Anyone interested to have old school hacker chat anonymously? And I really mean it, truly anonymously. Anonymous deep webs chat using SSH, that's right, no web / js soykaf.
ysdr3c3j7odl3p2zu5vdyaphf5x65l4hc3i2hmuy4vx4svibnxonvsqd on the onion network and port is 1337 protocol SSH as mentioned earlier.
https://docsend.dropbox.com/view/8xshmktnjadkb5pp
https://docsend.dropbox.com/view/3r2jihunjr7hrm33
https://docsend.dropbox.com/view/emh2gbcwym3fsp9c
https://docsend.dropbox.com/view/3pwfa2a8z7c228ah
https://docsend.dropbox.com/view/dua2deaf3hdzrrpw
https://www.linkedin.com/posts/louiswhunt_i-recently-left-the-brilliant-team-at-liquid-activity-7273794644964950016-_sJO?utm_source
https://nitter.poast.org/louiswhunt/status/1868026490300014947
https://suchir.net/fair_use.html
I've always been curious as to know how do people get to setup their websites on TOR and assign the .onion domain. The questions are:
1- How do people assign specific name in their supposedly random name in their website name (Check duckduckgo onion website address or protonmail or even Facebook and you'll always see their names as the first thing in their address, followed by some random characters instead of the usual one like 8chan.moe on .onion)
2- Do you necessary have to have a website on the clearnet, before assigning it to the dark web? If so, then how do people upload CP on a dark web website without any of the materials gets tracked to its original clear net IP address servers?
3- What's with the hate about Javascript and how dangerous can it exactly be to someone who uses TOR?
I know that these type of questions you'd expect from a newfag, but I just decided to ask, instead of just blindly following whatever is being told.
It is allowed to paste copypasta or any external materials to answer this thread here.
> buy on sale hp printer for linux
> hp wants bullshit cloud hp+
> say no to hp+ during setup
> say no multiple times
> try to print something
> you must use hp+ to print
> searx bypass hp+ for model
> no info
> read in box physical manual
> tells me to print manual
> ordered button combination
> new manual says to print manual
> next manual says to web portal
> web portal needs pin
> the pin is inside the ink tray
> forget to close tray after read
> network state toggling on/off
> restart printer
> check hp smart
> printer state offline
> setup printer from the start
> get back to where I was
> manual says use wifi direct
> click enable wifi direct
> setup in progress pls wait 2hrs
> ignore
> says I need 2.4 freq
> try to change freq 2.4+5 to 2.4
> network state toggling on/off
> restart printer
> check hp smart
> printer state offline
> setup printer from the start
> get back to where I was
> realize I have to wait 2hrs
> midnight
> don't have time to wait 2hrs
> start preparation for tmrw
> write 7 digit pin
> write 10 char down admin pass
> write 12 char wifi direct pass
> mfw when I left out like 20steps
place your bets
will it print?
what is considered the best way to browse the web and interact with technology in general and remain anonymous if your threat model includes 3 letter glowboys?
== HELP COCK.LI ==
> You don't need anything but an Internet connection to use cock.li. If all you had was a library card you could use a public computer to get an e-mail account. It's a strange thing to say about a joke website, but cock.li improves access to services for marginalized people globally, without connecting into some corporate system.
> I've never got so much laughter out of anything in my life than my time here. It's not even close. The funniest e-mails I've ever read were sent on cock.li, some of them to me directly. I'm the worst at responding, but I read every e-mail you send me. Every password reset request, every schizo ramble, every question, every story.
> Vincent Canfield
The email provider cock.li is facing legal difficulties to keep the services running.
Vincent, the creator and administrator for over 2 decades has asked for donations to help with the recent challenges. He and his team have provided the service free of charge all this time. Now it's time for us to provide something in return.
Daily updates about the situation will be available at:
https://cock.li/index.asc.txt
Main page:
https://cock.li
https://quakeone.com/forum/quake-talk/quake-central/284400-project-to-add-more-map-formats-to-quake
I've been working more on my P2P imageboard software, and after the underlying p2p database engine (Peerbit) has undergone some major upgrades, the performance and stability are a lot more robust now. There are also a lot more UX improvements recently based on user feedback. I've attempted to keep the dependencies minimal and make the install process as simple as possible. There are several nodes online to my knowledge but I don't necessarily have a full map or total knowledge of the network. Feel free to try it out and join the swarm lol.
https://gitgud.io/threshold862543/peerchan
For moderation I've kept a totally "flat" architecture where each node is free to delete any content at any time. But this deletion only applies to the node itself by default. If you want to be able to delete things on other user's nodes, they have to subscribe to your node as a moderator, and then when you delete something, that deletion action will be broadcast to others and they will accept it in their own local database. So you can subscribe to other people as moderators if you trust them to be able to delete things for you.
