-
Posts
7951 -
Joined
-
Last visited
-
Days Won
26
Content Type
Profiles
Forums
Events
Everything posted by Sensei
-
A version of the secure channel via SSH (data transmission is encrypted): The second (rightmost) client is logged in via SSH and has direct access to the server's local port 2345. The first client is logged in via SSH, but has access via local machine port 1234 which only goes (forwarded) to the server via SSH (the -R parameter causes reverse port forwarding/reverse tunneling)
-
..but creating your own proxy server and establishing a connection from one client to the other client is easier than downloading and installing some 3rd party communication application... See: It took maybe 15 seconds to set everything up and running.. ps. On Kali Linux you don't need to install any application. On some Debian-based distributions (Ubuntu, Mint) you can do sudo apt install socat (it's a versatile general networking tool). ps2. It can be configured with the socat itself.
-
I am in such a position, I don't have to believe.. ..you (not personally, plural) keep saying that people making extraordinary arguments have to back up them by extraordinary evidence.. and when it happens to you, you run away like a wounded lion.. ..because these are just lies.. I for one am convinced that the sole purpose is to intimidate the owners of other social media that the same thing could happen to them.. Durov can only admit that he did not want to give access to the governments of European countries and USA to spy on all people who use Telegram (as Facebook, Twitter and others do). The aim is to make backdoors to all IT systems so that email passwords do not have to be hacked, but simply IT companies themselves give/make access to their data voluntarily ("under pressure from “the authorities”). (If the government has a backdoor, everyone has a backdoor) https://pl.wikipedia.org/wiki/Anti-Counterfeiting_Trade_Agreement In ACTA, the whole anti-piracy thing is just a bunch of bullshit designed to obscure what the law was all about (as with the Patriot Act).. IOW, remote access to all phones and all computers from anywhere at any time at will (just like me).. How to create a universal backdoor to all IT systems so that no one will notice? (except God ) ? Force all IT companies to make their users provide their telephone numbers during the registration, verification process, etc. The user logs in normally via e-mail/nickname and password (it does not matter how long or complex it is). When government agents want to log in, they approach the client at night, jam his/her cell phone, and the SIM doesn't work.. And in the meantime, his/her duplicate SIM works elsewhere.. and they log in via phone with a one-time password sent via SMS to that cell phone...they get a code and have full access to everything that required F2A.. The purpose of this F2A was to simply have a backdoor to all your data. https://en.wikipedia.org/wiki/Multi-factor_authentication A transmission from a duplicate SIM card is indistinguishable from a transmission from a real SIM card. The SMS code has been sent. Signed into the network and access granted. You don't have to ask for permission every time you want to read the victim's data. You don't have to ask the judge etc. etc. If you can get the data, you (they) can send it too.. And by downloading/uploading anything, you can look like a criminal.. No one can prove it's not you. A duplicate SIM card is indistinguishable from the real one.
-
I can have the web server on my phone and clear it anytime if I want. I described how to configure it in this post:
-
Unbelievable things happened here.. I did not expect that someone here is a supporter of surveillance and hacking into computers and cell phones of all people in the world.. The job of the U.S. postmaster is to open all the mail and all the letters, and make copies of what's in those letters, and close those mailings to pretend they haven't been opened? ..methinks you have understood nothing.. So you can not prove the truth of your words that Telegram (or any other social media portal) was used for such activities.. All your references to the media and these media to other sources, and these sources to other sources, simply do not have any solid and confirmable basis in the real world. There are now about 195 countries in the world. With which of them the IT company should cooperate? What would be the criteria for accepting certain law enforcement agencies from certain countries and rejecting them? An email comes to you (IT company owner) from, say, Guatemala, and says that some guy named Tom, and surname Swanton, is suspected by them, because he did something, *** knows what, sent a picture of a naked child, for example, or something like that.. What is IT company support team supposed to do with such an email? Replace Guatemala, with Paraguai, North Korea, France, Sweden, Israel, Norway, UAE/Abu Dhabi, or whatever... As a social media operator, how are you supposed to verify if this is a real email from the government of this country from a request from some jerk who is impersonating it? It doesn't matter if it's an e-mail or if it's real mail. Anyone who has a child is guilty of registering pedophile videos.... Everyone who has a child takes pictures of their child. There was a situation here where someone took a picture of a child, took his own face, put it together and was convicted of possession of child pornography. Only it was he himself who was in the photograph.... The best part is that this person was in prison. In prison he had a computer that was given to him by the prison guards, and they gave him his photos, and they gave him photos of some children (they were not naked at all). He edited them himself (according to the prosecution) in Windows Paint, so he cut out himself sitting naked and pasted on the child's head or something like that. And on that basis they convicted him of possession of child pornography. Except he was naked on these photos..
