[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

Hey /biz/, anyone want to start a business or some hustle together?

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 46
Thread images: 5

File: 1481458268490.png (3MB, 1920x1080px) Image search: [Google]
1481458268490.png
3MB, 1920x1080px
Hey /biz/, anyone want to start a business or some hustle together?

I'm a programmer and am familiar with some digital marketing.
>>
File: Moot_as_PewDiePie.jpg (39KB, 468x433px) Image search: [Google]
Moot_as_PewDiePie.jpg
39KB, 468x433px
>>1664430
I used to have a guy on /biz/ help me edit my videos, but that partnership ended. Now I'm looking for expert shills to help with my YouTube channel. I want to fill the gap in the vlog market left by the death of casey neistat's channel.

Let's brainstorm clever marketing tactics.

https://www.youtube.com/watch?v=cWDUMZINI40
>>
>>1664437
that is one of the most autistic things ive ever seen
>>
File: 1401505076214.jpg (25KB, 463x454px) Image search: [Google]
1401505076214.jpg
25KB, 463x454px
>>1664437
>>
>>1664430
well...
im not ready yet, but what kind of digital marketing.

Nothing fancy, but i'm getting ready to start a septic pumping company.
>>
>>1664430
I've actually almost finished a project that can transfer data without using the internet and if the suggested actions are taken would be impossible (without quantum computing) for anyone but the recipient to access the data - I can produce one unit for under £50 but I have no idea how I will use it, open source it and let everyone use it, closed source and obufsticated so I can sell it for as much as I want, get a patent and I'd be the only one producing them, or open source it but also sell them for lazy or tech illiterate users
never done anything biz related so not really sure
>>
>>1665786
oh also only the recipient can even copy data from the device
>>
>>1665786
What is it called, and how is it done?
>>
>>1665870
not got an official name yet since it's still in a testing phase not going to go into detail on how it's done since I might be making it a commercial project but it has around 10 failsafes to make sure the data is either in accessible or gets deleted if anyone but the recipient tries to access it, and it has a backup timer so if the receiver doesn't access it within a set time it gets wiped securely - I'm thinking for the next testing phase trying to make the police actively target me then putting definitive proof against me on the device and making them aware it's on the device, then if I get charged and the get the evidence I know the device isn't ready for public release however if I don't end up getting charged due to lack of evidence I know it can stand up to low/medium levels of government attacks but I'm on the fence about this idea
>>
>>1665888
Brilliant idea. To test the highest levels of security join the jihadists and become a legitimate threat to the president's life with evidence of your plans on your drive. It's flawless
>>
im a 3d artist and somewhat versed in photoshop

idk hows that related but take your pick
>>
>>1665888
>>1665892
There are better ways to test it. Email my throwaway and I'll see if I can help you.
[email protected]
>>
>>1664498
I know you're being a wisenheimer, but my friend's Dad does septic service, and he knows I studied Finance, and am preoccupied with wealth building, so he was asking me the other day what he was supposed to do to clean up all the cash he's accumulated from pumping septic tanks. He pretty much only claims income if someone writes him a check. Otherwise, all the cash goes into the safe. His safe is overrun with fucking cash right now and he doesn't know what to do with it all.

Good for him.
>>
>>1665892
it's funny but after my psych evaluation they actually made the anti terror unit aware of me so I'm actually on terrorist watchlists, meaning if I handle it correctly I could get top level governments to try to get into the device
>>1665895
you testing it would require me to give you access to my code and hardware, that's not going to happen
>>
>>1664430
>>1664437
Hi Ops. I'm an idea man. I will email you periodically with amazing ideas and you will implement them. I ask only for 3 things: 1) 30% of all income 2) your absolute trust and confidence and
Most importantly
3) let's have a little fun!

I know this a lot to take in. Think about it and get back to me.
>>
>>1665895
also interestingly if 97 is the year you was born we were born in the same year
>>
>>1665898
Patent it then. If you ever go public you'll have people seeing your design whether you like it or not
>>
>>1665921
I know but right now it's at a point where it's unpatented and could be stolen - when it goes public I could email you so you can test it then, or if I go down the non commercial route I could email you when it's at a more stable stage - I'm curious how could you help test it though?
>>
>>1665913
19 and already on a terror watch list? What did you do?

Also, my pen testing in this situation can scope farther than even my own abilities. I'm mainly a social engineer and can convince others to help us if I see potential in it being better than current famous encryption techniques
>>
>>1665929
>>1665934

Also how did you come to this stage? Were you inspired by "deepwebs" (freenet, i2p, tor, etc.), TAILS, veracrypt, etc?
>>
>>1665934
I plotted an act of terror (was never going to do it) just wanted to see how well I COULD do it, I get bored a lot

also it uses already existing encryption algorithms (the user can pick from some 2 key encryption algorithms during configuration) the main thing is the data failsafes that stop anyone but the receiver from getting the data, and even after they get the data the need a second code from the sender after the confirm they have the device, so even with the UKs mandatory decryption keys the receiver cannot actually hand over the decryption key meaning even if he wanted to he couldn't give them the data without the sender letting him I've been considering adding a GPS module so the sender could set blackzones i.e local police stations so it auto wipes if the receiver goes into a police station
>>1665938
I was inspired by the ideology of cypherpunks, plus it's been a really fun project
>>
>>1665948
How can you stop others from getting the data? Unless it's wired the entire way they can still intercept data, and they can know the sender and receiver.
If the UK forces them to give their password surely they can have access to their computer. Are you going to have some check to make sure it's really them before you allow them to open it with your code?