Each board is it's own independently-seeded topic and you can watch (join) or unwatch (leave) a board topic at any time.
There are various config options to customize your experience too.
Posts and file uploads are made under a newly generated temporary identity every time (by default) for the sake of anonymity. If you want to anonyitymax at the networking level I recommend using Whonix to connect, though ideally eventually native integration with Tor can be developed for Peerbit or libp2p itself. That being said, already there is no association between a post and the uploading IP, when you receive a post from another node, the original poster is not known, as posts and files are relayed from node to node without recording the source.
This is the Peerbit p2p database system it uses which is built on libp2p.
https://peerbit.org/#/
To explain the setup a bit, the default configuration opens a webserver on localhost port 8000 that serves pageviews to you and allows you to browse and post to the p2p database, which connects to other nodes in the background.
If you want to make this into a publicly facing website via nginx or something, there is the option to enable "gateway mode" where you can enable or disable certain features (like the ability to delete posts) for public users accessing it over the internet. Essentially this allows other people to interact with your node over the internet and post using the traditional client-server concept. You can also disable all features when not logged in, making it so only you can browse and post and moderate when logged in (eg. from your phone or another computer elsewhere) but other internet users won't be able to access the content on your node.
I've gotten a node to work and successfully replicate posts and files on Android in the past too, using Termux, so you can also do that as well.
The WOLT established a new societal structure where niggers were relegated to the status of mere laborers, forced to work under harsh conditions. They were paid a pittance, barely enough to survive, while the white shareholders and owners of WOLT thrived in luxury, enjoying the fruits of their labor. The streets buzzed with the sound of niggers delivering goods to the elite, burdened with heavy packages, their faces etched with despair.
Each day, niggers were assigned routes through the city, delivering items for corporations that profited immensely from their labor. The WOLT monitored their every move, ensuring compliance through a network of surveillance. Those who resisted were swiftly dealt with, disappearing into the shadows of the city, never to be seen again.
Where did 8/tech/ go? I noticed that tech boards other than 4/g/, nano, and lain have really low activity or are dead.
A new no-logs anon chat service with pictures. Open source and easy to host. Auto-reloads allow live hacking of the code without losing the messages that are only stored in RAM.
Setup your own instances for whatever groups you need on Tor/I2P. Recommended to run as systemd unit with DynamicUser=yes sandboxing but runs also on terminal with a simple command and is secure without any sandboxing. Does not write any files nor use any database.
Finnish instance:
chattaavacmowol2z62co2p3mmqmuoe6otlmbtthwngracvzc6pixgyd.onion
Question: Is there an alternate site or tool to use twitter? Preferably one that doesn't use JavaScript. Twitter's not letting me scroll eternally and is asking me to sign in to continue.
Any more tech tools or suggestions are welcome here.
LEAKED FILES| INVESTIGATION REPORT ABOUT k-BEST TECHNOLOGY Inc. ACER GROUP
Endchan.org/CaptainBlackbeard
https://redcircle.com/shows/CaptainBlackbeard
pitchprash4aqilfr7sbmuwve3pnkpylqwxjbj2q5o4szcfeea6d27yd.onion/@captainblackbeard
Hi,
I was hacked by a neighbour with friends whom decided to share my webcam footage for years, since I moved in the building when I was 12 we were neighbours.
I need to know what I need to know to find out who exactly hacked my camera, where that information is, and what I can do to know whom to give.. retribution to.
If you know a hacking service then I'd consider that.
The neighbour laughed when my father suddenly died and decided to spill the beans. But I don't think he is capable nor do I think he is worth my time in getting information from. He laughed the whole time, meanwhile he hits on children. I was stupid then and shrugged it off, I was 15 at that time basically.
I need to know what you can share, what you would do, anything would help.
My email is [email protected].
You can also reply here.
Any information can be useful information. Any information you need, I can find my way to supply. I have friends still there, and they are willing to help.But we need more direction on how to attack and get the people who decided to share my webcam footage with people whom came to.. do more than just stalk me.
