Thanks for starting this, the last thread ended too early.
Oh, any thoughts about adding Pixiefuel's manifesto?
Parker Foster
Worth reading, /cyb/ and /sec/:
>Bruce Sterling: YOU SHOULD HAVE README cryptome.org/2018/01/sterling-you-should-have-readme.htm >*Dear nettimers: I have the warmest and kindliest feelings about Geert's remarks [copy below] and about the list itself, which is lively lately. On mature consideration, I feel that I have to extensively annotate this Lovink post .
Aiden Sanders
do you have a link? the only mention I've found was some usenet post from '98
Ian Davis
It is found on Usenet News, yes. And it is found in an original and an updated version.
>Cypherpunk Manifesto >>activism.net/cypherpunk/manifesto.html Is there any activities here? And Eric Hughes appear to have disappeared from the face of the Earth.
James White
How are firmware explots used? What form do they usually take? Does someone juat send a crafted data packet with some code which causes memory overflows and owns the machine's firmware/drivers?
Look up BadBIOS - it seems other channels such as acoustics can be sufficient.
Thomas Mitchell
We have lost control of the internet. Companies are farming our data, our very lives. They read our email, data mine our lives to advertise to us or watch us in case we endanger their control.
We have lost. We have given ourselves over to sloth, sitting on our asses watching movies and netflix shows while they take control of everything.
Hudson Moore
Not all is lost forever. I dumped the TV and saved a lot of time. Life is a lot better too and gives me time to write rather than just consume.
Andrew Jackson
>We >our some people didn't get bit cause they weren't young/retarded.
firmware (and embedded systems in general) don't differ that much from regular systems - in fact, they usually even run some *NIX. So the usual vectors are buffer overflows, extended by forgotten debug interfaces, weak updating mechanisms, misconfigured services, ...
Henry Evans
=== /sec/+/cyb/+/dystopian/ News: >A video produced within Google and obtained offers a stunningly ambitious and unsettling look at how some at the company envision using that information in the future. unv.is/theverge.com/2018/5/17/17344250/google-x-selfish-ledger-video-data-privacy >The video was made in late 2016 by Nick Foster, the head of design at X (formerly Google X), and a co-founder of the Near Future Laboratory. The video, shared internally within Google, imagines a future of total data collection, where Google helps nudge users into alignment with their goals, custom-prints personalized devices to collect more data, and even guides the behavior of entire populations to solve global problems like poverty and disease.
TOTAL DATA COLLECTION
WHERE GOOGLE NUDGE USERS INTO ALIGNMENT WITH THEIR GOALS
CUSTOM-PRINTS PERSONALIZED DEVICES TO COLLECT MORE DATA
EVEN GUIDES THE BEHAVIOR OF ENTIRE POPULATIONS
Mason Wilson
Disturbing stuff. Seems Google has kissed goodbye to "don't be evil" forever.
Carson Nelson
Google has gone too far. The original page from The Verge has the leaked video, I invite everyone to see it. Also here is a video about the whole thing youtube.com/watch?v=EoBAIQjWoUQ
Justin Lewis
>This company is being super evil >Go to this company's same website and look at how evil they're being.
>what is captcha As much as I agree with you the amount of invasion to the whole web Google pervade is far too reaching. But yes, we need alternatives for every totalitarian spyware website Google is in. And ultimately, a whole new web, pic related.
What part? Because we have DNS and other protocols for mesh networks now.
Blake Roberts
It's mostly just shit because of the extreme routing overhead. It should be as stable or more stable than current net, assuming it doesn't murder itself.
Benjamin Sanchez
Actually peernet is a VPN that can connect to other nodes automagically. I wonder if gternet will ever use this.
Hi google.
Luke Cook
>Those can be connected with a VPN tunnel over the internet ... at which point the mesh network will be compromised.
Jeremiah Campbell
>peernet is a VPN that can connect to other nodes automagically The project is really open to this. Right now it's OpenVPN, but you're free to experiment and propose any alternative, just report back with your experience / benchmarks, that would be a great help.
Xavier Perry
Well you first need to see a symbiosis of various open protocols to serve as the foundation to challenge monolithic entities such as Google/Amazon. Tokenized assets underpinning these protocols was really the big break through with crypto, it's just going to take a while for that to mature into a cohesive system.
Once that takes place, the software we build on top of that will out compete centralized entities through pure economic incentive. Why provide your data to a monolithic corporation for free when you can provide it to a decentralized network that rewards you through tokenization while also obfuscating the origin of the data through encryption?
Now I'm just heavily speculating, but I'd imagine that such an open and modular synthesis of protocols will provide opportunity for innovation that is not technically possible with our current walled gardens. So privacy aside, I'm inclined to assume that it won't be possible for these corporations to compete from a feature standpoint as well.
The hard part is reaching a point of no return in the development of these open protocols before centralized entities step in.
