Recent comments
syndie OP wrote
Reply to A Guide to Installing and Using Syndie by syndie
I hope my guide helps you.
baby_bat OP wrote
Reply to comment by z3d in Linux security questions from a newb by baby_bat
Thanks for the reassurance, I always make sure nobody has physical access to any of my devices unless I'm there with them. I'll look into the linux hardening tips as well
baby_bat OP wrote
Reply to comment by sovereign in Linux security questions from a newb by baby_bat
This is super cool, thanks for the link!! I'll def look into this
z3d wrote
Reply to Linux security questions from a newb by baby_bat
In short, unless the attacker has physical access to your box, you don't have much to worry about.
More info:
- https://eclypsium.com/blog/bootkitty-linux-bootkit/
- https://www.welivesecurity.com/en/eset-research/bootkitty-analyzing-first-uefi-bootkit-linux/
For some hints on hardening Linux, try installing lynis and following the advice.
sovereign wrote (edited )
Reply to Linux security questions from a newb by baby_bat
I'm involved in a project with the goal of improving security of Linux systems. The project is called: The Sovereign Project (http://sovereign.i2p)
The project's scope is to secure digital and physical resources accessible from Linux based computers. It uses elliptic curve digital signatures (Monero protocol) for authentication and supports Monero Proof-of-Payment in authentication policies. The Monero Proof-of-Payment provides for securing resources with the electrical power (watts) consumed by Monero miners globally (estimated at about 80 megawatt hours).
The project recently developed a Linux Pluggable Authentication Module that authenticates using monero digital signatures and optionally authenticates via Monero Proof-of-Payment to secure Linux systems. There is a bounty (currently 17 XMR) for anyone able to compromise a Linux system via SSH (Attack Bounty #1). The secured system for the bounty is addressable only from an I2P destination:
e5xemz5wfdbq4ujm6vvlvhtpjn3hp55a6pk5noo4jouigkd7de4q.b32.i2p
The Sovereign protocol is a message passing protocol (JSON messages) over the I2P network or SSH Tunnels on private networks and I2P and SSH Tunnel connections are interoperable.
The project was started in 2024 and its still in its early days and is targeted for highly secure systems.
Sovereign Project - Approach to effective cyber security: http://sovereign.i2p/steps-to-effective-cyber-security.html
The project is for those serious about security with technical competencies. It may or may not be suited to your needs.
Browse the eepsite to investigate: http://sovereign.i2p
sovereign OP wrote (edited )
Reply to comment by Saint_Cuthbert in Congress is Unconstitutionally Criminalizing Privacy (USA) by sovereign
I Agree with you.
UberWaffen9000 wrote
I thought the problem was the same as with all the current Linux controversies. The woke PsyOp agents have infiltrated the major Linux distributions and are attempting to exorcise them of all rationally minded and free thinking people, creating instead a communist religion based on sexual deviancy.
redjard wrote (edited )
Reply to comment by noptic in Buy XMR and BTC without KYC cancer by mr4channer
Both localmonero and agoradesk state they have wound down last month.
Do you know what alternatives there are now?
Is openmonero.i2p reputable?
Edit: I see someone claiming the associated clearnet site openmonero.co is a scam, I will mask the link for now.
Edit Edit:
openmonero .i2p and .co are scams, I reached one of the sellers whose info had been copied.
I found success in using retoswap (haveno-reto).
DcscZx5idox wrote
A famous super hacker recommends Lisp. See "Programming languages" and "How to learn programming" section.
TronNerd82 wrote
Reply to Bezos by StableDiffuser
Thank god I wasn't on Ramble this November, otherwise I would've failed right away
TronNerd82 wrote
Reply to DO NOT THE SNEX by R_N
But I want to the snex
not_bob wrote
Reply to DO NOT THE SNEX by R_N
I'm sad that I can't like this more than once :(
Saint_Cuthbert OP wrote
Reply to comment by z3d in For a new coder, what resources would your recommend? by Saint_Cuthbert
Thank you very much.
Saint_Cuthbert wrote
Reply to comment by sovereign in Legal Plunder: Indiana Police Prey On Packages Transiting Huge FedEx Hub by sovereign
Or maybe they're the ones who have something to hide, lol.
sovereign OP wrote
Reply to comment by Saint_Cuthbert in Legal Plunder: Indiana Police Prey On Packages Transiting Huge FedEx Hub by sovereign
That they do!
Saint_Cuthbert OP wrote
Reply to comment by z3d in For a new coder, what resources would your recommend? by Saint_Cuthbert
Specifically, I'm looking for php resources. Thank you for the advice.
z3d wrote
Without more information about what you want to learn and what your objectives are, it's hard to recommend specific sites. Do you have any idea what language you're aiming to take up, and have you got a specific project in mind?
Here are some basic guidelines if you're just looking to get involved:
- Before just diving in, work out what you want to achieve. Sometimes it's easier to take an existing project and work on adding features than starting from scratch. Identifying your area of interest will help narrow the selection of languages you'll want to focus on.
- Start small. Don't take on big projects until you're comfortable achieving tasks you set yourself. Running code on a webserver is a good way to start seeing immediate results. Choose a language that suits, and hack something together. Javascript, html and css are a good entry into coding, and the results are immediate, no compilation required, just a webserver and and browser!
- Find a text editor that you're prepared to invest time learning. VS Code / Codium might appear daunting at first, but if you're committed to learning, it'll pay off in time by helping you write and format your code with inline help, syntax highlighting, autocomplete, and error checking etc. For something simpler but still coder-focused, Bluefish is a lot less capable but a lot easier to pick up, and still has syntax highlighting and support for various languages.
Saint_Cuthbert wrote
That would be a violation of "illegal search and seizure." Nowadays, they assume guilty until proven innocent.
Saint_Cuthbert wrote
Criminalize privacy. Criminalize arm-bearing. Criminalize free speech. If these people were God, they would have no need to do so to maintain control, but the fact that they try shows how vulnerable they truly are.
based wrote
Reply to Femtanyl | Inktober | Day Two by integra
i love femtanyl, you have good taste in music!
cumlord wrote
Reply to DO NOT THE SNEX by R_N
not snek ;(
chatrouge wrote
Reply to comment by d1esel in I live in Russia, ask your questions. by d1esel
Thank you for answering my questions
chatrouge wrote
Reply to DO NOT THE SNEX by R_N
DO NOT THE SNEX
random1234 wrote
Reply to 한국 Syndie 포럼 Korean Syndie Forum by kimchipower
안녕하세요 ㅎ