[ / / / / / / / / / / / / / ] [ r8k / ck / wooo / fit / random / doomer / f1 / foodism / harmony / lathe / lewd / warroom / wtp ]

/pol/ - Politically Incorrect

Politics, news, happenings, current events

Name
Email
Subject
REC
STOP
Comment *
File
Password (Randomized for file and post deletion; you may also set your own.)
Archive
* = required field[▶Show post options & limits]
Confused? See the FAQ.
Embed
(replaces files and can be used instead)
Options

Allowed file types:jpg, jpeg, gif, png, webp,webm, mp4, mov, pdf
Max filesize is16 MB.
Max image dimensions are15000 x15000.
You may upload4 per post.


This is a board of politics.

File: 6d86e9d2a960a39⋯.jpg (154.56 KB,1080x1440,3:4,8fr7cgkj03s71.jpg)

e15827 No.13640738

Let's see here:

>GrapheneOS isn't compatible with POWER9/RISC-V architecture, but then again no Android rom really is; instead uses NSA Trustzone-backdoored ARM CPUs.

>According to their website, they're saying that they're dropping support for older devices, forcing users to update to newer ones, which is sus in itself.

>Contains proprietary, nonfree Android blobs for the GPU (Adreno), WiFi/Bluetooth, Cellular modem, Camera ISP, etc. In fact, there is no Android custom ROM that doesn't come with this besides Replicant, but even Replicant uses shitty Samsung devices for compatibility and with major tradeoffs in performance, and even though it might be "private" in that regard (even though it's only device-specific, doesn't have as wide device support as, say, LineageOS and again with the architectural compatibility that it's been ported for). But then again, "privacy" and security are two different subjects, even if we were to assume that it were and thus leaves Replicant vulnerable to problems with modern exploit mitigation, verified boot and attack surface hardening.

>Uses FCC-licensed Google Pixel cell phones with IMEI/MEID device fingerprinting numbers because noobs who never heard of blank chips and boards, custom builds, ghost phones, ghost SIMs, or even a simple development board or programmer/debugger to flash firmware of their own to the hardware and porting it to make it fully open source.

>Plus Android lacks a terminal, full package manager and uses sandboxed app store reliance instead.

Lol. Lmao even. If I had to recommend an alternative to this? While there is no smartphone OS that supports RISC-V/PPC, you could instead just run Phosh or Sway over Gentoo OS on something like one of those BeagleV single-board RISC-V computers with mainline Linux support that would be ideal for a use like this, but instead just build your own board using your own custom hardware that you bought in cash at a computer hardware store (like the Micro Center in Duluth, Georgia which is owned by some Koreans) or online through Dell.com forums (you have to DM somebody). You could also clone a device, like a printer that you bought in cash in some other state so that way the device won't be tied to somebody's name/address and card, assuming you live in the US where privacy laws are fucked up, unlike other countries such as Germany or Canada, where an IP address enjoys the same protections as a social security number, solder it all together, add a touchscreen to it and some SIP softphone apps for VoIP kinda like picrel (it's a Gentoo Pinephone since GNU supports Phosh/Sway, but not Plasma Mobile though), although that wouldn't be a true smartphone experience, though. As for PPC, you could use a similar mobile UI as this, but on laptops, it wouldn't work as a touchscreen. Btw, you have to ne careful when cloning another device, because different devices employ a variety of security implementations aimed at preventing this, but it'll make your internet traffic appear as background noise to your ISP, and will only see activity if it comes from the other device you're masquerading. Optimally, you could even use network phreaking to get online instead of paying Spectrum up the ass a month to get eavesdropped on, simply by taking some printed circuit boards, soldering some blank chips to it for the modem/router boards, wiring a MP3 player playing 7Hz frequency out lod w/ a speaker jack (because 7Hz is the most up-to-date generation of Wifi frequency, although you'll need to make sure it uses zero compression in the audio, because I know YouTube compresses it for reasons related to this), program the chips with your custom open source firmware of choice using a laptop and board box, wire speakers to the same boards w/ decoding software flashed on the boards, put it all inside a soundproofed box so you don't hear it (because this noise will kill you too once it connects to another machine because it's infrasound or 0-20Hz) w/ accessibility wired on the outside of the box and cords extending from it,and it'll actually show you an open Wifi network within range on your computer that you can connect to.

