Recent comments
Wahaha wrote
Reply to Best resources to learn more about Arch? by Rambler
On Arch there's a whole lot of reading the manual to figure things out. But the manuals are actually worthwhile reads, so there's that.
Wahaha wrote (edited )
Reply to comment by smartypants in Best resources to learn more about Arch? by Rambler
smartypants wrote (edited )
Reply to Best resources to learn more about Arch? by Rambler
systemd is eventually going to be all 100% of serious linux unix mac (partly in concept) osses
Good tips for a systemd-less OS?
Even your arch linux added systemd in 2012 nine years ago , and its default : https://en.wikipedia.org/wiki/Systemd
systemd was correctly promoted then spread to many osses for 100 great technical reasons.
WATCH every minute of this extremely famous video on systemd (speed it up to 1.25% if you want faster pacing) :
https://v2.incogtube.com/watch?v=o_AIw9bGogo
47 minutes of truth bombs from linux.conf.au
systemd is AWESOME and the future
Already it took over most operating systems. Proof:
Arch Linux - October 2012 switched to Systemd
CentOS - July 2014 switched to Systemd
CoreOS - October 2013 switched to Systemd
Debian - April 2015 switched to Systemd
Fedora - May 2011 switched to Systemd
Linux Mint - June 2016 (v18.0) switched to Systemd
Mageia - May 2012 switched to Systemd
Manjaro Linux - Nov 2013 switched to Systemd
openSUSE - September 2012 switched to Systemd
Red Hat Enterprise Linux - June 2014 (v7.0) switched to Systemd
Solus switched to Systemd
SUSE Linux Enterprise Server - October 2014 switched to Systemd
Ubuntu - April 2013 (v13.04) soon mandatory
Anyone that is not happy with the future of OSses and faster booting and hates systemd typically is uneducated on systemd and never watched this 700,000 view youtube video.
anti systemd people in 2021 are laughed at behind their backs by skilled engineers and people who watched ALL of that video :
https://v2.incogtube.com/watch?v=o_AIw9bGogo
2012 short pamphlet : Arch Linux Environment set-up How-To
https://b-ok.cc/book/2286634/56b8eb
2009 167 pages : Arch Linux Handbook: A Simple, Lightweight Linux Handbook
https://b-ok.cc/book/730238/7581a5
neither are modern arch info, so i guess you need to use online stuff
smartypants wrote
Reply to comment by BlackWinnerYoshi in Phone faraday bags. Anyone use one? What do you use and how/when do you use it? by Rambler
https://www.amazon.com/Mission-Darkness-Non-Window-Faraday-Phones/dp/B01A7MACL2/
to not get marked as a spam bot, but there link is anyways, for people using handheld glass devices
BlackWinnerYoshi wrote
Reply to comment by smartypants in Phone faraday bags. Anyone use one? What do you use and how/when do you use it? by Rambler
I'm sorry, but why did you censor the Amazon link? Is it because it's Amazon?
Also, if you really want to defang it, I recommend doing it like this:
hxxps[://]www[.]amazon[.]com/Mission-Darkness-Non-Window-Faraday-Phones/dp/B01A7MACL2/
That way, it doesn't even get interpreted as an URL, which would look weird. By the way, to make it faster, you can use CyberChef (clear net only).
Also, no, I don't have Alexa or Siri. Fuck home assistants.
BlackWinnerYoshi wrote
I agree, there are a dozen things Windows does better than Linux (tilde club clear net mirror, Tor v3 mirror, Tor v2 mirror, Freenet mirror, I2P mirror), but to be honest, Windows has ten times more issues than Linux, so I don't think those things should make us not switch to using Linux as the default operating system. But still, those issues should be pointed out, especially to Linux fanboys because they love to attack any suggestion, even if it's actually a valid suggestion.
Wahaha OP wrote
Reply to comment by Mrwarmind in Enlightenment by Wahaha
Some oneshot porn manga. Forgot the name.
