/os/ - Online Security

News, techniques and methods for computer network security.

Boards | Catalog | Bottom

Check to confirm you're not a robot
Drawing x size canvas

Remember to follow the rules

Max file size: 350.00 MB

Max files: 5

Max message length: 4096

Welcome to Online Security the place for internet and computer security, privacy and anonymity.
If you have some helpful tips please feel free to share your ideas. Start a new thread, or contribute to an existing thread.

Meta Thread Endwall 07/12/2016 (Tue) 12:03:36 [Preview] No. 171 [Reply] [Last 50 Posts]
Post any comments, concerns, or requests for the board in this thread.
Edited last time by Endwall on 07/12/2016 (Tue) 12:15:00.
35 posts and 6 images omitted.

Anonymous 01/20/2022 (Thu) 03:29:04 [Preview] No.1767 del
endwall, how are you? If I remember, you were the guy on 8/tech/ that talked about being stalked in real life and surveillance etc. How did that turn out for you? I've always wondered because you drew a lot of attention (primarily negative attention) and I always hoped you'd get better

If you're the wrong person i'm sorry

Endwall 01/31/2022 (Mon) 06:26:14 [Preview] No.1769 del
Yeah I'm the person who posted on 8chan/tech. It turned out poorly. The situation does not appear to be improving. Socially and financially it appears terminal. My computer surveillance problems also remain largely unsolved, even after everything I've learned and implemented. I am under audio surveillance in my home,land line telephone surveillance, computer network surveillance, and man on the street surveillance. My bank accounts are under surveillance and I'm drowning in credit debt, with insufficient income to sustain a positive outcome. I am financially destitute and socially isolated. I can't find work beyond my low end part time job. Every attempt has been interfered with and blocked since around 2014.

Apparently I'm also a public celebrity. The level of the gang-stalking and harassment went full Truman show. It is cross border and probably international. The main instigators of the crime are actually my own family members who are all face rubbing hand waving shit heads. I don't rub my face or scratch my face in counted sequences to communicate with people. I learned about the basics of the issue in 2010 after a massive harassment campaign against me. The problem was going on as far back as 1997 after recollection, but I didn't recognize that it was organized until around 2009.

People I don't even know seem genuinely angry at me for reasons I don't even understand. They jump over themselves to lie about me, impersonate me on some public-private messaging service that I don't have access to, and insert themselves in my path in order to portray that I am either retarded, a moron, a homosexual, a stalker, a skirt chaser, a drunk, a drug abuser etc. All lies.

I'm mostly at home doing my online courses for college these days, so unless I go outside I don't have any issues except for with my mom. My mom stands in front of the door to my room when she gets home from work and does hand signs and gestures and sneers at me and repeats slogans like ("It ain't happening!", "Enough is Enough!" etc.), she's a fucking robot shit head. She's also become a MAGA, Q-ANON, conspiracy follower, and repeats lies to me about these things as if they are facts. I have stopped trying to debate with her about these things as it is a waste of time. Regarding my situation, my mom says platitudes to me like "Pray to God and it will get better!", "It will all work out, you just have to believe.", etc. She's actually part of the problem.

The number of people in society in North America who participate in face rubbing, hand sign waving, and robotic phrase repetition, ("Thank you so much", "This is it", "That is all"), command and control, is around 99% of the population. Democracy is an illusion, we live under totalitarian command and control organized by witch covens, cults, Freemasons, pimps, prostitutes, drug cartels, socialist communists, corporations and fascists. I'm not going to bother calling it freemasonry or some other fancy name. I'll call it what it is, Organized Crime and modern day Slavery. Military Government Totalitarian Slavery. I am 100% not involved in this group it's appendages or its training, but I can see its effects everywhere especially on my own life outcomes.

Due to the surveillance, harassment and public messaging network impersonation and negative public-private marketing against me ( where I assume people gain negative opinions about me), I expect to be financially troubled, and socially isolated for the remainder of my life. I've had around 14 years of continuous decline in my financial and social circumstances due to this campaign against me. We'll see how it goes, but it doesn't look good. My interest in computer network privacy, security and anonymity is directly related to my experiences being harassed and suppressed. I hope that answers your question.

Anonymous 07/12/2022 (Tue) 09:51:41 [Preview] No.1786 del
I know you won't listen to this but you are mentally ill and need to seek professional help. You are making up connections where they do not exist because you are paranoid. Please talk to a mental health professional anon.

