>>99900957This isn't your jobs thread or cert thread, it's a group therapy session. /Cyb/er/sec/urity/pri/vacy general is for the discussion of anything and everything related to cyberpunk culture, cybersecurity, and digital privacy.--[/Cyb/erpunk]-----The FAQ: https://sizeof.cat/post/cyberpunk-faq/What is /cyb/erpunk? https://pastebin.com/pmn9vzWZHow do I into /cyb/erpunk? https://pastebin.com/5tpNFQdsHuge list of cyberpunk media: https://sizeof.cat/post/cyberpunk/The cyberdeck: https://pastebin.com/7fE4BVBgCyberlife: https://jinteki.industries/files/cyberlife.7zBibliothek: https://www.mediafire.com/folder/4m5hd2065hde8/Bibliothek--[/Re/verse Engineering]-----Getting into /re/: https://wiki.installgentoo.com/wiki/Reverse_Engineering--[/Sec/urity]-----"Shit just got real": https://pastebin.com/rqrLK6X0Cybersecurity basics: https://wiki.installgentoo.com/wiki/Cybersecurity_-_/sec/_guideand armory: https://wiki.installgentoo.com/wiki/Cybersecurity_-_basics_and_armorylearning: https://wiki.installgentoo.com/wiki/Cybersecurity_-_Learning/News/CTFsReference books (PW: ABD52oM8T1fghmY0): https://mega.nz/#F!YigVhZCZ!RznVxTiA0iN-N6Ps01pEJw/sec/ PDFs: https://mega.nz/#F!zGJT1QQQ!O-8yiH845GN26ajAvkoLkAEFF anti-surveillance: https://ssd.eff.org/Other library: https://mega.nz/file/UCgEGAjb#rwNcnMAQCUUbSp8supsFvn9QEHCWUW86eLcZa16ZG4Y--[/Pri/vacy]-----Tools: https://www.privacyguides.org/en/tools/Hitchhiker’s Guide: https://anonymousplanet.org/guide.htmlHardware: https://ryf.fsf.org/productsFrontends: https://wiki.installgentoo.com/wiki/Privacy_friendly_frontendsOSINT Guide: https://inteltechniques.com/index.htmlFirmware: https://libreboot.org/RMS: https://stallman.org/facebook.html--[/hmg/ Hackerman General]-----VM/CTFs:http://overthewire.org/wargames/bandit/ - easy beginnerhttps://www.vulnhub.com/ - prebroken imageshttps://www.hackthebox.eu/ - super secret clubHuge info dump: https://hmg.neocities.org/
skid generalthanks for stopping by
>>100020063stopping by status: thanked
Do you configure your own private browser? How well does it fare on fingerprinting tests?https://coveryourtracks.eff.org/For comparison, Tor Browser's uniqueness ratio (on the Safest security setting) is ~60:1.
>>100020517>>100020063Why dont most hackers just bribe an IT worker to upload a malicious file onto computers and get a share of ransomware or catfish them on a dating site as honeypot where u then black mail them . Trying to bypass all the AV software and hoping someone clicks on ur phishing email seems like a hassle .
Critical RCE Bug Found in Palo Alto Firewallshttps://www.youtube.com/watch?v=Z0UldcHQDq0
>>100020705Buy an ad, Kenny
>>100020719I like kenny though ? Dont u
>>100020719Not Kenny, although that would be cool if he was actually here.
>>100020665As an IT worker this made me afraid
>>100020665Phishing and social engineering are in fact the most common attack vectors.
=== /cyber/ Headlines:>The Pixel 9 reportedly gears up for satellite SOS supporthttps://arstechnica.com/gadgets/2024/04/the-pixel-9-reportedly-gears-up-for-satellite-sos-support/>Servo Driving Modularity To Support Different JavaScript Engineshttps://www.phoronix.com/news/Servo-JavaScript-Engine-Modular>Cisco Duo warns third-party data breach exposed SMS MFA logshttps://www.bleepingcomputer.com/news/security/cisco-duo-warns-third-party-data-breach-exposed-sms-mfa-logs/
Last q from previous thread: Is filen.io a service you would trust? Saw them mentioned before but tried to look them up and they don't even have a wiki. Their clients are apparently open-source and have a github, but has it been audited? No, I am not coder enough to audit encryption myself.
>>100022171>using cloud storage
>>100022229I mean, it should be secure if it's zero-knowledge like they claim. But does the code actually do that?
Guys redpill me on working for a PCI assessor Phone posting so can’t/wont elaborate.
I read American Kingpin. I already knew a lot about what happened since dpr's arrest makes up a lot of OpSec lore, but not much of the full background. Even when it has that typical post 2010s problem of non-fiction reeking of journonig, the drama and timeline is really interesting.completely unrelated note: wiping over anything attached to my name for no reason in particular haha
Threadly reminder that Fisheye Placebo is the coolest cyberpunk comichttps://www.yuumeiart.com/fisheye-placebo/Also I want to heal Jen of her dykeness through a rough dicking!
>archive.org gets an onion servicehttps://archive6zg5vrdwm4ljllgxleekeoj43lqayscd4d4kmhnyblq4h3ead.onion>no mention on /g/ nor on their blogWhat's going on here? Usually sites that do this will at least have someone write a puff piece saying how much the site cares about privacy.
you will never have a cyberpunk dystopia
hey man wtf i was promised a nuclear war when i wakey wakey
>>100017648Crypto shows its security again...
>>100023438We have it, just not the cool kind.
hacktheboxniggers where u at
>>100023793>ever believing polNOTHINGEVERHAPPENS>something actually happensplanned and a psyop, so it indeed didn't happen>>100024659tryhackmenigger reporting inI wish I could just do it 24/7 if not for uni, I learn more shit by doing rather than listening to some fossil ass boomer lecture frfrat least I got a student's subscription discount for the vip...
>>100023793Spend less time on /pol/.
Well well well... Looks like one of the Roscomnadzor chiefs was selling his site-censoring rights to the highest bidder! By paying for his wife's Egyptian vacation politicians could ask to block corruption investigation reports, IT-businessmen could hinder their competition, and vile Ukrainians could do God knows what!Off the record, on the QT... and very hush-hush.
>>100023793That could still happen. Even if it was contained in the Middle East (as in not expanding to China-Taiwan and Europe) it would be a really bad day.
As xz is coming under control, new issues are underway - the ride never ends:=== /sec/ News:>OpenSSF and OpenJS warn about social-engineering attackshttps://lwn.net/Articles/969919/>The OpenJS Foundation Cross Project Council received a suspicious series of emails with similar messages, bearing different names and overlapping GitHub-associated emails. These emails implored OpenJS to take action to update one of its popular JavaScript projects to "address any critical vulnerabilities," yet cited no specifics. The email author(s) wanted OpenJS to designate them as a new maintainer of the project despite having little prior involvement.
