420chan now has a web-based IRC client available, right here
Leave these fields empty (spam trap):
Name
You can leave this blank to post anonymously, or you can create a Tripcode by using the float Name#Password
A subject is required when posting a new thread
Subject
Comment
[*]Italic Text[/*]
[**]Bold Text[/**]
[~]Taimapedia Article[/~]
[%]Spoiler Text[/%]
>Highlight/Quote Text
[pre]Preformatted & Monospace text[/pre]
1. Numbered lists become ordered lists
* Bulleted lists become unordered lists
File

Sandwich


Community Updates

420chan now supports HTTPS! If you find any issues, you may report them in this thread
Firefox Location How by JohnDundlekot.jpg - Wed, 14 Sep 2016 02:18:13 EST ID:L/v5xr5K No.119801 Ignore Report Reply Quick Reply
File: 1473833893446.jpg -(40386B / 39.44KB, 500x394) Thumbnail displayed, click image for full size. 40386
So I clicked "Allow share my location" thinking it would just my IP location to get my zip, but to my surprise, it actually spit out my full home address onto the web page?

How did it get this info? Where is it stored? How can I delete it?
>>
JamesBillinghood.sgml - Wed, 14 Sep 2016 03:31:17 EST ID:epY42dO1 No.119802 Ignore Report Quick Reply
Firefox doesn't know or store anything. The way it works is that when you consent, Firefox will take a list of wifi APs that your computer can see along with the reported signal strength and then send that to a location service, e.g. Google Location Services, and return approximate coordinates to the website that made the request. In this case, those coordinates are sufficiently accurate for your home address.
>>
CyrilWinkinway.lit - Wed, 14 Sep 2016 14:49:59 EST ID:AAmY6Oqc No.119803 Ignore Report Quick Reply
>>119802
WIFI location is actually pretty accurate, like within a meter or two.
FUCK google streetcars.
>>
WilliamLightville.dev - Wed, 14 Sep 2016 16:13:52 EST ID:BXvbYT79 No.119804 Ignore Report Quick Reply
1473884032085.webm [mp4] -(1202239B / 1.15MB, 448x336) Thumbnail displayed, click image for full size.
>>119803
It depends on where you are, but it's generally as accurate as a cheap GPS receiver. Also it's not just Googe. There are a bunch of databases and companies that are in the business of reselling your BSSID information. Mozilla has been building its own proprietary database for years:

https://en.wikipedia.org/wiki/Mozilla_Location_Service


Tor Security Question - Please help me to alleviate my paranoia! by GeorgeBunman.drv - Sun, 04 Sep 2016 14:29:53 EST ID:7p5DyaZn No.119751 Ignore Report Reply Quick Reply
File: 1473013793414.png -(9752B / 9.52KB, 200x121) Thumbnail displayed, click image for full size. 9752
So, just recently I did some stuff on Tor. I won't say what specifically in case the authorities somehow do find out what I did (thanks to my poor decisions), as 420chan doesn't allow the use of Tor, but given the context of this site, I'm hoping it should be pretty obvious what I did. Nonetheless, I don't want to even have a small risk of fucking myself over, so that vague statement will have to do.

Anyway, I attempted to use Tails, but the fucking thing wouldn't work on my machine, even after some very intensive and extensive troubleshooting, so I just used the TBB (not my smartest idea, I know, but I had ingested some substances which definitely weren't amphetamines and had been up for around 36-40 hours, which is very unusual for me and most definitely affected my judgement quite negatively). Oh, shit, I almost forgot. I downloaded a few files (public keys, I think I may have saved a few bookmarks, and maybe some other gpg/pgp stuff, I can't quite remember - it was a bit hazy).

