Thread #107913571 | Image & Video Expansion | Click to Play
/cyb/+/psg/: Cyber-Punk/Security & Privacy Anonymous 01/19/26(Mon)20:27:19 No.107913571 [Reply]▶
File: Fisheye Placebo.jpg (98.6 KB)
98.6 KB JPG
"The further a society drifts from the truth, the more it will hate those that speak it."
--George Orwell
>Cyberpunk
The FAQ: https://sizeof.cat/post/cyberpunk-faq/
What is /cyb/erpunk?: https://pastebin.com/pmn9vzWZ
How do I into /cyb/erpunk?: https://pastebin.com/5tpNFQds
Huge list of cyberpunk media: https://sizeof.cat/post/cyberpunk/
The cyberdeck: https://pastebin.com/7fE4BVBg
Cyberlife: https://jinteki.industries/files/cyberlife.7z
Bibliothek: https://www.mediafire.com/folder/4m5hd2065hde8/Bibliothek
>Privacy
Tools: https://www.privacyguides.org/en/tools/
Hitchhiker's Guide: https://anonymousplanet.org/guide/
Hardware: https://ryf.fsf.org/products
Frontends: https://igwiki.lyci.de/wiki/Privacy_friendly_frontends
OSINT Guide: https://inteltechniques.com/index.html
Firmware: https://libreboot.org/
RMS on Facebook: https://stallman.org/facebook.html
Have I Been Pwned: https://haveibeenpwned.com/
>Security
"Shit just got real": https://pastebin.com/rqrLK6X0
Cybersecurity basics: https://igwiki.lyci.de/wiki/Cybersecurity_-_/sec/_guide
Basics and armory: https://igwiki.lyci.de/wiki/Cybersecurity_-_basics_and_armory
Learning/News/CTFs: https://igwiki.lyci.de/wiki/Cybersecurity_-_Learning/News/CTFs
/sec/ PDFs: https://mega.nz/#F!zGJT1QQQ!O-8yiH845GN26ajAvkoLkA
EFF Surveillance Self-Defense: https://ssd.eff.org/
Other library: https://mega.nz/file/UCgEGAjb#rwNcnMAQCUUbSp8supsFvn9QEHCWUW86eLcZa16Z G4Y
updated Data Broker Removal Links:
https://pastebin.com/YDP7yihg
https://pastebin.com/raw/YDP7yihg
Updated Firefox Zero user.js
https://pastebin.com/PRQyRv6x
https://pastebin.com/raw/PRQyRv6x
311 RepliesView Thread
>>
File: Gnome has its logo for a reason.jpg (34.1 KB)
34.1 KB JPG
>>107913571
Previous
>>107759848
>Recommended operating systems
General purpose: Debian, Fedora, Arch Linux, Xubuntu, Linux Mint
Security focused: Qubes OS, Whonix, Tails, OpenBSD
>Recommended mobile operating systems
Android based: GrapheneOS, CalyxOS, DivestOS, LineageOS
Linux based: postmarketOS, PureOS
>Recommended browsers
Chromium based: Brave, Chromium (ungoogled)
Firefox based: Waterfox, Zen Browser, LibreWolf, Tor Browser
Firefox with Zero user.js: https://pastebin.com/PRQyRv6x
>Advanced content blocking
https://github.com/gorhill/uBlock/wiki/Blocking-mode:-medium-mode
>Browser tests
https://www.deviceinfo.me
https://dnsleaktest.com
https://librespeed.org
https://time.gov
>Recommended search engines
Brave Search, SearXNG, DuckDuckGo, Startpage
>Privacy oriented DNS
https://adguard-dns.io/en/welcome.html
https://nextdns.io
https://quad9.net
>Privacy oriented email
Proton Mail, Tuta Mail, Mailbox.org, Riseup, Disroot
>Recommended instant messengers
Signal, SimpleX Chat, Session, Briar, Element
>BIOS replacement
https://coreboot.org
https://libreboot.org
>Resources
https://www.privacyguides.org
https://anonymousplanet.org/guide/
https://ssd.eff.org
https://ryf.fsf.org/products
https://haveibeenpwned.com
https://inteltechniques.com/workbook.html
https://eldritchdata.neocities.org
https://sizeof.cat/links
https://stallman.org/facebook.html
https://chromium.woolyss.com
>>
File: Fisheye Placebo - You Are (NOT) Free.jpg (2 MB)
2 MB JPG
Threadly reminder to go read Fisheye Placebo for more cyberpunk goodness!
63 >Vance just wanted to make the most out of his college experience under a totalitarian regime, and if that meant hacking into the university to assign himself a hot female roommat e, then so be it. The last thing he expected was to be dragged into a crazy conspiracy to overthrow the government by his most-definitely-not-female roommate.
