[ / / / / / / / / / / / / / ] [ dir / animu / asmr / rel / strek / sw / travis2k / vore / zoo ][Options][ watchlist ]

/tech/ - Technology

You can now write text to your AI-generated image at https://aiproto.com It is currently free to use for Proto members.
Name
Email
Subject
Comment *
File
Select/drop/paste files here
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

File (hide): 6236293d12e532f⋯.jpg (79.45 KB, 918x574, 459:287, gnu Ring.jpg) (h) (u)

[–]

 No.863876>>863889 >>863894 >>863926 >>863935 >>864135 >>864387 >>866753 >>876342 >>876547 >>876934 >>877764 >>886585 [Watch Thread][Show All Posts]

Now that TOX development is basically dead, can we talk about other secure and Libre Voice+Video programs.

The front-runner appears to be GNU Ring, it's a very professional program that was adopted as an official part of GNU.

It has features like group voice (and video) chat and not to mention voice and video on mobile clients; both things that Tox lacks. It can also do full-blown VOIP+SIP, but that's optional.

What has your experience with it been?

GNU Ring: https://ring.cx/

Other Viable Messaging Clients: https://prism-break.org/en/all/#video-voice

 No.863886>>864135 >>876934

development is slow, but tox works for me


 No.863889>>864070 >>864075

>>863876 (OP)

>GNU Ring: https://ring.cx/

>refuses to work without mic permission

shit tier


 No.863890>>863896 >>863914 >>863937 >>863982 >>864135 >>896597

Reminder TOX was never secure and leaked your ip to anyone you communicated with


 No.863894

>>863876 (OP)

>Mac OSX

>Not using Facetime/iMessage.


 No.863896>>863908 >>863916 >>876321

>>863890

That's how peer to peer works you dumb fuck. You can see the IP of everyone connected on BitTorrent downloads, does that mean BT is insecure?


 No.863908>>863911 >>888161

>>863896

>That's how peer to peer works you dumb fuck

No it isn't, your information CANNOT be encrypted and exposed at the same time.


 No.863911

>>863908

Yes it is. The content of your conversations is encrypted. If you want to obfuscate your address too use it through a network or service that does that.


 No.863914

>>863890

WHAT THE FUGG IS TOR :--_DDDDDD


 No.863916>>863921 >>863923 >>863987 >>864001 >>864081 >>888096

>>863896

>That's how peer to peer works you dumb fuck

Not necessarily. I2P, for instance, won't show you the IPs of your peers.


 No.863921

>>863916

It does expose the addresses of the peers you connect to directly. That's how you connect to the network. Same as you have to know the address of your tor entry node, and vice versa.


 No.863923

>>863916

Then netstat will give it to you, retard.


 No.863926>>863931 >>866819

File (hide): 077fea3c835b675⋯.jpg (192.05 KB, 857x1134, 857:1134, 077fea3c835b67530e86aa70ba….jpg) (h) (u)

>>863876 (OP)

Riot was the closest thing to getting my friends to get the fuck off of Discord, but it's too early days because it lacks a decent UI. When we'd tried it, you'd jump into a call and you couldn't even tell who was in it. qTox won second place for being a piece of shit that worked but crashed the moment you left the call. One of these days, these programs are going to come within spitting distance of the big botnet shit and I'll be released from my never ending torment, but unfortunately, Group Voice is one of the hardest problems to tackle.


 No.863931>>863989 >>864039

>>863926

What about Mumble?


 No.863935>>864135

>>863876 (OP)

>Tox is dead

https://github.com/qTox/qTox/commits/master

>1 day ago

>1 day ago

>5 days ago

>7 days ago


 No.863937>>863944

>>863890

Daily reminder that your IP is being leaked to 8chan. Daily reminder that your IP is being leaked to your proxy provider. Daily reminder your IP is being leaked to the tor node.


 No.863944>>863960

>>863937

Holy shit! Big if true, abandon the internet, everyone, it's insecure!

I'm starting to wonder how anyone survived using the net when literally everything leaked your IP address to everyone you interacted with.


 No.863960

>>863944

> when literally everything leaked your IP address

Literally everything does leak your IP to every computer yours interacts with.


 No.863982>>864135

>>863890

>Reminder TOX was never secure and leaked your ip to anyone you communicated with

Reminder that privacy, security, and anonymity are 3 different things. Tox never claimed to hide your IP address when not run through Tor.

You are a fucking idiot.


