/tech/ - Technology

Technology & Computing

New Thread
Files* Max 5 files32MB total
[New Thread]

little_girl.jpg (u)
[Hide] (17.8KB, 236x283)
Android has been ported to a RISC-V board

January 21, 2021
Google’s Android operating system currently supports a handful of instruction set architecture (ISA) families, including ARM and x86. The vast majority of smartphones, tablets, TVs, and smartwatches that run Android today feature ARM-based chipset designs, as Intel has long since abandoned its handset CPUs while support for MIPS was dropped with NDK revision 17. While Google does not officially provide support for compiling Android on hardware based on the open RISC-V ISA, several development teams are working to run AOSP on RISC-V hardware. One such effort is led by T-Head, the business entity of Alibaba specializing in semiconductors, which today announced that they’ve successfully ported Android 10 onto its in-house RISC-V hardware.

A few months ago, PLCT Lab successfully booted Android to a command-line interface on a 64-bit RISC-V core emulated in QEMU. The team launched a project on GitHub they’re calling “AOSP for RISC-V” and are still in the early stages of cross-compiling AOSP and booting to a GUI. Meanwhile, T-Head, which designed the ICE SoC with its in-house, RISC-V-based XuanTie C910 cores, has managed to boot Android 10 with working graphics and touch.

The ICE chip from T-Head with 3 XuanTie C910 (RISC-V 64) CPU cores.

It runs quite slowly, as you can see in the video embedded below, but this is to be expected given the status of this port and the hardware it’s running on. In the video, a couple of stock AOSP applications are launched, including the clock app, the contacts app, and the mail app. More complex applications such as games aren’t shown off on this prototype as these apps would likely need to be recompiled to target RISC-V.


This Android 10 port is based on the android10-release branch in AOSP, and the source code developed by T-Head can be found on the company’s GitHub page.
Message too long. View the full text
15 replies omitted. View the full thread
There are some around on crowdsourcing sites. It costs a lot though.
No, it's not. It's proprietary.
There is a stripped down version called AOSP that is FLOSS, but with each new Android version Google releases a new component that apps rely on and only exist's in Google's proprietary version of Android which OEMs base themselves off of.
Replies: >>1425 >>2237
Don't forget the firmware blobs (especially for the modem) and vendor patched kernel.
ClipboardImage.png (u)
[Hide] (1MB, 622x622)
Basically google's android and android's android, got it.

jefferson-santos-9SoCnyQmkzI-unsplash.jpg (u)
[Hide] (17.2KB, 640x427)
There is a criminal organization in Brazil using NSO Group's Pegasus to infect devices for hack for hire, to incite terrorism, blackmail people, produce illegal pornography and assist in assassinations. They also have other advanced malware, like UEFI implants and even persistent implants for Kindle and Raspberry Pi. Plus face/voice recognition on every camera and microphone they can get into, in public or private places.

Brazil won't do anything to stop them. Only the FBI, CIA and NSA can stop them.

There is also the possibility that they were engaged on the hack of Bezos' smartphone.

If you know of any security researcher who wants to reverse engineer the exploits they are using, I am more than willing to help them.

If you want a story about how they operate, I am willing to work with you to expose them.
17 replies and 1 image omitted. View the full thread
Replies: >>2023 + 5 earlier
(PNG_Image,_260_×_362_pixels).png (u)
[Hide] (28.7KB, 260x362)
Not OP but there's already dead journalists in Turkey I heard and probably related to the same backdoor that got leaked (intentional or accidental).
>>1357 (OP) 
Pegasus from public sources is said to be known to work on mobile devices and it's likely that they target popular devices since the disparity makes it a headache for backdoor writers.
The thing to avoid is borders, where they can check your phone which they can then use the timing to image your phone and/or install a modified TWRP recovery partition to exfiltrate everything and/or have it install a backdoor next boot. The process should take less than 20 minutes.
This is in my theory but this checks out with the information out there and should be true (a hacker's theory).
And in theory, again, your phone should feel like it is booting up from factory reset like pic related which means it has been compromised. I would advice you to stop using that phone and reformat the partitions but assume they already have most of your files. Using personal FOSS cloud is better if you're a journalist, and avoid SSL_strip when accessing your own cloud/servers.
Replies: >>2039
JSchan doesn't actually give IPs, just IP hashes.
I would assume the harder it is for a phone to root, the harder it would be for them to do anything with it. I had a Galaxy S4 that was fairly easy to install TWRP on and root (it could've taken a much shorter time but it was my first time doing it), now I have an LG V20 that took two full days to root and required using both Windows-based community tools and a custom-made Linux distro to flash a different firmware version. I can't even remember the last time I saw someone else using an LG phone so I should be good anyways implying I'm ever going to leave the country or even the state anytime soon
Replies: >>2040 >>2048
>implying they have hands on official rooter
Vendor's repair department have their "recovery"(ring 0/jtag access) tools. Some phone hacking services have already figured it out and are selling them.
>octopus box
>miracle box
Replies: >>2048
Journalists should either use those secure HTCs or Sony.
>LG V20
There is an official TWRP image so it might be included, the hard part is usually only unlocking the provider lock but LG isn't that great.
There's also a possibility of shortening unlock wait times by using hydratool server.
At that point, the best measure would be putting tamer resistant tape, and unironically destroying your microUSB port if you have removable batteries, or using a tampered charging-only microUSB board. Maybe a sound alarm when it detects data transmission might work too or a phone case with sound alarm, but there's no stopping them from just confiscating it.

