Masterchan[a / b / biz / c / co / g / gg / global / k / lit / Movies / mu / nsa / pc / pol / sci / toon / tv / x]

Tutelary Technology - /nsa/[Catalog][Board FAQ]

[New Thread]
[?]

OT

TopBottom
Image Thumbnail

1. Posts must be related to the preservation of ones technological security and privacy to remain on-topic 2. [citation needed] To be taken seriously always cite a statement or prove with the tools of reason! 3. Along side digital; political, philisophical and physical based discussion of safety is encouraged

>>

Firefox security addons: https://addons.mozilla.org/en-GB/firefox/extensions/privacy-security/ Note: Many of these addon functions can be covered with about:config changes Firefox privacy and security about:config lists: http://kb.mozillazine.org/About:config_entries#Security. http://kb.mozillazine.org/About:config_entries#Privacy. VPN service: https://disconnect.me/ Security and Privacy apps for mobile phones: https://guardianproject.info/ Open source network protocol: http://openbts.org/ Open source hardware and software web server: https://wiki.debian.org/FreedomBox Opensource lightweight software: http://suckless.org/ Recommended systems for a full open source environment: http://www.fsf.org/resources/hw/systems



Image Thumbnail

opinions on https://traceless.me/ as a service? anyone had experience with speed limits of the subscribed service. Also general BitX discussion thread



Image Thumbnail

Two things: 1. For someone new to Linux who is accustomed to Windows, what's the best way to start getting familiar with it. Either a linux install on a standalone machine or a good version to use on VM to learn it. I got a copy of Zorin 11, is that a good version to start out in a familiar environment and learn as you go? Is there any guide that gives a side by side comparison, so you can understand what's closest to the Linux equivalent of what you're familiar with in Windows? (device manager, updating, etc). 2. For machines that you can't get away from Windows on just yet (setting up machines for friends or family, gaming rig, etc), how best to manage privacy? To start with, use either 7 or 8.1 (no 10) and remove the telemetry updates? After that, any preferred apps to use and to stay away from (eg using Firefox not Chrome)?

>>

>>3782 and then use a windows virtual machine, dual boot when you must

>>

>>3782 >Linux only has one thing that is weird compared to windows: the folder structure Umm, I'd rather call Windows' folder structure "weird". Sure Linux isn't perfect, but in comparison Windows is just a random heap of garbage with stuff littered everywhere

>>
Media deleted

>>3784 It's irrelevant, it'll be weird from the other OS perspective. Now, to >>3780: Dude, in Linux there's no c:\ or d:\ or any letter, linux mounts the file system in a folder as if it were any other folder. Same with network directories (network mounts), or USBs, etc. Even the devices are folders. But you don't need to worry about it, from the interface you just use the things. That's the beauty of Ubuntu (I don't know Mint but it's held high in concept so I presume is great too), you can get elbows deep into the intricacies of the OS or just use everything from the interface. Just one thing: Windows uses a special administrator user. Everything is done by admin. Which leave gigantic holes were attacks comes from. Linux has an admin called root. Never EVER use root regularly, use your own user (which is defined when you use/install Linux), that has limited permissions, that's good from a security point of view, and also for yourself, as your normal user you can't, for example, delete important system directories. In Linux, SYSTEM32 deletes you.

>>


Media deleted

Let's have Tor Thread Post links that still work. Torch: Tor Search Engine http://xmh57jrzrnw6insl.onion/ DuckDuckGo http://3g2upl4pq6kufc4m.onion/ The Hidden Wiki http://wikitjerrta4qgz4.onion/ TorChan zw3crggtadila2sg.onion/imageboard/ Imperial Library http://xfmro77i3lixucja.onion/ Sigaint http://sigaintevyh2rzvw.onion/mail/ Library(Good stuff) http://3cpleimu2getp5q7.onion/library/ Shells http://jq77mc73wz5wuawt.onion/ The Tin Hat | Privacy Guides and Tutorials http://qza32xuddl3guikc.onion/index.html TorFlix http://jl4m7ubpotnu2yos.onion/ Mail2Tor http://mail2tor2zyjdctd.onion/ The Secret Story Archive http://tssa3saypkimmkcy.onion/ OnionDir http://auutwvpt2zktxwng.onion/?cat=6 :3

47 replies and 2 media omitted.
>>

Is orbot and orfox safe for downloading?

>>

>Uncensored Hidden Wiki duckduckgo 'topic links 2.0' one of the first results is a pastebin containing the link, working uhwiki is linked there

>>

>>4127 Yes. Its tor for android. As far as trusting android, that's questionable..