 No.863984

Matrix/Riot


 No.863987

>>863916

You're still sending packets to a node. Of all the p2p protocols, i2p actually isn't too dissimilar to Tor in some respects. Obviously, garlic routing was inspired by onion routing; it's also the thing that distinguishes i2p from other protocols, ironically. You're still leaking your IP address to the nodes that you upload to and download from; it's just that your identity is obfuscated by the nodes that come thereafter--at least, as I understand it. So you don't leak your IP address to the intended recipient. And that's basically the same for all anonymizing p2p protocols and certainly true for the other ones; it's just that your identity is obscured in different ways.


 No.863989>>863996 >>867942

>>863931

Never used it myself, but from the complaints I've read, it takes some effort to get it setup properly. Works excellently once it's set up, ostensibly, but the learning curve makes it pretty inaccessible.

One non-libre complaint I have with Discord that I scold people who use and endorse Discord for is the fact that Discord has no support for people with disabilities. Combined with the fact that it's proprietary and the team hasn't even expressed an interest in addressing that issue, it's safe to conclude that Discord hates cripples and should be avoided, not to boycott or chastise Discord but simply because, well, it's inaccessible to crippled people and thus will never be a good universal standard.


 No.863996>>864004

>>863989

+ botnet data miner


 No.864001>>876939

>>863916

> I2P, for instance, won't show you the IPs of your peers.

I2P leaks your IP to every routing peer you connect to.


 No.864004

>>863996

I think you might be thinking of Kovri, the Monero-integrated fork of the fully-functioning C++ implementation of the i2p protocol.


 No.864039>>866801

>>863931

The requirements that my friends need to move over include

>Being able to see who's in chat before jumping in

>Both (Multi-user) VOIP and text chat

>Decent echo cancellation (all my friends hate headphones)

We used mumble for a bit but it infringed on the first and last. We need something either mimicking Skype or Discord, where Mumble exists in a completely separate niche.


 No.864070>>864245

>>863889

>refuses to work without mic permission

What are you, a phone user?


 No.864075>>864245

>>863889

How dare a voice chat app require mic permissions.


 No.864081>>864087

File (hide): e990cd4256e1bca⋯.png (110.35 KB, 625x773, 625:773, Brainlet9.png) (h) (u)

>>863916

>guy thinks he can connect to other hosts without trading IP addresses

Are you actually Indian? lol.


 No.864087>>864090 >>864098 >>876643

>>864081

You can its called IP spoofing. You can do it in c without too much work on UDP packets for example. Its just hard to complete a handshake protocol without them being able to respond to you.


 No.864090>>864092

>>864087

How do you call the transfer of misleading information as a connection? If your IP is spoofed, the traffic isn't going to return to to you.


 No.864092>>864094 >>864098

>>864090

Not all traffic has to be bidirectional. UDP does not even have a "connection". You could send a packet to someone that says "send this to this other person" with them having no idea who you are.


 No.864094>>864097

>>864092

That kind of signalling is meaningless. It's also known as spam.


 No.864097>>864104

>>864094

>Can build a protocol on

>Is spam

uh okay


 No.864098>>864099

>>864087

This inane shitposting has to be some turbo sperg's idea of a troll

>>864092

You can't do broad-range broadcast on IP retard, you'd have to establish those connections individually.

Good luck transferring any data that way.


 No.864099>>864105

>>864098

>IP

>Connection

IP is connectionless

>Good luck transferring any data that way.

Yea you just send it to the person and it gets to them not hard.


 No.864104>>864109

>>864097

Network signals only have meaning when traffic goes to legitimate destinations. Having unsolicited signals is not a connection. IP spoofing has no meaning beyond sending spam to addresses that didn't ask for it.


 No.864105>>864106

>>864099

>"hello postman, I want to send my friend a letter"

>"no, I don't have their address"


 No.864106>>864107

>>864105

You can send your friend a letter there is just no return address. People do this all the time with mail.


 No.864107>>864111

>>864106

>"hello postman, I want to send my friend a reply to his letter he sent me"

>"no, he didn't leave a return address"


 No.864109>>888163 >>896805

>>864104

The destination is legitimate.

>Having unsolicited signals is not a connection

Its a packet not a connection this is not TCP

>IP spoofing has no meaning

Only in the same way that mail not having a return address has no meaning. The mail still has content.

>that didn't ask for it.

