Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

SICP: Javascript Edition

Name: Anonymous 2013-09-14 14:08

Name: Anonymous 2013-09-14 14:23

GODDAMMIT YOU BEAT ME TO IT I WAS ABOUT TO REPOST IT ADKFAJSHDGFAJHSDGFJAHSGFDAJHSDGFJAHSFD

Name: Anonymous 2013-09-14 14:25

This feels like watching your favorite Touhou being raped by a gay nigger.

Name: Anonymous 2013-09-14 14:27

Because of this:
http://software.intel.com/en-us/blogs/2011/09/15/parallel-javascript
https://github.com/RiverTrail/RiverTrail/wiki
https://en.wikipedia.org/wiki/River_Trail_%28JavaScript_engine%29
http://software.intel.com/en-us/tags/18828
http://software.intel.com/en-us/blogs/2013/09/02/html-5-and-javascript
https://en.wikipedia.org/wiki/Tizen

tm;dl Intel is finally moving to the mobile market, and need to implement everything in worserer is bestest, to win the market. They will use Javascript as the level to sabotage them all.

Intel is a big donor to MIT.

Name: Anonymous 2013-09-14 14:40

The guy reponsible for implementing the TiddlyWiki page in full ``requires'' Javascript:
Martin Henz
http://www.comp.nus.edu.sg/~henz/

Blame him for everything.
You can see download all the code, but for stupid reasons he placed that requirement:
<div id="copyright">
Welcome to TiddlyWiki created by Jeremy Ruston, Copyright &copy; 2007 UnaMesa Association
</div>
<noscript>
<div id="javascriptWarning">This page requires JavaScript to function properly.<br /><br />If you are using Microsoft Internet Explorer you may need to click on the yellow bar above and select 'Allow Blocked Content'. You must then click 'Yes' on the following security warning.</div>
</noscript>

Name: Rabbi Chaim Goldstein 2013-09-14 14:43

Yes!

Name: Anonymous 2013-09-14 14:49

>>5
You are welcome to spam:
http://www.ps.uni-saarland.de/~henz/
School of Computing
National University of Singapore
Lower Kent Ridge Road
Singapore 119260

email: henz@comp.nus.edu.sg Tel: +65 874 6632

I hope he is not this OP:
https://bbs.progrider.org/prog/read/1378687067

Name: mukyu 2013-09-14 17:53

mukyu

Name: Anonymous 2013-09-14 18:22

Name: Anonymous 2013-09-14 18:57

>>9
What >>5 said. Just view source.

Name: Anonymous 2013-09-14 19:02

Name: Anonymous 2013-09-14 19:09

All hope for a good Internet is lost.

It's time to make a new one, without w3c, without Javashit, without Touring-complete markup languages.

Name: Anonymous 2013-09-14 19:28

Name: Anonymous 2013-09-14 19:37

>>13
This sounds too good to be true. Thanks, fellow /prog/rider.

Name: Anonymous 2013-09-14 19:58

>>13
Got any links on how to run a GNUnet node (without doing any data storage)? I'm already running a Tor node and I'd like to help.

Name: Anonymous 2013-09-14 20:09

>>14
I know I was reading the documentation, I was like wow! And its abstracts right now, with some experimental code, that's why I am so jumping into this. The documentation needs the most help, the functions are labeled incorrect.

However some of the technical decisions concern me:
https://gnunet.org/sites/default/files/grothoff_ghm2013gns.pdf
https://gnunet.org/videoghm2013
Packaging: coud use help (GUIX?)
  https://en.wikipedia.org/wiki/Nix_package_manager
I agree with him:
http://lists.debian.org/debian-devel/2008/12/msg01027.html

They should be using something like pkgng or pkgsrc:
https://wiki.freebsd.org/pkgng
http://www.netbsd.org/docs/software/packages.html

Name: power packed taste of skittles 2013-09-14 20:27

>>15
Yar:
https://gnunet.org/gns-proxy
https://gnunet.org/node/1217
https://gnunet.org/svn/gnunet/doc/man/gnunet-gns-proxy.1
You are welcome. However it needs some work. Freenet uses fproxy:
https://freenetproject.org/faq.html#fproxy-lan
https://wiki.freenetproject.org/FProxy

Here a a sample gateway:
http://www.mirrorservice.org/sites/ftp.wiretapped.net/pub/security/cryptography/apps/freenet/fcptools/linux/gateway.html

And with stunnel, the sky is the limit now (for those behind firewalls):
https://www.stunnel.org/index.html

I got introduced by this thanks to new bsdnow.tv show:
http://pauldotcom.com/2013/05/ssh-over-stunnel-for-ids-evasi.html
http://www.jakeri.net/2009/01/ssl-to-ssh-tunneling-stunnel/
http://grox.net/sysadm/net/ssh_via_ssl_tunnel.howto

I just hope Admin-san would make the VM (assuming he already installed Debian here; would have loved FreeBSD Jails). I still should work on NNTP gateway one, that would be awesome.

