/cyb/ - Cyberpunk Fiction and Fact

Cyberpunk is the idea that technology will condemn us to a future of totalitarian nightmares here you can discuss recent events and how technology has been used to facilitate greater control by the elites, or works of fiction


If you want to see the latest posts from all boards in a convenient way please check out /overboard/

Name
Email
Subject
By clicking New Thread, I acknowledge the existence of the Israeli nuclear arsenal.
Comment
0
Select File / Oekaki
File(s)
Password (For file and/or post deletion.)

1663439394489339.jpg
1663496647561833.jpg
1663512214577400.jpg
1663511907707470.jpg
1663513156921546.jpg
Cyberpunk: Edgerunners
Anonymous
No.1746
1748 1784 1995
>No Edgerunners thread
How did you enjoy what was unequivocally the best anime of 2022, /cyb/?
I personally loved it. True to the aesthetic, great dystopian/tragic theme, a compelling story, and spectacular character design.
65 replies and 54 files omitted.
Anonymous
No.3440
1725429255239732.png
1725455075911150.jpg
1725457568081813.jpg

Anonymous
No.3441
1725441618444776.png
1725453003478414.jpg
1725453199790411.jpg

Anonymous
No.3487
3488 3489 3491
image.png
image.png
image.png
image.png
moar like cyberponk, amirite guise? amirite?
Anonymous
No.3488
>>3487
Kek
Anonymous
No.3489
1730728263997315.png
>>3487
Anonymous
No.3491
>>3487
This reminds me, I think there was supposed to be some cyberpunk inspired pony rpg years ago? Do anyone know if it go completed or died the development hell of patreon?

IMG_7765.png
Post In This Thread Every Time You Visit /cyb/
Anonymous
No.3393
Last one hit bump limit
29 replies and 26 files omitted.
Anonymous
No.3457
3458 3486
IMG_20240912_221328.jpg
IMG_20240912_221337.png

Anonymous
No.3458
>>3457
I've got the first one, but the second requires advanced calculus to get it.
Anonymous
No.3471
3472
Stealth_20241007_111956.png

Anonymous
No.3472
3457533__explicit_artist-colon-trmk2_applejack_oc_oc-colon-anon_earth+pony_human_pony_g4_anatomically+correct_anus_applebutt_big+clitoris_butt_butt+only_clitora.jpg
>>3471
this is fully capable of becoming reality
Anonymous
No.3473
1728343641998630.png

Anonymous
No.3486
image.png
he has a dream that some day you'll replace the batteries in your smoke detector.jpg
where the bad meme touched you.jpeg
>>3457
I know this is a thread for le ebin-est of ebin memes, but--well, maybe I'm autistic and retarded. I thought the Copenhagen Interpretation was "The map is not the territory. We have not the faintest idea what is happening down at the quantum level. We do have these equations that seem to give usable predictions, if only statistically. What this means is unclear and possibly unknowable."

But here. Memes.

1730719541290568.jpg
SCIENTISTS CONFIRM BATS AREN'T BIRDS
Anonymous
No.3479
3481
https://phys.org/news/2024-11-comparison-bird-wings-reveals-evolutionary.html
Anonymous
No.3481
3482
>>3479
Wasn't it known for the last 30 years at least that they are mammals?
Anonymous
No.3482
>>3481
We've known since the late 1700s, but we are starting over now so women and niggers can discover everything.

csm_sec-consult-h-kaminsky-poison_c3cc60f8fb.png
Google, Cloudflare & Cisco Will Poison DNS to Stop Piracy Block Circumvention
Anonymous
No.3368
3370 3474
>A French court has ordered Google, Cloudflare, and Cisco to poison their DNS resolvers to prevent circumvention of blocking measures, targeting around 117 pirate sports streaming domains. The move is another anti-piracy escalation for broadcaster Canal+, which also has permission to completely deindex the sites from search engine results.
https://torrentfreak.com/google-cloudflare-cisco-will-poison-dns-to-stop-piracy-block-circumvention-240613/
Fucking European bullshit laws, dragging us all down because corporations appeal to the lowest common denominator.
Anonymous
No.3369
>Fucking European bullshit laws
It's just the french. They are the Western Europe of Western Europe
Anonymous
No.3370
2815677.png
>>3368
"Piracy is a result of bad service." "By focusing on the customer and doing useful things for the customer piracy really becomes a non-issue for us." - GabeN.
Ahoy me swashbuckling horsefuckering saltybasket weaving fellows, they dun did fuck up.
As a regular viewer of fuck ups around the world, this is a nail in the coffin. By making their shit even worse they're seeding the failure of a soon harvest.
Like any venturing capitalist who can tell shit from shiny treasures they dun made an opening.
A legal way to overtake hon hon hon land with market strategies and branding!
Extract the resources from freenet and spin a new ship called Pon-Enet, a pi here and there, a hard or soft connection bridging wide areas a tiny dash of math and suddenly you're almost a mega corporation on a shoe string budget.
It's almost highway robbery with the opportunity they've dropped.
Though they've taken a side in a nigh mounting civil tensions for they'll do more than just remove illegal operations.
They've forgotten the human part of humanity, they've blinded themselves with their own so called intelligence and intelligences that once long ago there were balloons, and streamers, and parties.
Why does she have hidden balls for ball related emergencies?
Pinkaponk in either knowing or not had them in either case.
Arrrrg, Riddle me this which letter is pirate Pinkie's favorite.
Delivered. Yar this sentence is space filing measures to reduce inferences.
Anonymous
No.3474
>>3368
worse, they even redirect legit torrent sites to malware sites, if not worse honeypots.

