Catalog of /tech/

Mode: Thread

Max message length: 4096


Max file size: limitless

Max files: 3


(used to delete files and postings)


Remember to follow the rules

R: 0 / I: 0 / P: 1

Remember that time where Mossad bombed Hamas because they installed Windows. I remember that time.
This is your house on Windows.

R: 3 / I: 0 / P: 1

Packet sniffing and interception via PAU06 Panda wireless

So I bought this pandawireless wifi card for packet sniffing.
i managed too get it running and in monitor mode on my computer, but, my machine keeps yelling at me about airmon-ng already being installed under "iw" which is what I used to put my dongle into monitor mode, but, I am not seeing any applications with iw loike airdump that allows me to monitor traffic in the area.

Can anyone help me actually make use of my wifi cards monitor mode?

R: 66 / I: 11 / P: 1

cybersocialist planning poll

answer some questions about how you would like the hypothetical open source software to be written.

R: 6 / I: 2 / P: 1

The Social Media Question

What is to be done about social media?

R: 5 / I: 0 / P: 1 is still down.
What's going on?

R: 8 / I: 3 / P: 1


its anonymous browsing (https, post, doesnt data mine) and also you can browse web page results anonymously with a proxy right on the page to btfo your employer and the glowniggers


R: 15 / I: 2 / P: 1

Is Richard Stallman a socialist?

R: 5 / I: 1 / P: 1

We need to make bunkerchan browseable on smartphones. Clover was really comfy for browsing 8/leftypol/. Any Comrade willing to help implementing the Lynxchan API to Clover/Kuroba?

Repositories for references:


Currently they support only the Vichan API, but implementing Lynxchan API shouldn't be too hard.

R: 6 / I: 4 / P: 1

Lokinet General

I don't know if I am the only person here who knows what lokinet is, but, basically lokinet is an encryption service provider that acts like tor; tor in the sense that it encrypts your packets with multi-layer encryption and bounces them around through a series of relays.

What makes it different is that it also acts like i2p in the sense that it also encrypts the encrypted packets in a secure SSL tunnel while bouncing them around making it truly anonymous.

It's also a decentralized network of relays and nodes of which anyone can spring one up and become a part of and on top of that you can use it as your default DNS provider meaning you can use this network as a vpn with out having to go through shady capitalistic datamines claiming to protect your data.

The down side is it's small right now and not a lot of people use it. It's fast though.

Furthermore, I can't seem to get the relays you need when you try to use lokinet as a VPN to work. I spoke with the staff on their IRC network and they told me the relays are down for those specifically.

I don't know if they ever got them up.

Does anyone else fuck around with lokinet on /tech/?

Here's their IRC: +6697 or +9999
lolikaastbgo5dtk.onion +6697 or +9999

R: 9 / I: 1 / P: 1

Relational/SQL vs NoSQL

what is the advantages of nosql over traditional dbs?

why did programmers from 2006->2015ish all start writing and useing their own databases. whats the point?

people say oh its faster for the programmer because they dont have to write a schema but literally the only thing to change a schema is an alter table statement anyway which takes 30 seconds

R: 8 / I: 1 / P: 2

Setting up zeronet for 08chan is a fucking herculean task of epic proportion.
How the fuck has anyone gotten this piece of shit to fucking function?

I finally managed to figure out in order to post you need to get an ID from zeroID but after I did that it wouldn't post while I was using tor. So I backed my torrc file uninstalled (cause it automatically runs on linux apparently) re-compile zeronet and then I can't make another fucking ID cause it's attached to my IP address. Like what the fuck? So I wait again, and attempt to make a post, after getting my cert, with out tor on and then i'm getting the stupid "Your post is Xbytes > 0" Error.

AFTER SETTING IT UP FOR TOR WHICH WAS ALSO A HUGE PAIN IN THE ASS. I had to find out the hard way that the apt package, as usual, is fucked.

Ergo, had to compile it.

Literally how in the absolute fuck do you get this fucker to function?

R: 5 / I: 12 / P: 2

Graphic Design General

I'm dumping some icons we could use for a cybersocialist planning software.

R: 22 / I: 4 / P: 2

Linux, BSD setups

Discuss what's your setup and collection of applications on your personal computers, smartphones, embedded devices, Industrial equipment, etc. for opsec that other anons could use.
Gnu radio for police chatter?
raspberry pi gps with security features?
Special ECM equipment you're willing to show?
Post them here.

R: 2 / I: 2 / P: 2


some /tech/ memes.

R: 10 / I: 2 / P: 2

"Me? Manjaro is the distro of my preferences."

R: 1 / I: 1 / P: 2

R: 0 / I: 0 / P: 2

is the BO of /tech/ still here?