64
65 Archive
66 Chapter 1 Part 1
67 https://desuarchive.org/co/thread/138433030/
68 Chapter 4 Part 7 (latest)
69 https://desuarchive.org/co/thread/145447092/
70
71 https://www.yuumeiart.com/fisheye-placebo-chapters
>>107913718
sizeof.cat
kek what a faggot. Guess the operative was compromised
>>
File: chongqing.webm (719.8 KB)
719.8 KB WEBM
Threads on future cities still running: >>107895900
>>
File: 6643f4585384c49ddd2091cd8f977327.jpg (1.4 MB)
1.4 MB JPG
>>107914141
Its one of the most cyberpunk cases I've found honestly. I love how dark the cities are getting, I just hope they became more rainy and full of neon. I don't think the places I've been in can capture true cyberpunk ambience.
>>
>>
What do you think, anon?
>Boston, Massachusetts, USA (Wednesday, December 24, 2025) -- The Free Software Foundation (FSF) today announced it received two major contributions totaling around $900,000 USD.
https://www.fsf.org/news/free-software-foundation-receives-historic-pr ivate-donations
>>
>>
>>
>>
>>
>>
File: ad6f501b9ab5b91388e058089dd25215.jpg (213.7 KB)
213.7 KB JPG
What do you think is the best way to find news nowadays? Usenet? IRC? the clearweb or some protocol like RSS?
A fascinating report on cloud security
https://www.sentinelone.com/resources/whitepapers/assets/cnapp/cloud-s ecurity-risk-report-en
>>
>>
>>
>>107918768
>>107918768
Might be more /k/ but I've been thinking a lot recently about how mollies Flechette gun from Neuromancer (and by extension johnny mnemonic) is a quite similar to the joergsprave's six needler. One would need some available neurotoxin (i'm thinking mushrooms) and something like a veterinarians injector arrow but it's very close.
>>
>>107921972
Oh /k/ stuff is good too, after all weaponry is a form of tech. I think veterinarians would have good supplies of useful reagents without the heavy requirements of medics. Now, a psychiatrist could also get his hands on some very interesting stuff.
>>
>>107916826
>>107917076
Sepaking of radio: >>107916321 and >>107856344
>>
>>
>>
>>
>>
>>
>>
>>
File: orwell.jpg (52.4 KB)
52.4 KB JPG
>>107923504
Money laundering?
>>107923492
I like the ambiance, but I don't want to have a police stick shoved up my asshole. Orwell was right.
>>
>>
>>
>>
>>
>>
Threadly reminder all real hackers and cyberpunks ended with him
>>
>>
>>
>>107925102
>How is this achieved?
Not really sure since I've never done it, but my guess:
>figure out their IP (been done before, you somehow trick them into clicking on a link that reveals it)
>Assume whatever cctv they have is inside their same laptop network, scan for it
>figure out cctv brand and model, look up default admin+pass for it (counting on the idiots not changing it, which is probably true 100% of the time)
>Boom, you're in
>>
>>
>>
>>107925927
>>107928701
Not only that, he built the modern telephone system as we know it. Guy's a genius!
>>
>>107930530
He is a really cool guy. Is phreaking possible nowadays?
https://youtu.be/2LHyKyuJhTA
>>
>>107931406
Not on modern systems. They changed from in-band to out of band signalling. Third world countries have poor phone system security and they are able to inject f ake data so that it looks like it is the police that calls you instead of a scammer from the third world.
>>
>>
File: apodment.jpg (64.3 KB)
64.3 KB JPG
>>107927591
Honestly I would take the sprawl over the globohmo hellscape we have now. I saw a quote from Gibson on /lit/ parroting the same thing. At leas the coffin hotels were hotels not apartments
>>
>>
>>107913571
3D Printers are being outlawed in Washington without nanny software for being problematic
https://www.youtube.com/watch?v=QvBVZIJWejs
>>
>>
File: Amsterdam sleeping pod.jpg (88.1 KB)
88.1 KB JPG
>>107932025
Oh beds like those hive beds people use in Japan
>>
=== /sec/ News:
>Remote authentication bypass in telnetd
https://lwn.net/Articles/1055213/
>The telnetd server invokes /usr/bin/login (normally running as root) passing the value of the USER environment variable received from the client as the last parameter.
>If the client supplies a carefully crafted USER environment value being the string "-f root", and passes the telnet(1) -a or --login parameter to send this USER environment to the server, the client will be automatically logged in as root bypassing normal authentication processes.
Unbelievable.
>>
>>
>>
>>
>>
File: OIP-2368322969.jpg (24.8 KB)
24.8 KB JPG
Are these things worth the price tag or just a novelty? I have no specific use case, the y just seem interesting to me.
>>
>>
>>
>>
File: milan-vasek-tree05.jpg (384.5 KB)
384.5 KB JPG
>>107932025
This is why I live in the Solarpunk countryside and commute to dystopia.
>>
>>
>>107913571
I've been dealing with a stalker with mental issues (bpd, narcissism etc) and they recently appeared in an uber trip I took, what's the best way to scrape uber for information before I go legal and get a lawyer to subpoena the company for documentation and data
>>
>>
>>107936985
based
>>107935693
depends on how much you are willing to tinker with it and your use case.