____________________________
Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13640739

Also:

>Qubes

>Open source with proprietary blobs,[1][2]

Lmao.

>Arch

Is ported for proprietary GPU firmwares, uses Broadcom, NVIDIA for kernel drivers which is proprietary, intel-ucode and -uco for installing microcode updates, which is proprietary, and GRUB may also support booting nonfree firmware too. Figures, since Arch users are the most insufferable personalities in the programming sphere.

>Manjaro

Same as above, except worse.

Contrast this with Gentoo, which doesn't use any wifi firmwares (like Broadcom) or drivers by default, and it's 100% free and open source from the ground-up.

Although to be fair about Arch, they at least have a PowerPC port (but it's unofficial). They also have Libre kernels (like linux-libre) from the AUR so that you can use for Arch Linux that can manually remove linux-firmware, intel-ucode/amd-ucode and proprietary drivers (like NVIDIA, although GNU doesn't use drivers), but these are unofficial also. Qubes and Manjaro I would just avoid completely. Aside from GNU + linux-libre, you could also use Parabola GNU/Linux, which is Arch-based, Guix system, Trisquel, or maybe Hyperbola, which is also Arch-based (although their repo is no longer active). Coreboot/Libreboot are also scams.

>Coreboot: only partial Intel ME neutering, depending on device, uses proprietary blobs (VGA BIOS, sometimes ME, even if only partial, microcode), is minimalistic and uses UEFI and has shit functionality (PowerPC works like a charm).

>Libreboot: is compatible with older hardware only (like Thinkpad X200, T400, etc.), which have older CPUs (pre-Spectre/meltdown mitigations), no hatdware TPM 2.0, less secure memory default protections (e.g. no SMEP/SMAP), does not currently support cryptographic boot protection (no vboot or UEFI Secure Boot, either), anyone with physical access could tamper with the bootloader or kernel disk unless you use full disk encryption with verified /boot (you could use LUKS + detached boot partition or Heads/Coreboot for signed bootchain), doesn't come with microcode updates either which leaves known CPU bugs unpatched (like Spectre, TLB Bug and errata) so you'll have to install microcode from Gentoo manually if you accept the tradeoff, and even some of the Libreboot-compatible devices come with blobbed Wifi (e.g. Intel 7260) and even if you're using a free Atheros card instead, you're still prone to metadata leaks (e.g. no MAC randomization or weak roaming protections). It also comes with TPM 2.0 or fTPM (used for disk encryption key sealing as well as integrity checke), SGX/SEV/TEE (optional for sandboxing, although not privacy-friendly anyway) and IOMMU (VT-d) (for safe device isolation i.e. USB sandboxing), and has no modern hardware security. Also, physical access = game over, because it's not immune to "evil maid" attacks so doesn't protect the BIOS/GRUB fom being tampered with, and it has no tamper-evident boot chain or disk seal unless you add external tools (e.g. Heads, USB-Key Challenge, or boot has verification). And even though it may not have any Intel/AMD PSP, uses blob-free firmware and full disk encryption may be technically possible, it however lacks a secure bootchain, as well as modern CPU mitigations, microcode updates, TPM/hardware sealing and IOMMU/VT-d/modern isolation.

In all, Libreboot is good for privacy, but not security. Coreboot is the opposite in that it's better for security than Libreboot, but not the privacy aspect. But both still suck at performance (so does RISC-V, but the difference is it's safe by default unlike this, unless you absolutely know what you're doing).