Your machine gets random connections from machines using non spoofed IPs 24/7 already


 No.864111>>864120

>>864107

You open up the letter and it says:

PGP SIGNED ... hey bob send this to jim .. END PGP

Looks like we just found a meaningful protocol


 No.864112>>864182 >>864197 >>866801

File (hide): 6a20947ae6a3a92⋯.png (93.37 KB, 660x531, 220:177, AvariceAttacks13.png) (h) (u)

File (hide): f5b5f01fdd3323d⋯.png (103.68 KB, 660x531, 220:177, AvariceAttacks10.png) (h) (u)

There is a current DoS running amok on Tox.

The way that the protocol is designed, all you have to do is separate one of the participants from two of the people in the chat group, and they are effectively DoS'd from a chat group. This can be done by either fighting with a group bot's topic protection ten or so times a second, or by sending invalid data to the target user's ID (which isn't hard to find in group chat). This is also known to DoS them from the entire network. This attack also works over Tor, since all you need is the ID.

This is being used to great effect in Club Cyberia. Pics related. The devs do not care about this exploit, because it would take a redesign of the protocol to fix.

Do not use Tox with people you are not 100% trusting.


 No.864120>>864122

>>864111

That's what we have, retard.


 No.864122>>864125 >>896842

>>864120

Except that it currently leaks your IP


 No.864124

whats wrong with jitsi


 No.864125>>864127

>>864122

It is impossible to have communications without a return address.


 No.864127>>864140 >>896805

>>864125

Yea people cant send letters without return addresses thats obviously impossible


 No.864135>>864137 >>866753 >>896841

File (hide): 100c42af75f8f13⋯.jpg (170.66 KB, 1000x1000, 1:1, TheAbsoluteStateOfTox.jpg) (h) (u)


 No.864137

>>864135

tox.me is a shitty name system not even a part of tox anymore


 No.864140

>>864127

talking 1 way isn't communication.


 No.864142>>864143

It does not matter if it is "communication" or not. I can push data to a place I want to without leaking my IP to the destination. There are many many legitimate uses for this.


 No.864143>>864145

>>864142

...And a chat program is not one of them. Neck yourself.


 No.864145>>864146

>>864143

Wrong. A group chat can be done in a ring topology where you send the message to the next guy and get a message from someone you don't have the IP of. In fact tox is in a ring topology.


 No.864146>>864147 >>864149

>>864145

explain how a ring topology can protect both users in a 2 person chat.


 No.864147>>864150

>>864146

Why does communication have to be limited to two people? What a limited mind.


 No.864149

>>864146

You can send messages on one IP / computer and receive messages on a second computer / IP.


 No.864150>>864151

>>864147

ok so a 3rd party intermediary bot. Cool. How can you trust that bot?


 No.864151>>864153

>>864150

Intermediary bot? I just meant a ring with 3 people.

>How can you trust that bot?

You don't have to if you spoof your IP


 No.864153>>864154

>>864151

>spoof your IP

>bot sends reply to fake IP

>convo dies

real clever bud.


 No.864154>>864210

>>864153

You don't need a conversation to communicate things


 No.864182>>864228 >>876872

>>864112

Hello Anon :^)


 No.864197>>864228 >>876872

>>864112

I'm glad you got out of prison, Anon. How was "vacation"?


 No.864210>>864216

>>864154

Tox which is a general purpose chat system doesn't work the way you say things should work. Tox is a 2+ person chat system. At least one person sends a message and the other person receives it. If any of those people are spoofing IP addresses, then the message can never be sent to where it needs to go.


 No.864216>>864218 >>864393

>>864210

how did these tox dev retards not think to address this by now? (inb4 just use tor xd)


 No.864218

>>864216

The Tox developers don't need to fix IP spoofing. It is not a problem at all that Tox leaks your IP address.


 No.864228>>864309

File (hide): e2d824f6d097adc⋯.jpg (55.39 KB, 600x448, 75:56, Arguing With Avarice.jpg) (h) (u)

>>864197

>>864182

> Not denying protocol exploit exists.

> Not denying pic related.


 No.864232

I wonder how it must feel to work at GNU making a messenger so shitty and unwanted that the only way you can try to shill it is posting inane nonsense about Tox.


 No.864245>>864256

>>864070

I were talking about the Android version.

>>864075

It shouldn't require it if I only wanted to use text-based features.

>what is graceful degradation?

>what is defense in depth?

it's a shame that this level of underhandedness is going from GNU, I'd expect them to make software that is actually good…


 No.864256

>>864245

The mistake you're making is the fact all software is final and that the current state represents the ultimate will of the developer for the program. Shame on you for making such a hasty assumption.


