Catalog of /tech/


Mode: Thread

Max file size: 350.00 MB

Max files: 5

Remember to follow the rules

Max message length: 4096

R: 10 / I: 4 / P: 2

Anonymous SSH chat

Anyone interested to have old school hacker chat anonymously? And I really mean it, truly anonymously. Anonymous deep webs chat using SSH, that's right, no web / js soykaf.
ysdr3c3j7odl3p2zu5vdyaphf5x65l4hc3i2hmuy4vx4svibnxonvsqd on the onion network and port is 1337 protocol SSH as mentioned earlier.

R: 2 / I: 0 / P: 1



R: 4 / I: 0 / P: 1

The 'real'

n00b here looking into tor again - looks like there are quite a few 'hidden wikis' on a clearnet search, of course the sites can be set up by anyone. I'm interested in an old respected host that people have had good experience with, so that I can start building up my knowledge of whats on Tor.

Thanks for any help

R: 1 / I: 1 / P: 1


Hello there! I'm not speak english, so I'm sorry if your don't understand some of what a tell to your in my post. Well! I have the needed to learn robotics, at least, the basic to rotate and jawing a camera, like a security camera does. And I have to learn it on TOR. Don't ask way, please! Do you know a book, course, web page or any resource to start to learn? Thanks!

R: 4 / I: 0 / P: 1

So uh

Anyone wanna help me find a proxy site so I can use discord on my chromebook

R: 17 / I: 3 / P: 1

Alternative tech suggestions

Question: Is there an alternate site or tool to use twitter? Preferably one that doesn't use JavaScript. Twitter's not letting me scroll eternally and is asking me to sign in to continue.

Any more tech tools or suggestions are welcome here.

R: 2 / I: 0 / P: 1

l0icense thread

What is a good or a bad l0icense?

R: 42 / I: 10 / P: 1

Where did 8/tech/ go? I noticed that tech boards other than 4/g/, nano, and lain have really low activity or are dead.

R: 2 / I: 0 / P: 1

Desktop Environment

What Linux desktop environment is this, anon? What are those widget things on the right?

R: 1 / I: 0 / P: 1

Picture chat

A new no-logs anon chat service with pictures. Open source and easy to host. Auto-reloads allow live hacking of the code without losing the messages that are only stored in RAM.

Setup your own instances for whatever groups you need on Tor/I2P. Recommended to run as systemd unit with DynamicUser=yes sandboxing but runs also on terminal with a simple command and is secure without any sandboxing. Does not write any files nor use any database.

Finnish instance:

R: 8 / I: 7 / P: 1

Technology companies cannot be bought with money alone.

Technology companies cannot be bought with money alone.

The main reason why Elon Musk could not buy Twitter is because technology companies cannot be bought with pure money power.

In order for you to actually buy technology companies, you need to deter other power elements related to the relevant technology company and secretly take control of the electronic, cybernetic and telemetric devices used by those companies beforehand.

Before purchasing, you should also secretly control the employees of the relevant technology company.

The real owner of Twitter is MOSSAD. The American Nationalist Forces behind Elon Musk are actually trying to buy Twitter from MOSSAD. Since the original owner of Twitter is MOSSAD, it is difficult to secretly take control of Twitter employees and the servers and other devices Twitter uses. Because of this difficulty, Elon Musk and the US Nationalist Forces behind him are prolonging the process with various excuses.

R: 0 / I: 0 / P: 2



R: 0 / I: 0 / P: 2

Is there any way to get data of specific TikTok users/accounts?

Just wanted to ask if theres any way to get data that TikTok collected from specific users and if so, how do i get them and how precise are they.

R: 7 / I: 0 / P: 2


Signal is dead, they are glow niggers now.
They are closing some of their servers source. Time
to check out some alternatives
no install, no phone, no email, every network request
can be checked because it's a web app.

