so since outrage culture has reached a point where anything can be on the chopping block do you think a botnet of people will be used by social media disinfo campaigns to eventually take down all the best democratic institutions? will it result in cyberpunk pirate news sources being the only things left where you can get unfiltered information?
Ian Adams
How many of you guys are highly skilled cybersecurity decker neckbeards and how many of you are noobs?
NSA headquarters looks like this??? wtf, I want to work for NSA now yes
Caleb Foster
Is protonvpn a scam?
Parker Martinez
half way between the two to be honest family
Matthew Parker
it looked like that on pride day.
Cooper Martinez
>to eventually take down all the best democratic institutions? That might already be the case.
Michael Thomas
People getting tired of Spectre/Meltdown in ARM? === /sec/ News: >Qualcomm Takes Stake in SiFive eetimes.com/document.asp?doc_id=1334791 >He told us they just can’t hire enough people to deal with the leads the company is getting. “We have 450 people today, and we are hiring another 200-300 people right now. We’ve had around 600 companies contacting us, saying they are interested in doing something with us. I just don’t have people even to deal with them.”
Your next cell phone might be powered by RISC-V.
Isaac Allen
>not doing anything to stop Van Eck phreaking >not knowing that the gyroscope in your hard drive can be used as a microphone >using a processor with the memory sinkhole >no ECC RAM so vulnerable to rowhammer attack >not being able to set kernel parameter to deny inserted USB's >not desoldering the microphone >not realizing that the CPU microcode could communicate with the microphone regardless of libreboot >not putting nail polish on the screws and taking high resolution pictures to ensure signs of tampering >not removing the modem with DMA >not going fanless to prevent binary acoustic data transmission >not knowing the Ethernet and wifi card has access to keyboard >using xorg where any window can steal the contents of the clipboard or keystrokes >not knowing that the sound card can change the headphone jack into a microphone Jack and use it to record rough the headphones >not knowing they bounce an infrared laser off a flat surface anywhere near your laptop to steal your encryption keys by listening to your CPU
Thomas Bennett
technology was a mistake
Juan White
You cat far by rangebanning the entire China and Russia. It also saves your resources as servers there otherwise probe my machines day and night.
Lincoln King
evens i buy and use risc-v only odds i continue with my own destruction
Isaiah Hill
>>not putting nail polish on the screws and taking high resolution pictures to ensure signs of tampering Why not go all out with self destruct?
Grayson Murphy
What said I'd say the mix in these threads is about 50/50 on noobs and advanced and then you have ~1% of real pros that mostly lurk
Mason Cox
well that makes things so much easier thanks Jow Forums prng!
Ian Ramirez
Cryptostorm. Pay in Monero or ZCash. Use Tor to log in so Cryptostorm can't see you and Tor can't see what's going through Cryptostorm.
We have been through this a few times, roughly every second thread or so. And the answer remains the same: if you have a sever you can provide we can move to SFTP.
In any case none of the /cyb/ related files are controversial. On CollectiveComputers there were a lot of movie, music and media files but the /cyb/ stuff was all clean.
Easton Price
If anyone is studying for CCNA, the new curriculum is being introduced in 8 months.
Daniel Powell
Any details that should be added to the /sec/ FAQ?
Kayden Morgan
It's pride month my boi.
Asher Scott
I believe they are getting rid of ICND1 and 2 making it one test.
Samuel Perry
How do I debotnet a phone?
It mostly seems like an exercise in damage limitation. Get root, LineageOS, use f-droid apps (e.g. Icecat Mobile) instead of Google Play, don't use a SIM card registered under your own name, use third party wifi, etc. But it's an uphill struggle. I can't even figure out how to randomise mac addresses, and that shit is basic.
Amusing. Not sure cyberpunk is "expressive about sexuality" though. There is far more discussions here even on nootropics than sexuality, same in literature.
Samuel Martinez
>a lot of programmers >comparing sci-fi hackers pulling off stunts an entire NSA team struggles to succeed at with RPG Maker VN producers
Kek.
Ayden Powell
Thank you, going to move that to the top of my list then.
