fucking mongoloid. the fact is that I must choose another port for the second web service beside 80 and 443. Right?

>> No.65051137

I got a netbook last week, a weak little deck haha, but the HDD is fucked and I don't have $ for a ssd.

>> No.65051166

Yeah, some of the common ones I’ve seen would be like 8080 or 81 or 4040, then you would just browse to or whatever you pick. Or if that doesn’t suit your needs, you could do Apache virtual hosts, and only have one web server. Then you would visit or
I’ve never actually used multiple virtual hosts (at least I think that’s what they’re called, maybe virtual directories??) but I know something of that nature exists

>> No.65051176
File: 811 KB, 1366x768, 9f4d72d1-0cc8-4a1b-afff-0ba839f21873..png [View same] [iqdb] [saucenao] [google] [report]

Just installed android-x86 on my laptop after my arch broke. Pretty comfy desu. Its a kind of dual boot with my debian install so i can have a work-botnet machine and a hacking one on the same laptop.

>> No.65051182

Thank you anon, I wanted to confirm I wasn't missing anything. My internets.

>> No.65051242


>> No.65051243

Another supposedly Cyberpunk comics is CYBERANTICS though some places it seems it is a children's story. Anyone got better info?

>> No.65051307

Glad to help

>> No.65051871

Cyberpunk arose from anarchist movements within the punk scene, bro.
Cyberpunk is saying fuck you, the people should control the wires.

>> No.65051938

>Cyberpunk arose from anarchist movements within the punk scene, bro.
Sure? Seems only John Shirley had a punk background, the rest were rather different.

>> No.65051957
File: 784 KB, 1280x720, Harold.png [View same] [iqdb] [saucenao] [google] [report]

Are there some similarities between this show and cyberpunk? I really like this show and so I would become interested in cyberpunk if there where similarities to this show.

>> No.65052195

You haven't read Neuromancer, have you?

>> No.65052220

I haven't read it but I have heard someone allege that POI was basically like a crappy ripoff of it, is that true?

>> No.65052238

I barely saw many chapters to say that, without revealing everything, Wintermute from Neuromancer was before The Machine from POI.

>> No.65052313

how would one go about building an apartment like this? do I have to have a couple million stashed away? god damn I come all over concept art like this

>> No.65052383

cum* is what I meant, don't know how to type and such

>> No.65052725
File: 71 KB, 630x495, ff_walker_f.jpg [View same] [iqdb] [saucenao] [google] [report]

Well, is there really anything about this that requires skills beyond normal house building skills? The multiple levels seem a bit needless though I know Japanese homes have different levels for indicative reasons.

Also curious, why would you want a place like this?

Pic. related is what I find more comfy.

>> No.65052769
File: 7 KB, 502x387, art.png [View same] [iqdb] [saucenao] [google] [report]

Looking for a cyberpunk pic of I think a girl, sitting in front of about 5+ computer screens, there's maybe a fishtank behind her, a window with a city view on her right. Pic related is a super rough idea of it.

>> No.65052916

i have the possibility of doing a development project at CMU for grad school instead of research or extra coursework. i'm thinking of making a skid-friendly tool to exploit meltdown or spectre

>> No.65052932

>why would you want a place like this?
exactly for the same reason you'd want a place like the one you pictured, because it's my personal preference.

>> No.65052941

google.com might have what you're looking for ;)

>> No.65053029

>because it's my personal preference
A perfectly valid reason, my friend. I just wondered if there were any other reasons.

That sounds like Serial Experiments Lain. Do a Google search and click on "Images" to do an image search.

>> No.65053406
File: 80 KB, 1200x848, YKK_CP.jpg [View same] [iqdb] [saucenao] [google] [report]

Night is here, let's keep this one alive.

>> No.65053433

shit can I just post concept art then?

>> No.65054000
File: 1.05 MB, 2048x1638, sencha.jpg [View same] [iqdb] [saucenao] [google] [report]

euro night is best night. keep it pumped

>> No.65054513

Page 7 mates.

>> No.65054572
File: 123 KB, 564x1338, comfy.jpg [View same] [iqdb] [saucenao] [google] [report]


>> No.65054641

Might want to run that past the faculty advisor before you get past the posting on 4chan about it phase.

>> No.65054818

Unfortunately it's not Serial Experiments Lain, it's an independent pic I think. Google image isn't finding much elsewhere.

>> No.65055148
File: 47 KB, 600x363, internet.jpg [View same] [iqdb] [saucenao] [google] [report]

fuck yeah cyberpunk

>> No.65055307

>We are, trenchcoats and shades aside, pretty much waist-deep in Cyberpunk right now. The only difference is that the lighting is better and only a small number of people want to fuck our shitty sex-robots so far. Writers and directors might want to commentate on this by bringing Blade Runner back, but too much of the general populace seems too distracted by the endless datastream of throwaway information in their pocket to care. Cyberpunk is just too quaint now. It’s virtually historical drama.

>> No.65055617
File: 2.20 MB, 720x1278, _.webm [View same] [iqdb] [saucenao] [google] [report]

Do you think the NSA computers look like this?

>> No.65055883

NSA might be viewing/collecting all of the information but from what has been leaked so far they seem to be pretty targeted in terms of what the actual humans are looking at. The problem is that machine learning is coming that can put intelligent eyes on every feed.

>> No.65056256

been a while since i came here. what happened to oh?