>>100025442What's scummy is that these attacks prey on the most hardworking and conscience maintainers out there.This is a sick world we live in! Sick people! (it's from Jingle All The Way)
>>100025992True.And the simplest way to defeat this, is for governments to pay a decent stipend for the maintenance work so that they don't have to get "help" from faceless people with name-number email addresses. Realistically it is sadly more likely that government will want to see the identity to verify people, they like to wield control over people, including volunteers.
COmfybots will soon be here=== /cyb/ News:>A systematic review and multivariate meta-analysis of the physical and mental health benefits of touch interventionshttps://archive.is/YfurQ>A critical issue highlighted in the pandemic was the lack of touch due to social restrictions18. To accommodate the need for touch in individuals with small social networks (for example, institutionalized or isolated individuals), touch interventions using objects/robots have been explored in the past (for a review, see ref. 11). We show here that touch interactions outside of the human–human domain are beneficial for mental and physical health outcomes. Importantly, object/robot touch was not as effective in improving mental health as human-applied touch. A sub-analysis of missing skin-to-skin contact among humans indicated that mental health effects of touch might be mediated by the presence of skin-to-skin contact. Thus, it seems profitable to include skin-to-skin contact in future touch interventions, in line with previous findings in newborns19. In robots, recent advancements in synthetic skin20 should be investigated further in this regard. It should be noted that, although we did not observe significant differences in physical health benefits between human–human and human–object touch, the variability of effect sizes was higher in human–object touch. The conditions enabling object or robot interactions to improve well-being should therefore be explored in more detail in the future.
>>100020665please do that, I'm a cyberpsychologist and I'm getting bored of clients hiring me to teach boomer employees how 2FA worksthat's actually the easy part of the job, the hard part is explaining WHY they have to do itthere's always one old prick who thinks that getting an OTP is his personal 9/11please do something to change the paradigm of insider threat prevention. I went into cyber to escape arguing with stubborn boomers who think anything that doesn't conform to their delusional preconceptions of reality is a personal attack, the only thing that has changed since being a teenage retail wagie is my pay packet >you want me to give the company my PHONE NUMBER so they can send ME a text so I can use MY COMPUTER??they already have your phone number and it's their computer, pipe the fuck down grandpa
>>100026107If you're getting money from the government you're not independent.
Is it possible to detect LinPEAS running on my machine, assuming malicious person can name it however he wants? Command tracking is sadly not an option. What would be your approach to this?
>>100026969The guy maintaining xz was burned out from what I can see, his mental health was not good. In this case I am sure a stipend, even a small one, would have also served as a statement of appreciation. People can make an enormous effort as long as there is some light at the end of the tunnel.
>>100027150Dude... voluntary work is not a tunnel, nobody's forcing anyone. It can't have an end, you either do it or don't.
>>100027330A strong sense of duty can come into this. I am part of a small project and feel bad I have not been able to do enough work on that project. That has nothing to do with money, I have a full time job that pays a salary, there is just not enough time.It might not have an end in the foreseeable future but one day people will have to hand over the project to someone else. LWN has an increasing number of obituaries, soon it will be enoug to have a separate column for that.
>>100023438We do, a shame its the tranny faggy type instead of the cool guns blazing governments type.
What happened to the guy who was going to do LSD and programming? .>>99901360
>>100028317He ded
>>100028365Bad chemistry of bad instruction set architecture? Intel is lethal.Do you remember The Wormed One, that is another self experimenter we have not heard from.
>>100026107Yeah, let the CIA have direct monetary control over FOSS. Because the control they already have through Google, Microsoft and the rest of their shells is not enough.
>>100028317Delayed until next weekend >>99977080
>>100028182Might get >>99803736 soon, now that BCI is slowly turning into reality.
>>100028682It is a choice between plague or cholera: only these agencies are aware how serious and also fragile the situation really is, while the rest of the authorities will just feel compelled to deliver a grand speech. The NOBUS gamble will be ever more dangerous since the West has a lot more to lose than the rest. So to make people happy, the money, wherever it originates, will probably come through a foundation nobody has ever heard about before, just to make you feel better. What counts is that such a stipend comes with transparency and no strings attached (yeah!). I think CIA and NSA will be able to resist but MI5 and MI6 will not, especially if the victi ... err ... maintainmer is a British subject. As for Russians and Chinese, well that was never a good start anyway.
>>100022171Thanks 4 the info. I suppose it would be good for general purpose file storage.>>100023256Thanks for this.=======AutonomousMusicProgramming======>https://youtu.be/7JqKRqOmzi0
Is Dnsmasq Dnscrypt in ddwrt completely broke and useless? Idk what the diff is between all the v4 and v6 server options in the dropdownlist, but trying both v4orv6 still makes me leak like crazy, vs 0 leaks using my browsers built-in doh. Why would brainslayer even include dnscrypt and confuse normies like myself if it doesn't even work
Such useless garbage
the MSP work for threw me into a Cybsecurity rolei don't want to be here but how do i learn? i've been doing HTB starting point and watching pirated courses but i sitll feel like a brainlet. i've been in sysadmin/devops for ~9yrs now, is this where we all go to die?
>>100029425From the previous thread:TryHackMe junior penetration tester path (do the basics before it if you don't have a background in IT) ----> Some Practice on TryHackMe ----> HackTheBox Academy ----> HackTheBox BoxesI'll add to this and say check out this course:https://academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-courseYou can also look into his associated certificate. It's basically a cheaper, and a bit more realistic exam than the OSCP in regards to conducting a pentest end to end. His certs are becoming more well-known in the industry. I work with people that got them.I'm not a shiill. TCM helped me pass the OSCP back in the day.Pro tip: When you do hackthebox, finish one, then watch how someone like ippsec did it to learn how someone better approaches the same target.
>>100029368I really like the artistic effort you put into these.
>>100031800Thanks fren! I can use all the encouragement I can get. Have a prototype.=========AMP===========>https://youtu.be/ivp7AmHZp1E
>>100031800>>100032123Agreed that and the news keep me coming back to this shithole
>>100032223>and the newsHave I got news for you? Yes, yes I have!=== /cyb/ News:>2054 — a sci-fi novel on the age of ‘non-order’https://archive.is/Jb3Z3>During the war on terror, the US Department of Homeland Security asked an array of science fiction authors to take part in an exercise in which they brainstormed possible future threats. >A functional page-turner from 2021, this began with a new Chinese cyber weapon capable of disabling electrical equipment around the world, and concluded in a brutal war over Taiwan in 2034, hence the title. The result was bleak: a nuclear conflict between the US and China that saw cities wiped out and millions dead.>Now the authors have dreamt up 2054, an equally propulsive thriller played out in a world of advanced biotechnology and quantum computing. Set two decades after its predecessor, the new book imagines a changed, authoritarian America that has barely recovered from its war with China.Genetics is data, perhaps this book make normies start considering how to secure genetic data. So far only Russia has such rules in place, makes you wonder.
