its the first day of spring , BTW
1. Posts must be related to the preservation of ones technological security and privacy to remain on-topic 2.  To be taken seriously always cite a statement or prove with the tools of reason! 3. Along side digital; political, philisophical and physical based discussion of safety is encouraged
Firefox security addons: https://addons.mozilla.org/en-GB/firefox/extensions/privacy-security/ Note: Many of these addon functions can be covered with about:config changes Firefox privacy and security about:config lists: http://kb.mozillazine.org/About:config_entries#Security. http://kb.mozillazine.org/About:config_entries#Privacy. VPN service: https://disconnect.me/ Security and Privacy apps for mobile phones: https://guardianproject.info/ Open source network protocol: http://openbts.org/ Open source hardware and software web server: https://wiki.debian.org/FreedomBox Opensource lightweight software: http://suckless.org/ Recommended systems for a full open source environment: http://www.fsf.org/resources/hw/systems
https://www.rt.com/viral/382080-nightskies-cia-infiltrate-iphone/ >WikiLeaks has revealed the CIA’s alleged ability to infiltrate and control iPhones through a tool called NightSkies, which is physically installed onto factory fresh iPhones and allows the CIA to monitor and download files from targets’ phones undetected. Good night sweet prince His company is finished
>>4185 >Cisco has released details of a vulnerability in its IOS and IOS XE software that would allow remote exploitation of any one of 318 of its routers. Yeah, the fuck man.. http://www.itwire.com/security/77346-vault-7-cisco-finds-0-day-that-affects-318-routers.html
>>4186 >The Cisco flaw is in its cluster management protocol that uses telnet internally as a signalling and command protocol among cluster members. >ccluster is an Open Content Cluster (OCC). Similar to sites such as Youtube or Reddit it allows users to upload and aggregate content of their liking, however, it is open.
>>4188 >88 Heil Hitler
"Republicans are about to let telecoms sell your internet browsing history — for your ‘protection’" >Sen. Jeff Flake (R-AZ) introduced S.J.Res 34, which would expand the Congressional Review Act to strip away privacy protections established in October by the Federal Communications Commission with broad bipartisan support, reported Privacy News Online. >Flake’s bill, which has gained more than 20 Republican co-sponsors, would allow lawmakers to repeal Obama-era privacy rules by a simple majority vote in the House and Senate and would prevent the FCC from establishing similar regulations in the future. >The rules passed last year prohibit internet providers such as Comcast and Verizon from collecting and selling virtually any subscriber data, including browser history and app usage, without prior user permission. http://www.rawstory.com/2017/03/republicans-are-about-to-let-telecoms-sell-your-internet-browsing-history-for-your-protection/
>>4173 Whole internet must be encrypted it is the only way
>>4173 >these fucks can easily repeal Obama-era privacy rules but cant do anything about Obamacare even though they had years to think of a plan
Am I fucked?
>>4169 He is probably using Tails. Tails installs uBlock. The worst thing is that OP revealed his entry guard. Under normal circumstances, OP would use the same entry guard for months, but since Tails doesn't have persistent entry guards, it will be reset on reboot. (which is bad)
>>4169 > You stick out like a sore thumb on the tor network chum.. Approximately there are 10000 Tails users daily (~0.5% of Tor users) so it should be a risk, however, Tails developers have taken a lot of care when it comes to fingerprint: "Tor Browser in Tails tries to provide the same information as Tor Browser on other operating systems". Some reading about fingerprint: https://www.torproject.org/projects/torbrowser/design/#fingerprinting https://www.torproject.org/projects/torbrowser/design/#identifier-linkability https://www.torproject.org/projects/torbrowser/design/#fingerprinting-linkability What Tails devs say: https://mailman.boum.org/pipermail/tails-dev/2016-January/010146.html https://mailman.boum.org/pipermail/tails-dev/2015-February/008003.html https://mailman.boum.org/pipermail/tails-dev/2015-February/008007.html
>>4170 tails spoofs browser and system information by default
Let's have Tor Thread Post links that still work. Torch: Tor Search Engine http://xmh57jrzrnw6insl.onion/ DuckDuckGo http://3g2upl4pq6kufc4m.onion/ The Hidden Wiki http://wikitjerrta4qgz4.onion/ TorChan zw3crggtadila2sg.onion/imageboard/ Imperial Library http://xfmro77i3lixucja.onion/ Sigaint http://sigaintevyh2rzvw.onion/mail/ Library(Good stuff) http://3cpleimu2getp5q7.onion/library/ Shells http://jq77mc73wz5wuawt.onion/ The Tin Hat | Privacy Guides and Tutorials http://qza32xuddl3guikc.onion/index.html TorFlix http://jl4m7ubpotnu2yos.onion/ Mail2Tor http://mail2tor2zyjdctd.onion/ The Secret Story Archive http://tssa3saypkimmkcy.onion/ OnionDir http://auutwvpt2zktxwng.onion/?cat=6 :3