If you flash it with the unleashed firmware, it really packs a punch for 90% of common uses, the next 10% is tinkering and retrieving the data on a computer for further exploit
>>
File: 1767483818487033.jpg (461.9 KB)
461.9 KB JPG
>>107913571
I'd like to ask something if it's not much trouble.
Recently a well-known website in my country has been hacked, supposedly, millions of accounts exposed.
this made me think, what do in these cases? changing passwords seems useless, they already have the information. Deleting the account is also useless for the same reason. And no one willo chagne their home, bank account and everything just to be safe.
Could anyone give me some advice in this kind of situations?
>>
>>107938845
You have to report it, if its not a third world shithole then they're bound to help you.
But changing pass and data is good anyway. Bank card can also be changed, all that you can do to prevent the data from being used is useful.
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>107940000
That's both the point and the issue. Map the attack surface, check which components are being used -> see if people already documented common vectors -> if not, innovate.
It's also what drove me sick with CTFs vs real world pentesting/bug hunting
>>107940075
Basically, crawling the internet at scale is not really a home project or even for a small corp without dedicated ressources. Common crawl kinda does that, you can get their datasets for free, but its multiples TB of data. Parts of it can be extracted so you don't have to process everything locally (or in the cloud which would also cost some money).
One thing that can be easily extracted are the URLs, which gives you a nice (incomplete) map of a big chunk of the web. From there, you can do your security research (finding data, identifying what can be prone to X vuln, scrape...).
Data is stored on AWS S3 so you can easily transfer it between services and query the datasets without downloading too much
>>
>>
>>
>>
File: telnetd.jpg (12 KB)
12 KB JPG
GNU InetUtils telnetd Argument Injection Authentication Bypass (CVE-2026-24061)
https://github.com/vulhub/vulhub/tree/master/inetutils/CVE-2026-24061
Out since 2015, but very rarely seen telnetd in corps
>>
>>
File: stallman.jpg (271.1 KB)
271.1 KB JPG
>>107925927
Was he smarter than the Woz or Stallman?
>>
>>
>>
>>
>>107939944
>>107940069
Why? LLMs literally write scrapers faster and better than any human can.
>>
>>
>>
>>
>>
>>
>>107943819
>No such thing.
I am surrounded by a lake, a river, farmland and orchards, and I turned my own garden into an orchard. Most of what I grow is edible. Also I have a friend who is a Japanese landscape architect who will help me with the aesthetics.
This is plenty Solarpunk to me.
>>
>>
>>
>>
>>
>>
>>107945880
Only way to have something that's glownig shit is to make totally decentralized anonymous meshnets. How to efficiently do so, though? Fuck if I know. But it is clear that the only private and secure future in the cyber is one where we cast off the mainstream and make a clean break from the system as it stands.
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
File: 5f4d6ac4-8727-48e2-bcdb-5c13a66b8111.png (1.4 MB)
1.4 MB PNG
>gets rewritten in Rust
>stops working
Just like Canonical. Why do rustrannies write such bad code???
>>
>>107951884
Make safe apps and custom encryption. Break encryption.
>>107950820
Middle school tier question.
>>
>>107943828
A human with an LLM writes a better scraper than an LLM on its own. The best combo is smart human plus LLM
>>107951719
Do you have any examples? Yes evil crypto libraries are a popular hacker trick. Yes, the ones used in major systems can be broken easily. But the one you run and implement doesn't have to be.
>>
>>107954677
>Why do rustrannies write such bad code???
Because they can get away with it. It is always someone else's fault. I am sure you remember quite a few of tehse from school. Some rise up to management. Others become bad programmers.
>>
>>
>>
>>
File: ancient_civilizations_by_oxiso_d6vrj8d.jpg (1005.2 KB)
1005.2 KB JPG
>>107913571
sizeof.cat is gone. Meanwhile:
The FAQ:
https://archive.is/mkDpa
Huge list of cyberpunk media:
https://archive.is/6pQt6
Always keep a copy, and a copy of that too.
>>
>>
>>
I just got an sms from some fuckers trying to phish me:
https://scan.safetoopen.com/?id=14aceff3012902dd990b86e98cbe99ed7af156 0c1e31d1b4afb1e2235931708d
That is my bank, and I'm not getting phishing attempts from any other impersonated bank. So my question is, how did these fuckers get my number, and how did they know that was my bank? The second question is the more important one
>>
>>
>>107958836
>Social engineering
if by that you mean I was SE'd, I don't think so. I am a recluse, I don't talk to anybody, I leave the house to go get some groceries and I go to my weekly guitar lesson. I haven't been to a bar in months.
If by SE you mean the bank lost my info then yeah, could be.
>>
>>
>>
>>107959263
>They go after the big addresses
yeah, in that case I'm fucked. Every major corporation in my country has been hacked to death a thousand times over. Just gotta rely on my own personal DevSecOps I guess
>>
>>
File: Logo DonPapi.png (141.7 KB)
141.7 KB PNG
>>107959275
this would be cool on a shirt
>>
>>107959381
found it: They were hacked sometime in November of last year, they say they got only basic info and to beware of phishing attempts. This is published in some no-name website that gets no publicity at all. My bank spams me with promotional emails trying to sell me shit all the time, they could have warned me about this as well, the fuckers.