Kevin Jones
Seems the FTP is down ftp://collectivecomputers.org:21212/Books/Cyberpunk/ Anyone else able to get in? It is now a large repository and it would be sad to lose it. Does anyone know of an alternative sire we could use as a backup?
Bentley Taylor
Every time I dump TV or vidya, I just spend more time shitposting here.
Gavin Johnson
Why not take up more interesting posting? I used some of my time to do the /cyb/ FAQ. Life is also about trying new things.
Charles Perry
Making an effort to be more secure online, following the pastebin etc. Just wondering, is there a simple way to copy over all those firefox configuration settings into my browser, or do I need to manually do each one?
Grayson Cruz
How do I torrent with complete privacy? Do I need a vpn/proxy?
Lincoln Russell
Last I heard torrenting will reveal your IP number, always.
will i be denied a security job for donating to wikileaks £5 in 2016 election. just realised this could be a possibility. i'm studying ethical hacking atm
>* your new browser is firefox. >be sure to go into options, then security, and uncheck block malicious content. mmmm...why tho?
Eli Perry
because it'll send every link you open over to mozilla.
Luis Jackson
Does anyone know how I can determine the correct file extension of a file if both the extension and Magic Number is changed? Exiftool?
Bentley Fisher
1. If a person/entity compromises your router at the firmware level, they can read or even alter your TLS/SSL connections, correct?
2. If number one is true in any sense, what's to stop a person or entity at your ISP (if they wanted to) from doing the same, reading or altering your TLS/SSL connections, from the ISP instead of your router?
3. In the same scenario or scenarios, how come the persons or entities wouldn't be able to read or intercept Tor's encryption (which is indeed different from TLS/SSL)?
4. Same question as number three, but for VPNs instead of Tor? (The NSA long ago cracked PPTP and IPSec, and probably OpenVPN too. Could a malicious router or ISP read or alter your OpenVPN connection?
>1 No. They need to get access to your box and install some root certificate there to decrypt / alter your ssl traffic. >2 if your host is compromised, anything can happen. If your router is compromised, but your box is safe, there's still a chance you get a clue something is going wrong. >3 there is no (public) history of tor traffic being decrypted. ALL attacks so far have been on application side (i.e. Firefox exploits). Only protocol side attacks are fingerprinting and guard shitl Easy to turn around. Tor is safe. Applications running on top of it are not. >4 Not sure about this one, haven't inspected OpenVPN or any other in deep. I guess 2048-4096 key is safe enough, but I wouldn't be surprised of any 'oh shit' moments happens in the (near? or far?) future.
You are not a target, everyone is. Basic opsec will keep you safe.
Jeremiah Davis
Anyone ever tried out the librem13? Any decency from the product, or is it just a 'meme' to seduce privacy nutcases?
Matthew Anderson
I have a cyberpunk question, how would one go about making a drone mounted counter-UAS systems?
Isaiah Davis
That's what happens when "just google it" becomes part of our venacular. Use duckduckgo.
Nolan Walker
This is the future of Supply Chain Management
Dylan Hernandez
for MI5/6/GCHQ maybe....
Jonathan Gonzalez
>(The NSA long ago cracked PPTP and IPSec, and probably OpenVPN too. the first two are protocols and the next one is a program that implements those two plus more.
and to answer the rest of your questions: TLS is done at your endpoint. unless that one is compromised, you're safe. a compromised router may hijack your connections - that's why you use cert pinning whenever possible
Robert Gray
I'd focus on disabling its engine. other than the engine you may try to jam sensors or GPS
Carter Reed
And also their contractors. Mostly you should be OK.
Camden Green
Jamming will in itself raise a lot of red flags and could initiate ECCCM such as home-on-jam.
i dont really see whats impressive. she found which trains that get the most delays and when, by using twitter posts from official accounts posting about delays
What hardware do cyberpunks/privacy obsessed people use? are you aware of intel management engine?
Asher Clark
RISC-V or ARM devices.
Daniel Mitchell
Could you suggest me something good and maybe not too expensive?
what about Power9?
Dylan Collins
>I might start reading some of those CompTia books.
Use Professor Messer's stuff. I passed all three of the main certifications using his content and all the practice tests I could find.
Jackson Smith
old thinkpads
Charles Fisher
Just don't trust modern chips.
Cooper Hall
HP PA-RISC is good.
Ethan Martinez
With all this data mining, and the google "experimental" video, and the companys leaking our shit while nobody caring, I feel like I'm living in a bad scifi fucking movie. The more I think on it, the more ridiculous it seems to me but I can't shake the fucking feel off.
Nathaniel Morgan
unless you want it in paper, it's in the book bundle in the OP
Wyatt Bennett
Does anyone see hidden services ever being used for anything but drug markets/spooky roleplaying/abuse? I think it would be great to have discussion platforms hosted on tor, to get away from spying and all the bs reddit and Jow Forums to an extent force upon us, but I doubt anyone would care enough about things like that these days.