tiaraphone.png
Silver
!Spoon/CYj.
No.3462
Many people feel like their smartphones may feel like indispensable lifelines, connecting everyone everywhere in real-time, but can you trust it? I never did. As reliant as we are on these devices for everything from banking to personal communication, the GSM network, along with its successors from the 3G that emerged almost 20 years ago already, now 4 and 5G carries with it a number of critical flaws that hackers or (especially) governments can easily exploit using tools. Tools which I confirm being readily available on the dark web. We always knew about the flaws of GSM being left in place to facilitate eavesdropping. Now it’s not about just listening but using a phone to deceive or intercept information, and it’s easier than anyone thinks.

Here are some definitions. Regardless if it’s some Nokia or Ericsson brick or the newest Samsung Galaxy S30, mobile phone’s identity on the network are two crucial pieces of data: the IMSI and the IMEI.
>IMSI: (International Mobile Subscriber Identity)
This unique identifier ties a subscriber to your SIM card and mobile network, see this as the phone's IP, or a code allowing the network to recognize and authenticate the user. However, an attacker with the right tools can spoof an IMSI, essentially tricking the network into thinking they are someone else. This opens up the possibility of interception, call hijacking, or even location tracking.

>IMEI: (International Mobile Equipment Identity)
Similarly, the IMEI is a unique code that identifies your physical device. A bit like a MAC address. Just as with IMSI, software available on the dark web allows an attacker to spoof an IMEI, making it possible to assume the identity of another device, evade blacklists, or bypass security features designed to lock lost or stolen phones.

The creepy fact is that spoofing either of these identifiers isn’t theoretical; it’s shockingly easy if you manage to get the right software, although requires know-how since it’s mainly based on command line. It’s trivial to alter these identifiers and launch attacks on mobile networks. Hackers are out there exploiting these flaws, and most people don’t even realize how exposed they are.

SMS and roaming vulnerabilities with TPDUs

While many people assume that SMS is a secure form of communication, it’s actually a relic from a time when security was an afterthought. I mean I'm trying to resurrect an old pager for fun and sending ASCII codes via radio to it. The GSM standard is a bit like pagers, relies on something called Transfer Protocol Data Units (TPDU), which handle the sending and receiving of SMS messages and more. These messages pass through a series of vulnerable network components, each one a potential point of attack.
The handshake process, where the network authenticates a roaming phone, is particularly vulnerable. Hackers can intercept these signals during the handshake and manipulate them, giving them access to your phone. Once they have control over the TPDU, attackers can not only read SMS messages but also modify or send spoofed messages as if they were the legitimate user.

What’s worse is that this flaw isn’t limited to domestic attacks. When you roam, you’re more exposed because your phone relies on SS7 to communicate with foreign networks. This outdated protocol is widely known for its insecurities, allowing attackers to intercept calls, read messages, and even track a device’s location across the globe. For hackers who know how to exploit this, roaming opens up a world of potential targets.
Let’s imagine a theoretical scenario: Voice spoofing. As if the vulnerabilities in GSM and SMS systems weren’t enough, we’re now facing a new kind of threat: synthetic or altered voice attacks. Imagine a scenario where a hacker has spoofed your phone number using one of the techniques mentioned above. They then use some AI voice synthesis software to impersonate your voice or the voice of someone you know.

