Thread #108026185 | Image & Video Expansion | Click to Play
/cyb/+/psg/: Cyber-Punk/Security & Privacy Anonymous 02/01/26(Sun)00:36:09 No.108026185 [Reply]▶
File: 1606973671297.jpg (475.1 KB)
475.1 KB JPG
>>107514773
"With software there are only two possibilities: either the users control the program or the program controls the users."
--Richard Stallman
>Cyberpunk
The FAQ: https://sizeof.cat/post/cyberpunk-faq/
What is /cyb/erpunk?: https://pastebin.com/pmn9vzWZ
How do I into /cyb/erpunk?: https://pastebin.com/5tpNFQds
Huge list of cyberpunk media: https://sizeof.cat/post/cyberpunk/
The cyberdeck: https://pastebin.com/7fE4BVBg
Cyberlife: https://jinteki.industries/files/cyberlife.7z
Bibliothek: https://www.mediafire.com/folder/4m5hd2065hde8/Bibliothek
>Privacy
Tools: https://www.privacyguides.org/en/tools/
Hitchhiker's Guide: https://anonymousplanet.org/guide/
Hardware: https://ryf.fsf.org/products
Frontends: https://igwiki.lyci.de/wiki/Privacy_friendly_frontends
OSINT Guide: https://inteltechniques.com/index.html
Firmware: https://libreboot.org/
RMS on Facebook: https://stallman.org/facebook.html
Have I Been Pwned: https://haveibeenpwned.com/
>Security
"Shit just got real": https://pastebin.com/rqrLK6X0
Cybersecurity basics: https://igwiki.lyci.de/wiki/Cybersecurity_-_/sec/_guide
Basics and armory: https://igwiki.lyci.de/wiki/Cybersecurity_-_basics_and_armory
Learning/News/CTFs: https://igwiki.lyci.de/wiki/Cybersecurity_-_Learning/News/CTFs
/sec/ PDFs: https://mega.nz/#F!zGJT1QQQ!O-8yiH845GN26ajAvkoLkA
EFF Surveillance Self-Defense: https://ssd.eff.org/
Other library: https://mega.nz/file/UCgEGAjb#rwNcnMAQCUUbSp8supsFvn9QEHCWUW86eLcZa16Z G4Y
112 RepliesView Thread
>>
>>108026185
Previous
>>107913571
>Recommended operating systems
General purpose: Debian, Fedora, Arch Linux, Xubuntu, Linux Mint
Security focused: Qubes OS, Whonix, Tails, OpenBSD
>Recommended mobile operating systems
Android based: GrapheneOS, CalyxOS, DivestOS, LineageOS
Linux based: postmarketOS, PureOS
>Recommended browsers
Chromium based: Brave, Chromium (ungoogled)
Firefox based: Waterfox, Zen Browser, LibreWolf, Tor Browser
Firefox with Zero user.js: https://pastebin.com/PRQyRv6x
>Advanced content blocking
https://github.com/gorhill/uBlock/wiki/Blocking-mode:-medium-mode
>Browser tests
https://www.deviceinfo.me
https://dnsleaktest.com
https://librespeed.org
https://time.gov
>Recommended search engines
Brave Search, SearXNG, DuckDuckGo, Startpage
>Privacy oriented DNS
https://adguard-dns.io/en/welcome.html
https://nextdns.io
https://quad9.net
>Privacy oriented email
Proton Mail, Tuta Mail, Mailbox.org, Riseup, Disroot
>Recommended instant messengers
Signal, SimpleX Chat, Session, Briar, Element
>BIOS replacement
https://coreboot.org
https://libreboot.org
>Resources
https://www.privacyguides.org
https://anonymousplanet.org/guide/
https://ssd.eff.org
https://ryf.fsf.org/products
https://haveibeenpwned.com
https://inteltechniques.com/workbook.html
https://eldritchdata.neocities.org
https://sizeof.cat/links
https://stallman.org/facebook.html
https://chromium.woolyss.com
>>
>>108026185
>The FAQ: https://sizeof.cat/post/cyberpunk-faq/
Remember >>107957295?
>>
>>
>>
>>
>>
>>
>>
after recent events, I think I trust random chink internet companies with my email more than the jewed ones.
any recommendations on what to use? i literally couldn't give a flying fuck if the CCP reads my emails as long as they don't send them to jewish blackmail networks (I live in the West)
>>
>>
File: G_qCuFTakAEDby5.jpg (1.3 MB)
1.3 MB JPG
>>108010943
>normal socks are overrated. you have to go up to the thigh for maximum comfy while asking claude to do 90% of the work for you.