R: 14 / I: 2 / P: 2

What do you think about ZeroNet?
It's basically P2P web. Have great potential, also there is an imageboard there:

R: 7 / I: 0 / P: 2

Can anyone give me a good GPU/CPU review site that doesn't do sponsored content? Like 75% of all articles about RTX i have found have been sponsored by Nvidia and it sucks.

R: 16 / I: 3 / P: 2


what does bunkerchan think of clojure?

its a lisp that actually works for web dev and other SW dev in the modern day.

R: 7 / I: 0 / P: 3


can someone for the love of god explain to me what this thing actually does?

R: 1 / I: 0 / P: 3

Boomers Respond to ZeroNet

Yahoo Finance
Daily Beast
The Guardian

Post more as you find them.

R: 7 / I: 0 / P: 3

forum design ideas

Forums have some rough statistical means of showing whether someone is a regular. The usual way is to display both account age and post count. Let's call that method 1. I've been thinking about what could be an alternative way for doing something like that (without using any sort of voting).

Method 2: Why should a text count for more when cut into two or three posts? A long text tends to contain more sentences, a long sentence tends to contain more information than a short sentence, and likewise a long word tends to contain more information than a short word. So, posts could be weighted by sentences, sentences weighted by words, and words weighted by letters. Mathematically, this amounts to just counting the letters. So there could be a score equal to how many k letters one has posted and perhaps there could be also automatic score penalties for posting LOTS OF CAPS or "!!!". The formula would be spelled out transparently and could have custom rules more specifically fitting for a particular forum (for example a forum for Britain fetishists could also have a penalty for American spelling, linking to .de and .fr domains and posting emojis except horsey, monocle face, top hat, and Union Jack).

Method 3: "Posting days", that is simply a count of all days when a user made at least one post. I believe this gives the gist of posts and account age and correlates well with lurking time.

Which of these three methods is the least crappy?

R: 8 / I: 0 / P: 3

ARCH Linux

How did you learn to use ARCH linux?

R: 10 / I: 0 / P: 3

website journey

Hey anons, what's your journy to bunkerchan and how will you make this into your new home.
I used to go to r/linux back in 2014 and then used 4chan/g before migrating to 8chan/tech/ before being pushed by /pol/ into using /leftypol/ (more or less stubled upon it because of them.) now that the mass exodus is happening and Hoxha is putting everyone into this bunker to protect from the nuclear fallout I'll make myself on this /tech/ board and put the rest of my misc. stuff into leftypol on this website.
I hope Ismail, yugofurry, ddrtomoko poster and the others are also doing okay.
Also I miss you hawaii left review

R: 1 / I: 0 / P: 3

greentext fixer

shared on leftypol >>18559
this tool fixes your text by deleting newlines so you can greentext properly with one carrot.

R: 15 / I: 0 / P: 3


What programming languages do you guys use? I'm mostly Python, Java, C#, C++. Used to like functional programming but IMO now that regular OO languages have alot of function features like first class functions its not as big a deal to write code in a pure functional language like lisp or haskell, better to write regular python or something and occasionally write some functional-styled code

R: 44 / I: 26 / P: 3

desktop thread?

Desktop thread

R: 11 / I: 3 / P: 3

How to set up linux for tor usage.

I posted this in another thread but I think it deserves its own thread.

I've been seeing a lot of people saying that installing tor is super hard and difficult, and, even if you use windows it's not that hard. All you have to do is install the tor browser and go into the browser bundle files and run the executable for tor, or, just use the browser bundle.

Like it's not hard at all.

But, being the pros (and dirty commies that we are) we don't use fucking bourgeois Microsoft.

So, I've set up a super simple and comprehensive guide to installing and using tor like a pro on Linux.

This is why we use Linux.


Downloading tor:

ctrl+alt+t: Open terminal:

Sudo apt install tor
sudo service tor start


Downloading and setting up privoxy.
sudo apt install privoxy

Edit the config file:

vim /etc/privoxy/config

(If you don't have vim sudo apt install vim)

add in text at the bottom:
(vim insert mode: press I)

forward-socks5 .onion 9050

(press escape)

Type :wq (write quite)

Done, ammo loaded cannons ready to fire.


Set up firefox to use tor:

about:preferences: Network settings, Use custom proxy

(Privoxy runs on port 8118) 8118
Check off "Use this proxy for all protocols"


Takes literally 5 seconds and you don't have to inconvenience yourself by downloading a whole brand new fucking browser ONLY for the simple task of bouncing around encrypted packets through a bunch of proxies.

You also don't have to live with the hellscape that is Microsoft and the billions of exploits and bugs in and written for it. (Not to mention back doors.)

And before anyone starts bitching; Setting up firefox for privacy isn't that difficult.

Basically turn off all telemetry and geo location, referer headers (but you will need http refer headers for 8chan) and some other shit, Guide here:

But honestly none of that even matters unless you are a windows user or a pedophile and let's hope you aren't either one of those.