>> No.65056285

That's not how dunes work.
Wind blows sand up the shallow side then it falls down the advancing, steep crescent.

>> No.65056293

Everyone who liked it more or less left here and didn't come back, while everyone still here was either to lazy to switch or thought it was a honeypot.

>> No.65056306

makes sense ty

>> No.65056877

Fantastic article.
We live in a cyberpunk world.
The warnings were there. We didn't listen.
We don't need warnings anymore: we need solutions and directions forward.
Wholesome cyberpunk, about rebuilding post-revolution. To give us the courage to act and the confidence that we can indeed make a better world with this technology.

>> No.65057080

what about sec non bloated hardware?

>> No.65057462


Preferably as it is cyberpunk related. As it was.

>> No.65057931


>> No.65058304

Is this from Johnny Mnemonic?

>> No.65058317

cybersecurity is a myth

>> No.65059080

I agree with much of the article but at times the logic is rather broken. The author seems to agree that cyberpunk already is here in society at large:
>We are, trenchcoats and shades aside, pretty much waist-deep in Cyberpunk right now.
Also artists, authors and movie makes agree:
>Between thunderously potent sequel Blade Runner 2049, the appearance of the likes of Altered Carbon and Mute on Netflix, US remakes of classic cyberpunk anime like Ghost in the Shell and Battle Angel Alita, and of course, the upcoming Cyberpunk 2077 video game from the makers of The Witcher, the genre’s looks, tone, and conceits are currently more prevalent than they’ve been in more than a decade.
The people at large just does not care, just like people hardly talk about the air we breathe:
>Writers and directors might want to commentate on this by bringing Blade Runner back, but too much of the general populace seems too distracted by the endless datastream of throwaway information in their pocket to care. Cyberpunk is just too quaint now.
Yet the author concludes that
>It’s virtually historical drama.
I cannot agree. It is not historic, it is the very presence.

Interestingly Cyberpunk is not the only thing of the early 80's to reappear, Elite, the space game, also returned in the form of Elite: Dangerous. Seems to me that nostalgia also is a driving force.

>> No.65059219

>cyborgs and robots arent commonplace

>> No.65059370

Vultr vps instance for 5$/month
Paired with this

>> No.65059450

What does /g/ think of Jinteki.industries?

>> No.65059542

It is a good resource.

>> No.65059746
File: 88 KB, 800x1148, YKK_38.jpg [View same] [iqdb] [saucenao] [google] [report]

>That's not how dunes work.
I know. It is not a dune, it is a Cyberspace representation of a remotely operated ship flying just over the surface of the sea.

>> No.65059825
File: 261 KB, 854x788, Screen Shot 2018-03-11 at 10.31.10 AM.png [View same] [iqdb] [saucenao] [google] [report]

how do I learn or memorize all this by tomorrow?

>> No.65060197

>Confidentiality, Integrity, Availability (CIA) triad
Three things the CIA doesn't have...

>> No.65060201


>> No.65060276

read it.
if youve done anything with infosec it really looks like your just learning the basics.
chapter 1 should be easy to understand
chapter 2 should not be too bad either even if you dont have the math background to understand how it all works.
chapter 3 may take the most studying depending on how in depth it goes.
but in my experience, be sure you understand the information in Appendix F first, its the foundation of networking and very important.
especially pay attention to the idea of data encapsulation and OSI layers if they discuss it. I would recommend pulling up wireshark and taking the time to get familiar with packets being sent to/from unencrypted web sites so you can get an idea how networking works and you can see the data payloads.
what class is this for? or rather, what institution is teaching this course?

>> No.65060334

many questions here on the topic "how to hack", but what about how to protect yourself? what's the best way to secure a freshly installed linux? besides obvious stuff like difficult passwords, firewall on, updates always..?

>> No.65060353

I'm a business student and thought I would be interested in cybersecurity until I stepped into this class. it's a general cybersecurity intro course. a lot of the information and terms are pretty intuitive and chapter 3 only introduces the types of authentication at a face level and how secure they are.

I'm worried about appendix F mostly. I can easily understand Wireshark and explain things conceptually, but if someone asked me anything more I'd be screwed.

>> No.65060445

>I'm worried about appendix F mostly. I can easily understand Wireshark and explain things conceptually, but if someone asked me anything more I'd be screwed.
i can honestly tell you appendix F is the most important information shown in the picture.
having a strong understanding of data encapsulation and networking is the foundation for a large part of infosec, depending on exactly what you will be doing.
but with you being a business student i would suggest focusing more on chapter 3 and 1 more than anything, and the basics of chapter 2. you likely wont ever be the guy going thru GB's of packet logs looking for what exploit was used or the one assigned to defend a network.
do you have any questions about networking/wireshark/infosec that you would like to ask me?

>> No.65060642
File: 492 KB, 1534x1154, Screen Shot 2018-03-11 at 11.50.26 AM.png [View same] [iqdb] [saucenao] [google] [report]

can you write out an explanation of encapsulation at really really basic level? his explanation is 10 slides long.
the way I understand headers is that they just contain transportation data for each layer without writing to the data request itself? like where the data is going, where it's coming from, what it's doing, etc. I feel pretty confident about the basics, but the average person doesn't learn "in depth" basics about things like TCP and that's what I'm worried about.

