/tech/ - Technology

Buffer overflow

Boards | Magrathea | Catalog | Bottom

Check to confirm you're not a robot
Email
Subject
Comment
Password
Drawing x size canvas
File(s)

Remember to follow the rules

Max file size: 350.00 MB

Max files: 5

Max message length: 4096


(344.41 KB 1891x1648 gM79GyK.png)
So whonix + fully configured tor, what's the next levels to even higher security, /tech/?
1 post omitted.


Anonymous 08/28/2022 (Sun) 14:07 [Preview] No.15117 del
>>15112
>what's the next levels to even higher security, /tech/?
Using hardware without hardware backdoors (like intel's ME)


Anonymous 08/30/2022 (Tue) 23:30 [Preview] No.15118 del
>>15112
Librebooted Thinkpad with camera, microphone and wireless physically removed (WiFi adapter plugged in whenever necessary), hardened gentoo install with optimized kernel + Whonix with configured LibreWolf (for superior fingerprint and no Mozilla Telemetry) over a private VPN which is a Raspberry pi hidden on public WiFi.


Anonymous 09/12/2022 (Mon) 16:50 [Preview] No.15127 del
run your own tor relay


Anonymous 09/23/2022 (Fri) 02:30 [Preview] No.15134 del
>>15127
What're the benefits of running your own Tor relay?


Anonymous 10/05/2022 (Wed) 12:26 [Preview] No.15152 del
Future generations will ask why Americans didn't resist when the US became a police state.



/tech/ hasn't been the same since 8ch went to shit. where did you go, anon?



(191.52 KB 1536x885 BITCOIN.jpg)
What is the best alternative to laundering the Bitcoin I have illegally earned? Anonymous 09/18/2022 (Sun) 23:34 [Preview] No. 15132 [Reply] [Last 50 Posts]
Is there another way to turn my "dirty" Bitcoin into clean money without having to buy monero?

I'm talking about an 8 digit amount, any suggestions
5 posts omitted.


Method 5 Anonymous 09/25/2022 (Sun) 06:42 [Preview] No.15140 del
-------- METHOD 5: TAINTED BITCOINS >>> ANONYMOUS ATM CARD (NO KYC) >>> ATM WITHDRAWALS --------


5.1 - Search for the term "The World's Largest P2P Offshore Marketplace" on DuckDuckGo.


5.2 - Go to the "Anonymous ATM Cards" category and open a trade order using a disposable email, only trade with diamond level or platinum level sellers.


5.3 - Enter the address of a packet forwarding service to receive the order and place the tainted Bitcoins in the platform's 3-of-3 multisig escrow.


5.4 - After receiving the order, activate online banking access with a pseudonym and burner phone number following the seller's instructions.


5.5 - Go online banking and customize your daily ATM withdrawal limits, then use your anonymous ATM cards to withdraw cash from any ATM around the world.

Message too long. Click here to view full text.



Method 6 Anonymous 09/25/2022 (Sun) 06:42 [Preview] No.15141 del
-------- METHOD 6: TAINTED BITCOINS >>> OFFSHORE LEGAL STRUCTURE >>> YOUR CORPORATE BANK ACCOUNT --------


6.1 - Search for the term "Offshore Company Formation" on DuckDuckGo.


6.2 - Register your offshore company away from your country's government's area of influence and obtain a corporate bank account in any tax haven other than the one where your offshore company was registered.


6.3 - Search for the terms "AgoraDesk" or "Hodl Hodl" on DuckDuckGo.


6.4 - Create an account using a secure email and sell your tainted Bitcoins by choosing the Bank wire option.



#Question: What is the difficulty level?

Message too long. Click here to view full text.



Method 7 Anonymous 09/25/2022 (Sun) 06:43 [Preview] No.15142 del
-------- METHOD 7: TAINTED BITCOINS >>> HOMELESS PERSON'S DOCUMENTS >>> NO KYC BITCOIN EXCHANGE >>> DISPOSABLE BANK ACCOUNT --------


7.1 - Search for the term "Homeless Shelters Near Me" on DuckDuckGo.


7.2 - Offer money or drugs to a homeless person to use your documents and open a bank account under your control.


7.3 - Search for the terms "AgoraDesk" or "Hodl Hodl" on DuckDuckGo.


7.4 - Create an account using a secure email and sell your tainted Bitcoins by choosing the Bank wire option.



#Question: What is the difficulty level?

Message too long. Click here to view full text.



Anonymous 09/25/2022 (Sun) 06:44 [Preview] No.15143 del
I created this profile especially to post this wilderness survival guide, I hope it helps you and all sellers to achieve peace of mind like I did!