>>100032430Awesome, thank you anon!
>>100028894Ngl I'm concerned that shit's gonna be abused immediately
>>100033298Oh, I am certain it will. The original premise in the book was to get the prison population under control, but it takes little imagination to see how the political opposition will be laminated and never cause "problems" again.Remember, democracy is too important to leave to the people..
How safe are encrypted backups in hostile environments? (Only the encrypted backup file is uploaded to remote server, keys stay local)
>>100033768You mean like the jungle?
>>100033377I'm more expecting a government and corporate mining of mental capacity, like matrix meets Futurama lmao
>>100034671I mean commercial VPS's and so, I consider anything accessible by 3rd party and not 100% in my control as a hostile environments.
>>100035061Encryption algorithm cracking.
>>100034928That too. And I am more worried about the BCI projects undertaken by FB and Apple, since they want also to insert data into the brain. I can see people getting sudden and inexplicable cravings for the latest life style appliances. What could possibly go wrong?
=== /cyber/ Headlines:>Cisco Duo warns third-party data breach exposed SMS MFA logshttps://www.bleepingcomputer.com/news/security/cisco-duo-warns-third-party-data-breach-exposed-sms-mfa-logs/>T-Mobile Employees Across The Country Receive Cash Offers To Illegally Swap SIMs: Reporthttps://it.slashdot.org/story/24/04/16/008241/t-mobile-employees-across-the-country-receive-cash-offers-to-illegally-swap-sims-report
>be me>using a middle man app that processes payment>app built on salesforce>open app to reply to a message >suddenly logged in as another user>can see user's real name and user ID>can see payments made to user>can see jobs the user is currently check in on>open a support ticket to alert the company >support ticket is open as the user I don't like it. what should I should?how in the fuck does this even happen? I somehow got the same oauth token as another user?
Banks start using purchase history for targeted adshttps://www.youtube.com/watch?v=VCiXu6S6vEw
>>100026854The boomer generation should be banned from computer use, honestly.
>>100029425Get the fuck out of an MSP, ASAP. Your cybersecurity career is over if you associate it with the rushed work those places do.
>>100035437Everything will suck...and you will like it
>>100038288Everyone over 40 (50 at most) should be banned from computer use. IQ nosedives after 40. It's not a generational thing, it's age related. Dealing with them in the workplace is a fucking nightmare
==========Music=========>https://youtu.be/hUumqcL7f2o
The royal hunting grounds are aaalways forbidden!https://youtu.be/8ROqdZWwQp8?si=PZt8VFKJLdO33jfA
I am not smart man. Is it possible if I buy a used Windows laptop for the guy to implant malware or something of the sort into the laptop that exists even if I reinstall windows?
>>100041238yes if you get a router or boot virus(which is rare) you will get a virus even if you reinstall windows.
>>100041264It's very unlikely someone would put this on used laptops correct?
>>100041280im just talking from experience. I got a router virus. I wanted to change the router but the internet company doesn't want to. The thing is there is no way to mask traffic. The virus sends back information to the hacker. Those packets can be sniffed. There is a way to mask the ip. But that can be cracked. And that's what a buddy of mine did for me. I'll track him down soon enough.
>>100041318How did you get the virus and what is the goal of the hacker? Can't you just change your own router?
>>100041280If you are getting a used laptop I would wipe the disk, overwrite it with random data, and then redo the whole MBR from scratch. But that's me.
>>100041332the goal of the hacker is that he's some butthurt guy.
>>100041349This is very easy to do, btw, you don't need any fancy knowledge. Just a USB drive with a live ISO image of any Linux OS of your choice and a couple of bash commands.
>>100041238Of course, simply reinstalling Windows is not enough, the computer must be cleared with a security suite, they can get to that malware. There's also firmware rootkits, but they are rare.
I am more of a hacker than any of you, and I use macOS. Deal with it.
>>100041349>>100041368Can I do this with Windows 10 installation media USB? Just delete the hard drive and then install Windows again?
>>100041461The smartest Windows user.>Is it safe to reinstall Windows?>No.>Would reinstalling Windows help?
>>100041637>redo the whole MBR from scratch. Aren't I doing this exact thing but with a Windows installion USB instead of Linux? What's the difference? I'm booting into the USB
>>100041667Sure, sure.
>>100041667You are not rewriting the entire disk with random data, which you should do, to:1. Ensure you are eliminating every possible trace of rootkits and the like.2. Ensure there are no files leftover from the previous owner which could be illegal or malicious.I'm not even sure Windows Install erases the EFI partition. There may be a rootkit there.
Tucker will soon release interview with Pavel Durov. God I hate that scum.Russia blocks Amazon Web Services and GoDaddy.Chief of one of the local cybersecurity FSB divisions was jailed for 9 years, fined 3,4 million dollars and had his property confiscated. Instead of fighting hackers he sold them his protection. Oopsie.
How could i work out if my anti detect browser is able to capture my logins and passwords?It doesn't look like they installed their own ssl certificate but i don't know if you can spoof it to look like the intended one if you have full control of a closed source browser. I'm a networking brainletUsing dolphin anty for reference
>>100042386You're not supposed to use that browser for personal use.
>>100042987It's for work related stuff but i need to use proxies and keep a consistent browser fingerprint for each profileBut either way i would rather they weren't collecting my login info in the background but if there's no way to be sure then what are my options?
YEAH I'LL GIVE UP MY WEAPONSWHEN YOU LIBERALS PASS A LAW SAYING THAT I HAVE TOOhttps://youtu.be/CKynRcwHmOk?si=1TDAW_RK2Rw8m74I
>>100044096SORRY I MENT TWO
The snowman is worried, is he right?https://cointelegraph.com/news/nsa-days-from-taking-over-internet-whistleblower-edward-snowden
>>100046731I've seen similar law being proposed in Russia, I guess it's the latest... fed.
>>100046731Probably right honestly
>>100043050It is even worse than that, they will probably use stylometric analysis to track people. Back in the day the best and brightest worked on the space race or vital defence tech. These days they are in the surveillance economy
>>100029368sup fren, I'm the cybd guy. I must tell you cybd is on pause, again (never quite resumed desu...) because the job market is festering cancerous shit and I can't afford to focus on anything but finding a job rn. The least I can do in the meantime is to share the repository. When I'm back, new commits will appear, so keep an eye out, or you can also send me an email and I'll let you know when the project is back in shape.Here's the repository: git (dot) bbergeron (dot) xyz/cybd/Godspeed, and keep doing what you do best.