-
If you go from England to the normal world, you switch from foots to meters, from yards to kilometers and so on. Does it count? and I almost forgot: and from left-hand traffic to right-hand traffic.. btw, this is called unit conversion.. ps2. You are searching for this: https://en.wikipedia.org/wiki/Planck_units
-
What is the short version of your statement? If someone uses the word "ChatGPT", I'm already sick of reading the rest.. Why should I waste my time on nonsense? ps. The source/reference is reddit? Google search is too stupid to find the right phrase to name what I wanted to say, and I don't want to swear..
-
You make the erroneous assumption that all his voters are as aware as you are.. It's just that most of them don't have a clue where the various states of the US are.. You can't be that stupid to vote for a rapist.. They haven't even seen the film in 2016.. His constituents live in their information bank, to which information from your information bank (and vice versa) is not allowed to enter. From what I've seen on, my locals who live in the US, and voted for this Russian sockpuppet, the only thing they care about is that it will reduce their taxes. Foreign policy? These losers don't give a damn about it! Climate policy? These losers don't give a damn about it! That's how to know losers that the only thing that turns them on is more money in their pockets..
-
..and do you believe (buy) such lies.. ? Show me public posts, threads, groups, etc. about child pornography on Telegram. Provide the URL to such content on Telegram. The mailman's job is not to check every package before it is delivered to make sure it does not contain illegal materials.. If two child rapists make two accounts on SFN, and later send PM ("private messages") between each other, should Dave, Swansont, Phi For All be arrested.. ? You seem to say 'yes' to such approach..
-
This is a top secret message that should cause hallucinations.. :) He has more such gestures in his library.. https://cdn.theguardian.tv/mainwebsite/2017/05/25/170525macrontrumphandshake2_desk.mp4 Src: https://www.theguardian.com/us-news/2025/feb/28/donald-trump-body-language-keir-starmer-us-president ps. By the way, he forgot to say “nice to meet you, Mr. Governor of France”. ps2. There is even study about his gestures: https://www.google.com/search?q=trump+gestures
-
Can you run in the terminal: dd if=/dev/zero of=file bs=1MiB count=1024 oflag=direct,sync status=progress or sudo dd if=/dev/zero of=file bs=1MiB count=1024 oflag=direct,sync status=progress (for example, in your home directory) ??? Make screen-shot or copy'n'paste result here.. Then rm -rf file when you are done, 25 GB is definitely not enough for modern standards.. Where did you get this HDD from? It's doubtful that it's an SSD drive.. The easiest way to solve the problems is to buy a 2.5” SSD with a capacity of 120 GB, for example, on eBay. I am getting such 120 GB SSD here, used one for $4 (four dollars). A brand new 120 GB is for $14 (120 GB is the lowest size sold now) According to the chart, most of the data is in system libraries. It is not clear which libraries are used by which applications. If you remove them, some applications may stop working.. $4 isn't much (unless you live in Africa, which I'm sure you don't). At this price you will get a new 120 GB drive that will have ~ 5x more capacity than what you have at the moment.. Looking at the specs of the T430s in 2012 they were sold with 128GB - 180 GB disks the lowest version.. So what happened? https://psref.lenovo.com/syspool/sys/pdf/withdrawnbook/thinkpad_t430s.pdf The entire T430s used one with 180 GB SSD is for $38 here. To remove the application, use sudo apt purge Read the article: https://askubuntu.com/questions/187888/what-is-the-correct-way-to-completely-remove-an-application Try also sudo apt-get autoremove
-
Nonsense. If the authority steps in and says to IT company “give me all your data between X and Y” or give me all the data of “X” (the client).. It's all a matter of IT. Because you have no idea how it is all implemented internally. The social media server should only be a proxy between two parties talking to each other, when they do a private correspondence, not a backup server of any data. It's even desirable for an IT company not to make backups of transmission, regardless if it is encrypted or unencrypted, because it means less data has to be stored on disks, which means lower costs. Your point of view on this issue depends on your point of standing. As if Trump ordered Telegram/FB/X etc. to give data of private conversations of Kamala Harris, Biden, or your own, you would be outraged and screaming about authoritarian inclinations of a dictator-to-be/dictator. When this happens to someone else, your point of view suddenly changes 180 degrees and you suddenly defend the other side.. In the old days, when people regularly used e-mail rather than webmails it was the e-mail program that downloaded data from the POP3/IMAP server and deleted it later (POP3 DELE [mail-index] command https://www.rfc-editor.org/rfc/rfc1939.html ). The data disappeared from the server! And now you have the government stepping in and telling the IT company hosting the mailboxes and forcing them pretend to delete the emails while internally storing them (just in case gov step in and want them in any time in the future)..A user can't access his/her messages after deleting them, but the government has access to them. Crazy. I can see that you like such pathologies when they are done by those you consider “good” and if it was done by Trump and his team you would immediately be outraged.. We have several things here: 1) Intercepting the future correspondence of anyone the government wants to. 2) Reading past correspondence already carried out (which may be impossible to do if the IT system was not designed for it and didn't do it in advance). 3) Introduction of backdoors to read future messages. Destroying your own Internet security of your server at the behest of some government.. This is simply hacking on behalf of the government of its own clients.. Durov didn't want to do it on behalf of the Kremlin, so they stole his company and fired him from the company and he had to flee the country. And now he didn't want to do it at the behest of Western governments and they locked him up in prison. He was/is competition for Musk, Zuckerberg, Brin and Page. He didn't want to comply and spy on his clients at the behest and order of the government, so they shut him down. ..interesting that you wonder why all the billionaires stood behind POTUS at the inauguration and kissed his ass..
-
The arrest occurred because the IT programmer refused to create a backdoor for his own security systems.. A Kremlin mafia gang took over his “Russian Facebook” in 2015: https://www.businessinsider.com/the-founder-of-russias-facebook-explains-how-the-kremlin-took-his-company-away-2015-5?IR=T Now the French courts, influenced by politicians, are attacking him after he was exiled from Russia..
-
@TheVat You clearly have no idea what we're talking about. Or you pretend you have no idea.. We only have two options: 1) end-to-end encryption (and no way to guess what people are talking about, without hacking their devices) or 2) full surveillance (due to the ability to tell what people were/are talking about). Nobody talks about child porn. This is about whether the social media IT company has (or has not) access to anything you (and anyone else on the planet) are talking about in a private message. If you're having an affair with a woman, Google and Apple will be the first to know about it, long before you tell your friends and your wife is the last to know. If you have end-to-end encryption, they (Google/Apple/X/FB etc) don't know. If you don't have end-to-end encryption at all times (no opt-in/opt-out), they know. If I am creating an application, a communications application, that encrypts everything a person says on their computer, and then the encrypted data is transmitted. The social media operator has no idea what this data is, so no government can ask the social media to disclose it. Social media has no idea what they are talking about. It's encrypted, encoded, compressed, whatever. Asking to reveal a private transmission by social media operator between X and Y makes no sense. This is end-to-end encryption. There is no child exploitation or serious crime.. ..you don't know what people X and Y were talking about.. ..the data are encrypted and court nor social media operator has no access to it.. If you lost your phone and someone found it and stole it, Google knows who stole it by name and surname and where that person lives. the police don't know this. the government doesn't know this. And Google knows. (if you registered/signed in to a Google account on this phone) What trolling? You're the one trolling. Read Wikipedia if you don't understand what we're talking about: https://en.wikipedia.org/wiki/End-to-end_encryption This is the same (equivalent) situation as the "USA Patriot Act" (which has nothing to do with patriotism). https://en.wikipedia.org/wiki/USA_Patriot_Act Fox News or other extremist TV reporters ask people "do you support The Patriot Act?" They have no idea what the act is about, but the name is constructed in such a way that you can't say you are against it, so they say they are for it.. Are you for or against "the act to combat child pornography"? How can you say no to something like that? In that law you can insert anything that literally makes you a slave.
-
If you can turn end-to-end encryption on or off on demand, anyone in the server center can switch it on at any request from someone nearby, just for a few seconds, without even bothering to upload a new version of the application to the client (phone of victim).. so basically security shit.. I once tried to register on Telegram and the first thing it asked was my phone number. Why the hell would anyone need an app that requires you to enter your phone number? It's like you've already given everything.. On this shit iPhone, a phone number is all you need to hack into it.. It immediately put me off..