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13640740

>Brave/DDG/Searx

 "Private search engine" is an oxymoron. Everytime you enter a query, that's a new page added to the web, and that's not only visible to whoever runs the search engine company or the police/NSA, but to private third parties as well. And they can pinpoint that to an IP address/cookies. Case in point: aoluser927. In 2006, there was an AOL employee who leaked thousands of user's supposedly "private" search profiles and revealed somebody who was searching some truly disturbing shit (namely, kidnapping kids and hiding bodies and stuff). I don't think they could see an IP and it remains unsolved who was making these sick ass searches, but it's still there, obviously.

Another problem: they only index 1% of the entire internet because robots.txt is a manual handshake process. Back in the day, some web browsers had these built-in keyword search features that could show you the whole web at the time you entered those parameters (namely, Nexus browser for Nextstep OS from 1994, which was the first web browser, launched by Tim Berners-Lee who created the World Wide Web, since prior, people relied on different hyperlink interfaces for accessing ARPANET/internet/WWW, and I think AOL browser also, which had a similar feature, although none of these still work anymore, because they use outdated web protocols). Although this is something only '90s internet users would mostly remember (from what I've been told, they weren't exactly user-friendly, and this was right before IE took over). But you can still do something like this today, assuming you have a Linux desktop and Python to write a custom one with current web protocols to index sites. The only exceptions are encrypted networks, like Tor/I2P/Freenet, which you could still index, assuming you designed it for those specific network protocols, although you can't if it were meant only for two computers to see (or in certain rare exceptions, like those private sites that require you to have certain cookies in order to access that would require you to email the site owner to get them to let you in manually, which'll encrypt the connection once you're in, like those private sites off that old Torrent site "Demonoid," which had some "Top Secret Torrents" on there to loophole around ISP snooping laws using a disclaimer). Point is: the internet works off of IPs/ISPs, ASNs (to which there's only 4 companies that assign these in the world, with ARIN being the American one), nodes (computers in a network), registers/DNS and VPS (which is CLOUD, such as Digital Ocean, for example). There also is no "deleting" anything off the internet either, because there will always exist backups, because that's CLOUD-BASED (meaning once it's out there, it's already on another computer and you ain't deleting it, either). In fact, you could even customize it with "nojs" filters and advanced search tools (the older ones would let you add to searches, like narrowing your searches for websites with stars in the backgroud, say for example, and it'll give you exact matches without fucking up your searches, unlike shitgle). Also, AT&T can pull-up anything that was ever uploaded to the web since at least 1996 when the CDA was passed and the DOTCOM explosion (in 1989-95, URLs didn't have ".com" suffixes, a link would instead look like "http://www.greenplants//" instead of "http://www.greenplants.com"). If it's encrypted between two computers (like self-hosted emails, if done properly) it'll just make content unreadable to another computer.

Who the fuck still falls for honeypots like Brave/DDG/Searx on here? Just script your own keyword search interface and install the extension to Firefox/GNU Ice Cat via "developer mode" extension (btw, don't use "Brave" or any other Chromium landmine either, since they're all the same).

>WireGuard/OpenVPN/Tailscore

>WireGuard

Written in C, so no.

>OpenVPN

Insecure (and written in C).

>Tailscore

Proprietary trash. Again, written in a lower level language.

When the fuck will somebody use Python to script a VPN protocol out of for a full tunnel client w/ access to iptables w/ default setting at "strict"? Plus run it on custom STUN servers, uses 10.8.0.53 instead of 8.8.8.8 (Google)/1.1.1.1 Cloudflare)/9.9.9.9 (Quad9) and blocks any connections to them for a fine-grained DNS control, and fully self-hosted w/ local only control. Everything else is too insecure. Oh, and also

>Tailscale leverages Google's OAuth2 for user authentication, allowing users to log in to Tailscale using their Google accounts

Lmao. The absolute state.

The entire reason everyone prefers to write VPNs in lower level languages in the first place is because of performance and simplicity. The only thing that C/C++/Go has on Python in those aspects is that Python's cryptography is slow. But I have yet to see anyone implement a higher level language to script a VPN client with. That's why alll the VPNs on the market are privacy scams.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13640746

File: a859e1863b5727a⋯.jpg (463.81 KB,1080x1037,1080:1037,Freenety.jpg)

>Tor

1.) The CIA controls all public nodes to the network.