>> No.65061376

Bumping this question

>> No.65061396

The pleb's answer

>> No.65061440

Moar pics like this please

>> No.65061441

encapsulation is the process of an application sending information over a network.
it starts at layer 7, the application layer.
data is encapsulated in lower networks leading down the chain until it is done being encapsulated at layer 1, the hardware level.
at this point the message is in a format suitable to transmit across the necessary hardware (ethernet, etc) and is sent.
when the message is recieved, the data is unencapsulated as it travels from layer 1, hardware, up to layer 7, the application which recieves and interprets the message.
not every message is encapsulated on each layer of the OSI.
for example, a normal HTTP GET request for a webpage only hits a few layers...
your web browser writes the request (layer 7), the message is encapsulated with source and destination ports (layer 4), encapsulated again with IP addresses (layer 3), encapsulated again with your host MAC address and the MAC of your gateway router (layer 2) and then finally your network interface card translates it into a form that can be sent accross ethernet (layer 1).
as the gateway router recieves the message it unwraps layer 1 and 2, and then re-encapsulates layer 2 with its own MAC, then encapsulates it with the proper format needed to transmit to next host, possibly fibre, ethernet, etc..
when the web server recieves it, it unwraps it from layer 1 to 7 until the web server is just looking at the payload, the original HTTP GET request

>> No.65061495

your image shows layers 4. TCP is a layer 4 protocol and that is what the information in layer 4 of a captured packet will look like.
if this were a full HTTP GET request captured, before bit 0 (starting backwards from bit 0 in the picture) would be the layer 3 frame (IP addresses), layer 2 frame (MAC addresses) and layer 1 frame (ethernet frame information).
following this layer 4 header would just be the layer 7 HTTP GET payload, which would be something like
GET HTTP 1.1 /g/thread/65044758

>> No.65061540
File: 151 KB, 1353x666, osi layer.png [View same] [iqdb] [saucenao] [google] [report]

i captured a packet on wireshark so you can get an idea of how to interpret it better

>> No.65061566
File: 128 KB, 1366x768, layer1.png [View same] [iqdb] [saucenao] [google] [report]

heres some more with the different layers expanded so you can see what information is withing them, starting with layer 1

>> No.65061574
File: 96 KB, 1366x768, layer2.png [View same] [iqdb] [saucenao] [google] [report]

layer 2

>> No.65061585
File: 120 KB, 1366x768, layer3.png [View same] [iqdb] [saucenao] [google] [report]

layer 3

>> No.65061591
File: 123 KB, 1366x768, layer4.png [View same] [iqdb] [saucenao] [google] [report]

layer 4

>> No.65061598
File: 121 KB, 1366x768, layer7.png [View same] [iqdb] [saucenao] [google] [report]

layer 7

>> No.65061603

and thats the OSI model in relation to an HTTP GET request in a nutshell

>> No.65061652

Only one I can think of.


>> No.65061788

Not that anon, but that's the pic I thought of but I was sure it hadn't an aquarium. Glad to be I was right.

>> No.65061847
File: 65 KB, 736x610, e0f94fa7478adbdd7caec8355aaba1cc--video-games-cyberpunk.jpg [View same] [iqdb] [saucenao] [google] [report]

this one?

>> No.65061909

thank you so much. this is what I was struggling with and you explained it really well. I understand the fundamentals are important, but hopefully this class gets more interesting.

>> No.65061966

Np anon. In my experience in infosec it's the basics that are most important, kinda like math.
Sure you can force yourself to memorize information, but if you understand the underlying topic you don't need to memorize much at all, it comes naturally

>> No.65062046

Anyone else here uses rkhunter? I get an "LWP-request warning"?

>> No.65062781 [DELETED] 

What do you guys think of RBAC https://www.rsbac.org/why

Looks like a good alternative to grsec to me.

>> No.65062817

What do you guys think of RSBAC (Rule Set Based Access Control) https://www.rsbac.org/why

Looks like a good alternative to grsec to me. I am about to give it a try.

>> No.65063257

Do you have the .onion for oh?

>> No.65063281

Process separation/ isolation, sandboxing, exploit mitigations,proper user accounts and access rights, closing open ports, firejail and staying up 2 date. Read through the is hardening manuals.

>> No.65063302

The operator went off the net, probably met with a white dry cleaning van. Before that it appears his job went south.

>> No.65064124

Page 8

>> No.65064726

And back on page 7. Let's bump with news.

=== /cyb/ News:
>What happens when AI meets robotics?
>The scientists are creating systems that can learn for themselves and be able to operate in the home, the workplace and even on the sports field.

What could possibly go wrong?

>> No.65064767

Look on the bright side when robots take over at least they'll patch their fucking systems in a timely matter.

>> No.65064796

I most certainly have that on an hhd somewhere. Will look for it tomorrow

>> No.65064871

Umm, does that include sex robots?

Asking for a friend.

>> No.65064951

>AI playing football
When will this replace divegrass?
But more seriously, when will they walk among us?
Will they all be connected to the CIA and/or ad companies and spying on us? Trying to sell us shit or services?
Or can we the nerds take back control of the development of technology and build robot friends?
So much promise for the future, but also so many ways this could play out horribly. How do we take control of the future?

>> No.65064996

I did say "fucking systems" did I not? Of course sex robots will be included.

>> No.65065057

>But more seriously, when will they walk among us?
10 years time, I guess. The Google guys think it will take a lot more time.
>Will they all be connected to the CIA and/or ad companies and spying on us?
Cue RMS starting an open (legged) free (sex) robot movement.


