Servers are back up after system maintenance April 14. Feb 14-25 still awaits import.

ID:VtIc/ndn No.16249017 View ViewReplyOriginalReport
operas are literally 19th century musicals
13 posts and 6 images omitted

Hey, let's talk

!wzi4fPBOgI ID:9rDb+sFX No.16248884 View ViewReplyOriginalReport
40 posts and 5 images omitted

ID:aGE6pN3q No.16249077 View ViewReplyOriginalReport
If you were to make a video game what would it be about?

ID:xyT7RpoK No.16249059 View ViewReplyOriginalReport
Is it hard to learn how use Gimp?

T. Dumbfug


ID:u1pOGaDR No.16240782 View ViewReplyLast 50OriginalReport
227 posts and 129 images omitted

ID:TjyWRK8A No.16248950 View ViewReplyOriginalReport
Buy a thinkpad x230 and install heads. Write protect the flash chip. Put nail polish on the screws and take high resolution pictures to ensure signs of tampering. Do NOT use a HDD or SSD. They have DMA so a malicious firmware could do a lot of damage, use of USB is preferred since they do not have DMA. Completely remove the microphone, sound card, webcam and the WWAN card from the laptop. Remove the fan to prevent binary acoustic data transmission. Replace the default wifi card with a supported atheros card. Disable wifi when not in use, preferably by physically removing the card. Make your own independent Linux distro from scratch. Most Linux distros value convenience over security and will thus never have good security. Your only option is to make your own. Use musl instead of glibc, Libressl instead of openssl, sinit instead of systemd, oksh instead of bash, toybox instead of gnu coreutils to reduce attack surface. Enable as little kernel modules as possible. Use a hardened memory allocator. Apply strong SELinux and sandboxing policies. Restrict the root account heavily to make sure it never gets compromised. Disable JavaScript and CSS in your browser. Block all FAGMAN domains in your hosts file. Monitor all network requests. Do not use a phone. Never speak near anyone who owns a phone, they are always listening. Never use any non-corebooted technology made after 2006. Never leave your devices unattended. Tape triple layer aluminum foil all around your room as tempest shielding. Type really quietly as defense against audio keylogging. Use ecc ram to minimize rowhammer and rambleed. Encrypt everything multiple times with various different encryption implementations. Compile everything from source. Use hardened compilation flags. Always read through the source before installing something if possible. Only use the internet when absolutely necessary.

ID:TtU9B4lz No.16244220 View ViewReplyLast 50OriginalReport
hey bnät, hows it going?
219 posts and 84 images omitted

ID:6W5yvOYS No.16249049 View ViewReplyOriginalReport
Eternal punishment awaits the sodomites.

ID:ej7te+oz No.16246390 View ViewReplyOriginalReport
I'm split between getting the new R5 7600X and waiting for Intel's 13th gen but the i5-K will probably be on pair with 7600X or even higher.
i5-12400F is still an option but it feels meh to not go for the latest gen if you want to upgrade now while going for DDR5 5600-6000 with CL36
Power usage is not an issue with 100-140W turbo from the socket but AMD's approach with their Tjmax is worrying. I think the NH-D15 can handle it without throttling but still...
What a crazy era we live in
20 posts and 5 images omitted

How would you change your country for the better?

ID:NtNqd7Uc No.16249009 View ViewReplyOriginalReport
How would you change your country for the better?
>United States
>Take monies from welfare and significantly fund trades, technical school, university and then obamacare subsidies
>fund automation significantly in manufacturing and in general until a manufacturing base is built up again and significant progress can be made economically regardless of population size
>fund a bullet train to every major city and a bus system in every major city

Thoughts? What are your opinions on this?
1 post omitted