Link in spanish: https://www.adslzone.net/noticias/fintech/usuarios-banco-santander-hac ker-filtracion-datos/
>>
File: Chapter_2_Spectra_GPS_Signals_L1.png (77.7 KB)
77.7 KB PNG
>>107957342
>Should be set for next thread.
Good to hear. And I hope we can continue with more uplifting OP images like the one we have now.
>Thank you, anon!
You are welcome.
>What are you working on this week?
I am looking into putting together a SDR-RTL based multi band GPS receiver. It seems there are quite a few odd things you can do with such a receiver.
>>
>>107959275
A latex shirt is not conductive so it should be taser proof.
Seems latex is reaching mainstream now with Adidas: https://www.youtube.com/watch?v=xpEHEPQ4Ud8
>>
File: G6_pUuGagAAP8_F.jpg (524.7 KB)
524.7 KB JPG
Time for some nightcore: https://www.youtube.com/watch?v=fhwVE9xYEzw
>>
>>
File: b424d4b629657900a2d4d46d75369fe0.jpg (1.2 MB)
1.2 MB JPG
>>107959820
Imagine latex but having high tech. I hope fashion becomes less faggy and more like the Edgerunners universe
>>
>>
>landlord cuts wifi because half the house isn't paying rent and the other half is empty
>hotspot not included in my plan
>root Pixel 6A Android 15 with Magisk
>Install Magisk module from GitHub for unlimited hotspot
>It actually works
>Update to Android 16
>Magisk patch root method no longer works
>Only results in bootloops
>Bootloops mentioned first line of changelog, right next to the part where it says codebase got migrated to Rust
>Go on deep dive into Android (does psg want my notes?)
>Everyone on GitHub complaining about bootloops in Issues section of Magisk
I guess I'm gonna try KernelSU as a root method this time.
>>
>>107960728
>>107961780
>obese and elder people on high tech spandex
>Notification from your pants: it was a wet fart.
>ads coming from your socks.
>someone hacked your pants.
we don't live in an anime, anons...
>>
File: katrina_winter_s_isle_by_moonwolf_95-d2kues6.jpg (479.4 KB)
479.4 KB JPG
>>107960728
>Imagine latex but having high tech.
So, Eudeamon?
>>
>>
File: FYWkQmpWYAA23nf.jpg (1.4 MB)
1.4 MB JPG
>>107964009
Clearly you cared enough to complain. An obvious guess i sthat you do not contribute anything beyond complaints. And latex is and has always been futuristic.
>>
>>
>>
>>
File: images - 2026-01-25T144258.668.jpg (23.5 KB)
23.5 KB JPG
>>107963682
Nice 90s CGI
>>
>>
>>
>>
File: fire.png (2.4 MB)
2.4 MB PNG
>>107966194
Well in the anime at least they're using fireman jackets so it truly does. Its quite cool as an idea just add some huds and leds
>>
>>
>>
>>
File: BioSuit.jpg (103.4 KB)
103.4 KB JPG
>>107960728
Astronaut space suits should qualify. Pic. related uses "polymers" but all indications are it is latex.
>>
>>107966192
>work with Rust?
Might be of interest:
https://lwn.net/Articles/1053142/
>There are a couple of interesting implications from this outcome, should it hold. The first of those is that, as Rust code reaches more deeply into the core kernel, its code for concurrent access to shared data will look significantly different from the equivalent C code, even though the code on both sides may be working with the same data.
>>
File: G-I8fzja0AE1e6A.jpg (421.9 KB)
421.9 KB JPG
>>107959820
And again. Today's is a classic: https://www.youtube.com/watch?v=hjGZLnja1o8
>>
>>
>>
Why are so many of THMs rooms some bullshit obscure steganography or crypto from the 60s? I want to learn actual pentesting, not solve "puzzles". A few of the boxes are fun because you get to exploit either known vulnerabilities or misconfigurations, but a *lot* of them are this kind of "puzzle" BS.
Real-life bug bounties and pentesting is 1000x more fun, but almost no companies in my shitty country offer them, and I'm not gud enough to find problems in US companies.
>>
>>
>>
>>
>>
>>
>>107969700
>I want to learn actual pentesting, not solve "puzzles"
Why are u on THM then? I never touch that platform. Hey, why not get an older IPad and hack that? Bonus pts if it is locked. There's your real world hax
>>
>>
>>
File: internet_restored.png (2.3 MB)
2.3 MB PNG
>>107962263
Success! KernelSU came through when Magisk failed. Now that I have internet again, it's time to debrief. Gotta make a GitHub issue for my specific model of phone, and gonna comment on XDA about how Magisk rewritten in Rust is a complete dumpster fire. Rooting Android 16 with kernelSU was very easy. It's just like Magisk in the sense that you just have to feed your phone's official boot.img the kernelSU app (i cloned the apk from GitHub), then flash the image with fastboot. I flashed it to both slots. One big note is that unlike previous Android versions, flashing the vbmeta partition is no longer required.