>>

What forums do you guys use on the deep web? Here's a good reference for explicit sites. http://es2adizg32j3kob5.onion/

>>

add .to to go to tor site without tor, i dun know why you would do that but you still have the info



Image Thumbnail
Thread was moved to Off Topic

https://wikileaks.org/tpp-ip3/WikiLeaks-TPP-IP-Chapter/WikiLeaks-TPP-IP-Chapter-051015.pdf?t=dXNlcmlkPTU0MjUyMDgxLGVtYWlsaWQ9MTAwMzA= Last week, WikiLeaks released the final text of the TPP’s intellectual property rights chapter and it is absolutely terrifying. These are just a few of its most dangerous pieces: >Compel ISPs to take down websites without any sort of court order, just like SOPA. (Appendix Section I) >Extend the US’s copyright regime to require copyrights stand for life plus 70 years, preventing anyone from using works that belong in the public domain. (Article QQ.G.6) >Criminalize whistleblowing by extending trade secrets laws without any mandatory exemptions for whistleblowers or investigative journalists. (QQ.H.8) >End anonymity online by forcing every domain name to be associated with a real name and address. (Article QQ.C.12) >Make it illegal to unlock, modify, or generally tinker with a device you own. (Article QQ.G.10) >Export the US’s broken copyright policies to the rest of the world without expanding any of the free speech protections, like fair use. (Article QQ.G.17)

>>

>>3083 bump

>>
Image Thumbnail

holy fuck

>>

>>3083 holy shit

>>

Trump killed TPP

>>

>wikileaks Y'all co'ws thet lied tawk a boot givan awee freedom. You can all blame yourselves. Submitted. Going out of your way to justify bullshit that sets up others as the good guys. Don't like it. Don't spread it. Don't say it is a part of you or what you like. Govt is shit. A herd of parasites that confine others in order for themselves to seem superior to themselves. It has nothing to do with anything good. Exploitation is the same thing. Journalists are the same thing. Exceptions are precious, largely comprised of hope. Like little characters, mass produced and thrown away. They deserve better and they are the truth, Something good. Maintaining that isn't a witch hunt, it's an effort for what is joined to such to be nice, proving that truth and making it important. The wrong thing is obvious, abundant. Shouldn't matter and is nothing against what does. Traitors try to remove beauty, put it up again. They do it to make it seem as if from them. Like all religion. Those who comply to avoid being victimised further such. If you want to talk about something by bad, because your faggot ass wants to be on the winning team, remember what little had faith in you and do something for them instead they might like to be a part of. If the bad guys appeal to you as a good guy you should see that as true and do what you can so their attempt at existence isn't hopeless.



Image Thumbnail
>>

>for iOS



Image Thumbnail

Assange and wikileaks has been compromised. The insurance files released on the 14th November do not match SHA-256 hashes tweeted in October. This is shortly after many Podesta and Hillary emails disappeared from the leaks.

>>
Image Thumbnail

>>4136 TOR is also possible compromised but there's no way to prove it is or it isnt

>>

ROFL

>>

>>4137 If TOR exit relays are compromised, how can I be tracked? What about the entry guard and the middle relay? What about encryption? If it is indeed compromised, what can we use to talk securely using a website or group chat?

>>

>>4137 >global pedophile ring Come on. I mean, there is definitely some pedo shit going on with the higher ups, but the way this is worded makes it sound like the world is controlled by pedos. Also, tries to make the NSA sound better. As though the only reason Snowden leaked info was to help the CIA. Discredit Snowden, and you make the NSA sound a bit better. If that were true though, I'd expect that the powers to be would work hard to shut down the NSA, NOT support it and say how Snowden needed to be killed by a drone strike. Hard to say what could prove this guy correct though (short of say, Assange reappearing and confirming it...even then he could be compromised). NSA and CIA struggling is not really surprising, so that wouldn't prove anything. Everyone already knows that the FBI is involved in drugs. So the pedo info would need to come out. Not entirely sure it would collapse governments though.



Media deleted

Is full virtualization the future?



Media deleted

>The cypherpunk revolution >How the tech vanguard turned public-key cryptography into one of the most potent political ideas of the 21st century. http://passcode.csmonitor.com/cypherpunk



Media deleted


Media deleted

I just updated to Tor 6.0.5 >pic related It says * Update Firefox to 45.4.0esr There are a few pages of vulnerabilities for that version of Firefox. How secure can tor be?

3 replies and 3 media omitted.
>>
>>
Media deleted

https://blog.torproject.org/category/tags/tbb-60 Tor Browser 6.0.5 is now available from the Tor Browser Project page and also from our distribution directory. This release features important security updates to Firefox including the recently disclosed extension update vulnerability. All users should upgrade as soon as possible. That vulnerability allows an attacker who is able to obtain a valid certificate for addons.mozilla.org to impersonate Mozilla's servers and to deliver a malicious extension update, e.g. for NoScript. This could lead to arbitrary code execution. Moreover, other built-in certificate pinnings are affected as well. Obtaining such a certificate is not an easy task, but it's within reach of powerful adversaries (e.g. nation states). Thanks to everyone who helped investigating this bug and getting a bugfix release out as fast as possible. We are currently building the alpha and hardened bundles (6.5a3 and 6.5a3-hardened) that will contain the fix for alpha/hardened channel users. We expect them to get released at the beginning of next week. Until then users are strongly encouraged to use Tor Browser 6.0.5. Apart from fixing Firefox vulnerabilities this release comes with a new Tor stable version (0.2.8.7), an updated HTTPS-Everywhere (5.2.4), and fixes minor bugs.

