[ cyb / tech / λ / layer ] [ zzz / drg / lit / diy / art ] [ w / rpg / r ] [ q ] [ / ] [ popular / ???? / rules / radio / $$ / news ] [ volafile / uboa / sushi / LainTV / lewd ]

cyb - cyberpunk

“There will come a time when it isn't "They're spying on me through my phone", anymore. Eventually, it will be, "My phone is spying on me.””
Name
Email
Subject
Comment
File
Password (For file deletion.)

BUY LAINCHAN STICKERS HERE

STREAM » LainTV « STREAM

File: 1447794071015.jpeg (70.67 KB, 580x527, 1447793398924[1].jpeg) ImgOps iqdb

 No.19520[Reply]


Recently I had access to a network where transit some files from my interest.
I would like to steal some of these files , I know I can sniff the network , however I'll have to keep an eye on the network, and can not.
Is there any configuration to Wireshark , or ettercap I can simply pre- determine the file type, go and he simply saving ?


File: 1447533741106.jpg (604.62 KB, 1500x1000, main_1500.jpg) ImgOps Exif iqdb

 No.19276[Reply]

I read an article today that had me seething. I actually commented on it (which I never, ever do for nearly anything) because I was so absolutely disgusted by what this idiot was implying

http://www.dailydot.com/politics/paris-attack-encryption-snowden/

Thought you might want to know lains. People like this not only exist, but have a voice.
17 posts and 1 image reply omitted. Click reply to view.
>>

 No.19322

I do like how the establishment can about-face on data encryption when the populace is using it instead of them.

>>

 No.19384

>>19316
Ignorance is bliss, yes.

But you still have to log in to your precious twitter over https.

>>

 No.19470

There was a ton of FUD right after the attacks, they were blaming the PS4 for being used by the attackers to communicate for a while.

>>

 No.19472

its Daily Dot what on EARTH did you even expect?

>>

 No.19503

Article explaining how terrorists, etc. knew very well to avoid cellphones even back in 2000.

https://theintercept.com/2015/11/15/exploiting-emotions-about-paris-to-blame-snowden-distract-from-actual-culprits-who-empowered-isis/



File: 1436907403373.jpg (704.03 KB, 1000x666, diving.jpg) ImgOps Exif iqdb

 No.13077[Reply][Last 50 Posts]

Anyone into diving? Post your runs.

I mostly go for electronics; found a microsoft intellimouse, x2 1GB DDR ECC ram and some old xeon today.
119 posts and 19 image replies omitted. Click reply to view.

>>

 No.19343

>>19282
That picture looks like the device used in Steins;Gate.

>>

 No.19387

>>19321
Cool! So I'm assuming if I apply a voltage to one of the 8 pins on the bottom, a portion of it glows?
>>19343
Precisely why I picked it up!

>>

 No.19391

>>19387
you can probably find tons of diy nixie tube projects online mostly clocks

>>

 No.19395

>>19387

Sort of. Nixies are cold-cathode tubes, so they're pretty easy to drive. You just need to ground the common and put anywhere between 40 and ~200 Vdc to light them (buffered by a ~10-15k resistor so you don't burn it out, since the current/voltage curve is non-linear and state/temperature-dependent).

To be honest, though, you'd probably find it easier to just drive the whole assembly. If you're lucky it'll have a HV supply inside and take TTL logic levels on the input.

Pull it apart and post photos.



File: 1446234539911.jpg (9.84 KB, 300x257, tor-the-onion-300x257.jpg) ImgOps Exif iqdb

 No.18506[Reply]

2 posts omitted. Click reply to view.
>>

 No.18510

It sounds neat, I might switch from pidgin

also >>>/tech/

>>

 No.18535

You missed a chance to say "oponions?"

>>

 No.19331

File: 1447584184931.jpg (9.85 KB, 320x320, 11094506_484266415058639_1….jpg) ImgOps Exif iqdb

I haven't used tor in a long long time.

Now when looking to try it out again, it seems way too complicated than it used to be.

Parts of it compromised, huge problems with bad exit nodes that can fuarrrk you up somehow.

The exit node problem confuses me. Can anyone explain what the actual problem is with it and what the work around is for it like I'm retarded?

>>

 No.19337

Using Instantbird...I don't like it already.

>>

 No.19338

>>19331
I feel similarly.
>The exit node problem confuses me. Can anyone explain what the actual problem is with it and what the work around is for it like I'm retarded?
If the enter and exit nodes you use happen to be controlled by the same person, they can get you.
There's also timing attacks and other things.