I continue to sell drugs with my seller profile here and in other darknet markets, but the cops never knocked on my door again.


My children will inherit clean money to secure the future, come what may.


Society judges us daily but it was the circumstances of life that led us to this path, everyone is born good.


Copy these 7 methods in a safe place, teach your friends and help strengthen darknet markets!


Take it easy and study all the methods well so you don't make the mistakes I made in the past!

Message too long. Click here to view full text.



Anonymous 09/26/2022 (Mon) 12:27 [Preview] No.15146 del
What's wrong with monero or zcash?



(775.48 KB 750x742 1663306845742105.png)
Alternative to Tornado Cash Anonymous 09/18/2022 (Sun) 18:22 [Preview] No. 15131 [Reply] [Last 50 Posts]
Thought I would spread the word about a new privacy wallet that is integrated into Railgun. It's called Railway. It uses zk-snark proofs and works across any EVM capable chain. Imagine MetaMask, but if it had the ability to send 100% private transactions. That's what Railway is. Any ERC-20 or ERC-721 token can be transacted with with 100% anonymity.



Anyone knows a working SIM swapping provider? Anonymous 09/18/2022 (Sun) 11:33 [Preview] No. 15129 [Reply] [Last 50 Posts]
I found simswap.su but it look scammy



Arch Anonymous 09/15/2022 (Thu) 15:44 [Preview] No. 15128 [Reply] [Last 50 Posts]
I use Arch btw.



I am your subject Anonymous 08/31/2022 (Wed) 15:46 [Preview] No. 15120 [Reply] [Last 50 Posts]
i like you dam hackers!!!!!
maybe one day ill a>the haker one to bring the end



(27.52 KB 450x337 165348249244.jpg)
Programming question Anonymous 06/08/2022 (Wed) 19:23 [Preview] No. 15059 [Reply] [Last 50 Posts]
Im trying to make a chat site so i need to know something
I am going to have a stacked div layout and the text will replace itself however i am not sure how to keep the text on screen even when refreshed im using html, java, css, and php (i, know garbage) and using both chrome and firefox in windows 10
1 post and 1 image omitted.


Anonymous 06/09/2022 (Thu) 15:50:10 [Preview] No.15061 del
You could use LocalStorage.

https://www.w3schools.com/jsref/prop_win_localstorage.asp

Or fetch it on refresh via PHP from the server.


Anonymous 06/11/2022 (Sat) 04:27:33 [Preview] No.15062 del
>>15059
Maybe try using Flexbox for CSS?


Anonymous 08/21/2022 (Sun) 03:25 [Preview] No.15108 del
>while https://mitpress.mit.edu/sites/default/files/sicp/full-text/book/book.html is down.
What makes you think it's going to be back up?


Anonymous 08/21/2022 (Sun) 11:45 [Preview] No.15111 del
(242.53 KB 800x875 sicpanewhope.jpg)



What is Darkestdepth


Anonymous 08/14/2022 (Sun) 21:46 [Preview] No.15102 del


Anonymous 08/15/2022 (Mon) 13:10 [Preview] No.15103 del
>>15100
Does anyone know the link to the Darkestdepth community? A community for accessing these private networks. Some feedback would be appreciated. Thank you.


Anonymous 08/16/2022 (Tue) 13:40 [Preview] No.15105 del
>>15100
Testing to see if I'm banned because I got banned from /pol/



Take precautions against secret usb implants Anonymous 08/13/2022 (Sat) 08:16 [Preview] No. 15098 [Reply] [Last 50 Posts]
I am using Linux operating system.

My computer is not connected to the internet , I formatted it and changed the bios firmware and hard disk firmware. However, the program opens by itself, the mouse cursor moves by itself, and sometimes the system's default audio service is turned off.

When I examine it with the Wireshark program, an interrupt signal comes from the usb ports, even though there is no device plugged into the usb ports. The interrupt signal comes from linux's default idle hardware.
I have a hidden implant in my computer that looks like the NSA ANT COTTONMOUTH tool.
Wireshark logs https://easyupload.io/eqrfr6

This hidden usb implant can easily bypass all antivirus and security software by introducing itself as a hidden system process by overflowing the kernel, regardless of linux or windows operating system, during computer startup.

On computers that cannot exceed the kernel security, it introduces itself as a different hardware and takes over the control of the system via memory buffer overflow by overloading the interrupt. No antivirus and security software can detect this situation.

This hidden usb implant is not simple usb keyboard like ruber ducky and usb ninja. For this reason, do not recommend simple and useless scripts such as "usb guard". This implant is an advanced usb spying implant similar to NSA COTTONMOUTH.

My request from the linux community is to develop a security module for the linux operating system against hidden usb implants.