da17c487ae927ffb34892e5e273fd1207e24063b62f08e7fd584a910fb9b3caa.png (u)
[Hide] (257KB, 474x355)
>For a few hours today all v3 onion addresses on the Tor network were down. This appears to be a new kind of attack which affects the entire network and involves overloading the consensus authority nodes.
>You will currently not be able to access any v3 onion addresses, what is happening is unknown, but it is potentially a huge attack on the entire network. Earlier today I made a post outlining consequences I would be putting into place to deter markets from funding DDoS attacks against each other, as the potential to scale and completely kill every node on the network is a very real potential outcome. Now everything is down and I have no idea if this has sped up the process of this occurring or if it is even an attack at all, all I know is, this is big.
>Reddit post by u/hugbunt3r This attack began after Dread forum owner, HugBunter made a post stating the consequences for market owners who continue to attack rival markets.
>The recent/current attacks on multiple markets have been troubling after we’ve all had a good break for some time and things started to heal and become stronger.
>We’ve now had large scale attacks hitting the likes of WHM, DarkMarket and apparently some other services, although I cannot really confirm any others.
>I’d like to outline the main issues with this here. Firstly, /u/Paris and /u/mr_white ‘s work on /d/EndGame has been amazing and has allowed us to all have some really good filtering processes to limit malicious traffic from hitting the application layer and dropping their connections for v3’s where possible. Along with our collective knowledge of the attacks since February 2019, we have some very solid configurations that allow us to scale enough to stay ahead of the attacks and continue scaling alongside it. This is the absolute best protection we as service operators can currently provide and it works, but at many costs.
>We’re not really any closer to seeing a Tor PoW implementation that will seriously improve the situation, but the position we’re in with our own developments is a hell of a lot better than when this all started. There are things I haven’t disclosed publicly because of the potential for abuse, but a lot more worrying things have come from these attacks, costs that aren’t of the monetary kind. The seriousness of the attacks’ will probably become clear at some point. Consequences for Markets
>Consequences for Markets I am aware of at least 2 markets that have paid for attacks against other markets within the last few weeks. I also know of one wishing to pay for retaliation attacks.
>This behavior from market admins is absolutely unacceptable and it will not be tolerated. You have [b]no idea[/b] of the ramifications this has, it is way beyond just taking your competitor offline, inadvertadly, but you are causing a problem that is a great deal worse without even knowing it, if market admins wish me to disclose these other issues to them, they can contact me directly and you will soon rethink your poor business strategy.
>– From here, there will be extreme consequences for any Market admin found to be funding attacks against any other service, market or not. You know who you are and I won’t publicly out you here for it, for the time being.
>Any Ads/other promotional material will be indefinitely disabled You may have your Subdread banned You will be delisted from Recon You will be delisted from DDF Most importantly, your own service will be attacked. This is where it ends, I’m not sitting through another storm of attacks.
<—–BEGIN PGP SIGNATURE—– iQIzBAEBCgAdFiEEYTOs4fS4fFHb8/6l6GEFEPmm6SIFAl/5pNwACgkQ6GEFEPmm 6SIJWA/+M0KfiK5D4T9D3ELwqtAHRBjU8cPqP1yxMYmoZrnZPKO81SuP+fH59xMj XtQn01rIPmRwuLntitf4zGo05LvPWBu8eDErLw4va9yqZtcBVKpP7Jaj+pr8vuRx XgqBA+bdcYpESHs1dzl10HVmeDe2dT7QuuJk63sohw9xf+31wgp9TI2wr8VM48Sv enbO9UUf+dHOajHqmbvNbUOIcf6EPcIUgCA/iedm5WhUfKDOt1AHK4xLYJA7Mmbz 7Y+vCBbPitx0kGMth/xWUsvKWhHeTsv/eSAlsbxmMaVQ4S7zJqJKvHAjxpxT1ZDG lNZqGAH5E4geylibg/mfntJmo4bIg62jQTCT3/kd9Q4ZNWp84Y6FXq55kTTIzrZt ii5Q5wdSIAtUG+mk7gKsPSO2vgvh7TIh8Y6LYg89xvCV1kS9SHC6d2bTiRDqJH7F qo/+qf3ml4jgYqSv4rJIZ7NqmJVGRqQpMMwHxp8zUZyW0ArmE78nTf9I3rRRvaJN OiPnCXDi1i/gK3TrwHOrek4VXhqT+VRBAbUWUPCu1i0IHsfJv3UKgDYLRP2S8x6q A9ed97mTwqNnIKxrXOozvvfE5CJj/N+6Mfu5Q9+3mFNI9FRQtTmoWSpzxrZZdozx nbexW83LKN/b6/zu+KRE/uaabDLg8kvdE/iRiYYAR6gzHlDlHPk= =wZW1 —–END PGP SIGNATURE—–
>An explanation of the attack from Paris, the co-admin of Dread.
Message too long. View the full text
14 replies and 1 image omitted. View the full thread
Replies: >>1104 + 2 earlier
Seemed brief this time. Hopefully it doesn't become a large attack like last time.
>>781 (OP) 
Use I2P, Lokinet or Freenet instead of Tor.
Replies: >>1754
Tor died when the original silkroad did. It's just government run bullshit.
Are there visit-worthy websites on any of these?
Replies: >>1769
Do your own research on dark.fail

