/hobby/ - Hobbies

Entertainment, Education, Games, etc.

Mode: Thread

Max message length: 8192


Max file size: 20.00 MB

Max files: 3


(used to delete files and postings)


Remember to follow the rules

(99.85 KB 1200x851 Bk0010-01-sideview.jpg)
Code of Conduct(s) Comrade 09/24/2019 (Tue) 23:49:55 No. 923 [Reply] [Last]
Perhaps a declaration of technical principles would be a better term, but regardless the necessity of finding a means (beyond licenses out of necessity) to secure our software from outside meddling seems to be all the more essential the more I think about it. There are approximately 90 CVE's (70% due to memory safety) in each Linux kernel major version, many of which remain outstanding even after moving to the next version, with the average lifespan between 3 and 6 years for "high" and "critical" bugs. The Linux kernel is now approaching 28 million lines of poorly documented code, making it completely beyond what a actual audit is capable of assessing, beyond comprehension. More than this the development of the kernel and funding of the foundation are almost entirely in corporate hands. Linux is but a example, every large component of major infrastructure (and rest assured if it's major infrastructure it will become large) suffers from similar plights.

What I'm not attempting to advance here is the suckless philosophy. In my opinion suckless goes beyond attempting to restrict the scope of their projects to an obsession with SLOC to the point of harming correctness and completeness (for a sound list of necessary features see here: http://www.loper-os.org/?p=284). They do not document their programs, following the mantra that code is documentation (which is true but insufficient). Additionally they fail to critique the accepted protocols and divisions of applications, which would allow them to not only make more correct complete software, but also to make in aggregate simpler software. As a example why make a separate windowing system, terminal multiplexer, terminal emulator, and text editor when these things could all be combined as extensions of one another. Why separate your text editor from your web browser? Why work with text streams and the file system instead of having a single address space? Why take X-Server for granted rather than building of Linux's frame-buffer.

What issues is it that I'm pointing at here exactly:
a) scope creep
b) illiterate programming
c) unquestioned assumptions (primarily those given to us by unix)
d) over-optimization (understandability, and completeness should be prioritized over micro-optimizations)
e) insecure technologies (for example unassisted manual memory management, and unchecked type wraps)
f) incomplete software (corner cases handled etc)

Can you think of any more, or a consolidation of the terms listed here?
23 posts and 4 images omitted.
>c) unquestioned assumptions (primarily those given to us by unix)
What are these "unquestioned assumptions given to us by unix"?
Should I read "The Unix Hater's Handbook" to know? Would I be better served reading something else?
>What are these "unquestioned assumptions given to us by unix"? Should I read "The Unix Hater's Handbook" to know? Would I be better served reading something else?
That's a great book, although at this point many of the complaints are outdated you can still see some of the impacts, I'd encourage you to read it. Reading summaries of the Unix philosophy critically after reading https://www.dreamsongs.com/WorseIsBetter.html is also a good introduction.

The most important thing though I think is to just think critically about what Unix supports. Is it actually reasonable to say that every program should serialize and parse its data rather than just passing actual data structures? Is it acceptable that there are no safety measures making things as simple as moving, editing, or deleting a files foot guns? Is it tolerably that programs' source can't be inspected and edited live like in Emacs but rather we have to make forks and separate applications for even the most simple change, if we're lucky we have a cumbersome add-on system opaque to the user. etc.
I'm struggling to come up with a nice rule, or set of rules for what a good program's objectives should be. It's a much more complex issue that these issues of representation I've dealt with so far. It seems to me the most important semantic rule is that the program's objectives should be in the interest of their user. I can't really think of more than this.

I don't know if I'll leave it at that or not.
Here's a list of operating systems with a number of features better and more interesting than UNIX, TempleOS isn't listed here, but other than that seems pretty solid: https://news.ycombinator.com/item?id=10957020
Guess I'll wrap up these principles into a nice toasty CoC:

>Thou shalt operate in the interests of thy users, this is the ultimate commandment. Thy users will not always know what's best for them, so we may disagree with them, but try as we must to serve them.
>Thou shalt make thy user interfaces as physically and mentally ergonomic as possible, while recognizing often we are not capable of making interfaces capable of providing this for every situation, and thusly must allow for customization. When thy hath been forced to trade off between the interests of the users and the interface or artistic direction thy will always side with the users. This is the penultimate commandment all else is tertiary.
>Thou shalt make thy source code including the entire stack as understandable as possible. Certain components likely must be complex to reduce the undesirability of the system over all. Thy shalt always sacrifice undesirability for the sake of the interface and the users, but never for anything else.

