arisuchan  [ cyb / tech /art / cult ]  [ λ /Δ ]  [ psy /feels ]  [ x /z ]  [ ru /jp ]  [ misc ]  [ meta ]  [ all ]  info /donate /stickers     arisu themelain theme

Catalog (/cyb/)

Sort by: Image size:
R: 12 / I: 0
>What is a Virtual Private Netowrk (VPN)?
A virtual private network extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

>Who are the fourteen eyes?

The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence.

>Why do I need a VPN?

To keep your internet practices anonymous from those who take interests in gathering your information for malicous purposes.

>What VPN to use?

Come to a conclusion by comparing what you need and what you're going to do
R: 13 / I: 2

china, wtf

soykaf in hong kong?
R: 1 / I: 0

The Big Leak

As we all know, everything we do on the internet is collected by various organizations and used to create detailed profiles on individuals and their interests, fetishes, beliefs, etc. Let's imagine a hypothetical scenario where all these detailed profiles on people leak - how would the world change? How many governments would fall apart as officials are exposed? How many people would be forced to hide in obscurity as they're found to hold beliefs or do things that society does not approve of? Would society learn to forgive past digital transgressions?
Sorry if this thread is better suited for another board.
R: 7 / I: 0

Opennic and Cyberpunk DNS

What happend to opennic ? It was a /g/ concieved project. Its still functional. There are dnscrypt public servers. There is even a .cyb tld. Why are there no .cyb sites? Go make some blogs or something. Someone point arisuchan.cyb here.

Why isnt your dns opennic dnscrypt?

Post excuses, dns alternatives, 水 .cyb sites , namecoin , and other DNS misc.
R: 6 / I: 0

Cyberpunk Lasertag

Me and my fren have dreamed for years about constructing an immersive cyberpunk themed combat arena for airsoft and lasertag! with grimy streets, bucket loads of neon and a gripping plot!!! We're starting to make this a reality, we need to show this a viable business venture! We have a crowdfunder to raise money for building a prototype of the custom guns, as well as looking into VR and augmented reality!! Please consider supporting us or sharing with your friends, it would be greatly appreciated!! Heres our media handles, please consider supporting us!
if you want to ask any questions, feel free to!
R: 20 / I: 4

/cyb/security meetup

So the general meeting time will be around UTC 4:00 Friday / Saturday, which converts to 9 PDT, 10 MDT, 11 CDT, and 12 EDT across the United States. Convert this to your local time if you're outside of the US.

This thread will hold a compilation of each meetup at the end of the weekend, and a proposed time / day for the next meetup if the general meetup of Fridays / Saturdays of UTC 4:00 does not work for the majority of participants.

Disclaimer: If you're bringing any illegal ideas with you, keep them to yourself. You'll be warned or be removed from the meetup.

Join us at Freenode: #arisuchan
Join us on Mumble during the meetup at, default port and no password.

Some general starting points for the newbies are here.

Huge resource list for most subjects:

Reddit (I don't recommend anything but the following.):

Basic Linux & Powershell usage: (Powershell)

Multiple structured courses: (Good content, soykafty web design in my opinion.) (Some content is outdated, still a good resource.)


CTF / Practice: (Registration is a puzzle.)
R: 12 / I: 0

First Social Network Alternative

What is your first social network alternative account?
- Federated (Mastodon, Pleroma, Misskey, …)
- P2P (…?)
- other
R: 16 / I: 0


I thought we could use a Matrix/Riot thread.

I made a room for all lovers of Lain.
Rules and info:
Feel free to post any rooms that have something different to offer.
R: 1 / I: 1
There are days I wish for cyberpunk dystopia.

Eternal cloudy days. Perhaps because of an irreparably damaged climate system, where life still makes way. Where I can transport my consciousness to a symbolic system based on silicon and can invade the minds of others like a parasite. Where I earn the minimum wage and can still survive on the minimum in the chamber of a hotel capsule. Where the only existing colors are black and white because any camouflage system is useless.

Sometimes I hallucinate with easily accessible, low-cost and highly effective synthetic drugs even in exchange for destroying the liver or the neurological system, which matters whether with one blow or two I can install a new one.

Why not become a god made of heavy metals? Change my phallus and face for a Royal Ordnance L7 cannon and an a M60 with armor piercing bullets.

My tongue can be that of a snake too, which releases all kinds of hallucinogens and aphrodisiacs just for you.
R: 2 / I: 0
I want to learn how to make good prank calls. How to improvise better, how to safely make the calls, how to setup voice fx etc etc.
Is there any good community around prank calls? Any good sources about that?

(image from @the_call_center instagram, check it out!)
R: 23 / I: 1

Gab Dissenter

>Gab Dissenter (or simply Dissenter) is a social news aggregation and discussion service. Dissenter was created to allow commenting on any Web page in an associated third-party forum outside of the site owner's control. The platform includes a website and a browser extension.

>Dissenter was developed as a response to multiple social media platforms' and online news sites' moderation practices, which involve removal of individual comments or deleting or disabling comment sections altogether.

I'm interested in this addon, but as pointed out in a video by Eli the Computer Guy (, you're voluntarily submitting your browsing habits to a database controlled by Gab, which has many adversaries trying to compromise it, and can you really trust Gab?

Use good OPSEC.

R: 11 / I: 0
anyone played/playing VA-11 HALL-A? It's a pretty great cyberpunk game
R: 25 / I: 6

This is a call out to all hackers, to all crackers, anarchos, crypto anarchos and cypher punks, trolls, to all angry people! It's a call out to everyone, because right now it needs everyone!

The Hambacher Forest is still getting evicted with massive police violence! A journalist already died in this battle against capitalism and brown coal. Two activist already got hurt very badly while getting evicted.

>Because of this we now have to show international resistance! We have to show RWE and the German politics that we do not just take it.<

Please spread the message in your communites!
R: 8 / I: 0
What do you think will be the killer VR app?
R: 12 / I: 1

cyber PUNK?

Anyone notice how theres alot of talk of cyber, but not alot about punk on here?
(And this is not a request for this to change)
But I mean obviously we're all very excited about technology especially the cutting edge,
But where does the punk come in? Like even though theres probably some dissatisfaction with major authority institutions on here I think if you asked most people they woudent claim that sticking it to the MAN has much to do with there everyday philosophy.

What it boils down to is, I feel like, we've just borrowed a inaccurate term to describe our community just because it sounded cool.
R: 8 / I: 0

Security on Mobile Devices

There's a lot you can install on computers to keep yourself safe against tracking/stay anonymous/keep privacy, but what about on phones/other mobile devices? Applications protecting against tracking and whatnot are much more limited.

Could use VPNs and avoid Bluetooth…. what else?
R: 31 / I: 3

Tor the planet !

Are you using the Tor Network ?
if No then You must start using it from now on if you care about your online privacy.
R: 6 / I: 5
need the best 80s cyberpunk films. gimme some campy, unknown soykaf
R: 8 / I: 0
I was thinking recently that I enjoy Arch a lot for it's simplicity but I also like debian a lot to for it's rock stable, and universal use.
Would it be possible to use a tools similar to Yay that would compile anything from AUR on Debian? I know you wouldn't get the update unless you
compile everything from the ground up.

Does it exist? Is it possible?
R: 6 / I: 0


The Cyberpunk Manifesto: [ ]
The alt.cyberpunk FAQ (V5.26) [ ]
What is cyberpunk?: [ (embed) ]
Cyberpunk directory (Communities/IRC and other resources): [ (embed) ]
Cyberpunk media (Recommended cyberpunk fiction): [ (embed) ]
The cyberdeck: [ (embed) ]

- - - - - -

The Crypto Anarchist Manifesto: [ ]
The Hacker Manifesto: [ ]
The Guerilla Open Access Manifesto: [ ]
The /sec/ Career FAQ (V1.11) [ ]
Why Privacy Matters: [ [YouTube] Glenn Greenwald: Why privacy matters (embed) ]
"soykaf just got real": [ (embed) ]
Cybersecurity basics and armory: [ (embed) ]
Endware: [ ]
BBS archives: [ ]
Reference books (PW: ABD52oM8T1fghmY0): [!YigVhZCZ!RznVxTiA0iN-N6Ps01pEJw ]
Learning/News/CTFs: [ (embed) ]
FTP Backup:
thegrugq OPSEC: [ ]
#! sec guide [ (embed) ]
EFF anti-surveillance [ ]
- - - - - -

R: 4 / I: 1

Onion homepage


A convenient gateway.
Static content only, no javascript, no trackers.
Feel free to explore.

And share your favourite links, I will consider adding them.
R: 3 / I: 0
Currently implementing Orbot on my android phone (lineageOS, not currently rooted). Besides booting a custom ROM onto my phone without implementing Google Play Services, what can I do to make my phone as "off the grid" as possible? Any apps that I need to know about? Any practices I should be implementing?

I plan on reinstalling lineageOS and opt out of Play Services, but I'm having a hard time biting that bullet. I've already left social media, but my big thing is Youtube Music, which I use when I work out. Gotta have my music, and I don't want to torrent. I know of MicroG, and I'm debating whether I want to take that route.
R: 3 / I: 0

OSINT, recon, Information Gathering

Conducting information gathering for intelligence products or other information gathering tools.
R: 11 / I: 0

Earning Coins

What are some /cyb/ ways of making money/earning a living? Working at Shlomo's zaibatsu isn't very enticing. At the moment I'm scraping by making websites for people. I think the most cyberpunk way of making money is probably selling drugs online but prison doesn't seem that good so I haven't delved into it. So how are we earning our shekels arisu?
R: 13 / I: 0

discord alternatives

yo, can you guys give me a few secure discord alternatives? I need one that's able to be used by the technologically illiterate so my friends can also switch without much hassle. (so id prefer voip and text)
R: 3 / I: 0
>Attorney General William Barr said Tuesday that increased encryption of data on phones and computers and encrypted messaging apps are putting American security at risk.
>Barr's comments at a cybersecurity conference mark a continuing effort by the Justice Department to push tech companies to provide law enforcement with access to encrypted devices and applications during investigations.
>"There have been enough dogmatic pronouncements that lawful access simply cannot be done," Barr said. "It can be, and it must be."
>The attorney general said law enforcement is increasingly unable to access information on devices, and between devices, even with a warrant supporting probable cause of criminal activity.
>Barr said terrorists and cartels switch mid-communication to encrypted applications to plan deadly operations. He described a transnational drug cartel's use of WhatsApp group chat to specifically coordinate murders of Mexico-based police officials.
R: 11 / I: 0

BSD for beginners

I am a Windows person, because I have to do heavily Windows oriented programming. I know linux-fu, but I don't like the distro environment where there is so much bullsoykaf going on. I want a security & privacy oriented, no-bullsoykaf, stable approach. That's why I have "Switch to OpenBSD" on my to-do list. Like I said I know linux-fu (gnu coreutils, basic configuration) but I don't know detailed configuration, I still need to look up stuff time to time.

Is anyone else using OpenBSD as their daily OS? What would you suggest for a noob like me? Should I start with FreeBSD instead? I don't like learning GNU/Linux because there is so many variations which makes you have to re-learn stuff eventually, that's why I have quit halfway. OpenBSD is maturer and more stable, secure & private by design which is why I like it.
R: 4 / I: 0

Creating/hosting an Email Server


I'm new to /tech/ and /prog/. In fact, I'm a complete noob to it all. However, in this world we live in, I'm finding security to be increasingly important.
I don't know how far I'd like to go, but the idea of de-Googling myself sounds attractive. I feel like a big step would be to completely stop using gmail. And with that, I've been looking into creating/hosting my own email server for personal use. I've looked up some basic steps, and my understanding is I need to buy a domain (something that is relatively cheap), and find a dedicated hosting server. There are some available, but they're expensive. I have a raspberry pi at my disposal, and I've heard of people setting one up as a dedicated server.

I understand that this will not be a simple endeavor. Setting this up is going to take a lot of research and work. But I feel like, if I really put my mind to it, I can do it.

Does anyone have any experience doing something like this? Anything you'd tell someone who's interested in doing it themselves?

Thanks, all.
R: 46 / I: 2

cyber room

Why are you not using tox yet /cyb/? P2P encrypted text, voice, video, and group chat. Full support for tor if you want anonymity. This kills the discord botnet. We have an lain dedicated room setup there. Keep it comfy no racism allowed..