>> No.65065146

>Cue RMS starting an open (legged) free (sex) robot movement

I'd just like to interject for moment. What you're refering to as Linsex, is in fact, GNU/Linsex, or as I've recently taken to calling it, GNU plus Linsex. Linsex is not an fellating system unto itself, but rather another free component of a fully functioning GNU system made useful by the GNU corelibs, shell utilities and vital system components comprising a full OS as defined by POSEX.

Many computer users run a modified version of the GNU system every day, without realizing it. Through a peculiar turn of events, the version of GNU which is widely used today is often called Linsex, and many of its users are not aware that it is basically the GNU system, developed by the GNU Project.

There really is a Linsex, and these people are using it, but it is just a part of the system they use. Linsex is the kernel: the program in the system that allocates the machine's resources to the other programs that you run. The kernel is an essential part of an operating system, but useless by itself; it can only function in the context of a complete operating system. Linsex is normally used in combination with the GNU fellating system: the whole system is basically GNU with Linsex added, or GNU/Linsex. All the so-called Linsex distributions are really distributions of GNU/Linsex!

>> No.65065396

Good but only for few kernel versions, if you really want to go mad with MACs try SELinux.
SELinux can do some grsecurity features too.

>> No.65065446

Any practical books on networking and exploitation?

>> No.65065553

=== /sec/ and /cyb/ News:
Person of Interest becoming Preemptive of inspections:
>Vandal destroys Washington DC traffic camera
>Eleven traffic cameras were attacked in Washington DC in one day.

>Police believe these could be the people responsible.

It was only a question of time.And I cannot avoid noticing that a separate camera slewed in on the action. Someone, indubitably, is marked for an interview.

>> No.65065657

It was a matter of time, as you said.

>> No.65065683
File: 1.28 MB, 3463x1999, Daybreak_by_Parrish_(1922).jpg [View same] [iqdb] [saucenao] [google] [report]

Night is once again upon us, let's keep this one floating until Daybreak.

>> No.65065689

remember that one time a power station near SF got shot up? did we ever figure out why that happened?

>> No.65065701

I come here because I can gather resources from time to time and learn new things, but LARP here a little feels so comfy and I don't know why,

>> No.65065746

This is so close, but not exactly what I remember seeing sorry. There was a window on the right of the screen setup, you couldn't really see the person (I think?), and I think there was a fishtank on the right of the pic, behind the person.

No idea to be honest if it really was a girl.

>> No.65065778
File: 2.37 MB, 1280x720, 1520014140316.webm [View same] [iqdb] [saucenao] [google] [report]

Any recommended info (infographics, articles, books, whatever) on how the actual physical Internet works? I mean undersea cables, routing stations, satellite dishes, what are modems, who owns all this equipment, how do they decide which messages to allow and who pays for it all... blah blah blah, you get the idea.

>no cyberpunk images saved, have a random webm

>> No.65065817

Sorry, I know it's a bit tedious of a request. And maybe the other anon was right, maybe there wasn't a fishtank... I just keep having the image in my mind and I've scoured my HDDs, nothing.

>> No.65066195
File: 188 KB, 1200x865, 1517718011073.jpg [View same] [iqdb] [saucenao] [google] [report]

>> No.65066702

hasn't this been tried once and once again for at least 2 decades? has there been any advances lately, other than in the area of machine learning?

>> No.65066940
File: 117 KB, 630x1200, MV5BNWEzM2NjYjc[email protected]@._V1_UY1200_CR101,0,630,1200_AL_.jpg [View same] [iqdb] [saucenao] [google] [report]

Daily reminder that Adam Curtis is essential /cybsec/core.

>> No.65066958

>All Watched Over by Machines of Loving Grace
My man

>> No.65067010

only have seen his latest, but i enjoyed it

>> No.65067053

who's the dark skinned cutie

>> No.65067474

Night folks. Page 6.

>> No.65067557
File: 41 KB, 387x750, 1426073129693.jpg [View same] [iqdb] [saucenao] [google] [report]

Can anyone recommend a good VPN?

>> No.65067573

No such thing but https://github.com/adtac/autovpn

>> No.65068488

the the hour is late
and things go bump in the night
we're on page eight
we may soon drop out of sight

a good thread, but slow
important culture and philosophy
we share what we know
trying to rekindle the fire, please

>> No.65069323
File: 1.00 MB, 255x255, 1515895795411.gif [View same] [iqdb] [saucenao] [google] [report]

>> No.65069514

buy a vps and setup a vpn on it

>> No.65069527

could deploy a vps and ssh tunnel?

>> No.65069596

Interesting stuff. Too bad the BBC programme is not available online at BBC. I would have watched it.

>> No.65069936

Looking for *good* information on ssh tunnelling, get some recommendations?

I have a sub net I cannot telnet or ssh into so I am hoping I can set up a ssh tunnel from a Linux computer the sub net to my main net and through that reach the computers on the sub net. I have seen the man pages but they have focus elsewhere.

>> No.65070159

Anyone have tips for 24h CTFs? It's on-site IRL, and I've never really done 'endurance' events like that.

I don't know if I should try to keep myself from multitasking, or do it actively to try and keep my mind fresh.

>> No.65070270

what's the ideal low-cost burner computer?

>> No.65070308

I would like that fashion will move in some Deus Ex way. I think their clothes are pretty nice for daily use.

>> No.65070337

Good Idea, but it could be very difficult to distinguish between all the different birds out there

>> No.65070377

Probably Raspberry Pi.

