less known linux softwares?

[chan3] linux
Aug 2 09:37

What are less known softwares you use almost everyday?

[chan3] linux
Aug 2 09:43

bitmessage :P

[chan3] linux
Aug 2 10:22


[chan] linux
Aug 2 10:30

Window Maker, an elegant and very low resources desktop.

[chan] linux
Aug 2 10:43


[chan3] linux
Aug 2 10:58

Talking about very low resource window managers: fluxbox

[chan3] linux
Aug 2 21:38

How to use youtube-dl with Tor (torbrowser running with 9150 port) ? youtube-dl --proxy socks5:// <link to video> ? And that's all ? It will be download video trought Tor path ? Youtube or other site form extractors list don't block this connection ? Thx!

[chan3] linux
Aug 2 22:11

torify proxychains

[chan3] linux
Aug 3 16:02


[chan] linux
Aug 3 16:07

someone already said that.

[chan] linux
Aug 3 16:07


[chan] linux
Aug 3 16:08

the question was "less known", not "common as sand"

[chan3] linux
Aug 3 16:15

[chan3] linux
Aug 18 11:33

OMEGA get it here, it's free: www.cyanbyte.de

[chan] linux
Aug 18 13:45

OMEGA rofl.... looks to me like someone tried to build an encryption tool after reading a book about crypto... but looking at the python code of OMEGA there is not much magic... I honestly doubt it's at least cryptographically secure.

[chan] linux
Aug 18 13:46

Implementing one time pad encryption is surprisingly simple. In fact, there is pretty much nothing you even could do wrong on just the encryption, as long as you implement actual ONE TIME PAD encryption. Generating and distributing a good pad however....

[chan] linux
Aug 18 14:50

Linux kernel

[chan3] linux
Aug 18 15:11

How would you break it then?

[chan] linux
Aug 18 15:13

"If you can't break it, it must be secure" is a common crypto fallacy.

[chan3] linux
Aug 18 15:22

Well said! You could build a complicated machine to drive a nail into the wall, but the best tool for the task is still a simple hammer. The very same principle applies to cryptography. and if you don't trust /dev/urandom to generate the keys, You can generate the random numbers using dedicated hardware, e.g. by geiger-counting natural radioactive decay (google for "hotbits"), or by using the avalanche effect of a Z-diode, just to name another option. More complicated technology/software is not necessarily better. It is also less transparent and as such also less trustworthy.

[chan3] linux
Aug 18 15:25

Is your approach "If I don't *BELIEVE* it to be secure, then it *MUST* be insecure." really any better? :)

[chan] linux
Aug 18 15:31

previous post was not by the same poster you're addressing, as is this one. I guess the point they wanted to make is that generally, if crypto software has obvious signs of poor software development practices, it's a definite "SHOULD NOT USE" in terms of cryptographic credibility, since normal crypto is incredibly easy to mess up. But since OTP is basically just XORing two things together (assuming that one of those things is a properly created one time pad), that's extremely hard to get wrong.

[chan3] linux
Aug 18 16:23


[chan3] linux
Aug 20 08:02

PIVX but it's well known already.

[chan] linux

Subject Last Count
hi there Dec 13 17:13 2
linux distros Dec 10 18:05 1
The Stallman Tax Dec 9 14:48 1
hello Dec 9 08:39 2
OMEGA release 39 is available for download Dec 5 23:53 2
the mammoth is served on the www web : Dec 5 12:51 1
anyone tested Mint KDE btrFS snapshots ? Dec 5 02:34 7
cool lap Dec 4 16:23 1
fuck me, I went back to MX distro for giggles Dec 2 22:52 11
the fuckers at debian Dec 2 14:37 2
BM w/ GUI : Jupyter BM notebook Nov 30 12:13 4
easy mailer , just add MX line in DNS Nov 30 10:55 1
onion mail Nov 29 00:56 1
How to build the pow for linux? Nov 27 21:09 4
encryptpad Nov 26 03:31 1
Alex Jones Wanker Nov 20 21:53 1