Endwall 07/24/2022 (Sun) 00:37:34 [Preview] No.1790 del
No. None of the above. Organized crime is real. Government surveillance and harassment is real. Computer surveillance and harassment based on computer surveillance is real.

You need to seek an optometrist immediately. Please get help and talk to an optometrist so that you can see clearly.

Endwall 07/24/2022 (Sun) 01:19:59 [Preview] No.1791 del
An optometrist just will not due. Please seek professional help from an ophthalmologist. Ophthalmologists are medical doctors that will be able to help you with your vision and eye problems. They are also trained to perform eye surgery if required. This may help to correct your vision, and help you to see the world as it truly is.

Welcome to Online Security: Sticky Thread Endwall 07/13/2016 (Wed) 03:11:01 [Preview] No. 181 [Reply] [Last 50 Posts]
Hello and Welcome to /os/, Online Security. This is a board for the discussion of online security, privacy, anonymity, and news from cybersecurity and privacy world.
1.Follow the global rules
2.No Spam
3.No Classified Documents or leaks of Classified Documents or Files (News articles, or commentary about the documents or files is OK)
4.No Child Exploitation Material
5.Images should be safe for work and relevant to the post or thread, commentary can be NSFW
6.No Advertisements of Hacker Services or Solicitations for Hacking Services
Related Boards
tech >>>/tech/ Hacker >>>/h4x0r/ Security Concepts>>>/sec/ EndSoft >>>/endsoft/
Privacy Guides
Software Recommendations

Message too long. Click here to view full text.

Edited last time by Endwall on 07/13/2021 (Tue) 22:51:04.

Sticky Bump Endwall 10/23/2016 (Sun) 18:54:40 [Preview] No.624 del
TENS , https://www.tens.af.mil/lipose.htm , US Air Force Live CD <-- online banking for mom and dad.
LibertyBSD http://libertybsd.net/ , https://libreboot.org/docs/bsd/openbsd.html
Edited last time by Endwall on 07/31/2019 (Wed) 07:19:36.

Sticky Bump Endwall 04/30/2017 (Sun) 03:29:12 [Preview] No. 894 del
Heads https://heads.dyne.org/ http://fz474h2o46o2u7xj.onion ; Devuan non-systemd version of Tails (Disclaimer: Website/Project uses occult language with communist signals)
Devuan https://www.devuan.org/ http://devuanzuwu3xoqwp.onion
Systemd Free http://systemd-free.org/
Edited last time by Endwall on 10/07/2017 (Sat) 03:03:59.

Endwall 06/01/2017 (Thu) 08:14:41 [Preview] No. 933 del
Mozilla Firefox Hardened Profile

Exploit development with artificial intelligence Anonymous 08/11/2022 (Thu) 16:26 [Preview] No. 1796 [Reply] [Last 50 Posts]
Exploit development with artificial intelligence

Why don't hackers use artificial intelligence to develop exploits ?

It is quite easy to develop exploits with artificial intelligence.

They do not need to use their own computers for this. There are dozens of artificial intelligence services operating online.

A special artificial intelligence algorithm that you will prepare will scan all the vulnerabilities that have come up to date. By making comparisons between the vulnerabilities it scans, it determines the cause and source of the vulnerabilities in a way that a human cannot perceive.

Understands how to develop exploits against vulnerabilities by examining all exploits written.

That's what intelligence agencies do. This is how hackers should do it.


The "hardware antivirus" Anonymous 08/07/2022 (Sun) 07:06:36 [Preview] No. 1794 [Reply] [Last 50 Posts]
Antivirus and cyber security systems used for computers are software-based.
Today, cyber espionage can be done not only with codes and programs, but also on hardware.
It is possible to spy directly on the hardware, bypassing the operating system and antivirus by loading harmful codes into the firmware on the chips of the hardware.
While it is possible to clean the malicious rootkits infecting the UEFI / BIOS firmware and Harddisk firmware of the computer by reinstalling the original firmware of the hardware manufacturer, the firmware of the chips in the other hardware of the computer (keyboard, mouse, mouse, usb controller, camera, microphone, video card, PCI slots and other hardware) It is not possible for ordinary people to detect and clean rootkits infected with the rootkit.
For this reason, a special operating system or special system software is required to detect rootkits that infect the firmware of chips in other hardware.
This system and operating system can detect by examining the signals given by other hardware to the system and by examining the operation of the firmware on the hardware chip, if possible, by examining its digital signature.
You can claim that the Sniffer and Monitor programs on the market can do this function. But these programs can examine as much as the operating system they are running gives them.
Therefore, a different system or operating system is required in this regard. Apart from this, "hardware antivirus" can be developed as an alternative to software antivirus and software cyber security systems.
Security software is usually installed on the operating system, the operating system kernel and, if necessary, the motherboard bios/uefi section. Alternatively, a "hardware antivirus" with a different motherboard and processor can be placed inside the existing computer case, regardless of the computer used.
The difference of this "hardware antivirus" from IDS, IPS and External Firewalls is that it can directly connect to the computer's memory, hard disk and network paths with a physical cable or implant, and physically control the computer system, ensuring the security of the computer regardless of the current operating system and motherboard.
This "hardware antivirus" can physically monitor the computer's input and output ports, stopping hard-to-detect BadUSB and NSA ANT tool attacks.