LGBT NEED to shoehorn their sexuality into everything because it's the only thing resembling a personality they have.
Every single thread, lol.
sage.
Jacob Sullivan
Self destruction!
Michael Wood
>trusting any vpn in europe
ISHYGDDT
Mason Green
Some interesting cyb costumes:
Carson Wright
>buzzfeed article
Cameron Walker
>Hatred of corps Are you kidding me? trannies love corps, hr has them all doing diversity shit
Josiah Harris
Is it possible to get a job in cyber security withoht a compsci or wngineering degree? Should i just teach myself programming lessons
Samuel Gomez
If you deface someone's website and are crafty enough to evade arrest for a while but not enough to avoid being caught, I guess you can become an intelligence agency's expendable?
Aaron Bennett
You should know that BuzzFeed actually produced decent pieces in the past, including some with legit exclusive evidences
Their main source of traffic is 100% the clickbait sjw cancer trash they spam online though
But my point is that even the most disgusting media outlet can produce oddly subversive shit once in a while. Lookup scandals revealed by trashy tabloids m8
Elijah Fisher
Also Wired used to be good. That is a while ago. Any recommendations for better alternatives?
I am graduating in comp engineering soon (hopefully) and am going to study to become a cyber risk manager or something like that in an all-new graduate course. I know that I should expect a job in consulting or something that takes a more holistic approach to risk management. Is there anyone here who has experience in this sector?
Lucas Harris
I'm reading about broadcast encryption/multicast encryption and have a fairly high-level conceptual question. From what I've read so far, which isn't terribly much, all the schemes out there seem to presume that the encrypted message will have a finite life in the wild (traitors excepted) and revocation schemes typically require reencryption of the message.
My question is whether it's possible to revoke access to broadcasted content that has already been put out there. For instance, suppose you post an encrypted message someplace public; you can't go back and change the content of the message. Can access to that message be revoked? Does a scheme that achieves this require bidirectional communications between the broadcaster and readers to obtain the decryption key?
Brayden Gutierrez
i am entirely noob. i come to these threads for fun, for me privacy means not leaving a trace of internet activity on my laptop, i keep my data safe on a 3-2-1 backup system, the important stuff, I archive things that I enjoy that could be gone tomorrow, like SteveMRE videos, books and others, I see the end of the borderless internet coming and there is nothing we can do to stop it. So I been preparing for that, and I been trying to disconnect more, try to use the computer like I did before I had 24/7 internet, seems like I was able to be more productive with my time then.
Camden Nguyen
Chimneys .. Maybe for Spot ???
Zachary Robinson
* that should of course be Also and made a rare reappearance.
Erm, what? I thought Spot preferred things more on street level such as fire hydrants.
That is similar in many ways to quality assurance (QA) which I did as a sideline many years ago. Essentially management opens such a positions only because they have to, probably a disaster in the past that nobody wants to talk about. Alternatively there could be contractual obligations they just could not get out of, especially if this is related to defence contracts.
And like QA they do not expect to see you and if against all odds they see you they do not want to hear about bad news or a pressing need to actually do something. So to them you will be a professional bearer of bad news, and you will land in some Dilbertesque scenarios you never dreamed of as a student.
These are jobs that require a solid moral compass. No, seriously. If you compromise you compromise yourself and will be pressed on that ever after. In my case I did not compromise - and it cost me my job. The upside was that my position was a contractual obligation they defaulted on. They knew that,. I knew that. Worse: they knew I knew they knew. So since the had sold off their moral compasses they feared the worst and cave me a nice deal to quit quietly.
That sounds discouraging, but thanks for the heads-up. What are the jobs I should be on the lookout for?
Jason Cox
>That sounds discouraging, but thanks for the heads-up. I take the rather philosophical approach to life, and getting fired like that is just one new experience. Enjoy the novelty but not everything is worth repeating. This sounds really old fashioned but really, as long as you maintain your moral standards you can be kicked out but you will not be broken. Have you noticed that many (most?) cultures have a concept of fate or destiny? It seems to me that fate sooner or later catches up with everyone. Conversely if that didn't happen the world would never have seen a civilisation but rather a huge collection of tribes locked in eternal warfare.