Join our group to discuss privacy

R: 4 / I: 0 / P: 2

SpeakUp: Silent Speech Interface; Low Cost; Arduino; Machine Learning

Project Summary by Varun Chandrashekhar: "I have designed and developed a speech interfaced for the paralyzed, which they can use to communicate without speaking. This device detects speech-related electrical signals from the throat and converts them into letters or words that we recognize using machine learning models."

SpeakUp - ML Based Speech Aid to Enable Silent Communication

My comment about the project: easily replicable by anyone with computer science knowledge, different from what is being done with the silicon trojans in the 3G/4G/5G equipment only on it needing physical probes. Anyone doing research on this area be cautious of sabotage when using US designed CPUs (AMD/INTEL/QUALCOMM/APPLE/ARM), as the microcode, SMM and firmware of your system may be manipulated to mess up your computations. Ask your own Nation to stop trusting Silicon Valley and make your own silicon supply chain and tech services. Meanwhile, mitigate this situation by moving to an area away from any cell radio transmitter (check coverage on and shielding yourself and your devices from electromagnetic eavesdropping and interference.

R: 3 / I: 1 / P: 2

to avoid the appearance of government propaganda
Leaked Documents Outline DHS’s Plans to Police Disinformation
October 31 2022, 9:00 a.m.

Behind closed doors, and through pressure on private platforms, the U.S. government has used its power to try to shape online discourse. According to meeting minutes and other records appended to a lawsuit filed by Missouri Attorney General Eric Schmitt, a Republican who is also running for Senate, discussions have ranged from the scale and scope of government intervention in online discourse to the mechanics of streamlining takedown requests for false or intentionally misleading information.
There is also a formalized process for government officials to directly flag content on Facebook or Instagram and request that it be throttled or suppressed through a special Facebook portal that requires a government or law enforcement email to use. At the time of writing, the “content request system” at is still live. DHS and Meta, the parent company of Facebook, did not respond to a request for comment. The FBI declined to comment.
To accomplish these broad goals, the report said, CISA should invest in external research to evaluate the “efficacy of interventions,” specifically with research looking at how alleged disinformation can be countered and how quickly messages spread. Geoff Hale, the director of the Election Security Initiative at CISA, recommended the use of third-party information-sharing nonprofits as a “clearing house for information to avoid the appearance of government propaganda.”

R: 3 / I: 5 / P: 2


UFO engine

R: 4 / I: 0 / P: 2

[BBC News] Enigma da síndrome de Havana, que ataca diplomatas americanos e intriga cientistas [Embed]

Espionagem Eletromagnética e Mandantes de Adélio Bispo

Quando o Presidente diz que "5G é usado para espionagem" e que "urnas são passível de fraude", ele está correto mas não sabe como apontar evidência. Eu sei e fornecerei um método experimental para que a Polícia Federal possa se convencer disso. Porém, não somente urnas, mas todos os computadores e celulares (os da União inclusos) são passíveis de interferência e não é apenas o 5G que é responsável por espionagem eletromagnética, mas silicon trojans implantados nas torres desde o 2G. Isso permite não só controlar os silicon trojans nós processadores, mas também é usado para causar a Síndrome de Havana que atinge pessoas pelo mundo.

O modo de espionagem sendo usado para manipular pessoas como o Adélio Bispo a cometer crimes é usado no Brasil por um grupo também responsável por sites de ódio como "Dogolachan" e mercados de drogas como "Nightmare Market". Porém eles são apenas usuários do sistema de espionagem, que também é usado internacionalmente. A tecnologia é americana mas não governamental. Como os dados obtidos com essa espionagem também abastece serviços automatizados de recomendação de propagandas e conteúdo (outro método de gerar dinheiro para eles), há uma abertura para demonstrar que sistemas não conectados a internet estão vazando informações através dessa espionagem eletromagnética.

Quando uma empresa como o NSO Group oferece o Pegasus, eles fazem uma demonstração para que fique claro que conseguem acessar dispositivos celulares. O que estou oferecendo é um modo de demonstrar a ocorrência de espionagem eletromagnética que obtém dados de todos os computadores de modo contínuo. Uma vez evidenciado isso, indícios dos crimes facilitados por essa espionagem ficarão crediveis.