It is far more cyberriffic if the socks go up all the way, pic. related. Also, assembly programming is fater, but AI is useless for performant assembly code.
>>
>>108019736
>cfaa is multiyear sentences usually. federal felony and when you get out, you can't use a computer for years.
Do they also take a sample of your DNA? Here in Europe, they do that even for tax evasion. It was litigated but the ever loyal courts said it was acceptable. DNA tests of illegal immigrants, however...
>>
>>
>>108030055
We are taling about peak surveillance state that probably employs 2000 persons working 24/7 just to check for foreigners getting a .cn email, a country that is openly planning to kick off WWIII before 2029.
I'd look into alternatives.
>>
>>
>>108030324
hey jew. chinks don't give a fuck about me, some random nobody who isn't going to attack their state with some cyber op or fuck with their economy. i literally just want to escape kikes like you.
the only country attempting to kick off WW3 is america, egged on by their cunt homunculus parasitic attachment ,shitrael
>>
>>
>>
>>
>>108030906
>Could AI be trained to make good assembly?
In theory, sure. In practice, the problem is too small a volume of good quality assembly source listings. Compiler output will not help, that leads to poor performance.
>Also reminds me of Evangelion's plugsuits
Indeed it is, worn by a Japanese cosplayer.
>>
File: 1508035154700.gif (1.4 MB)
1.4 MB GIF
>>108032354
I just checked, both links are working - for me.
https://archive.is/mkDpa
https://archive.is/6pQt6
>>
>>108031049
>hey jew.
What?
>chinks don't give a fuck about me,
they will, the mnoment you try to get that .cn email address.
>some random nobody who isn't going to attack their state with some cyber op or fuck with their economy.
They don't know that. Also, net intelligence is a dragnet, they get everything they can and then later try to put the pieces together.
>i literally just want to escape kikes like you.
Still no idea where this comes from.
>the only country attempting to kick off WW3 is america, egged on by their cunt homunculus parasitic attachment ,shitrael
that makes no sense. The US and also Israel are capotalist countries where trade is preferred and colonial powers are outdated.
>>
>>
>>108032786
We have lost many archives throughout the years (rememebr CollectiveComputers?) so I am a bit paranoid about losing more. I keep copies and archives of most things I come across.
As for sizeofcat he might have landed in some seriously hot water if he was doxxed. The .cat domain relates to Catalonia and there have been arrests and severe prison sentences.
>>
>>
>>
>>
>>
>>
>>108032595
>capitalist
lol. you're fucking retarded and a cuck.. and if you're not a jew, you're a classic shabbos goy. probably went to a TPUSA event.
>They don't know that. Also, net intelligence is a dragnet
even if they think I am going to do something to them, what the fuck are they likely to do to me (i.e. sitting in the west) without risking the attention of our own glowie services?
>>
>>
>>
>>
>>
>>
>>
File: TyreKickerSecretScanner.webm (2.9 MB)
2.9 MB WEBM
>>108037966
>>108035821
>>108034869
I built this browser extension, maybe some of you anons will find a few secrets with it during authorized testing. Screenshot this message in a support email and I'll hook you up with a free pro version
https://www.tyre-kicker.com
>>
>>
>>
>>
>>
>>
>>
>>
Previously in this thread I've cautioned you all about Chinese software and Chinese hackers. Well guess what: I was right.
>Notepad++ Hijacked by State-Sponsored Hackers
>the threat acotor is likely a Chinese state-sponsored group
>The attackers specifically targeted Notepad++ domain with the goal of exploiting insufficient update verification controls that existed in older versions of Notepad++.
https://notepad-plus-plus.org/news/hijacked-incident-info-update/
>>
>>
File: 1489305990504.gif (1.7 MB)
1.7 MB GIF
>>108043816
Snow Crash has a few ideas:
https://villains.fandom.com/wiki/Rat_Things_(Snow_Crash)
And yes, dogs are lovely animals.
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
File: lion-stuck.gif (245.4 KB)
245.4 KB GIF
>>108049386
Suck his cock and then bite down. You just got to remember to follow through.
