/tech/ - Tech

Technology.

catalog
Mode: Thread
Name
E-mail
Subject
Message

Max message length: 8192

Files

Max file size: 20.00 MB

Max files: 3

Password

(used to delete files and postings)

Misc

Remember to follow the rules


(47.28 KB 300x392 300px-C_propaganda.jpg)
/dpt/ - Dialectial Programming Thread Comrade 06/17/2020 (Wed) 22:30:15 No. 2847 [Reply] [Last]
What are you working on /tech/?
1 post omitted.
>>2864 Forgot to link this, thanks comrade.
hijacking this thread How do you apply dialectics to your understanding of computer programs? For one, digital logic is a dialectic. In transistors, there are in fact not two discrete "on" and "off" states, but actually a quantitative range of voltages which, near peak or low, qualitatively change to "on" or "off." https://www.marxists.org/reference/archive/mao/selected-works/volume-1/mswv1_17.htm >What is meant by the emergence of a new process? The old unity with its constituent opposites yields to a new unity with its constituent opposites, whereupon a new process emerges to replace the old. The old process ends and the new one begins. The new process contains new contradictions and begins its own history of the development of contradictions. This is fork() and exec()
>>2890 I don't because I am not some deranged cultist that must shoehorn their useless philosophy buzzwords everywhere.
>>2892 you're on bunkerchan

(55.37 KB 600x318 download.png)
Comrade 06/21/2020 (Sun) 06:48:00 No. 2888 [Reply] [Last]
So there's a small ongoing discussion atm about Guerilla comms in the following thread. >>>/leftypol/611691 (https://bunkerchan.xyz/leftypol/res/611691.html) So it brings up the question. In a hypothetical SHTF situation in the continental USA, where Guerillas must operate from clandestine forest bases, and move consistently without an abundant power supply or reliable physical networks, also against an adversary with a very large signals department; How do we secretly send messages that only an intended recipient, ie Guerilla command or other groups can read? So one poster suggested a mix of HAM radio types, with modification to allow for encryption, and another suggested LoRaWAN gateways like pest control units or trail cameras use, but with gateways acting as tor servers. What do you guys think?
(77.33 KB 960x720 download (1).jpg)
I think preppers have done a lot of the footwork with this kind of stuff, especially the conspiracy/militia types. For example: https://www.survivopedia.com/what-a-ham-radio-is-and-how-experienced-preppers-use-it/ http://www.tacticalrepeater.com/radio-encryption/ There's some issues though. You want to privately make communication from your groups radio guy to the HQ, or to one other group. That's fine, you take their public key being broadcast and encrypt the data so that their private can decrypt, but how do you send a message to everyone at once? Sequentially? What about signals analysis? Is there no way that they could hone in on the strength of the signal and have a direct route to your guerilla camp? I'd propose that you should have to use a password to access your own radios as well with full ID verif, and a system similar to TCP packets for data transfers as well. Can we engineer this?

(183.20 KB 1200x900 1200px-HTC_Dream_Orange_FR.jpeg)
Smartphones Comrade 03/13/2020 (Fri) 01:36:02 No. 477 [Reply] [Last]
Yes, smartphones are cool gadgets: You can read theory, browse /leftypol/ and listen to music on the go! Let's talk about these awesome devices in this thread! What models are you using?
23 posts and 5 images omitted.
Samsung Galaxy S3 with LineageOS. Surprisingly still usable. Looking to upgrade to Samsung Galaxy S5 again with LineageOS. No google garbage apps for me thank you.
Can someone explain what this video on "LoRa Mesh Communication without Infrastructure" is to the layman? I heard it would be used to communicate *somehow* if the cops shut down cellphone towers? https://www.youtube.com/watch?v=TY6m6fS8bxU
>>2745 It's a walkie-talkie for text messages. LoRa operates on frequencies which were used by paging companies in the past, and still used for radio keychains for cars/garage doors, they're colloquially called ISM band. I don't like presence of bluetooth and gps functions on this thing, the idea glows suspiciously,a s well as lack of publicised fdroid distribution. The board should connect to phone via USB to avoid insecure wireless Bluetooth link to something you carry on yourself already, drop the ridiculous battery, and since phones already have GPS, it shouldn't have another one either.
>>1537 coom
I'm running both a Oneplus 3T on lineageOS and a stock 7T pro McLaren 5G.