So, what are the best ways of securing my system after this? I vaguely remember hearing to never download stuff on Tor, so if that's what fucks me over, I'll be incredibly unhappy. I've taken some steps to try to improve my safety, but I definitely want to do more. First, I went and deleted all of the bookmarks and then encrypted the public keys with TrueCrypt. Next, I "Shredded" the entire TBB and any other similar files I could find with the AVG Shredder thing. After that, I had no idea what other steps I could/should take, so I just downloaded VeraCrypt and am currently encrypting my entire system, with 7 passes to try to secure against that magnetic recovery thing. Should I have done more passes? The options were 0, 1, 3, 5, 7, and 35, and 7 and is going to take 9-10 hours, so 35 would've taken an incredibly long time. In the next few days to weeks, I will keep an eye out for weird looking postmen, weird vans parked around, and any other shady characters, and I'll keep any packages that I happen to receive on my table, unopened, because if anything illegal arrives, it definitely wouldn't be mine, and I wouldn't want to open anybody e…
Comment too long. Click here to view the full text.
1 posts omitted. Click Reply to view.
>>
CharlotteSmallford.api - Mon, 05 Sep 2016 05:20:18 EST ID:rvHu8Q76 No.119760 Ignore Report Quick Reply
>>119751
TOR is compromised. The best thing you can do is access it WHILE running a good VPN after using a packet sniffer to confirm the VPN itself is secure.

The good news is that literally nobody gives a single fuck that you bought drugs online. That's a joke to us. You are a customer, not a dealer. We don't care about you.
>>
Not OP - Tue, 06 Sep 2016 19:31:19 EST ID:58dAwT89 No.119770 Ignore Report Quick Reply
Sorry to (briefly) hi-jack this thread but I was just about to make one about encryption as well.

Are there any cons or dangers using technology like TrueCrypt/VeraCrypt on your HDD/SSD for encryption? Aren't there certain instances in which things can go wrong and you can end up losing all your files? If so, how does that happen?

I don't have anything that could put me in trouble but still, encryption has always fascinated me and on top of that I'm a very private person. I might mess with it if the technology is secure enough.

Or are there other solutions that work just as good?

Thank you.
>>
CedricGommerfuck.mov - Fri, 09 Sep 2016 22:18:55 EST ID:d/L8RdUK No.119780 Ignore Report Quick Reply
>>119770
Well writers of programs, (open source code) as well, can do the opposite of
a programs intent.

Say SSL,TLS. Wireless encryption can be vulnerable as well. ( understand this) If one could write a program, one could make it do the opposite of the original intention with minimal effort.
>>
IsabellaHorrylock.bfc - Tue, 13 Sep 2016 00:31:18 EST ID:tazdUVdq No.119796 Ignore Report Quick Reply
>>119760
Tor is always vulnerable. It is what it is.
>>
ShitHirringford.mpeg - Tue, 13 Sep 2016 15:33:13 EST ID:+JveVblM No.119799 Ignore Report Quick Reply
Run a Linux live cd. Use it to backup files you want and then use dd overwrite your hdd with /dev/urandom. Then repeat once or twice. Then do the same with /dev/zero. Then reinstall all your stuff. Oh sure have a look is a better reply to investigators than good luck I'm behind 7 proxies.

Unless you did something crazy ran a program you downloaded from TOR that modified one of the files you backed up to leave a finger print that lets them know "I did such and such illegal activity." there will be no economically retrievable evidence of you being on TOR on your hdd.

Really though unless you leaked classified documents, saved illegal pizza, or bought drugs you probably did nothing illegal. If you leaked classified documents the best info they have on your identity is a list of people with access to that information. If you saved illegal pizza the best info they'll have of your identity is if you went to a honey pot with java script that leaked your IP etc. over clear net. If you bought drugs the best info they'll have is the name and address you gave to the dealer.

If you're leaking they'll be monitoring the people on the list to see who is sneaking out data on a usb stick. If you're pirating domino's they'll snoop around until you do it again until they have enough proof. They'll probably install a trojan on your computer while you're at work. If you're buying drugs they'll probably ignore you. But if they don't they'll either do a controlled delivery or wait until you open the package and then catch you in possession.

Saving public keys is some trivial stuff. Saving links isn't really bad unless visiting the links is illegal as is the case of domino's pirating. I guess you could make the argument that a bookmark to a murder for hire site would be bad if someone you knew shot themselves in the head 3 times, dismembered themselves, and then climbed in to a piece of luggage and then you somehow became a suspect. Unless you're friends with enemies of Hillary I wouldn't worry about it.