2.) Security issues relating to it (like "Sybil" unmasking attacks).

3.) The exit relay problem.

4.) The network is rickety now due to network-wide DDOSes thay's breaking sites and fucking the network up, and it's not as "robust" as it claims.

I2Pis also trash. It was literally written in JAVA! Python shits on Java! It even requires you to install the latest version of it to even access the network! What a croc of shit! That's why hackers (and I'm not even talking STATE ones, either) can deanonymize users through the I2P network simply by abusing Java, since Java is proprietary garbage and anyone promoting this network is a shill. Hyphanet (formerly Freenet/Frost) is the only good one, since it requires you to run the connection off custom peer nodes to even access the network, which you can write your own custom VPN profiles in Python w/ at least 261 bits of encryption each, since that's enough to keep the feds away, although I've seen some people use 6000 bit encrypted virtual networks, which is heavy enough to take a country the size of Russia or North Korea 500 or 600 years worth of processing power just to crack a single teletubbies video from your traffic, say for example, much less any hacker (although it'll require massive processing power to the point that you're liable to overclock your board so much that you could risk frying it from the massive strain you're putting on it, which is why you'd need to run ChaCha20 over to reduce the encryption from bloated applications overhead, which is why it's used people with weak CPUs, and I'd also recommend using a custom build PC w/ a custom motherboard, including microprocessor/FPGA, up to 4 RAM sticks (up to 200+ TBs of RAM each), an ATI graphics card, run your battery top-to-bottom instead of the reverse inside the tower because that'll fry it more easy if you don't, assuming you studied Tesla, and you can use up to 4 different SSDs w/ FDE and flash drive w/ decoding software flashed on it to get on your desktop using the SATA connectors/plugs going to each; don't use regular hard drives unless you have Faraday protection for the hardware because hackers can listen into your conversations inside your room even if you cut the speakers because hds are analog hardware and emit background noise, which is why you would have to upgrade to digital to avoid this, and a HDTV monitor; for a laptop, just do the same thing as with the desktop and phone, but simply swap out the board from a Thinkpad and that's basicaly it). Then you just enter the IPv4 addresses into the boxes provided after creating the virtual networks for whatever conventional open source VPN client of choice you've got, like WireGuard, which uses .comf files you can write, import and connect to, and you're in (although I'd recommend scripting your own VPN protocol, like I said earlier, which would be optimal). And while you could say Freenet/Frost was written in Java, but newer versions of it use Rust ever since they switched it over as "Hyphanet".

Besides, having a centralized base of nodes to backbone a network off of where a central point of failure could occur glows anyways. Hyphanet gives power to the user rather than the ISP, since VPNs can still keep logs.

>(((must update to latest version of Java)))

>javaw.exe not found

Trash. Also, is it just me or does the I2P logo amd plebbit logo look the same? Coincidence? I THINK NOT!

Hyphanet is still king. Released to GPL license in 2000. I2P was released in 2002 and Tor in 2003. They're imposters. Although Hyphanet uses localhost rather than base 32 or 64 characters, although that just deals with hosts file. Also

>built-in panic button

Let this just be a lesson that just because something says "open sores" doesn't make it any good inherently, it just means you can see what goes in it. Hell, Shitsung smartphones use KG/RMM state which is "open source" it doesn't mean anything by itself.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

000000 No.13640748

>oy vey goy nothing is private just give up!

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13640749

File: 2e3b5766ad5ce97⋯.gif (295.6 KB,400x215,80:43,c6d11d8c_6203_41fb_a6b2_02….gif)

>>13640748

Looks like I'm setting the feds off that are watching this board already, I see. If I shilled for Tails OS or Google products, there wouldn't be nearly this level of backlash.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

000000 No.13640750

>>13640749

>One (1) post making fun of you

>Goys! Goys! See the backlash I get! It's the feds!