(21.10 KB 236x329 josephplaneswalker.jpg)
Comrade 07/16/2016 (Sat) 08:45:20 No. 301 [Reply] [Last]
Who else spends his hard earned (or state given ;^) ) money frequently on commodity fetishes like M:tg cards? How is such behaviour to justify (there is no right living in the wrong)?

One pal of mine tries to get me into his rpg-group, and I'm honestly thinking about it, even tough I don't have much interest anymore in high fantasy-rpgs.

Any other non-vidya gamers around?
17 posts and 8 images omitted.
(125.70 KB 300x300 Rook.jpg)
I prefer real games like Hearts, Rook, Rummy, etc. Collectible card scams so blatantly favor the rich weak-willed that they can't seriously be considered games. Games that require one to "collect" the ruleset by buying individual pieces are disgusting examples of predatory capitalism. I'm surprised people don't compare Magic: The Gathering to the day-one purchasable DLC that video game enthusiasts despise so much.
>I'm surprised people don't compare Magic: The Gathering to the day-one purchasable DLC that video game enthusiasts despise so much.
But, they do? Day-one DLC can be anything, like strictly cosmetic things. DLC in single-player titles isn't the worst kind of DLC. The worst kind is when you have a competitive title and the DLC gives you an edge. The shittiness with Magic's business model is specifically that it's like that type of DLC, combined with gambling no less.

What would be a "socialist twist" to collectible card games? Caning. Perhaps going the opposite route. Adding extra cards to your basic set only makes you weaker, but if you win under these conditions, you can take a handicapping card from your opponent or something like that. These cards better be pretty. Or maybe we'll just rip off the existing concepts with the only difference that you can't buy the cards anywhere, instead kids get them for top grades or doing pioneer stuff.
>pioneer shit
I think by making a game out of merit badges one could really incentives participation. You could set up a points list where at each level you could save your points to redeem for higher level cards or spend them on lower items: in this way you could also implement some sort of lesson on the ltv.
(45.91 KB 375x523 1554257504269.jpg)
Traditional card games are boring as fuck though, part of the fun of MTG is the artwork, the story, and the increasing complexity of card effects and their interactions with each other. Although it won't ever fly in a store, I've had friends that build decks online and just print the cards out on regular paper and stick them into sleeves.
I played MTG everyday for a long time but I eventually got tired of it. I'm sure if I knew more people I'd be more into it again. I'd love to have an RPG group and play Vampire: The Masquerade that shits awesome

(122.05 KB 480x453 lmaobased.png)
Comrade 09/04/2019 (Wed) 15:34:15 No. 808 [Reply] [Last]
I know this is likely a common thread and shitty question, but where would a newfag baby socialist who wants to work on improving his general privacy start? And are there any good resources online for learning more about specific tech subjects (Obviously preferably free)?
5 posts omitted.
(28.21 KB 521x385 ublock-3rd-party.png)
- block 3rd party cookies
- block 3rd party scripts (pic related, will break a lot of sites)
- disable referer header
- use linux and open source software
- don't reuse usernames
- dnscrypt or DNS-over-HTTPS

Read up on these programs. Though many browsers are open source few actually collect zero data about their users. This is mitigated easily and should not be overlooked. If you're dealing with a nation state level threat you may well be fucked either way but it never hurts to take extra precautions, especially ones as simple as switching your browser.

Otherwise do as >>667 says
uBlock collects user data. You can turn it off but it’s on by default. I think something like NoScript is better.
> Use keepass to generate passwords for all websites
> Invest in an iron key USB drive usually costs between 40 to 80 bucks these are password protected flash drives that you can program to only open on certain computers, and can be bricked remotely. You can also set it up to brick itself if someone enters the wrong password.
> You want to have keepass on your iron key not on the desktop itself and certainly not on some cloud system.
> For security you want to have bit defender and Comodo firewall.
> Comodo is anoying as fuck but does the job of the fire wall pretty well for a free program.
> Use a combination of TOR and other vpns never pay for a VPN plenty of free VPN services that do just fine.
> Use a second iron key for your most secret of secret info
> Their are tons of programs that let you send encrypted emails for free but good luck setting this up with anyone from first hand experience most people will just call you crazy and refuse to download the decryption key.
> Find your routers IP address look it up on any browser a screen should come up asking for a username and password username is almost always admin password is almost always password from their change the password using keepass.
> Duct tape your face if all else fails

