[ / / / / / / / / / / / / ] [ r8k / ck / wooo / fit / random / aus / fiobr / fringe / htg / lumidor / pol / random / wtp ]

/pol/ - Politically Incorrect

Politics, news, happenings, current events

Name
Email
Subject
REC
STOP
Comment *
File
Password (Randomized for file and post deletion; you may also set your own.)
Archive
* = required field[▶Show post options & limits]
Confused? See the FAQ.
Embed
(replaces files and can be used instead)
Options

Allowed file types:jpg, jpeg, gif, png, webp,webm, mp4, mov, pdf
Max filesize is16 MB.
Max image dimensions are15000 x15000.
You may upload4 per post.


Please report any posts you feel may break the rules.

YouTube embed. Click thumbnail to play.

fbb0b2 No.13651589

California's Digital Age Assurance Act (AB 1043), signed in October 2025, requires all operating system providers (Windows, macOS, Android, iOS, Linux) to implement user age verification during device setup, effective January 1, 2027. The law mandates collecting user age data and transmitting an 'age signal' to apps to restrict content for minors.

https://www.yahoo.com/news/articles/california-law-operating-systems-ask-163009783.html

Why is no one talking about this?

____________________________
Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

000000 No.13651590

Anybody know where I can find msh_45?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

3f3884 No.13651616

>>13651589

we HAVE been talking about this, just not here. We've been talking about it on 4 chins for like a week. Nobody talks about it here because the traffic is so slow. I mean, I'm not trying to discourage Anons from posting here, I'm just saying. Also, I think that one of the issues is quality threads. Quality OP's attract anons because the OP explained the fucking idea he was trying to get across, rather than just a low effort quick post of concern screaming into the void like you did.

You do have a link.

No archive.

your gay little concern that nobody is talking about this on this board.

Whatever dude.

I agree, its a big issue and I have looked into it.

I just don't feel like talking about it right now. I just feel like chastising you for making shit OPs.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

b84eb2 No.13651620

>>13651616

Install Gentoo, winfaggot.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

b84eb2 No.13651622

>>13651620

Compiled from source, not a binary distro like Arch. Can run properly on RISC-V even when hardened on stripped proprietary packages. Unlike Guix system. Parabola, Hyperbora and Trisqiel can't even run on RISC-V! Get a MilkV or lowRISC/openTITAN SBC w/ USB and Modos paper display monitor.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

b84eb2 No.13651624

>>13651622

Give it a Keyboardio keyboard and/or Ploopy mouse kit.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

b84eb2 No.13651626

>>13651624

Get a ARM stripped of proprietary firmware Olinuxino board or a RISC-V Banana Pi BPI RV2 open 802.11 IP over DHCP router that you can plug into your default ISP router for secure connections. Run iptables, firejail, clamav, rkhunter, kvm/qemu, pyshark, your web browser being either GNU Ice Cat w/ LibreJS or ELinks (a terminal browser used for scouring geocities and wiby.me type sites) or GNUNet and a custom SOCKS5 proxy using X25519, Poly1305, ChaCha20 and Kyber for post-quantum protection, and practice OPSEC w/ passwords, including a USB flash drive (open hardware only) w/ KeePassXC password (or BitWarden or masterpassword.app), using xkpasswd.net for generating passwords for self-hosted emails (using VPS; please do not use your own homeserver for this).

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

3f3884 No.13651630

>>13651620

no.

I use a different systemd-free distro

and I'm not telling which one.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

b84eb2 No.13651636

>>13651630

Add an additional MilkV or lowRISC/OpenTITAN board for llama.cpp for network traffic analysis that's automated and shuts out any suspicious traffic.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

b84eb2 No.13651637

>>13651636

And as a coup de grace to California's AB 1043, give it USBguard.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

2d4545 No.13651669

>>13651589

>Why is no one talking about this?

It's all happening so fast, is anything being done about all of this?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

2d4545 No.13651674

>>13651630

>and I'm not telling which one.

I bet you someone is already making presentations to governments and law-makers and they will find a way to ruin it for everyone. Government envy is real.

There was an interview on youtube and they asked a politician if the fake safety laws were actually about online anonymity and they said yes of course.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

3b1712 No.13651679

>>13651674

The politician just confirmed what we already knew.

but why install gentoo?

I'm not going to go through the clusterfuck of doing that knowing that if I get one little thing wrong - one accidental typo - that the shit won't work and I just spent three hours for nothing.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

926ae4 No.13651792

>>13651679

Look through their wiki. It'll teach you how to use it.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

926ae4 No.13651793

>>13651792

Also, if you want it more user-friendly, use Wayland (like Sway over Gentoo).