mousewalk_daneshs.gif (u)
[Hide] (186.1KB, 350x358)
hi... i guess this is considered computing? taking animation from my favorite animator toniko pantoja (credits to him pls let me know if it is not okay to post i ll remove)

his walk cycle is so balanced and i always made walk cycle that is kinda 'sliding' or 'limping' unconciously and somehow fixing it alot of time doesnt help

i suppose this is cause i dont know how to fix it too so i wonder how do you make it balanced and good? like what do you need to consider to make the good animation? things like center of weight or baseline , where are those and how do we mark them properly?

i look to make straight ahead animation that are always correct so i guess preparations before hand is everything?

6 replies and 1 image omitted. View the full thread
Replies: >>1396 + 2 earlier
Please reuse threads as much as possible.
Moving to >>1386 (OP) 
Replies: >>1405
im using it am i
Replies: >>1406
Disney_12_Principles.pdf (u)
You tell me, Anon. Does it help?
Also, quite a good demonstration of all 12 principles by a professional.

Cmk-ISO-CurlAWide_90d-FShui.png (u)
[Hide] (55.5KB, 812x226)
I am currently using Colemak CAWS. It is the best currently available keyboard layout for ANSI/ISO column staggered keyboards. If you're a split/ortholinear chad then DHm is enough.
4 replies omitted. View the full thread
Replies: >>1570
Your fingers move less and stay on the home row most of the time.

Here's the info you need: https://colemak.com/
Replies: >>1552
1c307391ae78a2e5c6e714859f0ef4b7f5582727269313123e96976a23824f85.png (u)
[Hide] (72.3KB, 279x279)
at last I truly see
>my fingers move less
No they don't, you still move you fingers laterally, moving your arm more doesn't matter
>>1525 (OP) 
Just use QWERTY its the standard.
I have a .txt document with a few 104-key layouts I'm reminding myself to try someday.

Dvorak, normally.

  kyu." zlmdpv
  rieao hnstcw
  x*?,/ jqfgb

Why doesn't someone reprogram their keyboard with the above, and let us know how it compares to dvorak, or I guess colemak, etc?