Install it with your package manager or from:

We have a bot you can add and get invited: 415732B8A549B2A1F9A278B91C649B9E30F07330E8818246375D19E52F927C57F08A44E082F6
R: 24 / I: 2

Online transhumanist or Cyber Nihilist communities

Does Alice know of any Transhumanist or Cyber Nihilist online communities? I'm wanting to find tech-centered communities with a very cyberpunk atmosphere..
R: 62 / I: 13

Israel, a future cyberpunk state?

Israel population is expected to double by 2050 to 16 million people and the country will be seriously overcrowded. More than 100 skyscrapers were built in the last 10 years and over 200 others are under construction. The country is the second most militarised country after Singapore. Israel is very highly educated but is faced with extreme inequalities and is one of the most diverse in the world (less than half speak Hebrew as their mother tongue, the country has the highest percentage of its population fluent in three or more languages). It's economy is based on high tech (cybersecurity, biomedical engineering, aerospace engineering, solar power…), military exports, and is controlled by a few megacorps with cyberpunk names like TEVA Pharmaceutical Industries Ltd., ELBIT Systems Ltd., DELEK Group Ltd., ORMAT Technologies Inc., OPKO Health Inc., etc. The culture is very punk: no respect for authority even in the army and workplace, a "no future" attitude… The economy is expected to grow until the GDP per capita is the same as in the United State, but with vastly greater inequalities. The country faces very serious security challenges, including from Hezbollah, Hamas, Syria, and Iran. Finally, the general aesthetics is pretty cyberpunk. The pic is an 18-year-old Christian girl, military police officer in the Israel Defense Forces.
R: 13 / I: 1

The Internet is Fake
How much of the internet is fake? Studies generally suggest that, year after year, less than 60 percent of web traffic is human; some years, according to some researchers, a healthy majority of it is bot. For a period of time in 2013, the Times reported this year, a full half of YouTube traffic was “bots masquerading as people,” a portion so high that employees feared an inflection point after which YouTube’s systems for detecting fraudulent traffic would begin to regard bot traffic as real and human traffic as fake. They called this hypothetical event “the Inversion.”
Everything that once seemed definitively and unquestionably real now seems slightly fake; everything that once seemed slightly fake now has the power and presence of the real. The “fakeness” of the post-Inversion internet is less a calculable falsehood and more a particular quality of experience — the uncanny sense that what you encounter online is not “real” but is also undeniably not “fake,” and indeed may be both at once, or in succession, as you turn it over in your head.
we cyberpunk now
R: 4 / I: 0

looking for relaxing cyberpunk music
looking for something like this ^
something relaxing and calming like synth-wave but not too dramatic
R: 33 / I: 9

Realtime imageboard

Realtime imageboards are the future. They solve traditional imageboard's ease of exit barrier. launched as a test run that got too popular, hitting 4chan level ppd on accident.

No more dead boards, no more 4chan hegemony. Why haven't you gotten 10 friends and made your own already?
R: 10 / I: 0

/cyb/ + /sec/ - Cyberpunk General

The Cypherpunk Manifesto
The Cyberpunk Manifesto

"What is cyberpunk?"

Cyberpunk directory (Communities, Media, Readings)
Cyberpunk resources (Miscellaneous)

/cyb/ ftp:

The Hacker Manifesto:
The Guerilla Open Access Manifesto:

"Why privacy matters" [Embed]
"soykaf just got real"

Cybersecurity basics and armory
BBS archives
Various guides to get started

Reference books (PW: ABD52oM8T1fghmY0)!YigVhZCZ!RznVxTiA0iN-N6Ps01pEJw

Thread Archive:

Join irc://
SSL Required:

= /cyb/ /sec/ News =
After a retrospective comes a new batch of crystal ball gazing:
>Tech trends 2019: 'The end of truth as we know it?'
>"2019 will see the first AI-orchestrated attack take down a FTSE 100 company," predicts Jason Hart, chief technology officer, data protection, at security firm Gemalto.

That sounds like something Wm. Gibson would have written.

>"A new breed of AI-powered malware will infect an organisation's systems, sit undetected gathering information, adapt to its surroundings, and unleash a series of bespoke attacks targeted to take down a company from the inside out."

>AI will be needed to fight AI, many believe, particularly as the IoT vastly increases the number of potential weak points in this burgeoning network of connected devices.

>Greg Day from Palo Alto Networks says: "AI on AI cyber-battles will begin. Cybersecurity will be a machine versus machine fight with humans alongside to help and adjudicate.

This is straight out of Neuromancer.
R: 29 / I: 0

Anonymity General

In an effort to appease moderation I've decided to speak up about something I've been meaning to ask for a few months.

I'll shortly be moving out of my family home. Internet privacy and security are important enough to me that people close to me call me paranoid; haven't used google or google services for a few years now, and I don't own a smart phone, to name a few of the things I do to protect the little privacy and anonymity I have on the clearnet.

I've lightly experimented with tor long long ago, but when I move out plan to exclusively connect to the wired by using tor / connect to a vps through tor I plan to purchase with bitcoin. I have a solid systems programming background, with some knowledge of networking protocol and how the tor project works.

I have the incredible luxury or not being obligated to visit / use any website or web app. No google-anything for work/school, no web portals for work/school, and no facebook or social media. I have zero qualms with not using any site that isn't "tor friendly". Also, please assume the usage of tor and similar anonymizing friends isn't something my isp prohibits.

I'd like to ask for tips on any of the following:
Secure tor usage and configuration,
Pros and cons of tor alternatives,
And finally how does lain stay anonymous?
R: 1 / I: 0

little sec qeustion

Is it good current practice to regularly use rkhunter and/or chkrootkit for security on Gnu/Linux?
are there better tools out there for checking if your comp is compromised?
R: 4 / I: 0
Is the future cancelled?
R: 7 / I: 0

Russia possibly making its own intranet
>Russian president Vladimir Putin officially signed a bill into law yesterday, according to documents obtained by CNN, that will move the country toward the creation of a “sustainable, secure and fully functioning” local internet, as the Kremlin referred to it in the documents.
>During states of emergency, the government would be able to cut off foreign internet entirely. It would give the Russian government extraordinary control over the flow of information, limiting its citizens’ access to foreign news and media that are not controlled or overseen by the Kremlin.
As unlikely as this sounds, the fact that in videos you can see Russian lawmakers constantly talk about Russian alternatives to Western internet giants and how big their internet presence is really makes it seem like they are genuinely considering cutting off the foreign Internet altogether.
I know we have some peeps from /ru/ here, any thoughts?
Are there any big meshnet projects out there (sure, it'd still be an intranet, but at least it wouldn't be as tightly controlled)?
R: 8 / I: 0

Secure modem thread

I have a problem going on for long now. Basically: my ISP is a bitch

my internet comes through a docsis 3.0 network through coaxial cable. (that isn't a problem)
the problem is: they gave a "connect box" that is basically an essential botnet manifested into phisical reality. It's a deep-chinese bullsoykaf modem+router+wifi-ap box, and it has zero options, no portforwarding, no configurable firewall, no nothing, the only setting is setting the wifi password. the "connect box" decides what ports and what packets are "safe" for me and closes other things, there's also no option to give fix IPs to my devices on LAN.

now this is soykaf in itself but: this device has been proved by several people to be very easy to exploit by anybody, but isp doesn't even need exploiting because it has several dedicated backdoors for them, and they even have a backdoor for "refreshing" and "modificating" (read as: injecting even more backdoors and malware and getting logs of everything, while eliminating more and more settings and options) the firmware, which they definitely do from time to time. i feel like i'm living in a gulag. also it's as big as a shoe box, consumes a soykafload of energy and warms as a motherfucker. it has to be rebooted quite often and every reboot is about 15 minutes.

Now the real question and subject of this thread: Post about secure and good cable modems. I tought there was openwrt compatible modems but now i see there's only "connect boxes" has openwrt for them. i want a discrete cable modem and an openwrt router. which are some secure and good modems? what are the most important properties i should look for?
R: 4 / I: 0
ok so, pure hypotethical situation.

A group of attacker activists, whose actions are based on principles every good cyberpunker on this board would share, have to perform a sabotage.

At a certain time in a certain building, let's say a school or an office, oblivious people will enter in a computer room, then every person will take a computer and they will do stuff on the browser requiring an internet connection for an hour or so. A group of attackers composed by a dozen of individuals (of which one or two are in the computer room, supposingly doing stuff on the browser with the oblivious people, while the others are still in the building but outside the room) wants to stop them from doing those things on the browser. They know the wifi password, but the computers in the room are connected via LAN (even if with the same connection).
If they manage to sabotate the activity on the browser, the oblivious people will be happy or indifferent, and the room's tecnichan is very stupid so he won't probably be able to restore the connection if that's more troublesome than restarting the router (but even if he restores it, slowing down the operation with multiple disconnections would already be a victory).
The group of attackers would prefer to have the possibility to leave a message or a symbol, but if that's impossible with informatic methods it's not a big problem because they can still use meatspace-based methods for that.
There may be the possibility to access one of the computers in the room before the oblivious people enter, but the attackers don't have administration rights (Windows 10) and this is not something on which they can count 100%, so if possible the plan should work also without this eventuality.
Obviously if the attackers don't expose themselves too much it would be better.

How lain thinks the attackers should act in order to reach their objectives?
R: 51 / I: 10

Encrypted Synchronous Communications (Instant Messengers)

lets talk about instant encrypted synchronous communication lain. what are some you use? which ones would you never use? should you trust your life on any of them? p2p or decentralized? how do "chat bots" fit into all of this? where do we draw the line between anonymity and convenience? how do we deal with metadata?
starting with a nice long list and some of their drawbacks

signal - without a doubt first class in secure instant messaging clients at the moment.
centralized server, closed source
requires a phone number to register
only able to contact people through phone numbers
desktop client is a chrome app
file transfer and group calls aren't encrypted

wire - arguably just as good as signal, but doesn't have the backing of moxie
centralized server, closed source (soon to be open source)
requires either a phone number or email address to register (both if you want access to the desktop and mobile clients)
desktop client is an electron app

threema - a closed source client that is still fairly popular (i haven't used this client so i can't say very much about it)
centralized server, closed source client & server (encryption protocol is open source)

riot/matrix - protocol of "the future" still in alpha and under active development
no e2e by default (being worked on currently)
riot is based on electron, mobile app leave much to be desired

encryption is just a plugin and isn't baked into the protocol (im not sure how much of a problem this is)

"Encrypted" messengers that you should avoid:
Encryption protocol is known to be broken, since it is home baked and not made by cryptographers. E2E is not enabled by default.

This is Facebook. e2e may be working, but your data is still being harvested and sold to advertisers and/or used by Facebook. They own the client. They can do whatever they want with the data once it's unencrypted at your end. e2e just means that nobody in the middle can make sense of it. This is why open source clients are important!

Others I don't really have much idea about:
Cryptocat, Tox, Wickr, ChatSecure, Cyph
R: 6 / I: 0

Database exchange

Please note that we have proceeded to the databank exchange.
R: 2 / I: 0


SSTV is an amateur technology that permits drawing images from sounds. [File is an example of SSTV.
Could SSTV - like systems be used to transfer or create files? It would be fun to experiment in making a file/network that is radio-based and independent from Internet. I always loved things like Meshnet and stuff but it wasnt entirely "out of the box" as I'd like to say. I know I sound "i wanna go against the world" but I'm really into alternatech.
Not sure to post in /tech/ or here since it's kind of both..
We're not talking about Security yet though.
R: 30 / I: 5

Windows 7 hardening

hello /cyb/,

I'm installing Windows 7 for a PC build, and am looking to harden it all the way down. I've already gotten the CIS benchmarks and seen a few guides, but one thing they didn't cover is the so-called "botnet updates" microsoft pushed to win7 making it supposedly as bad as win 10 in terms of call home-iness. Can anyone here confirm the existence of such updates, and preferably share info on what specific KB numbers to avoid?

on behalf of everyone else running win7, thanks in advance.
R: 29 / I: 2
Is the rapid advancement of technology responsible for significant social alienation? It seems that even as connections are seemingly strengthened through the internet we are more atomized than ever in spirit. The classes with most internet access have very damage psyches (middle and upper)
R: 40 / I: 4

Australian ISPs ban "bad" websites.

Each day we find ourselves creeping towards the corporate dystopia we fear.

What gets me is that terrorism in the past was fine, but suddenly this isn't. Arabs killing Arabs? 9/11? Arabs killing Europeans? Arabs killing Jews? All totally fine.