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

000000 No.13651794

>>13651793

this anon is a fag, xlibre is more user-friendly

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

926ae4 No.13651795

>>13651626

Oh, and also, if you're using Olinuxino, give it an ath9k PCIe.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

22176d No.13651827

How long will you keep running? They will present you shit and then fuck it up.

It's over.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

000000 No.13651890

>>13651616

I am stuck posting here since Leto closed the paygate on -ecker (the eternal faggot, and to think I was calling him based every chance I got…).

I always recommend Qubes OS for your daily driving needs. It is more than adequate to stop all the corporate spyware comes along with software you might still depend on. Installing Windows [Server 2022] was mostly a breeze for me, but it is by no means 'turnkey' to set up a Windows template. You need Qubes Windows Tools (strongly, strongly recommended), and you need to author a powershell script and schedule it to run periodically (60-90 sec). The script will query qubesdb (from QWT) for adapter configuration, compare the qubesdb results to the active configuration in Windows, and if mismatched then change Windows' adapter config. This script is necessary for me to make appvms from the template get the correct IP configuration.

I do suggest first setting up Windows Server with WSUS + DNS, clean-room (no cloning to create it). Do not ever bring the templatevm onto the internet at any point. When you install WSUS on the templatevm, you need to move WSUS configuration and storage to Q: or the rest of this won't work. Once you have WS with QWT, WSUS, and a network adapter configuring script, then shut it down, create a firewall qube that goes nowhere (no real internet), connect the templatevm to it in the qube settings, bring up the templatevm once so the Xen network adapter drivers complete (trust me, do this), bring the templatevm down, and set its network back to none again. Then you will create an appvm with its template setting pointed at the templatevm, that also has a netvm assigned and disposable_template enabled, and you will create a disposablevm with netvm none which points to your appvm as its template. Pretending you already have existing Windows templates other than this WSUS, here's how you perform Windows Updates:

Bring up the WSUS appvm,

Have WSUS pull all available updates from Microsoft,

Bring down the WSUS appvm,

Bring up the WSUS disposablevm,

Bring up all Windows templatevms you want to Windows Update and set their netvms to the WSUS disposablevm,

Update your templatevms,

Bring down your templatevms and set their netvms to none,

Bring down your WSUS disposablevm.

Doing Windows Updates this way should ensure a one-way direction, no telemetry escape even through the WSUS server collecting statistics; if WSUS reports in telemetry the number of clients it's updating each time it pulls updates, it should always be 0 as the WSUS disposablevm instance is entirely ephemeral and you never ever update templatevms from the WSUS appvm or WSUS templatevm.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

000000 No.13651892

>>13651890

I cannot upload screenshots here, because the Epstein class wants to ensure 'p is a glownigger weapon of legal website destruction, but trust me I have all kinds of warez I enjoy installed in one of a few Windows templatevms, and I can spin up offline ephemeral disposables of it to my heart's content.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

000000 No.13651893

>>13651890

>templatevm

>appvm

>disposablevm

>wtf is this shit Jim?

Qubes have two areas of storage: root and private. In Windows, this is C: and Q: drives.

TemplateVMs have no template, and have mutable root and mutable private.

AppVMs have a template, and have an immutable root (TemplateVM's) and ephemeral private.

DisposableVMs have a template (strictly AppVMs with disposable_template enabled), and have ephemeral root (TemplateVM's) and ephemeral private (AppVM's).

Then there are StandaloneVMs, which are basically analogous to what you've seen in VMWare/VirtualBox/Hyper-V.

Netvm is a property which you point at AppVM or DisposableVM qubes which has the provides network option enabled.

Pretty simple, huh?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

000000 No.13651894

>>13651890

>>13651893 (<- REVISION TO)

>templatevm

>appvm

>disposablevm

>wtf is this shit Jim?

Qubes have two areas of storage: root and private. In Windows, this is C: and Q: drives.

TemplateVMs have no template, and have mutable root and mutable private.

AppVMs have a template, and have an *ephemeral root (TemplateVM's) and *mutable private.

DisposableVMs have a template (strictly AppVMs with disposable_template enabled), and have ephemeral root (TemplateVM's) and ephemeral private (AppVM's).

Then there are StandaloneVMs, which are basically analogous to what you've seen in VMWare/VirtualBox/Hyper-V.

Netvm is a property which you point at AppVM or DisposableVM qubes which has the provides network option enabled.

