[ overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / 777 / posad / i / a / R9K / dead ] [ meta ]

/tech/ - Technology

"Technology reveals the active relation of man to nature"
Tor Only

Password (For file deletion.)

Matrix   IRC Chat   Mumble   Telegram   Discord

| Catalog | Home

File: 1608526369145.jpg ( 278.48 KB , 1920x1280 , 1605832235464.jpg )


>still thinking it was suicide




he knew too much… lol


How I sucide please answer me


I wish to please tell me how?

File: 1622348654209.jpg ( 259.63 KB , 750x747 , 1622345685245.jpg )


>'Apple is eating our lunch': Google employees admit in lawsuit that the company made it nearly impossible for users to keep their location private
>Google made it nearly impossible for users to keep their location private, according to newly unredacted court documents.
>Google continued collecting location data even when users turned off various location-sharing settings, made popular privacy settings harder to find, and even pressured LG and other phone makers into hiding settings precisely because users liked them, according to the documents.
>When Google tested versions of its Android operating system that made privacy settings easier to find, users took advantage of them, which Google viewed as a "problem," according to the documents.
>Google also tried to convince smartphone makers to hide location settings "through active misrepresentations and/or concealment, suppression, or omission of facts"
>Google employees appeared to recognize that users were frustrated by the company's aggressive data collection practices, potentially hurting its business.
>"Fail #2: *I* should be able to get *my* location on *my* phone without sharing that information with Google," one employee said.
>"This may be how Apple is eating our lunch," they added, saying Apple was "much more likely" to let users take advantage of location-based apps and services on their phones without sharing the data with Apple.
1 post and 1 image reply omitted. Click reply to view.


>proprietary software tracks users
stop the presses! call the president!


>'Left' today is delivering sarcastic one liners while thinking oneself is a deep, original thinker and more highly informed than others. Maybe it always was.


I'm informed enough that I don't need google employees to know that you can't "keep your location private" while using your phone

especially lmaoed at this
>Google employees appeared to recognize that users were frustrated by the company's aggressive data collection practices, potentially hurting its business.
dear "google employees", Google business IS data collection
fucking bitches take people for retards I swear


There is a difference between what we know to be true, and what we can show to be true in the fairy tale world of the legal system. This is why this qualifies as news, because the issue has now moved into the latter group, so they can no longer lie about it in subsequent related trials.

Similarly, we knew the state suppresses inconvenient stories from social media, but now we can also show it to be true using the government's own documents. >>11193


File: 1669897136689.jpg ( 111.07 KB , 1600x900 , af28d3454857f3dfdd628a12ed….jpg )

Apple being cut from exactly the same cloth as Google:

> Apple Is Tracking You Even When Its Own Privacy Settings Say It’s Not, New Research Says
> An independent test suggests Apple collects data about you and your phone when its own settings promise to “disable the sharing of Device Analytics altogether.”
> November 8, 2022

> For all of Apple’s talk about how private your iPhone is, the company vacuums up a lot of data about you. iPhones do have a privacy setting that is supposed to turn off that tracking. According to a new report by independent researchers, though, Apple collects extremely detailed information on you with its own apps even when you turn off tracking, an apparent direct contradiction of Apple’s own description of how the privacy protection works.

> The iPhone Analytics setting makes an explicit promise. Turn it off, and Apple says that it will “disable the sharing of Device Analytics altogether.” However, Tommy Mysk and Talal Haj Bakry, two app developers and security researchers at the software company Mysk, took a look at the data collected by a number of Apple iPhone apps—the App Store, Apple Music, Apple TV, Books, and Stocks. They found the analytics control and other privacy settings had no obvious effect on Apple’s data collection—the tracking remained the same whether iPhone Analytics was switched on or off.

File: 1668026570712.jpg ( 47.36 KB , 440x440 , GettyImages-1146666414-dhs….jpg )


Leaked Documents Outline DHS’s Plans to Police Disinformation
October 31 2022, 9:00 a.m.