 No.864309


 No.864313>>896572

surprised no one answered with wire private messenger, it's pretty acceptable and has an active development


 No.864339>>864391

> Depends om google play services

Dropped


 No.864387

>>863876 (OP)

>ring

Lets talk about more stable alternatives

https://wire.com/en/

https://about.riot.im/


 No.864388

Last time i tried Ring, it didnt have file transfer, making it perfectly useless for collaboration.


 No.864391

>>864339

It's on F-droid. Stop spreading FUD, shill.


 No.864393

>>864216

>I was just pretending to be retarded.

Bad news anon, every single website you visit has your IP.

Even those Garry Fortress 2 servers your autistic ass plays.


 No.864418>>864431 >>864436 >>868189 >>876875

File (hide): f089b9777b0fd87⋯.png (29.35 KB, 300x309, 100:103, 1438702586598.png) (h) (u)

OPs post wasnt even about tox. Is EVERY chat program thread going to become about the nature of p2p?

Is this a government psyop or just a meme that trolls me every time?

WHY DOES THIS KEEP HAPPENING. Tox and the LEEK UR EYE PEE meme was 5 fucking years ago people. What the fuck.


 No.864431>>876951 >>876953

>>864418

Something about the project just irresistibly attracts braindead retards. I don't know if it's NASA or what.

t. long time contributor and github issue closer

day after day after day of INTEGRATE MY BLOCKCHAIN XD I LOST MY ACCOUNT PLS RESET


 No.864436

>>864418

>Is this a government psyop or just a meme that trolls me every time?

I feel just the same brother


 No.864439>>864446

>Tox

>Matrix

>Riot

>Ring

There are many ways to video chat privately. If you're not doing it already it's because you don't really care about it or because you don't have anyone to talk to.

Either wat this thread is useless and irrelevant. Sage.


 No.864446>>866753

>>864439

I could be wrong but i think ring is the only one that does p2p multichat video.

riot is an implementation of matrix, dont know why you have them listed separately.


 No.864477

Post your ring ID.


 No.866753>>866811

>>863876 (OP)

>requires gtk3 AND qt5 installed

>no jessie support

>developed by literal trannies

Just use Tox or Ricochet. Or XMPP, if you want to convert normies. It has a nice mobile client.

>>864135

You keep posting this pic in every thread. You are still wrong.

>>864446

>wasting bandwidth on pictures of some neckbeard in his room

>wasting six times as much bandwidth on pictures of six different neckbeards in their room

Video chat is a meme.


 No.866801>>866802

>GNU RIng

>essentially no attempt to be secure

Actual options with working groupchats+video/audio would be matrix/riot

>>864039

>>864112

>Someone is butthurt enough to DoS a 20+ user groupchat

Must be Kalynx or the arisuchan girl owner lol


 No.866802

>>866801

Riot has opt-out telemetry as well as stating that "the current encryption methods are experimental and not to be trusted". I'd rather trust Wire for privacy, but Riot does seem much better.


 No.866811

>>866753

> not using something because 'trannies'

Do you not use CPU's?

Does your computer run on something else?


 No.866819

>>863926

So you're one of those autists who won't stop sperging out over Discord?


 No.867942

>>863989

The complaints come from the fact Mumble has a big scary completely optional setup wizard on first run, that's only there to ensure you're not clipping over everyone else like a fucking retard or relying so heavily on automatic gain control that the mic picks up hard disk clicks from a room over. Things I see constantly from Discord/Skype/etc users.


 No.868095>>877695

File (hide): c6c0bb3036aaeda⋯.png (151.58 KB, 2000x2057, 2000:2057, 2000px-XMPP_logo.svg.png) (h) (u)


 No.868179>>868206

Why no mention of Keebase?

https://keybase.io/


 No.868189>>868631

>>864418

u mad?


 No.868206>>868214

>>868179

wowee just what we needed another fucking single-website web browser running on every computer

> Imagine a Slack for the whole world

no fucking thanks


 No.868214

>>868206

Suggestions?


 No.868246>>868576 >>868635

So matrix uses webrtc for calls, so there is a direct connection, which also leaks IP to chat members? Why than it's not able to transfer large files directly, complaining about server restrictions?


 No.868433

somebody please explain why SIP clients are dead in the water and nobody uses


 No.868576

>>868246

Matrix was founded and developed by a consortium of Telecomms companies. Pay close attention to all the buzzwords. They're trying to sell you something


 No.868631

>>868189

2010 called. They want u mad back.