Pretty simple, huh?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

000000 No.13651895

>>13651893

Delete this, it's wrong.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

e1d357 No.13651944

File: 6e63f3067aa5cec⋯.jpg (117.22 KB,1080x1131,360:377,14.jpg)

Not in Cali, but I'd just make up some info. Me so smart! Honestly, I'm probably just going to quit using technology. Ted was right all along…

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

000000 No.13651946

>>13651894

fixnet.ps1:


$newipAddress = (c:windowssystem32qubesdb-cmd.exe -c read /qubes-ip).Trim()
$newgateway = (c:windowssystem32qubesdb-cmd.exe -c read /qubes-gateway).Trim()
$newdns1 = (c:windowssystem32qubesdb-cmd.exe -c read /qubes-primary-dns).Trim()
$newdns2 = (c:windowssystem32qubesdb-cmd.exe -c read /qubes-secondary-dns).Trim()
$newdnsServers = @($newdns1, $newdns2)
$macAddress = (c:windowssystem32qubesdb-cmd.exe -c read /qubes-mac).Trim()
$macAddressDash = $macAddress.Replace(":", "-")
# Check if an adapter with the specified MAC address exists
$adapter = Get-WmiObject -Class Win32_NetworkAdapter | Where-Object { $_.MACAddress -eq $macAddress }
$config = Get-WmiObject -Class Win32_NetworkAdapterConfiguration | Where-Object { $_.MACAddress -eq $macAddress }
Write-Host "Check for adapter."
if ($adapter) {
# Get current IP configuration
$currentipAddresses = (Get-NetIPAddress -InterfaceIndex $adapter.InterfaceIndex).IPAddress
# Get current gateway configuration
$currentgateways = $config.DefaultIPGateway
# Get current DNS configuration
$currentdnsServers = (Get-DnsClientServerAddress -InterfaceIndex $adapter.InterfaceIndex).ServerAddresses
if ($newipAddress -ne $currentipAddresses -or $newgateway -ne $currentgateways) {
Write-Host "Address mismatch found."
Disable-NetAdapterBinding -Name $adapter.NetConnectionID -ComponentID ms_tcpip6
Set-NetIPInterface -InterfaceIndex $adapter.InterfaceIndex -Dhcp Disabled
# Remove existing IP addresses
foreach ($ip in $currentipAddresses) {
Remove-NetIPAddress -InterfaceIndex $adapter.InterfaceIndex -IPAddress $ip -Confirm:$false
}
# Set the IP address and subnet mask using WMI methods
$config.EnableStatic($newipAddress, "255.255.255.0")
# Set the default gateway using WMI methods
$config.SetGateways($newgateway)
}
Write-Host "Setting DNS servers."
# Set the DNS servers using WMI methods
$config.SetDNSServerSearchOrder($newdnsServers)
}
# Exit cleanly
Write-Host "Script execution completed."

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

000000 No.13651947

>>13651894

fixnet.ps1 needs to be on a minutely schedule.

This one below is run-once after you've installed QWT, so it can put qvm-copy in the Send To context submenu:

fixsendto.ps1:


# Define paths
$adminSendToPath = "$env:SystemDriveUsersAdministratorAppDataRoamingMicrosoftWindowsSendTo"
$userSendToPath = "C:UsersUserAppDataRoamingMicrosoftWindowsSendTo"
# Ensure the user's SendTo directory exists
if (-Not (Test-Path -Path $userSendToPath)) {
New-Item -ItemType Directory -Path $userSendToPath
}
# Get all items in Administrator's SendTo folder
$adminItems = Get-ChildItem -Path $adminSendToPath
foreach ($item in $adminItems) {
# Define the path for the copied item
$destinationPath = Join-Path -Path $userSendToPath -ChildPath $item.Name
# Copy the item to the user's SendTo folder
Copy-Item -Path $item.FullName -Destination $destinationPath -Force
# Set NTFS ownership to the specified user
$acl = Get-Acl -Path $destinationPath
$user = New-Object System.Security.Principal.NTAccount("User")
$accessRule = New-Object System.Security.AccessControl.FileSystemAccessRule($user, "FullControl", "Allow")
$acl.SetOwner($user)
Set-Acl -Path $destinationPath -AclObject $acl
}
Write-Output "Items have been copied and ownership has been set."

fixnet.ps1 needs to be in the TemplateVM, and fixsendto.ps1 needs to be run only once in the TemplateVM after installing Qubes Windows Tools.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

000000 No.13651948

Being a Tor poster, I cannot create threads.

If anyone wants me to outline how I set Qubes OS up, make a new thread for me to dump into here.

Thank you for your time.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.



[Return][Go to top][Catalog][Nerve Center][Random][Post a Reply]
Delete Post [ ]
[]
[ / / / / / / / / / / / / ] [ r8k / ck / wooo / fit / random / aus / fiobr / fringe / htg / lumidor / pol / random / wtp ]