Endware Endwall 05/03/2016 (Tue) 08:54:28 [Preview] No. 32 [Reply] [Last 50 Posts]
Endware is a suite of programs geared towards internet privacy, security, and anonymity.

Endwall: endwall.sh is an iptables based firewall script designed to be implemented on any linux distribution shipped with iptables. endwall.sh is based on default drop policies, coupled with a novel strategy of passing packets on local host ports only for those enabled by the enduser. It comes with a variety of well used ports enabled with several additional port passing configurations available by uncommenting the script. It provides essential security to a new user.

Endsets: endsets.sh is a script that adds blacklisting and whitelisting functionality to endwall.sh. It depends on the program ipset. It is persistent on reboot if you enable ipset as a service. This is the recommended blacklisting tool for endwall if you are running a server or planning on opening up ports and services to the public and will require daily blacklisting of new incomming IPs.

Endlists: endlists.sh is a traditional text file list based blacklisting and whitelisting script. It has slow performance, and can't be updated on the fly. Good for <1000 ip subnets, very tedious and slow to run for more than that. Blocks the IPs by adding them as individual rules to the iptables ruleset. Works but not recommended for heavy duty on a server. May be useful for workstation use to block ip ranges if you are not opening up ports and services to public clients.

Endtools: endtools are a collection of scripts including alogz.sh, mlogz.sh, spamlogz.sh and iplookup.py. These scripts will help to service an enduser of endwall in adminstering endsets/endlists.

iplookup.py is a geoiplookup script written in python and requires python and pygeoip. It has simmilar functionality to maxmind's geoiplookup program and uses the maxmind *.dat files.

spamlogz.sh is a script that searches through log files to find flagged log entries flagged in endwall.sh, endsets.sh and endlists.sh.

alogz.sh is a daily log reading script designed to read the output of an apache http server's log output.

mlogz.sh is a daily log reading script designed to read the output of a postfix smtp server's log output.

Message too long. Click here to view full text.

Edited last time by Endwall on 02/25/2019 (Mon) 00:18:53.
278 posts omitted.

Endwall 06/23/2022 (Thu) 08:35:13 [Preview] No.1781 del

Lines: 502, 3695, 3703, 3713, 3721, 3729, 3737, 3745, 3753, 3761, 3769, 3777, 3785, 3793

The file is now visible again, somehow this isn't the latest version of the program, the line numbering is different than in my current master copy. In any event the lines are all links to the news feeds for Global News streams that they publicly distribute in the open at,


And you can see these links in your web-browser by going: right click on the page -> inspect -> network , and watching the traffic.

Publicly visible URLs, from their public open access broadcast.

The website and streams are not Geo-Location blocked, are public access, don't use a token or a cookie for authentication, are not behind a username/password log on or a paywall, don't have any DRM and are not encrypted. They publish the link themselves in the browser.

All of these links are visible and freely accessible in any modern web browser (Firefox, Chrome, Edge, etc)
by right clicking the web page -> Inspect -> Network , when watching the publicly broadcast streams available at,

Message too long. Click here to view full text.

Endwall 06/23/2022 (Thu) 09:01:14 [Preview] No.1782 del
In other news, I have created and tested versions of endwall_nft for wifi, I developed this file on Raspbian 11 64 bit on a raspberry pi 4 model B, and then tested the file on Debian 11 on my mom's Dell Latitude laptop. With some minor adjustments to the wifi version, wifi is working. The files are,







Use the raspi version if you're using a raspberry pi on Raspbian 11 32bit or 64 bit. Use and modify the wifi version if you're on Debian 11 on a laptop with wifi, or any other distribution that now uses nft.