>>107964564
>>107968221
>Anon why don't you put on your Rust socks and program a solution for the official repo to pull
As I already explained, I could only do this with my device. It could break other devices, and that's assuming the literal troons (Rust programmers) in charge of the repo even accept my pull request. And why would i go through all that trouble, when I have so much else to do? It suffices for me to take the quicker and easier solution. Also I have already done a proper thorough double-all-nighter deep dive investigating this matter. I thought my disk was corrupt or i had some version mismatch or something. Nope, turns out Magisk has trooned out and ACK'd itself. Why would I spend my time contributing to such a project now?
>>
>>
File: Terry-Davis.png (553.7 KB)
553.7 KB PNG
>>107970565
Nah real hackers don't sell their bussy to the corpos, real hackers hack because they love to hack like Kevin Mitnick or Terry Davis
>>
>>
>>
>>107955319
Rust isn't the problem, it's the Rust users who are the problem
>>107973104
+1 for Java
Ghidra is written in Java btw
GHEIL
GHIDRA
>>
>>
>>
So, we meet again, Pajeesh of Google. You just won't leave Newpipe alone, will you? How I'd like to deal with you once and for all, yet you continue this cat and mouse game. You, who would force me into using my organic community programming skill to buck break you every time at your own game. All your efforts are in vain anyway, Youtube is dying.
>>
>>
>>
=== /sec/ News:
>Stenberg: The end of the curl bug-bounty program
https://lwn.net/Articles/1055996/#Comments
>The never-ending slop submissions take a serious mental toll to manage and sometimes also a long time to debunk. Time and energy that is completely wasted while also hampering our will to live.
>I have also started to get the feeling that a lot of the security reporters submit reports with a bad faith attitude. These "helpers" try too hard to twist whatever they find into something horribly bad and a critical vulnerability, but they rarely actively contribute to actually improve curl. They can go to extreme efforts to argue and insist on their specific current finding, but not to write a fix or work with the team on improving curl long-term etc. I don't think we need more of that.
>>
>>
>>
>>107974937
You dumbass, a virus installer.exe can easily take over your machine if you give it permission to change your pc. One evil game installer is all it takes. The only thing that's different today is that it's harder to launch an exe from your OS.
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
File: exciting.jpg (99.4 KB)
99.4 KB JPG
https://forklog.com/en/critical-vulnerabilities-found-in-clawdbot-ai-a gent-for-cryptocurrency-theft/
We are really living in exciting times, vibe-coded personal AI assitants getting pwned and leaking all your most private data
>>
>>
>>
>>
>>
>>107978272 >>107978367
Did you just confuse virus with any kind of malware??
>>
Listening in on the emergency services went well with playing poker, according to friend sof mine. Then things got encrypted. And then, someone cracked parts of te system:
>Telive osmo-tetra-sq5bpf: An Experimental TETRA Decoder that Enables Voice Decryption (If You Have the Key)
https://www.rtl-sdr.com/telive-osmo-tetra-sq5bpf-an-experimental-tetra -decoder-that-enables-voice-decrypt ion-if-you-have-the-key/
>But because the TEA1 encryption was broken due to a backdoor being discovered in 2023, he has also added support for using the 32-bit short key directly, which can be automatically recovered from TETRA traffic using his other software called teatime. TEA1 encryption is being phased out, but many deployments still use it.
>>
https://youtu.be/x7X_Z4Qq6Ik
>ai was used in conjunction with israel's backdoors in processors to take a picture of someone in their home before killing them
>usa is sharing data into the same system on its own citizens
>>
=== /sec/ News:
>A critical GnuPG security update
https://lwn.net/Articles/1056209/
>A crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped session key can cause a stack buffer overflow in gpg-agent during the PKDECRYPT--kem=CMS handling. This can easily be used for a DoS but, worse, the memory corruption can very likley also be used to mount a remote code execution attack. The bug was introduced while changing an internal API to the FIPS required KEM API.
>>
>>
>>107969700
>Why are so many of THMs rooms some bullshit obscure steganography or crypto
most are actually web stuff but whatever
>not solve "puzzles"
but CTFs are literally that, they are puzzles, if you go on ctftime and try jeopardy style ctfs you will get even more convoluted challenges with some insane asspulls if you don't know what you are doing, it's really more about thinking outside of the box, finding creative solutions to problems than typing msfconsole -q and thinking you did anything after looking up a known exploit
to learn about vulnerabilities specifically some of the best resources you could find is stuff like like WebSec academy and their free labs, it's mostly straight to the point where you learn by doing
>>
>>
File: 1764269328696155.jpg (164.4 KB)
164.4 KB JPG
>>107987373
Now imagine processing on qubits
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>107974153
>I'm one of them stealth hackers with a day job that isn't CS related.
I always thought it would be fun to get a job as a janitor or some other cafeteria assistant and then use that as an opportunity to start hacking whatever corporation I work at. In my days as a temp worker I spent some time working as a kitchen assistant at IBM in the UK (Winchester office). I knew nothing about programming back then though.
>>107989963
>Bruh, Santander sucks.