“We understand this may inconvenience some legitimate users of these sites, but these are extreme circumstances and we feel this is the right thing to do.”

A lot of people use these sites as support groups, LGBTQ groups for example, it's a safe place for them. But here we go, let's not understand what this is and just ban it because we are corporate and fuck you.

"The right thing to do" is to ignore fuckers like this, but peoples self righteous indignation won't let them, and he fucking wins.

Good job corpo dipsoykafs. You show we live in a boring as fuck dystopia.
R: 1 / I: 0
So today I was walking laps around my school when I hear a sound from our security, it was reading off a mac address. I pulled out my phone and it started to read an IP address. what should I do with this? should I do a pen test or scan it for open ports?
R: 12 / I: 4

Eyes Under Big Brother

Facial recognition is being employed by the government and soon to commercial use as a means to keeping tabs on everyone doing everything. Storing that data for legal uses, selling, and enforcing law.

Taking up our own means of fighting against this menace to our privacy should be talked about. I believe the war against this type of surveillance is already lost, but we should make the effort to protect ourselves against it.
R: 1 / I: 0
Psychedelic Warlord, legendary hacker and the guy that came up with the name "The Cult of the Dead Cow" in April 85, is actually Beto O'Rourke.
R: 14 / I: 1
So, I was wondering what kind of hardware I should get to build a privacy-respecting computer like what's been discussed on here. There's plenty of talk about the software, but I wanted to know what would be best to buy, be it a laptop or a desktop, in order to get these programs up and running and not be controlled by google or Microsoft. Any advice?
R: 9 / I: 0

BBS in Asia

Bulletin Board System are still popular in China/Taiwan and have millions of users.

Did anyone ever look into these? Is there anything meaningful or even english content? From the wiki, it seems like the chinese government shut down a whole bunch of them and after reopening, you had to register with your data, so there is no anonymous posting. Taiwan seems to be good though.

Anyway I find it interesting that such systems are still alive and well somewhere on this planet. Are BBS still in widespread use in other places? I could imagine South Africa or India or so? I know that we still have them in the west, but it always seemed like they are only there to serve nostalgia with few users and little activity.
R: 46 / I: 4


Retroshare is a p2p program providing email, chat rooms, file sharing, forums, channels, over fully encrypted tunnels. It can replace most things you need to do online. Find it at or through your distributions package manager. Retroshare has gotten many new features recently.

Retroshare supports full hidden service mode. When you get to the profile creation popup don't use the default. Instead click the advanced button and then configure your tor hidden service. This adds another layer of encryption and provides anonymity. We have a chatroom on retroshare right now. Come try it out!
R: 5 / I: 0

vxheaven equivalent ?

Since vxheaven website is completely dead, do you know any websites of this type which is still active ?
Is the vxscene definitively dead ?
R: 5 / I: 1

Little guide I made
Input would be much appreciated
R: 16 / I: 0


What password manager does Alice use?

I've been using LastPass for a few years now but I am ready to switch.
R: 26 / I: 4

Hacking General,

What are you hacking, cracking, bypassing?

Remember don't post anything illegal or else mods will delete/ban.

Questions, ask away someone will help!

Where to start?

Dummy targets:


R: 7 / I: 0

VirtualBox E1000 Guest-to-Host Escape

I like this mans attitude when he rambles about the contemporary state of infosec where companies are soykaf and hackers delusional (see the "Why" part).

If you ever find a 0day, what would you do with it?
R: 16 / I: 2

35c3 - ccc congress

idk whether this chan is even still alive, but it was a year ago, and if anyone is coming to leipzig this year, there's more lain fanatics to be met. Come to the fuwa beria assembly.
if there's actually people replying we could hold a meetup or a lain watching session like last year.
R: 22 / I: 2

Archery OS

This is a relatively new fork of Arch that I learned about that purports to focus on "penetration testing, privacy, digital forensics, and programming." I just wanted to ask what the rest of /cyb/ makes of it. I'm considering replacing my laptop's Arch with Archery, but I wanna know if it's what it's cracked up to be or if I should look to other distros for better implementation of pentesting tools.
R: 0 / I: 0

Don't we do Moon Jae-in impeach protest?

Don't we do Moon Jae-in impeach protest?
President Moon Jae-in, please reform the police and the prosecution who interrogate the suspect as a pervert.
I admit that I have to write this provocative title.
Please read the imaginative abundant investigation documents attached below.
Just three years ago, there was an interrogation of the prosecution and the police, who took someone and made him international criminals.
He asked for the investigation of the investigators, who were investigated in this way, but every time, all of the investigative commands were conducted by the Public Prosecutors' Office's Intelligence Service and none of them were charged with any crimes.
Unless Mr. President Moon Jae-in reform the old-fashioned way, the next turn will be Mr. President Moon Jae-in.
Moon Jae-in President of South Korea
R: 0 / I: 0


I was hospitalized in a mental hospital soliciting room for a suspicion of hunger strike at the Seoul Detention Center. Please punish Park Sang-eun (Chairman of Presidential National Bioethics Committee) and Ham Woong (Director of Keyo Mental Hospital)

Hello? I seek help from you because I have been so bitter and resentful. If I am spreading lies, you must sue me for libel. After an emergency arrest and pressed investigation, I was not able to eat while I was under detention in the Seoul Detention Center. And then I was diagnosed with stress anorexia at Anyang Sam Hospital. The investigators interrogated me every day to show pictures of dead bodies and raped photos, and then they just force me to confess. If someone sees those pictures and some food goes over the neck, I think he is not normal.

Without authority, a prison officer named 'Sung Jin-soo' dared strongly assert of my mental hospital admission. Sung Jin-soo showed the writings that I wrote on my internet blog to the director of Keyo Medical Care Hospital (This medical care hospital is a mental hospital.) named ‘Ham Woong’ and he portrayed me as a psychotic. A doctor at the Seoul Detention Center called 'Cho Soo-hyun' took me to that hospital and forced me into solitary confinement under the name of treatment of my anorexia. In that place, the male nurses tied my wrists, ankles and chest to the bed in the name of avoiding escape, and then they put a diaper on me. It was a disgrace to a man in his 30s. I had been unable to move and could not eat; moreover, they did not cure nor give some food to me. Every in the morning and the evening, I was suffering from hallucination symptoms when I was given an injection called ‘Amytal’, which was prescribed by Ham Woong. Doing such medical treatment, Ham Woong seems to be, beyond losing his mind, a person who gave up being a human being.

A white-haired kidney physician who is the head of Anyang Sam Hospital called 'Park Sang-eun' would not treated but he interrogated me at Anyang Sam Hospital on January 12, 2017. He said to me, "You talked about hacking when you were treated at Anyang Sam Hospital in 2015, do you remember?" In addition, Park Sang-eun said to me, “You are ‘the body that managed by the country (I wonder how a medical doctor uses this jargon which is used between the prison guards in the Seoul Detention Center.)’, so what stresses you? Is there someone who harasses you in your imagination?" I was terrified by his words. It does not make any sense for a kidney physician to treat and prescribe a psychiatric patient; however, he diagnosed me as a psychotic who refused to eat. Again, I was coerced in to being hospitalized by Park Sang-eun even with bombarding rough words.

Park Sang-eun served as a member of the bioethics committee of Ex-President Park Geun-hye. Currently during Moon Jae-in presidency, he served as chairman of the President-direct 'National Bioethics Committee,' the chairman of 'Korea National Institute for Bioethics Policy,' the standing Representative of 'Africa Future Foundation,' and the author of a book titled 'Biomedical Ethics' and a book on 'Kidney Transplantation.’ However, I believe that being the person in a position of national bioethics who pretends to be a doctor and interrogates the prisoners with the life-disrespecting imperative is a hideous crime that violates the human rights of the entire Korean people.

I present a petition for these facts at the National Human Rights Commission of Korea and filed a complaint on the police, but they had been ignoring my words. A detective of the Uiwang Police Station named ‘Hwang Hyun-seop’ finished this case without asking the perpetrator for attendance, and a prosecutor of the Suwon District Prosecutor's Office named ‘Kim Yoon-jung’ had dismissed my complaint. Even though they did not confirming the typo with the surname of the offender in their documents, the prosecutor just printed straight down with 'Hoeng' which surname does not exist and sent a letter to me. Whoever can help the people if their government ignores them who are classified to suffer because of having no power? I think that it is beyond the acceptable range of our society that Park Sang-eun and Ham Woong brazenly do medical treatment as a doctor. Please be sure to punish Ham Woong and Park Sang-eun, and take measures to prevent their further medical treatment.

Attachment Link 1 :
Attachment Link 2 :
R: 16 / I: 4

hardware tracking

what are alice's thoughts on cybersecurity from a hardware perspective?
I see a lot of threads regarding useage of VPNs, safe browsers etc but nothing to do with your machine tracking you beneath even a kernel level.
For example;

>The new Intel Core vPro processors contain a new remote access feature which allows 100 percent remote access to a PC 100 percent of the time, even if the computer is turned off.

>Core vPro processors contain a second physical processor embedded within the main processor which has it’s own operating system embedded on the chip itself. As long as the power supply is available and and in working condition, it can be woken up by the Core vPro processor, which runs on the system’s phantom power and is able to quietly turn individual hardware components on and access anything on them.”
>“Core vPro processors work in conjunction with Intel’s new Anti Theft 3.0, which put 3g connectivity into every Intel CPU after the Sandy Bridge version of the I3/5/7 processors. Users do not get to know about that 3g connection, but it IS there,” he writes, “anti theft 3.0 always has that 3G connection on also, even if the computer is turned off” (emphasis added).
R: 9 / I: 0

Cyberdeck and shit

I need a tutorial about how to build a cyberdeck
R: 3 / I: 1
Hey, I am looking for a mentor in cyber security. I am a university student in this field desperately needing a guider/mentor. Any advise on where to find such person?
R: 50 / I: 10

"Cyberpunk is now"

God I hate those people.

Cyberpunk has so much stuff going on. Androids (like really convincing ones, not that ugly mall robot that drowned itself in a fountain), Flying Cars, Off-World Colonies, VR where you could do soykaf, Brain Augmentations, whatever. Nothing of this exists today.

Still people share the same neon light illuminated ramen stall over and over and be like "cyberpunk is now look even my jacket has chinese on it". Does someone actually believe this shallow soykaf?

Of course I too like chinese cities at night. Spend my last holiday in Shanghai and it yes it looks like right out of bladerunner at times, but this is just one thing out of many while we're missing most others.
R: 4 / I: 1
anything better than CSC-STD-004-85 for mandatory access control?
R: 58 / I: 6

/Fuck Facebook General/

/Fuck Facebook General/

Facebook permeates into all of our lives, be that through family friends, or work requirements.

How do you avoid such a monolith like Facebook who entire business is to collect data, to stalk us and manipulate us into buying their advertisers products, what alternatives are available to us?

>How Facebook's tentacles reach further than you think

>How Data Mining Facebook Messages Can Reveal Substance Abusers

>Facebook’s Zuckerberg Says The Age of Privacy is Over

>Tech Insiders Call Out Facebook for Literally Manipulating Your Brain

>Facebook is turning you into a narcissist

What are Lains thoughts? Personally, Fuck Facebook.
R: 24 / I: 1

You are not the protagonist.

We live in a cyberpunk world, and frankly, you are not the protagonist.

You are the extra in the streets, standing in the hazy middle distance and faintly illuminated by the storefront in the night.

You are the passive victim of the megacorp's virtual reality distraction soykaf, and all that sets you apart from the Average Joe is that you sit around and think about how much deeper and more edgy you are than everyone around you.

You think that wasting time on Arisuchan is subversive, and nothing like wasting time on Facebook.

Look at me, everyone! I'm using Tor, I'm using VPN, I've got _opsec!_ Aren't I a big boy now, everyone? I hope you're all proud of me.

Hey, I don't intend to disparage. There's a lot of honor in the life of an extra, if you play it well, but you can't play it if you don't know who you are, and a lot of you seem to think (at some level or another) that you are Deckard or Neo or something like that.

Taking that step out of delusion is the first step on a road to something like "inner peace", and the kind of genuine _joie de vivre_ that inspires white women to put cake recipes on Pinterest. It's sure as hell better than cryptopunk fuckery, as far as I can tell.
R: 27 / I: 2

De-Google Yourself

It may be difficult for most and almost impossible to completely escape, but trying out best to rid ourselves of services that use us as the product is necessary to remaining as low lives.