>>100048942Good luck in your search! Shit happens.
Sorry to hear about the job situation. Everyone I know is going through some kind of difficulty, including myself. Frenly reminder that adversity builds strength of character, and you are the captain of your destiny. You will rise from your challenges a better, wiser man. Excelsior! Deep /cyb/ Radio AM 404 - International will ALWAYS be powered by cybd, the cyber radio daemon!===============Music============>https://youtu.be/DoCasZ3HrRo?t=107
>>100048942This hea post wuz ment fer yew...>>100050155
>>100048942>Godspeed, and keep doing what you do best.Sorry that happened to you, I can definitely relate to how much of a rotting corpse it can be, God speed anon.>>100050155And I hope that your difficulties have eased with time :))
>>100048942We are definitely entering hard times. Politicians are always showing thngs are well, but in reality, ordinary people face a bleaker reality. An imploding job market is just part of this.We have to hope that hard times create the hard men we need to get us into the good times.
There is a huge race to dominate the latest node for semiconductors:https://archive.is/7hRRxSo how much is research and development, and how much is hacking and espionage?
>>100052578Talking about job market, Samsung workers are striking.
>>100053173... while the Chinese workers are driven like slaves.Will AI eliminate any of those 35000 jobs?
>no one in this thread talking about the new boston dynamics robothttps://www.youtube.com/watch?v=29ECwExc-_M
>>100053682>AIYou mean capitalism?
Why is it so hard to have a browser on Android 6? Bromite died over a year ago and the guy who forked it into Cromite won't support Android 6, even though Bromite had no issues supporting it. Brave now requires Android 7 as a minimum; same for DuckDuckGo. Even the Samsung Browser stopped updating itself over a year ago and requires Android 8. My last resort is to use Firefox (specifically Klar), as it still supports Android 6 and runs somewhat decently. And no, I'm not upgrading my phone. I can't find a modern phone with 4.5" screen like I have now.
>>100057141You need a Cubothttps://www.gsmarena.com/results.php3?nYearMin=2018&fDisplayInchesMax=4.7&sFormFactors=1&sOSes=2&sOSversions=2950,2940,2930
>>100057689>I've bought this - received it today. So disappointed. The screen is dull and the battery drains like water in a bucket with a hole. Learned my lesson with this brand.
>>100056781B-but isn't the Chinese system the true communism that the intellectual elites have always dreamed of?
>>100054966Great stop motion animation!Can't wait to ride with this thing on the Hyperloop!
>>100023256Yeah, add this shit to general, ty
https://www.youtube.com/watch?v=_VchUAaxonA
>>100060639>Kiss from a roooose but like with neon.
Google fires 28 employees involved in sit-in protest over 1.2B Israel contract.
>>100060831It is hilarious how these megacorps encourage political correctness ... until it bites their bottom line.
does anyone here remember a website that was created in the wake of the Snowden NSA leaks as a list of alternatives to cucked software?
>>100061036There are many such lists, this one you can expand on too if you wish:https://wiki.installgentoo.com/wiki/Privacy_friendly_frontends
>>100061482nvm found itprism-break.orgi know there are tonnes of those now, just wanted to remember the og one
>>100026988It would be difficult to detect on a home installation of linux, as you likely don't have any AV (lol) or EDR software installed.You could look at system logs if you know the IOC's, but considering you asked the question ill assume this isnt possible.
>>100061534>Help make mass surveillance of entire populations uneconomical!Could that really work?
>>100020665protip: you still have to bypass AV if you want an employee to execute some shitty file.Also, most corporations have email filtering now, so you'll need to bypass that too for a phishing attack
>>100061687The amount of data generated is growing exponentially, and I vaguely remember a claim that each year now generates as much new data as all the years up to then have, put together. At some point the surveillance companies/agencies will have to buy hard disks on a continuoing and phenomenal rate, and trawling this will be utterly unfeasible.That already happened with satellite imaging, it is years since the analysts were able to keep up with the volume of imagery, so much is just going into archives for possible later comparisons. This has continued to grow, and now in multi spectral imagery and later also radar imagery. It is just overwhelming. And AI has not been sufficient.
>>100062373Ah, interesting.
>>100062373I've thought this for a while now. The effort it takes to go through just a single twitter profile with 100k tweets and 300k likes, bookmarks etc. kek.kikes didn't know what they were doing when they started collecting endless data. just creating a stick for their own backs like they always do, stupid fucking cunts.
>>100062448Based!
>>100057141Glowies have infiltrated and gatekeep it.
The dude sees binaries visually: https://www.ted.com/talks/chris_domas_the_1s_and_0s_behind_cyber_warfare
Realistic security:https://www.gocomics.com/brewsterrockit/2024/04/16
>>100063270Ted Talks... Are you 20 years old? Take it from an old man, they're worthless.
>>100064039>he doesn't know the guy in the videojust give up already
>>100064331Whoa, is he like Dawkins????
>>100064039Why are they worthless?
>>100064751They're science and progress flavored background noise. These are podcasts for people who don't like sports.
OPEN UP FBI
>>100062448Collecting everything was always an obsession, just as with excessive secrecy. With Internet they were able to do continuous trawling of ever growing piles of data. And yet, as we saw with the Boston bombers, they do not have the capacity to see plots unfolding, only catch after the fact. This means they are easily blamed for not having done the job when they were paid vast sums to collect all this data. To wit: the Norwegian parliament was in lock-down after a threat posted on >>>/int/nor earlier this month but they still have not found who made that post. And the lock-down was way late.
>>100048942Your personal site soulful, fren. I found this video yesterday, and it made me think that this is what programming is like from a visual/physical perspective:>https://youtu.be/7MluikyEQF4?t=28==================Music===================https://youtu.be/bAdqazixuRY
>>100066819Is that a Kuka that I spy? https://youtu.be/lv6op2HHIuM?feature=shared
>>100068059Why, yes, but it's powered by cybd, the cyber radio daemon. How did you guess?
>>100068285I come across a lot of strange things through my work.
>>100070149Like what?
>>100070226Like some of the === News postings I make.
A whole rainy week. Cookies instead of neon, some dystopian news. Russian Ministry of education removes several anti-Soviet books from the school program and ads a book by some priest who praised Stalin and has ties to Putin.
>>100061482I thought Nitter was completely dead?