I will too. Someday.

laura-ockel-RoZWxeFL27k-unsplash.jpg (u)
[Hide] (153.3KB, 640x966)
Title gives my conclusion from empirical events I witnessed and inside info. PSP runs on the same circuit, but isn't the backdoor per se, which has been around for much longer.

The same way AMD was able to change the crypto algorithms for the Zen chip they licensed to China, they can change how the CPU behaves at any system, even those already deployed. This can also be used to sabotage any program or computation, making BadBIOS vastly nastier than Stuxnet.

American military made a grave mistake to partner with the morons of the Brazilian military, who are letting knowledge of this spread like a fire (and misusing it for petty profit and inside jobs to justify a police state). Israel, UK and France also have access, but are much more professional.
1 reply omitted. View the full thread
Replies: >>1538 >>1585
laura-ockel-RoZWxeFL27k-unsplash.jpg (u)
[Hide] (153.3KB, 640x966)
Title gives my conclusion from empirical events I witnessed and inside info. PSP runs on the same circuit, but isn't the backdoor per se, which has been around for much longer.

The same way AMD was able to change the crypto algorithms for the Zen chip they licensed to China, they can change how the CPU behaves at any system, even those already deployed. This can also be used to sabotage any program or computation, making BadBIOS vastly nastier than Stuxnet.

American military made a grave mistake to partner with the morons of the Brazilian military, who are letting knowledge of this spread like a fire (and misusing it for petty profit and inside jobs to justify a police state). Israel, UK and France also have access, but are much more professional.
Replies: >>1538
Russian_Chicken_of_Lacking_Evidence.png (u)
[Hide] (32.8KB, 899x547)
>dude trust me
Duplicate thread.
You can bump, but don't make duplicates.
Moved to >>1509 (OP) 
/x/ the /tech/ thread.
>>1509 (OP) 
>what is network monitoring and DPI?

PinePhone-3.jpg (u)
[Hide] (129.9KB, 1024x1024)
pinetab_KB_P64_UT_2.png (u)
[Hide] (1MB, 1220x945)
PineTime_leaflet.jpg (u)
[Hide] (122.9KB, 745x731)
Cube.png (u)
[Hide] (1.5MB, 1611x1539)
librem-5-side-angle.png (u)
[Hide] (748.7KB, 1920x1080)
I think it's worth having a thread about ARM linux as it's on the verge of becoming viable in phones and mobile devices. Discussion around whether or not this hardware is or will ever be worth actually buying is important. I understand that a lot of the PINE64 hardware is explicitly not consumer ready, but I've seen some videos of the recently officially launched Librem5 that shipped the product with a fucked screen protector that wasn't applied properly, and that's a fucking $800+ device. I'll try to get around to making a webm of it.
11 replies and 7 images omitted. View the full thread
The ARM ecosystem is traditionally cucked. Each ARM soc does things differently, because they are designed usually for specific applications and boards. There is no BIOS or UEFI, vendors typically provide you with a non-mainline patched u-boot blob and binary kernel and that's it. Many chips don't have sata and pci-e, have particular memory timing requirements (so no "common" ram sticks for you) and other shits to cheap out as most as possible.
I was looking for the ultimate blobless libre SBC and it's either too expensive or not completely free.
On the software side. If you are lucky enough to have most functions works on mainline kernel, Gentoo solves most problems.
out.png (u)
[Hide] (5.1KB, 640x480)
All my computers are ARM now.  This is my main one, a cubietruck with A20 SoC, 2 GB RAM, SATA, VGA, 1000M Ethernet.  It doesn't need any special firmware blobs for basic operation.  I don't use the OpenGL stuff at all, and I boot it with /dev/fb0 at 640x480.  I don't use Xorg, unless I have to, but I don't like to.  I mean I really, really, really don't like GUI shit at all!
What else... it's Ubuntu but I use busybox for init instead of systemd.  I use Ubuntu (actually Armbian), because it already has all the necessary drivers, including the NAND flash.  I have Linux installed to the sata HDD, and also a separate install on the microSD as a backup, and also on the NAND flash as a third backup.  It was a bit of trouble to get the NAND formatter properly, and eMMC are probably easier to work with.  Also newer kernels don't have driver for this NAND flash, so I'm stuck on this old kernel.  But I don't care really.  I don't run any network services at all on here, and don't run any javascript browsers locally.  It's still a mainline kernel though, and so is the u-boot.  I chose this board carefully to avoid blobs and fulfill my needs.  I doubt it would suffice for most people.  I'm not most people.  I don't like modern computers at all, and in fact I'd rather be back in the 80's on an 8-bit micro.  So there you go.
Replies: >>1413 >>1426
Cubietruck was the only A20 with 2GB ram. But it was hard to find and is expensive. I ended up on Olinuxino a20 lime2. 1GB ram is one of the main performance bottleneck other than the slow CPU.
Wayland works much better with mainline lima.
How much did you pay for a Cubietruck? An i.mx6 Wandboard looks better for the same price.
Replies: >>1429
catputer.jpg (u)
[Hide] (46.9KB, 700x475)
100 euros, pretty much.  That was back in 2018 though, when you could still find them easily.  Now most of their distributors are out of stock.  Well I guess there's NewIT in the UK, but they don't sell just the board by itself, they want to sell you also an ugly metal case, battery, and SSD, none of which I have any use for.
Anyway I don't want to spend money i.mx6 or any SoC with processor that does speculative execution.  That mostly leaves only Cortex-A7 and A53 (plus older ARM stuff and microcontrollers), but there's enough choice of SoCs built on those to do what I want.  I have this A20 board, and an Olimex A64 board with 2 GB RAM also that I reserved for running subversive garbage like Firefox.  That way the nasty shit stays contained in a controlled environment and doesn't affect my main computer.  I don't like or trust VMs also.  Since the hardware is cheap (100 bucks or less for a board), I can simply buy as many as I need.  But right now I only got these two, and also a tablet (with A64 SoC and 1 GB RAM) that was gifted to me.  I haven't used it because it's Android...  I'll probably convert it to Linux eventually, but will need to open it up to access the UART.
All of this leaves the question: who bought up all the damn cubietrucks? Clearly nobody wants them, except for freaks like me who prefer a slower, simpler system.

