/tech/ - Tech

Technology.

catalog
Mode: Thread
Name
E-mail
Subject
Message

Max message length: 8192

Files

Max file size: 20.00 MB

Max files: 3

Password

(used to delete files and postings)

Misc

Remember to follow the rules


(62.41 KB 768x768 rss.png)
Proper RSS setup thread Comrade 08/26/2020 (Wed) 16:48:31 No. 4423 [Reply] [Last]
Replacing registration on major, datamining, media hosting sites with secure, sleek, easy RSS set-up Bunker/tech/ alpha draft RSS SETUP (tor + QuiteRSS) >Install: quiterss and tor >Stylize: Options->Fonts and Colors->Colors: stylize to your own liking >Secure QuiteRSS: Tools->Options->Browser-> untick "embedded browser" and leave the "external browser" empty, under 'Content' untick everything >Torify: Tools->Opt.->Network Connections: SOCKS5, proxy server: localhost, port: 9050 >Go to desired Youtube channel page (or visit it via https://invidious.snopyta.org , which may be taken down soon) >Right-click and pick View Page Source (or for invidious copy the unique channel ID which is already copy-pastable from the URL; it's the last string of text after "/channel/") >For Youtube, when at the View Page Source page, ctrl+f "/channel/" and pick the unique channel ID >Insert the unique channel ID (which looks like 'aAi1SEieasu124dSdsa45Ddas') into the end of the following RSS-ready link: https://www.youtube.com/feeds/videos.xml?channel_id=ENTER_UNIQUE_ID_HERE For Soundcloud see bottom of this post >Paste the completed channel link into your RSS reader. MEDIA PLAYER STREAMING (torsocks + SMPlayer + mpv) >Install: torsocks, youtube-dl, smplayer and mpv

Message too long. Click here to view full text.

52 posts and 4 images omitted.
Added xsl stylesheet support controlled by C.ADD_STYLESHEET and a simple demo stylesheet to view the merged feed in a browser without needing an rss client. http://0x0.st/iI4b.tgz To use another xsl stylesheet move rss.xml out of the way and replace it with the other one. To get, normalize and merge the sample feed ids run: $ python3 rsstool.py ids gnm demo-ids.txt invidious.snopyta.org | tee log.txt Drag merged2.xml onto a browser tab to see a summary of the merged feed. If you get 'merged feed comrade' and word soup instead your browser has not applied the stylesheet. Check dev tools -> console to see whether cors, noscript or similar blocked the xsl. If you see 'CORS request not HTTP' you can toggle privacy.file_unique_origin in about:config at your option, then reload the feed tab. https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS/Errors/CORSRequestNotHttp Remember to set C.USER_AGENT to some Apple device user agent string. https://html.duckduckgo.com/html?q=iphone%20user%20agent%20string
Added expandable media:description blocks to the xslt view of the merged feed. Added lazy loading of images to the normalization step to keep the browser from spamming the host with image requests. http://0x0.st/iIEB.tgz
Did code anon make a secure RSS application or what happened in here?
>>4984 same question, just want to know if someone managed to fix the broken bunkerchan rss feeds
The connections themselves are only as secure as your connection setup. It's your job to use a vpn or set up tor for all your traffic, if you feel the need to do something like that for youtube feeds and streams. Since this only handles feeds, and watching or downloading the streams themselves is done with another program, presumably you already have your preferred security measures set up for that other program, so route this one through the same setup. For adding extra fluff to the request headers to hide in the crowd you can use GetFeed.get_headers. The default request looks like this: GET /feeds/videos.xml?channel_id=... HTTP/1.1 Host: www.youtube.com User-Agent: ... Accept-Encoding: gzip Connection: close and the equivalent for invidio instances.