Email Providers Comrade 06/17/2020 (Wed) 20:55:59 No. 2845 [Reply] [Last]
So based on basic Opsec I've been reading about you should have a seperation of your identity from your logins on TOR and whatnot for reddit or twitter or whatever the fuck. But all that shit requires emails and all these damn email providers require a phone number which defeats the whole purpose? Which email service can I use that won't demand my phone number and let me stay as anonymous as possible online?
>>2845 Guerilla mail, 10 minute mail, and so on. Bascially search "Temporary email" and choose one. Keep in mind that some websites block such emails or might want to get your phone number to "confirm" you're not a robot.
>>2845 autistici.org, riseup.net, or protonmail.com are examples I’ve seen, but I can’t speak on the legitimacy of any of them with confidence
If temporary mails are blocked I usually try create a Protonmail account. If they want a phone number, I just reset Tor identity and try again, until they give me an option to verify with an email instead, then I just try a few temporary emails until one works. Lately it's taken me only one retry at most to get through. In the past I also used Yandex since it was really easy to register while most websites consider it a legitimate provider. However their own captchas don't work over Tor anymore. A much bigger problem than creating and using throwaway emails is that lots of websites effectively block Tor via infinite Google captchas on their registration and/or login forms.

Licky Comrade 05/31/2020 (Sun) 23:27:19 No. 1954 [Reply] [Last]
https://licky.org Cute Discord alternative :)
3 posts and 1 image omitted.
>>2014 whats the point of this over discord, is it more private?
It's a honeypot.
Never heard of this. >Cute Discord alternative >:) We already have RiotIM/matrix. >>2018 >It's a honeypot. This.
>>1954 where is the source code?
>>2018 These glowie ops get more and more low effort each year

(5.75 KB 256x256 t56756756.jpeg)
Let's talk VPNs Comrade 01/27/2020 (Mon) 15:36:01 No. 119 [Reply] [Last]
I was using riseup.net as a VPN, but, now cloudflair (The upstream provider for the site) is blocking it. Furthermore, it's come to my attention that riseup boofed their canary after the FBI requested server logs. They are glowin the darks, for real, and confirmed. What VPN would you suggest anon? What VPN, if any, do you use. I was thinking of routing all my traffic over tor, but, currently the site still blocks tor traffic. Help me out guys, I feel naked, thanks.
29 posts and 1 image omitted.
>>133 Hey, new to web security. Why is protonmail not a solution? because the traffic would still be going through regular ISPs? Would it work if used with a vpn/tor?
>>2115 protonmail is good in that im pretty sure they dont work with US authorities, being Swiss they are outside EU/US jurisdiction and they have no need to comply with the FBI for example. OTOH if you login to an email account using your real ip there is likely a log of it somewhere which is why you should use tor also emails are unencrypted by default which is why you should use GPG
>>2127 CryptoAG were Swiss too and it turns out they were owned by the CIA. Needless to say, they backdoored everything.
>>124 It all depends on how you use it. The problem is that most people don't understand how Tor works so they shoot themselves in the foot. Then anti-Tor propagandists claim that's a flaw in Tor itself. It would be like saying hammers should never be used because some clumsy people hurt themselves.
>>2115 You can use anything over Tor that doesn't block Tor, and even then you can bypass blocks by adding various kinds of proxies to the end of your Tor connection (even web proxies are useful). Protonmail provides its own onion address, meaning your connection to their server never leaves the Tor network. https://protonirockerxow.onion/ Do not trust any email provider though. Compartmentalize and anonymize as much as possible. This means using different email account for each "operation", with each operation being reduced to its bare simplest actions as much as possible. Always connect to email providers with a fresh Tor identity. If you're doing anything illegal or suspicious then encrypt the contents of your messages.

(25.20 KB 636x526 cihicono.png)
¡Únete! C.I.H. 06/16/2020 (Tue) 20:10:39 No. 2835 [Reply] [Last]
Para todos los hispanohablantes: http://5mb6sawho6khkztj.onion/
This is extremely based
que es? me da flojera checar..

