User Controls

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. ...
  8. 8
  9. 9
  10. 10
  11. 11

Posts That Were Thanked by apt

  1. Madman African Astronaut
    Just be cool and say, "you still there?" and then if she still doesn't respond threaten to rape her if she doesn't like you.
    The following users say it would be alright if the author of this post didn't die in a fire!
  2. aldra JIDF Controlled Opposition
    it feels that way without jedirell and wellhung prematurely ejaculating nonsense all over the place
    The following users say it would be alright if the author of this post didn't die in a fire!
  3. benny vader YELLOW GHOST
    Originally posted by esbity Update: I set up the program to use proxies and it works but I think there may be a 24 hour timeout after 5 requests. I also set up the program to test the proxies.

    What's the best place to buy preium proxies in bulk?

    I need 1000's.

    people like you belong in a chamber.

    of gases.

    its you and your kind that ruined proxies and made verification and captchas and cloudflare everywhere.

    you should be dragged out, shot, and drag into a gas chamber to be shot again.
    The following users say it would be alright if the author of this post didn't die in a fire!
  4. aldra JIDF Controlled Opposition
    -r—w—- blaze it!

    you should feel bad
    The following users say it would be alright if the author of this post didn't die in a fire!
  5. Lanny Bird of Courage
    You know what's a good idea? PGP signing/encryption. Not only is it useful to you because it allows you to be sure neither I nor anyone else is snooping on your PMs or fraudulently editing your posts, but it's also beneficial to us as a society to have infrastructure in place for secure communication. By the nature of key exchange waiting until you need secure communication is waiting too long, if you wait to establish a secure communication channel until your medium is compromised then it will be impossible to do secure key exchange afterwards.

    For the moment I've added the feature of allowing users to add their PGP public key to their user profile where other users can record it and subsequently use it to verify signed content and send encrypted private messages. Actual encryption/decryptions/verification/signing needs to be done by you as there are good reasons why you don't want to trust my code to do that kind of thing. Right now the only thing that NiS does is facilitate key exchange by allowing you to list your public key on your user profile.

    As such, using PGP crypto will require a little setup. The appropriate software to use differs by platform, there are a number of implementations available which are all interoperable but I'll list the the most popular ones here:

    Windows
    Gpg4win
    Download: https://gpg4win.org/download.html
    Getting Started: https://www.deepdotweb.com/2015/02/21/pgp-tutorial-for-windows-kleopatra-gpg4win/

    OSX
    GPG Suite
    Download: https://gpgtools.org/
    Getting Started: https://www.deepdotweb.com/2015/02/20/pgp-tutorial-os-x/

    Linux
    GPG (common package names are "gpg" and "gnupg")
    Download: Your distro's package manager
    Getting Started: https://www.gnupg.org/gph/en/manual/c14.html

    A super quick rundown of the ideas involved:

    "signing" is the process of adding information to a piece of content that anyone can read such that others who know your public key can verify that it has not been tampered with. This prevents tampering but does not prevent anyone from reading the message. Signing your posts on the public boards is probably what you want to do: everyone can read your posts but I or the CIA or hackers or whoever can't edit your post without it subsequently failing verification.

    "encryption" is the process of taking a message destined for one or a few known recipients and making it unreadable to anyone except those recipients. This is what you want to do when using PMs as the forces that be will be unable to either manipulate or read your message.

    Signing is a process done with your private key, verification is done by others with your public key to ensure you're actually the author of the message. Encryption is a process done with your recipient's public key, the recipient decrypts your message with their secret key.

    As always I want to point out what this process means in terms of trust and what kind of evil things I'm able to do. When you exchange keys over NiS you need to be convinced that the public key you list is the key that others receive, and likewise that the keys you collect from other posters are really their keys. I can "man in the middle" the exchange to some extent, accepting your public key but then distributing my own key to others and this would allow me to eavesdrop on you. I'm working on a way to help detect if this kind of thing is happening (essentially a list of all keys which you can download to verify your own key is faithfully transmitted and detect if anyone else's key as changed). You can still do key exchange through channels outside of NiS and there's nothing wrong with that, I'm simply putting this option out there for ease of use or for those who think the service is trustworthy today but may be compromised in the future (which is the use-case I'm usually thinking about).

    It's not a very sophisticated system and there are plenty of sharp corners in remaining in the user experience. Going forward I'll be looking at things like making signing more cosmetically palpable (hiding signature/encryption headers/footers until a user initiates verification), potentially something like automatic signing/verification and encryption/decryption but to be even remotely secure it would have to be implemented though userscripts or browser extensions. But the central thing I'd urge is to generate a key and record other people's keys now, keeping a record of public keys in a place I can't manipulate them (on your computer) is a big step to limiting the amount of useful information I can be compelled to turn over.

    P.S. I only tested the key submission form with keys my tools produced and wasn't able to find any clear format specification for keyfiles, if your software is producing output and you're not able to submit it on your profile page let me know.
    The following users say it would be alright if the author of this post didn't die in a fire!
  6. Originally posted by Cootehill >I met this girl once
    >"why dont u ask her out?"
    >coz shes a slut

    So basically you jedied yourself out of getting laid?




    Your use of jedi as an adjective in this case is very dubious. "Cucked" would have worked so much better
    The following users say it would be alright if the author of this post didn't die in a fire!
  7. Originally posted by Sophie Of course. but DH beat you to it.