Have a nice day.

R: 9 / I: 3 / P: 3

Hey guys care to answer a survey about programming economic planning software? just getting a feel for what languages, etc. people would use. Thanks

R: 37 / I: 2 / P: 4

Privacy general

Comrades, we need a thread on privacy. Any decent activist should try ways of staying anonymous on the web and prevent being tracked by governments and corporations.

General tips

* Use free software as much as you can.

* Use GNU/Linux and keep it up-to-date, to be sure that you don't have unpatched security exploits

* Don't use Flash Player, use youtube-dl instead for watching streaming videos online

* Do not use Google, use DuckDuckGo or StartPage instead

* Use a password manager like Keepass or for GNU/Linux users keepassx. Create new passwords for every site that you visit and use a strong password as a master password. A tip for easy remembering of your master password is to use a sentence. "i fucking love cookies and tits!" with extra capital characters etc. is easier to remember than some random characters and long enough to prevent brute force attacks of any kind.

* Use the Tor Browser Bundle if you really want to stay anonymous.


* Go to Preferences -> History and set History to "Never remember history".

* See for additional tweaks: and


* Use uBlock Origin for preventing tracking etc. Bonus: use hard-mode to manually whitelist external domains on sites. Don't use uBlock but be sure to use uBlock Origin

* HTTPS Everywhere

* DecentralEyes: prevents CDN hosting from tracking you (Google for Jquery etc.)

* Self Destructing Cookies: only allow cookies that you choose to allow


* Encrypt your hard drive or home partition at least

* If you use GNU/Linux, you can try to restrict systemd or syslog from logging.

* Use a distribution which takes security seriously. Also, be sure that you don't install a lot of things outside the repository. It will cover most of your needs.

Real life tips

* Pay with cash if you can

Feel free to provide tips to each other comrades!

R: 4 / I: 0 / P: 4

>tfw can't go on SRA slack because 2G connections.
sadboi week.

R: 0 / I: 0 / P: 4

Dumb questions that don't deserve a thread thread

How do you make a board on here?
Or a account to make a board?

R: 12 / I: 0 / P: 4

After wasting yesterday evening trying to get UEFI boot working with funtoo on my brother in laws new desktop and eventually giving in and using the MBR, there is emerging the question: Are there any advantages using UEFI boot?

R: 0 / I: 0 / P: 4


The parts of the spectrums of each thing that have the opposite reaction of the parts of the spectums that cause aging,retards,sickness,etc,etc,and there's the other parts in the middle(example-in the berry spectrum there are healthy berries and poisonous berries and the other berries in the middle).The elements.Recreating various outside crisis situations(hungry,thirsty,stuck,etc,etc) or not results in invisibility and speed,omnipotence,youngness,altering you and reality,personally affecting reality,your mind returning to the past(time travel).People who are acidic,nervous,shitty and others are being assalted,bleeding and puking acid.The soaps are killing people,the nerve and skin damage and where's the sweat and tan,feeling hot,dizzy,throbbing,burning and sick?The soaps are turning peoples faces into monster scar faces.Peoples bodies are being damaged and aged by the shampoo,hot tubs,swimming pools,soap,stress,working,gravity,infections,viruses,rubs,creams,pills,people,food,beverages,etc,etc.Air bubbles and dissolved air in IV bags,tubes and syringes is being injected into people,strokes and deaths.Operating table and bed murders and people being numbed by the dentist.People are being euthanized in hospitals and hospices.They're hungrily pulling and grabbing peoples sleeping genitals,thirstily turning peoples places into a hotel/outhouse and anally attacking colon cleansed people .Surrounded by the future,the past and nightlights,barking dogs,abductions,disappearances,suicides,murders,cuts,suffocations,draining energy.Being pulled towards the future or the past along with your iron coins and other materials your in contact with and surrounded by,people are disappearing,people are being replaced with clones,robots,etc,people travelling back in time are being attacked,getting into accidents or sending messages.People are travelling to the future and to the past.Aliens,people are visiting and sometimes leaving this world,which worlds and times are they from?They're stealing peoples DNA,cloning,growing,making and using the clones.The souls of the dead and others are travelling into other peoples bodies to be young and healthy.Connected minds communicating.Some people know other peoples thoughts and are communicating telepathically,interuptions,influencing,scolding,interference,torturing and controlling peoples minds and bodies and murdering and bothering other people listen to the sounds similar to the heat bug and electronic sounds.Body twitching.People are communicating with other people through nightmares.People are using other people to say their thoughts.Your superstitious,nature's,etc examples,stuck in this nest.They're waking people up again and again and they're causing other sleeping problems and deaths,picking,poking,prodding,digging people with medical instruments.The TV creeps and others are accusing people of being criminals and others in a past life,threatening,hynotising,insulting and bothering people about what they are doing,saying and their thoughts,maybe they'll reach through the screen and your reality show from this world,concluding the experiments and cleaning the cages.