I worked on some of the function translations and will backport them into endwall_nft.sh on the weekend.

Message too long. Click here to view full text.

Endwall 06/25/2022 (Sat) 09:35:37 [Preview] No.1783 del
I have just done some work on endlists.sh, to finish making shell functions for all of the list methods. I then made a translation of endlists into nft, as endlists_nft.sh'





I use this script to do all of my /8 bans for regions I have no business with like Asia, Africa, India.
If there is a specific range you want blocked just drop it into blacklist.txt, and then run the file. I've left this section commented out. I should probably uncomment it so that it's available.

Next I'll work on adding verdict maps (vmaps) in nft to replace the functionality of ipset. The next product I'll try to translate is endsets.sh. Once that's done I'll be able to set up my clearnet server hosting using nftables as a replacement for iptables. I'll post an update when I have something to show.

Endwall 06/26/2022 (Sun) 09:08:57 [Preview] No.1784 del
I have completed translating endsets.sh into endsets_nft.sh using the native sets capability in nft. Tested working on Debian 11.

The files are located here:




Let me know if the files are working for you.

I also made some minor bug fixes to the following files:
endwall.sh, endwall_nft.sh, endlists.sh, endlists_nft.sh, endsets.sh, endsets_nft.sh. Located in the usual places.

Message too long. Click here to view full text.

Endwall 08/03/2022 (Wed) 06:34:30 [Preview] No.1793 del
I just ported endstream to macOS using a MacMini 2014 model with MacOS 12.5 Monterey. Using the Homebrew package manager you can install youtube-dl, curl, openssl, and mpv, and then the program will run. I've tested this port as working, and have placed it onto the github repository and onto the hidden service.


Endware Hidden Service

Now endstream is tested working on the following operating systems : { Linux, OpenBSD, Windows NT, MacOS }. I'm planning on going back and making winstream.bat into a powershell script so that it is fully compatible and can access all of the streams. Right now winstream.bat just uses fixed links and m3u8 playlists and can't access the Youtube live streams or other dynamic playlists. I'll have to learn more about Powershell first which might take a month or two. Its a side project.

My next task with endstream is to fix up the channels on the OpenBSD port and test it, I'll work on that in around two weeks when I have some free time.

Summary: I made a cross platform killer app, and gave it away for free on the internet...

Internet Security General Anonymous 04/16/2016 (Sat) 07:56:30 [Preview] No. 4 [Reply] [Last 50 Posts]
Continuing from >>>/tech/597
This is for non specific, general tips for anonymous web browsing and downloads, tips on browsers and browser configurations for the security concious that you don't want to make a new thread for.
93 posts and 4 images omitted.

IRC Endwall 12/30/2018 (Sun) 15:41:05 [Preview] No.1357 del
IRC Workflow
STEP 0) grab endsh.sh


requires torsocks and firejail

STEP 1) Install IRSSI

$ su
# torsocks -i pacman -S irssi
# exit

STEP 2) Modify config file
$ cd ~
$ cd .irssi
$ nano config

Message too long. Click here to view full text.

Edited last time by Endwall on 03/09/2019 (Sat) 06:52:35.

Endwall 12/31/2018 (Mon) 02:26:09 [Preview] No.1360 del

You can also set up proxying to in Hexchat. This works when connecting to the .onion addresses.

Settings->Preferences->Network-> Network Setup

Fill in the socks5 proxy information. Then Add the new server in the connection tab using the .onion address and port number. Works.

Anonymous 02/17/2019 (Sun) 03:15:44 [Preview] No.1369 del
Unless there is a discount for buying a vpn with bitcoin. It is not necessarily an anonymous transaction because you theoretically connect to your raw ip with the bitcoin purchased vpn.

baroque music is played exclusively on modern instruments ShawnWic 03/19/2019 (Tue) 06:22:59 [Preview] No.1382 del
No Spam 5 year ban
Edited last time by Endwall on 03/19/2019 (Tue) 07:15:15.

Anonymous 07/29/2022 (Fri) 10:40:37 [Preview] No.1792 del
What is the search engine that should we use?

VPN/proxy/TOR general thread Anonymous 04/15/2016 (Fri) 22:12:39 [Preview] No. 2 [Reply] [Last 50 Posts]
Cool board idea.