Name: Anonymous 2013-09-14 21:01

>>17
A freesite may embed or link to pictures or other content. In case this is not done through the .gnunet-Address, but the usual address (http://www.mysite.com/title.jpg, for example), the requester looses anonymity when requesting the content: the request does not get routed through GNUnet, but a normal - maybe not encrypted - direct connection to the destination server. To circumvent this, an additional proxy server has to be added in front of the SOCKS proxy. This proxy checks every "normal" request whether it is the result of a link on an anonymous page (through the HTTP header "Referrer"). In this case, a warning message is returned first.
This is shit. Why does it not just block unsafe/non-anonymous requests by default? Now I have to write a fucking intermediate SOCKS proxy just to filter them out. Fuck.

Name: Anonymous 2013-09-14 21:25

Oh, it's not even done yet. Screw it.

Name: 17 2013-09-14 21:46

>>18
FreeServices is not a concept of mine, but it is a concept that is still present on GNUnet's "todo" list, even if a description of it, unfortunately, isn't present on the new website anymore. So, for the sake of documentation, here is the text from [u][b]GNUnet's old website regarding FreeServices[/u][/b] (with only small changes):
IOW, it was an idea like Freedom Hosting that excerpt is from, and it has not been implemented. I was just showing the part of how you can build a SOCKS proxy in GNUnet, which works like a charm. You can also set up your own SOCKS proxy that checks if the resources are ECRS links. You can use any mesh network if you like, which is why I included fproxy in the post.

>>19
What's not done? The FreeServices host? You can build your own if you like. If you are talking about >>16's secushare thing, well duh. But if you are talking about GNUnet proxies, those work.

Name: Anonymous 2013-09-14 21:49

>>20
Okay, simple question for you; how can I use GNUnet the way I use Tor hidden services?

Name: Anonymous 2013-09-14 22:44

What should I use if I want to encrypt my piratebay torrenting?

Name: Anonymous 2013-09-14 22:50

>>22
A VPN or I2P with a heavily patched client. Don't bother with Tor. Don't bother if your country doesn't give a shit about American copyrights.

Name: Anonymous 2013-09-14 23:46

>>21
The simple way is to use GNS and make an SVR record for your client. You use the local gnunet-gns-proxy to connect to it. You can also implement a proxy on on the Gnunet fileshare, that connects to your service. For the additional references:
https://gnunet.org/gns-records
https://gnunet.org/gnunet-vpn

Here is an extravagant example:
http://board.planetpeer.de/index.php?topic=977.0

However this pissed me off:
https://gnunet.org/faq-page#t6n2005

The reasons DCVS exist is so that anyone can have a copy of the work if someone goes MiA. However the reasons why private branches exist than just for the user's Freedoms, are for technical reasons as well: local experiments, different environments, risk prevention, etc. The users should be able to post code securely and anonymously. For those analysis tools, all you fucking do is get a VM people can run them on, and commit the reports as part of the commit, so everyone has a copy. If someone goes MiA, anyone can fucking build their own VM and start using it. For goodness sakes, you can even commit the VM image that was used in the repository.

Name: privacy freak !Q80iMES5BQ 2013-09-14 23:53

>>22
While it is technically imbecilic to run bitorrent on a mesh network, especially on the ones built as fileshares, you can. >>17,24 has provide several references on how that is possible.

Name: Anonymous 2013-09-15 0:01

Why don't we have a simple darknet onion+garlic routing network? Something with a simple SOCKS5 interface. You give it a public key hash hostname and a port and it connects to it. High latency, lots of buffering (to help with the mixing). I2P is fucking bloated.

Name: sleepy !Q80iMES5BQ 2013-09-15 0:27

>>26
If you mean us, /prog/riders, I have no idea. I urged admin-sama to implement one, even on a Vm, and I'd be willing to work in it.

If you mean tools like that, too many to count: SSH+SOCKS, OTR proxy(a fav), Tor, etc.. Pick any you like:
https://en.wikipedia.org/wiki/Anonymous_P2P

Name: Anonymous 2013-09-15 0:38

>>27
SSH+SOCKS and OTR don't give you anonymity. Tor has okayish anonymity but it's a low-latency network which means it's vulnerable to a global passive attacker. It's also an onion network and not a mix network.