Please share your suggestions and alternatives and DIY guides to often used solutions for email, calendars, file syncing, and common software.

(No JS needed and or LibreJS compliant)
(No JS for signup)
Kolab Now
(Working on LibreJS)
Kolab Now

Use are client you trust for email services that allow it and use non-free java script.

Search Engine

Cloud Solution
(Cloud Services)
Least Authority


Operating System

>More tools

>Remove Google footprint
R: 16 / I: 0

The Federation: If You just HAVE to use Social Media

If you're currently using social networks like Facebook, Twitter, looking for a home after Google+, left social media and you're just dying to get back in please consider using a federated social network to get your message out.

>What's federated social network

Also known as distrusted social network are a service that are spread across different providers, similar to an email. They all speak the same language, but not everyone is playing in the same sandbox.

>Why use Federated social media?

If you must use a social media platform these are the best way to have privacy. Some if you use another provider, but complete privacy on your end if you choose to host your own node.

[h1]Federated Projects[/h]
GNU social
>For more
R: 3 / I: 0

Physical Pentesting

Alright /cyb/, I'm interested in becoming a physical pentester. Ive seen some interesting talks about it and it seems like an amazing job.
However it is hard to find resources on this kind of thing, and expecially for the UK. Ive seen countless of "common keys" for the US but none for Britland. Do you guys have any resources on this you wouldn't mind sharing? It would be greatly appreciated
R: 0 / I: 0

Sun Ultra II | retro workstations

Just got a hold of an old Sun Ultra II creator 3D workstation, with the keyboard and mouse and an extra 13w3 video card with all of the cables. Does alice know what sort of display I should get for this? It looks like there's a few Sun 13w3 monitors on ebay going for ~$300. I could use a 13w3 -> vga adapter but I kind of want a period correct monitor or at least on that matches.

Also post your retro workstations.
R: 2 / I: 1

File System Integrity Checking

I'm looking at deploying a server soon; I'm going to monitor the file system for any changes.

There is AIDE & Tripwire. I've ruled out Tripwire as it seems to be poorly maintained in favor of their commercial variant.

There are a lot of posts stating that it's best to automate the integrity checking using a cron job.

I personally see this as a risk; automating the check would mean the binary & database would need to be locally stored and/or not stored in an encrypted container.

How does alice go about monitoring changes to their system?
R: 21 / I: 2


Maybe we've had this thread a million times and I'm sorry if so, but I promise I'm not trying to slide. I kind of came to this epiphany that all this anonymity and security I've spent the past half decade absorbed into is a colossal waste of time. I've never been able to convince people to use free software or encrypted communications, thus everything I work for for my own privacy is completely ruined by them. Not to mention that if anyone wanted to monitor me, they could probably get through whatever defenses I put up, Google tracks your location by using cellphone towers. I'm not perfect myself; I can't be like Stallman.

Overall, I've realized that friends and family and just general relationships are the only thing that matter in this world, and I've been pushing them away over this illusion of safety I've made for myself.

I think I just want to give up on it all lainons. I just want to be normal. I'm turning location on on my phone.
R: 4 / I: 0

real life human instrumentality project

gosh, i wish i was just as crazy as the tsuki people so i could actually make this happen
R: 61 / I: 1

First steps to anonymity and security

Hello Lain,
I think it would be a good idea to have a thread where you help other versions of lain by telling them what things are important to stay anonymous in the wired, and how it is possible to regain anonymity. I at the very least would be grateful for pointers, since I have recently realized how terribly compromised I am and I am desperate to better my situation.
I myself do not have much to offer, I only know that you can:
1. Use VPNs and proxies, and Tor, to hide your location
2. Not link your online presences together
3. Behave in chaotic manners so as to make patterns in your behaviour more obfuscated
I am especially interested in manners to counteract compromised anonymity.
Delete this post and point me to another if it has already been done, or you deem it too low quality.
Thank you and I hope you can help me, Lain.
R: 11 / I: 0

Writing in patterns

When we write we produce trackable patterns. These patterns can be used to track individuals across platforms, and across identities.

How does Alice protect herself from being tracked in this manner online? Are there any software tools she uses to alter her sentances?
R: 27 / I: 5
Notification addiction, wasting whole days (and nights) on the internet and putting more time into your online persona instead of self-improvement are among the worst ills of our time.
How to fix this?
R: 28 / I: 5

What is Cyberpunk?

Cyberpunk is where science and technology meets society
What exactly is cyberpunk? The question seems to be continuously resurrected in cyberpunk communities without ever coming to a conclusion as to a definition. What is the point of this topic then? While it is true that cyberpunk may mean different things to different people, there certainly is a common thread. That then is what we're after.

Cyberpunk is “low life, high tech”
The very word cyberpunk is itself a portmanteau of cybernetics, the science and technology of the system, and punk, the philosophy of rebellion against the system. Where the system intends for order, cyberpunks frequently make disorder; as they say, “the street will find its own use for things.” To understand the movement we must look past the black-and-white to see the modern world in its true shades of grey as the lines between natural and artificial, organic and mechanical, and real and virtual continue to blur.

Cyberpunk is an attitude
There seems to be a common attitude or philosophy among those attracted to cyberpunk. They often find themselves caught in the romantic struggle between themselves and the system. For some this manifests in an interest—sometimes even an obsession—with privacy and security, both online and offline. The cyberpunk notices that the world is heading in the wrong direction as the wealthy are becoming more powerful while the poor are becoming helpless, working more and earning less. As disparities grow wider, their tactics become more desperate: using the tools of the system against the system. When pushed they feel free to use anything and everything at their disposal: including hacking, deception, and intrusion. Do not fuck with us.

Cyberpunk is an awareness
In a world saturated with violently accelerating change, the cyberpunk must find herself armed with a sharp awareness of what is going on around her. Most seem to be apathetic about the philosophical implications of the uncanny technologies of the near future as the existential issues invoked by artificial intelligence, transhumanism, and the technological singularity continue to evade our collective consciousness. Advances in biological and information technologies are already radically changing our lives, but will likely only become more coercive and invasive in the future, especially with the birth of the cybernetic organism and brain–computer interface. While these technologies are not inherently malign, we would rather not see what happens when they are exclusively in the hands of the corporate elite.

Cyberpunk is a subculture
Perhaps the most clandestine aspect of cyberpunk is the ethereal subculture of hackers, phreaks, netrunners, ravers, and razor girls. It is androgynous, sophisticated, and futuristic. It cannot be restrained as it has slipped through the cracks and is now lost in the delicate balance between the analog and digital worlds, avoiding both the attention and oppression of the system. With the rise of a ubiquitous internet, “cyberculture” has begun to permeate throughout the popular culture of modern society. Meanwhile the cyberpunk subculture remains somewhat underground, though where one ends and the other begins is often difficult to discern.

Cyberpunk is a subgenre
The most accessible aspect of cyberpunk is the literary subgenre of science fiction that features a dark and gritty, yet painfully realistic vision of our near future. It essentially takes active social trends and pushes them to their logical extremes. The megacorporation now dominates as the primary influence of society, which brings about an aggregation of wealth, acceleration of environmental decay, and expansion of Asian popular culture. Urbanization sprawls as people flock to the cities, drugs and crime offer most one’s best hope of achieving happiness, and the line between human and machine begins to fade away. This culminates in the “city lights at night” aesthetic present in much of cyberpunk art. While some may enjoy—perhaps even fetish—the dystopian world presented in cyberpunk literature, most are anticipating the resistance against it. For some this fight has already begun.
R: 5 / I: 0

Wireless Hacking

Any one knows good resources on cracking wireless password without bruteforce(beginner friendly)? I want somewhat up to date and reliable resource so duck-ing it on the net isnt working
R: 42 / I: 2

Private browser

What's the best browser that respects privacy? I feel like every browser has glaring issues. Chrome is a botnet, Firefox lags on my laptop with the quantum update and waterfox has terrible performance. I've been using Iridium which is a modified version of Chrome for privacy, but there haven't been any updates so I think the project is dead like ungoogled chromium, which is more or less the same thing.
R: 14 / I: 4
Why are you so nervous about your freedoms and your privacy, Arisu? I see so much struggle around these parts, trying to become aware of the corporate-state thing clutching your throats, and then doing something helpless about it, some kind of obscurity or form of hiding.

These adversaries aren't really that big, and the means to some end you protect are just means to some end. Do you even know or have that end? When was the last time you've been empty? Did you forget what the world looks like then?
R: 2 / I: 0

I have repeatedly heard that it gets boring after the novelty passes, mainly because not enough good games are being designed for the rift. I have a useless 3D tv and I'm not going to buy something again if people aren't already developing for it. I'm not paying $400 so I can play glorified second life with teenaged Ugandan Knuckles.
R: 22 / I: 2
so you hate the faceless corporations that research and develop new technologies to further advance their greedy goals. but at the same time you also enjoy technologies and use it daily. the way I see it your "struggle" is a pointless one. because you and the corporations both love technologies. though you may hate how they use the technologies you must realize that you are like the person who hates slaughterhouse but enjoys eating excessive amounts of meat.

to struggle pointlessly like this only shows how dumb you are. though you like to fancy yourself as a sophisticated individual seeking technical knowledge you are unwillingly or willingly contributing to the very evil that you so hate.

now that you have realized the truth of the matter why would you still hate the technocrats? After all you're all the same.
R: 5 / I: 2
I think agriculture was the biggest mistake humans have ever made. Agriculture turned human into destructive cancer. If we look back in history we can see that in the Middle East the cradle of civilization where agriculture was practiced on a large scale we now see a wasteland. Seeing as we are abusing the Earth on a scale never seen before we will die because of our selfish action. There will be no deus ex machina to save us.

Agricultural society is the seed that produced our current illness. Disgusting cancer we are.
R: 20 / I: 5

The Scene

I have always been curious about the scene and the topsites.

It seems like these guys are just bunch of reverse engineers with some cybersec background since most of them are able to operate for a long time without getting in trouble. And I know that they don't quite like the P2P environment.

Back in and late 90s and early 2000s there were some interest in the media regarding the scene then the interest shifted more towards the black hats, APTs etc. where there usually is some kind of a financial/political fallout afterwards.
R: 22 / I: 4

Cyberpunk Game


I'm currently making a sidescrolling action/rpg game.
Currently working on the gameplay/mechanical elements of the game.

Right now, the platforming elements are solid, but I'm looking to add more features/unlocks/abilities that would allow the character to progress through the game differently.

What GAMEPLAY elements of Cyberpunk would you love to see in a game?
Please read through the replies before making your own suggestion.

I'm gonna try to check here again later, but the main thread is at:
R: 3 / I: 0

Fare avoidance/Mifare cracking


This looks like it would be a topic of interest to Arisu. I've recently learned that many of the fare cards can often be altered to one's desire.Using software like mfoc or mfcuk you can change data on an insecure Mifare Classic card.In other words you can give yourself unlimited rides on transit.I recently bought some hardware that would support this for under 10 USD, and even if it does not end up working on my city's transit I'd like to use it for plenty of other projects I've heard of online.What does Arisu think of this?

I'd also like to note that the system in my city has tracking to some degree(not Orca).It supposedly has a theft prevention feature and a feature to track your balance online which I've seen 0 reviews of online(In one of the biggest cities in the USA(odd)).These features can only be used once you have done some sort of sign up or have called the city for a pass to get your balance.I thought of a way to see if they are tracking you but I'm not sure it would work or if my previous statements already answer that.I will elaborate.

>When you sign up you get option to pay a scheduled fee

>the ammount added to the card is not shown until you tap, which means a userid is involved(should be changed to something random).
>these funds may not be available for 24-48 hours after online payment(serious lag(maybe))
now the ideas:
>reload using compatable hardware
>tap a machine
>check online and see if it's reloaded if yes -> (reafirms userid theory)
>reload at a machine and check before next tap (tells me that the reload stations do not have internet connection) -> which would mean there is no way to tell if I or a valid machine reloaded the card
>get a new card and test one with a sign up and one not with to find out if any new identification(tracking) is created for sign up card.
If all goes well: charge with a very large amount -> change userid(no tracking(maybe)) ->profit?
*I got the pdf online and I don't know how safe it is opening it :/
R: 27 / I: 5
humble bundle is currently hosting a bundle of cybersecurity softwares

is it worth buying into it or it's all trash ?
R: 17 / I: 3

The Circle of HOPE

Who is going to HOPE this Summer? We can have a coffee, talk about the revolution and stuff. Regardless of what we do we will have a good time and I will be representing arisuchan.
R: 13 / I: 1


Does anyone want to team up for HTB labs?
I couldn't find any people who are interested in this.
So if someone wants, please reply to this thread

R: 14 / I: 3

Retro Cellphone Hacking

Back when smartphones were not a thing, what phone would you use for all your portable hacking needs Alice? Ive been looking to get some retro cell phone to toy around with and for emergencies. what do you recommend?
R: 0 / I: 0

Hacking Conference Stream

Watching a stream from HOPE in Manhattan. Figured I'd share it. Does anyone have any favorite gamedesign/penetration testing/ software talk videos they want to recommend?

