Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Paranoid hardware [PART XVII]

Name: Anonymous 2012-11-20 8:36

Any desktops/laptops/motherboards/SoCs that do not require closed-source firmware blobs out there?

Name: Anonymous 2012-11-22 22:43

>>36
Ironically, telling people to get a ``normal computer'' encourages governmental and corporate spying and control, thus tightening the grip of your hypothetical jewish conspiracy on mankind.

Name: Anonymous 2012-11-22 23:10

>>41
logic doesn't work, others have tried and failed.

Name: Anonymous 2012-11-22 23:56

I'm not quite an rms-level nutjob, but I am privacy-conscious and it's frustrating having to explain my computing habits and preferences to people. I don't want to preach and I don't want to seem weird, but people pry and probe. When people ask why ``my Windows'' doesn't have Microsoft Word or why I don't have a Facebook, I feel as though I'm massively responsible. Like when you make someone watch a film and they hate it, you feel awkward about it even though you didn't make the film.

I doubt most of my fellow tinfoil hat-wearing OpenBSD users have friends, but for those of you do, how do you deal with all of this?

Name: Anonymous 2012-11-23 0:30

>>43
Be hypocrite, try to make them feel good and superior. Pretend you don't know shit. Your Windows doesn't have a Microsoft Word because it's a cheaper and dumber Windows. You don't have a facebook because you don't know how to open an account.

Ask them questions. "Wow, you're telling me that you can speak to anybody with your facebook? You got to show me that sometimes."

They already think you're an idiot. It's easy.

Name: Anonymous 2012-11-23 0:34

>>43
I'm not quite an rms-level nutjob
What do you have against RMS' positions (not him as a toejam-munching individual)?

how do you deal with all of this?
If your friends have a few hours to waste, then you may do a short presentation on your computing habits and choices.
- Give a few examples of abuses of power by ``nice and democratic'' governments and their security agencies, then use that to ``prove'' the need for the right to privacy.
- Give a few examples of abuses of power by corporations in the field of software.
- Explain how a string of bytes shorter than this phrase can compromise the security of a computer, then use that to ``prove'' the inherent unsafety of closed-source software.
- Explain how privacy in the digital world is impossible without computer security.

Name: Anonymous 2012-11-23 0:59

>>45
How the fuck did you manage to make an entire post about "explaining security to idiots" and not mention credit cards and identity theft?

Name: Anonymous 2012-11-23 1:01

( ͡° ͜ʖ ͡°)   lel

Name: Anonymous 2012-11-23 2:11

>>35
Fine, I asked.

Name: Anonymous 2012-11-23 3:09

>>46

credit cards
Don't use credit cards.

identity theft
Don't have an identity.

Name: Anonymous 2012-11-23 3:14

>>49
computer security
Don't have a computer.

Name: 48 2012-11-23 9:33

Name: Anonymous 2012-11-23 17:42

>>40
No, you go there, I'll stay here with my fellow jews and discuss enterprise quality code.

Name: Anonymous 2012-11-23 17:51

>>52
Trying too hard to fit in, huh?

Name: Anonymous 2012-11-23 17:52

>>45
Real people in the real world don't give a shit.

Name: Anonymous 2012-11-23 18:03

>>54
Real people in the real world don't know the difference between Internet Explorer and the Internet.

Name: Anonymous 2012-11-23 18:03

>>54
What does that have to do with anything?

Name: Anonymous 2012-11-23 18:54

>>56
Because he's talking about talking to real people in the real world?

Name: Anonymous 2012-11-23 19:30

>>57
What does giving a shit have to do with individual privacy and abuses on power and privacy by corporations and governments. Shit and these subjects are completely unrelated.

Name: dadadodo 2012-11-24 0:23

>>58
What does giving a shit have to do with individual privacy and abuses on power and privacy and abuses on power and privacy and privacy and privacy and privacy and privacy and privacy and abuses on power and privacy and abuses on power and privacy and have to do with individual privacy and privacy and privacy and privacy and governments: a shit have to do with individual privacy and privacy and governments.  What does giving a shit have to do with individual privacy and privacy and governments.

Name: Anonymous 2012-11-24 1:30

I'm pretty sure (beagle|panda)board's SPL is open source.  Except it's 3x more expensive than the Cubieboard.

Name: Anonymous 2012-11-24 2:13

Name: Anonymous 2012-11-24 5:33

>>28
Cost less than your friggin' iPhone or Macbook.

Name: Anonymous 2012-11-24 6:45

( ͡° ͜ʖ ͡°)    Hide your salami, male programmer

Name: Anonymous 2012-11-24 7:19

Chromebook.

Name: Anonymous 2012-11-24 7:24

>>64
Terrible!

Name: Anonymous 2012-11-24 9:32

>>64
http://www.golem.de/news/chromebook-mit-arm-im-test-plaste-und-elaste-mit-bauchtaste-1211-95881.html
cheap creaky plastic
trackpad can be triggered by pushing bottom of case
cheap CPU & overall performance

Name: Anonymous 2012-11-24 9:45

>>66
Who in the buttfucking L-rd are you quoting, shitfag?

Name: Anonymous 2012-11-24 11:22

>>67
And what are you doing here, yid? Trying to make people think holohoax was real? Won't work, kike.

Name: Anonymous 2012-11-24 11:56

>>68
Why don't you go and suicide in the name of Allasalamuh, fagshit?

Name: Anonymous 2012-11-24 11:58

SHOW THEM YOUR ANUS

Name: Anonymous 2012-11-24 12:20

>>69
this is the great song from LEBANON islamic world united islamic world fuck ISRAIL
http://youtu.be/rPwMgzE2zNc

Name: Anonymous 2012-11-24 15:06

>>71
.demhA, malaS

Name: Anonymous 2012-11-24 15:11

>>72
Satanic reverse writing.
Shalom, Hymie!

Name: Anonymous 2012-11-24 16:08

>>73
Says the towelhead who writes backwards!

!שָׁלוֹם

Name: Anonymous 2012-11-24 16:39

>>63
I'll do better than that, I'll encrypt it.

>>64
Any proof of that?

Name: Anonymous 2012-11-24 16:52

>>75
Cryptography considered Jewish.

What do you want to hide, kike?

Name: Anonymous 2012-11-24 20:42

>>3
Lots of ARM dev boards need to use a proprietary bootloader; not sure if those are any different.

Name: Anonymous 2012-11-24 22:32

>>76
https://dis.4chan.org/read/prog/1315415275/49
https://dis.4chan.org/read/prog/1350278658/107
If such a jewish conspiracy really existed (which it doesn't outside your crazy little brain), then ``they'' would fight for banning cryptography so that they can detect and silence dissent.

>>77
https://wiki.debian.org/PandaBoard#Bootloader
http://gitorious.org/pandaboard

Name: Anonymous 2012-11-24 22:33

>>78
The government is run by JEWS anyway.

Name: Anonymous 2012-11-24 22:35

>>78
i wonder what its like being a hooknose

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List