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

561b38 No.13640753

File: fabf27dcc4b12a8⋯.jpg (57.57 KB,1024x395,1024:395,OPSEC_OSINT_Banner_1024x39….jpg)

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

716bcf No.13640763

>>13640746

100% of DDoS attacks are feds.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13640813

>>13640753

Not to mention that POWER9/PPC architecture is not only optimal because it's open source with no proprirtary nonfree blobs and has GNU/Linux compatibility, but also because it was designed with IBM supercomputers in mind, so it's a super high-end ISA to top it off.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13642439

Offline AI bots written in Python and executed via terminal are the safest ways of connecting to the internet tbh.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13642440

>>13640813

Although RISC-V is improving recently, performance-wise.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13642441

>>13642440

Hell, you can use AI to script architectures with too (besides RISC-V).

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

9767fe No.13642447

>>13640749

Pretty sure it was the Arch/Manjaro user comments above that did it.

Should have stuck with the usual Kubuntu over Ubuntu chatter if you wanted to be filed away as normie that can be ignored.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

202f65 No.13642499

>>13640738

>prietary, nonfree Android blobs for the GPU (Adreno), WiFi/Bluetooth, Cellular modem, Camera ISP, etc. In fact, there is no Android custom ROM that

Toss all that shit out.

Get a Thinkpad.

Replace the BIOS with Coreboot.

Install Trisquel or Debian.

You are now based.

-> No more INTEL Management Engine cucking.

-> No more "BILLIONS MUST UPDATE" Windows spyware.

-> No more games getting deactivated remotely from "the cloud".

https://doc.coreboot.org/tutorial/part1.html

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

80991c No.13642501

I use an old laptop with an old "outdated" OS that has no forced updates or any of that shit. Got rid of any unnecessary bloatware and it works just fine for me. Updating shit is so overrated. Anything can be hacked anyway. If you are worried you need to re-consider what you use computers for and how you use them. What info you put into them. I simply use a VPN and forward secrecy, I won't put personal information into my system at all. Pretty much use it for shit posting, scrolling random websites and downloading media. If ever hacked they really won't find much on this system and all my important files are safely backed up offline on multiple copied drives. Considering I hardly use any mainstream social media services it always suits what I intended to have a computer for. Archiving. Media hoarding. Shit posting.

If I ever do anything else, like personal email, I have a completely different PC and OS to access that and it's pretty much reserved for personal use only.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13642512

>>13640738

>and some SIP softphone apps for VoIP kinda like picrel (it's a Gentoo Pinephone since GNU supports Phosh/Sway, but not Plasma Mobile though), although that wouldn't be a true smartphone experience, though

Or you could pair a ghost SIM with a Gentoo Phosh device using ModemManager and a kill-switchable baseband, add mmcli scripts to only connect when needed, avoid persistent IMSI exposure or triangulation and combine with VPN + Tor + MAC randomization.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

358967 No.13642522

File: 9e7b4eb51aa6937⋯.webp (58.87 KB,526x677,526:677,IMG_8568.webp)

https://vp.net/l/en-US/pages/best_vpn

This is supposed to not have glow niggers siphoning info.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13642672

>>13640740

>VPNs

Just use a custom proxy stack consisting of X25519, chacha20, poly1305 and kyber, which is resistant to quantum computers since you don't need a client and in fact, I advise against it because there curently are no safe VPN providers as they're all written in garbage lower level languages like C/C++/Go (and that includes OpenVPN and Wireshark) and lack full tunnel control. They're garbage.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

b5f598 No.13642673

What about PinePhone ?

https://pine64.org/devices/

I've been waiting to finally navigate off the Duopoly of Droid/Apple.