>>100071264Looks like it.https://tux.pizza/posts/nitter/
>>>/g/cyb/sec/pri
>>100072146Fucking sad
>>100072650faggot
>>100023793Here we ho again!
>>100071264>>100072146>>100073580Try the /poast/ instance:>https://nitter.poast.org/EthicalSkeptic/===========Mouse-eek=============>https://youtu.be/z9e8CPULjW4
Warwick Davis's wife is dead-bump.
=== /cyber/ Headlines:>Ubuntu 24.04 Boosts Performance, Outperforming Windows 11 On The AMD Ryzen Framework 16 Laptophttps://www.phoronix.com/review/framework-16-windows-linux>Cops can force suspect to unlock phone with thumbprint, US court ruleshttps://arstechnica.com/tech-policy/2024/04/cops-can-force-suspect-to-unlock-phone-with-thumbprint-us-court-rules/>Frontier Communications shuts down systems after cyberattackhttps://www.bleepingcomputer.com/news/security/frontier-communications-shuts-down-systems-after-cyberattack/
>>100020665You can automate it. Most phising is super low effort and wide scale. Some people spear phish but most is retarded and only catches the retards. But think of how stupid the average person is, and then realize half of the people out there are even stupider.
Hello guys, I wanted an advice about having a class about cyber sec with 15 years old children.I've been called to do a one time class about cybersec and I wante dto discuss what would be the best to teach children.I had in mind these points: - Importance of strong passwords, password managers etc- Explaination of online tracking (cookies, tracking apps like TikTok, Google etc)- Repercussion of cyberbullying, posting photos of others online- Importance of End To End communicationDo you have any advice to talk to zoomers about cybersec?
The farther I get into cybersecurity, and computers in general really, the more I realize Network+ (not A+ or Security+, fuck them) is the most underrated cert out there.
>>100077806oreilly network warrior is the goat reference
>>100077794>Importance of strong passwords, password managers etcJust don't start with this, or they'll fall asleep. Tell them about password entropy and that there are tools online to estimate it, they're fun to try out with silly passwords.No personal data in account names or passwords, do not fill every bio field that you are presented with. No Emily15.Sexual predators. That pretty girl/boy that you are websexing is definitely a man who rans a video, the whole thing is being recorded and can be used to blackmail you. Don't be afraid and go to parents/authorities.Pornography isn't funny, that Pornhub jingle hides things like abuse, human trafficking, drugging, exploting people with mental disorders.Bank will never ask for your personal data.Anonymous Image Boards as a type of online forums.The right to obscurity, that they can demand removal of their data.
Up.
bump
It is now known how hackers were able to steal data of 300k people who applied for work in the former Russian McDonald's chain last year. They've installed a Raspberry Pi with a modem, a memory card and a networking switch into a self-ordering kiosk.
Has there ever been a confirmed case of law enforcement using ADVERTISER tracking to track down anyone? I was talking to a guy who was super paranoid about that, but AFAIK, law enforcement has only ever done either:- search warrants/taps against service providers- stingray-type eavesdropping on physical-layer protocols- malware on compromised servers- NSA stuff that normal cops never get to seeI feel like advertiser-type tracking falls into a middle ground where they don't bother in legal searches because courts will throw it out and it's not useful in finding specific targets because there's too many normies that pollute the search, am I wrong?
Does anyone know a Newpipe equivalent, for spotify? A pirated spotify client?
Vagina? No thank you, MOM, I'm hacking!
Hey /g/, are Wi-Fi/Bluetooth jammers still a thing that exist and people can build?Everything I seem to find online seems to be either a scam or some ancient article talking about exploiting some basic security hole that's probably long patched since.
>>100084622Why would a jammer use an exploit? I thought they just transmit some bullshit that messes up frequencies. Anyhoo, I tried searching and mostly found Russian articles like this one:https://habr.com/ru/sandbox/208806/
can someone explain the RCMP / CSIS meme to me?is it because of kirt?
>>100019893Do antiviruses use statistic analysis to find unusual instruction type distribution? Or maybe some unusual structures or something?
itoopie my beloved
>>100077794Is there good pussy?
>>100085908You know what's better than pussy? A really good book.
I recommend all new hackers and those of you interested in certs watch this.https://www.youtube.com/watch?v=m4QO5jyEw2%45&t=117 Embed isn't working. Copy and paste the URL.
>>100086094Don't do it it will install Linux!
Chinese government asks Apple to remove Threads, WhatsApp, Telegram and Signal from Chinese App Store.
>>100085212Which meme?
>>100025442Most of OpenJS members is not used or relevant. I would love to know if Apache has the same issue.
Is incogni a scam or legit? I've gone through and removed info manually before but I'm sure there are some brokers I missed.
>>100087834Straight up scam. They don't really cover as many data brokers as you would think. You're far better off just going through manually and checking back every 6 to 12 months. I used this last and it worked great.https://pastebin.com/XuhzSzQq
>>100088032Yea that's the one I used last time as well. Good to know its a scam. I remember whitepages I had to contact the better business bureau because their remove info request page is "broken." These companies are so unethical
>>100088493I made an updated list since that paste is about to expire.https://pastebin.com/VqhVzfwe
Anybody wanna buy a Cybertruck, cheap?>https://techcrunch.com/2024/04/19/tesla-cybertruck-throttle-accelerator-pedal-stuck/===========Music============>https://youtu.be/u9o1OYX5UOQ
The LSD challenge is on today! Starting 12am Washington EDT. If this time sucks then let me know, it's not my fault for being Australian.Pity I've had about 4 hours of sleep, but hey - can't control the weather!Other option is do it next weekend and I match it up to US timezones from AWST a bit better. Nobody likes flakes though, except picrel. Those are delicious.Let me check the previous thread after I've gone shopping. Fruit, especially market fruit, is good for you.
>>100081873Depends on your threat model. I don't like having data circulating that could be fished by a private actor due to the circles I hang out in, and frankly, minimizing data exposure is good INFOSEC practice anyways.