Schedule -
R: 16 / I: 1

I'd like to try my hand at hacking my college.

Greetings, so in the first year our Networks teacher told us that if we could pull off a hacking stunt on their network he would reward us greatly. What could I learn, search and apply practically in order to gain some better knowledge on netsec and hacking? What specs should I know from their network, to take advantage?

My experience so far is on C, Python and anything network architecture related. I'm mostly looking for practical ideas and actions I could do to become able to apply anything, as long as I get to learn new stuff, and potentially fuck a bit with my teacher.
R: 67 / I: 13

/cyb/ Police Stories

Ever had any run ins with the po-po in your life? I'll start.

>Taking photographs of dilapidated shopping mall. Doing nothing illegal whatsoever.

Rent-a-cop shows up and starts in with the "you can't be here, this is private property." It's a parking lot, so I move a good distance away, far enough that my feet are planted firmly on the sidewalk.

>Sirens, hear police in the distance. Think it's very distant at first, gets closer and closer.

They pull up.

>"Hey officer, is there a problem?"

>"Yes Lain. Were you trespassing on private property?"
>"No sir, I was standing in the parking lot taking photographs from a safe distance away."
>"You need to leave. This is private property and you can't be here."
>"I'm on the sidewalk."
>"There's no arguments here. You need to leave."

I bail for a bit but still take photographs from a distance, halfway across the street. Cop circles around in car and drives real close, puts on sirens to spook me.

I get spooked and leave.
R: 11 / I: 1

Black Out Plan

In the past we have seen governments blocking WhatsApp, DNS, or even IPFS like in Spain just recently. Now, imagine there are protests in your country right now and your brilliant leader decides to go full retard. Do you have a plan in case things go down? One you can reach without working internet? You cannot google things if google is unreachable. We should think about this before it happens.

So I'm asking:
Is there some kind of list I can save offline with common alternatives? Like DNS Servers, distributed Messengers (iirc they used FireChat in Turkey) etc. in case things go down? I'd like to be prepated even if it is just for Arisuchan and YouPorn.

If this does not exist I propose we make our own and include it in the next zine.
R: 18 / I: 1
Hey Alice, what do you think about CD Projekt Red's Cyberpunk 2077? I think it looks quite promising. And with it having actual sunlight in it unlike all the other cyberpunk games that take place exclusively in the dark i think it will be a bit more realistic. Design-wise it looks quite nice.
R: 8 / I: 1


I want to begin learning how to crack. I now there was a site called crackmes but it is gone now and there is a catalogue of all the sample problems. Does anyone know of any similar sites or resources available to begin my journey?
R: 2 / I: 0

Like /z/ (remember /z/?) but cyberpunk

I don't know Spanish but after a quick machine translation it seems it's themed around Nick Land.
R: 7 / I: 0
How does one cope with living in an increasingly dystopian cyber nightmare and go about daily life successfully while daily observing more and more of the signs that "crazy science fiction" comic books have been warning us about for most of our lives coming to pass and knowing that there is no escape from this planet and that every day as you step from the past into the future it will only be more of the same and there is nothing you or any of your ilk can do about it?
R: 19 / I: 2
Hey /cyb/, has anyone else received loaned company laptops before and found spyware or other surveillance processes installed by your own company? I recently got mine and I'm wondering what the possibilities are.
R: 6 / I: 2

Kioptrix lvl 1

Anyone here pentest?

I'm working on Kioptirx lvl1 VM…

> nmap -sn $targetip

has shown a few open ports, one of them being 80
> Open browser to view page, Apache webapp running on port 80
> nikto -host &targetip -port 80
Shows that Apache service is out of date

My question is how to progress from here in order to get a reverse shell? My thoughts are to hop on exploitDB to get the appropriate script. Not looking for answers just want to see what's out there.

pic related
R: 11 / I: 3

is May policy update month?

got lots May mail about policy update
can arisu verify?
R: 30 / I: 6

Google Chrome - Botnet?

Hey Alice,

I have taken the time to read the Board Guidelines ( and under "Please use a browser that respects your privacy and security" it says that "Google Chrome is literally a botnet".
After a bit of digging I was unable to find trustworthy information that confirms this. Sure, Chrome wants the ability to auto-update itself whenever it likes without any action by the user, is not fully open source and is made by Google, one of the biggest companies in the world. But having the ability to be a botnet doesn't mean that it actually is a botnet.
Can you give me a source on this?

I should add that I personally use Firefox, Google already has way too much data about me. I do not want to add even more by using their browser.
R: 24 / I: 5
I was listening to atari teenage riot yesterday, as one does, and decided to go check out what alec empire has been up to and maybe purchase a record from him if possible. Anyway, that's not the point; what i found out is that a) he has created an atari teenage riot imageboard(!) and b) it's literally populated entirely by three spambots, one of which posts links and the other two presumably reply with what seem to be posts culled from the comments sections of random blogs. It's kind of a remarkable collage of net content

It's located at, and I encourage the reader to "look but don't touch" unless you have something similarly cool to contribute
R: 14 / I: 0

stuff against social networks

So me and a friend (hi miek if you're out there) are going to do a course in his school about the evilness of social networks, their habit to fuck you in the ass when it comes to privacy and the fact they are a filthy instrument of da Capital to control the masses.
Basically we need stories, data, single episodes of privacy violations to use as an example, statistic and maybe some articles about political influences and market mechanics behind social networks.
Do any of you lains have some interesting links to share?
This thread should be more or less like the fuckfacebook one but less specific and more elaborated.
Thanks in andvance to everyone.
R: 10 / I: 1

le memes

hey guise i was looking for a way to bypass audible membership. For example, disposable adresses.
Either way i am accepting knowledge of any free audiobook services of any language
R: 6 / I: 0

Mesh Networking and File Sharing

What's Alice's experience with mesh networking and file sharing technology? I hvae been considering trying to make a network of Raspberry Pis that host access points to a single mesh network, primarily for file upload and retrieval that allows for propagation of files to the other nodes on the network.
R: 15 / I: 1

Which means of communication for direct action?

Ok so, let's say there is a group of people wanting to squat places and similar stuff, there is a secure way to communicate other than irl?
And if the group is big and there are tech illiterates, how much that shrinks the array of options?
I was thinking that maybe Signal would be the best way, what does lain thinks about it? And also, it's ok to install it from google play or an APK is better?
R: 63 / I: 8

Deleting Facebook

Do any other lainons have a Facebook account? I want to start getting rid of my digital footprint but I find Facebook to be too invaluable to get rid of.
R: 14 / I: 0

Startpage vs Duckduckgo

Used to search with DDG, now use Startpage because it comes with a proxy option. Basically, when you connect to a site using the proxy option, Startpage retrieves the site and shows it for you, so your IP is never revealed to the site, and the proxy extends to other links you click on. Pages take longer to load and some things break because JavaScript is blocked, but I think that's a reasonable price to pay for anonymity.
R: 2 / I: 0

WebAppSec Lesson: SSRF

Hi Alice,

I'm here today to talk about Server-Side Request Forgery (SSRF). SSRF occurs when a web application contains some functionality where the application makes an outbound request which the attacker controls the destination to. This can vary from banner grabs to full HTTP requests. An interesting example is a researcher pivoting into NIPRNET via SSRF:

The impact of SSRF is contextual, but potentially being able to pivot into an internal network, unreachable from the internet, opens up a whole new attack surface.

There is a longer article about it here:

(Use Tor if you want to follow along)
However, examples are always best. Let's use a googledork like the following: "inurl:proxy ext:php "miniproxy""

Miniproxy ( is a PHP proxy that is vulnerable to SSRF out of the box.

From the first page of Google, we see two Miniproxy instances:

To test for SSRF, let's input a value such as 'http://localhost/server-status'. Apache's mod_status ( provides a useful page that lists some server details, plus all HTTP requests to the server. Very often, sensitive information is disclosed by GET requests within Apache's server-status. While this page is normally inaccessible from the internet, we are able to exploit SSRF to issue the request from the webserver itself and return the content, bypassing this restriction:

Googledorks will reveal plenty of other examples of SSRF live on the internet that you can practice on. Enjoy the ability to view otherwise inaccessible resources and endpoints on a machine's internal network. Hope you're enjoyed this short lesson Alice.
R: 13 / I: 2

RATting an entire WalMart

Okay, hear me out. How easy would it be to hypothetically inject a RAT into the internal network of a branch of a department store or supermarket like WalMart or Best Buy? What could be hypothetically done with this botnet?
R: 123 / I: 8
I know cyberpunk normally carries themes of corporate overreach and control, but everyone on sites with a theme like this seem to be shockingly open to the government doing the exact same thing. Big Brother is a hell of a lot scarier than any megacorp dystopia, if you ask me.

Is everyone just role-playing to be "cyberpunk" or do they legitimately believe universal Healthcare and income programs actually work?
R: 7 / I: 3

Last vpn thread, I swear.

Does anyone have or can link me to something that makes a .gif of the robot guy in GitS typing really fast?

Also, I'm about to probably purchase a VPN for using certain services blocked by my school's firewall.
I just need someone that is going to have a robust server configuration so I don't get handed over to interpol if I accidentally break some strange infraction that they create in the name of net neutrality.

New to arisuchan, be gentle.

pic is what im going to probably use as my bios screen
R: 7 / I: 0

Wearable Computing

Wearable computing is the study or practice of inventing, designing, building, or using miniature body-borne computational and sensory devices. Wearable computers may be worn under, over, or in clothing, or may also be themselves clothes
R: 3 / I: 1
Do any of you knows were to find a subtitle track that covers only the japanese-written panels in Lain? I like my language's dubbing, but without subtitles i can't read all of those parts.
R: 0 / I: 0

Neuralink Singularity

1. Elon Musk creates Neuralink to build brain-computer interfaces
2. AI programs augment the brain-computer abilities
3. Humans achieve singularity and evolve into a new species (becoming lain)
R: 21 / I: 2

/Unauthorized Access General/

/Unauthorized Access General/

So Lains, Unauthorized Access? Its the fastest way to access onsite systems and computers. As well as cool gear.

What to wear.
High Visibility clothing, or what ever work-wear is normal where you're.
Embroidered vests/shirts/paints all can be found at Recycling shops, valuable as hell.
Check parking areas near work sites, you can sometimes find some stuff employees wont let go of easily, head-wear mostly, but rarely someone will drop an ID Card.

Act like you belong, being in high Visibility or work-wear makes you almost invisible, an irony so sharp it can kill.
Not many sites to help with this. Reddits the best I got. Relax and act like you should be there, remember to read up on social engineering and other concepts.

Remember, get in, get out, don't come back.

Anyone done much of it? Got any tips or ideas for others? Comments or changes to the above?
R: 0 / I: 0

Palantir Using New Orleans to Test Predictive Policing Technology
https://www.theverge. com/2018/2/27/17054740/palantir-predictive-policing-tool-new-orleans-nopd

>In May and June 2013, when New Orleans’ murder rate was the sixth-highest in the United States, the Orleans Parish district attorney handed down two landmark racketeering indictments against dozens of men accused of membership in two violent Central City drug trafficking gangs, 3NG and the 110ers. Members of both gangs stood accused of committing 25 murders as well as several attempted killings and armed robberies.

Are we Minority Report yet?
R: 25 / I: 3

Looking for temporary /cyb/security lead.

I'm not sure when I'm bringing back the Friday night /cyb/security meetup. If anyone would like to pick it up for me, go ahead. I've been really busy as of late with school and I'm horrible with time management, so Fridays and the weekend end up being for things I procrastinated on.