I was surprised when investigating this space that many were recommending using a Google device…defeats the entire purpose

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13642678

>>13642673

Pinephone is still (((FCC-licensed))) but you're close. I like their idea of hardware killswitches (but the Librem makes theirs better accessible on the outside of the case). The only guaranteed safe smartphone is a fake phone/counterfeit smartphone (like Obama's blackberry) which are sadly illegal.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13642679

>>13640746

Although Rust is forked from Java, so use Hypha behind a VM only. Also, proxy =/= VPN, as I've already said in the last two comments.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13642680

>>13642679

Yes Rust doesn't come with all the security updates that j*va does, but it's not an optimal language as compared to Python. C is only good for making webpages.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13642684

As a finishing touch, use rkhunter, kvm/qemu, clamav, firejail and iptables together for multi-firewalled defense and wireshark or custom network tools for monitoring your network. Use xkpasswd.net, keepassxc, bitwarden and masterpassword.app for encrypted passwords and I might go into a tutorial on how to self-host emails properly in a future post to touch it up.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13642687

How to self-host properly:

>host your emails on rented VPS servers instesd of putting your own LAN at stake and routing your emails through your homeserver which requires a business plan from your ISP and migraine-inducing maintenance work and costs to handle server fees and maintaining it, and self-hosting it (like those anonymous VPSes frequented by hackers that abuse legal loopholes, like CrazyRDP/Bulletproof VPS services/bitlaunch/etc) so that way you can host a static address on another ISP.

>run your emails off African VPS servers or other countries with better privacy laws (ie Soviet Union/.su because they were registered before the dissolution and thus aren't bound by any rules either because "the Soviet Union" no longer exists, Tonga/.to, Rwanda/.rw, São Tomé and Príncipe/.st, India/.in, etc) so that way the feds won't be able to subpoena shit.

>use custom open source DDOS mitigation and firewall tools to route your traffic through (like Anti-DDoS Flood Protection and Firewall by Conor McKnight on Github or haproxy-protection, for example).

>use your open source webmail client of choice (like Mozilla Thunderbird).

>avoid using real credentials in DNS records when registering website and the same applies to your email address/password/website name/usernames/website/etc (which your email account should appear as yourname@yourwebsite.su for example). Also block cloudflare (1.1.1.1) and websites connected to it (including 4chan).

>if making a general-use website, say a forum, avoid proprietary software like Xenforo and Google ReCAPTCHA, and instead use opem source forum software that's more secure (like MyBB - I prefer the Raid Forums/Breached versions). You could even make it accessible by cookie only as I mentioned earlier so it will encrypt the connection once in and the only way to access it from the outside would be manually.

Also, use common sense while online. As in, don't reuse usernames, passwords, avoid social media (including FaceBook and Myspace), use yt-dll for YouTube, no bragging/camwhoring either, etc.

And if your browser is fully setup, it should filter out 99% of the whole internet so only basic C-written webpages are accessible (like 90s-era geocities/angelfire/tripod-style websites).

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13642689

Oh, forgot to mention you'll need all the commonly recommended privacy plug-ins for Firefox/Ice Cat/Iceweasel (unless you're using a terminal browser that uses .txt instead of .html like ELinks) such as NoScript, Privacy Badger, Cookie AutoDelete, Multi-Account Containers, adblockers (uBlock Origin works best but I think Adnauseam is pretty good too), googleadservices blockers, bitminer blockers, etc.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13642716

>>13642512

Instead of Tor, use custom Linux proxy.

>>13640738

I got it wrong, Wifi vibrates in Gigahertz range (billions of hertz - that's enough to kill somebody!). Just use modulation so you don't hear the noise.

