So you wanna try out the new 8kun TOTP Authenticator Android APK, eh? But you are either afraid to download it and deal with the whole kittenkaboodle, or you don't have an Android phone, or you don't want to install a 3rd-Party APK on it, or you're afraid of change in general, or you just have concerns, and are not sure what you wana do…
What Are Your Options?
— First of all, you can just give up shitposting on 8kun altogether, and that is definitely the recommendation I would make for many previously prolific 8kun shitposters, like "Johnny Neptune" .
— Either just go somewhere else entirely, like another chan, start your own chan (https://gitgud.io/LynxChan/LynxChan/), or do nothing here but lurk — no posting. (I don't see Junie Niptug becoming an 8kun lurker though. He never was one. He is only here to vomit diarrhea.)
— Of course, he took the -8kun-Junkie option, which was to straight up download the APK with his shitty phone browser and Install it on his Android device, like the insufferable phonefag that he is, and was back to shitposting all by himself in no time!
Unfortunately (for him), the option he chose does come with some caveats, which I'd like to explore… First of all, the "Anti-Troll" Technology that most forums use nowadays cannot really be used on a site that doesn't have usernames; so trolls like JN and the Lolita Spammer can just change their IPs all day long and come back pseudonymously to spray more diarrhea all over the place. But JN knows damn well they could chop off his particular installation of the 8kun Authenticator app in a heartbeat if they wanted to, and it figures they might not decide to put up with his constant spam any more than they tolerate the Lolita spammer.
He might wanna watch his shit.
For years, the Captchas were practically our only mode of defense against these idiotic trolls on pseudonymous image boards. But, they have not only become increasingly more and more of a pain in the ass for the userbase, they've, at the same time, become less effective against trolls. The captcha-solving bot-tech is too easy to get ahold of for anybody, really, and computers can already see shit better than we can, so it's just getting ridiculous. I get WHY the APK, but, of course, now it will be a target too. It already is.
Yes, I think Pseudonymity IS Important, and WORTH Defending.(I don't think Jim feels the same.)
So, yeah, I'm gonna offer my thoughts on the matter, and offer some solutions too. If others have better ideas, I'm just brainstorming anyway, and doing some trial-by-error type shit. Long story short, I wanted the APK, and have run it on an Android Emulator (namely, `Anbox`) on my Linux Desktop, and also inside a Virtual Machine. I'll get to all that, but first wanted to say that attackers have been DDoSing not only 8kun.top, 128ducks.com (where the files are stored), and the different Captcha sites 8kun has used, they also continue to DDoS the entire 8kun System, which obviously includes access to downloading the APK at <https://sys.8kun.top/apk_dl/8kunAuthenticator.apk>. Oh, you can get it, if you want it, but sometimes it may be slow. I still suggest going at it the "safe" way, and snagging it over Tor or using a SOCKS5 Proxy, like I did, because somebody is definitely recording whose IPs are downloading that APK from there. (which is why I suggest mirroring it a few places, along with the sha256 hash for verification…)
I just used `curl` and got it in seconds.
bash
➤ curl --proxy socks5h://127.0.0.1:9150 --location --insecure --output ~/Desktop/8kunAuthenticator.apk https://sys.8kun.top/apk_dl/8kunAuthenticator.apk
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
100 341 100 341 0 0 100 0 0:00:03 0:00:03 --:--:-- 100
Of course, you can just use the Tor Browser running through a VPN to Download the APK, and snag it from the Tor Downloads Folder folder at: `~/.local/share/torbrowser/tbb/x86_64/tor-browser_en-US/Browser/Downloads/8kunAuthenticator.apk`. (or wherever the location is on Windoze, which I have not used since 2004.) Yes, you can download it via the Tor Browser on your phone too, but where I'm going with this is an APK install on an Android Emulator (like `Anbox`), either on a virtual machine or on your host machine. `Anbox` is available as a Snap, but I don't do Snaps or Flatpacks, and they don't have an AppImage. (Here's why: https://github.com/anbox/anbox/issues/1838 ) Luckily, I use Arch, btw, and `anbox-git` is in the AUR at https://aur.archlinux.org/packages/anbox-git so…
Just figure it out for whatever architecture you're running. https://anbox.io/
It's not the only Android Emulator out there either. Here's some others: https://fossbytes.com/best-android-emulators-linux/
I've used this on one on VMs before: https://www.genymotion.com/download/ (I think it's Windoze-friendly.)
But if you wanna use `Anbox` here's another helpful link… https://docs.anbox.io/userguide/install.html
Gonna recommend, however, for ease of use, you just USE AN ANDROID IMAGE IN A VIRTUAL MACHINE.
VirtualBox works fine, if that's what you're used to. That's what I use when I'm over on Debian, but when I'm on Arch I either use `Anbox` or QEMU / KVM.
You can find an Android 9 ISO at: https://sourceforge.net/projects/android-x86/files/Release%209.0/
Here's some excellent INSTRUCTIONS: https://www.android-x86.org/documentation/virtualbox.html
(You can even make a virtual SD Card!)
Anyway, Be NOT Afraid.
I checked out all the code, even inside all the `.dll` files, and you'll be fine. Will admit I tweaked my own version a bit, but I just like playing around and learning things, so…
ENJOY!
and Above all…
> Never Listen to Johnny's Constant Stream of LIES & F.U.D.