Mrwarmind wrote
Reply to Enlightenment by Wahaha
Looks like an interesting manga, name?
smartypants wrote (edited )
Reply to comment by dontvisitmyintentions in Exclusive: Here's Where Americans Are Using Starlink's Satellite Internet Service by Rambler
Demos and trials in youtube videos of latency, speed, and cost for north america almost made me want to try starlink too!!!! I have have multiple hardwired and cell paths already!
Did you see how fast starlink is? watch the linus tech tip demo or other demos.
https://linustechtips.com/topic/1304101-gaming-on-starlink/
HOLY COW!!
If you are in a mountain valley, the ONLY radio you can use to get on internet is UPWARD not low angle, and a that latitude washington state needs starlink in valleys
in kentucky and tennesee , I predict they will also pick up a shitload of users by word of mouth. hard to even get fast cell packets
my only complaint about some of these satellite systems is the ACK before a packet arrives in some designs being sent for a packet that never technically arrived, but optical long haul networks between nations do that too.. allowing for photons to be in transit across an ocean up to 15 fake ACKS ahead.
I say its retarded because an ACK should be an ACK not a expectation based on traffic flow.
But in the year 2000 it was noted :
10,000 miles away with 80 msec latency and 160 msec roundtrip time. At 1Gb speed, there are 8MB of data on route to a destination in 80 msec before the destination even has a chance to send its very first ACK back
8 megabytes of photons trapped in the cable, even if zero hops. This is the same problem with satellites... but in this starlink its 130 megabytes in transit before the first ACK... so the greasy fuckers hack all the TCPIP streaming window protocols to pre-ACK. and ACK packets that have not really ever arrived!!!!!!!!!!!
in most protocols its up to 15 packets, but I bet this starlink has more generous hacks. It also means that ping tests need to be cryptographic computational twoway handshakes then divided by two , to get real latency.
The video link I gave shows overhead satellites giving 27 millisecond latency for gamers... I assume its legit. but
HOLY COW!
Of course, it need not be said, that SLIDING WINDOWS allow for zero ( 0 , none nada zilch) fake ACKS in any network, and back off when a router buffer overflows enroute
https://www.omnisecu.com/tcpip/tcp-sliding-window.php
i just think that its amusing that so many deviant hacks to subvert TCPIP windows exists.
Mrwarmind wrote
Reply to Anime is on to something here by Wahaha
Couldn't agree more
smartypants wrote (edited )
apple does it too, i believe, but informs via a os call if a ARP-MAC path hosts a doppelganger IP on a second MAC address, though not an error, because a machine can use more than one MAC over time to support one IP address
WINDOWS programs are far far worse for man in the middle attacks than other osses and weakened because calling https://tmobile.com in most tools allows man in middle downgrades to http (not https) for example due to trusting faked DNS trampoline chains. This can be seen in most all laptop cellphone cards (technically modem dongles) for windows, but never on mac implementations of same products.
multipath FAILOVER is another reason linux and apple allow OS to merely note these suspicious events, rather than block doppelgangers :
failover and multipathing originated on laser optical Fibre Channel and copper iSCSI originally, but now failover encompasses multiNIC world and SANS :
Understanding Multipathing and Failover: https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.storage.doc/GUID-DD2FFAA7-796E-414C-84CE-1FCC14474D5B.html
Multipathing is retarded in my opinion and pairs packets across two typologies and switches, but if going to two different SANS with two different powersupplies in two buildings and using RAID-0 and a hack... it is amusing to me. apples original top end SANS had multiple cables, multiple power cords, and multiple powersupplies and RAIDED 5-0 (five Oh) of 14 drives into two 7 drive clusters and multipathed for speed, but could run with 7 drives on one side of rack pulled or dead from powerout on half of that single rack. That was wehn apple bent over backward to appeal to fucktard IT losers with amazing technology... but the fucktards still bought slower cheaper stuff from dell.
so secure topologies are a mixed bag and may depend on if a device is used for certain wifi setup protocols, or a "WIRELESS PIN SETUP CODE". wifi printers use a "timeout grant" "easy passcode" setup mode to create a crypto handshake to a router... for example. I could see how that printer would NOT at all like a MAC to change between it and some other point, if printer was using "WIRELESS PIN SETUP CODE" mode, meant for small "internet of Things" devices.
so windows is sometimes less secure than linux or mac, not more secure
spc50 wrote
Reply to Best resources to learn more about Arch? by Rambler
I bump into Arch's Wiki material a lot in search.