I know, I have a friend working there and the shit he tells me is ridiculous. On his 5-man team, maybe 1 of them does any real work at all, the rest just lounge around all day. What bank should I get here in Spain?
>>
>>
File: hqdefault.jpg (26.5 KB)
26.5 KB JPG
Newpipe update is the train, WTFYGD PAJEESH? GET FUCKING REKT! Until next time you subhuman piece of bull turd. You actually don't count as human, that's how gross you are. Take my music away for 2 days? I bet you think you're pretty smart standing on those train tracks.
>>
>>
>>107988714
>What am i hacking
My phone and cellular data. I not only figured out how to use my rooted Android to get free hotspot, but i also learned how to use iptables to change TTL so that the client device doesn't get throttled to 650kbps like it would otherwise. In order to make this work, you need a rooted Android, and you'll need to run some scripts on your client device as well, namely to modify TTL and prevent DPI.
>What else am I hacking
I was gonna hack Newpipe in order to kill Pajeesh in a cyberspace duel, but the Newpipe dev team took care of that for me already. S to spit on Pajeesh the Google developer.
>What else am i hacking
I wanna see if i can jailbreak my LG webOS TV and my PS4. But that's on my todo list, I haven't done it yet
>What else am I hacking
Gonna do a CTF this weekend
>>107987373
>AI can detect vulns
Come back when it can write sploits for the vulns. Also, this is what happens when you hire subhuman programmers.
>>107985031
>Moves goalposts
KYS I won't even discuss this anymore with you
>>
>>
>>
File: G2u27ctWYAAfDCk.jpg (1.7 MB)
1.7 MB JPG
>>107992138
Are you comparing yourself with "cyberpunk characters"? Like Case and Count Zero? Amusing.
In any case, the topic was about this thread, not the self image of the people posting here. And I would not expect anyone to admit to hacing in a place like this.
>>107992999
Drivel.
Clearly, more tasteful cyberriffic models in catsuits are needed. Thankfully, my collection is substantial.
>>
File: 1418261712775.jpg (81.4 KB)
81.4 KB JPG
>>107995335
the amount of exploits in the wild has grown exponentially because retard CEOs get pajeet subhumans and AI (actually Indians) to write their code.
>how do you practice hacking
First, find something you want to hack. It's okay if you fail, but you have to try. For example, I want to jailbreak my Smart TV so I can block ads on JewTube with it, without having to connect to a PiHole. This is a pretty basic thing. A more advanced thing is if you take a more modern IPad or Android and attain root/jailbreak. Bonus point multiplier x1000 if you root an Android that has a locked bootloader. Maybe you want to siterip pornos and get past paywall on a website. Go fucking learn some Javascript, and fire up the console until you pwn the site.
>>
>>107995547
nigger you're on the wrong board, there are entire boards for your coomer fetish, go to /s/ or /hc/ and post your bitches there. We're trying to write code over here and hack the planet, you're just trying to get your little wiener to stop being so flaccid. Go hire a stripper for fucks sake and fuck off
>>
>>
>>107995918
>We're trying to write code over here
Hahaha
>and hack the planet,
You have a career as a comedian before you. There has been no code presented here, even though >>107993257 presents an interesting story. What next, hacking the Gibson?
Itr is show, don't tell: if you have anything worthwhile to present, you do that. Until then, your ramblings are little more than light entertainment.
>>
>>
>>
>>
>>107996971
Probably. Satellite/space communications, including some older US military satellites, have shockingly poor security.
Worse, more recent Navstar satellites are provided with M-CODE signals that are susceptible to replay attack.
https://insidegnss.com/military-gps-receiver-advances-could-help-trim- satellite-costs/
>“I have a really dim view of M-code,” Humphreys told Inside GNSS. “I think M-code is doubling down on an antiquated idea and brings with it a lot of the same challenges as the legacy PY code.”
>In fact, M-code is vulnerable to a replay attack, he said, one of the simplest of all of spoofing attacks.
>“It doesn’t matter that it’s encrypted, it’s still vulnerable,” said Humphreys.
>A replay attack, he explained, involves recording the encrypted signal and then sending it, delayed, to a military receiver, thereby distorting the timing, or sending it from a different location, throwing off the target receiver’s positioning solution.
>“I just find it marvelous that the military has chosen the most expensive defense, in terms of all the defenses you could put together for anti-spoofing, “ Humphreys said, “and it’s the one that’s vulnerable to the least expensive attack.”
>>
>>
>>107996257
Are you saying i should post my iptables rules for mangling outgoing TTL from my client? It's one line of code that an AI can easily write, and you can implement it in a large multitude of ways. DPI spoofing can be done on Linux, Windows, Mac, and essentially any platform, and there are a bunch of different tools for it. My anti DPI tool of choice (On my Linux client machine) is a Go program called SpoofDPI.