Unable to download normally to sdcard on Android by SidneyChemmerspear.log - Fri, 09 Sep 2016 11:44:03 EST ID:uICGScFY No.119776 Ignore Report Reply Quick Reply
File: 1473435843965.gif -(144145B / 140.77KB, 220x340) Thumbnail displayed, click image for full size. 144145
I use utorrent, I can select the location to my sd card except utorrent will only allow me to use what it calls app storage, there seems to be no "shared storage" option to select. Any suggestions?
1 posts omitted. Click Reply to view.
>>
CharlotteDrottingman.ppd - Sat, 10 Sep 2016 05:44:39 EST ID:uICGScFY No.119782 Ignore Report Quick Reply
>>119777

It's 5.1.1
>>
CarolineDarrystutch.js - Mon, 12 Sep 2016 05:37:21 EST ID:uICGScFY No.119789 Ignore Report Quick Reply
I've found a sort of a solution. I just have to download first and then copy paste on to the sdcard, nb.
>>
EugeneGoodford.com - Mon, 12 Sep 2016 20:42:06 EST ID:d/L8RdUK No.119792 Ignore Report Quick Reply
>>119789
drag & drop or send to. Is what you mean.
Copy paste is for text.

I have my phone and
have barely done anything
with it. It does show up as a drive though.
>>
IsabellaHorrylock.bfc - Mon, 12 Sep 2016 22:04:20 EST ID:tazdUVdq No.119794 Ignore Report Quick Reply
>>119789
That is the way it is. A lappy or desktop helps make this easier. For what it's worth, can add more memory to you phone if wanted.

Yea, plug it in to your comp. Otherwise it seems it is limited in possibilities. But you found that, so keep on. Nice you shared your solution.
>>
IsabellaHorrylock.bfc - Mon, 12 Sep 2016 22:28:07 EST ID:tazdUVdq No.119795 Ignore Report Quick Reply
>>119794
So I am way off. However, you could, possibly, a fix. Point your torrent program to the SD card. DI torrents, through utorrent, it will have options. One I find is encrypt
connections. That is fine, weak encryption.
-
This will fix your issues,, I used older torrent programs. You I think simply just need create a folder for torrents from within utorrent. Make one for. \temp
one for finished.

Be simple. If needed, restart/reset your phone. More times you do this the
more you know your phone.


Dr00gs by CedricSnodwater.jpeg - Mon, 05 Sep 2016 04:30:41 EST ID:OOQzcJKr No.119758 Ignore Report Reply Quick Reply
File: 1473064241824.jpg -(327494B / 319.82KB, 720x715) Thumbnail displayed, click image for full size. 327494
I want to start buying from the net. I'm not a computer genius but i learn pretty fast and i know the basics.

SHould i get a vpn? if so wich one?
Other tips?
Also i'm from europe, idk if that matters
>>
FrederickWindledig.wsz - Tue, 06 Sep 2016 09:43:54 EST ID:m3LGbxNj No.119767 Ignore Report Quick Reply
>>119758

Get a VPN like Private Internet Access, then find someone smarter than you to use a packet sniffer to confirm it's secure. THEN AN ONLY THEN connect to TOR and buy your drugs. Faggot lol
>>
CharlotteFammlewotch.o - Tue, 06 Sep 2016 11:39:08 EST ID:2jgN2XTq No.119768 Ignore Report Quick Reply
If you're committing a crime, run Tails on public wifi and only connect to Tor hidden services. Pay for everything with bitcoins that have gone through a mixer. Deal only with people with a good reputation.

>>119767
If you think you're being funny, you're retarded. If you're at all serious, you're retarded.
>>
EdwardBeckleridge.c - Sat, 10 Sep 2016 06:45:09 EST ID:M9sBG6nq No.119783 Ignore Report Quick Reply
>>119768

>implying anyone gives a fuck about drug buyers

we go after drug sellers in this great nation
>>
JackDuckdale.txt - Sat, 10 Sep 2016 12:28:47 EST ID:N3PyTszW No.119784 Ignore Report Quick Reply
>>119783

All of those cop shows you watch on TV involve homicides. In the real world, cops will fuck you up the ass over a dime bag and if the postal inspector finds your shit, you will be investigated.
>>
EugeneGoodford.com - Mon, 12 Sep 2016 20:46:33 EST ID:d/L8RdUK No.119793 Ignore Report Quick Reply
>>119768
You mean if you are transferring sensitive information. Some Countries policies
media, criticizing their gov policies can be very sensitive.