There is a project I know you'd love :) https://distrowatch.com/table.php?distribution=archbang
spc50 wrote (edited )
Reply to comment by smartypants in I want a Computer that I Own by HMTg927
That's amazing. Who knew? You knew. Rocking!
There are ways to do these transactions. Just have to get creative and certainly is going to be a cost premium. Not for the pedestrians.
COVID'noia has been interesting with the whole face covering thing.
Legit can go full nut paranoid and wear a helmet and people may look but zero they are going to do. Cash and carry in your astronaut suit :)
But yep, no retail buy of System76. Shame.
spc50 wrote
Reply to The Cuboid: A DIY air purifier that’s better than a box-fan [with measurements] by dontvisitmyintentions
Good little DIY research there.
Definitely useful in the paranoid age of COVID.
I have a need for this since I burn biomass all winter. End up with particulate and smoke.
Issue is the filters to do anything today are rather expensive. I need to find a good import source for decent but low price filters.
spc50 wrote
This is that corporate partnership with government to run around your rights.
Remember, governments are corporations too. Nevermind they are special status of and issue corporate permissions for their servant corporations (the business versions).
Our laws are failing to deal with this bullshit. Failing to deal with privacy. Failing to deal with dumb clicked on walls of words where they tell you to pound salt and get AIDS, we rape you and you approved it agreements. You consented, so they claim.
It's time to chuck the phone. Sorry but 85% of apps are useless. Any app that requires any permissions beyond what is obviously needed, should be uninstalled.
I am very much into flip burner phones. Cash and carry. But good luck following that rabbit trail. But need to have real discipline about that phone never coming on anywhere except in designated neutral safe place.
Also have to be diligent about dropping them and moving on. Zero attachment to. Short term handling.
Faraday bags are mandatory for storing. Battery removed.
smartypants wrote (edited )
Reply to comment by spc50 in I want a Computer that I Own by HMTg927
buy a System76 model
until you can buy System76 model in cash on foot at a big store with face coverred... you will be put on a "suspicious person" list, I predict, if shipped to you, or bought using credit card.
WORSE: System76 REFUSES TO ACCECPT cryptocurrency at any price at any markup EVER. Bitcoin banned by System76 and its because FBI/NSA/CIA wants to know all owners of Syystem76 machines. Petitions for bitcoin do no good for 7 straight years :
https://www.gopetition.com/petitions/system76-accept-bitcoin-as-a-payment-option.html
They wont accept cash in Denver Colorado if you tried to buy it in person somehow, but saslemen allow anything at big companies so i bet if you looked like you might want to buy lots in the future a salesguy you meet up with will probably setup a cash purchase of an initial machine. Salesguys in silicon valley even do SWAPS between companies for barters. Salesguys just like to make deals in general.
Lots of ways to get business cards of head sales guys of system76 : https://linuxunplugged.com/articles/system76-superfan-3
spc50 wrote
Good time to promote the organization mentioned start of the article: https://www.fightforthefuture.org/projects
They seem to be a worthy one fighting digital tech tyranny in various foms.
I will say the whole camera all over thing is getting out of control. 16 cameras they said in and around vehicle? Armored trucks don't even go that nutty on security.
I do a lot of road cycling. 10's of thousands of miles a year. Many places where traffic is rude, dangerous and downright out to inflict harm. I have one camera on loop during trips through questionable areas. Ideally should have two- one front, one facing rear.