-
Sort of. We heard Jim Carrey on a fashion show at 2017 (and we approve his message):
- 3 replies
-
-1
-
This is an IT issue: you have end-to-end data encryption between two parties or you don't (and anyone can read it, steal it, misuse it, alter it (to pretend that you wrote it) etc.). With (true, not fake just for public) end-to-end encryption in the built-in communication application, the social media owner has no idea what the parties are talking about. So they can't hand them over to the rule of democratic, authoritarian or totalitarian authorities. Democratic authorities in the Western world have become a fraud - they demand data to which they have no right and impose their idiotic regulations to which they have no right. Well, for how can you call the fact that some politician will tell you how to write your own computer application, just because he/she wants to get access to the data of, for example, his/her political opponent? The problem with Durov would be if he gave access to user data, their conversations to the Russians, for example, and at the same time did not give them to the French authorities. But in a real end-to-end system this is almost not impossible i.e. social media IT company would have to make a special version of the application for only one user, force him to upgrade his 'good' version (with cooperation with Google Play Store and Apple Store), then you have the data decoded, and then make the upgrade to the next 'good' one..
-
This is nonsense. It doesn't work that way in IT. Facebook, Twitter/X or any other crap, i.e. social media, would have to decrypt all messages with anyone and then back them up (in case someone finds out in 5 years that you might be a rapist or whatever). Then the whole HTTPS is pointless and misleading.. Privacy doesn't exist. Is that what you are suggesting? Whatever you write in the Messanger is archived. And anything can be used against you at any possible time from that point on. If you have a communicator that does data encryption when you type it in the app, and raw data sent through a central server (which is just a proxy for raw data between the two phones on which the app is installed), there is no sense of backing up data which are not understandable and undecryptable. I have created my own Facebook-like communicator apps.. simply a copy of Messenger only without all the surrounding that spies on you all the time, and backs up data “for backup”.. I just created my own Facebook/X.. This is called end-to-end encryption. https://en.wikipedia.org/wiki/End-to-end_encryption If you talk to someone through Messenger and write that your washing machine burned out, for example, and immediately start getting ads for washing machines or services for repairing electronics, that's the best proof that they know what you wrote about with someone in a private conversation. You might as well have written about how you got drunk and puked, or other embarrassing things. The best way to commit debilitation is to turn on the cloud with a backup of your phone data. On which, of course, you keep your photos and videos with lovers and mistresses.. Things make it difficult for people who don't have a brain to understand what's going on it's called “data synchronization between devices”.... If you record your sextape on your iPhone, and then you also want it on your iMac. Or you record your sextape on your Android phone and then want it on your computer as well, the most common way is to “sync your data between devices” via various clouds. If you do this, all your sext tapes will now be on “their” servers. Forever accessible. If there is end-to-end encryption (real, not just fake for the public), all they have is a handful of meaningless data on their proxy servers. I think with your statement you have shown that you have been pretty much brainwashed by these child-porn campaign etc. so it is necessary to protect the children (and in the meantime steal the data of all the people who have done nothing, but can in the future, in 10-20 years) Either you have data encryption on the client side (end-to-end encryption), and the server does nothing but proxy this unknown data, or you have total surveillance (because you are not sure that your data is not analyzed in real time and backed up).
-
Any Linux users? Is my bad experience of ubuntu just bad luck?
Sensei replied to Ken Fabian's topic in Computer Help
This is not an Ubuntu issue. I have the same thing on other Linux distros (although also Debian-based) (Debian-Ubuntu-Mint-Kali) This is a feature of the NTFS file system. Depending on how the Windows is shut down or put to sleep, it switches NTFS drives into different modes. In one you have only read-only mode, and in the other you have read-write mode. NTFS file system "driver" on Linux was created by reverse engineering, without having Microsoft's proprietary source code. The authors did not want to damage the disk structure. https://www.google.com/search?q=ntfs+modes+sleep+linux You still haven't said what file system they have. If you bought them and just plugged them in, without manual format, it's doubtful they are NTFS. As long as they are bigger than 4 GB I would make a blind guess exFAT. https://en.wikipedia.org/wiki/ExFAT "exFAT has been adopted by the SD Association as the default file system for SDXC and SDUC cards larger than 32 GB." Use the mount command from the terminal.. with the appropriate arguments.. Some tips from the web: sudo apt-get install exfat-fuse exfat-utils BTW, have you used: sudo apt update sudo apt upgrade right after installing the operating system? -
What does it take to be considered a scientist? BoA and BoS is not enough? "Musk graduated from the College and Wharton in 1997 with a dual degree in economics and physics. That same year, he started a Ph.D. program in materials sciences at Stanford University, dropping out just after two days later to begin his first start-up company" https://www.thedp.com/article/2022/11/elon-musk-penn-grad-wharton-twitter-auction The company the article is about: https://en.wikipedia.org/wiki/Zip2 The Musk brothers got $37 million for it (a 12% stake, so they didn't have the final word on whether to sell it).