(368.59 KB 680x838 dangerously based.png)
Bunkerchan wojak generator script Wojakposter 07/11/2020 (Sat) 05:26:25 No. 3212 [Reply] [Last]
I've decided to make my script open source. Enjoy. https://pastebin.com/raw/pajZ4N2x Edit: This script has been banned on leftypol, hobby, tech, edu, games, gulag and anime. But you can still post with it in this thread, I guess.
Edited last time by caballo on 07/29/2020 (Wed) 23:16:21.
279 posts and 110 images omitted.
>>4968 >Passing constant values as arguments wouldn't improve anything. Of course it would. Right now you have: capture args and create no-arg function, capture this no-arg function, call this no-arg function. The result is that every invocation of createWojakifyButton in every *-common.ts file is given a freshly constructed no-arg arrow function for that button. By contrast, if you switch to >>4966 you would have: capture function and args, call function with those args. This way every invocation of createWojakifyButton for a platform could receive exactly the same callback function, only the args to be used by button.onclick would differ. >The way I did it on other platforms is basically instead of creating callbacks for each button for each post, I create a wrapper of createWojakifyButton that passes an arrow function as the callback that captures the id. But the "instead of creating callbacks for each button for each post" is exactly what is verifiably false. Right now you are creating a new callback for each button in each invocation of createWojakifyButton in *-common.ts. This is what >>4966 would eliminate. From vichan-common.ts: protected createImageWojakifyButton(id: string, nth: number) { return createWojakifyButton('wojakify-image', 'Wojakify Image', () => { generateImageWojak(this.accessor.getPostImageURL(id, nth), options[this.sojakSelector.value]).then(wojak => this.handleWojakify(wojak, id)); }); } That creates a fresh callback for each button.
>>4969 Alright, I get it now. createWojakifyButton will now capture constant arguments to the callback. I had to use bind to properly capture this value for methods. https://github.com/Wojakposter/Wojakificator/commit/86d7dc06bf9ac474c3a5e82d0912e868ddf36db7
>>4972 moron
>>4972 >src/ui.ts >export const createWojakifyButton = (buttonClass: string, name: string, callback: (...args: any[]) => void, ...args: any[]) => { >callback(...args); This is great, thank you. And I see you added 4chan mobile as well.
(265.77 KB 785x1009 (you).png)

Linux fully surrenders to SJWs Comrade 07/11/2020 (Sat) 14:34:40 No. 3221 [Reply] [Last]
https://github.com/django/django/pull/2692 https://github.com/redis/redis/issues/3185 https://issues.apache.org/jira/browse/COUCHDB-2248 https://www.drupal.org/node/2275877 https://www.drupal.org/node/343414 https://github.com/systemd/systemd/issues/9894#issuecomment-424086622 https://www.phoronix.com/scan.php?page=news_item&px=Linux-5.8-Inclusive-Terminology For symbol names and documentation, avoid introducing new usage of 'master / slave' (or 'slave' independent of 'master') and 'blacklist / whitelist'. Recommended replacements for 'master / slave' are: '{primary,main} / {secondary,replica,subordinate}' '{initiator,requester} / {target,responder}' '{controller,host} / {device,worker,proxy}' 'leader / follower' 'director / performer' Recommended replacements for 'blacklist/whitelist' are: 'denylist / allowlist'

Message too long. Click here to view full text.

55 posts and 4 images omitted.
>>4915 those are all solutions, with the caveat that they aren't done, let alone being performed with gusto. Do one of them, and don't hold back. That is the solution.
>>4915 >hurd A person can dream. That being said, thanks to guix HURD does seem to get a bit of traction.
Just imagine if a slither of the breadtube Thot patreon money went to maintaining something like this >>4915
well, who cares. windows xp sourcecode is out there now
>>4986 Is React OS our future?

(74.01 KB 1024x768 31821-1.jpg)
How to set up linux for tor usage. Comrade 08/06/2019 (Tue) 23:50:13 No. 2280 [Reply] [Last]
I posted this in another thread but I think it deserves its own thread.

I've been seeing a lot of people saying that installing tor is super hard and difficult, and, even if you use windows it's not that hard. All you have to do is install the tor browser and go into the browser bundle files and run the executable for tor, or, just use the browser bundle.

Like it's not hard at all.

But, being the pros (and dirty commies that we are) we don't use fucking bourgeois Microsoft.

So, I've set up a super simple and comprehensive guide to installing and using tor like a pro on Linux.

This is why we use Linux.

STEP ONE:

Downloading tor:

ctrl+alt+t: Open terminal:

Sudo apt install tor
sudo service tor start

STEP TWO:

Downloading and setting up privoxy.
sudo apt install privoxy

Edit the config file:

vim /etc/privoxy/config

(If you don't have vim sudo apt install vim)

add in text at the bottom:
(vim insert mode: press I)

forward-socks5 .onion 127.0.0.1 9050

(press escape)

Type :wq (write quite)

Done, ammo loaded cannons ready to fire.

