User Controls
Posts That Were Thanked by apt
-
2018-08-09 at 3:47 PM UTC in What does it mean when a girl has 'read' your message but not responded after multiple days?Just be cool and say, "you still there?" and then if she still doesn't respond threaten to rape her if she doesn't like you.
-
2018-08-09 at 2:48 PM UTC in DHers are finally all gone.it feels that way without jedirell and wellhung prematurely ejaculating nonsense all over the place
-
2018-08-08 at 7:52 PM UTC in Only A Certain # of Requests Allowed Per IP #2
Originally posted by esbity Update: I set up the program to use proxies and it works but I think there may be a 24 hour timeout after 5 requests. I also set up the program to test the proxies.
What's the best place to buy preium proxies in bulk?
I need 1000's.
people like you belong in a chamber.
of gases.
its you and your kind that ruined proxies and made verification and captchas and cloudflare everywhere.
you should be dragged out, shot, and drag into a gas chamber to be shot again. -
2018-08-08 at 5:34 PM UTC in Streaming and the normieization of the internet have ruined underground culture
-r—w—- blaze it!
you should feel bad -
2018-08-06 at 10:28 AM UTC in Site Feature: PGP Keys
For the moment I've added the feature of allowing users to add their PGP public key to their user profile where other users can record it and subsequently use it to verify signed content and send encrypted private messages. Actual encryption/decryptions/verification/signing needs to be done by you as there are good reasons why you don't want to trust my code to do that kind of thing. Right now the only thing that NiS does is facilitate key exchange by allowing you to list your public key on your user profile.
As such, using PGP crypto will require a little setup. The appropriate software to use differs by platform, there are a number of implementations available which are all interoperable but I'll list the the most popular ones here:
Windows
Gpg4win
Download: https://gpg4win.org/download.html
Getting Started: https://www.deepdotweb.com/2015/02/21/pgp-tutorial-for-windows-kleopatra-gpg4win/
OSX
GPG Suite
Download: https://gpgtools.org/
Getting Started: https://www.deepdotweb.com/2015/02/20/pgp-tutorial-os-x/
Linux
GPG (common package names are "gpg" and "gnupg")
Download: Your distro's package manager
Getting Started: https://www.gnupg.org/gph/en/manual/c14.html
A super quick rundown of the ideas involved:
"signing" is the process of adding information to a piece of content that anyone can read such that others who know your public key can verify that it has not been tampered with. This prevents tampering but does not prevent anyone from reading the message. Signing your posts on the public boards is probably what you want to do: everyone can read your posts but I or the CIA or hackers or whoever can't edit your post without it subsequently failing verification.
"encryption" is the process of taking a message destined for one or a few known recipients and making it unreadable to anyone except those recipients. This is what you want to do when using PMs as the forces that be will be unable to either manipulate or read your message.
Signing is a process done with your private key, verification is done by others with your public key to ensure you're actually the author of the message. Encryption is a process done with your recipient's public key, the recipient decrypts your message with their secret key.
As always I want to point out what this process means in terms of trust and what kind of evil things I'm able to do. When you exchange keys over NiS you need to be convinced that the public key you list is the key that others receive, and likewise that the keys you collect from other posters are really their keys. I can "man in the middle" the exchange to some extent, accepting your public key but then distributing my own key to others and this would allow me to eavesdrop on you. I'm working on a way to help detect if this kind of thing is happening (essentially a list of all keys which you can download to verify your own key is faithfully transmitted and detect if anyone else's key as changed). You can still do key exchange through channels outside of NiS and there's nothing wrong with that, I'm simply putting this option out there for ease of use or for those who think the service is trustworthy today but may be compromised in the future (which is the use-case I'm usually thinking about).
It's not a very sophisticated system and there are plenty of sharp corners in remaining in the user experience. Going forward I'll be looking at things like making signing more cosmetically palpable (hiding signature/encryption headers/footers until a user initiates verification), potentially something like automatic signing/verification and encryption/decryption but to be even remotely secure it would have to be implemented though userscripts or browser extensions. But the central thing I'd urge is to generate a key and record other people's keys now, keeping a record of public keys in a place I can't manipulate them (on your computer) is a big step to limiting the amount of useful information I can be compelled to turn over.
P.S. I only tested the key submission form with keys my tools produced and wasn't able to find any clear format specification for keyfiles, if your software is producing output and you're not able to submit it on your profile page let me know.
-
2018-08-01 at 11:48 PM UTC in Why do people look like what they are?
-
2018-07-31 at 7:58 PM UTC in Excellent happenings, people!
-
2018-07-31 at 7:28 PM UTC in Miss Sophie finds dhers to be quite dopey...
Originally posted by joerell I didn't overact to anything…it's a normal reaction against anyone who is a sick pedophile who promotes or supports it. Someone who is disturbed may not agree and yet I'm sure the majority of sane individuals do want to protect kids. Not the elite who want to abuse them or use them in porn or for their own evil pleasure.