For example, a hacker could call your family or coworker, and using some AI-generated voice based on some samples, say something like: “Hey, it’s me. I’m in trouble and I need you to send me money. My phone is broken, so I can’t text. I'll pay you twice, you trust me bro” This type of scam is already becoming a reality with fake SMS which dumb people fall for. In fact, a friend of mine recently received a fake message that said, “Hi mom, my phone is broken, I need money.” It’s only a matter of time before these attacks become widespread. These attacks are common from Nigeria, Gabon, Mali etc. since it’s a common scam, now with the same number and a voice, I assure you 100 % of the people will fall for it if it's done right enoug.

With the ability to clone voices, fake phone numbers, and hijack SMS messages, you see where I'm going. It was not an issue a while ago but with machine learning being more and more accessible and these exploits at the fingertips of manipulative beings, it is about to happen, if not, already been used. Your phone is becoming a tool for sophisticated attackers to manipulate and deceive, and the terrifying part is that most people are completely unaware.

It’s hard to call these devices “smart.” Sure, smartphones are jack of all trades, GPS, media, gaming all that crap, but when it comes to security, they remain the same as dumb phones unless you use some enterprise's VPN or some VOIP services and messaging, a bit like those on Blackberry's BES, now there's similar solutions, even Whatsapp or Telegram. But no standard.

They operate on networks built decades ago with virtually no thought for the types of threats we can get today. Despite the introduction of newer technologies like 5G, which also have vulnerabilities since it’s essentially IP over radio, the underlying architecture remains flawed. Basically the frequencies and spectrum changed to have more bandwidth but the secu remains the same. You can have like, a banking ‘app’ that is secured as fuck yet rely on the SMS verification.
Silver
!Spoon/CYj.
No.3463
3464
eeeeeeee.PNG
Today we can grab some cheap talkies/radios which can use digital voice encryption with AES256 or even RSA out of the box, to cope with the exploits on Motorola/Icom/Kenwoods which came out a while ago, it's cringe to see overpriced phones do not come with better security features.

Solution? End-to-end encrypted VoIP services like Telegram, Matrix, Signal or even fucking WhatsApp which are pleb crap really but ironically offer vastly superior secu and privacy, but they are not yet the default mode of communication. There is no plan for a successor of the classic GSM cellular protocol for phone comm, like we're doomed to rely on outdated infrastructure, the SS7 network and GSM/TDMA/CDMA infrastructure and handshakes which keep its roots from the early 90's that leave us open to attack.

Sure you have a PIN, a password, fingerprint lock and even face recognition, what’s the point if it’s not properly secured behind? The device can be secured, sure, but when it’s in the air it WILL be vulnerable. Those are false senses of security, even if stolen you may want your phone to be a brick rather than used or accessed. People keep their entire lives on their phone, and it is getting worse as everytime you need a service, like insurance, banks, etc, some administration incites the users to install an app of some kind on their shit.

I’d just conclude again with smartphone might just be the least smart invention. It’s time we stop assuming our phones are secure just because they are expensive or branded with the latest technology. The reality is much darker: your phone is one of the most vulnerable things you own, not just the plethora of google services datamining the users, or the open mic, or location services collecting data for analytics, and I assure you none of the manufacturers will do a thing to anticipate the security of the existing phone network.

Everything should be redone from the base of the topology to the user layer. Even keeping the current equipment, antennas, phones. That's not a hardware issue, but the way the network is made that's the real issue. I trust more the IP and WiFi handshake than the GSM and its numerous iterations.

What would be the idea then? Fight with the ITU, raising awareness on something but usually it will be taken after shit happens. Start a private operator that provides trust in the network. Data only, then eventually VOIP. the SIM card should hold a key and establish a handshake with certs. then you have a lease when you connect to a tower. Let's just go with the blockchain, so every packet transmitted is secure, no GSM or UMTS layers, once the physical is made, even say a company or some military or bank protocol can communicate with anything, not necessarily IP. Maybre IP with gateway then you do what you want, but that's the base of secure comms we should expect.
Anonymous
No.3464
3465
>>3463
If you trust gigacorp Inc, Apple offers E2EE for iMessage
The rest seem to be some degree of honeypot or borderline unusable
Anonymous
No.3465
>>3464
You mustn't expect any privacy using an Apple terminal but ok, even crypticirc had secured chats for decades.
Anonymous
No.3466
3467
Thanks for this post, I really enjoy the more technical you get into.
What kind of equipment is needed to spoof a GSM or CDMA key?
I've hyped matrix quite a bit, as there really isn't anything better and offers the maximum amount of freedom because its just a protocol not attached to giganiggers like IBM, Verizon, Microsoft, or Apple.
Silver
!Spoon/CYj.
No.3467
3357636.jpg
>>3466
essentially, an electric computer on linux, and software.
https://securityaffairs.com/47179/hacking/hacking-ss7-protocol.html

other stuff to read about a ss7 attack
https://www.firstpoint-mg.com/blog/ss7-attack-guide/
cause yes, 4g and 5g uses Diameter protocol, but also still embeds legacy/ retrocompatibility to SS7 protocol. hence the idea of having a complete rethink of mobile telecoms.