Behind closed doors, and through pressure on private platforms, the U.S. government has used its power to try to shape online discourse. According to meeting minutes and other records appended to a lawsuit filed by Missouri Attorney General Eric Schmitt, a Republican who is also running for Senate, discussions have ranged from the scale and scope of government intervention in online discourse to the mechanics of streamlining takedown requests for false or intentionally misleading information.
There is also a formalized process for government officials to directly flag content on Facebook or Instagram and request that it be throttled or suppressed through a special Facebook portal that requires a government or law enforcement email to use. At the time of writing, the “content request system” at facebook.com/xtakedowns/login is still live. DHS and Meta, the parent company of Facebook, did not respond to a request for comment. The FBI declined to comment.
To accomplish these broad goals, the report said, CISA should invest in external research to evaluate the “efficacy of interventions,” specifically with research looking at how alleged disinformation can be countered and how quickly messages spread. Geoff Hale, the director of the Election Security Initiative at CISA, recommended the use of third-party information-sharing nonprofits as a “clearing house for information to avoid the appearance of government propaganda.”


Interesting leak

It's within the right of private platforms to suppress whatever they don't like, but when a secret portal is created for the US govt to direct such suppression, this might cross into a violation of the 1st amendment. A lawsuit may come out of this.

Also really puts the suppression of various news stories (Hunter laptop, coof related stuff) into greater perspective


File: 1668080916993.jpg ( 84.78 KB , 700x525 , Prism_slide_5.jpg )

>A lawsuit may come out of this.
Were they sued over PRISM? https://en.wikipedia.org/wiki/PRISM I'm pretty sure the FISA can be used to shut down any pesky lawsuit.

>the suppression of various news stories

The government is also not shy about manufacturing:
State Department concocting “fake” intellectual property “Twitter feud”
“Our public diplomacy office is still settling on a hashtag,” State Department says.
Jul 6, 2017 7:41 pm UTC

The US State Department wants to team up with other government agencies and Hollywood in a bid to create a "fake Twitter feud" about the importance of intellectual property rights. As part of this charade, the State Department's Bureau of Economic Affairs says it has been seeking the participation of the US Office of Intellectual Property Enforcement, the Motion Picture Association of America, the Recording Industry Association of America, the US Patent and Trademark Office, and "others."

To make the propaganda plot seem more legitimate, the State Department is trying to enlist Stanford Law School and "similar academic institutions" to play along on the @StateDept feed on Twitter.

File: 1608526378578.png ( 1.24 MB , 3548x1704 , 1606321203120.png )


As if the noise-to-signal ratio of internet content wasn't bad enough.
8 posts and 1 image reply omitted. Click reply to view.


An AI trained with this website as a dataset would be an abomination.


Someone should do it


It's not available to the public because they don't want anyone but glowies to have it iirc
/leftybot/ when?


what do you think google has been doing for the past 30 years, just that reading everything and learning


420chan used to have netjester. We should totally do something like that.

File: 1665638467097.jpg ( 37.87 KB , 720x627 , comedyheaven-y2juaq.jpg )


What is keeping this charade going? Why would anyone think it's the next big thing. VR headsets still make most people motion sick.
6 posts and 1 image reply omitted. Click reply to view.


I mean cloudflair isn't the only upstream provider that exists. Just the largest. You are right about web 2.0 (but you didn't have to be a dick that hurt my feelings) but I think you haven't spent a lot of time lurking around the underbelly of the web where a whole community of small self hosted sites exists. There's also gemini and gopher which are making a resurgence. I mean just cause most normies use the path of least resistance doesn't mean the internet isn't exactly what marx was speaking of anyways. It's still that. That's how I am able to have cable tv and any movie, show, anime, etc etc I want free for ever.

I don't disagree with you really but I think you have a far to pessimistic angle on it.


VR will have many niche applications like relaxing environment simulator for hospital patients, Submarine crews, long-haul travel, and maybe even as pacification for refugee camp situations.