=== /cyber/ Headlines:>Mozilla Finally Begins Offering Firefox ARM64 Linux Binarieshttps://www.phoronix.com/news/Mozilla-Firefox-ARM64-Nightly>Philosopher Daniel Dennett dead at 82https://arstechnica.com/science/2024/04/philosopher-daniel-dennett-dead-at-82/>Cybercriminals pose as LastPass staff to hack password vaultshttps://www.bleepingcomputer.com/news/security/cybercriminals-pose-as-lastpass-staff-to-hack-password-vaults/>Linus Torvalds on 'Hilarious' AI Hypehttps://linux.slashdot.org/story/24/04/19/1944235/linus-torvalds-on-hilarious-ai-hypehttps://www.zdnet.com/article/linus-torvalds-takes-on-evil-developers-hardware-errors-and-hilarious-ai-hype/
>>100030542I think HTB academy would be just fine depending on what role hes in if its blue team you could get away with CDSA from hack teh box academy and PWF from TCM sec I've learned way more from those two than any of the compTIA bullshit certs
>>100090303>Philosopher Daniel Dennett dead at 82Here's a story about what would have happened if Daniel Dennett did LSD. Dennett never did any psychedelics throughout his entire life.https://qualiacomputing.com/2020/08/06/that-time-daniel-dennett-took-200-micrograms-of-lsd/
>>100077806I find myself falling back on things I learned after having taken net+ all the time, I just think of it as the backbone of everything I know.If I see something foreign but can relate it to something in terms of networking, it allows me to make a lot more sense out of the situation A+ is utterly useless and cant believe there are two different tests you have to take to get the certsec+ is mostly buzzwords I learned hanging out on skid forums when I was 14 and was a breeze>>100085419They just use common signatures found for a list of virus's that are written in the binary (break open hxd or some other static analysis tool, and you can find and write your own signatures to play around with in yara/zeek)
>>100019893Do you ever hang out on lainchan? very slow board but I enjoy seeing whats happening there now and then
Are ancient computers cyberpunk?https://www.youtube.com/watch?v=qqlJ50zDgeA
>>100020665Because you are either exposing your true identity or trying to gain the trust of an IT worker with everything to lose based on his trust of you, which is nonexistent. Also, youd have to get an admin with high level prividelges, also, any root/admin functions are using done by bring out the credentials under lock and key
In school for cybersecurity with certs and find it very engrossing, but the boomer problem remains for experience. From my limited research in the job market, they are desperate for IT/Cybersecurity, and Information Security seems to be particulary lacking in skilled employees
>>100089586Ok, this is going to be boring as fuck if I don't stream it. Isn't it? Tips on how 2 stream (hide desktop etc) as I've never streamed in my life lmao. I also need to set up a camera that actually shows something, like my hands. Anyways...Anyone got an idea on how to fuck my uni cybersec department over with the "you must have a smartphone for MFA" shit? I dropped my Pixel (shit phone, shittier every fucking iteration) and the screen fucked up. Now I run a feature phone. They can pay for a smartphone, or better yet, a security tab (they can set it up, fuck them). The whole "you must use a smartphone, it's an expectation to own one" schtick is disgusting. I can't think of anything else that has such a rigid normative expectation. Also fuck Google for making the screen repair kit $450. It's probably made in China for like $20 - but pricing it at that would not only reveal their enormous margins, it would devalue their (crap) products.Tempted to get a pinephone or Pixel4a and just drop PostmarketOS on it. Fuck. Google.
>>100091230>https://qualiacomputing.com/2020/08/06/that-time-daniel-dennett-took-200-micrograms-of-lsd/Okay, nice. Interesting about consciousness. A colleague guided me to this yesterday: https://www.pdfdrive.com/the-master-and-his-emissary-the-divided-brain-and-the-making-of-the-western-world-d178382023.html picrelAlso spoke about axial nature and the shift to agency in literature around the time of Homer. Alternative explanations abound - including rewriting history (literally), which is more plausible than a global shift in self-agency in texts.I have a pdf open on my work PC, so I can link that later if anyone is interested.
>>100090303=== /cyber/ Headlines:>Two Major ISPs Threaten They'll Stop Complying With US FISA Ordershttps://news.slashdot.org/story/24/04/20/0254226/two-major-isps-threaten-theyll-stop-complying-with-us-fisa-orders
>>100092306why did 2 isps have bigger balls than all the others?
>>100089434Hell no, I don't want my fingers chopped.
>>100091419>They just use common signatures found for a list of virus's that are written in the binary (break open hxd or some other static analysis tool, and you can find and write your own signatures to play around with in yara/zeek)Sure, but they also use heuristic analysis, so i want to find out what tools exactly they use.
>Man Who Leaked Billionaire’s Tax Returns to Expose Unfair System Given 5 Years in Prisonhttps://archive.is/tbxE6Five years, man!
>>100078696after you nigger
>>100020655creep.js is better for this kind of thing. the big point is to have multiple browsers. brave's randomized fingerprint can easly be ANOTHER fingerprint datapoint. same as tor etc.websites don't have the ability to track you across the WHOLE internet. but google does.ideally keep a chrome browser where you are logged into google for only google stuff, and use another browser for everything else.basic browser isolation and google won't get much data besides what you do on their services
>>100020655>EFFEwww, did my browser just got tested by a Cali organisation? I better test it again... FOR AIDS!
>>100092995They're just telling the government to hurry up and prolong the law.
Bumpty. Man I always forget about the weekend slowdown.
>>100093745What's wrong with EFF?
>>100076402This is so true, it makes me sad.
>>100019893Should I run a IDPS like Snort of Suricata for my homenetwork?
>>100096985They're based in San Francisco. That means they're gay.
>>100085761Are they still alive and kicking?
>>100032123is that render made in gmod? very kino
>>100088032>>100088670Thanks for your work on this, these links are incredibly helpful!
Boobs I mean boobs I mean bump.
>>100026854Cyberpsychologists are wanna cybersec personnel. You are a waste. KYS
>>100100904>Cyberpsychologistskek the idea that such a career exists to give "jobs" to lazy zoofags is so ridiculous
>>100092306=== /cyber/ News Alert:>House approves sell-or-be-banned TikTok measure, attaching it to foreign aid billhttps://text.npr.org/2024/04/20/1245594589/house-approves-bill-tiktok-banhttps://tech.slashdot.org/story/24/04/20/1818209/sell-or-be-banned-anti-tiktok-bill-passed-by-us-representatives
>>100101380Fascinating how politicians attach all sort of things to unrelated bills
>>100101396Like our future to the dollar bill.
BUT THAT'S WHY WE GON BOMB EM WITH MINI DRONES YEAH
What game console does /cyb/ have? I got a modded yellowed Japanese Wii I got for cheap in a auction with RVLoader, it allows you to boot games from an external USB hard drive and allows you to play games that would require waggling with the GC controller instead.Thinking of getting a PS2 to mod next.
>>100102055A pink DS with a Hello Kitty sticker, duh. It's also my /Linux/ and /Programming/ console.
About hacking attacks on American infrastructure.http://archive.today/UPh14
>>100103849Will they get more and more common?
>>100104812Why even phrase it as a question?
Hackers Leak Witcher 3 And Cyberpunk 2077 Source Code - Mental Outlawhttps://www.youtube.com/watch?v=Gpztzf5i1So
>>100106578Related Bleeping Computer article:https://www.bleepingcomputer.com/news/security/hellokitty-ransomware-rebrands-releases-cd-projekt-and-cisco-data/
whats the best way to get a cyber security job if i have no experience?