Windows Shortcuts by EdwinBlackgold.deb - Sat, 03 Sep 2016 01:11:58 EST ID:s6x2P4ah No.119745 Ignore Report Reply Quick Reply
File: 1472879518942.jpg -(2088836B / 1.99MB, 3264x1840) Thumbnail displayed, click image for full size. 2088836
What are your favorite and/or window shell and general software shortcuts?

Windows + Directional key has been very useful in Win7
Alt + Tab for program switching
Alt + F4
Tabbing through fields, using space key on multiple choice forms, finishing with enter
Ctrl + Pg Down is usually the browers tabs on the bottom
Those are pretty basic, I hope to learn more.
2 posts omitted. Click Reply to view.
>>
CorneliusMuffingway.dwg - Mon, 05 Sep 2016 14:08:50 EST ID:/lDKN8lV No.119764 Ignore Report Quick Reply
Win+R
Win+1,2,3,etc
Not a keyboard shortcut, but right-clicking on the start menu brings up something close to a useful menu.
>>
EbenezerPirrychodge.rdo - Mon, 05 Sep 2016 16:25:29 EST ID:lEiaNP1d No.119765 Ignore Report Quick Reply
>>119764
Windows Key = [W]
[W] + E = new 'my computer' window
[W] + R = open 'run' command
[W] + L = lock machine
[W] + D = toggle show desktop
[W] + T = target the task bar, useful for not taking your hands off the kb
[W] + B = target the status bar

ALT + TAB to scroll to open windows, add a SHIFT to go backwards
>>
RebeccaFuckingspear.sh - Fri, 09 Sep 2016 23:22:24 EST ID:L/v5xr5K No.119781 Ignore Report Quick Reply
Windows 8+ has the
Win+X hotkey. Very nice. And programs can be downloaded to put whatever you want in there.

I like alt+space as well.

Shift+f10 is a neat one but I don't use often. (remember when keyboards had a button for that?)

Oh, windows+pause/break can quickly get you places.
>>
IsabellaDumblepork.mpeg - Mon, 12 Sep 2016 11:01:17 EST ID:kXTnJuxs No.119790 Ignore Report Quick Reply
>>119781
every keyboard has that in a button man if its full sized.
>>
FannyBrillyham.inf - Mon, 12 Sep 2016 17:29:48 EST ID:QN9vdpws No.119791 Ignore Report Quick Reply
>>119790
Even with compact 10keyless layouts, it's usually there unless there's a function key instead. And sometimes the function key can be used as a menu key by pressing shift or something.


which OS is more secure for personal/home use? by AugustusCrindlebury.mdl - Fri, 09 Sep 2016 00:20:54 EST ID:ojlFLdLD No.119775 Ignore Report Reply Quick Reply
File: 1473394854380.jpg -(27210B / 26.57KB, 500x375) Thumbnail displayed, click image for full size. 27210
a few months ago i used using TAILS. once i finished the installation process (which i had problems with before), i liked it. however, i recently saw a video recommending using Qubes OS for secure internet browsing.
for what uses is Qubes OS suited? which do you prefer to use, and why? the apparent customizability of Qubes is appealing, but i don't have a dedicated computer for it right now.
>>
CedricGommerfuck.mov - Fri, 09 Sep 2016 21:54:33 EST ID:d/L8RdUK No.119778 Ignore Report Quick Reply
>>119775
qubes may be ok, it is sounds ok. tails it does not or never worked correctly.
SO, best bet is, learn to make a system you like. Make it work the way you want it to.

Tails is made to make everything 'work for you.' It does not work correctly. For that reason.


Help with iphone 4 by CyrilFanfoot.ppd - Thu, 08 Sep 2016 17:03:26 EST ID:/qdU/PZb No.119773 Ignore Report Reply Quick Reply
File: 1473368606652.jpg -(40089B / 39.15KB, 500x375) Thumbnail displayed, click image for full size. 40089
I recently got back an phone from 5 years ago, and it says its disabled. I don't have the computer I usually sync it to, but I do know the passcode. I need some data from the phone, but google searches tell me there is no way to get the photos / contacts from the phone without the original sync computer or restoring the phone.

