[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

Archived threads in /g/ - Technology - 2956. page

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

File: 1490385405440.jpg (88KB, 720x765px) Image search: [Google]
1490385405440.jpg
88KB, 720x765px
There is literally nothing wrong with TouchWiz.
20 posts and 6 images submitted.
>>
>>60106054
There is literally nothing OK with OP being a faggot.
>>
>>60106054
>ugly
>bloatware
>duplicate apps
>shit memory management
>unrootable
>"literally nothing wrong"
>>
>>60106081
Unrootable is a good thing

File: 1462098041626.jpg (28KB, 471x284px) Image search: [Google]
1462098041626.jpg
28KB, 471x284px
A pair of researchers behind a system for avoiding internet censorship wants to deliver banned websites inside of cat videos. Their system uses media from popular, innocuous websites the way a high schooler might use the dust jacket of a textbook to hide the fact that he’s reading a comic book in class. To the overseeing authority—in the classroom, the teacher; on the internet, a government censor—the content being consumed appears acceptable, even when it’s illicit.

The researchers, who work at the University of Waterloo’s cryptography lab, named Slitheen after a race of aliens from Doctor Who who wear the skins of their human victims to blend in. The system uses a technique called decoy routing, which allows users to view blocked sites—like a social-networking site or a news site—while generating a browsing trail that looks exactly as if they were just browsing for shoes or watching silly videos on YouTube.

Slitheen’s web browser starts the process by sending off a normal request for a harmless, “overt” site—but in it, it embeds a secret tag: an encrypted, second request for the user’s true target, a sensitive “covert” website. Website requests pass through relay stations built into the internet’s infrastructure on their way from a browser to a web server. If a relay station were to install Slitheen software, when the request passes through it, the station would detect the secret request and decode it using its secret key. (A non-Slitheen relay station that doesn’t have the right secret key wouldn’t even be able to tell that there is a secret request bundled inside of the traffic, let alone decrypt it.)

Once the relay has decrypted the secret request, it begins the process of assembling the unique package that defines the Slitheen technique.


http://www.nextgov.com/cybersecurity/2017/04/trick-hides-censored-websites-inside-cat-videos/137334/
6 posts and 1 images submitted.
>>
It downloads the overt site, which will act as the camouflage for the sensitive data, and simultaneously downloads the target covert site—the payload that the user really wants to see.

It then strips out all the images and videos from the overt site, and replaces them with the entire contents of the covert site. If the whole covert site is smaller than the video and image data from the overt site, the relay station will add junk data until the sizes are identical. If the covert site is bigger, it can be split across multiple overt requests to different safe websites.

Finally, once the covert site has been hidden inside the overt site, the relay sends the whole bundle back to the user that requested it. When it arrives, the user’s Slitheen client sifts through the data, loading the overt site in the background, and displaying the covert site in a browser.

Slitheen’s defining feature is that the complex traffic it generates is indistinguishable from a normal request. That is, two computers sitting next to one another, downloading data from Amazon.com’s homepage—one that does so normally and another with the contents of this Atlantic story instead of Amazon’s images and videos—would create identical traffic patterns. The more complex Slitheen request would take slightly longer to come back, but its defining characteristics, from packet size to timing, would be the same.

To avoid being caught, it’s important to conform decoy traffic to normal traffic as closely as possible. Decoy routing was first proposed in 2011, but it was quickly discovered to be vulnerable to fingerprinting attacks, which involve analyzing patterns as encrypted data moves across the internet. Since the data is encrypted, censors can’t peer directly into the data stream to see what’s being downloaded.
>>
But if they know what traffic to a banned site looks like—how fast it downloads, and in what order different-sized chunks of data arrive—it can identify when that site’s being accessed just based on the data streams that pass through the networks it surveils. Last month, I wrote about a technique that uses fingerprinting to guess what YouTube video is being watched.

Slitheen is designed to work even if a censor knows exactly where the relay stations are, how they work, and which sites are being used as overt sites. “They still should not be able to distinguish a Slitheen connection from a normal connection,” said Ian Goldberg, a computer-science professor at Waterloo and one of Slitheen’s developers. Only if the censor obtained Slitheen’s private key—a randomly generated 256-bit number—could it decode the secret requests embedded within the overt ones. But that secret is easily protected, and can be swapped for a new one at a moment’s notice.

Slitheen’s technical details are sound, said Gustaf Björksten, the chief technologist at Access Now, a digital human-rights organization. But Björksten, who wasn’t involved in developing the system, worried that some thorny practical obstacles could make it hard to widely implement a decoy routing system such as this.

Slitheen needs participation from friendly internet providers in order to function. But the system requires more sophisticated hardware and software than are usually used for internet routers, said Cecylia Bocovich, a graduate student at Waterloo and the primary author of the paper introducing Slitheen. This presents the obstacle of convincing providers to set up complex decoy relay stations out of the goodness of their hearts.