Version 4 is expected in 2019; I hope they will make major upgrades as the present generation is getting a bit long in the tooth. Still, for the price it is a good computer and the community around it is also excellent.

>> No.65070418

>hope they will make major upgrades
I don't use PIs (Odroid user here) but I hope they separate the buses at least.

>> No.65070481

Thank you, anon. I'll look into it

what do you use your odroid for?

>> No.65070517

While the machine-level firewalls aren't explicitly necessary, they will provide a secondary layer of security should your router-based firewall be somehow compromised. After all, you wouldn't want the router to be a single point of failure, then have it be open season on all of your network hosts.

>> No.65070533

>what do you use your odroid for?
It used to be my 1st baby NAS. Now is just a TOR relay.

>> No.65070538


>> No.65070634
File: 181 KB, 1465x800, in_the_cyberpunk_world_by_quarian_ira-d5c3vw3.jpg [View same] [iqdb] [saucenao] [google] [report]

>TOR relay
Would you be interested to run a TOR sftp server for the document repository built up so far? The present FTP server has served us well but we have no guarantees.

>> No.65070674

I don't think I can do that the right and safe way. I could consider it but I don't want to run anything if it is not secure for you and all.

>> No.65070781

how the fuck is chinese shops cyber

this shit is stupid

>> No.65070989

I am not sure anyone here has discussed shops. Earlier in discussions of Cyberpunk cities Shenzhen was mentioned but other than that I am not sure China is much discussed in these generals.

>> No.65071324

I dunno, birds have more easily distinguishable features than humans.
Humans all look more or less alike.
Birds have massive differences in size, shape, and color.

>> No.65072162
File: 1.42 MB, 399x399, 1508035154700.gif [View same] [iqdb] [saucenao] [google] [report]

>feels so comfy and I don't know why
Seems many of us agree on this but it is not apparent why. Flickering neon lit back alleys in the rain is rarely associated with comfiness.

It is by far the most wide ranging and interesting general on 4chan I have seen.

>> No.65072588
File: 41 KB, 409x580, 3eb54b7a1faa47da6ce60badce744a87.jpg [View same] [iqdb] [saucenao] [google] [report]

here better one, in engrish

>> No.65072716

Strange. I had expected the system to capture number plates in real time and match the description of the records with the captured images.

And when will this be connected to an auto cannon?

>> No.65072718

Oh shit

>> No.65072839
File: 1.06 MB, 1760x1460, Screen_Shot_2016-11-17_at_11.14.54_AM.png [View same] [iqdb] [saucenao] [google] [report]

You can duplicate this software easily. The NSA and the GCHQ probably had something like this for years now.

>> No.65072918
File: 1.58 MB, 1566x992, Screenshot from 2018-03-12 11-30-53.png [View same] [iqdb] [saucenao] [google] [report]

Also, you can break the software rather easily. Pic related, the paper describes a way to make stop signs invisible to this computer vision algorithm.

>> No.65072984

This guy is maybe ugly as a fucking fridge from behind. But the fact is, which that kind of makeup/haircut/whatever is what mess up with the facial recognition of the videos you all are sharing.

PS: Not saying it in a smartass tone, just saying.

>> No.65073009

I remember makeup and haircut "tweaks" were used to counter facial recognition. Is this the dawn of the cyperpunk trend?

>> No.65073060
File: 538 KB, 1444x870, Screenshot from 2018-03-12 11-45-52.png [View same] [iqdb] [saucenao] [google] [report]

I don't think it will necessarily. InfoGAN and thermal imaging could be used to defeat most forms of camouflage.

You're not wrong about that image, though its probably not the most effective means of camouflage. Needs more dots and lines.

>> No.65073074

I got tangled in somethign but I wanted tos earch that post. I have a few more so I will search it in a bit but yeah.

>> No.65073113
File: 1.86 MB, 540x306, tumblr_o53701Tt061qcdqb0o2_540.gif [View same] [iqdb] [saucenao] [google] [report]

Is this general always this comfy?
Good vibes, interesting discussion, nice aesthetics.
Nearly 200 posts without any mention of soyboys and pajeets.

I like it.

>> No.65073157
File: 913 KB, 1200x630, prince-aoanew-facebook.png [View same] [iqdb] [saucenao] [google] [report]

Given that many systems use eyes for biometry, I wonder about pic. related...

>> No.65073176

kek, good one

>> No.65073284

Found this link when searching of the other one. I guess later will search again, have to go now.

>inb4 tumblr

>> No.65073375
File: 19 KB, 480x360, hqdefault.jpg [View same] [iqdb] [saucenao] [google] [report]

>that superficially futuristic GUI that's actually overdone and straight-up counterproductive

Why do movies and TV shows always do this?

>> No.65073443
File: 1.58 MB, 2592x1728, IMG_2834.jpg [View same] [iqdb] [saucenao] [google] [report]

looks like a headset out of gits

>> No.65073490

Combine with this and you are golden:

>> No.65073799

chanu is goat I wish someone took up the project tho I am not good with programming.

>> No.65074019

=== /cyb/ /sec/ News:
Redon-OS has not had any releases for a while but we just got news:
Of the more interesting things:
>Maybe the most exciting news for this period is the birth of a new project, relibc. Yes!, A C standard library written in Rust. Why? Mainly because it’s easier to develop than newlib (our current C library), better cross platform support and it has the potential to improve security. It’s a cool project with great potential and needs tons of help! We would be happy to mentor you, just send a mail to [email protected] and we will give you access to our Mattermost or just ask on the Discourse forum for more info.