Please join the IRC (#arisuchan on and PM me, onikuma, if you'd like to run it temporarily until I can sort out my school work and life responsibilities.
R: 3 / I: 2

Advanced Intel

Does anyone have any information on this store:

It seems to have a lot of cool stuff, but the change in format of the site makes it seem like a scam. Also, what is Alice's opinion on "spy" stuff.
R: 19 / I: 4

Synthetical Science

Synthetical Science is one of the first networks of network researchers that emerged in 2010. This group of nettalkers was looking for hidden files in the secret Internet segments, but the main field of Synthetical Science was "memetics," the study and creation of "mental viruses." More about memetics is written in John Ono's book "Tao of memetic engineering". The association ceased to exist in 2012.
R: 5 / I: 1
Hello! I learned about how tor works and im sure that its a piece of soykaf. Im dreaming about creating my own net based on RSA and PGP. I made some code and specifications but there are one problem. How computers will connect to each other? Im thinking about stealing ideas from torrent technology. VPN technology doesnt suit to my idea. I want to make full dezentralizated net with reputation system. What do you think? What technology i should use to connect a lot of computers without servers to one network? Im good at Cryptography, but bad at networks
R: 16 / I: 1

modern day hackback tutorial?

good day lains. I was wondering about this
and thinking, what would the setup he recommends look like with modern-day technology? obviously, we should replace trucrypt with veracrypt. In addition to that, most of the tools he gives will have to be replaced as they deal with specific versions of vulnerable software. what else must we do to modernize HackBack?
R: 2 / I: 1

Keep the Future unwritten!

Ohai Lainons,
i want to talk with you about how capitalism reinforces itselfs through the power of technology and cybernetics, how it will change society, what the impact will be and what can we do about.

At first i want to share some readings:
Tiqqun aka The Invisible Comitee "The Cybernetic Hypothesis"
Capulcu "Disconnect"
Joseph Weizenbaum "Computer Power and Human Reason: From Judgment To Calculation"

Plug and Pray Documentary
Rebel at Work (english subtitles)
R: 4 / I: 1

Reconfigured browser, Google doesn't work

I was reconfiguring Firefox after getting a new computer, and suddenly I can't get on Google anymore. I've checked to see that I'm accepting cookies, but I'm still unable to sign in—as in, the "Sign In" button doesn't even do anything.

The only thing I did specifically to Google in about:config was getting rid of error reports. I didn't think it'd break everything.

Sorry if this isn't the right place to post. I've searched around the wired already for answers but got nothing.
R: 3 / I: 1

[PDF] Understanding and Using C Pointers Core Techniques for Memory Management

>Improve your programming through a solid understanding of C pointers and memory management. With this practical book, you’ll learn how pointers provide the mechanism to dynamically manipulate memory, enhance support for data structures, and enable access to hardware. Author Richard Reese shows you how to use pointers with arrays, strings, structures, and functions, using memory models throughout the book.
R: 5 / I: 1
enjoy US citizens
btw if they can get drugs and soykaf across the border how about paying off someone to bring your encrypted HDD or SSD across.Seems better than handing it over to feds unless it's taken and they find your finger prints all over it.I'm only saying all this if you happen to have something that could get you put away for a long time otherwise just bend over when they tell you…. right?
R: 4 / I: 2

MIT 6.858 Computer Systems Security, Fall 2014

>6.858 Computer Systems Security is a class about the design and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and techniques for achieving security, based on recent research papers. Topics include operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware security, and security in web applications.
R: 18 / I: 2

tox chat

Tox is a decentralized encrypted alternative to skype developed by chan users for chan users. It supports text, audio, video, and group chats.

Come join Club Cyberia toxs largest group chat. You can get invited to the group chat by adding lainbot the friendly club cyberia group bot. Lainbots ID is:


You will need to install a tox client. qtox is the recommended option but there are a variety of clients such as toxic for cli users.

Download links can be found on the description page at "". Binaries are provided for Windows, OSX, and Linux. You can also build it yourself if you are feeling adventurous.

Once you add lainbot as a friend just type "invite 0" to get a invitation. You can also type "help" for more options.
lainbot should automatically send you an invitation when you start tox.

WARNING: Tox is a peer to peer program without servers just like torrents. This means that your friends on Tox can see your IP. If you are worried about this you need to use Tor. Luckily Tox has easy Tor integration, just go into your settings and setup the SOCKS5 proxy for anonymous chatting.
R: 0 / I: 0

RFID Hacking

Let's discuss hacking or general usage of devices in the RFID range, including standard identification cards, NFC/13.56mhz tags, and NDEF.
R: 49 / I: 12

Trouble #8: Hack the System

Hey Arisu, do you watch Trouble? It's a monthly show made by submedia, the same guys who used to make stimulator's ITEOTWAWKIAIFF. Unlike that show Trouble is not about recent events but every episode is centered about a single topic.

The most recent episode was about hacking, they interviewed all kind of interesting people, including Jeremy Hammond. It's aimed at people who don't know much about the topic but are politically active, so it's a bit basic but for that purpose I found it very good. What do you think about it?

If you have not seen it, here you can watch it:

Some older episodes very also pretty /cyb/, like #5 which was about surveillance, but unlike most other resources on the topic it did not ignore the problem of snitches and informants. Episode #6 on counter-insurgency was also very good, and I also liked #7 which is about community organized disaster relief.
R: 21 / I: 5


What do you think of WikiLeaks, it seems like a good thing that helps keep people informed and helps keep tabs on governments, due one might see it as being far from separate from the agendas of governments considering WikiLeaks suppose lack of whistleblowing on Russia .

Do think there needs to be a alternative to WikiLeaks, it might be a good idea for something like that to be made since Julian Assange might end up tainting the project, considering the rape allegations.
R: 8 / I: 1
welp, not too long untill they put a machine gun on it
R: 4 / I: 1


Hey guys, a few of the smaller cyberpunk communities are doing a thing this year, figured you chummers might want in.

Long story short, just going to be flooding the #cyberpunkmonday hashtag with cyberpunk talk. With /cyber/ practically dead, could be a chance to reconnect the community a lil.

See you guys there.
R: 96 / I: 18

Net Neutrality

In USA they're trying to take down Net Neutrality.

I'm personally horrified, i'm thinking that probably arisuchan wouldn't be a reality without NN, and that for people like the most of us who doesn't really care about social networks, netflix, and other corporate mass surveillance tools, this is going to be a disaster.
Fortunately in Europe there is still an article about NN in the constitution, but Europe is almost an american colony since the end of USSR, so probably they'll find a way to avoid it and take down NN in the Old Continent too.

What do you think about that, lain?
Are you in favor or against Net Neutrality?
And if you are in favor as you probably are, what can we do to fight for it?
R: 2 / I: 0

The Technological Attack

I want to share some translated textes from a german collective which is working on a new social/technological critique. I´m very interested in a discussion about the toughts mentioned and how you see the future. Most interesting would be how resistance could work in a digitalized society.

Disconnect – Keep the future unwritten

Also interesting:
From Karoshi to Surplus – Future of labour and non-labour

facebook the conqueror – the neocolonial side of the technological attack
R: 16 / I: 2


I think insomnia is pretty /cyb/ stuff.
Do you suffer from it?
How do you deal with it?
How do you spend your innecesarily awake time?

also obviously this post was made during one of that nights
R: 16 / I: 0

Virtual Reality Spaces

There was a thread on Applechan before the wipe about making a comfy /cyb/ space for VR.
We should have a thread about this.

High Fidelity -
JanusVR -
Decentraland -
R: 4 / I: 0
Hey alice, I'm going to be graduating from a US university in CS soon.
I'm kind of at a loss on what to do now.
What do you guys think I should do with my degree once I'm out of school?
Any companies that aren't soykaf, or any jobs that are interesting?
R: 6 / I: 0
how do i stop wasting time /cyb/, help me plz
R: 5 / I: 0


Decentralized YouTube
R: 24 / I: 1
What does Alice think about the underground group trying to set up Guerrilla ISP's

The general arguement is that net neutrality is more of a patch to a problem, rather than the solution. The real solution is creating a underground ISP similar to /g/'s internet and what they have in Cuba
R: 11 / I: 1

Private Internet Access is trash

Just a reminder - If you're not using thatoneprivacyguy's list as your criteria for selecting a VPN you're probably getting your info from a shill. 99% of the comparison lists on the internet are paid advertising.
R: 3 / I: 0

Intel CSME accessed via the USB DCI interface for JTAG debugging.

Intel CSME gets sent to the shadow realm.

With this information, what are some speculations you have? Without anymore details I don't think we can form anything solid from this information, but something I do hope for is the removal of the Intel Management Engine, which is essentially a malicious processor that is built within almost all Intel CPUs from 2008 and onward, which is why you find many enthusiasts using hardware that can be librebooted or at least corebooted. The latter usually works with these new CPUs but cannot remove the Intel ME, while coreboot is 100% free.

The current worrying piece of information that comes along with is the now opened attack vector, although the attacker would need a machine with USB DCI enabled and have access to it physically. If these requirements are met, we are now facing attacks from beneath the kernel, the lowest level you can achieve in the ring.

The veil is being lifted from Intel's hardware and I'm excited.
R: 5 / I: 0

C-Check it out…
R: 33 / I: 5
I'm too lazy to be properly /cyb/. I love the culture, I love the ideas. It's important to me to be more silent, more secure, and more hacky. But it's a whole lot of work to learn a programming language or a new OS. It takes precious time, energy, and focus to make something new. I'm standing at the bottom of a mountain looking up, and it looks high and the fall looks painful.

What do?
R: 34 / I: 1

Noob here. Asking for info

so i was invited here by one of the mods on discord. I know the basics of using a computer and have started avoiding using anything google related by reading threads here. Idk gow to code, change os (i can only afford a cheap acer laptop for now), or how to vpn. Any and all info would be appreciated
R: 4 / I: 1

DHS Wants Tech to Scan Your Face as You Drive to Mexico

>The Homeland Security Department wants technology that can passively scan the faces of foreign nationals crossing the U.S. border by car, ensuring that the individuals who enter the country are the same ones who leave it.

>DHS’ Silicon Valley outpost is hosting an industry day Nov. 14 to solicit solutions that would let Customs and Border Protection scan people’s faces, even if they’re wearing sunglasses, hats or are looking away from the camera, without requiring them to slow down or exit the car.
R: 3 / I: 0

Chaos Crypto

Hey Lain/Alice,
been lurking here for a while and thought it was time to post something.

I have some background in crypto, and have been doing research in the area when I started looking up chaos theory (dynamical systems.)
I thought that would be great for PRNG's and eventually came across chaos based cryptography.

Based off of the papers I've read: I gathered that it's promising, but no-one has been able to generate strong primitives using chaos .

What do you guys think about applications of chaos theory in cryptography/ology/analysis and steganography/etc?
R: 3 / I: 0
what are some /cyb/ approved sites, clearnet or darknet?
R: 19 / I: 3

Everyday Propaganda

This was on the back of a normal milk carton here in Sweden.
A rough translation:

AnonymX - A dilemma online

Samir sees an entry from anonymx that blames Levian in class for being a thief. Samir believes to know who AnonymX is. He also knows that Levian has long been bullied by that person. Samir wants to do something to help Levian. What can he do?

Take screenshots as evidence - and show the post for someone else who can certify what happened.
Make a post, saying that AnonymX is wrong and ask his friends to share it.
Talk to a teacher or school teacher.
Talk to AnonymX directly and tell them to quit.
Talk to the neighbor who is a police officer.

All options are possible. do you have any other ideas?
What's happening online is just as important to talk about as anything else you've been doing during the day. At and @merhjarta there are good tips and advice.

This appears to be an interesting moral dilemma, but we're given no suggestion that Levian could be a thief or that AnonymX is not who Samir thinks it is; the default position is that "whistleblowing" is a form of bullying and "good" people report such behavior.

The cartoon-ish graphics will be especially appealing to easily influenced children and adolescents.

Perhaps also worth noting that in Sweden, there's basically only one brand of milk (Arla), and it's sold in all shops.
R: 2 / I: 0
> Pros & Cons of having a Raspberry Pi (2/3 or zero/w) in the street. Hidden and plugged. Connected to ("borrowed") wireless network or using SIM 3G/4G data plan.
>>Just looking for interesting ideas @_ @

+ Unrelated-to-you server

- Can be lost
- Have to think about weather if its outside. Can be hard to hide. (solved with some customized box or kinda)
R: 2 / I: 0

Physical Security

What are some good USB physical devices? In the same vein as the yubikey, nitrokey etc?
R: 27 / I: 3

Free speech:

A lot of people commonly conceive free speech simply as the right essentially for everyone to say one's view, in any space without restriction, that there be no private spaces.