When I have just the one, I am stopped by inquisitive people. I can tell people are worried about their privacy and realizing implications of such potentially.
Additionally, I am very much into core strength and weighted pack hiking - urban environments mostly. My pack has a breast pocket loop with a bodycam on it. Similar reason and intent. That too, every time I am out, it gets noticed and someone inquires.
Now I am not using the data or doing anything with it. It's insurance just in case of incident of road rage, escalated loud mouth, etc.
Amazon in contrast is sending all this data to their cloud, making intelligence of, storing it.
Look at Google imagery for maps. Piling up. Used by investigators routinely.
spc50 wrote
Reply to comment by smartypants in I want a Computer that I Own by HMTg927
Can't forget the BIOS issues too... Allegedly infested with backdoors and exploits, by design.
That's why we see 'open source' drop in replacements.
I'll say, QUBES OS did a good run for a while on the OS layer to attempt to shield and isolate things.
Been a while since I ran it because in recent versions it is damn needy about what it will run on. At point where you have to buy a System76 model, Lenovo specific model or a few others or no real chance of getting it to run.
With Qubes OS would continue momentum and direct sell machines ready to run their OS. It's a bit odd to get use to but it's definitely a worthy project in my opinion.
spc50 wrote
Reply to comment by smartypants in Phone faraday bags. Anyone use one? What do you use and how/when do you use it? by Rambler
So glad to have you here on Ramble friend! Awesome posts.
This 4 mic thing and one for the alphabet agencies coupled together with we put your device back online as a feature.
No thank you. Never liked Apple, never buying one.
Not saying other manufacturers are any better. Maybe the $500 I save on a phone makes me feel less violated.
smartypants wrote
Reply to The Clamper | Old Tool Reborn by dontvisitmyintentions
goddamned cool!
I used two piers to try and do some of that yesterday and it was ugly
smartypants wrote
true, but read my comments this hour related to this :
BasedPatriot wrote
I doubt anyone was using Brave to post or buy from dark net markets like dread and stuff...
smartypants wrote (edited )
I used one for a few years, but you need to go into airplane mode and not forget, or your battery drains VERY FAST from it searching for antennaes. You also need to turn off wifi (various bands) and turn off bluetooth (2.45GHz band) or your faraday mesh will eat up your battery.
MOS Equipment "Mission Darkness" MDFB-S-NW 4 ounce model from Amazon is "good enough" , but does not block microphones, and costs only 23 dollars :
23 dollars :
https://www.ama<<REMOVE THIS>>zon.com/Mission-Darkness-Non-Window-Faraday-Phones/dp/B01A7MACL2/
You also need to roll it into a little acoustic BALLISTICS foam if you do not have a portable piezo (non digital) white nose generator adjacent to a iphone.
iphones have 4 (yes 4) hidden microphones in them, four. four fucking hidden mics one is siri dedicated, two are system stereo human voice isolating to cleverly earse background noise, the 4th is a secret nsa/apple mystery mic.
countless ultrasonic and sonic sound proof foam sheets exist to wrap your phone in if it is on your body or glove box :
http://www.ballistic-online.com/
I use neither of those brands but they would work.
I use far more expensive stuff meant for usage for mil-spec.
AIRPLANE MODE fake on iPhone in spy OS from apple : iOS 11.1 from apple SECRETLY TURNS ON WIFI AND USES WIFI when in AIRPLANE MODE!
Refer to this alarmed post :
https://discussions.apple.com/thread/8146282
Apple engineers stated in that apple.com post that the antennae are all periodically enabled ON PURPOSE against your will, when you try to turn off antennas using Airplane mode.
so on iphone/android you need to manually turn off bluetooth and also manually turn off wifi and third ... manually turn off cell antennaes. they love to spy.
Fun fact I proved : airplane mode does not create a true OS state unless in airplane mode for over 60 seconds, but that is not the link I shared above.