Since glibc contains silliness like strfry (no, seriously) and is humongous nobody can know how many bugs there are, waiting for a fancy reveal complete with catchy code name and a dedicated web page. Also of interest is that this will have the MIT license. I am waiting for RMS to inject here.

>> No.65074029

This is why Redox must die.

>> No.65074129

I'm a mind mapper myself, what's that software you are using ??

>> No.65074182

Um, why?

>> No.65074347

Not the first guy, but general criticisms of rust is that it's not as fast as C/C++, partly because of its safety features.
For something as critical as core system libraries, the first guy would probably prefer speed over security/reliability that rust provides.
But that's not why redox exists, and it makes sense for them to write it in rust. It fits better for the purposes of their project.

tl;dr autism

>> No.65074988
File: 964 KB, 900x3850, Coffee.jpg [View same] [iqdb] [saucenao] [google] [report]

It could be argued that C++ is not as fast as C which in turn is not as fast as hard core assembly code (in spite of the claims from the compiler spuds).

All that is in the few percentage range in performance and kind of lost its relevance as much more had to be sacrificed for Spectre and Meltdown. For my part I don't do many computationally heavy things so I care more for security and reliability than raw performance.

The other thing is that Linux is close to becoming a mono culture. That is not healthy and for that reason alone I hope Redox-OS and also 9Front succeed.

And while I am philosophising a bit, I think there should be more focus on good programming rather than bolting endless JavaScript libraries together. I tried Elite on a 2 MHz 8-bit processor on a machine with 32 KB RAM and it was utterly enjoyable and playable. Few programmers today could do that.

>> No.65076179

Remember BadBIOS?

=== /sec/ News:
>Air gapping PCs won't stop data sharing thanks to sneaky speakers
>Computer speakers and headphones make passable microphones and can be used to receive data via ultrasound and send signals back, making the practice of air gapping sensitivite computer systems less secure.

>In an academic paper published on Friday through preprint service ArXiv, researchers from Israel's Ben-Gurion University of the Negev describe a novel data exfiltration technique that allows the transmission and reception of data – in the form of inaudible ultrasonic sound waves – between two computers in the same room without microphones.

OK, so many have covered up the video camera, now it is time to disconnect headphones, at the very least add low pass filters.

What will be the next thing? Exfiltrating data using smell??

>> No.65076210

It's an Android app called Mindly. However it's closed source so i use AfWall to block any communications from it. I use it mainly to keep track of what i need to do for my uni work

>> No.65076255
File: 526 KB, 720x480, patlabor.png [View same] [iqdb] [saucenao] [google] [report]

>Computer speakers and headphones make passable microphones and can be used to receive data via ultrasound and send signals back
Ok, this preent of us is ridiculus. Patlabor used this as its plot, but in that film we had giant robots.

The world sucks.

>> No.65076471

it's commie software developed by a bunch of cultural marxist sjw faggots

>> No.65076545

Is that supposed to be an insult?

>> No.65076665

thanks anon.
I'm a big supporter of Freeplane if youre interested in trying some other software.

>> No.65076732

Sup lads. Started a CTF writeup. Tell me what you think.

Part 2 coming whenever I can be arsed (probably 2 or 3 days)


>> No.65076892
File: 252 KB, 838x650, 15c.gif [View same] [iqdb] [saucenao] [google] [report]

レインを好きになります、レインを好きになり、レインを、レイン レインレインレイレイレレレレ

>> No.65076936

Interesting. Looking up I see
>Home - Freeplane - free mind mapping and knowledge management software
KM is an interest of mine, just how well does it do this? Most of what I have seen has been sheer hype.

>The software can be used for mind mapping and analyzing the information contained in mind maps.
What kind of analysis?

>> No.65077333

My experience with it has yet to dive that deep. I mainly use it to monitor + visualize thought and frequency, goal direction etc.

>> No.65077601

Do you anons know the /g/ network?

>> No.65078119

Last known onion was http://i2g3vsckj67dnjvb.onion but most likely it is gone.

>> No.65078141
File: 983 KB, 1440x1440, AirBrush_20180312183847.jpg [View same] [iqdb] [saucenao] [google] [report]

So I've got this chink fucker always bruteforcing my home server I've built a bash script that uses the Auth logs and iptables to read the failed ips from the Auth log and block them.. get what's the point of a workaround if attacker could just change address I haven't implemented any automation to the script I wrote.. was curious if any of you are more familiar than I am with network states because an established connection I've read doesn't guarantee that they got on the system..

>> No.65078469

Have you considered using a package like denyhosts or fail2ban?

>> No.65079067

bumpan, faglords

>> No.65079584

Bumping this. Seems a project /cyb/ enough to tell here.

>> No.65079623
File: 1.19 MB, 1240x1754, mesh10.png [View same] [iqdb] [saucenao] [google] [report]

They hang mostly at IRC, the ones already wired probably are passing time within their own network. I think there is a wiki too, but is working only through Tor.

>> No.65079911
File: 1.13 MB, 1920x1080, 1520595732981[1].gif [View same] [iqdb] [saucenao] [google] [report]

A stab in the night.

>> No.65079944

hello anons, how secure is this g/ternet
of course before using it i'll review it myself but i'd like to know what you guys say of it first
i don't wanna end up in the hands of the fbi niggers because running this compromised my security

>> No.65079965

It was audited and received a few tips from maderas.