>>100106683hack their gibson and tell them about it
>>100098089Incredible argument you got there...
>>100104812No, the copper wiring thieves will prevent that.>>100106683Have some IT experience and then do the >>100030542
>>100106605>HelloGookiedamn racist white piggu
I have a question if there is a difference security-wise between the following.>Securely deleting files>Deleting files normaly and securely deleting empty space afterwards
Is there any point in using a "more private" email service like Proton/Tuta instead of Gmail if you're gonna use it for stuff like Amazon or Uber eats where they get to know your address? Would it actually decrease your privacy in other uses of the Proton/Tuta email, so it might be actually better to use your Gmail with address-knowing services?
>>100109885Yeah, you can FORGET to shred the empty space later. Also, be aware of things like this:https://ubuntuforums.org/showthread.php?t=1662936>>100110097Proton is not secure (someone post it).>>100110097Don't use your shitposting email for your business.
https://youtube.com/shorts/ARvJrzqUt9k?si=pJx6DerVBle--bn1https://youtu.be/uqcYZQ6u96c?si=c07iacOeoJc9uS39
>>100110312I don't expect Proton(or any email) to be "secure", I mean a "more private email" in the sense that it's not a company that makes their business collecting advertising intel on you and tying it in to its other businesses and partners.
Bump.
>>100110312Agreed, better to overwrite the space with garbage
>>100110312>Proton is not secure (someone post it).https://encryp.ch/blog/disturbing-facts-about-protonmail/https://news.ycombinator.com/item?id=29063779https://arstechnica.com/information-technology/2021/09/privacy-focused-protonmail-provided-a-users-ip-address-to-authorities/https://www.theregister.com/2021/09/07/protonmail_hands_user_ip_address_police/https://www.wired.com/story/protonmail-amends-policy-after-giving-up-activists-data/https://digdeeper.club/articles/email.xhtml#ProtonMailhttps://scholar.google.com/scholar?cluster=18327644021252219658
>>100113770
>>100113770>>100113785Thank you and based!
>>100098821Yes, fren.===========================>https://www.hindustantimes.com/world-news/us-news/fbi-director-christopher-wray-claims-chinese-hackers-waiting-for-right-moment-to-attack-us-infrastructure-101713508881222.html>https://www.independent.co.uk/news/world/americas/china-hackers-fbi-wray-infrastructure-b2531182.html>https://www.reuters.com/technology/cybersecurity/fbi-says-chinese-hackers-preparing-attack-us-infrastructure-2024-04-18/https://vimeo.com/505537963Thread-related>>>>/pol/465697251=======================Music======================>https://youtu.be/luocPAWBZ_o?t=33
>>100114800>Chink army invasionChina is not communist. You know who are? Jews.And before the February revolution, both Moscow and Petrograd had artificial food shortage... America is on the verge of 1917.
>>100113770>https://digdeeper.clubWhat is /cyb/'s opinion on Dig Deeper? Is he based? Schizo? Something else?
>>100115141Lead by openly hostile trators and bald-faced liars, it seems like dark days ahead, indeed. ----------------------------------------------->https://youtu.be/8AHCfZTRGiI
>>100115246>Vitamin D Wiki - An absolutely insane life project of a single guy (?). The amount of admiration I have for this site cannot be put in words. Everything you have ever wanted to know about Vitamin D - the most important nutrient for human biology - is here. And then ten times that, if you are still hungry :D. Beautifully presented and fully referenced, even includes a bunch of charts, graphs, etc for pretty much every relevant issue. Hey, Vit D Wiki even works without JavaScript at all. S tier site, a true gem.>Includes some of my favorite franchises like Pokemon, Ace Attorney, and Undertale.He sure is autistic.
https://youtu.be/p93lMyCCYig?si=dI1vf6axCji0CvvA&t=255This point has been scratching at my head for a while let's say we do reach a cyberpunk like society how does it continue? If it's such shit I doubt there would be many people willing/able to afford to raise children. And even if they could the societies that are usually defined as cyberpunk are so deadly that most kids probably wouldn't get past 14
>>100115925>the discussion of anything and everything related to cyberpunk culture, cybersecurity, and digital privacy.Everyday I am continually reminded that one of these things is not like the others
>>100115925People don't stop making children ever, that's why we're here after the Black Death and WW2. If they die easily , we just get used to it, become more hardened. Besides, I'm sure we'll have artificial wombs by then. Heavily regulated, probably.Sure makes me really uneasy thinking about current types of folks having access to artificial wombs. Will it be like the beginning of the last century, only the slaughter will be silenced by lab walls? Millions born only to die to maniacs, pedophiles, organ sellers, cosmetics makers.
>>100115925In traditional shitty societies children are cheap unqualified labor, first and foremost. Is there no demand for it in your favorite flavor of cyberpunk? Is anybody willing to hire or more directly buy from their parents replaceable and biodegradable underage handymen, foot soldiers, whores, keyboard monkeys? Are juvenile gangs economically viable?I'm not going to watch your entire video, but it appears to be about Bladerunner. It makes things simpler. In Horselover's story the humanity on Earth was not planning to continue. It has this numbly paced "end of the party" feeling to it, similar to Cat's Cradle or the last time you talked to your dad.
>>100115758>Vitamin D Wikilmao just walk outside
Is Qubes a honeypot
>>100118625Why would it be? So far the system seems quite stable but as always, build it from source with a trusted compiler for max safety.
>>100019893How hs student should go about becoming hackerman?There are bazillion of books but most of them repeat each other
>>100119354http://catb.org/jargon/html/online-preface.html
>>100119354Practice. Its the only way
>>100119402Duh but where should i begin with?I only need to know where to start and the rest will be much easier, feels like shit when you want something to do but can't figure out how
>>100119441Start with hacktthissite and then move on to trying it on your friends
>>100114800>>>/pol/Go back
any tips before running OSCP?
>>100109885>>100110312Does this article only apply to shred command or in general and to standardnized deleting methodes too?
I'm 24 and about to go to school for Security Risk Analysis. Should I leave my current job for something in security that pays better or should I continue to let my current employer pay for my degree (I'll graduate in Spring 2026).
>>100121331continue to let your current employer pay for your degree
sec+ and pen+ have got to be the biggest scams I've ever seen. sec+ is for MBAs who accidentally found themselves in IT and how can anyone take pen+ seriously? Congrats, you can use tactics used 10 years ago and are heavily guarded against now while the real deal is already in your servers because of an exploit they found while you were patting yourself on the back for using john the ripper
What are some good certs to work towards? Aiming towards working for bio / genetics companies
Can anyone recommend me way to learn how to perform ROP chaining and stack smashing?
