Aug 2 09:37
What are less known softwares you use almost everyday?
Aug 2 09:43
Aug 2 10:22
Aug 2 10:30
Window Maker, an elegant and very low resources desktop.
Aug 2 10:43
Aug 2 10:58
Talking about very low resource window managers: fluxbox
Aug 2 21:38
How to use youtube-dl with Tor (torbrowser running with 9150 port) ? youtube-dl --proxy socks5://127.0.0.1:9150 <link to video> ? And that's all ? It will be download video trought Tor path ? Youtube or other site form extractors list don't block this connection ? Thx!
Aug 2 22:11
Aug 3 16:02
Aug 3 16:07
someone already said that.
Aug 3 16:07
Aug 3 16:08
the question was "less known", not "common as sand"
Aug 3 16:15
Aug 18 11:33
OMEGA get it here, it's free: www.cyanbyte.de
Aug 18 13:45
OMEGA rofl.... looks to me like someone tried to build an encryption tool after reading a book about crypto... but looking at the python code of OMEGA there is not much magic... I honestly doubt it's at least cryptographically secure.
Aug 18 13:46
Implementing one time pad encryption is surprisingly simple. In fact, there is pretty much nothing you even could do wrong on just the encryption, as long as you implement actual ONE TIME PAD encryption. Generating and distributing a good pad however....
Aug 18 14:50
Aug 18 15:11
How would you break it then?
Aug 18 15:13
"If you can't break it, it must be secure" is a common crypto fallacy.
Aug 18 15:22
Well said! You could build a complicated machine to drive a nail into the wall, but the best tool for the task is still a simple hammer. The very same principle applies to cryptography. and if you don't trust /dev/urandom to generate the keys, You can generate the random numbers using dedicated hardware, e.g. by geiger-counting natural radioactive decay (google for "hotbits"), or by using the avalanche effect of a Z-diode, just to name another option. More complicated technology/software is not necessarily better. It is also less transparent and as such also less trustworthy.
Aug 18 15:25
Is your approach "If I don't *BELIEVE* it to be secure, then it *MUST* be insecure." really any better? :)
Aug 18 15:31
previous post was not by the same poster you're addressing, as is this one. I guess the point they wanted to make is that generally, if crypto software has obvious signs of poor software development practices, it's a definite "SHOULD NOT USE" in terms of cryptographic credibility, since normal crypto is incredibly easy to mess up. But since OTP is basically just XORing two things together (assuming that one of those things is a properly created one time pad), that's extremely hard to get wrong.
Aug 18 16:23
Aug 20 08:02
PIVX but it's well known already.
|hi there||Dec 13 17:13||2|
|linux distros||Dec 10 18:05||1|
|BREXIT IS BULLSHIT||Dec 10 02:37||2|
|The Stallman Tax||Dec 9 14:48||1|
|hello||Dec 9 08:39||2|
|OMEGA release 39 is available for download||Dec 5 23:53||2|
|the mammoth is served on the www web :||Dec 5 12:51||1|
|anyone tested Mint KDE btrFS snapshots ?||Dec 5 02:34||7|
|cool lap||Dec 4 16:23||1|
|fuck me, I went back to MX distro for giggles||Dec 2 22:52||11|
|the fuckers at debian||Dec 2 14:37||2|
|BM w/ GUI : Jupyter BM notebook||Nov 30 12:13||4|
|easy mailer , just add MX line in DNS||Nov 30 10:55||1|
|onion mail||Nov 29 00:56||1|
|How to build the pow for linux?||Nov 27 21:09||4|
|encryptpad||Nov 26 03:31||1|
|Alex Jones Wanker||Nov 20 21:53||1|