    I literally scrol right pazst their comments. They might as well not exist. Except ohfralala.
    The following users say it would be alright if the author of this post didn't die in a fire!
  8. Lanny Bird of Courage
    Originally posted by joerell I didn't overact to anything…it's a normal reaction against anyone who is a sick pedophile who promotes or supports it. Someone who is disturbed may not agree and yet I'm sure the majority of sane individuals do want to protect kids. Not the elite who want to abuse them or use them in porn or for their own evil pleasure.

    Except it is an over reaction. Again, take the mugging case. I think mugging is wrong. However I don't feel the need to continually post for 40 pages about how evil muggers.

    "the majority of sane people" don't take it upon themselves to try and right the wrong of the world by telling people how evil they are on the internet, but you do. So why the special attention here? The diddling hyopthesis seems like a prime candidate.
    The following users say it would be alright if the author of this post didn't die in a fire!
  9. aldra JIDF Controlled Opposition
    Originally posted by NARCassist this is what i mean when i talk about the benefits and advantages that comes with age and life experience. you learn all the ways in which the train can hurt you and so know the best ways to look at the train and even how you can use the train to get a free ride when you need to.

    you derailed my train metaphor
    The following users say it would be alright if the author of this post didn't die in a fire!
  10. Sophie Pedophile Tech Support
    Originally posted by Rivotril I'm not going to use Cygwin in this machine, Nmap GUI is here for a "emergency", but I rarely would use it since I have Virtualbox here and a Linux machine.

    Use PentestBox at least if you insist on using Windows, also:


    nmap -T4 -sS -Pn [some_host] --reason


    You can never go wrong with that*. If you wanna check Shodan right quick before you touch the host inappropriately, set the shodan-api NSE script.

    *If you know how 2 obseg


    nmap --script shodan-api --script-args 'shodan-api.target=[some_host],shodan-api.apikey=YourApiKeyGoesHere'


    There now you are 1337.
    The following users say it would be alright if the author of this post didn't die in a fire!
  11. Enterita African Astronaut
    The following users say it would be alright if the author of this post didn't die in a fire!
  12. I've made more than that in less time than that therefore I have a bigger penis than you and get to fuck your gf in front of you but never kiss her
    The following users say it would be alright if the author of this post didn't die in a fire!
  13. Grimace motherfucker [my enumerable hindi guideword]
    So what? You'd see the IP addresses of devices that went to the website and then what? You're not going to get any sort of identifiable information from an IP address alone, unless you are sucking the dick of somebody within the telecom company. So you made this website to harvest IP addresses and you used public WHOIS tools to look them up and have a vague geographical location on each of them. Analytics might tell you what OS and browser they're on. Then what? You're going to pull straws at which OS exploit they might have not patched yet to see how you can infiltrate them?

    What is the point of this thread?
    The following users say it would be alright if the author of this post didn't die in a fire!
  14. Glokula's Homabla African Astronaut
    Originally posted by joerell Compared to pathetic psychos like yourself who show their extreme insanity everyday. Trying to pin women against each other is not a wise move…this is a lame tactic some disturbed idiot like Technologist would use and only proves you're a complete moron.

    In reality you don't need visual images to know if women are pretty or not…for example main difference between Technologist and El and very clear. The first is full of hate and evil…the second has integrity and a fighting spirit. The first seeks sociopaths like yourself for help…the second fights her own battles and yet will be truly vocal if an injustice is served on one of her friends. Bottom line…El is beautiful. She's also beautiful physically and I guess this is your issue. The only reason you want pics is to jerk off to them in private or pin them on the wall fantasizing about raping females who rejected you. You are a sick fuck and why you're so depressed and miserable.

    CodeCringe
    The following users say it would be alright if the author of this post didn't die in a fire!
  15. LegalizeSpiritualDiscovery Space Nigga [my yellow-marked arboreous hypnotist]
    Shut the fuck up, you stupid nigger fag cunt bitch kike.
    The following users say it would be alright if the author of this post didn't die in a fire!
  16. Itt we guess the code word

    Cricket
    Shitty food
    Smelly people
    Taliban
    IT service
    Restive tribes
    Somehow have nukes

    Could probably turn that into a haiku
    The following users say it would be alright if the author of this post didn't die in a fire!
  17. HTS highlight reel
    Everything.

    Politics, by swinging the Overton window so far to the left that people unironically think that making terroristic threats to deplatform public speakers and violently taking to the streets to smash people's skulls in with bikelocks is an effective and noble form of political activism.

    My ability to enjoy avocados.

    My desire to own a pet, lest I be lumped in with my generation's "pet parent" nutjobs.

    My happiness as a tranny, because so many trannies are the people I described ruining politics and I'm immediately assumed to be like them.

    Video games.

    Movies.

    Basically all forms of media.

    My faith in humanity.

    Society.
    The following users say it would be alright if the author of this post didn't die in a fire!
  18. It’s just a way for boomers to deflect their dumbass decisions and dump the shit onto someone else

    Hurrr hurrr I worked three jobs and climbed up a hill

    Well guess what so do I
    The following users say it would be alright if the author of this post didn't die in a fire!
  19. WellHung Black Hole
    Originally posted by Manonfire U fail a trolling

    Learn for me young buck

    Admit it... you think those Oriental twins are absolutely delicious, fire... you know damn well if you cud get away with having sexual relations with them and no one would ever know.. and you would never get caught...u would certainly do it. Biologically, grown men are naturally attracted to young girls.
    The following users say it would be alright if the author of this post didn't die in a fire!
  20. 🐿 African Astronaut
    Manofire you're a faggot.
    The following users say it would be alright if the author of this post didn't die in a fire!
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. ...
  8. 8
  9. 9
  10. 10
  11. 11
Jump to Top