What forums do you guys use on the deep web? Here's a good reference for explicit sites. http://es2adizg32j3kob5.onion/
add .to to go to tor site without tor, i dun know why you would do that but you still have the info
>>4148 http://boysopidonajtogl.onion/ http://gjobqjj7wyczbqie.onion/
http://gxamjbnu7uknahng.onion/wiki/index.php/Main_Page >Uncensored Hidden Wiki http://52wdeibt3ivmcapq.onion/contents.html >Books
opinions on https://traceless.me/ as a service? anyone had experience with speed limits of the subscribed service. Also general BitX discussion thread
https://wikileaks.org/tpp-ip3/WikiLeaks-TPP-IP-Chapter/WikiLeaks-TPP-IP-Chapter-051015.pdf?t=dXNlcmlkPTU0MjUyMDgxLGVtYWlsaWQ9MTAwMzA= Last week, WikiLeaks released the final text of the TPP’s intellectual property rights chapter and it is absolutely terrifying. These are just a few of its most dangerous pieces: >Compel ISPs to take down websites without any sort of court order, just like SOPA. (Appendix Section I) >Extend the US’s copyright regime to require copyrights stand for life plus 70 years, preventing anyone from using works that belong in the public domain. (Article QQ.G.6) >Criminalize whistleblowing by extending trade secrets laws without any mandatory exemptions for whistleblowers or investigative journalists. (QQ.H.8) >End anonymity online by forcing every domain name to be associated with a real name and address. (Article QQ.C.12) >Make it illegal to unlock, modify, or generally tinker with a device you own. (Article QQ.G.10) >Export the US’s broken copyright policies to the rest of the world without expanding any of the free speech protections, like fair use. (Article QQ.G.17)
>>3083 holy shit
Trump killed TPP
>wikileaks Y'all co'ws thet lied tawk a boot givan awee freedom. You can all blame yourselves. Submitted. Going out of your way to justify bullshit that sets up others as the good guys. Don't like it. Don't spread it. Don't say it is a part of you or what you like. Govt is shit. A herd of parasites that confine others in order for themselves to seem superior to themselves. It has nothing to do with anything good. Exploitation is the same thing. Journalists are the same thing. Exceptions are precious, largely comprised of hope. Like little characters, mass produced and thrown away. They deserve better and they are the truth, Something good. Maintaining that isn't a witch hunt, it's an effort for what is joined to such to be nice, proving that truth and making it important. The wrong thing is obvious, abundant. Shouldn't matter and is nothing against what does. Traitors try to remove beauty, put it up again. They do it to make it seem as if from them. Like all religion. Those who comply to avoid being victimised further such. If you want to talk about something by bad, because your faggot ass wants to be on the winning team, remember what little had faith in you and do something for them instead they might like to be a part of. If the bad guys appeal to you as a good guy you should see that as true and do what you can so their attempt at existence isn't hopeless.
Two things: 1. For someone new to Linux who is accustomed to Windows, what's the best way to start getting familiar with it. Either a linux install on a standalone machine or a good version to use on VM to learn it. I got a copy of Zorin 11, is that a good version to start out in a familiar environment and learn as you go? Is there any guide that gives a side by side comparison, so you can understand what's closest to the Linux equivalent of what you're familiar with in Windows? (device manager, updating, etc). 2. For machines that you can't get away from Windows on just yet (setting up machines for friends or family, gaming rig, etc), how best to manage privacy? To start with, use either 7 or 8.1 (no 10) and remove the telemetry updates? After that, any preferred apps to use and to stay away from (eg using Firefox not Chrome)?
>>3780 use xubuntu, never look back. https://help.ubuntu.com/community/SwitchingToUbuntu/FromWindows
Zorin is good, so is Ubuntu (or Xubuntu). Learn how to use info(1) to learn more. Get to know the GNU core utils. Learn how to write small programs (like loops for renaming). Get to know cryptsetup(1) for security. Join the Linux community. linuxquestions.org is a good place to start. I'm using Linux Mint at the moment and it's as intuitive as you might want. Most distributions these days are. (Zorin among them.)
>>4154 >Outlander >replying to a year old thread I like xubuntu, its my first dive into linux. I dual booted my win vista laptop with it a year ago. I only use windows because I can't get the dual display to work on xubuntu 14.04. I've been thinking of getting a ssd for my 7yo laptop and trying ver 16.04
Ubuntu and its forks are ass. They are not worst than Windows but they are not trustful at all. Hardened Gentoo & OpenBSD are really secure, all the people should be using them. Other distros to study are Alpine, Qubes & OpenIndiana. Most of the secure distros aren't begginer-friendly, but you will learn a lot.