STEP THREE:

Set up firefox to use tor:

about:preferences: Network settings, Use custom proxy

(Privoxy runs on port 8118) 127.0.0.1 8118
Check off "Use this proxy for all protocols"

Done.

Takes literally 5 seconds and you don't have to inconvenience yourself by downloading a whole brand new fucking browser ONLY for the simple task of bouncing around encrypted packets through a bunch of proxies.

You also don't have to live with the hellscape that is Microsoft and the billions of exploits and bugs in and written for it. (Not to mention back doors.)

And before anyone starts bitching; Setting up firefox for privacy isn't that difficult.

Basically turn off all telemetry and geo location, referer headers (but you will need http refer headers for 8chan) and some other shit, Guide here:

https://www.privateinternetaccess.com/blog/2018/09/firefox-hardening-guide/

But honestly none of that even matters unless you are a windows user or a pedophile and let's hope you aren't either one of those.

Have a nice day.
42 posts and 6 images omitted.
>>4886 so whats the solution?
>>4886 >Implying tor is comprimised in anyway Proof? Most people who say this don't actually understand how tor functions. tor is based on encryption algorithms that hash the senders data into complex algorithms that only the receiver has to key too and neither the sender nore the receiver know where sed data is coming from. So, unless the glows some how cracked quantum computing then you have no fucking idea what you are talking about. If they have quantum computers all data is compromised.
The above advice about using the bundle is good. It is intended to reduce the fingerprint from the Tor browser. Use Tails if doing other things is required. The thing that probably should be of concern is that several spook infested agencies do provide the funding for the developers, so they could possibly have frist dibs on any exploits that are discovered. The exit nodes have feds running them no doubt, but technically that isn't a big problem. Other leak vectors are bigger issues, so keep the browser updated. If paranoid compile by yourself. Of course the exit node can do MITM on traffic but the usual measures work against that. Also, better if there are a lot of other people using it, or the feds just find the source of the obvious Tor traffic and you get v&. Generally, Tor should be fine for anonymization, but don't loosen your guard if doing confidential stuff. The best way is to do real talking, if you are paranoid. Better, build real labour power so you don't have to rely on Tor and technical fixes. The Bolsheviks, in spite of being surveilled by the glowies, were victorious.
>>4919 Solid and uplifting post comrade.
>>4919 What about anonymisation for privacy in piracy (running a torrent server for example), rather than stuff like anti-government action, cp or drugs? I know those get shut down, but I don't often hear what happens to owners of pirate sites. I'm in the EU, if that makes a difference.

(58.33 KB 1200x1200 hacktivism.png)
(307.87 KB rs1.pdf)
red swarm: leftist hacktivism Comrade 07/05/2020 (Sun) 04:29:45 No. 3109 [Reply] [Last]
pdf on left wing hacktivism
21 posts and 2 images omitted.
>>4732 Nice, I've been trying to get back into it for awhile. Anything in specifically or general pentesting.
>>4739 Been going back and trying to learn sql injection by hand, I know there's sqlmap just would like to know how to do it rather than just spamming a database. what have you been doing?
>>4742 playing with macro malware and av bypassing.
>>4732 >Did whomever made that pdf do it in Hawaii? what makes you think that
Mods this autist is back. Thanks for the swift clean up last time <3