hero_phone.jpg (u)
[Hide] (63.8KB, 567x436)
I2P can import/export reseed files. Yggdrasil pretty much requires that you manually specify peers to connect to (for the first hop, anyway). ZeroNet will work with pretty much any tracker you throw at it. What does Tor have if the indexing servers and dirauths go down?
how is that tree flying
If the last attack on V3 onions has shown anything, it's that nothing aside from this exists and everything will disappear if something permanent happens to the main infrastructure of Tor.
Tor's design is defected.

Only several authorities servers' down causes the whole network's down!

Tor-chan.png (u)
[Hide] (545.3KB, 1280x1515)
When Tor Browser accesses to a clearnet site, how it knows whether or not it has a .onion address?
2 replies omitted. View the full thread
Replies: >>1133
>except by looking on the clearnet
Find a hidden service that aggregates known onion addresses I guess. There's no way to discover onion addresses other than someone posting about them somewhere. They're called hidden services for a reason.
>>1103 (OP) 
This shouldn't be in it's own thread. The answer is that the header provides an 'onion-location:' tag, as this anon indicated. >>1106 It's from the source, not the browswer, and btw you don't need Tor Browser to read this (or any other tag). Just read the header itself with any suitable program (cURL, for example). Next time, put something like this in QTDDTOT, OP.
Replies: >>1134 >>1135
BO/Mods can move posts and threads into other threads relatively easily if necessary.
My opinion of *TDDTOTs has soured, as it had with generals. I find them to be stifling. There's no ephemerality, no chance for bad threads to be pushed off the board as good threads rise. I dislike how they encourage obsessives to backseat moderate. It puts more control for shaping the atmosphere into the hands of the moderators.
anyway, tor-chan has a cute face!

Ricochet Refresh is what you want.
It's fork of Ricochet (now abandoned) which was an alternative to TorChat.

About Ricochet Refresh

Ricochet was launched in 2014 as a different approach to instant messaging that doesn’t trust anyone in protecting your privacy.

Ricochet Refresh uses the original Ricochet open-source software but has improved on it substantially, such as upgrading its security and making it compatible with Tor Onion Services v3 instead of the older v2.

We believe software like Ricochet is important to protect freedom of expression for whistleblowers, activists, and journalists worldwide.

>instant messaging
>for whistleblowers
Choose one. The sheer amount of metadata instant chat generates is enough to fuck you over.

Show Post Actions



- news - rules - faq -
jschan 0.1.7