endchan.xyz Comrade 10/06/2019 (Sun) 15:38:12 No. 802 [Reply] [Last]
what happened to it?
I am in Canada btw. not sure if it's accessible elsewhere.
Domain losses and a server transfer. All at one of the most opportune times. I hope they can recover and try to be the 8ch successor they were supposed to be. If not, maybe it's time to aggressively push overchan on other sites.
its on the deep web too
here it is
you need to use tor.
.net works

(159.59 KB 497x496 feralhogs.png)
Linux, BSD setups Comrade 08/09/2019 (Fri) 21:33:50 No. 757 [Reply] [Last]
Discuss what's your setup and collection of applications on your personal computers, smartphones, embedded devices, Industrial equipment, etc. for opsec that other anons could use.
Gnu radio for police chatter?
raspberry pi gps with security features?
Special ECM equipment you're willing to show?
Post them here.
29 posts and 4 images omitted.
>Was wondering what Android/lineage build you guys would recommend, something thats reasonably secure (At this point just worried about companies stealing my metadata) and want to get rid of the adds that keep coming up in my shitty international version of android they've given me.
There is no such thing as a secure cell phone. Replicant is the closest you can get with android, but your device is not supported: https://replicant.us Looking around on XDA for you it seems like all your options are roughly equivalent in terms of security. Just get a official rom I guess.

>Cell phones are tracking and surveillance devices. They all enable the phone system to record where the user goes, and many (perhaps all) can be remotely converted into listening devices.
There is no such thing as a secure smart phone, install lineage OS on it to have a non shit version of linux, and turn it off when it doesn't need to be on, leave it at home when you can
*non shit version of android
Don't commodify your personal information. Everything is on a permanent record. Woke leftists are crypto-anarchists. Cyberpunk is now! Stop blocking Tor users!

OS: When your not into QubesOS, you should consider using a hardened Debian with VirtualBox running Whonix and for more OpSec running Tails from an USB-Stick.
Mail: Thunderbird with Enigmail and TorBirdy; provider: RiseUp, Autistici, posteo, protonmail, tutanota, disroot etc
Password manager: KeePassXC
Encryption: zuluCrypt
PGP: gpa or Kleopatra
Browser addons: uBlock, uMatrix, https everywhere, decentraleyes, Privaqcy Badger, User Agent Switcher, CanvasBlocker, Cookie Auto Delete
Cloud: NextCloud
PDF: Okular
Office: LibreOffice

OS: When you don't have a Google Pixel running GrapheneOS you should get LineageOS or any non-Google privacy enhancing AOSP. See https://www.xda-developers.com/
VPN Mode: channel everything through Tor via Orbot
Browser: Tor Browser, Firefox Klar (when you don't have
App Store: F-Droid (, Aurora, Yalp -> run Google Play Store apps only isolated through Working Profiles via Shelter)
Mail: K9
PGP: OpenKeychain
Adblock: Blokada
Spoofing: NetGuard, Private Location, Wi-Fi Privacy Police, MacChanger, SnoopSnitch
Messengers: Briar, Signal, Wire, Riot.im, TRIfA
Camera: ObscuraCam
Maps: OsmAnd~
Text: Markor, LibreOffice Viewer, muPDF
They literally read your fucking e-mails to maintain their censorious terms of service.

(177.41 KB 1135x2048 niconozo-charging.jpg)
Comrade 10/01/2019 (Tue) 18:48:19 No. 725 [Reply] [Last]
What are some Free Software projects worth contributing to?
your mum
>What are some Free Software projects worth contributing to?
That depends entirely on your skill set and interest comrade. So what to you enjoy and what are you good at? Just so you know hacktoberfest is being sponsored by digitalocean right now so it might be a nice thing to get in on if you're planning to do this anyway: https://hacktoberfest.digitalocean.com/
desktop environments like KDE. they need more polish.
Bring window edge snapping back to Openbox.