Basically looking for help with either getting the phone back to the point where it lets me enter the code, or be able to recover the data.

If this isn't possible, will the people at the apple store be able to do it for me?


Thuderstrike MELTING components by C;/ZombieJ.exe !abU/7QeyLM - Wed, 31 Aug 2016 16:04:40 EST ID:+CRnKb9p No.119719 Ignore Report Reply Quick Reply
File: 1472673880069.jpg -(128521B / 125.51KB, 960x540) Thumbnail displayed, click image for full size. 128521
Firstly, I know... Trust me, I KNOW. Heroin, but still.

My oldest brother claims he sent out my nephews Apple laptop to be fixed, but a virus known as Thunderstrike caused it to run hot and damaged or "melted" is the word that was used, ruining the computer.

Now, all I wanna know is: Is this possible? I have my own laptop, I know how hot they can get, I've seen the damage they can cause to your thighs. But to get that hot, you'd HAVE to smell that stuff.

My brother is a former big time heroin dealer, now after a bust, a couple years later he's a stay at home dad who was supposed to get the mac fixed... I "know" what happened. I'm not stupid. I'm an addict myself. I just want to give the sonofabitch the benefit of a doubt here.

What's up? Is this plausible?
>>
NathanielDicklewell.clp - Wed, 31 Aug 2016 17:32:45 EST ID:EbEeMuQ1 No.119720 Ignore Report Quick Reply
Melting is an exceptional claim, but all laptops can run too hot and eventually die. I think the root cause is usually the solder joints like it is with consoles. You can also damage hardware intentionally by messing with the firmware, but I've never heard of that happening in the wild.
>>
FannyCinkinsene.sh - Wed, 31 Aug 2016 19:43:00 EST ID:bFee7tEo No.119721 Ignore Report Quick Reply
All you really need is a way to crank up the voltage going to the CPU and the ability to disable the safeguards for overcurrent and overheating and you can fry a CPU pretty quickly. Melt it? No, you wouldn't melt a macbook but you can kill it.
>>
JarvisCrunnerspear.swf - Mon, 05 Sep 2016 13:43:47 EST ID:EG3EGMmb No.119763 Ignore Report Quick Reply
>virus known as Thunderstrike
Well if it is
>KNOWN
Then just look it up on google and see if that exist, no? :^)


Hiding your IP through vpn by AngusCiffingmut.fla - Mon, 01 Aug 2016 23:02:22 EST ID:TDlIdu+x No.119534 Ignore Report Reply Quick Reply
File: 1470106942894.jpg -(140533B / 137.24KB, 720x960) Thumbnail displayed, click image for full size. 140533
How do I do this and is it actually effective?

Can someone please recommend me a good vpn.
4 posts omitted. Click Reply to view.
>>
EbenezerNollyshaw.txt - Sat, 06 Aug 2016 22:00:06 EST ID:+eapzhkV No.119570 Ignore Report Quick Reply
>>119538
You can have more control installing just tor without the browser bundle, editing the tor.rc file. Proxy before and after tor nodes. You can also rune tor through a vpn as well, forward a connection through SSH, I does leave a pretty noticeable finger print though. Haven't messed with this for a while.

On thing about tor bundle, firefox, javascript is enabled by default so a remote site could get ones IP address. SO change the to false in about:config.
>>
FuckHillyford.ht - Sat, 06 Aug 2016 22:23:00 EST ID:ewfxEDlW No.119571 Ignore Report Quick Reply
>>119570
You shouldn't deviate from the default set up unless it solves a particular problem for you and you've thought through the implications. Javascript being on by default is the exception. The reasoning there is that 90% of users will just assume that Tor is broken if pages refuse to work.
>>
EbenezerNollyshaw.txt - Sun, 07 Aug 2016 02:57:39 EST ID:+eapzhkV No.119572 Ignore Report Quick Reply
>>119571
I believe in adblock plus to complement TBbubndle as an addon as being safe. No sites suffer from this whatsoever. Nor security from what I see.
.
Blocking ads improves webability.
-
Noscript works well. Scripts blocked can make pages load fast, not ask for DNS requests, would not run unwanted scripts.