Now that conception of free speech is very intuitive and understandable, since one of the important and valuable thing about free speech is that no authority or value is free from criticism .
But i feel it is a incomplete conception, it's not so much that it's wrong, but that it is too simple, abstract and while it is intuitive, it leads to very counter intuitive conclusions.

The state of affairs where anyone can say anything in any space sounds desirable, but leads to a situation where most dissent and minority voices are drowned out so to speak in a constant static unable to productively make there voice heard , the voices that come to be heard will inevitably be the ones that appeal to the lowest common denominator and prejudices of largest blocs of opinion. In a space like this free speech will not last for long, those not of the monopoly opinion will either give up out of frustration or be hounded out.

Am i saying that theses spaces should not exist or that there useless? No, am simply saying is that are common conception is not enough, we need to develop it to be more concrete and nuanced. The kind of spaces where anyone can express there views are important and should be defended but there not the whole story.

The right to free speech should not JUST be the right to say one's view, but for everyone to be able to express there views in a way that is productive and let's even dissent and minority views be heard.
Along with the spaces where everyone can express there view there should exist spaces of expression that belong to all views where people of that view can express there view without being drowned out and can talk about it in space where with others of that view without fear of coercion.

These two kind of spaces where views are expressed need each other, without the other your either get a situation where no dissent or minority views is heard and on the other hand you get a situation where everyone is just stays in there own little holes.

Free speech is a careful balance of these two spaces.
R: 17 / I: 2

AI Poisoning

So Lains,

Do you think its possible to poison the AI's of large organizations? Rendering them not useless, but very degraded. To the point where it needs to be heavily controlled and guided?

Can Anyone of a way to do this? Tay was a great example of poisoning an AI to the point of failure, in the end Tay was a fascist. It was a impressive failure for Microsoft even through it was a toy AI.

What attack vectors could we use?
R: 73 / I: 11

Hacking club

How would Arisu set up a hacking study group?
things like:
- Finding dedicated people who want to worth together.
- Finding a way to collab together about security related topics
- Etc.
R: 23 / I: 1

Security groups

What security groups do you belong too?

forums, mailing lists, etc
R: 8 / I: 0

CCleaner Compromised

>If you have downloaded or updated CCleaner application on your computer between 15 August and September 12 of this year from its official website, then pay attention—your computer has been compromised.

>Security researchers from Cisco Talos discovered that the download servers used by Avast to let users download the application were compromised by some unknown hackers, who replaced the original version of the software with the malicious one and distributed it to millions of users for around a month.
R: 27 / I: 6

Mark Zuckerberg 2020

>Dear Democrats, Unless You Nominate Mark Zuckerberg, Donald Trump Will Win in 2020

Looking forward to a real cyberpunk dictatorship, Lain?
R: 13 / I: 5
it's 2017, I'm a normalfag and I just watched Serial Experiments Lain for the first time. good stuff.
what now?
R: 15 / I: 1


I just got a new computer and I want to fully encrypt my HD but I don't know of any good software. What's a good one to use that doesn't have a backdoor in it?
R: 19 / I: 5


Why is almost anyone on arisuchan, lainchan, uboachan etc all so politically progressive?
I understand the desire for personal freedom and privacy, but supporting a socialist ideal is the exact opposite of that. I don't understand this.
I've come to understand that there will always be people that can monitor what i do on the internet, and all i can do is try to limit the amount of data i supply them with. I vote for parties that don't want a big government.

Cyberpunk is odd, because it desires to rise free against a society that has too much influence on its citizens, yet at the same time, I see an immense amount of people here voting for leftist ideals, also known as big government. Do you vote for a government to fight against it?
Personally I'm politically a nationalist, but software and speech should be free for all.
R: 13 / I: 0

Security tool thread

What tools do you use for hacking
I got a intercepting router that i've been messing with, what tools do you guys use?
R: 6 / I: 0

Ropemaker E-mail Exploit

>Security researchers are warning of a new, easy-to-exploit email trick that could allow an attacker to turn a seemingly benign email into a malicious one after it has already been delivered to your email inbox.

>Dubbed Ropemaker (stands for Remotely Originated Post-delivery Email Manipulation Attacks Keeping Email Risky), the trick was uncovered by Francisco Ribeiro, the researcher at email and cloud security firm Mimecast.

>A successful exploitation of the Ropemaker attack could allow an attacker to remotely modify the content of an email sent by the attacker itself, for example swapping a URL with the malicious one.

>This can be done even after the email has already been delivered to the recipient and made it through all the necessary spam and security filters, without requiring direct access to the recipient’s computer or email application, exposing hundreds of millions of desktop email client users to malicious attacks.
R: 12 / I: 3
Imagine growing up in a world of computing where your opertating system spys on everything you do, as does the government and marketers. You stick to a select few sites such as Gmail, Youtube, Facebook, Twitter, Bing, etc where you have absolutely no privacy. You can be derezzed for the least little thing. If you fuck up badly enough the police or government agents get involved and away you go to prison. You over pay for your data, soykafty low quality computers, and mobile devices. Services are a constant expense.

How did we get here? What can we do to turn things around? All this bad stuff will be normalised within the next decade.
R: 3 / I: 0
are there any comfy, active irc channels out there?
R: 38 / I: 4

digital suicide

I recently let go of some non-essential social media accounts to clear up my digital footprint and bamboozle the three-letter orgs a little, now I only post on anonymous boards. Then I saw the bigshot thread in /r/ and the digital suicide thing. It got me wondering. I think I will probably cut myself off the internet someday soon. I think it's only useful as a distraction and it's become something of an unhealthy habit on my part. Thoughts, agree/disagree?
R: 34 / I: 5
Under what conditions can one purchase an assembled in USA Lenovo laptop?
R: 37 / I: 10

merge with computers

Would you sign up for full-body cyberization if it were proven to be perfectly safe for at least 99.99% of those undergoing the procedure? Would you go even further and replace up to 97% of your brain with artificial components if you were assured that you would retain the 'neural core' of biological neurons necessary and sufficient to maintain subjective conscious experience? I'm very curious where lain would stop on the road between here and there if she would stop at all.
R: 8 / I: 1

Making a living online

Hi Lainchan

I've been struggling with something for a long time now.
I've always felt that I've had so much potential, though I have to assume my story's going to seem familiar to a lot of people on here.

I'm 20 years old, I didn't 'drop out' of highschool but I never finished, completed four years with half a credit missing and just never picked it up. Attended a local Junior College for a while taking a couple classes at a time. I realized that with my absolutely abysmal grades I'd be better off hanging onto the money, what little I actually have.

People tell me I'm intelligent, I don't necessarily agree. I feel that I just stick with something until I figure it out, I will admit I've got an impressive command of the english language but I think that just serves to further mislead people. I want to work on my own terms, doing work that interests me, likely programming or securities consulting. I just can't stick with anything long enough to learn what I need to make any money. I made it through about a third of the SICP and while I intend to finish it like most things one day I put it down and it's weeks before I pick it back up. I was diagnosed with ADD as a kid if that means anything, I haven't been medicated for it for years now.

I love the concept of keeping to myself, working when I feel like it, or when I have to to make ends meet. I don't care if it's soykaf money so long as I can keep the roof over my head and the router turned on. I'm comfortable making less, and I mean much less than my contemporaries so long as it keeps me in Ramen & Coffee. Anyone else have a similar desire / actually live like this?

On a sidenote some friends and I actually managed to get a profitable crypto mining setup going, after two months we've made $220, that's profit after paying electricity, in about two years if we keep sinking profits into new equipment and the market doesn't tank one or more of us could probably live off of the profits, as it stands it's a start.

I guess I'm a novice programmer at this point, I've dipped my toes in nearly a dozen languages far enough to understand the fundumentals like flow control, couldn't write any serious software to save my life however.
R: 3 / I: 1

Anyone else longing for a digital existence?

Forgive me, as I'm a tad drunk. Still doesn't detract from my point.

I live a mostly digital existence. I work from home doing a wide variety of CS work (DevOps, Software Dev, Web Dev, Pentesting, etc…), which means I probably spend 80% of my waking hours in front of a computer. The other 20% is spent eating, bathing/using bathroom, and shopping when necessary. I feel like most people in my situation would grow tired of screens and begin to hate this lifestyle, but I just find myself yearning for more.

What I mean is, I find myself wanting to live exclusively (as possible) online. Maybe this isn't normal, but I'm not sure that I fucking care, really. I've recently become more active in the Transhumanism movement, so my focus has really shifted towards a more virtualized lifestyle.

I want to know.. do any of you live this way? Or, at least, feel the same longing?

Thanks :)
R: 1 / I: 0

integrating ai to any apps

hey folks, who here had been successfully integrated a machine learning software to any apps? like open ai to any apps you like like some linux tools? hows that? and what ml library is best? ..and if you have some projects that finish, can you share it to me//? tnx folks
R: 29 / I: 1

Tor General

Discuss News about the Onion Router, otherwise known as TOR. You can also discuss interesting .onion sites you find

Useful Links:

Main Website for those new to TOR:

Go to a random .onion site:

Feel free to reply with interesting sites you find, Important news, or an important site I forgot to put in here.
R: 42 / I: 7

/cyb/ sites

Any other /cyb/ places you guys visit? I've been visiting this site recently just because it's a bit strange.
R: 24 / I: 2

What's with all the overly-cautious cyber-anonymity?

I've been lurking around, i see all of these articles and threads and whatnot about being like super-duper anonymous online and keeping away from all sort of data-mining or 'surveillance'. But nowhere does it explain the motivation behind it. Can you either explain this to me or link me to an explanation on why this is important?
This is coming from someone who doesn't care that his porn-bookmarks might be datamined for google-ads, someone that doesn't mind if their phone number is next to another thousand of phonenumbers because i put it on facebook so people can find me easily, i just dont see the point of going through the inconvenience of dodging all of these nets that want to know what websites i frequent the most.
R: 67 / I: 14

>The rapid proliferation of encrypted messaging by terrorist networks has prompted the Turnbull government to look at changing laws to force telecommunications and technology firms to help authorities decrypt suspect messages.

This is why we use FOSS Lains, whats next, mandatory HTTPS proxies?

What is it with Anglo States becoming Surveillance states?

>If there are encryption keys then those encryption keys have to be put at the disposal of the authorities.

Yeah Nuh Fuckhead, I'll just keep using my own keys.

>Terrorists could write their own encryption software or migrate to apps that were based in out-of-reach jurisdictions.

FOSS Illegal when? When will I be classed as a terrorist for contributing to and hosting FOSS software…

Please note these government pork-chops use Wickr to communicate and prevent the public from seeing what they says via "Freedom of Information" requests.

>Privacy for me, but not for thee.
R: 12 / I: 2

Russia bans on VPN and Tor & surveillance

As the title says, by Nov. 1 "all software and websites related to circumventing internet filtering in Russia, including VPN software, anonymizers, and instructions on how to circumvent government website blocking" will be derezzed. On 2018 "companies registered in Russia as "organizers of information dissemination", such as online messaging applications, will not be permitted to allow unidentified users".
Severs and ISP providers have this soykaf installed
Censorship is getting worse year by year, all the data is accessible without court orders
>recent amendments to the Communications Ministry's “Information Society” program aim to have 99 percent of Russian Internet traffic transferred to within the country's borders by 2020
Any russian here? What will these laws bring? What can we do to help people there?
I think a mesh network is pretty doable in Moscow.
R: 19 / I: 7

Humble Bundle Wiley Cybersecurity Bundle

Just throwing it out there. Maybe you already know. But figured I should broadcast.