(802.40 KB 543x848 thankyouforyourfeedback.png)
(301.76 KB 538x377 whitwomenfuckdogs.png)
Firefox Fenix - Yet Another Browser Thread Comrade 08/27/2020 (Thu) 15:57:01 No. 4439 [Reply] [Last]
Is the new firefox for android as bad as they say? >no about:config >no extensions besides redditblock >can't make urlbar persistent >no save as pdf >accessing top sites, bookmarks and history is more cumbersome Also worried about resource consumption and crashes, I have an old phone with a few years old lineageos and it's already slow and often purges background apps from memory. I also use dozens to more than a hundred tabs on mobile and lose those in private browsing in frequent crashes. Do I have to stay on the old version and try to block progress as long as possible?
10 posts and 3 images omitted.
>>4932 please file a bug report though
>>4948 This is vaguely interesting, but what it misses is that to the extent it is true it was viewed by Marx and Lenin that was an inevitable disgusting endpoint to laiziz faire capitalism that needed to be accelerated past as quickly as possible Engel's considered State Capitalism to be the next stage after this as market signals started failing and become unable to even coordinate and maintain a minimally functioning society in the cruel wasteful and mindless fashion capitalism operates on
Why is this reactionary allowed to dump his pol image collection here with no relation to tech, huh mods?
I downgraded back to Firefox 68. Lost all my bookmarks and history. But I rather that instead of use that piece of shit they released.
>>4463 Comrade your post is shit

(32.05 KB 1400x788 1293865128916.jpg)
The G Question Comrade 09/06/2020 (Sun) 20:21:21 No. 4656 [Reply] [Last]
I want to stop using their services but literally EVERYTHING they make is too good. You just can't stop using it. Unparalleled search engine, mobile operating system, email services, video hosting, google drive, etc. Seriously, what is the fucking point of owning a smartphone if you literally stop using it's services and turn it into a dumb brick? Google revolutionized the modern computing and internet era, sure it is time to ditch them, but how exactly do you do it? It seems to me you are hurting yourself more by NOT using these services than you are to these corporations.
46 posts and 5 images omitted.
>>4667 >I'm not sure anymore if Google is deliberately spending less computational power when queries come from these search proxies, or if Google itself went to shit by pushing MSM to the top. The latter possibility is very consistent with the general privileging of MSM across all social media to combat "fake news". It is very obvious that this is happening on Youtube for example. Why wouldn't you just paste the search into google to see for yourself? I'll tell you though, the results are different. Google is better. I always start with duck duck go, but if it's not giving me good results, I switch to google.
>>4951 I hate their image search though. They destroyed it, by taking out the view image option that all the others have.
>>4950 >American Google :| >WOAH CHINESE GOOGLE :O
>>4955 What they gonna do, drone strike you?
>>4955 If there ever was a good alternative to google, it would be chinese/russian google

CNC Small Arms Manufactring Comrade 05/25/2020 (Mon) 19:42:08 No. 1921 [Reply] [Last]
Is it something practicle for insurgent groups or is it a giant meme?
>>1921 It's based AF IMO
>>1921 How much is possible from scratch?
>>4891 https www.sainsmart.com/ If you do everything from scratch, you'll have to do it yourself. But look up the YT vid of the golden gun (an AR-10 made from spent ammo) Granted, that guy shows off probably a million dollars in machinery but with enough care and practice you could build it all yourself, probably in less than a year of self-discipline, after which you'd have a program you could shove across the wires that could turn a solid block of metal into a mill-spec lower receiver. So long as lower parts kits and replacement uppers can still be you, you'll have yourself a gun. There's a reason why guns are considered a god-given right, and not a man's-laws privilege. The gray matter between your ears plus a few square feet in the garage can get you pretty far in life.