Take a tor based selection for certain needs, then a basic browsing with basic browsing, blocking unwanted scripts as well.
>>
EbenezerNollyshaw.txt - Sun, 07 Aug 2016 04:05:51 EST ID:+eapzhkV No.119575 Ignore Report Quick Reply
>>119571
>The reasoning there is that 90% of users will just assume that Tor is broken
>if pages refuse to work.

Yes and no, many sites block tor nodes by default. As does 420hchan to the best of it's ability. And it's, our (founders) supervisors work on this. This site is stable.

Only one no-script 'allow' as-it-is needs to be used to read. If even.

Sure, but writing attempts with tor or proxies gives an error message to write to the board..

Nice balance. Read with tor or proxies, but not write to.
>>
CharlotteSmallford.api - Mon, 05 Sep 2016 05:24:09 EST ID:rvHu8Q76 No.119761 Ignore Report Quick Reply
>>119538
The NSA pwnd plenty of endpoints. TOR is compromised. smh guys


Old Laptop Uses by MollyPirrygold.dao - Sun, 04 Sep 2016 14:32:10 EST ID:E8lJOGQX No.119752 Ignore Report Reply Quick Reply
File: 1473013930067.png -(9503B / 9.28KB, 644x131) Thumbnail displayed, click image for full size. 9503
It's really old. http://www.cnet.com/products/dell-inspiron-1100/specs/

The first thing that comes to mind is some dedicated emulator device.

What OS should I install in order to squeeze the most resources out of it?
And what projects would be fun for this thing?
>>
NathanielHurringdeck.msg - Sun, 04 Sep 2016 23:30:37 EST ID:3J0NbBwm No.119755 Ignore Report Quick Reply
I would try Puppy Linux and Lubuntu. XP would be lighter and safe if you never go online with it. I don't have any recommendations on what you might do with it.
>>
HenrySottingtat.bfc - Mon, 05 Sep 2016 03:54:48 EST ID:d/L8RdUK No.119757 Ignore Report Quick Reply
You should be able to get a gig of ram if you updated the BIOS firmware.. Difficult to mess up at best . There are many minimal resource Linux out there. I do like puppy but it seems to have flaws that just stick around. However I have not used it in a while. XP, should not be an Issue, really. NTLite it and it would make a comp from 2000 pretty snappy. There is DSL. and I think feather exists.

I would make it a server. Toss an FTP server on it, there are some other options.


Programming by 11111 - Sun, 04 Sep 2016 09:15:27 EST ID:9zCy3pWh No.119750 Locked Ignore Report Reply Quick Reply
File: 1472994927496.jpg -(530581B / 518.15KB, 2500x1443) Thumbnail displayed, click image for full size. 530581
https://www.youtube.com/watch?v=iKVBSm20AQA
Locked
Thread has been locked
Thread was locked by: C_Higgy
Reason: /prog/
>>
AngusDellernere.sea - Tue, 06 Sep 2016 14:45:49 EST ID:FtUa1Cfw No.119769 Ignore Report Quick Reply
>>119750
/prog/


Recommend windows clients for torrent seedboxing? by SamuelGankintine.rm - Sat, 03 Sep 2016 21:06:16 EST ID:UJ+m8uzF No.119749 Ignore Report Reply Quick Reply
File: 1472951176809.png -(141145B / 137.84KB, 975x707) Thumbnail displayed, click image for full size. 141145
Just set up an old Win7 PC as a simple headless NAS controlled by VNC.

Going to use it as a 24/7 seedbox for some private trackers. What are clients you recommend from personal experience?

Ease of remote connectivity and administration is a factor. I want to control it from an android tablet device. I tried using uTorrent Remote for a simple solution on another network environment a while ago and found it finicky and limited. Thinking of using android app Transdroid but not sure of what client I should use.

thanks


<<Last Pages Next>>
0 1 2 3 4 5 6 7 8 9 10 11 12 13
Report Post
Reason
Note
Please be descriptive with report notes,
this helps staff resolve issues quicker.