ALL PHONES SPY ON YOUR NEARBY VOICE CONVERSATIONS (FBI interested people)
all phones , android and apple, convert voice to text and then send a buffer of last 2 hours of whispered text in vacinity of phone upstream as text once airplane mode is flipped off and cell back up. ALL PHONES do this and is easy to prove using ampmeters attached to battery packs. They do not do this at all if battery level drops to 21 to 22% though. They only seem to do it guaranteed if phone being jostled and walking or driving around prior to lying still. humans conversing (a exotic live cable tv news channel also works for testing). prerecorded might be whitelisted (technically blacklisted). the big arbitron radio markets and big tv channels might be also be ignore by cell devices , but NOT possible if in airplane mode and then the battery drain is astouding to watch using older android and older iphones. 25% of battery drained PER HOUR if converting your spied on conversations to text for later upload.
NOISE GENERATORS!
you can avoid acoustic foam if merely trying to make white noise one inch from your resting phone :
If at home, and phone connected to cell or wifi for incoming calls, you can add a random noise ANALOG circuit full spectrum white nose generator and you can modify circuits to cut off ultrasonic above 28Khz to not make your cat/hamster/dog hate entering your kitchens.
hundreds of designs, avoid digital storage 8 dollar loops from amazon. demand 100% analog style, no DAC from prerecorded loops.
http://www.discovercircuits.com/N/noisegen.htm
hundreds of designs to stop spooks from listening to people in your kitchen if your LG dishwasher mic, your LG washing machine mic not nearby, or your microphone internet refrigerator not connected to wifi password of you or neighbors house, (they use zigbee path to your AC power meter though for NSA level taps). Your tvs all have mics and use your roku or firesticks to hop ride onto internet.
If you have alexa or siri in your house , you are just a fucktard and can ignore this entire post
smartypants wrote (edited )
Reply to I want a Computer that I Own by HMTg927
In 2021 the answer is NO because the public is not allowed to review all lines of source code and all workalike-fpga code to fabbed open source cpus like RISC-V project.
RISC-V projects in 2021 , meant for desktop use, for sale omit any right to :
-
examine source code of USB controller chip, let alone logic gate to the USB chip (keyloggers?)
-
examine source code of SATA controller chip, let alone logic gate code to the SATA chip
-
examine all bytes of a GPU graphics driver source code and prove it can built to match MD5 hash of existing blob binaries, less internal date stamp ranges.
-
examine source code of DMA engines, PCI bus controllers, memory module cache controllers, controller chip, let alone code to workalike-fpga code of all those... basically a open source RISC-V is a tiny card with a huge non-open-source daughter card, already infiltrated by various NSA teams.
This includes whitepaper pushing, handwaving "Silex Insight who only wants to protect fabbed boards from chines spy chip insertion on boards hidden as subcomponents, by introducing crypto handshakes to PROPRIETARY CLOSED SOURCE controllers for USB and SATA. Their solution? store only encrypted blocks on storage and use chinese/nsa/russian/NSA/mossad SATA chips... and use a different SALT for encryption on each machine. They want you to use NSA hacked SATA and USB chips in 2021.
Basically... RISC-V is a total dumpster fire until they rise $500,000 dollars for a couple engineers to create a OPEN SOURCE sata chip and OPEN SOURCE usb chip
FUCK RISC-V and its infected rooted support chips
THE ONLY PRIVATE COMPUTERS LACKING BUILT IN BACKDOORS are those built more than 14 years ago, and they are only secure if you keep them physically locked up when you are away, and do not use them to surf internet.
AMD has equivalent to ME and for safer Intel...
System76 company can only turn off 2 of the three built in Minix OS backdoor hypervisors running on all Intel chips, but System76 do sell semi-castrated intel, but that still leaves countless other spy chips. And if you have a Super Micro Computer Inc motherboard (likely), then it has high chance of spy chips on it tapping into JTAG and equivalent bus probe debug techs :
For years, U.S. investigators found tampering in products made by Super Micro Computer Inc. The company says it was never told:
https://www.bloomberg.com/features/2021-supermicro/
FUCK!!