R: 0 / I: 0 / P: 2

3 JS-less imageboard software

Collection of 3 JavaScript-less imageboard software. nanochan, picochan and phichannel. They're pretty similar to each other. Downloaded/scraped straight from their respective original source, no modifications or additions.

R: 10 / I: 0 / P: 2

Best Vpn?

What's the best VPN in terms of:

Usable on windows/linux/mac

no logs

Accepts payment privately and doesn't log any payment details?

R: 19 / I: 2 / P: 3

Lenovo t420

am i making a good choice? just need something reliable and not fancy at all.

R: 6 / I: 0 / P: 3

So whonix + fully configured tor, what's the next levels to even higher security, /tech/?

R: 0 / I: 0 / P: 3

/tech/ hasn't been the same since 8ch went to shit. where did you go, anon?

R: 3 / I: 0 / P: 3

pci_disable_device unknown parameter error

The pci_disable_device function is defined in the source file of the kernel pci module.

Let the pci_disable_device function be a working parameter of the kernel pci module.

GRUB boot commands works when I type pci=disable_acs_redir=pci:12D8:2308 in linux pci module.

When I type pci=pci_disable_device=pci:12D8:2308 to disable the hardware, it gives unknown parameter error.

what is the reason of this ?

R: 10 / I: 0 / P: 3

What is the best alternative to laundering the Bitcoin I have illegally earned?

Is there another way to turn my "dirty" Bitcoin into clean money without having to buy monero?

I'm talking about an 8 digit amount, any suggestions

R: 0 / I: 0 / P: 3

Alternative to Tornado Cash

Thought I would spread the word about a new privacy wallet that is integrated into Railgun. It's called Railway. It uses zk-snark proofs and works across any EVM capable chain. Imagine MetaMask, but if it had the ability to send 100% private transactions. That's what Railway is. Any ERC-20 or ERC-721 token can be transacted with with 100% anonymity.

R: 0 / I: 0 / P: 3

Anyone knows a working SIM swapping provider?

I found but it look scammy

R: 0 / I: 0 / P: 3


I use Arch btw.

R: 0 / I: 0 / P: 3

I am your subject

i like you dam hackers!!!!!
maybe one day ill a>the haker one to bring the end

R: 6 / I: 4 / P: 3

Programming question

Im trying to make a chat site so i need to know something
I am going to have a stacked div layout and the text will replace itself however i am not sure how to keep the text on screen even when refreshed im using html, java, css, and php (i, know garbage) and using both chrome and firefox in windows 10

R: 3 / I: 0 / P: 4

What is Darkestdepth

R: 0 / I: 0 / P: 4

Take precautions against secret usb implants

I am using Linux operating system.

My computer is not connected to the internet , I formatted it and changed the bios firmware and hard disk firmware. However, the program opens by itself, the mouse cursor moves by itself, and sometimes the system's default audio service is turned off.

When I examine it with the Wireshark program, an interrupt signal comes from the usb ports, even though there is no device plugged into the usb ports. The interrupt signal comes from linux's default idle hardware.
I have a hidden implant in my computer that looks like the NSA ANT COTTONMOUTH tool.
Wireshark logs

This hidden usb implant can easily bypass all antivirus and security software by introducing itself as a hidden system process by overflowing the kernel, regardless of linux or windows operating system, during computer startup.

On computers that cannot exceed the kernel security, it introduces itself as a different hardware and takes over the control of the system via memory buffer overflow by overloading the interrupt. No antivirus and security software can detect this situation.

This hidden usb implant is not simple usb keyboard like ruber ducky and usb ninja. For this reason, do not recommend simple and useless scripts such as "usb guard". This implant is an advanced usb spying implant similar to NSA COTTONMOUTH.

My request from the linux community is to develop a security module for the linux operating system against hidden usb implants.

R: 0 / I: 0 / P: 4

Exploit development with artificial intelligence

Exploit development with artificial intelligence

Why don't hackers use artificial intelligence to develop exploits ?