Here check this repo out. You probably need root on your Android though-- I haven't tested on unrooted Android. It's as easy as installing a module on Magisk or KernelSU or whatever you're using.
https://github.com/felikcat/unlimited-hotspot?tab=readme-ov-file
Or you could just be white and pay for unlimited hotspot data i guess. Also, hacking WPA3 is tangentially related because it is also a way for a nomad to get internet in a desperate situation
>>
>>
>>
>>
File: 1749992587698389.jpg (151.6 KB)
151.6 KB JPG
bored sad loser incel chud here, no gf/friends. should i learn how2ctf so i can get a hobby? video games are boring.
>>
File: Rumi.(KPop.Demon.Hunters).full.4532041.jpg (50.5 KB)
50.5 KB JPG
>>108000055
Definitely, there are hacking games made for lonely losers. You should start with https://www.hackthissite.org/
>>
>>
>>
Any Australians here? I haven't used a VPN in ages since I didn't find it was necessary, but since we had a bunch of anti-free speech laws pass and people have been arrested for having the wrong tattoo or saying "poofter" or that Jews are an enemy of Western civilisation, I would like to get one again. The trouble is there's hardly any point to having a VPN if your IP is still set to the same country, but any other country will add a lot of ping since Australia has no close neighbours. Of course NBN didn't exist when last I had a VPN.
Any recommendations in relation to this issue? I don't want to have to go through the rigmarole of turning it on and off every time I play a video game.
>>
>>
>>108000263
Not a straya but using in a VPN server in the same country shouldn't be an issue. At the end of the day your traffic will still be encrypted and, as long as you use a provider you trust, your data will either not be logged or not handed over to the gov.
Don't forget that ISPs/the government cannot see 99% of your web traffic anyway. You can use a VPN but if you start posting about kikes on your normal FB account they can easily tie that back to you. Same risk for any accounts that you have created/used before you start using a VPN - they can use historical IP information, phone number or your registration email address to potentially tie that back to you.
If you plan to post anything frisky you would need to make sure you have a completely fresh slate - get a VPN and keep it active, create a new email address, create new accounts for whatever, make sure you don't access said accounts from your residential IP, make sure there's absolutely nothing that can potentially point to the account belonging to the real you. You'd probably also want to use a different browser to your main account to avoid any potential fingerprinting and avoid using the app on your phone.
>>
>>108000421
I'm aware of what a VPN does and I'm not planning on organising an armed resistance, I just don't want my searches and shit being added to a government database automatically and triggering flags and shit, same with my kids. My email is already Protonmail, I message people on Telegram, and I don't use social media. The only major thing I haven't done aside from this is encrypt my SSD which I will be looking into next. I also dual boot with Windows for work and games (desu these days I mostly use Windows) which complicates things.
I just tried ProtonVPN to Singapore and my ping went from 5ms to 190ms which makes sense because when I play on Singaporean servers it's usually about 95-100ms, but is prohibitively high. Singapore is the closest country with the best connection which people are likely to put VPNs in so I guess it has to be an Australian VPN server like you said. Unfortunately I have to get a paid VPN to test it. The only downside I can think of is that I'm less anonymous online because my nationality is visible but that's not a big deal.
>>
File: IMG_2741.jpg (804.3 KB)
804.3 KB JPG
>>
>>108000456
>I just don't want my searches and shit being added to a government database automatically and triggering flags and shit
Unless you're going to iwillburnjewstomorrowinmelbourne.com or avoiding HTTPS sites you'll be fine, they can't see your full URL data.
I use Proton which has servers in Australia. They also offer regional pricing. When I bought it I used TunnelBear's free version, connected from Brazil and then bought two years for cheaper than the UK pricing.
>>
>>
>>
>>
>>
>>
>>
>>108000598
You, John Smith, post publicly on Facebook about remigration under your account John Smith.
You apply for a job - the employer knows you are John Smith, what you look like and probably where you live.
They check Facebook, find your profile and see you want remigration.
They decline your job application.
It doesn't matter if you block all cookies and logged into your account from Uganda via VPN - they cannot see IP or cookies information so it has no relevance here. They will just check your Facebook account and see your comments. This can easily be mitigated by keeping your comments private or making a dummy account
>>
>>108000490
Thanks for the advice anon. The other chap talking about businesses isn't me. I think I'll go for ProtonVPN, I have already managed to make it work on my router which was way easier than I expected. Now I will look into SSD encryption which I think will be a lot harder.
>>
>>108001326
>>108000490
Actually I have it all set up now and it's running fine. Encryption is proving to be more of a problem. Bitlocker won't run as PCR7 binding is not supported and I really don't want to fuck around with my peripherals or BIOS. I'll check for Secure Boot but otherwise fuck it.
>>
>>
>>
>>
>>
>>
=== /cyb/ News:
Like straight out of a Gibson story
>‘I wouldn’t dare take these drugs’: how China supplies untested peptides to the west
https://archive.is/HHQDq
>Sensing an opportunity, hundreds of Chinese traders have established operations exporting low-cost peptides to western buyers, according to interviews with multiple sellers and an FT review of online marketplaces. What has emerged is a highly secretive, unregulated shadow economy.