Thank you,
Again anything will help,
Ionixx
What do I have to consider if I want to scan an ip address anonymously (via tor) with nmap?
"🛡️ Ready to test your security? Take the quiz to find out how well-protected your digital world is. Scan now!
🔑 Do you hold the key to love? Take the quiz to unlock the answer! Scan the code and find out where your heart stands.
👀 Are you being watched? Take the quiz to find out if your online activity is truly private! Scan the code now!
🔒 Think your browsing is private? Take the quiz to see how locked down your data really is. Scan the code now!
Anyone got any repos of gpt4 API keys? Need to try something out but am poor
I tried everything suggested:
Devrant: people just seethed I was talking about programming
Github: ghost town of faggots, doesn't even have a forum, msged every person that does T3d stuff, not one person looked at the repo, got banned for 7 days from "community" for posting a request:
OpenArena Discord: Banned, IP banned, shadowbanned, etc.
This isn't the opensource world of 20 years ago. It's a world of feminist-worshipers, dick-sawing faggots that need to be tortured and then after they are tortured; killed. It is the new-testament world. Women's rights and "chop off yo dick for heaven! Matthew 19".
If the world gets unstable, and Russia does enact WW3, and things become possible, and I am able to do so: I will kill these pro-feminist anti-child bride pro-dick-chopping faggots who banned me from the various places. If I am able to do so during WW3.
They hate freedom of speech. They hate freedom of thought. They want to castrate your boys. They are faggots. And they worship women.
I will kill them fucking dead if a time of chaos arises and I can do so. As revenge.
If you want to get on the deep and dark web and explore everything it has to offer, but have no idea where to start, do not worry, there is a solution! It's called the Hidden Wiki and is a great way for anyone to get started on the deep web. Essentially, it is everything you need to start your adventures on the dark web: a list of links, reads, and things to do! It just got a brand new link too! (http://zqktlwiuavvvqqt4ybvgvi7tyo4hjl5xgfuvpdf6otjiycgwqbym2qad.onion)
Just put that link into the TOR Browser and you'll be there! Ready to surf! I could not suggest it more and hope this helps you all,
Cheers,
A tech enthusiast
Im here to share a new imageboard architecture, a leechboard the nests into blockchain eventlogs and hotlinks images, prefably from ipfs pinning services. This makes it serverless in the sense there is no central server and anyone can run the client locally, this means no cloudflare.
It was written mostly in response to the proliferation of AI botnet swarms drowning out authentic content. To execute a strategy here one has to pay disproportionally more than an anon posting, and when they do it drives demand for the network token, padding their investments.
Hashchan.network
Hi everyone,
So I got scammed and sent money into some shady crypto brokerage. Noticeable amount, it'll take months for me to recover from that.
Now I want to try and have revenge.
So far:
• Their website runs on a separate VPS
• Only SSH and HTTP/S ports are open
• I've found where the admin panel must be located, it requires basic HTTP auth
• The API is exposed but there is nothing useful, the real stuff seems to be in the admin panel
• I've started bruteforcing ssh "root" user, and "admin" panel user with rockyou list; I don't think that will work tho
Any ideas what could I try next? I'll go to sleep now but I'd be delighted to read your suggestions in the morning, thanks!
https://youtube.com/watch?v=EvcvA36iKFA
MASSIVE HACKING TOOLS COLLECTION DOWNLOAD 799MB
https://archive.org/details/tools_202210
🎨 Calling all developers and #NFT enthusiasts!
Discover endless possibilities with @AndromedaProt & @StargazeZone
Build on specialized #NFT infrastructure, explore cross-chain interoperability & seize new monetization opportunities
Start innovating now! 🛠️
$ANDR $STARS
Andromeda OFFICIAL Handles:
Telegram: https://t.me/andromedaprotocol
Twitter: https://x.com/AndromedaProt?t=ohGq-wvn4UMHhDbxGBwO5w&s=09
Website: https://www.andromedaprotocol.io/
Discord: https://discord.com/invite/GBd6buKYyZ
Medium: https://medium.com/andromeda-engineering
Hey anons.
Anyone here know of a good e-mail hosting service on TOR that isn't a honeypot or a shittily-hosted mess? Looking to make an inbox that won't get deleted off the face of the earth or get me arrested. (I'm not looking to commit crimes, but can't take any chances)
Anything you like even if it's not necessarly useful :
- deauther
- badusb
- bug detector
idk......