What's the safest possible way to browse the internet anonymously and safely? There's a thread on /tech/ with the endwall developer talking about proxychains, and that seems pretty cool. Some of the links to proxy lists seem dead, and I have found some online but why should I trust these random 'free' proxies?

What about proxychains over VPN? I'm currently using Mullvad which is alright, and I'm curious about more security if need be. Does a VPN -> proxychain -> TOR connection work? Sounds horribly slow in theory, but I think we all know that privacy comes at a cost in our current world.

I suppose I could call this a 'VPN/proxy/TOR general thread.'
84 posts and 5 images omitted.

Endwall 06/27/2020 (Sat) 20:15:07 [Preview] No.1543 del
Use Digital Research DR DOS if you don't like Microsoft. I have retail copies of MS DOS 5.0 on 5.25" floppies from 1991, and MS DOS 6.22 on 3.5" floppies retail from 1994. NSA\CIA\FBI etc don't have a time machine and can't time travel and insert malware into the base system retroactively.

DOS is a Single Tasking 16 bit Operating System programmed in x86 assembly; only 1 process on the top of the stack at a time. No keyloggers, runs in 384 KB of memory.

You'll have to audit 2-3 pieces of software ( a driver for a 3com or Intel NIC, and links 2 browser ) and compile using Borland Turbo C, or get a GCC compiler for DOS.

Get a 486, or 386 with 16MB RAM install DR DOS or MS DOS, a NIC, a packet driver and the binary for Links, or compile it your self, set it to route through port 9050 on your tor router (running on Linux/UNIX). With that you'll be free to post whatever you want, nobody will know what you're doing on your computer, and if tor (or whatever comes next) works properly, then you'll be anonymous.

Free to read what you want from the internet, and post what you want to the internet.

>But but it's not FREE software,
> It's not GNU.
Precisely, I don't get copyright (legal) freedom, but I get actual (physical) freedom in the real world.
> But you could download an exploit; your system isn't secure.

Don't download and run anything from the internet on the DOS computer if you want it to remain with integrity. Just text reading and posting. Use it as a communications tool. Build a different computer for DOS gaming or use DOS Box on Linux/UNIX.

Message too long. Click here to view full text.

Edited last time by Endwall on 07/04/2020 (Sat) 23:37:49.

Endwall 06/28/2020 (Sun) 06:06:55 [Preview] No.1546 del
The ultimate step is to build an 8-bit computer with a soldering iron (RC2014), launch a browser in a community audited version of CP/M, connect by socks 5 proxy to a unix computer running tor with 12-15 hops, and use a text browser for the web and and irc client in text mode. Proxy out to Tor or I2P or whatever the next super duper anonymity router is. In the mean time do this with DOS. This won't be a solution for the everyman or for the newbie, but it will be a solution for the serious thinking man.

Endwall 06/28/2020 (Sun) 06:16:36 [Preview] No.1547 del
Anything you can do to isolate the tor daemon from the system or its running processes will help. I'm running it as a user with a custom torrc. If you can first run firejail or bubble wrap, or chroot it and get the tor daemon to still function it might help. I consider the linux/unix environment potentially hostile to the user and a potential source of packet inspection. Basically linux can be used to keylog the users and destroy the anonimity factor in real time or in post analysis. If there is key logging with an output beacon on your machine, you don't have privacy, and Tor Browser isn't going to help you with anonymity. If there is malware that can mess with the tor daemon as it's running, then it might be wise to try to isolate the process, so yeah probably a good idea. I'll try running it with firejail it probably won't work. If you get a setup like that and find it beneficial, please post the steps and instructions here. Thanks.

Anonymous 12/15/2020 (Tue) 07:36:25 [Preview] No.1588 del
I am big fan of Minecraft and like to watch different minecraft video on Youtube.But for watching I use https://veepn.com/vpn-apps/vpn-for-firefox/ because I can not log itnto my youtube channels.

I for one welcome our new overlord Anonymous 07/07/2016 (Thu) 17:44:13 [Preview] No. 152 [Reply] [Last 50 Posts]
I was about to claim this board, but seems like Endwall guy claimed it. Please disable captcha for replies. Also, guess this is a meta thread.
7 posts omitted.