>>
Media deleted

Unrelated, but that page looks really cool in full screen..

>>
Image Thumbnail

http://seclists.org/dailydave/2016/q3/51 So the prior version of TOR was completely unsecured, and anyone using it could have reviled their IP with all their activities done while using tor logged.... Firefox uses its own static key pinning method for it's own Mozilla certs instead of using HPKP. The enforcement of the static method appears to be much weaker than the HPKP method and is flawed to the point that it is bypassable in this attack scenario. The bug appears to be fixed as of the September 4th nightly build of Firefox but is obviously still unpatched in both the current production versions of Firefox and Tor Browser. I'm posting about this publicly now instead of waiting because @movrcx's post still shows how to take advantage of these flaws even if it doesn't describe (and he didn't know at the time) exactly how and why it bypassed certificate pinning.



Media deleted
>>

>>4107 notice how so many of them are DC FeelsGoodMan

>>

Any super hero that doesn't know how to protect him/herself on the web is going to be outted faster then Rolf Harris. It's a fun add but I wouldn't trust it.

>>

Hit Girl is my fave!



Media deleted

>With Windows 10, Microsoft Blatantly Disregards User Choice and Privacy: A Deep Dive https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive

1 replies and 1 media omitted.
>>

No, use Linux.

>>

>>4100 windows 7 and 8 use the same telemetry bullshit that 10 does so don't think you're safe there look at Spybot AntiBeacon

>>
Media deleted

>>4101 I would use linux but I have a couple of games I play that haven't transfered platforms yet

>>

>>4103 Dualboot or use wine then.

>>

>>4105 I'm gonna duel boot on an ssd no worries, any good ssd recomendations?



Media deleted

A new backdoor has been found recently that allows hackers to possess your system files and send them back to a linux-based server. FFMPEG which a popular codec has some backdoors so beware when opening video files from your media player since it can be backdoored to let them get access to your data. The backdoor can affect most operating systems including linux, mac, and windows. More detailed descriptions can be found here on those 2 links >http://news.softpedia.com/news/zero-day-ffmpeg-vulnerability-lets-anyone-steal-files-from-remote-machines-498880.shtml >https://news.ycombinator.com/item?id=10893301

4 replies and 0 media omitted.
>>

>>3762 Please read the linked article. Discovered Jan 12, fixed Jan 13 Update any versions of ffmpeg you may have >1. Is there any other way besides not just opening any webms? The bug was in the HTTP live streaming, playing files not affected >2. Is this problem on 4chan? Unless 4Chan does live video streaming now (Last time I was there the didn't), no

>>

Leave it to pedos to freak out about something that was patched before they even knew about it. OP could have been reminder to update, instead the sky is falling.

>>

>>3768 its an old thread from a different part of the web I only posted it here because nsa is dead and needs every bit of "new" content it can get

>>

>>3768 Actually I replied only to advocate and promote free open source software, it's not that it has known security bugs for weeks or even years till it gets fixed. General rule of thumb: If you read about it anywhere but the developer's mailing list, it is already fixed.

>>

Topchen. They're going to steal our CP.



Media deleted

our favorite coder gurl is back

>>
Media deleted

>>4096 fuck off. Kristen Titus is the ultimate gurl coder.

>>

I sit in on a few programming classes in uni. Her work seems like an assignment from intro to programming. I don't even know what the male program means but hers seems to be totally different. Maybe she should post one of the same type as hers instead of comparing apples to oranges.



Media deleted

Snowden on NSA leak



Media deleted

>Lepton image compression: saving 22% losslessly from images at 15MB/s what's the point in losslessly encoding jpgs... source: https://blogs.dropbox.com/tech/2016/07/lepton-image-compression-saving-22-losslessly-from-images-at-15mbs/

>>

very cool savage little loli, more of her. shes like something from the tiny lotus cult place

>>

so cute

>>

do you know her name?



Media deleted
Thread was moved to Off Topic

hai check out /tech/ on librechan https://librechan.net/tech posting on Tor without Anonymous Accounts!

>>

>>4092 >on topic

>>

>>4092 >Libre advertisement They need more CP thus they want ppl to get there



Image Thumbnail
Thread was moved to Off Topic

http://paste.org.ru/?vcp0wt http://pastebin.com/DFqQLX2d