It is quite easy to develop exploits with artificial intelligence.

They do not need to use their own computers for this. There are dozens of artificial intelligence services operating online.

A special artificial intelligence algorithm that you will prepare will scan all the vulnerabilities that have come up to date. By making comparisons between the vulnerabilities it scans, it determines the cause and source of the vulnerabilities in a way that a human cannot perceive.

Understands how to develop exploits against vulnerabilities by examining all exploits written.

That's what intelligence agencies do. This is how hackers should do it.

R: 54 / I: 17 / P: 4

Literally No Reason To Not Use Windows 10

And you're telling me you can't afford a $200 PC from the past 5 years that will run it seamlessly? Sell your 15 year old Thinkpads that can't even into AVX or non-fixed pipeline GPUs.
Have you anything to hide? No one cares about you. You aren't developing anything significant. You aren't a threat to the current ecosystem. You aren't a terrorist/spy/lone-wolf actor. FVEY has better places to spend its resources on. You're already being watched with facial recognition, Low-Earth orbit imagery satellites, and backbone-level deep-packet inspection.
You can disable the telemetry in settings. Go a step further too and get the Enterprise edition with minimal software preinstalled.
In the beginning? Sure, but now its quite stable, and you'll be hardpressed to come across any problems. Linux, on the other hand, presents you with hours of work, ranging from broken audio to missing files to a lack of hardware and application support.
You're paying for consistent updates and almost full support for any and every application in existence. The user experience and interface is only beaten by Mac OS from Apple, and is lightyears ahead of anything Linux could bring to the table.
You don't take advantage of FOSS. You've never looked into the software to determine how it works.
And Stallman is a foot-eating pedophile. Separate the art from the artist.
Windows is utilitarian with a focus on getting shit done. It won't waste your time with hundreds of customizable options and features. It just works. Imagine spending 10 minutes writing assembly code every time you wanted to use your microwave. The people who use windows only care about the applications inside of it, not stupid crap like sub-pixel rendering and kernel parameters.
Your elitism is nothing. "Normal" people are happy, fulfilled, and have their heads on straight. You on the other hand have spent countless hours behind a screen, posting on strictly anonymous websites, angry about the state of the world and how you're so much better than everyone else.
>FUCK YOU!1!!!1!

There is literally no reason to use Linux. It had its purpose, but the functions it can perform are now but a subset of the functions Windows can perform.

Make the switch.

R: 7 / I: 6 / P: 4

BZFlag map format desired for ChaosEsque Anthology

BZFlag map discussion.
Years ago they, when I made BZFlag maps, deleted my textures because they didn't like my views: making my maps unplayable for everyone (all textures were hosted on bzflag webservers and only bzflag webservers).
I want to kill these people.
But what I would like more is for ChaosEsqueAnthology to parse the BZFlag map format.

R: 2 / I: 0 / P: 4

Facebook develops exploits to hack into your computer!

The usual products and services, Web trackers and phone apps are not enough for Facebook's infinite greed for spying and data mining. They will even develop exploits to hack into your computer for even more information gathering!

R: 3 / I: 0 / P: 4


I want to join IRC channels but i cannot do it without using TOR, i2p currently not a choice. any solutions except for VPN or local proxy?

are there any cypherpunk, tech IRCs which allow TOR adresses. prob, just private ones eh? but thei rhard to get in.

R: 0 / I: 0 / P: 4

Obrigado, +

Obrigado pelo post
apostas de tГЄnis todos os dias - casino slot vegas online

R: 19 / I: 4 / P: 4

Darkweb Intro

Alright, could anyone give me a basic bitch primer on dark web for little babbies? My knowledge at the moment is limited to Tor, and the onion addresses for the hidden wiki, and the onion address for Endchan. I'm starting to realize given how every site I liked has been shut down, switched domains, DDOSed, put on watchlists, or made 'registration only' on clearnet channels (a sidenote: I would have thought this would have happen to the porn sites I visit, but oddly enough, those are A-OK on clearnet) that I need to go ahead and plan for the future and just move whole-hog to Dark Web. To those who wil say I'm a little late to figuring this out: you're right. Here's what I would like if anyone can supply it:

- What are all the darkweb channels? Tor, I2P, Zeronet, I missing any?
- Any basic tips on general usage/quickstarts for each channel. Pros/cons of each.
- Good starter websites for each. I'm particularly interested in news/forums, and any libertarian websites.