Anonymous 07/16/2016 (Sat) 19:52:18 [Preview] No. 196 del
This looks like a related board:


Anonymous 08/26/2016 (Fri) 20:22:48 [Preview] No. 427 del
>no Tor hidden service
>suggests deanoning self via logging in to "Anon ID"
>while suggesting stronger way of deanon than cookies, they claim to not store IP
>just made post with Tor Browser with no JS, cookies only, no "anon id" crap
>post shows up as by "Outlander", suggesting that majority of users there deanon self across sessions
Gee, I wonder why people call it honeypot

Anonymous 08/26/2016 (Fri) 20:39:19 [Preview] No. 428 del
Wanted to join their IRC
OFTC is a bunch of rulecucks. While they allow Tor access, they limit amount of connections per Tor exit node. I had to rotate circuit 11 times to connect.
>#masterchan Illegal channel name
Looks like "identified anon's" message on that imageboard is truth
>Why is someone possibly IRCOP banning users right and left in #masterchan?

Why the hell Tor Project uses this cucked network?

Anonymous 08/30/2016 (Tue) 03:19:37 [Preview] No. 461 del

Anonymous 07/13/2022 (Wed) 19:56:35 [Preview] No.1788 del
https://youtube.com/watch?v=qtqP_gA0rXA [Embed]
Spam 2 year ban

System Resources Endwall 07/05/2017 (Wed) 03:13:35 [Preview] No. 965 [Reply] [Last 50 Posts]
I have some observations to make.

## I just tested these systems:
MS DOS 6.22 runs in 384K of memory (1994)
MS Windows 3.11 runs in 2MB of memory with a full mouse driven GUI (1994)
Macintosh OS 7.53 runs in 7.4MB of memory , full GUI + TCP/IP (1996)
Macintosh OS 8.1 runs in 13.2MB of memory, (1997)
Macintosh OS 8.6 runs in 26MB of meomory, (1998)

OpenBSD 6.1 starts in text mode command line in 27MB of memory
OpenBSD 6.1 in Xenocara uses 65-80MB of memory to start up.

## from recollection:
Windows 7 800MB of memory (2009)

Parabola GNU/Linux starts in text mode cli using 150MB of memory
Parabola GNU/Linux in weston uses 300MB of memory

Message too long. Click here to view full text.

Edited last time by Endwall on 07/05/2017 (Wed) 03:17:31.
12 posts omitted.

Endwall 07/12/2018 (Thu) 08:34:29 [Preview] No.1247 del
Fresh install of Parabola/GNU/Linux-Libre/OpenRC

On an Intel core2 laptop

boot into cli from OpenRC

$ free -h

used 60 MB

start xorg as root

# startx

# free -h

used 75 MB

Message too long. Click here to view full text.

Endwall 08/20/2018 (Mon) 23:04:48 [Preview] No.1274 del
Alpine Linux on OpenRC
Fresh install on encrypted lvm with the services it said to start in the wiki guide. In command line on busybox.
$ free -m

I couldn't get X org to start, but it would probably add another 20MB on top of that.

Endwall 08/20/2018 (Mon) 23:11:21 [Preview] No.1275 del
Hyperbola with linux-libre-lts on OpenRC is similar to parabola. Boots into user account in command line in at around 100MB xorg adds another 20MB ontop to around 120MB. Booting into a user shell seems to be more memory expensive than starting as root.

I want to boot to command line in no more than 20MB with a GUI that brings me up to no more than 40-50MB of memory usage. Any more than that and there is too much going on.

Endwall 08/15/2021 (Sun) 04:30:05 [Preview] No.1738 del
Gentoo Linux (2021)
Gentoo Hardened 10.3.0-r2
Linux/x86 5.13.10-gentoo Kernel

text mode: 51 MiB

Fresh install running with Btrfs on LVM on LUKS. Hardened Gentoo amd64 no-multilib stage 3,70 packages emerged. Running dm-crypt, iptables, lvm and bash. Could probably trim it down to 40MiB with some other choices (shell, daemons etc). I think this is going to be as good as it gets for Linux (for me) without changing things drastically. Maybe I'll switch my shell to ksh or dash or something else and see how it performs.

Endwall 07/10/2022 (Sun) 18:48:11 [Preview] No.1785 del
MacOS HighSierra (2017)

Installed on a MacMini 2011 with 16GB RAM, fresh install:

PhysMem: 4981M used (1945M wired)

The system needs at least 5GB to run properly, and uses up to 10-14GB of RAM when using applications. The memory usage is similar on Monterey.