>The cypherpunk revolution >How the tech vanguard turned public-key cryptography into one of the most potent political ideas of the 21st century. http://passcode.csmonitor.com/cypherpunk
Assange and wikileaks has been compromised. The insurance files released on the 14th November do not match SHA-256 hashes tweeted in October. This is shortly after many Podesta and Hillary emails disappeared from the leaks.
>>4136 TOR is also possible compromised but there's no way to prove it is or it isnt
>>4137 If TOR exit relays are compromised, how can I be tracked? What about the entry guard and the middle relay? What about encryption? If it is indeed compromised, what can we use to talk securely using a website or group chat?
>>4137 >global pedophile ring Come on. I mean, there is definitely some pedo shit going on with the higher ups, but the way this is worded makes it sound like the world is controlled by pedos. Also, tries to make the NSA sound better. As though the only reason Snowden leaked info was to help the CIA. Discredit Snowden, and you make the NSA sound a bit better. If that were true though, I'd expect that the powers to be would work hard to shut down the NSA, NOT support it and say how Snowden needed to be killed by a drone strike. Hard to say what could prove this guy correct though (short of say, Assange reappearing and confirming it...even then he could be compromised). NSA and CIA struggling is not really surprising, so that wouldn't prove anything. Everyone already knows that the FBI is involved in drugs. So the pedo info would need to come out. Not entirely sure it would collapse governments though.
https://medium.com/mozilla-advocacy/five-superheroes-who-use-encryption-for-good-68ea9691ee2#.te74bwofq Umm... What is this? I have a good firewall but this spammed me.
>>4107 notice how so many of them are DC FeelsGoodMan
Any super hero that doesn't know how to protect him/herself on the web is going to be outted faster then Rolf Harris. It's a fun add but I wouldn't trust it.
Hit Girl is my fave!
I just updated to Tor 6.0.5 >pic related It says * Update Firefox to 45.4.0esr There are a few pages of vulnerabilities for that version of Firefox. How secure can tor be?
https://blog.torproject.org/category/tags/tbb-60 Tor Browser 6.0.5 is now available from the Tor Browser Project page and also from our distribution directory. This release features important security updates to Firefox including the recently disclosed extension update vulnerability. All users should upgrade as soon as possible. That vulnerability allows an attacker who is able to obtain a valid certificate for addons.mozilla.org to impersonate Mozilla's servers and to deliver a malicious extension update, e.g. for NoScript. This could lead to arbitrary code execution. Moreover, other built-in certificate pinnings are affected as well. Obtaining such a certificate is not an easy task, but it's within reach of powerful adversaries (e.g. nation states). Thanks to everyone who helped investigating this bug and getting a bugfix release out as fast as possible. We are currently building the alpha and hardened bundles (6.5a3 and 6.5a3-hardened) that will contain the fix for alpha/hardened channel users. We expect them to get released at the beginning of next week. Until then users are strongly encouraged to use Tor Browser 6.0.5. Apart from fixing Firefox vulnerabilities this release comes with a new Tor stable version (0.2.8.7), an updated HTTPS-Everywhere (5.2.4), and fixes minor bugs.
Unrelated, but that page looks really cool in full screen..
http://seclists.org/dailydave/2016/q3/51 So the prior version of TOR was completely unsecured, and anyone using it could have reviled their IP with all their activities done while using tor logged.... Firefox uses its own static key pinning method for it's own Mozilla certs instead of using HPKP. The enforcement of the static method appears to be much weaker than the HPKP method and is flawed to the point that it is bypassable in this attack scenario. The bug appears to be fixed as of the September 4th nightly build of Firefox but is obviously still unpatched in both the current production versions of Firefox and Tor Browser. I'm posting about this publicly now instead of waiting because @movrcx's post still shows how to take advantage of these flaws even if it doesn't describe (and he didn't know at the time) exactly how and why it bypassed certificate pinning.
our favorite coder gurl is back
>>4096 fuck off. Kristen Titus is the ultimate gurl coder.
I sit in on a few programming classes in uni. Her work seems like an assignment from intro to programming. I don't even know what the male program means but hers seems to be totally different. Maybe she should post one of the same type as hers instead of comparing apples to oranges.
>Lepton image compression: saving 22% losslessly from images at 15MB/s what's the point in losslessly encoding jpgs... source: https://blogs.dropbox.com/tech/2016/07/lepton-image-compression-saving-22-losslessly-from-images-at-15mbs/
very cool savage little loli, more of her. shes like something from the tiny lotus cult place
do you know her name?
hai check out /tech/ on librechan https://librechan.net/tech posting on Tor without Anonymous Accounts!
>>4092 >on topic
>>4092 >Libre advertisement They need more CP thus they want ppl to get there