>>100101380=== /cyber/ Headlines:>GitHub comments abused to push malware via Microsoft repo URLshttps://www.bleepingcomputer.com/news/security/github-comments-abused-to-push-malware-via-microsoft-repo-urls/>Tesla Cybertruck turns into world's most expensive brick after car washhttps://www.theregister.com/2024/04/20/cybertruck_car_wash_mode/
>>100121260It's literally shred's manual page. Other methods on other systems will also have a manual that you can consult before use.>>100121475This.>>100122894>>100030542
>get new laptop>run tails from usb stick>check network traffic>upload same as downloadI've never used tails before. is this normal?
>>100087834Well, I have incogni for 3 months now and don’t have any complaints. It may not catch everything but overall it works well for me.
newfriend herewhich tool do i use to monitor the network traffic on a machine? it's very likely a machine form my internal network got infected but i'm no familiar enough with such tools to track which one it is
>>100126465You should read up on how Tor works.
>>100127217Wireshark
>>100127285thanks, i guess i'll somehow figure out how to use it
>>100127217Yeah, search for wireshark here:https://wiki.installgentoo.com/wiki/Cybersecurity_-_basics_and_armoryAnd you will find other tools.
>>100077794>i wanted an adviceshow them malware in action, exfiltrating browser data etcwill be more fun
>>100127217iftop
https://youtu.be/3ZEun2Auayo?si=Bz7NzDnQqKkoHaI6>On April 12, 2022, Griffith was sentenced to 63 months imprisonment for assisting North Korea with evading sanctions and is currently in a federal low-security prison in Pennsylvania.[5][6]
=== /sec/ News:>Building the Future of Smart Home Security >Engineers must invent new technology to enhance security products’ abilitieshttps://spectrum.ieee.org/smart-home-securityIt is a sponsored article, but we were on page 7.
>>100128275I think their idea will only make things worse
my smart home security involves not running any code written by you retards
>>100129661That's it! Spread your buttcheeks for FAGMAN like a little bitch!
my home security involves fertilizer, a cardboard cutout and my readiness to die
>>100038335trust me i know, was laid off from previous internal position so i came back to this company. regret it. shit pay/overworked/sweatshop
>>100129678you niggers ARE fagman
>>100130230Did you tell someone your credit card information sweetie?
>>100130188If your security does not involve large high power radiation, a 2 ton lead cutout and your readiness to see your enemies evaporate before your eyes, you are doing it wrong.
>>100041135https://www.youtube.com/watch?v=_K-FES3tElgCOMIN' ATCHU, ALL THREE DEES
You guys getting murdered for your hacking is a possibility. Be aware of that.
where is that AT&T leak posted? what forum was it, as it shows breached as being seized....and I want to download it and be able to search for my own info and add it to my collection of big corperations fucking up again.-anon datahoarder
>>100131572Ah shit, Hillary Clinton knows about /g/!
>>100131572>me>hacker that is like calling a firefighter an arsonist
What are some possible explanations for why most Cloudflared sites only allow Tor traffic if you use the Tor Browser? Why allow a more fingerprint-resistant browser like it, but block something much less common (and easier to fingerprint) like Pale Moon? I have heard two rationales>CF thinks anything not Chromium/FF is a webscraper>Tor Browser is a honeypot
>2024>esim>mesh netwrok>network scanning triangulation>4/5g triangulation>imei and device id recorded by both apple and googlethis is stupid. even if you have a retarded rom like grapheneOs you still get spied on by the hardware itself. if you get a normalfag one like lineage you still use google dns and phone home to google. google will implement apple's mesh network and after that, 100% of the devices will be tracked. with no internet. no battery. BLE technology that more and more iot devces benefit from.what to do bros.i feel stuck. there is no escape.should i accept goym fucking me in the ass and cope with the 'threatmodel' pillbasically getting spied on doesn't matter if i watch pewdiepie, but it matters if i search for abortion while logged in to my goym approved device
>>100133524tor is easiest to fingerprint. you can't hide tor.any browser except chromium is abandonware.
=== /cyb/ News:Flying cars is a staple of science fiction, including /cyb/ such as Blade Runner. So how is it doing?>Chinese flying taxi sector claims global lead thanks to regulatory supporthttps://archive.is/bSeu1>A Shanghai flying taxi company says that China’s “low altitude” industry is edging ahead of western rivals, thanks to more supportive regulators, technological breakthroughs and cut-throat competition in the Chinese logistics sector.>The total market created by electric vertical take-off and landing, or eVTOL, aircraft is forecast to be worth $1.5tn a year by 2040 in a base-case assessment by Morgan Stanley analysts, with potential customers across airlines, logistics, emergency services, agriculture, tourism and security operations.I still want a jet pack.
>>100134021Burner phone with a cantena directed to a public wi-fi 20 miles away.You can also spoof your IMEI.
>>100134153Well the only thing you're getting young man is a beating.
>>100134870so this is your idea of how real life phone comunication should work? nigger you will get beaten up in 3 seconds the moment you pull up your antena from your asscrack.
>>100134930>beating>>100134972>beaten upIn other news the whipping will continue until morale has improved.
>>100134972WHY WOULD I PULL IT OUT IN PUBLIC
>>100059631Baker, don't forget.
Also>phone communicationsDo we even still need it?
>>100135308yes, I can't search for jobs without it, businesses want phone numbers
>>100135262phones are made to be portable.
>>100135313Well the only thing they're getting young man is a beating.
>>100133524Tor IPs are easily spotted even with fingerprint-resistant browsers. Their filters likely flag anything that doesn't match a relay whitelist as spam / suspicious traffic, as Tor+generic device info = possible zombie device being covered up.
>>100134021Buy devices directly from the manufacturer with cash with your main device in a faraday cage while masked up in a densely populated place in a state not requiring SIM ID. Cage the purchased device, load up an E-SIM with cash or disposable card not connected to your identity, and only set it up in a densely populated place while your main device is still caged. Never use both phones in the same areas unless it's a public, populated area, and don't ever use them simultaneously. Keep them powered off unless in use.>>100134870Depending on your threat model, that could get you spotted pretty quick if a glowie rolls up reading signal strength. It'd have to be download only, which isn't feasible with any protocol (you'd still have to fetch). Best case, you mirror what you need and terminate your connection, moving locations frequently and using different networks at different distances from your center point. You'd be better off tapping a main line via utility access and using it temporarily; at least that wouldn't be discoverable via sniffers.
new bread baking>>100136047>>100136047>>100136047
>>100136058desperate faggot