Except it is an over reaction. Again, take the mugging case. I think mugging is wrong. However I don't feel the need to continually post for 40 pages about how evil muggers.
"the majority of sane people" don't take it upon themselves to try and right the wrong of the world by telling people how evil they are on the internet, but you do. So why the special attention here? The diddling hyopthesis seems like a prime candidate. -
2018-07-31 at 7:02 PM UTC in Miss Sophie finds dhers to be quite dopey...
Originally posted by NARCassist this is what i mean when i talk about the benefits and advantages that comes with age and life experience. you learn all the ways in which the train can hurt you and so know the best ways to look at the train and even how you can use the train to get a free ride when you need to.
you derailed my train metaphor -
2018-07-30 at 8:54 PM UTC in Post your desktop.
Originally posted by Rivotril I'm not going to use Cygwin in this machine, Nmap GUI is here for a "emergency", but I rarely would use it since I have Virtualbox here and a Linux machine.
Use PentestBox at least if you insist on using Windows, also:
nmap -T4 -sS -Pn [some_host] --reason
You can never go wrong with that*. If you wanna check Shodan right quick before you touch the host inappropriately, set the shodan-api NSE script.
*If you know how 2 obseg
nmap --script shodan-api --script-args 'shodan-api.target=[some_host],shodan-api.apikey=YourApiKeyGoesHere'
There now you are 1337. -
2018-07-30 at 12:19 AM UTC in Just a friendly message to everyone who came here from the DH website.
-
2018-07-29 at 10:16 PM UTC in Is $1000 Chump Change?I've made more than that in less time than that therefore I have a bigger penis than you and get to fuck your gf in front of you but never kiss her
-
2018-07-29 at 6:44 PM UTC in Finding out who is around youSo what? You'd see the IP addresses of devices that went to the website and then what? You're not going to get any sort of identifiable information from an IP address alone, unless you are sucking the dick of somebody within the telecom company. So you made this website to harvest IP addresses and you used public WHOIS tools to look them up and have a vague geographical location on each of them. Analytics might tell you what OS and browser they're on. Then what? You're going to pull straws at which OS exploit they might have not patched yet to see how you can infiltrate them?
What is the point of this thread? -
2018-07-29 at 5:02 PM UTC in EllariaSand wishes she was pretty like Paige and LJ...
Originally posted by joerell Compared to pathetic psychos like yourself who show their extreme insanity everyday. Trying to pin women against each other is not a wise move…this is a lame tactic some disturbed idiot like Technologist would use and only proves you're a complete moron.
In reality you don't need visual images to know if women are pretty or not…for example main difference between Technologist and El and very clear. The first is full of hate and evil…the second has integrity and a fighting spirit. The first seeks sociopaths like yourself for help…the second fights her own battles and yet will be truly vocal if an injustice is served on one of her friends. Bottom line…El is beautiful. She's also beautiful physically and I guess this is your issue. The only reason you want pics is to jerk off to them in private or pin them on the wall fantasizing about raping females who rejected you. You are a sick fuck and why you're so depressed and miserable.
CodeCringe -
2018-07-29 at 1:42 PM UTC in EllariaSand wishes she was pretty like Paige and LJ...Shut the fuck up, you stupid nigger fag cunt bitch kike.
-
2018-07-28 at 3:44 PM UTC in HEY YOU. YOU KNOW WHO YOU ARE. PLEASE PM ME.Itt we guess the code word
Cricket
Shitty food
Smelly people
Taliban
IT service
Restive tribes
Somehow have nukes
Could probably turn that into a haiku -
2018-07-28 at 1:08 AM UTC in What have MOON PERSONs ruined?Everything.
Politics, by swinging the Overton window so far to the left that people unironically think that making terroristic threats to deplatform public speakers and violently taking to the streets to smash people's skulls in with bikelocks is an effective and noble form of political activism.
My ability to enjoy avocados.
My desire to own a pet, lest I be lumped in with my generation's "pet parent" nutjobs.
My happiness as a tranny, because so many trannies are the people I described ruining politics and I'm immediately assumed to be like them.
Video games.
Movies.
Basically all forms of media.
My faith in humanity.
Society. -
2018-07-28 at 12:46 AM UTC in What have MOON PERSONs ruined?It’s just a way for boomers to deflect their dumbass decisions and dump the shit onto someone else
Hurrr hurrr I worked three jobs and climbed up a hill
Well guess what so do I -
2018-07-27 at 8:37 PM UTC in Ohfralala is down with pedophilia...
Originally posted by Manonfire U fail a trolling
Learn for me young buck
Admit it... you think those Oriental twins are absolutely delicious, fire... you know damn well if you cud get away with having sexual relations with them and no one would ever know.. and you would never get caught...u would certainly do it. Biologically, grown men are naturally attracted to young girls. -
2018-07-27 at 8:34 PM UTC in PIC FREDManofire you're a faggot.