Education Purrletariat 05/06/2017 (Sat) 20:13:09 No. 240 [Reply] [Last]
What should Education under a Leftist system look like? The current system obviously doesn't work as can be seen by the large amounts of dropouts and general scorn and dissatisfaction that is directed towards the system.

I'm personally leaning towards the Sudbury Model of Education, essentially the government, school, and parents have no say in what is taught (preventing bias and the brainwashing type of education in modern public and religious schools).
The school's rules as well as other actions are decided by a democratic "School Meeting" consisting of Staff members and the entire Student Population, each has an equal vote and the staff possesses no veto power. Meaning that the school is mostly run by the students, there is no curriculum and no classes, the students decide what to learn, how to do it, and can ask other students or staff for assistance if they wish.
There are no divisions by age or skill meaning that younger students can interact with older ones at will and vice versa, allowing for older students to act as big brothers/sisters to younger students giving them a chance to develop greater empathy and responsibility while giving younger students the ability to find mentors (that they can personally identify with, unlike the ones assigned under current mentor-ship or tutoring programs).

It's worked very well already in the few schools that have tried it:

What would be other good ideas and ways to reform the current system?
5 posts omitted.
(85.33 KB 1197x698 576hu.jpeg)
>the students decide what to learn

So the education plan is going to be set by who ever can influence students.

Is that going to be better ? Are you going to attempt to control this ?
>What should Education under a Leftist system look like?
Every year the Party Congress creates a highly centralized education circulum that students are forced to learn and if they don’t they are hit with rulers.
>I'm personally leaning towards the Sudbury Model of Education, essentially the government, school, and parents have no say in what is taught (preventing bias and the brainwashing type of education in modern public and religious schools).
The school's rules as well as other actions are decided by a democratic "School Meeting" consisting of Staff members and the entire Student Population, each has an equal vote and the staff possesses no veto power. Meaning that the school is mostly run by the students, there is no curriculum and no classes, the students decide what to learn, how to do it, and can ask other students or staff for assistance if they wish.
Except that kids have underdeveloped minds and can’t think or do stuff for themselves. They need people to tell them what to do and what not to do, and if need be punish them if they misbehave.
That's a really stupid position to have my dude.
>students decide what to learn
>lesson plan
You're not getting it.

Comrade 10/01/2019 (Tue) 03:56:35 No. 721 [Reply] [Last]
I've been trying to find some more information on the original systems operating in the Soviet Union. Especially those earlier systems that showed some promise and interesting features. I've been looking specifically at the BESM-6 due to the ample documentation available. The most interesting features to me are the system of modes, and bit packing, both of which seem very odd but interesting to me, oh also it's RISC which is nice. The CPU was also developed under the name Elbrus into the late 80's which is unique, and was reasonably competitive at the time. The Elbrus-3 which was a completely new ISA with novel VLIW capabilities was also competitive.

Would any of you happen to have any information on the MIR «Машина для Инженерных Расчётов» machines? I'm struggling to find any information on them but they sound fascinating especially concerning "a hardware implementation of a high-level programming language capable of symbolic manipulations" which reminds me of the exceptional Scheme-48. Also it seems to be immensely capable for its size. Thanks in advance!
Shit, could a mod delete this thread please?
out of luck buddy, this board doesn't have an active BO and/or mods. gonna have to ask space
>out of luck buddy, this board doesn't have an active BO and/or mods. gonna have to ask space
That's kinda weird, I'll ask in >>>/gulag/, thanks for telling me.

(134.50 KB 620x258 prog-languages.png)
Languages Comrade 04/06/2017 (Thu) 08:59:43 No. 702 [Reply] [Last]
What programming languages do you guys use? I'm mostly Python, Java, C#, C++. Used to like functional programming but IMO now that regular OO languages have alot of function features like first class functions its not as big a deal to write code in a pure functional language like lisp or haskell, better to write regular python or something and occasionally write some functional-styled code
12 posts omitted.
>What programming languages do you guys use?
C#, F#, python when I need to quickly process some data files (its much more expressive and easier to work with loading files and lack of type system allows me to do autistic quick designs, but unmaintainable)
rust,,, the communist programming language
I was under the impression that the default serialization and backend representation for DateTime in C# was ISO 8601 complaint which is UTC
I enjoy programming in R7RS Scheme, although it's not very practical if you're trying to follow the standard. I have some familiarity with C which I strongly dislike, desperately wishing my familiarity was with Ada instead. I also have some familiarity with Clojure, Ocaml, Elisp, and Chip8 the former two having interesting properties, the third being acceptable, and the fourth being a good learning experience.
python for general purpose
php/sql for web dev
c++ for performance critical