I don't keep up with it much.

The internet and www are too complicated to be secured.



File: 1434319091073.jpg (36.27 KB, 512x512, anarcho-socialism.jpg) ImgOps Exif iqdb

 No.12031[Reply][Last 50 Posts]

Let's have a thread about anarcho-socialism.
Here are some good sauces:
https://en.wikipedia.org/wiki/Social_anarchism
https://en.wikipedia.org/wiki/Mikhail_Bakunin
https://en.wikipedia.org/wiki/Participism
https://en.wikipedia.org/wiki/Inclusive_Democracy

Also keep in mind:
Libertarian socialists believe in converting present-day private property into the commons while retaining respect for personal property.
295 posts and 37 image replies omitted. Click reply to view.
>>

 No.19291

>>19287
If your vote ends up in the minority...
You can always leave if you don't like something.

Mobility and flexibility are key for quality life. :)

>>

 No.19293

>>19287
Plus even if your vote ends up in the minority, nothing says that your vote will be forgotten and that you won't have some kind of influence on further decision making. Maybe you can suggest your alteration in some kind of commune wide brainstorming session. There are still people in the commune that care for you :)

>>

 No.19294

>>19291
>>19293
Or I could just gather up a group of like minded malcontents and stage a coup.

And since my enemies are a bunch of mewling pacifist pushovers, it would be pretty easy to kill them and place my clique in charge.

>>

 No.19295

>>19294
Then I could enslave the rest of the commune at gunpoint, seize the means of production, make myself king, and build up my military resources with the aim of expanding my conquests.

It's almost like this sort of thing has happened before.

>>

 No.19296

>>19294
You can do that in every system. The question is will you succeed and which system is better.

If you think that the system that survives is better, then you are just putting the needs of the system ahead of the needs of its individuals and are part of the problem.

>>19295
That way you are assuming that humanities default way of operating is anarchism, which it is not.
A better way to say is that crony capitalism, kingdoms and dictatorships were so far humanities default way of operation.



File: 1446008031369.png (1.98 MB, 1024x768, ClipboardImage.png) ImgOps iqdb

 No.18302[Reply]

I'm not sure if this is the best board to put this on, but you guys seem to know some pretty schway soykaf .
Basically, there have been some issues in the family and in my life as a whole.
In short, I need money. About $25,000. Do you guys know any ways to make good money?
I have a dead end job that pays $30k/yr, and I'm not very qualified to find anything better. I need the money by April of 2016.
If you guys have any ideas at all, they will be much appreciated!
50 posts and 7 image replies omitted. Click reply to view.
>>

 No.18938

>>18913
2c family isn't nbomes, bro... There are nbome variants but 2ci isn't one, and that's what that dude said.

I encourage you to try the new and innovative drugs scientists are making; it isn't like acid is the apex of human technology.

>>

 No.19215

>>18377
>create website
>become an VPN
>Set up bitcoin wallet
>make website claiming to be hitman
>reasonable, realistic rates
>link, advertise whatever
>end up fuarrrking over someone powerful
>get tracked and decapitated
>gg no re

>>

 No.19226

>>19215
Nothing short of nation-state level researchers can effectively deanonymize Tor users and even that's questionable.
sidenote: somebody with that sort of power probably wouldn't have any reason to hire a sketchy internet hitman using thousands in quasi-legal internet money

>>

 No.19227

>>18937
no it wont.
Your not directing money over serveral altcoins, you are selling bitcoins for altcoin A, which you sell for other altcoin B, which you sell for bitcoins. This means the first and last transactions are in the bitcoin blockchain evidence, and can most probably be linked to the other two transactions

>>

 No.19242

>>18937
Well you could run the bitcoins through a mixer twice and that'll achieve a better result than btc -alt coin - btc. If 2 BTC get pushed into alt coin, and you soon put 2 BTC into your account then that was pointless wasn't it?



File: 1447384377354.png (7.2 MB, 2586x2460, Sunflower_with_black_seeds.png) ImgOps iqdb

 No.19167[Reply]

7 posts omitted. Click reply to view.
>>

 No.19217

This is pretty creepy. Thankfully it should be relatively easy to have software filter all human-inaudible audio from microphone/speaker I/O.

Amusingly, utrasonic beacons used to track people isn't a new idea. Hell, even anime featured that idea (Railgun).

>>

 No.19218

>>19195
>I think apple iphone could become a decent viable mobile platform for privacy conscious individuals.
I hope for your sake you're joking.