R: 22 / I: 9 / P: 4

Desktop thread

Post your desktops. Discuss desktop environments.

R: 6 / I: 1 / P: 4

>Google’s Clever Plan to Stop Aspiring ISIS Recruits
Now it's ISIS, tomorrow it's us.

oh wait, i see tomorrow it's /pol/
>Google Program to Deradicalize Jihadis Will Be Used for Right-Wing American Extremists Next

we can't stop this, but we can hide our tracks.
learn about privacy and security.
start with steps a), b) and c) here:

then figure out how to use GnuPG, then switch to linux if you haven't already.
ubuntu, manjaro and mint are the worst possible choices, but they're still dimensions better than windows or osx.
better go with any other distro though.
you should verify the gpg signature on the checksum file, and verify the checksum of the .iso

thread created via tor, btw.

R: 4 / I: 0 / P: 4

Whats Bunker/tech/'s opinion on bitcoin?

also Is the bubble gunna burst?

R: 10 / I: 1 / P: 4

What do y'all think about the BUGs system employed by Stormfront, (likely influenced and developed by state agents) that they brought "racial awareness" (spammed) /pol/ with? Do you think this could be used to spread class-consciousness, and should it be?

R: 12 / I: 2 / P: 4

Need help with MySQL

Hey /tech/, I'm trying to host a lainchan installation on my local network for my Cuban basket weaving foundation, but seem to hit a bit of a brick wall, and was hoping I could get some help.
I have the website itself running on a virtual machine using Ubuntu 16.04 LTSB, all of which works perfect.
The problem comes when I try to connect the MySQL server, I get an error, specifically,
Got error 1 from storage engine
I'm using MySQL 5.7 on Azure Database for MySQL server with a free trial so I can suck free resources from Microsoft
I've created a database and as far as I can tell the database should be using InnoDB, however I'm new to MySQL so perhaps I'm retarded.

R: 1 / I: 0 / P: 5

lynxchan 1.7 tech test

R: 1 / I: 0 / P: 5

What are some good /tech/ approved podcasts? Specifically does anyone know of anything dealing with state/corporate surveillance techniques, hacker culture, infosec, and the like?

Thanks for your time.

R: 1 / I: 0 / P: 5

any comrades using ricochet?

i'll show you mine if you show me yours

R: 7 / I: 5 / P: 5

How should a leftist aproach to gaming?
What is the best build for a socialist gaming PC and where should a leftist get his games?

R: 5 / I: 0 / P: 5

Whats bunker/tech/'s opinion on the IoTs?

R: 4 / I: 0 / P: 5

Tox thread? Tox thread anyone?


R: 3 / I: 0 / P: 5


Copy me for luxury communism.

R: 13 / I: 2 / P: 5

GNU/Free software general

Any other stallmanists on bunkerchan

R: 1 / I: 0 / P: 5

So the privacy bussiness has me worried.
Its not about keeping our privacy
Its not about making people aware of the big data spying

What can we do to end the big companies spying on us? It'll be a better world if all google services where paid and W10 was sold in stores.
A couple of weeks ago I'd read an article about how the profits for google's adservice had gone down and how google may not be able to keep up with its bussiness model but that is too optimistic.

R: 4 / I: 1 / P: 5

IBM Patents Printer That Doesn’t Copy Infringing Content

>IBM has submitted an application to expand its portfolio with a rather peculiar patent. To protect rightsholders the technology company has invented a printer that doesn't copy or print any copyright infringing text or images.

Holy shit. Capitalism fucks us over... again and again.

R: 0 / I: 0 / P: 6

A leftist /tech/ board is great! Let's use it more, comrades!
Are any oldfags around who had the joy to come in contact with pic related or other micro electronics from real socialistic states? Sadly I was born too late to have a opinion on their products.

I read DDR lightbulbs were more durable than the western ones because they had no planned obsolesence; what do you think would our society today look like, if more elecronic products like smartphones were designed with a much longer lifetime in mind? Would the use-value of the products stay the same over time, or would it decrease with technical progress?

R: 2 / I: 2 / P: 6



R: 2 / I: 2 / P: 6

Revolutionary cyborgs

bunkerchan/leftypol seems pretty optimistic that automation will help bring about revolution like nothing else. I happen to agree but how will human augmentation effect revolution

R: 2 / I: 1 / P: 6

Hard AI

AI that can live and appear human or even surpass individual humans.

Chances of that coming about before 2050?

R: 4 / I: 2 / P: 6

Public key cryptography integrated into chans.

Has any IB software integrated public key generation? it will be very useful when people wants to share something specific on the board without others seeing.