VR-entertainment could have already been a small commercial success, if it was offered as an arcade-service.
Imagine arcade-machines that are composed of a powerful computer, vr-goggles and various mechanical force feed-back-simulation-harnesses. People could rent time on a VRcade-machine. Valve's VR with an enthusiast set-up comes closest to this currently.
I had hoped for VR tourism.

For the general public a VR set up has to be self-contained in the goggles, with several hours of battery run time.
The only way to make this happen with appealing optical quality in a compact and energy efficient enough way is to make dedicated asic chips for each entertainment experience. Which basically means going back to physical cartridges.
If one were to build an opensource ASIC-chip ecosystem with a complementary development stack it might be economically viable.
Since more of the logic is expressed in hardware, it is much faster and energy efficient, however the ability to patch bugs after release is also much more limited, and the biggest hurdle for this is probably going to be achieving the necessary quality control.

Facebook is a dying empire, and Metaverse is Zuck's attempt to keep it going. It's mostly just a second life remake, but it's probably worse because all the digital-real estate pay to play shit will kill any escapism potential this might have had. For some reason the metaverse graphics look worse than what second life had over a decade ago. Also are you willing to trust Facebook with all your senses ?

I don't think that VR or 3d entertainment will really die, eventually somebody will find a way to make it work.
Maybe when optical interconnects for data-lines on circuit-boards go into general production, it might become possible to make a consumer grade general purpose computer have low enough latency to drive vr-goggles.


File: 1665687781050.png ( 3.23 MB , 5760x3600 , benis2.png )

The reason is is that apparently there was a working business model for the metaverse already working in underground VR Chat rooms.
This guy talks about the underground furry sex scene that existed for a while in VR Chat. It was kicked off by a VR Chat application that allowed people to exchange Wownero (a fork of the crypto currency Monero) with each other via an in game wallet that worked by simply handing cash to each other as you would in real life.
This set off an explosion in virtual prostitutes, night clubs, headlining dj's and other alternative lifestyle/night life services. This guy says that people were making real money, as much as several hundred dollars a night either sucking virtual dicks as a furry or spinning records on a turntable for a party.
This made Wownero explode in value for a short period of time, which you can see for yourself, until the VR Chat Wownero Wallet developers pulled the plug the plug on their application. Which killed the scene and crashed the price of Wownero.
I can validate exactly none of this but it seems really plausible and would explain why so many companies are going to hard into the paint on VR metaverses.


any more stylish anime dick pics?


As mentioned before in other threads, it's likepy that metaverse is really just a money laundering scheme.

File: 1660371566141.png ( 122.45 KB , 1080x1350 , onion-service-09.png )


I heard the claim that hidden services don't leave the Tor network by Doctor Mike Pound ( http://grwp24hodrefzvjjuccrkw3mjq4tzhaaq32amf33dzpmuxe7ilepcmad.onion/watch?v=lVcbq_a5N9I https://redirect.invidious.io/watch?v=lVcbq_a5N9I ) and by speakers on a talk uploaded on The Tor Project's channel ( http://grwp24hodrefzvjjuccrkw3mjq4tzhaaq32amf33dzpmuxe7ilepcmad.onion/watch?v=VmsFxBEN3fc https://redirect.invidious.io/watch?v=VmsFxBEN3fc ) and I do not understand how it is possible, since as far as I understand it, the Tor node immediately before the hidden service must decrypt the data before sending it to the hidden service, making it have the same weakness as a typical exit node. As far as I am aware, a hidden service hides its location with a regular Tor circuit from a rendezvous point and regular Tor circuits leave the Tor network, so surely the network for the hidden service must leave the Tor network as well.
10 posts and 1 image reply omitted. Click reply to view.


You also for got that every node is encrypted and only the node Infront of the node behind has the encryption keys.