People who actually care about their privacy don't use mobile phones.

>>

 No.19229

>>19195
Please be trolling.

>>

 No.19230

>>19229
>YFW you realize that Apple is changing in response to both Google, the government, and the people and is becoming more and more privacy-conscious and worthwhile

Though, it will take awhile for peoples' perceptions to change. Will GNU/Linux be better for privacy? Most likely. But will Apple products be better than stuff from Microsoft or Google? You bet it will. Besides, this user has the right answer: >>19218

>>19167
That's terrifying, OP. Thanks for the link! Also, I will start using >>19194 this idea to help people be more concerned about privacy.

>>

 No.19233

This is excessive, most people use the same identifiable accounts on both their desktops and mobiles, so advertisements would be shown from cookies that are mutually gathered on each device yeah?

Also, do people even click on ads anymore? I know there are a lot of fuarrrking morons out there, but much like how caller ID put a big wrench in telemarketing, and how people don't answer calls from numbers they don't recognize; people are becoming more and more weary of clicking random links because their myspace was phished years ago. But maybe I'm putting too much faith in people, because I don't associate with ignints...



File: 1447347476991.jpg (692.63 KB, 1080x1080, 1447075262109.jpg) ImgOps Exif iqdb

 No.19121[Reply]

Hie, I want to talk about ethics.

During my research, I've discover that the most easy way to be stealth and anonymous is to take the identity of someone else. By that, I mean passing through the infected computer of a victim, or to use the local network of someones else (more dangerous because you have to be near it).
This is the same for anonymous buy. I don't see any other way to be really anonymous but with the credit card of someone else.

I don't see any other way (notify me if there is other, but without being a pure computer genius, I don't see one).
That brings the question of ethic. If you want to resist to a dictatorship, oppression, how can you use these method? You'll be as bad as they are. And they're gonna certainly attack the one which you use the indentity just to hurt your morality, or just to make an example.
2 posts omitted. Click reply to view.
>>

 No.19145

Dead unreported people's id as well.

>>

 No.19152

File: 1447364002675.png (355.99 KB, 659x721, 1443824896110.png) ImgOps iqdb

>>19145
SO what you're saying is... my waifu should kill someone, and then use their computer to do my dirty work on the Net?

>>

 No.19159

>>19152
Missing people, or shared id.

>>

 No.19196

>>19143
If you get somebody killed because you were trying to do /cyb/er stuff using their internet identity (accounts, credit cards, etc etc) then I'd say your just as bad as the government (you get people killed because you wanna do stuff you enjoy, they get people killed because they wanna own stuff they enjoy; whats the big difference?)

>>

 No.19216

>>19121
Not an expert but the sane answer would be to use an anonymous corp. You have to contrive a chain of pwnship like: You -> Bank country -> LLC country -> Operation country.

Non sane answer is find someone without close relatives who wants to die without negatively affecting old acquaintances. You agree to maintain the pretense they're still alive in exchange for their ID and dealing with the body.



File: 1447358410948.png (44.01 KB, 1920x1080, 1427010911673-0.png) ImgOps iqdb

 No.19135[Reply]

Hi /cyb/. I'm in college right now and have no clue what I'm doing.
I'd love to be a NEET forever but that's not happening.
So what are some /cyb/ jobs?
4 posts omitted. Click reply to view.
>>

 No.19164

>>19162
It doesn't feel very cyberpunk. It feels like mostly having a bunch of meetings arguing with people to fix Group Policy bull soykaf .

>>

 No.19166

>>19164
no no no, you have to get a MS in infosec and get a job at the NSA.

Then, after 10 years of no obvious political activism, put a massive flaw in their system, plaster it all over the internet, and flee to Novosibirsk.

>>

 No.19175

drug dealer

>>

 No.19177

>>19164
That's blue team. Just go red team.

Sell exploits to bidders, take hacking/breaking bounties.

>>

 No.19179

>>19164
>>19164
Do cyber security and netwlorking. At home you hack on free software and spread awareness of our corrupt gov. slowly leaking info about megacorps, you rise in skill and ability becoming a cisco certified systems architect. A week later you drop a bomb of information about some big corp, all the dox youve collected, and flee to china and get a job working as one of their top systems and surveilance analyst. then repeat, get your us civ by providing info on china to us win, gondown in history, get assassinated when you get some major award, be talked about by cyberpunks, hackers, phreaks, and weirdos for months



File: 1446729847228.png (55.05 KB, 582x535, seeeeeeeds.png) ImgOps iqdb

 No.18785[Reply]

Other than pirate stuff, what do those who run seedboxes seed?
Image very much related. I'm seeding important projects for the good of regular people. Both Byzantium images for meshnet building, disaster areas and generally fuarrrking over the man. Parabola and Trisquel because freedom.