I recently bought a cheap eReader with e-ink. I like it, but the resolution and screen size are too small and e-ink monitors are ridiculously overpriced. I'd still love to have a 32 inch e-ink secondary monitor for reading if they weren't so damn expensive. It would not be for gaming or videos because the 15 hertz refresh rate and ghosting is silly, bit because when you're reading it can look so sharp and be easy on the eyes.
Who else likes e-ink?
Hands down the best darkweb forum for cybersecurity, database leaks and just a place to hangout
No Javascript and No email are needed!
Onniforums main link: http://onnii6niq53gv3rvjpi7z5axkasurk2x5w5lwliep4qyeb2azagxn4qd.onion
Onniforums clearnet: https://onniforums.com
does anyone have any good OSINT Tools for running background checks on emails,usernames and phonenumbers?
What Linux desktop environment is this, anon? What are those widget things on the right?
Is there anyone who can help me with the functions of the pen button on https://pixmap.fun please?
Good afternoon guys, I'm new here. Do you know how to indicate a good link to learn cybersecurity? I want to learn advanced programming
Is everything adapting for blink or it's gecko is shit?
AND THE WORM X (privously Twitter) UPDATED FINAL BEFOR THE NEW YEAR THESE ARE THE CHRISTMAS PRICES!! ❤️
BTC SAVE 20%
API COST 800.00
WEB IS 400.00
Contact:https://t.me/Worm_Gpt_X
Discount:ivan50 (USE IT FOR AN EXTRA DISCOUNT!!!)
Trying to unlock this tablet. Anyone got the tool to do this?
and i simply leave torrent client on all the time just like my personal computer for online is on all the time
The pci_disable_device function is defined in the source file of the kernel pci module.
Let the pci_disable_device function be a working parameter of the kernel pci module.
GRUB boot commands works when I type pci=disable_acs_redir=pci:12D8:2308 in linux pci module.
When I type pci=pci_disable_device=pci:12D8:2308 to disable the hardware, it gives unknown parameter error.
what is the reason of this ?
youtube-dl.org and yt-dl.org now show this error.
> Due to a ruling of the (((Hamburg Regional Court))), access to this website is blocked.
How I can find forums for sharing malware in darknet?
> From: Richard Stallman
> To:
> Sent: Tuesday, September 5, 2023 at 08:59:56 PM EDT
> Subject: Re: Could you please sue GRSecurity.
>
>
> [[[ To any NSA and FBI agents reading my email: please consider ]]]
> [[[ whether defending the US Constitution against all enemies, ]]]
> [[[ foreign or domestic, requires you to follow Snowden's example. ]]]
>
>
> > RMS: please. You sued Cisco.
> > Yet this is allowed? (they violate the copyright on your GCC, in addition to the Linux Kernel)
>
>
>
>It is not clear that they are violating the copyright on GCC. It
> looks like what they are doing may be lawful.
>
>We have nothing legally to do with Linux, the kernel.
> --
> Dr Richard Stallman (https://stallman.org)
> Chief GNUisance of the GNU Project (https://gnu.org)
> Founder, Free Software Foundation (https://fsf.org)
> Internet Hall-of-Famer (https://internethalloffame.org)
>
>
>
>
>
---------------------------------------------------------------------------------------
(my response: )
>
>
>They are distributing non-separable derivative works to GCC under a no-redistribution agreement.
> Which is an additional restriction forbidden by the license you granted to them of your Copyrighted work (infact of your own Authorship aswell).
>
>>may be lawful
> See the word you used: may
> Anything may be lawful before a case of first impression is brought.
> Please bring one.
>
>Those patches and plugins they distribute cannot be used with anything other than GCC
> They are infact non-seperable derivative works. You have standing and reason to sue.
> Please do so.
>
>PLEASE.
>
I need a custom ransomware for a specific target, know jack shit on coding. I have all the incriminating information I need though. Just need the software.
My target's computer is a Mac desktop computer.
Where can I find one to buy
Collection of 5 JavaScript-less imageboard software. dietchan, nanochan, lambdaplusjs, phichannel and picochan. dietchan is in German, the others in English. They're pretty similar to each other. Downloaded/scraped straight from their respective original sources, no modifications or additions.
What is a good or a bad l0icense?
Anyone wanna help me find a proxy site so I can use discord on my chromebook