Comrade 09/17/2019 (Tue) 02:45:23 No. 697 [Reply] [Last]
Is Raspberry pi 4 safe to use?
Comparing to Intel/Amd that may be backdoored
>Is Raspberry pi 4 safe to use dompared to Intel/Amd that may be backdoored?
Cortex-A72 in the Raspberry Pi 4 are vulnerable to speculative instruction attacks without software patching which reduces performance similarly to AMD and Intel CPUs but the Raspberry Pi 4 lacks the ME, AMT, PSP, Microcode, etc issues. There are still a tremendous amount of issues regarding software freedom though, and with a lack of software freedom necessarily comes a lack of security, to quote the FSF on this matter:
>Boards based on the Broadcom VideoCore 4 family, such as the Raspberry Pi, require nonfree software to startup, although signature checks are not enforced. A free proof-of-concept replacement firmware has been developed, but it is not in a usable state, and development has halted. Until the nonfree startup program is fully freed, these boards are useless in the free world.

>By default, the GPU requires a blob running in this same startup firmware. However, Broadcom also supplies an "experimental" free software stack, which could run without blobs, if the startup firmware were free.

>The startup program also implements accelerated video decoding, primarily using highly optimized proprietary code as well as some dedicated video decoding hardware blocks. There are intentional restrictions, apparently due to software patents, blocking the use of this code without a license key (a form of DRM). Nevertheless, video decoding can be done with free software on the CPU, with a performance and power cost.

>There is an additional concern for the Raspberry Pi Camera Module, produced specifically for use with the Raspberry Pi. In order to access the Camera Module, it requires the use of a binary-only driver on the Raspberry Pi. This driver refuses to work unless authentication of an ATSHA204A chip present on the camera board succeeds. This is a crypto chip capable of solving challenge-response requests using a captive secret key within it, essentially it is used to prevent hardware cloning and confirm that the camera board was not manufactured by a third party. In other words, it is a form of hardware DRM. If necessary, you can use a USB webcam supported by free software instead.

Two secure products with roughly the same price range as the Raspberry Pi 4 are:

These products are of themselves as completely free of security faults as you can currently get, but keep in mind the software you run on your system is at this point far more important than the system its self. Performance of these devices is quite a bit less than that of Raspberry Pi 4 though. If you gave me your price range and requirements (what you want to run) I and others could better give you suggestions, and you could more directly achieve your objectives.
What about old hardware? Like a Pentium 133 or an AMD k-6 ?
>What about old hardware? Like a Pentium 133 or an AMD k-6?
Sure, you shouldn't really need to go that far back though, also those CPUs are probably slower than the systems I listed. It seems to me that at the very minimum some K-7 and Netburst CPUs would be a possibility. It's difficult for me to give suggestions though because they've just been consistently moving in this direction for such a long time, and because in many cases the early developments of these technologies are either innocuous or simple to work around.

2006-2008 is the grey area for Intel CPUs because this is when things started going south with AMT, ME, TPM, Microcode, Speculative Execution, etc. You really do have to do some research into the individual CPU to know for sure in this time span. I honestly don't know as much about AMD CPUs, I know some of them have speculative instruction issues since 2003. They started getting Microcode in 2007, they got SEM at some point post-2003 and they got their PSP system in 2013. It probably took a generation or two for each of these things to become strong enough to be harmful though as in Intel CPUs. If you really want to go back to the vary root of most of this it's with trusted computing which started to slowly be implemented starting around 2003:

Another concern for x86_64 systems is that they have non-free bios which need to be re-flashed with coreboot or libreboot in order to be able to boot using only free software. This problem is near universal with only a few examples of machines with modern Intel CPUs being the exception. Additionally the vast majority of systems lack support for libreboot/coreboot. Due to this there is no x86 system I can point to and say out of the box this is capable of running a desktop environment securely.
It recently came to my attention that there is actually a great deal of controversy on this board. It seems that it's not entirely standardized that it's not entirely open-source hardware, and there are a number of legal disputes with it. Given that I'd likely suggest the other board as a raspberry pi replacement.


no cookies?