Indeed, even though decoy routing was first presented more than five years ago, it hasn’t been widely adopted. But Bocovich says she and Goldberg are in talks to deploy some Slitheen infrastructure within a year. They wouldn’t share any details about the pending deployment.
>>
Björksten also worried that the developers’ decision to prioritize security—thus sacrificing some speed—could drive away users who are unwilling to use a system that inhibits their browsing habits. In places without extensive infrastructure for Tor, a network of servers that allows for anonymous browsing, many users abandon the service because it’s too slow, Björksten said. The same problem could befall Slitheen, or any censorship circumvention technology, if it causes slowdowns. But for now, there aren’t any good alternatives: Security gains come with usability drawbacks.

Bocovich and Goldberg say they’re working on a few improvements before Slitheen is deployed in the real world. One of them will make Slitheen’s overt connections “look more like humans are using the sites,” Bocovich said. Instead of downloading the same site over and over, or jumping between sites on a roster of popular destinations, it could try to follow links in a way that mimics genuine browsing patterns.

But that extra wrinkle in an already complex system should have no effect on a Slitheen user. It will only change the pattern of fake traffic a nosy censor would see on a network. Behind their computers, users will continue leaving a trail of unremarkable browsing histories, as they enjoy unfiltered access to the internet.

File: form_factor.png (351KB, 814x822px) Image search: [Google]
form_factor.png
351KB, 814x822px
Looking into making some kind of hand held x86/64 machine I can use for myself. I would say for emulators and work but I got a used 3ds just to crack it and never used it for games so I doubt I would play.

Still interested in this form factor though and some projects I can do with it. Want to be able to use it as a linux/ssh box though eventually.

Was looking at the pyra. And the pandora or whatever and looks like they suck. And are not cheap.

Anything like this on the market or some open source project? There are a ton of system on a chimp out and coming out in the near future. I can see one of these being pretty powerful.
12 posts and 1 images submitted.
>>
Typically called an ultra mobile PC. They aren't much of a thing anymore now that phablets are a thing.
>>
>>60105589
palmtop
>>
>>60105637
>>60105653

Those are small but not really the same. I could do without the buttons but would want the joysticks or at least one for mouse. I was thinking what a thinkpad clit would be like and allow the keyboard to fill the entire bottom. Also this is a little thick would would allow more inside or at least more airflow either one allowing a stronger processor and whatever else.

File: 2.jpg (129KB, 608x963px) Image search: [Google]
2.jpg
129KB, 608x963px
>'iOS is for fags'
>all girls prefer guys who use iOS due to iMessage

will /g/ ever not be retarded
109 posts and 15 images submitted.
>>
will you ever stop being a slave to vagina
>>
install Gentoo
>>
>>60105435
Use signal, it's cute ;)

File: 1478996835511.png (89KB, 469x346px) Image search: [Google]
1478996835511.png
89KB, 469x346px
ylyl thread
350 posts and 140 images submitted.
>>
>>60105211
Mouse designed for Crichton from Red Dwarf.
>>
File: vlc.gif (1MB, 320x240px) Image search: [Google]
vlc.gif
1MB, 320x240px
>>
File: PC Gamepads.png (3MB, 1200x3700px) Image search: [Google]
PC Gamepads.png
3MB, 1200x3700px
>>60105211

This thread is about the appreciation of watches, as well as the micro-engineering and materials engineering that are required to make a fine watch.

>Required Viewing For Newbies:
https://youtu.be/_2J5phyd9J4

>Strap Guide:
http://pastebin.com/SwRysprE

Previous thread:
>>60087891
324 posts and 99 images submitted.
>>
File: 20170427_190544_HDR~2.jpg (1MB, 2392x3403px) Image search: [Google]
20170427_190544_HDR~2.jpg
1MB, 2392x3403px
Shock Bois we out here
>>
>>60105136

Small white guy in a big truck.
>>
File: image.jpg (3MB, 4032x3024px) Image search: [Google]
image.jpg
3MB, 4032x3024px
R8

Casio has done me well, not too bulky like the the shellshock ones, but still has the the original casio design

File: index.jpg (6KB, 202x250px) Image search: [Google]
index.jpg
6KB, 202x250px
What do you guys think of this?
https://functionalcs.github.io/curriculum/
and this?
https://github.com/open-source-society/computer-science#core-programming

Which is better? Also, I'm looking for this book, pic related, it's the first book for the first link, please help.
11 posts and 1 images submitted.
>>
>>60104963
Lainchan /λ/ programming book thread.
>>
>>60104993
Already tried there, nothing. Just papers, not the book.
>>
>>60105153
I literally downloaded the pdf there a day or two ago, shortly after (presumably) you requested it.

File: Screenshot 2017-04-27 17.13.17.png (579KB, 948x1080px) Image search: [Google]
Screenshot 2017-04-27 17.13.17.png
579KB, 948x1080px
>We removed the home key and dedicated touch buttons to give you a larger screen and a true bezeless infinity display!