>That interest has spilled on to social media. Influencers now promote peptides such as BPC-157, sometimes dubbed the “wolverine drug” for its purported ability to heal injuries and reduce inflammation, as well as Pinealon, marketed for sleep and memory, and other peptides pitched as anti-ageing or cosmetic enhancers.
>Many of these compounds have been banned for human use by the US Food and Drug Administration, yet they are increasingly popular among younger consumers.
>>
>>
>>
>>
>>
>>
>>
>>108006210
kek yeah sure thing anon...trust your vpn. Also don't forget to spread wide and use plenty of lube.
>>108000080
Old and not properly maintained site. Should use something more appropriate if he wants to start hacking.
>>
>>
>>
>>
>>
>>
>>
>>
File: IMG_2748.jpg (184.6 KB)
184.6 KB JPG
>check out cvs database
>no python script
>>
>>
>>
>>
>>
I'm a britbong and I need a VPN to access sites that block UK visitors. Currently I'm using a DIY wireguard install on a Hetzner VPS, which works for most sites but imgur blocks it. I assume they're just blocking datacentre IPs in general.
What's the best move? Should I just use a generic mass market VPN like proton/mullvad? I assume those can access imgur or customers would complain.
Is there any legit way to get an IP that looks like a residential/business line? Ironically I know of an L2TP service from a UK ISP:
https://www.aa.net.uk/broadband/l2tp-service/
But I can't find anything similar elsewhere.
>>
>>
>>
>>
File: lesbian.jpg (207.6 KB)
207.6 KB JPG
Does opening port on router for torrenting makes my system less secure?
>>
>>
>>108014026
I think it sends my external IP and port to public tracker for others to connect to as well? And these get harvested by abusers and my system is more easily noticed by them.
I'm mixed on whether I should do it or not as it would definitely give me more peers for sharing and faster transfers.
>>
>>
>>
>>108014653
Kek nice try the new http works over udp. Of course it's blocked you dummy
>>108014617
Right think it's lot more dangerous than opening a random port say for ssh access since in this case it's not being published anywhere
>>
=== /sec/ News:
>Tails 7.4.1 Is Out as an Emergency Release Patching Critical OpenSSL Vulnerabilities
https://9to5linux.com/tails-7-4-1-is-out-as-an-emergency-release-patch ing-critical-openssl-vulnerabilitie s
>Tails 7.4.1 is a small update that updates the OpenSSL library to version 3.5.4, a security release addressing multiple vulnerabilities that could be critical. According to the devs, these vulnerabilities could be used by a malicious Tor relay to deanonymize a Tails user, so updating your system is very important.
>>
>>
>>108015966
I haven't, yet, but I have been thinking about it. Now I am thinking even harder about it.
There is a huge m1000e server up for sale, and I was pondering if to get it and serve all /cyb/ files over Tor from that.
>>
>>
>>
>>
>>
>>
>>
>>108019024
the footage overwrites itself every 7-10 days, maybe 15 tops at most places. it's a hard drive limit thing, places don't spend that much money on long term video storage. wear a hoodie and hat with sunglasses.
>>
>>108019151
The footage, perhaps, but that is not needed. From the footage you can generate one high quality image at about 100 KB, plus gait analysis fingerprint for another 10 KB plus positional/tracking data for another 10 KB.
With this, 1 TB recording data is reduced to a little over 100 KB per person and you have enough to match to the person in your existing database.
>>
>>
>>
>>
>>108019732
Did you understand what I wrote? 1 TB fottage can be wiped, but you only have to retain the metadata which is perhaps 10 MB. That is a data reduction of 100 000 : 1 and makes it practical to store forever. And since this is metadata it is trivial to search this at great speed and accuracy.
Are you even 18?
>>
>>
File: d5u8kk2-2800992d-2cf9-4807-bcc2-d0054ebcb545.png (2.7 MB)
2.7 MB PNG
>>108019646
Basically what this >>108019736 anon says IF you're lucky. If you are unlucky enough to be Mitnick's tier or piss off the feds, you become their bitch and forever are forced to be their agent when they need you. Worst of all, since you're an offender, you have to "do it for free".
>>
>>
>>
>>
File: Edgerunners - Becca.png (97.3 KB)
97.3 KB PNG
>>108023336
He is a God like that.
>>
>>
>>108022628
>you get paid
Kind of...
>County Pays $600,000 to Pentesters It Arrested for Assessing Courthouse Security
https://onionsnews.org/article.pl?sid=26/01/30/068202
>When Sheriff Leonard arrived, the tone suddenly changed. He said the Dallas County Courthouse was under his jurisdiction and he hadn't authorized any such intrusion. Leonard had the men arrested, and in the days and weeks to come, he made numerous remarks alleging the men violated the law. A couple months after the incident, he told me that surveillance video from that night showed "they were crouched down like turkeys peeking over the balcony" when deputies were responding. I published a much more detailed account of the event here. Eventually, all charges were dismissed.
>>
>>
>>
>>
>>
>email addy in data breaches
whats the point of switching emails associated with accounts that are in data breaches? would it not be better just to create a new acc with a new email in case of another breach that'll leave breadcrumbs revealing your new email associated with said existing account or unless you use a one off alias.