 No.868635>>868636 >>868637

File (hide): 302dbdc2978b0b9⋯.png (218.71 KB, 1136x801, 1136:801, 2018-02-09--1518201396_113….png) (h) (u)

>>868246

serious question.

Are all peer to peer connections not supposed to use IP addresses?


 No.868636>>868639

>>868635

They could be like in i2p where you don't know IP of the machine that recives your data. But my qustion is why matrix has p2p connections and not able to send files directly.


 No.868637

>>868635

By design it 'leaks' ip addresses. This retarded concept that you can connect to others without giving your ip address likely comes from the same people who think that signal is secure. You either give your peer your address or you give to a centralized server its literally by design.


 No.868639>>868645 >>888168

>>868636

How would you connect two computers without one computer knowing the address of the other computer?


 No.868645>>868649

>>868639

They will know an address of each other, but it doesn't have to be an ip address. Like in tor/i2p, you know an ip of machine you are asking to be a proxy for you and this machine has no idea about what you are sending and who is final recipement.


 No.868649>>868651

File (hide): c9ee09e38eac3c7⋯.png (944.78 KB, 1905x2734, 1905:2734, How_NSA_access_was_built_i….png) (h) (u)

>>868645

>an address that is not an IP address.

got it. I'll put my top clowns on it.

> know an ip of machine you are asking to be a proxy for you

congrats, you reinvented the Server.

Welp im out. This is the state of /tech/.


 No.868651>>868653

>>868649

>congrats, you reinvented the Server

Its a little different when you are using multiple servers choosen from lots of others, changing them from time to time and being a server yourself so when you are sending something through the "server" it doesnt know if that is your message, or message from other guy you are transfering. So if you are really interested - RTFM i2p spec.


 No.868653>>868661

>>868651

>every program that uses the internet should incorporate i2p.


 No.868658>>868660

I'd use Ring but I can't get people to switch. They just want their Facebook, twitter, or steam messenger shit because that's all they know and everyone else uses it anyway so why bother trying to force them?


 No.868660

>>868658

Ring is unstable as fuck. If you want the attention of normies point them to Riot.im/Wire. They aren't as buggy and have clients for all platforms.


 No.868661>>868663

>>868653

I didn't say so. Thought it would've been nice to have more anonimity oriented programms which are not shit.


 No.868663>>868666 >>888171

>>868661

<trust your peer

>trust a server

Pick one and only one.


 No.868666>>868870

>>868663

Question is amount of trust and bandwich. Servers require more trust than a single peer if you're using lots of them at the same time. Servers are more limited shit, and also the point of break. So it's pretty much retarded to have p2p connections and restrict them to just calls.


 No.868739>>868752

>YOU MUST CHOOSE BETWEEN DIRECT CONNECTIONS AND SENDING ALL PACKETS THROUGH ZUCKERBERG

>ONLY OPTIONS

>what is onion/garlic routing

fuck this place


 No.868752>>868865

>>868739

>WAHHH I WISH ONION SERVERS WERENT SEVERS WAAAAA~


 No.868758>>868888

If you call someone in current year, you already trust that person on not recording your voice and sending it to NSA//FSB/Mossad to identify you, therefore there is no point in hiding your IP from them behind servers/proxies/onion routing.


 No.868776>>868788 >>868896 >>869188

Honestly, what's wrong with federation with end to end encryption? It's how the Internet works and has worked since forever before a few companies managed to centralize everything with obscene amounts of money and computing power. Full decentralization is complicated as all hell and more often than not it involves tradeoffs in usability, resources, security/privacy or a combination of all three.

>inb4 muh node is compromised by dangerous SJW

Then keep all the data in synch between server and client, it is not that hard. Fuck, you could even write it in a way none of the involved servers knew jack shit about you or your partner, or even without your partner knowing jack shit about you.

>Users have two passwords: the node account password (gets sent to the server; your everyday password) and your data file encryption password, which serves to keep secure your data even if uploaded to a server

>Server logs you in, retrieves your encrypted data file and sends it back to you as is

>Client decrypts your data file with your second password, checks the timestamp. If the timestamp is newer than the stored data file, attempt to merge the changes with the local data file. Upload the new data file with the new timestamp, regardless of changes

>Said data file contains both your public and private keys, used to identify you between networks. Extra security may be achieved through the use of another pubkey, this one not uploaded to the server, on top of that. Not the default to keep shit simple enough for normies. Maybe not the most aecure schema but still miles more secure than any other chat program.