-
Any Linux users? Is my bad experience of ubuntu just bad luck?
Sensei replied to Ken Fabian's topic in Computer Help
Try sudo dmesg -w Then connect the USB device to see if a new log appears. or use sudo dmesg Then connect the USB device and repeat it at the other terminal. Compare. Do you have a /var/log/syslog file? If yes, then: cat /var/log/syslog or tail /var/log/syslog or sudo tail /var/log/syslog in the terminal. https://www.google.com/search?q=ubuntu+system+logs There is also journalctl journalctl -h to show help or man journalctl -
Any Linux users? Is my bad experience of ubuntu just bad luck?
Sensei replied to Ken Fabian's topic in Computer Help
There are different file systems. Windows obsolete FAT16, FAT32, more modern NTFS. Linux has its own EXT, EXT2, EXT3, EXT4. Copy the data from one test flash drive to a physical drive (or use some new empty one) and try formatting it with Linux to EXT4. A brand new flash drive with a capacity of >4 GB is usually formatted to exFAT file format. Discover the file format on Windows. https://en.wikipedia.org/wiki/Ext4 https://en.wikipedia.org/wiki/NTFS https://en.wikipedia.org/wiki/ExFAT Frankly speaking - I would be very concerned to see that usb flash drive worked and suddenly stopped on the same system.. you checked if on it there is still the data you uploaded and it was not corrupted (on Windows of course).. ? Every file needs to be checked.. not just list the contents of the directory, but review the data.. -
Any Linux users? Is my bad experience of ubuntu just bad luck?
Sensei replied to Ken Fabian's topic in Computer Help
If anyone wants to use Linux on an Android phone/tablet, they should try Termux: https://f-droid.org/en/packages/com.termux/ (skip the F-Droid installation) Direct link https://f-droid.org/repo/com.termux_1020.apk (it will take ~ 3 mins) Then: apt update apt upgrade pkg install x11-repo apt install xfce (it will be a long download 1 GB+) apt install tigervnc (or other vnc server) Configure VNC: vncserver Enter password. Enable WiFi in the phone or make a Hotspot. Check what is an IP address: ifconfig Connect to VNC via PuTTY on Windows or vncviewer from Linux. You have a graphical user interface on your smartphone Linux distro. if you want an apache server then apt install apache2 php Your phone is now the web server. If you want to connect to your Termux VNC install VNC client app from: https://search.f-droid.org/?q=vnc&lang=en This is a good one: https://f-droid.org/en/packages/com.gaurav.avnc Then you'll have a mouse pointer to click the Linux GUI on your Android phone You can buy USB OTG and connect USB hub and an external keyboard and mouse. The smartphone will only do as a screen. Here is how it works (but he used a crappy VNC client - it only worked in 8 bit mode): -
Any Linux users? Is my bad experience of ubuntu just bad luck?
Sensei replied to Ken Fabian's topic in Computer Help
This is a problem regardless of the operating system. When Win10 first came out, in which MS changed the driver API, rendering older drivers (and therefore hardware) useless. People ended up with useless equipment, whose manufacturers abandoned and/or went bankrupt. Therefore, people were very reluctant to update their systems. I still know companies/people who use Win7 only because their hardware is not supported by Win10+. I mostly use it that way. But I do use Kali Linux. In Windows, people are not familiar with the command line. Have you ever used the net or netsh commands? reged from the command line? Doubtful. I was told that you have to install Windows first and then Linux, not otherwise, because the Windows installer treats the Linux installation as an empty uninitialized disk and replaces everything. At least the Kali Linux distro. It depends on what you do.. Any system can cause problems. Personally, we think Ubuntu is crap.. In Linux, there is such a thing as GRUB (grand unified bootloader). https://en.wikipedia.org/wiki/GNU_GRUB Obviously. Don't listen to the fools.. Even in Windows, the installation flash drive should be disconnected to prevent rebooting from the flash drive.. My experience with Ubuntu is mainly through Virtual Box. I installed it in a virtual machine (VM) on Kali Linux. The only cool thing was that there were graphic editors and office suite (which I personally find completely unnecessary for me). Download VirtualBox for Windows, download Ubuntu ISO, download Kali Live ISO, install them and play with them for a while as a virtual machine to find out if they meet your needs before you throw yourself in at the deep water..