Thank you very much m(_ _)m

R: 10 / I: 1 / P: 4

New privacy messenger

I found a new messenger. Real E2EE and self destructing. What do you think about that?

R: 0 / I: 0 / P: 5

You like Dead by Daylight? Their early work was belittle noob saves as a waist. But when Portrait of a Murder came out November 2021, I think they really gamed into their zone, eternally and realistically. Scourge Hook: Pain Resonance causes clear, crisp screams of survivors causing them to be downed, and delightful fleeing compensates dealing with intersectional feminism that really causes Dead by Daylight to seduce. Victims aren't always scared let me dispel this fellows, but I think the survivors have far more Twitter morals like a tumor. In October 2017, Devs released this: Nightmare!, the most demolished victims. I think their best polluted killer is "Nemesis". A murderer so catchy, most survivors probably don't position away when he rips. But they should, because it's not just about pressuring minorities and the performance of friends. It's also reversing for blatant finesse see for yourself. No gun, no mall! Put on a mask and save Anglos like you have foresight, you fuckin stupid bastards!

R: 0 / I: 0 / P: 5 invites pwease?

another day of begging:(
encrypt with this key if possible:


R: 9 / I: 0 / P: 5

Email Service don't require phone number

Email Service don't require phone number:

R: 4 / I: 0 / P: 5

Looking for chart of all imageboard software

Hello friends and family! I am looking for an image of a diagram/chart of all the imageboard software.
It was originally posted on 8chan's tech board in 2019:
Sadly has blacklisted the media files domain for 8chan and it's not on either. So if any oldfag here has the image, it would be much appreciated.

R: 2 / I: 0 / P: 5

3D Metal Printer Project

Hello! My name is Agustin Cruz. I'm making a 3D Metal Printer for making parts with titanium and other metals. Is a low cost, Open source project, so everyone can make their own 3D Metal Printer.

The goal is to make 3D Metal Printing more affordable to the general public, hospitals, small institutions, organizations and companies around the world. Specifically for developing and low income countries. This project fills a gap that no open hardware successfully fills. 3D Metal Printing is an impactful tool. Making it more accessible will democratize science, engineering and empower people. This low-cost hardware will be able to accelerate innovations in and lower barriers to scientific research.

This printer uses an electron beam to selectively melt each layer of metal powder, causing the powder particles to fuse together. After one layer is complete, the build platform is moved down one layer in height. The re-coater comes in again with a fresh layer of powder, and the electron beam starts to induce the fusion of powder particles, causing the new layer to form. This process is repeated until the entire part is finished, making a solid metal part.

This is what I do fulltime. Doing all this takes a lot of time and effort. Now the project is opening to the community inside a crowdfunding model. The design, tests, updates, will be shared so I can receive some support and continue working 100% in this project

I made a Patreon, if you want to support my work:

I also created a Bitcoin and Monero address. They are also in the Patreon site.

Bitcoin Address: bc1qh2zlse6nm8rtqkcvxx32jxea0jc2akp4pvw93y

Monero Address: 44amLuHZzV49nkLj6Ahh5UXA7NTrYTUB5d6bKokbypd6FvNQw5x91UZ8PCEm3Tc44u1FfnPzuChfFF4hG97DQVpfBekmJHp

R: 9 / I: 2 / P: 5

Install Gentoo Wiki

Hey, remember this? Remember this cross-chan wiki that we all helped make but then abandoned because of constant atacks? Well, why aren't you helping?! This is /our/ wiki. Please help today!

R: 0 / I: 0 / P: 5

I need it to track a target. I am trying to get as much information as I can about them.

R: 14 / I: 0 / P: 5

How accurate is this picture?