How can you autowipe something if it doesn't have a processor (flash drives)? Even if you did, it's still possible to regain the information with high tech equipment.

What separates your idea from tor and your wiping from TAILS and "shredding" software which all have their own vulnerabilities?
>>
>>1665948
My advice is to study past exploits of tails, tor, veracrypt, firefox, etc. then patent it and seek advice on forums (may require manipulation as many of them are haughty)
>>
>>1665982
might be new ID since I'm now on desktop and I don't know how IDs work, it isn't just a usb you have a device (raspi) hooked up to a battery pack, if you plug in anything without the thing you plugged in having the authentication file it wipes, it lose power it wipes and if they get the receiver and the device the receiver still needs a decryption code from the sender and the sender can refuse to send it them or the receiver can tip them off when asking for the key so the sender knows not to give them the key also high tech equipment can't recover data with the way it's wiped (encrypted 5 times using PGP with random keys and random passphrases then encrypted 5 times with RSA but the RSA also encrypts the PGP keys, then everything is replaced with 0s then deleted, then the device powers off, when the device boots up the same process repeats so essentially once one of the failsafes are active it gets put in an endless loop of encrypting, 0ing and shutting down
>>
>>1666001
Here's how to regain data from volatile memory
http://superuser.com/questions/226961/how-do-people-recover-data-from-ram

If it's powered off you can't wipe it, and it has to be decrypted at some point, so it's possible to obtain the information. Best you can hope for is the government won't think it's worth their time.

A better solution would be to make it into a solution--literally. Hydrochloric acid maybe on a timer to if you want to automate it
>>
>>1666001
Wiping data is what tails specializes in as well, and they have vulnerabilities. They can't defend the bios or some hardware (some processors and cache are hard to wipe/won't wipe).
>>
>>1666020
they'd have to freeze the ram within about a minute of it powering off to get it, and it doesn't wipe at power off it wipes at power on and it has to be powered on to be accessed I mean they could pull out the sd card but it'll have full disk encryption and the password to it would be 32 random chars that the person who set it up doesn't store and would forget so once it loses power for more than a minute (which it most likely would) there's not much they can do, they can't manage to mount the sd card and they would have to bruteforce a 32 char password then bruteforce encrypted files without having the private key
>>
>>1666028
Didn't you say it transferred without the internet? How would it transmit? Over radio?
>>
>>1666033
the device would be sent via mail or dead drop if you didn't want to give out your address you could use a PO box or local supermarkets accept packages for you
>>
>>1664437
>expert shills
/pol/ here, I think I can help you.
>>
>>1666041
Haha why don't you just use a cipher on paper and burn it later
>>
>>1665908
I can program and I'm down to talk business
wsugar97 at gmail.com
>>
File: carrier-pigeon.jpg (39KB, 262x282px) Image search: [Google]
carrier-pigeon.jpg
39KB, 262x282px
>>1666041
>It's a new groundbreaking technology it doesn't even need the Internet
>>
>>1666049
>>1666041
Or a catapult

Virtually unbreakable encryption has already been made. The current problem is hardware, keyloggers, and transmitting data while hiding ips and obscuring its contents (not even tor does the last one)
>>
>>1666041
>>1666049
I got the solution for you: you memorize the information then walk to the guy's house and say it in his ear.
Be careful you need to say it quietly tho
>>
I have access to unlimited untethered sim cards, hit me up at [email protected] if you have any clever idea
>>
>>1666070
If you use default setting with latest for release it does 100%
>>
>>1666069
Topkek
>>1666081
Make sure to create your own language too
>>
>>1666097
Even fixing the latest 0 day exploit tor doesn't have end to end encryption. It just obscures your ip. Exit nodes still get all the unencrypted data, just without your ip.
>>
>>1666106

No?? Every sensitive data is HTTPS. Exit nodes only see cyphertext TLS dawg
>>
>>1666045
What's your idea? Right now I'm commenting on a bunch of low-subscriber-count channels, some networking. How else can I shill?
>>
>>1666158
http://securityaffairs.co/wordpress/38397/hacking/sniffing-traffic-tor-traffic.html

It happens
>>
>>1664430
[email protected]
E-mail me with what you have in mind, I have a few things that can be done pretty easily, plus I've already got started on them so we have a headstart.
>>
>>1666223
Again, sorry you're wrong """ Chloe""" used her dummy "" site"" without HTTPS, the point of experiment was to check whether somebody out of thousands nodes is a malicious 1334 hax0r who logs plain-http requests and then logs in, not whether there is a mysterious genius sitting on exit node who figured out how to break ssl2/tls. Tho even shittier SSL requires lots of request to be made to conduct padding attack, literally thousands

Sorry, I just know more that u about for stop spreading disinformation
>>
File: Front.jpg (118KB, 565x700px) Image search: [Google]
Front.jpg
118KB, 565x700px
Wanna hustle these
>>
>>1666470
BUMPING MY POST SO IM NOT INVISIBLE IN THIS ABSOLUTE SEA OF POSTS, THANKSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS!!!!!!!!!!!!!!
Thread posts: 46
Thread images: 5


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.