>Your contacts list consists of a list of pubkeys with an associated name and addresses.

>Ask your server to open a "session" with each server that appears in your contact list. Said session consists on an encrypted connection between you and your friends' servers, with your server as a middleman. For extra security, this session may be quick to expire

>Contact each server on whether your friends' pubkeys are present and/or online. This is done periodically as a heartbeat in a high latency lane to avoid network correlation attacks: all heartbeat requests are batched and sent all at once every X seconds

>All your server knows is you have friends who have used some server at least once. All their server knows is a guy with session XYZ is online and asking for certain pubkeys

>You may introduce extra security by downloading chunks of logged in users whose pubkeys start with certain two chars

>Whenever you start a conversation, you ask your server for a low latency session with the other server. This is, of course, both encrypted between your server and theirs, and you and their server.

>Ask their server to get them a message delivered. This message is a handshake. If the user accepts the handshake, your friend asks for a another low latency session between them and your server, which sends a handshake in the other direction.

>Low latency sessions are kind of like heartbeat sessions, but much faster

>Once there is an IO, the end to end encrypted conversation starts.

>Identities are verified, then conversation proceeds normally

All your server knows is you are conversating with someone on the other server, but not whom. The other server does know there is someone conversating with your friend, but does not know who you are. You and your friend can verify your identities, even if you don't reveal them your IP. You can get your friends' pubkey first from an easy to remember nameserver and fuck, you could even use a single password for both login and decryption if you send the server your decryption password hashed via client. Not the most secure of schemas, but transparent as all hell for the user, and it could even be optional.


 No.868788


 No.868865

>>868752

>onion servers

I have taken the bait. Fuck my jimmies.


 No.868870

>>868666

>Onion servers are not servers

hahahahaha


 No.868888

>>868758

You could use speach to text to speach.


 No.868896

>>868776

So a single guy/organisation could just run most of the servers and if you'll use your own server there will be almost no users on it and it will be very easy to find out thats you.


 No.869188

>>868776

Every federated system I know ties your identity to the server. The server own has full control over your communicates (obviously they cant read them or forge them). You cannot migrate between servers and are trapped with the host you picked initially. If you could migrate between federated servers it might be better. But as long as I have to depend on some asshole keeping their server up forever I wont trust it.


 No.876252>>876277 >>876316

File (hide): c4a921e43fc651f⋯.png (52.12 KB, 635x523, 635:523, Nl8Wj9y.png) (h) (u)

Anyone have any luck with the name service? I can't change my account settings after making an account with it enabled.

Also not sure how they keep my private keys secure... does this mean that they can masquerade as me if I use the name service?


 No.876277>>876305

>>876252

>Also not sure how they keep my private keys secure... does this mean that they can masquerade as me if I use the name service?

Your private key never leaves your possession. The name service just provides a DNS listing that returns your tox ID, so your lazy normalfaggot friends can type anon@sucks.cocks instead of pasting in your tox ID.


 No.876305>>876317

>>876277

>tox ID

But whenever I log into a Ring Client, not only it's the .crt certificate there, but also my. key


 No.876316

>>876252

>does this mean that they can masquerade

Anyone you have added already they will not be able to impersonate you because you have already exchanged keys. Anyone else that adds the name though after the DNS has been compromised could pretend to be you but under a different ID.


 No.876317


 No.876321

>>863896

oh shidd :-DDDD


 No.876342>>876360 >>876372

>>863876 (OP)

How exactly do you setup group chats in Ring? I tried the dragging thing but it didn't work.


 No.876360

>>876342

What platform are you on?


 No.876372

>>876342

The GNOME client is bugged. You need to start a conference call, drag the users you want to it, and then you can use the chat feature in a group.


 No.876530>>876541

>source still being actively worked on as of this week

>somehow "basically dead"

The problem with faggots like you is that you assume that a mature project needs a bunch of commits every day. It's a Poetteringism.


 No.876541>>876639 >>876851

>>876530

>No new features in qtox nor utox in several months.

>No group voice or video

>Android Client STILL crashes if you attempt a voice or video call

Dead Project.