>>
>>
>>
>>
>>
File: datasandshit.jpg (76.5 KB)
76.5 KB JPG
>>108051434
I know how to do it. I just do find the use case to be particularly helpful given the context and your vague post did not help. Are you suggesting to aggregate the ai slop and read the tea leaves for inference?
>>
>>
>>
>>
>>
>>
>>
>>
>>108051896
step 1 if you are not used to ICS/OT, dont fucking touch it if its anywhere close to prod / valuable. Extremelely sensitive, i've seen some light nmap scans fuck them up. That's why some shitty corps like claroty exist with their light scans / sniffing to map out where they are.
Gonna need more details on the type of engagement you are on : Is this a single device you have to reverse ? A simulated network ?
>>
File: image11-1740409370.png (376.8 KB)
376.8 KB PNG
>>108053279
>>108051896
Depending on what you have to target, take a look at older OT CTFs. I remember a couple ones being Hackzeugma by the turks and Dragos CTF. There are a couple writeups out there.
if that's just the human interface part, welp its usually some really broken web interfaces, easy to pwn or just to really really destroy. If it's some reverse, take a look at what the israelis do at claroty as well (Team82). I know i shitted on the product but their research team is OK-ish
https://claroty.com/team82/research
>>
>>
>>
>>
>>
that fun realization that no authentic private/anonymous payment services actually exist bc the normalfags are too busy getting data-mined on the surveillance grids and the crypto autists (understandably) haven't figured out or refuse to give a method on bridging the gap, leaving me with no way of getting normalfags to pay me for my work unless they just mail me cash.
Any other service claiming to offer that shit just ends up forcing you to hand your information over to them bc "muh fraud"
>>
>>
>>108055217
providing a medium to buy shit yourself comes easily if you know where to look, but until anonymous, prepaid account hosting actually develops, I haven't found a way for someone less autistic than me to give me money that isn't straight cash (or having them set up a prepaid card then hand it over to me)
>>
>>
>>
>>
>>
>>108055819
>>108058122
You can also mine it. I have 3 XMR that I mined back in 2017.
>>
updated Data Broker Removal Links:
https://pastebin.com/YDP7yihg
https://pastebin.com/raw/YDP7yihg
>>
>>108058614
Hope whoever makes the next thread isn't a faggot and bakes with the updated links. Thank you anon!
>>108058252
Is it possible to still mine nowadays or too expensive?
>>
i want to make frens that are interested in computer/os internals and mainly memory corruption implementations
this means non skiddie shit like RE and binary control via execution flow mechanics.
i don't understand much about the subject, but i already have a very good foundation to start with and i'm looking for people at this level so that we can start from a similar starting point.
if anyone is interested, respond. we will find a better way to keep the conversation going
>>
>>
>>108058759
>What are you hoping to achieve?
i don't have a clear goal. it just interests me and i would like to do it with someone with the same mindset.
if you already have some knowledge and the idea appeals to you, we can move on to a different conversation channel
>>
>>
>>
>>
>>108031049
i too love being dominated by non-white group A instead of being dominated by non-white group B
it's important to feel helpless and seek protection because of how weak we are
you need to be able to say "my dad can beat up your dad", and if you don't have a metaphorical dad, you need to find one
>>
>>
>>
>>108058743
i aint versed much in that topic but RE got a whole lot easier with stuff like the ghidra/IDA mcp. Was pretty fun last time i did that. Lot of CTFs makers in RE are battling against this as nowadays LLMs manage to one shot a shiton of rev/crypto challenges its amazing
>>
>>
>>
>>
>>108059540
group A isn't actively trying to destroy my life (for now) so yes, I will go with group A as long as it is pragmatic
no one is giving a good alternative to group A other than group B
>>108059667
>host your own email server
>calling anyone retarded
nigger, you are the retard
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>108065928
sure plenty.
for vulnerability research there is the new nostrach book "From Day Zero to Zero Day" even though its mainly targeting the user space its good for beginners, the book itself recommends other stuff like "Evading EDR" and "Practical Binary Analysis".
for RE "Practical Reverse Engineering" is probably the best one to start with
for fuzzing "Fuzzing for Software Security Testing and Quality Assurance" second edition.
for windows general system the pavel yosifovich books, he also have some data security oriented stuff that are available via torrents
with that i got a copy of OSED which is quite good.
the only websites that i recommend are opensecurity, nebula and pwn college