(3.36 MB 3120x4160 IMG_20200504_162028.jpg)
Patents and copyright Comrade 05/04/2020 (Mon) 14:24:32 No. 1570 [Reply] [Last]
Should they be abolished? If so, how it would affect technology/development.
10 posts and 1 image omitted.
This is a topic dear to me, as a mathematician I think it should all be done away with. Please tell me why, in a post scarcity world, (which we are aiming for as we are communists) would we have patents? Why would some arbitrary collection of thoughts 'belong' to one person? This is no different to a kulak hoarding grain, someone hoarding the means of which to accelerate/advance society. It is pretty much literally impossible to do this in mathematics, it is a field pioneered by love. The only reason we have any of the devices which are deserving of patents is because they came from tinkering nerds, just imagine what world we'd have today (in regards to computing) if there were no closed source code? The only reason these devices exist because mathematicians sat down one day and wondering how they could do maths faster. In another dimension, the concept of art being 'owned' is also fairly ridiculous, comparing it to software it takes time to create, but can be (essentially) infinitely redistributed now through jpgs and mp3s, to infinitesimal cost. At the end of the day why would you advocate for people's passions to be motivated by profit, rather than the love of the craft, the desire to create? The only reason it is an issue in our current time is because of the fact that if you steal some unknown persons good work, and turn a profit on it by switching it up a tiny bit, you can then create masses of profit for yourself, and this sits their accruing royalties while 99% of creators get nothing, again no different from a landlord.
>>1612 This. But I will go back to >>1571 . We need world aboshlishment of those laws because if abolished in one country like in USSR, it will create pressure of profit oriented foreign capital wich doesnt play by your rules.
As somebody with a patent, patents do not protect creators or innovation - they are a way for companies to control markets and litigate with other companies/ individuals. Every independent creator I know who has dallied with patents lost immeasurable time and money in obtaining patent and subsequent fruitless litigation attempts against patent violations. Fuck a patent
Linking Gavin Mueller's book again because he seems like one of the only marxists talking about topics related to this.
>>1570 A more interesting question is Are they needed currently in this capitalist world or still just useless

Comrade 05/10/2020 (Sun) 19:21:06 No. 1689 [Reply] [Last]
Is there a website where I can see how well a particular GPU can run a particular game? Most of what I want to play is at least 10 years old and I figure that todays integrated graphics can handle that with aploumb. Unfortunately, every website that I can find on this caters to well-off consoomers who want to play the latest AAA "game" (That is more cutscene than game) from EA in 4K on their Windows 10 computer.
check system requirements and search on youtube your gpu model and the name of the game
https://www.notebookcheck.net/Mobile-Graphics-Cards-Benchmark-List.844.0.html Can't say anything about credibility, they test games up to 5 years old or so it seems, I hope they actually launch a script that runs all the software benchmarks in sequence and calculate a median average among computers with this GPU installed they have tested. Overall, they had decent reviews of notebooks ~7 years ago when I last checked. Looking up game name + mobile GPU model on youtube is also a viable solution, cult classics like Minecraft and Crysis are tested on all sorts of toasters for giggles.

(77.94 KB 1600x1600 zoom-how-use-online-classes.jpg)
Comrade 06/11/2020 (Thu) 19:55:04 No. 2749 [Reply] [Last]
Techlet here. Everyone says Zoom is painfully vulnerable, but I heard if you have a paid account you have options to make it more secure. Is it good enough? Would you trust it?
4 posts omitted.
(88.63 KB 660x660 tin-foil.jpg)
>>2758 >calling anyone tinfoil hat >when MKultra happened >when Snowden and Assange happened >when the US gov’t just passed a new law allowing the FBI to directly read private sockets not even a month ago
>>2757 You don't have to act like I'm a retard. I only asked because fucking PSL apparently uses it. You fags love acting high and mighty about opsec but fact is the left has dogshit opsec. Part of getting people to listen to you is repeating tedious shit over and over, and clearly the techfags haven't been doing so if fucking PSL is using literal glowieware. A link to good software alternatives would be nice, but you would just say "you're only compensating for bad opsec". So do you have any resources about good opsec from a tech perspective instead of ranting about video games?
>>2757 >If it is proprietary, you can guarantee that that hardware is backdoored and the NSA is using it to spy on you. lol you have no threat modeling at all. nobody here is important enough to be hunted down by NSA via hardware backdoors. for most of people here it's enough to just avoid being flagged by the usual dragnet.
>>2782 >nobody here is important enough to be hunted down by NSA via hardware backdoors. Everyone here is important enough to be part of a broad-spectrum mass surveillance and insecurity complex. The point is not to target any one individual now while they're taking a shit on the toilet, it's to incubate vulnerabilities to be activated when the individual becomes a threat to the state. But using and promoting said insecure software through social coercion, you place everyone in this state of heightened vulnerability.

Delete
Report

no cookies?