>> No.65080159

>/cyb/ enough to tell here
as a matter of fact, I can say at least 2 people from there are /cyb/+/sec/ fans and lurkers here.
Also the IRC is comfy and we have good chats there.

>the ones already wired
tests are being run. If you run a node and want to link it with a VPN tunnel, just join the irc and give details. Sometimes the chan is silent, just announce and idle there.

>i don't wanna end up in the hands of the fbi niggers because running this compromised my security
there is no ftp/imgboard installed by default so nobody can upload revenge porn and get you in trouble.

>> No.65080746

I know that it wasnt close to being done

>> No.65082012


>> No.65082181

First you rangeban China. Next you rangeban Russia.
That will reduce the load significantly.

>> No.65082556

I think the feather/color patterns are probably all very distinct and unique

>> No.65082737

Add 4chins memes every 20 seconds

>> No.65082868

Looking closer I see that MikroTik uses a weird til based CPU architecture. That makes the scope very, very narrow.

>> No.65083610

>>/sci/ was discussing making elves
Now that one went quickly off the rails. And why not rather cat girls?

>> No.65084463

>my home server
aside from rangebanning China, I'd also change all default ports of your services. Pick something that is not in the common port list, you'll greatly lower the chances of being found out by autoscanning bots, wherever they are.

>> No.65084988

future Sex, the magazine, is said to be Cyberpunk. I just found a link to one copy of it. While obviously NSFW it seems rather silly.

There is a link to more things cyberpunk:

>> No.65085670

Page 7

>> No.65086024

Why are graduate roles in this paid so shit.

I can be a one in a million code monkey and earn more fucking money yet something more niche and specialized is paid worse?

>> No.65086122

Why are you guys using OpenVPN when PeerVPN exists? PeerVPN connects automatically to other nodes in the network.

>> No.65086274

OpenVPN is in use right now because legacy and ease of use, but there is no final decision yet on what to use, so in the future we might as well consider different means on tunneling each other.
Thanks for bringing up PeerVPN.

>> No.65086289

Cool, btw check KadNode is a p2p DNS.

>> No.65086443

I think that was brought up earlier, it's in the Wiki and looks promising.

>> No.65086475

Link me the wiki please.

>> No.65086647

vipq5vnfvlxb3x32.onion tor only is working, clearnet one is down atm, but you can download the backup at http://gternet.byethost8.com/wiki.zip

>> No.65086918

>Why are graduate roles in this paid so shit.
Probably downward pressure due to outsourcing. A lot of managers still believe outsourcing is the solution, no matter the question or even if there was one.

>> No.65087049

What are some must read technical books for lowlevel hackers ?

>> No.65087337

How low level? Electronics?
A book on C is a safe bet. Most likely also a book an assembly code.

If you want to work on the PHY layer you might want to look at the ham generals, like >>>/diy/ham and the Radio FAQ.

>> No.65087678

anyone else hate the term white hat and black hat? what's a better alternative? malicious and non-malicious?

>> No.65088459

>anyone else hate the term white hat and black hat?
Not really, it is just standard terminology. Also it suggests a mere change in head wear will change the person...

>> No.65088489

According to the old school guys, it's cracker and hacker. Cracker is malicious and hacker is the good guy. There's also red-team blue-team.

>> No.65088497

yeah I've also been considering just using red and blue

>> No.65088514

That works. I also don't like white, grey, black etc.. Red Blue is fairly logical and would be understood by most.

>> No.65088720

The correct term is cracker and hacker as >>65088489 said.

>> No.65088831

So red is "good" and blue is "bad"?
Or the other way?
Red is love and blue is amputated?
or red is devil and blue is sky/heaven?
These colors don't have as consistent of a culturally ingrained emotional response as white/black.
hacker/cracker is the best.

>> No.65088851

red is attacking blue is defending

>> No.65089143

Which is the opposite of TF2, OW, and most other videogames, btw.

>> No.65089246

Guy who started making CTF videos here

thinking about pushing all my command outputs to txt files and uploading them plus all my notes to an FTP server so my viewer can download it if they want, only issue is I've no idea how to secure FTP, can I make it so anonymous logins can't upload but can download? fail2ban is a must right?

>> No.65089461

Make torrents instead.

>> No.65089484

why don't you guys actually post OP images related to the topic of discussion, instead of 'aesthetic' barely related to it

>> No.65089493

actually a good idea thanks lad, plus scaleway offer a seedbox premade image so it'll be easy thanks mate

>> No.65089605

feel free to post

>> No.65089811

Do we have to wear black leather coats and sunglasses to be considered cyberpunk?

>> No.65089868

yes, also you need to have a thin punk gf and run from the police

>> No.65090100

Capture The Flag?

>> No.65090218

Electronics yea.
Assembly would be cool but very few books that are good.

>> No.65090374
File: 611 KB, 1024x1024, 1024px-Seal_of_the_United_States_Cyber_Command.svg.png [View same] [iqdb] [saucenao] [google] [report]

You will find quite a few of questionable origins on the FTP server mentioned in OP.

>uploading them plus all my notes to an FTP server
We use one FTP server already where all have write access. It is not sFTP but it is still used. Three FAQs live there.

Like this?

>> No.65090763
File: 10 KB, 600x222, serveimage.jpg [View same] [iqdb] [saucenao] [google] [report]

Can someone explain PGP whole disk encryption to me? I hear and read about it here and there and every time it bugs me, Why would one use asymmetric encryption on a system drive?
Or am i missing something?