>You also for got that every node is encrypted and only the node Infront of the node behind has the encryption keys.
Nope because then you would have to know where the onion site is to build a circuit directly to it. It's a 3 hop circuit from client to rendezvous node, 3 hop circuit from onion to rendezvous node and neither side knows where the other is.


No you don't. That's retarded. The chain only needs to know the existence of the next link.


If clients can pick the whole chain up to the hidden service they can just pick 3 nodes they control and the hidden service is not hidden anymore.

>That's retarded.

You're not as smart as you think you are.


is correct and you can verify this without reading through the protocol simply by clicking the small circuit icon at the very left of the browser's URL field.
I didn't know this but what anon says makes sense.

Voluntaryist is correct too
You have the private key of the destination so nothing is decrypted between hops except for the IP address of the next hop.
Tor isn't RetardRetroShare where "end-to-end-encrypted" file transfers are only encrypted between nodes and each node can read the content of the transferred files. (This actually got someone convicted in court in a country where by law you are not permitted to transmit illegal content if you can read it and therefore know that it is illegal.)

The NSA can conduct timing attacks on tor (control the guards, watch traffic) but this becomes more difficult the more people use it, even if it's javascript-using normie scum.

File: 1663240018719.jpg ( 124.34 KB , 1280x720 , 1662407454795327.jpg )


i need a cheap, portable, low storage laptop but the cheapest ones at my local walmart are fucking chrome books? Are chromebooks ok if you put linux on them or are they just garbage all together? What can I do?
1 post omitted. Click reply to view.


I think you have to reflash the bios to but linux on a chrome book which can get tricky.
What is you r budget, I'd just save up and get the cheapest system 76 laptop or get one at Costco.


Based digits


bought a refurbished thinkpad twice, worked out fine for me both times. battery life kinda sucked though.


I have a think pad but they are too bulky and obnoxious. I'm trying to not seem like a massive dick head in public with a giant laptop


File: 1663400943888.jpg ( 145.46 KB , 1124x1091 , 0dd56675bbc4e8658012d5997e….jpg )

Linux Chromebooks are great! I have a Toshiba Chromebook 2 that runs gallium OS and it's been a nice little machine for several years now. It's getting a bit old so I'm considering replacing it at the end of the year. Here are a few things you should know before getting started.
1. Make sure you get a machine with a compatible processor. I believe only x86 intel CPUs will work.
2. You will likely need to flash in firmware and possibly remove a write-protection screw. Have a screwdriver that can manipulate little laptop screws.
3. Upgrading the SSD is STRONGLY recommended. Most Chromebooks come with 16GB ssds, grossly insufficient for a proper PC. You can get a 256GB ssd for as little as $40. Make sure it is the correct size for your machine. Suffice to say, be sure to get a machine with a removable ssd.
4. Do NOT install Gallium OS. Although my currant machine runs Gallium OS and most old websites will point you to it, it is an abandoned project (no updates in nearly 3 years). I'll probably install Debian with XFCE, but the anything distro with a lightweight desktop environment should be fine.

Here's a site that will walk you through the changing the firmware, it also has a list of comparable devices.

File: 1626690260864.png ( 405.39 KB , 1572x829 , ClipboardImage.png )


I have over 100,000 photos and a lot of them are unnecessary and I want to get rid of them.

I need a windows program that can help load all the images without hanging up. Sort alike google photos but without the uploading but with the date based cataloguing
Any recommendations?
7 posts omitted. Click reply to view.




Why are you here then? If your life gives you enough opportunities to take 100000 photos then you're wasting your time on a *chan.


hydrus works offline, you just tag them with it to organize them


File: 1660939454999.jpg ( 120.3 KB , 800x600 , pcmanfm.jpg )

On Linux, PCManFM has thumbailers for anything. From pictures to PDF, DJVU, WebP.

Another one is SpaceFM.


Bleach it has an option to delete duplicate files.