(5.75 KB 256x256 t56756756.jpeg)
Let's talk VPNs Comrade 01/27/2020 (Mon) 15:36:01 No. 119 [Reply] [Last]
I was using riseup.net as a VPN, but, now cloudflair (The upstream provider for the site) is blocking it. Furthermore, it's come to my attention that riseup boofed their canary after the FBI requested server logs. They are glowin the darks, for real, and confirmed. What VPN would you suggest anon? What VPN, if any, do you use. I was thinking of routing all my traffic over tor, but, currently the site still blocks tor traffic. Help me out guys, I feel naked, thanks.
52 posts and 1 image omitted.
>>4894 I'm one of the anons who complained above about the Tor bans. For me "block bypass" works 99% of the time. **The scenario is usually like this: - try to post on /leftypol/, get alert saying my IP is banned - click "Extra" in the post form and select "Make sure I have a block bypass" - click "Reply" again, this time a captcha appears (not Google's infinite loop shit) - can now post without any further bans or captchas I'm afraid of saying that though lest some dev or mod considers this a hole and makes torposting impossible again lol.**
>>4900 Would like to echo the same problems. Can't we have a temp ban on tor posting after a raid or something? Or at the very least make tor posting without pics/files always okay. Then make photos a captcha thing? What's the worst that could happen if you allow tor text posting? I mean if frequent posting became an issue put a cooldown on the threads so that they can only get posted to every 10 seconds or something. This gives jannies enough time to see if there is a problem. Making tor posting so annoying is definitely an mistep imo for an obscure leftist chan. I've also thought about this >>4646. No pol-tard wishing to raid is going to know that these boards are less protected. Anyways I think we should all agree here that text-only tor posting should be unhindered.
>>4900 >For me "block bypass" works 99% of the time. Good for you, but what about posting pics? It's also probably only because Cloudflare doesn't have the resources to block all Tor nodes (yet), but they can block all proxies on proxy lists even if there's a delay between them appearing on said lists and them getting blocked as "known spammer" IP's. Obviously most of them haven't been used for spam on this site, but they're blocked on every site that uses Cloudflare. These are the proxy sites I know of, whose proxies are all blocked within a day or two in the rare case where one works at first: https://www.sslproxies.org https://proxy-list.org http://www.proxylisty.com http://www.freeproxylists.net It's good if the block bypass works for Tor, but especially on a site like this it's pretty fucked that anonymity must be compromised at all. 8chan used Cloudflare but didn't implement Cloudflare's spam blocks (except after raids), at least when I still posted there. I just tried as a test to post on 8kun with a proxy and a VPN and it works, too. If a hangout for far-right white supremacist terrorists can do that, why can't a mostly reasonable left-wing site?
>>4904 I totally agree about imageposting, that's something that frustrates me too, although sometimes it still works if you're lucky. I've even been thinking of using Whonix+VPN setup just to bypass that, but it's not worth the trouble. >It's good if the block bypass works for Tor, but especially on a site like this it's pretty fucked that anonymity must be compromised at all. In what way is anonymity any more compromised when using "block bypass"? Mods can see that your posts come from the same exit node, it's all IP-based AFAIK. Nothing stops your from creating a new circuit or restarting your Tor Browser session.
>>4905 >it's not worth the trouble Ideally there wouldn't be any trouble at all in the first place... >In what way is anonymity any more compromised when using "block bypass"? That's not what I was referring to. I meant blocking proxies and VPN's is fucked up since that compromises anonymity. It's not really this site's fault but rather Cloudflare's spam blocking, but I think having Cloudflare's spam blocking on a site like this is pretty fucked up to begin with. I mentioned 8chan and now 8kun not having those, when its users are constantly advocating for violence based on race, gender, etc... so why does a far more reasonable site like this need those kinds of anti-spam measures? If the block bypass worked with all proxies, VPN's and Tor nodes, then that'd be great, but it doesn't. It's good if it usually works with Tor, and for me the consequences would most likely be only a fine in the worst case so I don't need a proxy like I said and which is how I'm posting here right now, but I assume >>4635 for example is referring to more serious consequences. How can the proletariat of the world unite if uniting is made hardest for those who need it the most?

(8.20 MB 2830x3522 asm_book.png)
Learning assembly language Comrade 09/19/2020 (Sat) 16:26:31 No. 4895 [Reply] [Last]
I have recently started my first course in Software Engineering. The first programming subject we got apart from C is learning assembly language. I have zero knowledge of the subject and it seems quite intimidating at first glance, and was described to us as a hard course. So I wanted to ask, what would be the best sources of information to learn the language and how to even use it? The YouTube tutorials always seem a bit shit and from my first glance it is true for asm as well. We were also all recommended to read picrel over the course. Is it good and or enough for learning? It's 34 years old, so I was wondering if there were more recent manuals on the subject.
2 posts omitted.
This is a good book on the subject. I learned a lot from doing crackmes, reverse engineering in general is often about just reading and understanding (disassembled) assembly. Don't be afraid of it, it's not black magic.
Play TIS-100 or Shenzhen IO or Exapunks. They don't use actually existing assembly languages, but the principles, commands and syntax are kinda similar.
>>4899 Where would one be able to find a pirated version of this?
>>4902 rutracker.org I've played all of them on Linux. Can post links to Linux versions if that's your OS, but it shouldn't be hard to find Windows ones via your preferred search engine.

Delete
Report

no cookies?