>What are the jobs I should be on the lookout for? Not sure about the question but I do recommend reading up on organisational theory. In particular the story about the Challenger disaster is illuminating in a disgusting way. The engineer advised against launching the shuttle, the management said launch! and 7 astronauts were killed, billions in government property destroyed and the entire manned space project collapsing with a broken back for about a decade. And importantly none of the management were ever made to face any consequences.
It is easy with a technical background to think that a technically correct answer is what counts. In reality that is not the case and even if the answer involves killing off people that can be seen as correct.
Also read Feynman's appendix to the Challenger commission's report.
complete newb, i want to start with networking. is this a good starting point and what is a good book for that?
Chase Sullivan
The vendor quickly replied .basically comes down to that due to the application being outdated, they're not gonna fix it. I'm now asking to publish the bug on my GitHub. To be continued.
messages only exist so long as something is sending them or something is storing them. if you broadcast packets then stop broadcasting then the packets will not just hang out on routers waiting for some system to pick them up.
Landon Wilson
Not understanding the limitations of society, means you will end up on the losing side of
Leo Martinez
People suggest Matrix is a safe protocol. >Introducing Matrix 1.0 and the Matrix.org Foundation lwn.net/Articles/790910/ >The Matrix team has announced the first stable release of the Matrix protocol and specification across all APIs. The Synapse 1.0 reference implementation, which implements the full Matrix 1.0 API surface, has also been released.
Robert James
yeah with all the censorship going on behind the scenes and the power of facebook/twitter/youtube allowing groups to form around anything i guess we're already seeing pirate news groups. breitbart and the intercept were nothing compared to the russian psyop of 2016. too bad wikileaks was turned by the fsb; it was a good thing for a while.
Isaac White
The French government is using this to silo it's communications? I want in.
Zachary Morris
yo dude just get on tor and torrent a bunch of books. save that $20 for noopept.
Jonathan Sullivan
Torrent on TOR? Tell me you are joking.
Samuel Diaz
Is it true that VPNs are actually useless because the host of the VPN, which is your entry point, can see your traffic anyway?
You are late. One day and 7 hours, to be specific.
It is true the VPN operator can see your traffic. You might want to check against MITM and also look into using TOR. As mentioned in earlier threads, many VPN providers are Chinese.
Logan Sanchez
vpns are either snake oil or useful depending on the host itself or what you want out of them your isp can see your traffic, consider a vpn provider as an extension of your isp
Oliver Martinez
Matrix is so cool yet so stupid. It's cool because it's Jabber and Jabber is cool. It's stupid because some group of web shitters all forgot that Jabber exists and rewrote Jabber in JavaScript+HTML.
Xavier Collins
>and rewrote Jabber in JavaScript+HTML That disease seems particularly virulent these days. Even non-web mail clients is now loaded with JS. Indubitably security holes flourish.
Ayden Long
Consider the money involved and ask yourself, who would have more reasons to protect your data, your 40€/mo ISP (that has to adibe to your country's local laws) or a 4-10€/mo VPN provider (that will have a lot of mambo jumbo jurisdiction laws) ? Who's more likely to take serious damage from a data leak scandal and who would be just able to disappear and reapper under a new name ?
Jacob Hughes
Dissenter is an interesting way to get around this.
Lincoln Flores
IIRC they also use OpenBSD, or something like that.
Levi Robinson
Redpill me in encrypted USB drives Which are the best? Which have the best cost benefit? General recomendations
Hardware encrypted? basically useless cashburn Just use an encrypted veracrypt container...
Chase Lee
Where's a good place to find noobs to poach their phishing logs, or have people finally realised to email the information away
Daniel Clark
>not knowing that the gyroscope in your hard drive can be used as a microphone
If that is true what could it possibly pick up, the volume inside a computer case would be far too high for any voice to come through
Ayden Sanders
Most likely the noise inside a case has a specific profile and with some digital signal processing you can reduce or eliminate these, leaving the interesting bands open. Sounds like tapping the screen/keyboard can probably be detected and decoded.