As for some trivial stuff: instead of using garbage "open sores" apps like Telegram or Signal (or God forbid, cloudshit apps like Matrix and RocketChat), use IRC or XMPP/OTR/OMEMO w/ encrypted client of choice. There are currently no distributed and popular messenger apps I can recommend. WhatsApp is owned by Faceberg and Wickr is owned by Amazon.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13642726

Also, to expand, Lokinet is garbage. It uses that god awful "Oxen" blockchain that they used for Session that costs $1000 to host a single node on the network and is hosted on Australian servers. And Jim "the DHS glownigger fed" Watkins endorses it.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

54a9e0 No.13642730

File: 1ef292f089b6e61⋯.png (36.37 KB,664x457,664:457,4get.PNG)

Any good?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13642733

>>13642730

Where'd you find this? Skidtools.io? Also, let me say this again: THERE IS MO SUCH THING AS A PRIVATE SEARCH ENGINE! There is one common denominator that virtually every webpage on the whole internet uses, and that's HTTP/HTTPS. Script your own HTTP/HTTPS sniffer toolbar using Scapy, PyShark or Socket in Python as backend sniffers to sniff out any and all HTTP traffic (just not HTTPS because it's encrypted which would require MITM access via ARP poisoning/router injection/mitmproxy in Python). Heee's how you can do it:

>Have the Python tool sniff HTTP traffic using Scapy or PyShark

>Extract URLs, POST requests, and keywords

>Match those against certain strings (e.g., "nuclear", "bitcoin")

>Serve results to the browser via a local API (e.g., Flask)

Now you just created a built-in browser keyword search tool like thd older ones have without worrying about your searches bwing everyone's business. Install it to your browser via "developer mode" option. Fuck a search engine that can uses manual suboptimal handshake protocols like robots.txt (such as what you're advertising). This'll let you search the whole web w/ a backend.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13642771

>>13642733

Also, you can even add your own "nojs" filters to it if you want.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13642772

>>13642679

Also, run Hyphanet inside a Windows VM and use Linux VM as a proxy/firewall/router. Set up proxy software (Tor, I2P, SOCKS5, VPN) on Linux and force all traffic from Windows VM through it. That way your progress will be saved behind a VM safely.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13642773

>>13642772

But as always, use custom proxies. Don't rely on preexisting infrastructure because none is trustworthy.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13642774

>>13642773

I was only using Tor/I2P/VPN and stuff as an example. You don't have to use that and in fact, shouldn't. Don't use no VPN.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

7b8b1c No.13642803

>>13640738

Daily reminder: If you pay more taxes than you get returns you are literally a slave by definition. You are working for free to tyrants that force you through sheer threats of violence.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13642834

File: 711e7a522c13baf⋯.png (177.09 KB,650x650,1:1,icecat.png)

>has LibreJS so you can safely use javascript without having to resort to '90s-era neocities websites

>lets you access cloudflare websites like 4chan without the MITM rape

>is FLOSS and not pooprietary horseshit like regular Firefox is now

Why not install Gentoo you flaming homosexuals?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

55166b No.13642869

>>13642834

What is the mathematically optimal way to sustain privacy online?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

5e9003 No.13642872

This could easily be a business venture, though you would need a diversity hire to be the figurehead otherwise mossad will weak havoc on your business like they did on 9/11