Humble Bundle currently have a Wiley cybersecurity book bundle. 4 days left.
R: 35 / I: 9

Fully P2P network separate from the Internet

Read the title. Does one exist? If one does, can we build one? Do you agree that it would be the ideal anti-establishment solution for the cyberrebels of the near future?
R: 13 / I: 2

The future of technology

It seems like we are on the crux of a big change in the paradigm of computing; namely distribution is in vogue again. We have so many new technologies trying to be foundational infrastructure for the future, and I'm beginning to wonder what it will look like when/if these technologies mature. To name a few of the things I'm talking about there's cryptocurrencies/blockchain technology, ipfs, matrix, and urbit (to ignore all the decentralized social media platforms that have sprung up). These technologies all tackle different use cases, but all of them promote decentralization, open source, and user responsibility of data, in regards to both security and privacy. I'm not even taking into account other recent trends of AI research, the internet of things, biohacking or "actual" cyber-security, but thats an entirely different ball game.
My question is what happens when/if these technologies get main stream adoption. when we all have urbit accounts across all our devices to identify ourselves, communicate easily and securely over matrix, publish with ipfs and trade with cryptos? what impact will they have on society and technology at large, if any at all? id like to believe it will fundamentally change many things about the way we live and interact with technology, but am i just getting caught up in the hype? being somebody that almost exclusively uses open source (or at least tries to), im excited for open source technology to push boundaries that closed source software cant or wont go near, but will it really have any impact?
being cyberpunks we often pride ourselves on our freedom, rationality, curiosity and cooperation, so what does the world look like when these ideas become the norm? do these technologies realistically portray the ideas they say they do?
looking at it today, cryptos are by far the most mature of these technologies and already have caused a 'significant' disruption to fields historically nearly untouched by technology. we've already seen the effects its had in combination with tor and dark net markets, and now its being adopted by things like open bazaar which feature a combination of these technologies; ipfs and cryptos (which i believe also has insane social implications). however cryptos are also fundamentally the most different of the lot, where as the others seem more like pieces of the same puzzle that enable cryptos to increase their impact on society but are not fundamentally things we weren't able to do before (communication, identity, sharing through cyber-space).

im excited lain, and i dont want to have unrealistic ideas about the future, but the possibilities seem incredible.
R: 18 / I: 9

Digital Classrooms as Data Factories
>Recent “philanthropic” interest in universal pre-kindergarten, early literacy interventions and post-graduation plans (college, career, military or certifications) does not stem from some benevolent impulse. Rather it is about creating opportunities to embed digital frameworks into our education systems that reduce children’s lives to datasets. Once education is simplified as 1s and 0s, global finance will be well-positioned to speculate (gamble) on the future prospects of any given child, school, or district.

>That is what accounts for intrusive preschool assessments like TS Gold and the pressure for middle school students to complete Naviance strengths assessments. Impact investors need baseline data, growth data and “value added” data to assess ROI (return on investment). There are opportunities for profit all along this human-capital value chain. That is why end-of-year testing had to go in favor of constant, formative assessments. That is why they needed to implement VAM (Value Added Measures) and SLOs (Student Learning Objectives). These speculative markets will demand a constant influx of dynamic data. Where is this student, this class, this district compared with where they were projected to be? We need to know. Our bottom line depends on it.

Why are people not rioting against this? Is this really the future of education we want?
R: 4 / I: 1

Facial Recogition: Hype Edition

Here is a .svg of the hyperface camo. I apologize this was the first time I tried something like this and I maybe screwing it up. If I did any points would be great.
This is a link to the original thread .org/sec/res/246.html

If anyone else has some ideas please share. soykaf is scary.
Here is some spooky stuff. If you are not familiar with this video it is sort of depressing how bad it is but we can not get mopey like a bunch of cunts. Defcon: Privacy's Dead.
R: 18 / I: 1

Net Neutrality leave my Home alone

this whole Net Neutrality thing is really pissing me off and honestly if anything happens to it I think I might actually kill myself.
The INTERNET is the only place where I feel like I can truly be myself for it to be taken away from is, is to be taking my sanctuary from me.
No one quite understands me like this computer does.
If anyone has any idea of what to do if this nightmare becomes a reality is there any browser I can use to protect me and others who feel the same from this fate?
Tor can work right?
R: 29 / I: 0

Should we welcome are A.I overlords?

Should political power be invest into machines, do Humans deserve to make there own decision's after Mankind's long history of bloody war, persecution, genocide and exploitation of others?

Should the world we pass onto future generations be left to the whims of the individual or a A.I?

Aren't are own current governments noting more then a system of bureaucratic procures , checks and balances i.e a legal-political machine, our control over society is all ready a illusion, so why don't we just get rid of the illusion and let A.I's do the work?
R: 2 / I: 1

Help to notify

Could someone please notify Amy Webb that her rsync repo is totally open @
R: 14 / I: 3

Why do you have a smartphone?

What is your excuse to yourself to possess and use a smartphone?

Do you consider yourself unable to do things people ten years ago could do?
Do you consider yourself too important to not be contactable during your commute, your job, your meals, your sleep?
Do you consider yourself unable to stand a couple minutes without distraction through instant gratification?
Do you do "work" on it, and consider trading usage comfort, self-controlled platform, self-controlled storage and self-controlled software for less weight to carry in contrast to, eg., a laptop?

Do you think it's fine, because you only use it for $USECASE, and you think what you are using it for is okay even if the way most people use their smartphone is worse? Or because you use $MODEL with $SOFTWARE instead of what you think is worse?

Did you submit yourself to the system, because it's easy and comfortable and everyone else you know does it too anyway? I thought you were a cyberpunk. But only for a bit of after-work fun, probably. Or maybe you don't even want to associate with cyberpunk, you're just here because you watched some anime and have a little technical affinity. Maybe this is the wrong place for you. Or maybe it is the wrong place for me.

Why do you have a smartphone?

…or did you actually already think about this, but find yourself unable to stop? This is on purpose:
R: 1 / I: 0

if you have any questions on how to use ricochet or want to chat, feel free to add me or ask them in this thread.
R: 2 / I: 0


hi /cyb/
So I'm taking a network class and the prof wants to demonstrate how weak low end processors are by having us crack them. It's an adruino mblock bot. Our assignment is to start 'em up and hijack them. I vaguely know about bluesnarfing but I could def use some pointers here.

R: 13 / I: 0
Is there any scientific studies done on using nanotech in the bloodstream to alter brain chemistry. It is scary to imagine how a government or corporation can control thier citizens by making them feel a certain emotion under certain stimuli, such as anger when hearing a government opponent or not when seeing a company product. This could probably needs to be achieve with a botnet body modification such as eye contacts or even a prosthetic.
R: 1 / I: 0


pic not related.I'm not sure if this is the right place to post this but I can't reasonably post this in anywhere else.I'm reopening a discussion I've seen to some extent already.This is about sharing resources relating to freeganism.This can include guides(informative/instructive) on dumpster diving, squatting, eco friendly transport, other eco friendly lifestyle implementation and all that for ethical or personal reasons.I'll start by sharing where I found an introduction to freeganism:
R: 11 / I: 0


So now they are asking for social media accounts at borders to check you up

And unlike phones you can't fuck the USB port up and be done with it

What this means is that having no such accounts can make you a target for random incarceration, they'll bother to investigate if you just some nobody later

Pretty soon even cops will ask for you twatter handle

Point is I'm trying to figure out a way to counter this

The best way IMO would be to use bots to simply repost content from other social networks to give the illusion of content.

Those retards at the border wont bother to check that much into the post and even then most people just reposts stuff they stole from somebody else, even delete the watermarks to hide their asses

So, are there any existing bots that could do this? or I have to code one from nothing?
R: 12 / I: 2

Filter bubbles in brain implants

I saw this talk and it got me thinking:

Once we inevitably get brain implants, do you think people will accept filter bubbles in their brains? I would expect not, but then again most people seem fine with facebook and google's filter bubble, and when asked about it directly they don't see the issue. I don't understand this, but most people seem happy being shown only what some algorithm thinks they will "like".

So if we pull this to its logical conclusion, we're talking about filters in brain implants. Do you think that's where humanity as a whole will draw the line?
R: 10 / I: 1

raspberry pi vpn / firewalls?

is it worth it to build a physical vpn from a rasp pi?

experiences? physical firewall / vpn thread?
R: 14 / I: 1

who crypto?

What do you guys think of Monero? I've been reading about it recently and I think it's great as a almost totally (because nothing is 100%) anonymous crypto coin. Thoughts on other currencies?
R: 7 / I: 0


So amazon just went full fucking distopian: they went and got a patent to keep people from comparing prices

"The “Physical Store Online Shopping Control patent analyzes the mobile browsing of the customer and if it determines that they are visiting a competitor’s website it will redirect them in one of a few ways.
It may block access to the competitor’s site, preventing customers from viewing comparable products from rivals. It might redirect the customer to Amazon’s own site or to other, Amazon-approved sites. It might notify an Amazon salesperson to approach the customer. Or it might send the customer’s smartphone a text message, coupon or other information designed to lure the person back into Amazon’s orbit."

It begins, we already have companies actively censuring web results deemed "too controversial", now it all reaches its inevitable conclusion…
R: 7 / I: 0
Any ideas how Android/iOS devices could be infected? Is the only way to do that is the app store?
R: 25 / I: 5

I think you are using the wrong term.

You may be call crypto-anarchist, but not cyberpunk as it is a science fiction genre, not a school of thought.

What do you all think ?
R: 4 / I: 0


So looking at AIs like that Tai one from microsoft I been thinking about making a backup of myself

>wait, like that black mirror episode?

Eh, sort of, that one was a crappy product made by a company using your digital footprint which is why it was flawed. Most people's socialnet accounts are bullsoykaf and not an actual reflection of their real life or even themselves. The non-anon internet has slowly become the new "keeping up with the joneses" where normal person drones compete to see who can come up with the most impressive fake life and get their precious worthless likes/RTs/whatever pointless internet points (sure some people actually make a living off this soykaf but how many? I bet less than 0.01%)

What I want to do is different, a true digital backup of me made with an AI I will train myself rather than just use a scrapper to check for the soykaf I done online and hope for the best.

What do you all think? I also take any advice on what to use/how to do it.
R: 7 / I: 0

Advantages of your own VPS over buying a VPN?

Hey Lains,

What are the advantages, if any, of setting up a VPS for secure browsing over using a VPN provided by someone like NordVPN?
R: 13 / I: 1

linux hardening

Discussion about linux hardening.

Creating the perfect Fort Knox distro.

useful links:
R: 13 / I: 2
How do people feel about the NHS hack last week?

Was it as bad as reported?
Any Lain affected or know someone affected by it?
R: 6 / I: 2

Social Engineering

Just came across this old thread in the archive and decided it needs a comeback.

I've attached a PDF from the first post, dl'd from Does anyone have a copy of "The Art of Human Hacking"?

Also, a friend once described Dale Carnegie's "How to Win Friends and Influence People" as an important social engineering text. Is it?
R: 4 / I: 0

Bitcoin safe wallet?


In the rise of bitcoin and how to store them safely. Do any of you lains have ideas on how to approach this.

I thought about if it was possible to store my coins on a wallet that is placed on a external hdd. But what wallet to choose that is the thing. A wallet that is off the grid.
R: 5 / I: 0

Vault 7 General

Since there's no Wikileaks thread yet, I figured this could be a separate thread. Discuss Vault 7 & related topics (software security patches, best practices, other relevant leaks)

Main Documents:

Source Code :
R: 4 / I: 0


I thought lain would enjoy this. The whole thing is so fucking sinister. Don't get lost in the aesthetics though. The national security state is real and it has consequences.

A top-secret handbook takes viewers on an undercover journey to Titanpointe, the site of a hidden partnership. Narrated by Rami Malek and Michelle Williams, and based on classified NSA documents, Project X reveals the inner workings of a windowless skyscraper in downtown Manhattan.

short film by Laura Poitras

article at The Intercept
R: 2 / I: 0


Is this where /cyb/ has moved to? NICE. Why is there no more cyb on the .org lain?
R: 4 / I: 0


Looks like another one of the corporate malware makers are about to get their teeth kicked in;

Seems kinda bent that Europol can be spamming the internet with warnings that purchasing RAT's/etc can land you in jail yet if you're a big enough fish with deep enough pockets you can just waddle on up to a company like Flexispy.

On the other hand it's going to be interesting to see what the threats out in the wild start to look like with Flexispy's toybox kicked over for everyone to loot (like what's just happened with the shadowbrokers/equationgroup leaks).
R: 3 / I: 1
Why has sec gone secret? :( :s
R: 0 / I: 0

/cyb/erpunk discussion

In an effort to promote more discussion of cyberpunk activities related to anonymity, privacy, security, etc. we ask that you try to make posts that are exclusively visual in nature in one of the existing threads. If you genuinely feel your post belongs in a different category, you can still make a new topic, but we are asking you to search before posting. Thank you.