In 2010, the U.S. Department of Defense found thousands of its computer servers sending military network data to China—the result of code hidden in chips that handled the machines’ startup process
NOTE: the machines are rooted at boot in PCI space, and walk around your inserted primary interrupt levels shrouding code if machine debugging. BOOT TIME is the main target, and of course all AMD and INTEL cpus the last 10 years are loaded with similar mystery boot time code inside the fucking cpus and support ships. PowerPC from apple was used by military heavily in 2010 and earlier, but now only used on subs in navy for specialty purposes.
IF YOU DIG INTO RISC-V , you will find that all vendors sell CLOSED SOURCE SATA and CLOSED SOURCE USB support ships
Luckily there is a lot of people working on open source FPGA SIMD GPUS and shader source, but they all if sold might step on NVIDIA patents. Not all 2021 open source FPGA SIMD GPUS are yet listed here :
https://awesomeopensource.com/projects/fpga
TCPIP scsi boot (iSCSI)?:
All linux since 2012 supports booting over TCPIP conencted to a SCSI device on other end of TCPIP cable.
RISC-V could use a TCPIP scsi boot in linux via risc-V ethernet chip or serial chip connected to a raspberry pi simulating a scsi controller hooked to a large legacy SCIS storage device, then connected to a SCSI to SATA 25 dollar adapter.....
There are also hand made fully open source SCSI controllers using 26 gpio pins in parallel at over 1.5 million gate flips a second and a daughter card to convert 3.3 volts to 5.0 volts, that are run from raspberry pi, and this month it works POST BOOT on all apple and commodore machines, but pre boot, they have bugs because they dont know how to properly code SCSI protocols and rules and also dont know how 1984 macs throw away bus clocks on the first SCIS boot sector to allow a 4096 byte block to be read in 512 byte payloads and vis versa. They dont care about booting, but people wiht real 1984 hardware do, and they can get it fixed in a day using people like me and a SCSI probe made using another bus device, including a second raspberry pi setup. I am digressing. I am just pointing out that following this link, a RISC-V vendor could sell a raspberry i, with a 3.3 volt to 5 volt 25 dollar riser card and open source and some simple code on both ends and a SCSI to SATA adapter to connect either scsi or sata to a raspberry pi and trampoline all i/o across a short TCPIP cable to allow bootup, but would soon have to port the code aeay from CLOSED SOURCE raspberry i, and use a open source arm board that copies most of closed source raspberry pi 4. (even the camera on a raspberry pi is fully closed source in 2021).
RaSCSI (and its various forks) :
https://www.retrorgb.com/rascsi-raspberry-pi-based-scsi-device-emulator.html
soon we will have risc-v with video, but still lack safe way to use mouse or keyboard, or safe way to connect sata or usb storage. RISC-V has wasted 10 full years with no viable products for desktop. 10 fucking years down the toilet because engineers like me are hard to hire and find. And yes.. I have made multiple storage controllers, and raid controller cards, and all sorts of storage chip drivers for many companies... but whatever. I would not work on risc-v unless I trusted the path from my keyboard to the development machine, so USB needs to come first. At least you can mount a USB "Storage class" device on USB. In fact I created and wrote the code for the first 16 megabyte sized usb storage flash device, when 16 megabytes was huge.
USB and SATA for risc v as open source can be developed with open source fpga simultaneously, but I would refuse to accept a job to work on one if NSA code was still hiding in the other path.
riddler wrote
Reply to Windows actually better at something that Linux major distros by spc50
I don't know if knowing this really improves security. It's wireless and not wired, so If someone knows your SSID and password they can already listen. Sure they can start feeding bogus DNS and stuff but that's what other higher level security protocol protect against. With wifi, once your password is compromised there is minimal advantage to having someone connect to a compromised router.