 No.876547>>876558

>>863876 (OP)

I use RetroShare, post your certificates everyone


 No.876558

>>876547

I'd like to add that GNU Ring is also certificate+key driven :^)


 No.876639>>876791

>>876541

<muh ever increasing list of features

<android isn't a disaster anyway

bloat and crapware, werx on my machine


 No.876643>>876651

>>864087

anon I bet you frequently forget to pull your pants down before taking a dump


 No.876651

>>876643

>I don't understand how networking protocols work but you are the retard!


 No.876791>>877011

>>876639

>wants text only

>whining about bloat

Use IRC+SSL


 No.876851>>876930

File (hide): a49d4e46be446b1⋯.gif (Spoiler Image, 872.48 KB, 700x600, 7:6, vivian.gif) (h) (u)

>>876541

Group voice has been around for forever, and qTox added blocking peers just last week, both of which you would know if you actually used Tox instead of just obsessively whineposting about it.

Wew.


 No.876872


 No.876875

>>864418

>Is this a government psyop

Strongly this. Sow FUD. Same for USGOV mostly bankrolling Tor devs for the last decade: FUD. USGOV needs an open secure obfuscation network for their operatives internationally to use, and the public using TBB is the cover traffic. No shit they'd fund their own creation!

If you're paranoid, recompile with a higher circuit size (it's a macro value somewhere in the code), and audit audit audit!


 No.876930

File (hide): 397e79d9a126c62⋯.png (79.72 KB, 1229x711, 1229:711, Screenshot from 2018-03-02….png) (h) (u)

>>876851

I do use it nigger.


 No.876934>>876940 >>886547

>>863876 (OP)

>>863886

Tox is pretty much dead because it leaks IPs to your friends list and with online messengers you can't fucking trust internet friends with your personal data, so Tox fucked itself. Their ability to stay retarded and never rectify this and just go "lol just apply proxy, problem solved" is why no one will use Tox on any serious basis. It is the biggest reason why tech communities haven't and will not use it whenever they hear of it.

The lack of proper chatroom support doesn't help either.


 No.876939>>877010

>>864001

That's not at all true


 No.876940

>>876934

>Tox is pretty much dead because it leaks IPs to your friends list and with online messengers you can't fucking trust internet friends with your personal data, so Tox fucked itself.

How do you communicate without trading IPs?

What's wrong with using a proxy?

Maybe don't use a SECURE messaging client with people you don't trust.


 No.876942

File (hide): 808ca6c2e4537b9⋯.gif (1.85 MB, 500x283, 500:283, choccymilk.gif) (h) (u)

Hey faggots, how do I send files on RING on GNOME. I can't figure out how to do it...


 No.876951

>>864431

They're most likely typical leddit retards who want a Discord or Skype without the botnet/700+ MB of RAM used by electron


 No.876953

>>864431

>INTEGRATE MY BLOCKCHAIN XD I LOST MY ACCOUNT PLS RESET

Imagine implementing the cancer known as blockchain into Tox?

>I LOST MY ACCOUNT PLS RESET

...What?


 No.877010>>877122

>>876939

>That's not at all true

Thats literally how p2p works faggot. The anonymity router you connect to knows who you are.


 No.877011

>>876791

Server can read messages


 No.877122

>>877010

This, literally any host that trades messages.

I don't know why this retard can't grasp what down syndrome pajeets can.


 No.877215>>877467 >>877858

>people suggest riot.io as an alternatives to discord

>get around to trying it out

>no proper voice channels

>no way to adjust the volume of an individual

>basic features that are in virtually every VOIP program made in the last decade

Where were you when open source was btfoed?


 No.877467>>877858

>>877215

opensource has always been shit. but atleast it does not pipe my conversations directly into an NSA datacenter.


 No.877695>>877696

>>868095

If you can tell us how to get a server configured that does OTR, file transfer and voice properly that would be great. Tried open sores trash and openfire and they are barely functional.


 No.877696

>>877695

I have used OMEMO before with XMPP before. It was a very shitty experience. Particularly with group chats. It would randomly turn off encryption and make shit very unclear what was going on. Broadcasting things in plaintext all the time.


 No.877764

>>863876 (OP)

>1990+25

>a _chat_ program needs to be actively developed

hmm i wonder where the problem could be?


 No.877787>>877850

tox isn't dead you mouthbreathing trannies

toktok is still in development, the next version is going to have persistent groups

toxic and other clients are still in development

what the fuck are you on about

the only thing dead regarding tox is it's userbase since people add you speak a day and then ghost you


 No.877850>>877916

>>877787

> the next version is going to have persistent groups

Has been in dev for literally years with no new features


 No.877858>>877868 >>877936

>>877467

>>877215

Newfags, all software is shit. Nobody's figured out how to write non-shit software.