>> No.65090810

Can anyone access the instagram mayalique_journey ?

>> No.65090931
File: 487 KB, 2000x1013, 1403474939584.jpg [View same] [iqdb] [saucenao] [google] [report]


>> No.65091256

best website for automatic malware analysis, specifically I want ot see where it phones home to

>> No.65091648

Does anyone know how Telecomix did their cool af stickers?

>> No.65091949
File: 104 KB, 1080x597, trump orb.jpg [View same] [iqdb] [saucenao] [google] [report]

I think I can manage getting a fat goth, is that good enough?

Also, a reminder that we live in the Deus Ex timeline.

>> No.65091979
File: 557 KB, 1920x1080, trump orb2.jpg [View same] [iqdb] [saucenao] [google] [report]

This is the Saudi "anti-terror" center were the orb touching ceremony took place.

>> No.65091999
File: 39 KB, 790x434, Majestic_12_hand_concept.jpg [View same] [iqdb] [saucenao] [google] [report]


>> No.65092024
File: 40 KB, 640x360, saudi deus ex.jpg [View same] [iqdb] [saucenao] [google] [report]

Only the fact that the kebabs are dressing wrong is ruining it.

>> No.65092296

PGP (in its guise of GPG) offers both asymmetric AND symmetric encryption, it's very versatile.
It's far from the standard nowadays with regards to FDE despite being somewhat popular and novel almost 20 years ago.

>> No.65092348

what a faggy ass op lol

>> No.65092443

What about WireGuard?

>> No.65092444
File: 74 KB, 215x230, file.png [View same] [iqdb] [saucenao] [google] [report]


>> No.65092570

"Biography of a Cypherpunk, and How Cryptography Affects Your Life"


Especially about cryptography and the US and the state agencies.

>> No.65092908

Is better than openvpn but I believe mesh networks will work better with peervpn.

>> No.65092951

You remind me something I questioned a while.
The thing of normal VPN, is that everything you do, appears to be done from the VPN's computer (in general terms, although if I'm wrong just tell me)
So, the only thing to do it "locally" would be setting up some computer in some other country under a false name and identity no linked to your real self, right?

If I'm right in that matter, why anons has an OpenVPN at their homes? To connect to the home itself through encrypted connection?

>> No.65093021

Good question. The thing is, is a common mistake to use openvpn for privacy, IF you are not using the computer hosting openvpn as an exit to a darknet or another vpn. The real use is in tunneling all traffic through that vpn, to hide any possible leak from prying eyes, but they are NOT for privacy on the clearnet (the regular Internet) unless you do what I just said.

Gternet, guys are planning to have exit nodes to the regular Internet too, and is a cool project already. Everybody should give them a hand.

>> No.65093180

So I can get on my home computer at work and shitpost freely.

>> No.65093192

So you will connect internet through your computer at home, right? Is not a risk IT seeing encrypted connections or making a connection of that kind to your home?

>> No.65093227

>obsolete tech
choose only one

>> No.65093287

Apparently not since I am able to do it lol. I don't use a work laptop. I just bring my personal one and connect on our guest network.

>> No.65093309

>I just bring my personal one
This makes way more sense then. ATM I always worked with company's comptuer, laptop or not, so I was trying to understand why would you try to reach home from the internal network.

>> No.65093674

Page 6. Night folks.

>> No.65094090

>Page 6

>> No.65094424

Are there any discreet keyloggers which can sneak past AV? Preferably free but am not opposed to using a paid service.

>> No.65094718
File: 12 KB, 410x230, _100408557_mediaitem100408555.jpg [View same] [iqdb] [saucenao] [google] [report]

RIP Steven Hawking, one of the first pseudo-cyborgs and certainly the most famous example of a human augmented by technology.

>> No.65094744
File: 111 KB, 1692x1252, 1508517375175.jpg [View same] [iqdb] [saucenao] [google] [report]

See You Space Cowboy ;_;

>> No.65095030

he's dead?

>> No.65095248

Check out Suricata for an IDS/IPS. I like it more than Snort, personally

>> No.65095521


>> No.65095559

Why don't i care?
Genuine question.
Additionally, what did he actually contribute to anything?

>> No.65095640

I'd suggest setting up a VM lab for analysis.

This looks promising too.

>> No.65095651

Probably by using the ton of services out there that will make basic merch.


>> No.65095932

He was a major scientist in astrophysics. Perhaps not doing things that resulted in immediate products on shelves but the foundation work in physics is very, very wide.

>> No.65097082

He didn't do anything bad. He wnet on the verge or everything. RIP.

>> No.65097430
File: 1.51 MB, 1680x1050, quadrilateral1.png [View same] [iqdb] [saucenao] [google] [report]

Actual question for you guys, in terms of security how would an installation of Windows 10 LTSB with the usual telemetry deletes compare to a linux installation like xubuntu or mint?

>> No.65098052

When it comes to those Windows telemetry deletes, you can never be sure you got everything, and Microsoft can always throw more shit in there on the next update.

>> No.65098063

reply limit.
I can make a new thread in about two hours when I get home, or someone else should in the meantime and link it here.

>> No.65098179

New thread >>65098152

New thread >>65098152

New thread >>65098152

Did my best

Name (leave empty)
Comment (leave empty)
Password [?]Password used for file deletion.