Name: asleep !Q80iMES5BQ 2013-09-15 1:40

>>28
Then give me your definition of anonymity. A public key certainly ruins your identity. If you are talking about traceability, use a P2P system with them (e.g. Anonymous remailer, Tarzan network, Cjdns, etc.) Mesh networks being you best bet. Pick your poison:
https://en.wikipedia.org/wiki/Mesh_networking
https://en.wikipedia.org/wiki/P2P_network
Cjdns looks promising:
wiki.projectmeshnet.org/Getting_started
wiki.projectmeshnet.org/Cjdns
en.wikipedia.org/wiki/Cjdns
github.com/cjdelisle/cjdns/


However, I am waiting for someone to start producing these at large, so we never have to worry about network protocol cryptography:
http://arxiv.org/abs/1305.0305?utm_source=feedly
http://www.mendeley.com/research/darpa-quantum-network/
http://www.technologyreview.com/view/514581/government-lab-reveals-quantum-internet-operated-continuously-for-over-two-years/
http://tech.fortune.cnn.com/2013/05/07/scientists-have-been-using-quantum-internet-for-years/

Name: sleep typing !Q80iMES5BQ 2013-09-15 1:48

I hate opening more cans with worms inside them:
http://en.wikipedia.org/wiki/TUN/TAP

Name: Anonymous 2013-09-15 1:53

>>29
Quantum crypto needs dedicated direct lines. Forget about it.

Then give me your definition of anonymity. A public key certainly ruins your identity.
I mean exactly the same thing as Tor's hidden services provide (ideally). The hidden service doesn't know anything about who is connecting, the client doesn't know anything about the hidden service except for its public key, and an outside observer must not be able to find out anything, not even that a connection/transfer occurred, much less identify its endpoints. The public key is needed to both identity and authenticate the connection's destination.

Name: Anonymous 2013-09-15 6:00

Fuckin FBI. They should be taking out and arresting the fuckers of that animalnecro site. Those are the real psychopaths, the kind of people that will be and most likely already are doing harm in real life. Those fucks masturbate to dead animals. They are legitimate ted bundy types. That is much worse than even masturbating to naked babies.

Name: Anonymous 2013-09-15 8:32

>>32
Those are the real psychopaths, the kind of people that will be and most likely already are doing harm in real life. Those fucks masturbate to dead animals.
Masturbating to images isn't illegal; making it illegal would be creating a type of ``thoughtcrime''. That being said, browsing that website is the kind of probable cause needed to get a surveillance warrant, and if you're right about them doing harm in real life, then they'll get arrested for animal abuse (which is illegal).

Name: Anonymous 2013-09-15 12:47

>>31
not even that a connection/transfer occurred,
that one is impossible, even on tor. You can see that traffic was hit on nodes, even bridges, although it is ambiguous what was transferred and who they are. But thanks for clarifying.
SSH+SOCKS on a P2P does just that, same with OTR proxy, and the bunch of them.

A fileshare AnoP2P makes a little more ambiguous, since no one knows what transactions are in the datastore, and if things were even checked out, since things are always passing through them, including the filesystem daemons or DHT lookup queries.

>>33
Oh so the DoD agents that look at this stuff go to jail too, since it is probable cause for abuseof the system and powers? You know exactly what happens, nothing. If it does escalate, suspension with pay. Not firing and conviction.

Name: Anonymous 2013-09-17 17:32

>>34
that one is impossible

Sure, but with a little modification, it can become something like ``It is impossible for an observer to have certainty greater than K that a connection/transfer from A -> B carried data requested by a user at B.'' Others have gone into better detail about how this is doable, and from a tin foil perspective I think it has the same meaning.

Name: Anonymous 2013-09-17 19:41

>>34
that one is impossible, even on tor.
Wrong. It's merely infeasible, at least the naive way.

Theorem.  It's possible.

Proof. Every node sends pseudorandom junk (and sometimes actual encrypted data) to every other node in the network at a constant rate. There is no way for a global passive (or even active) attacker to tell whether the data sent from A to B was junk or not without breaking the encryption. ∎

Name: Anonymous 2013-09-17 19:53

>>36
Ok, thanks for the correction.

With a fileshare AnoP2P, you have your pseudorandom stream added as a bonus. But it does sound like a great idea on non-fileshares, especially if they are anycasting to multiple nodes, even if only if a group or one needs the streams. I read somewhere in an anonymous remailer, that was being done. Let me pull out my docs.

Name: Anonymous 2013-09-17 20:22

>>36
I see no equations, this is not a genuine theorem and proof.

Pseudo-intellectual.

Name: Anonymous 2013-09-17 20:30

>>36
That's basically I2P's model.

Name: Anonymous 2013-09-17 20:31

>>36
Enjoy, its a 2 hour presentation, all in the pdf. The reading depends on your speed, 116 pages, lots of white space. Delicately, I can read all of it in a little less than 30 minutes:
http://ritter.vg/p/AAM-defcon13.pdf

Look for more info on the main domain blogs. I still got a bunch of documents to sift through, esp. the Randomized Restricted Routing for Restricted-Route Network (R5N).

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List