If anyone else wants to seed what I am I'll post the magnets below in the order that you see them in the screenshot.

magnet:?xt=urn:btih:65a11406261b23177caeeba52215a2c3feb315ab&dn=byzantium-v0.5b

magnet:?xt=urn:btih:6756438ec53d399ae90e7956e49cbd7bb2ab4354&dn=byzantium-v0.5b-hybrid

magnet:?xt=urn:btih:9d04cc0874d3c52e4f755abb06de22e72f25fe87&dn=parabola-mate-2015.09.11-dual.iso&tr=http%3A%2F%2Ftracker.hackcoop.com.ar%2Fannounce&tr=udp%3A%2F%2Ftracker.ccc.de%3A80&tr=udp%3A%2F%2Ftracker.istole.it%3A80&tr=udp%3A%2F%2Ftracker.publicbt.com%3A80&tr=udp%3A%2F%2Ftracker.openbittorent.com%3A80

magnet:?xt=urn:btih:de95597c0786fb01687fbb929ccf2aa7de43d04e&dn=trisquel%5F7.0%5Fi686.iso&tr=http%3A%2F%2Ftrisquel.info%3A6969%2Fannounce&ws=http%3A%2F%2Fcdimage.trisquel.info%2Ftrisquel-images%2Ftrisquel%5F7.0%5Fi686.iso&ws=http%3A%2F%2Fus.archive.trisquel.info%2Fiso%2Ftrisquel%5F7.0%5Fi686.iso&ws=http%3A%2F%2Fin.archive.trisquel.info%2Ftrisquel-iso%2Ftrisquel%5F7.0%5Fi686.iso&ws=http%3A%2F%2Fmirror.cedia.org.ec%2Ftrisquel.iso%2Ftrisquel%5F7.0%5Fi686.iso&ws=http%3A%2F%2Fmirrors.serverhost.ro%2Ftrisquel%2Fiso%2Ftrisquel%5F7.0%5Fi686.iso&ws=http%3A%2F%2Fcn.archive.trisquel.info%2Ftrisquel-images%2Ftrisquel%5F7.0%5Fi686.iso&ws=http%3A%2F%2Fftp.caliu.cat%2Fpub%2Fdistribucions%2Ftrisquel%2Fiso%2Ftrisquel%5F7.0%5Fi686.iso&ws=http%3A%2F%2Fmirrors.knoesis.org%2Ftrisquel%2Fimages%2Ftrisquel%5F7.0%5Fi686.iso
14 posts and 2 image replies omitted. Click reply to view.
>>

 No.18953

File: 1446997317387.gif (937.58 KB, 220x386, 1446719232383.gif) ImgOps iqdb

>mfw 23Mbps down on chinkpad x41

>>

 No.18960

What is the benefit of having separate servers for things like a seedbox or vpn?

I seed plenty just fine on my main which is a tiny pc with a dual core i3, 8gb ram, 256gb ssd and ubuntu minimal with dwm and light x11 programs.

I have a windows xp pro black edition vm that runs 24/7 on workspace 4 that I use for school and work complete with a VPN to connect to the office network and remote desktop with ports forwarded through my firewall so I can access it from outside. I can then use putty to ssh into the main computer from the VM. I use a really really long password on the VM.

Looking at htop now, cpu usage is under 3% on every thread and ram usage is at 1400MB

>>

 No.18963

File: 1447015984174.png (54.31 KB, 825x449, Screenshot from 2015-11-08….png) ImgOps iqdb

Since I barely use my rPi2 right now, I set it up to seed a few distros.

Need to get a powered hub to seed more stuff, but haven't gotten to that yet.

>>

 No.19074

>>18960
Because many people have their computer in an area with soykaf internet, but you get a seedbox in Europe somewhere that is many, many times faster.

>>

 No.19105

I'd love to download and seed a bunch of shit, but all I have is a Thinkpad X200. Not much memory. I'm planning on building a desktop computer for storage, which I'll use for data hoarding and seeding.



Delete Post [ ]
[ 1 / 2 / 3 / 4 / 5 / 6 / 7 ]
| Catalog