>And replaced it with a giant on screen bar on the bottom of your screen with virtual buttons that take up the exact amount of space as the old buttons on the bezel did, except now they're even less functional somehow! And they will occasionally disappear and you have to hope you can get them to pop back up when you want them

Samsung was a mistake.
44 posts and 3 images submitted.
>>
>>60104864
But the buttons disappear when you're watching a fullscreen video, that's the whole point
>>
>>60104900

>Sacrificing the usability of your phone for a feature you'll use maybe once a month
>>
>same camera as s7
>edged version only
>added bixby gimmick button
>removed home button
>too big

I would literally rather buy an iphone

Is this a good time for pressing the power button to desktop?
7 posts and 2 images submitted.
>>
File: helicopters.jpg (81KB, 960x577px) Image search: [Google]
helicopters.jpg
81KB, 960x577px
>his computer doesn't take at least 6 minutes to start up

why are you even here?
>>
>MUH UPTIME
>>
>>60104817
>booting
People still do this?

And that's around average for a W10 boot off a 2 generation old hard drive.

File: linux-mint-14-cinnamon.png (338KB, 1568x964px) Image search: [Google]
linux-mint-14-cinnamon.png
338KB, 1568x964px
Installed linux, now wut do?
85 posts and 14 images submitted.
>>
>>60104489
Install less usable distros until you get to arch. so next is ubuntu, then fedora, then gentoo, then arch.
>>
Nothing, you fell for a meme
>>
>he fell for it

9 posts and 3 images submitted.
>>
File: 1982342523238767.png (1MB, 950x761px) Image search: [Google]
1982342523238767.png
1MB, 950x761px
windows.

they're pseudo intellectuals who don't actually have an extensive knowledge of anything consequential.
>>
>>60104473
what language you speak?
>>
>>60104499
GNU/Linux

File: T19W_35Q_front.jpg (120KB, 596x695px) Image search: [Google]
T19W_35Q_front.jpg
120KB, 596x695px
Is there such a thing as a portable desktop solution that will fit into a backpack? Monitor Tower Keyboard Mouse Etc
7 posts and 3 images submitted.
>>
yes, it's called a laptop computer
>>
>>60104579
/thread
>>
holy kek include me in the screencap
06345d8d3e7221d20dfead5f9845ad97

File: 1477579866942.png (15KB, 512x329px) Image search: [Google]
1477579866942.png
15KB, 512x329px
Has 4chan already experienced its eternal september?
34 posts and 3 images submitted.
>>
>>60104399
no

it won't be eternal september until people stop believing in summerfags
>>
>>60104399
yes
>>
>>60104399
Yes, 4chan is over and done. Political talk has driven everyone away. There's no fun to be had anymore. Everything sucks.

File: sub-buzz-27201-1484332870-8.jpg (142KB, 500x500px) Image search: [Google]
sub-buzz-27201-1484332870-8.jpg
142KB, 500x500px
Twitch should start labeling streams as being from Windows or Linux users.

Every time you watch a streamer who runs Linux, they spent half the video fixing problems in their OS. I was just watching a guy whose emulator would freeze up every time he would click through menus. And he was clicking through menus because he couldn't find features in the Linux version that are in every other version. And while he was doing this, his webcam had frozen up and he had to fix that too. I had to close it because Jesus Christ, what a shitshow.

Linux is a toy OS and Twitch is full of examples of that on a daily basis.
6 posts and 1 images submitted.
>>
>streamers
Pure, undiluted cancer. Who gives a shit.
>>
>>60104414
That's only true for the ones who make a living on Twitch. There are people who are actually not obnoxious and make good background noise.
>>
so your complaint is that for video games, the software that runs on top of the OS is trash and therefore the OS is trash? I'm just trying to understand what, besides bait, you're hoping to do with this post.

File: little_pi.png (216KB, 407x370px) Image search: [Google]
little_pi.png
216KB, 407x370px
How come my raspberry pi 3 CAN'T play youtube vids efficiently, but my phone CAN?
Why dont they make better small computers?
47 posts and 3 images submitted.
>>
>>60104346
Because your phone costs about 10 times as much.
>>
>>60104360
The cheapest of shit smart phones will play 1080p.
Dont be a tard.
>>
>>60104346
I'm actually not sure what CPU this PI has but I do know that all mobile phone CPUs have hardware video decoding of vp9/h264/h265 built-in.

I'm guessing this Pi 3 either doesn't have that or the software you're (ab)using doesn't use it.

Cheap phones also struggle if you turn hardware video decoding off in mplayer.

Pages: [First page] [Previous page] [2946] [2947] [2948] [2949] [2950] [2951] [2952] [2953] [2954] [2955] [2956] [2957] [2958] [2959] [2960] [2961] [2962] [2963] [2964] [2965] [2966] [Next page] [Last page]

[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.