File: 1659749724043.png ( 87.89 KB , 568x548 , 1654098695300.png )


More people should use the pleroma and full up the shout box with fun activity.
3 posts omitted. Click reply to view.


It's not really social media though. Most people who use it have a chan culture aspect about them.


If you have a profile (it doesn't matter if it's privacy friendly or anonymous) and there is some sort of point system, it's going to have a social media culture. It's not twitter, obviously, because 90% of the users are not normies.
You can't discuss freely like in an ib because anyone can read what you wrote 5 months ago. Or even worse, try to doxx you to win the conversation or refute your argument.

Social media is pure toxicity and the fediverse didn't change anything.


You clearly have never used a fedi instance and clearly know nothing about privacy in the first place. The point of an anonymous handle is exactly so you can't get doxx'd. That just isn't true because what breeds the type of toxicity you are so paranoid about is having an identity that can be traced. You're wrong. Arguably the ability for me to point out that you are a sour retarded fag who doesn't know jack shit because of my anonymity here is as toxic if not more so than social media. Fedual is a pseudo anonymous culture


>The point of an anonymous handle is exactly so you can't get doxx'd
Being able to know what you said 7 months ago, it's a form of doxxing. Your profile is public and anyone can do it.
If you have an identify and a point based system, most people are going to try to be popular in there. This is why I said private social media will remain toxic, the fedi didn't change the culture.


Oh I guess I should re-read what you said, but, still I don't think the same culture you are talking about applies to the fedi and you're expanding your definitions so much that you can basically apply anything to it. I disagree with that and I have been lurking the fedi for months now.

File: 1623980542452.png ( 1.37 MB , 900x900 , ClipboardImage.png )


how do you glowproof your PC? Do I need to learn how to set up Gentoo? I feel like I'm being watched every second by glowuyghurs, winglows 10 and hackers. They're mining all my data. They're watching me. How do I stop that? I also feel like if I wanted to transfer my files to another computer they would just embed their viruses into my files and infect the next computer. How do you stop it?
8 posts omitted. Click reply to view.


You can't really glow.proof it but you can make it a pain in the ass for them


It is not possible to truly glow-proof a modern PC that is connected to the internet. These machines are so complex that there will always be some vulnerability somewhere. This is especially true when dealing with the feds as they are known to sit on exploits they discover so they aren't patched [https://www.schneier.com/blog/archives/2016/08/the_nsa_is_hoar.html]. There are some vulnerabilities that go down to the processor level, like Intel IME [https://en.wikipedia.org/wiki/Intel_Management_Engine]. No computer can be assumed to be 100% secure.
The best most of us can hope to do is opt out of dragnet surveillance. This can be done by not giving out personally identifiable info: IP, govt. name, home address, traceable email/phone, credit card, etc; general avoidance of big web services; and don't use windows, android, or any other corporate or state produced OS. If your worried about targeted surveillance from the Feds, only real chance is with Tor or non-US vpn but even that's not a sure thing. Probably the single best thing you can do is to encrypt your hard drive, because that denies them the option of simply breaking down your door and seizing your machine to gather evidence. However none this is 100% effective, there will always be a vulnerability somewhere, your best bet at beating the feds is the fact that they have to economize their efforts and probably won't use their most exotic stuff on you unless you're a state actor or a violent terrorist.


1. me_cleaner or old processor without ME
2. coreboot
3. source-based distro like guix or gentoo (preferably without binary blobs
4. mandatory access control, containerization, sandboxing and the like


also 5. LUKS encryption

Delete Post [ ]
[ overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / 777 / posad / i / a / R9K / dead ] [ meta ]
[ 1 / 2 / 3 / 4 / 5 / 6 / 7 / 8 / 9 / 10 / 11 / 12 / 13 / 14 / 15 / 16 / 17 / 18 / 19 / 20 / 21 / 22 / 23 / 24 / 25 / 26 / 27 / 28 / 29 / 30 / 31 / 32 / 33 / 34 / 35 / 36 ]
| Catalog | Home