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13642877

>>13642873

>>13642873

The only realistic way to stay anonymous online is if you had a way to use passive reflection or signal mirroring via demodulation of another device (say a Zebra scanner because they use analog resistive touchscreens) and mirrored that onto a homemade device that you built from scratch. For making the touchscreen, use gorilla glass for the top sheet, apply silver conductive paint to the bottom of it, use a PET sheet with silver conductive paint underneath it for the bottom layer, make your circuit board out of epoxy-hardened mother's day cards stacked in multiple layers, stencil out your circuitry in pen ink, cover with thin layers of aluminum foil, epoxied in place using thin layers of conductice epoxy, then draw next to your schematic on both sides with pencil graphite and you made your touchscreen board. Mount the touchscreen on a separate frame and the board inside the phone case (made from epoxy-hardened cardstock), then use a secondary board made of stiffened cardstock but use copper tape instead of graphite/foil, lift a battery from an electric screwdriver, lift a USB charger port from a burner phone, connect the touchscreen board to the phone board via Through-Hole Vias and Flexible flat cable so that the wires will conduct through the front of the board to the other board, making sire that the copper wire doesn't touch the foil so as to prevent it from short circuiting (do this first and go over the dots in graphite carefully) so now your phone board and touchscreen board are wired together. Then use a transistorless graphene processor made by wrapping scotch tape on graphite from a pencil (one pencil should be more than enough for this purpose) and wire a pieszoelectric buzzer from a cheap digital watch to the phone board to allow analog programming. Then adapt it for 3.7v electric screwdriver li-ion/li-po battery and lift a charger port (say, type c) from another phone, and make a loop antenna to capture geosynchronous satellite for the internet connection for a satellite phone type setup. Use some rubber bands for the buttons w/ a chip bag wrap over it and foil underneath both buttons for the on/off, using analog schematics to simulate a volume up/down and power on/off that'll be synchronized with the phone, so when you press down on it, it'll tap the two foil plates together and jack the volume, using conductive epoxy and other pieces of stiffened cardstock as spacers to allow up and down movement, wire the volume buttons to an appropriate sized razor blade w/ a small earphone magnet at the front and a strip of insulative rubber band epoxied on the bottom w/ a layer of foil epoxied over it so you can connect your wires via soldering them (+/-) and epoxy it to the bottom of your case w/ holes poked through the stiffened cardstock case for the homemade speaker to emit through, and epoxy the volume and power foil sheet cardstock substrate next to the buttons to the inside of the case, and now you finished your phone.

For "programming" it, take a CRT display box tv, a RF modulator and RCA antenna and tune your receiver until you see someone's Zebra scanner android screen pop up on the TV screen using type c port to trs connector adaptor you made so it'll be connected to listen in, and the pieszoelectric buzzer should demodulate the signal onto the phone using a drawn demodulator circuit on the board. Then you make another board for the antenna and draw an envelope detector circuit w/ diode, resistor, capacitor and another pieszoelectric buzzer so you can access geosynchronous satellite internet via RF signal after mirroring the Android device's RF leakage and now you have a parasitic device that instead of recording, is interactive via touch input and uses analog as a frontend, but digital as a backend.

For making the chip, use hollowed out plexiglass (either hollowed out chip when you bought it or made w/ a screw and powerful electric screwdriver going in 1/3 the way and fill in some acetone to eat it for 30 minutes to an hour and dig out gel with a copper wire, clean out with water and cotton swap and fill in your graphene paste made with the graphene you collected from pencil lead earlier using scotch tape mixed with a drop of isopropyl alcohol or conductive epoxy and impregnated inside the plexiglass substrate via syringe, covering up the hole with epoxy and drill four holes on the bottom w/ screw and electric screwdriver, line them up with the holes in your circuit board (THVs) and solder in place for adding enough power to your circuit to connect the device to internet (it'll be transistorless).

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13642878

>>13642877

Scientists have been proposing analog circuits as an alternative to digital/quantum even to circumvent Moore's Law entirely because it it mimicks real life which isn't ran on digital code (which I'm referring to regular digital, althouhh it simulates real life in that it's a simulation, but quantum simulation is different from digital; it's basically a ghost device). That's the only 100% safe way to both have a corporate-free smartpone from a trusted source, not have to worry about updating it through hardware generations via Moore's Law and be safe at the same time by impersonating another device. Now you have s corporate-free phone!

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

5412cc No.13642887

Why go through all the trouble? You might as well communicate and organize face to face than worry about privacy online. Tracking someone over the internet is stupidly easier than in person, and whatever list you are scared you might be on, you're already on it. You could make this into a wiki though, instead of a board post which will be lost to time.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e15827 No.13642892

>>13642878

>>13642877

Made an error, it is legal to buy blank chips, but it's not legal to have ghost SIMs and even when you do finish programming your device, it stilll has to be licensed by the FCC. Micro Center sells blank chips.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.



[Return][Go to top][Catalog][Nerve Center][Random][Post a Reply]
Delete Post [ ]
[]
[ / / / / / / / / / / / / / ] [ r8k / ck / wooo / fit / random / doomer / f1 / foodism / harmony / lathe / lewd / warroom / wtp ]