 No.877868>>877905

>>877858

Not at all. It's your own senses that causes everything to be colored in the shade of shit. There is nothing that can possibly exist that isn't shit because you've decided it to be that way.


 No.877905>>877912 >>877937 >>886591

>>877868

Name one piece of good software.


 No.877912

>>877905

Firefox


 No.877916

>>877850

I know what you're talking about but it's almost done and scheduled for 0.2.1


 No.877936

>>877858

>Newfags, all software is shit.

Some is shittier than others.


 No.877937>>878063

>>877905

GHC Compiler


 No.878026>>878027

Ring & Riot


 No.878027

>>878026

are bad


 No.878063>>878139

>>877937

>compiler written into families of languages and two families of programming paradigms.


 No.878139>>878180

>>878063

You want to write a garbage collector in a garbage collected language? Are you retarded? Of course the runtime is written in something else.


 No.878180>>878188 >>878189

>>878139

>garbage collected language

>can't compile itself

I thought Haskel was a serious language, not some script piece of shit.

Rust compiler doesn't have this problem.


 No.878188

>>878180

>Rust compiler doesn't have this problem.

You know what a runtime is and what rust does not have?


 No.878189>>886566

>>878180

>any language with a GC is not serious

ayyyyyyy


 No.886547

>>876934

so you mean i can still use it with non random people i know, k thx


 No.886566

>>878189

>any language with a GC is not serious

Not him, but I kind of feel that a GC is just there to protect shitty programmers and/or shitty design.

Am I wrong?


 No.886585

>>863876 (OP)

Suce ma | Pauline.


 No.886591>>888144

>>877905

systemd


 No.888096

>>863916

Jesus, if you actually believe this you're such an idiot. How do you think that node sends messages back to you?


 No.888144

>>886591

He said ONE piece of software, anon


 No.888161

>>863908

This level of retarded.

To even talk about security requirements you start with a threat model that doesn't look like 'muh information'. You should definitely distinguish between metadata and full take. Tox may not meet everyone's information security requirements; Don't communicate a terrorist threat to undercover CI while using tox.

But, depending on your threat model, having a peer communicant discover your IP address may be preferable to having a Microsoft record it in a database for years.


 No.888163>>888186

>>864109

Some ISPs do egress filtering.


 No.888168>>888169

>>868639

Every peer could receive all traffic like blockchain


 No.888169>>888174 >>896584

>>888168

>just use broadcast topology

AHAHAHAHAHA

Retard, AHAHAHA.


 No.888171

>>868663

Or broadcasting, which has trade off processing way more messages.


 No.888174

>>888169

Clearly dosn't scale well, I am not saying its ideal, I prefer peers to have my IP, and that my voice client doesn't manage my Anonymity.


 No.888186

>>888163

And some ISPs block bittorrent so what


 No.896572

>>864313

Wire is hosted by (((Amazon))).


 No.896584>>896587

File (hide): be9820e857a710c⋯.webm (1.7 MB, 640x360, 16:9, getthefuckout.webm) (h) (u) [play once] [loop]

>>888169

seconding this, that was absolute brainlet speak


 No.896587

>>896584

If every message is sent to every person then you cant prove who sent or received anything without even needing to use (((tor))).


 No.896589

>what is bitmessage


 No.896597>>896599

>>863890

oh no!, not my ip!


 No.896599>>896849

>>896597

IP = city you are in. Not something you want to share with every random fuck.


 No.896805

>>864109

>Your machine gets random connections from machines using non spoofed IPs 24/7 already

Your firewall gets those connections and drops them on the floor if it's worth anything at all.

>>864127

You're the crazy guy that yells at the radio thinking they'll hear you, aren't you?


 No.896841

>>864135

>people use it for stuff I disapprove of therefore the software is inherently bad


 No.896842

>>864122

>I want a decentralized P2P service that doesn't leak the Oh-So-Important information of what my (dynamic!) IP is.


 No.896849

>>896599

Okay, so the real answer is to connect your IP to a chat server that you don't control.


 No.897614

This thread is a fucking mess.




[Return][Go to top][Catalog][Screencap][Nerve Center][Cancer][Update] ( Scroll to new posts) ( Auto) 5
195 replies | 17 images | Page ?
[Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / animu / asmr / rel / strek / sw / travis2k / vore / zoo ][ watchlist ]