also recently there's been a vid, even if I think linus is a fag.
https://youtube.com/watch?v=wVyu7NB7W6Y

tay-picture.jpg
Technology and Science News
Anonymous
No.180
191 205 211 1292 1332
Good news! AI is racist as fuck.

http://www.livescience.com/58675-artificial-intelligence-learns-biases-from-human-language.html

Archive
https://mlpol.net/archive/mlpol/13081.html

What are you doing to make pony waifus real
https://mlpol.net/archive/mlpol/11399.html
121 replies and 89 files omitted.
Anonymous
No.3447
3450 3453
foldable.jpg
New revolutionary Chinese phone.
Four million advance orders for a $2800 phone in three days. The Chinese market has collapsed. Western companies can safely stay away.
Black market price already over RMB 90K ($12,641)
4 million pre-order with an estimated 60-100K initial batch available
https://x.com/XH_Lee23/status/1833435764895715798
Anonymous
No.3450
3451
>>3447
>revolutionary
How though? What new technologies does it utilize? Multi+Folding screen phones have been out for a while now and they're generally regarded as dysfunctional and fragile with no practical applications found for the added screens or flexibility. Every other spec listing from the (uselessly) high megapixel optically stabilized camera to the multi gigs of RAM are common on enthusiast phones from all other manufacturers.

The fascinatingly dystopian swing to the ordeal is that a hundred million Chinese and Indians are in a rush to finance such a device for it to only be used to scam Westerners out of the digital currency, which we all know is what the dual SIM is for.
Anonymous
No.3451
3454
>>3450
>multi gigs of RAM
Is 16gigs a lot for phones? Kek
Anonymous
No.3453
3454 3459
>>3447
idk, seems to me tech is just sort of out of ideas. They have been for awhile now. That's why they've transitioned from making genuine innovations and improvements to just grafting new novelty features onto devices that are already about as functional as they're going to get. Like a bendable screen is pretty cool from an engineering point of view I guess, it's neat that they figured out how to make that work. However, I can't say I've ever been in a situation where I find myself saying "gee, this task would be so much easier if only I could bend my phone in half."
Anonymous
No.3454
>>3451
The thing is, there is NOTHING that the phone does out of the box that needs that much ram. Any recent smartphone has an APU or separate GPU with its own VRAM that handles UI and camera processing. It's as if the gigs are piled on only to give tards more time before whatever virus app they installed starts slugging their phone with backloaded ads. It gives poos more leeway to make their shitcode worse. And last I read the ram in newer Samsung phones has a 2004-tier bus speed, something like 830mhz.

>>3453
>idk, seems to me tech is just sort of out of ideas.
There's a lot of neat stuff out there that would add novelty and function to phones. The technology behind the 3DS screen for example has been made so much better in the past 14 years. Multiple cameras is already the norm on phones so they could move one to the bottom and suddenly we have a 3D camera. That would streamline using phones as quality VR headsets, especially with cheaper Samsung tablets now using 120+ screen hz. 3D capability could put phones on the map for having exclusive game titles actually worth playing. The phone could be a rangefinder with that tech and also make 3D scanning of objects and places more efficient which would contribute to every industry reliant on that. But of course, the technology is held up in patent purgatory so nobody is allowed to do anything with it unless they convince the holder to share its usage (through billions in upfront payments followed by royalties).

Patents pin technological development to the cross. Even stupid shit like modern phones not being able to use GPS satellites, instead relying on data bands, is because the idea of adding a GPS receiver to a phone is patented by some patent farm.
Anonymous
No.3459
>>3453
>However, I can't say I've ever been in a situation where I find myself saying "gee, this task would be so much easier if only I could bend my phone in half."
I think it is about real state aka how many pixels can be shown. To me it looks like a natural evolution from a tiny surface meant to show rich text.

1722884439937788.jpg
U.S. LAWMAKERS SEEK BAN ON CHINESE ROBOTS
Anonymous
No.3408
3413
Cite danger of Americans becoming reliant on CCP-controlled tech along with China's plan for world humanoid robot domination by 2027.
https://nypost.com/2024/08/05/business/chinese-made-humanoid-robots-raise-alarms-in-congress-stealth-army-on-our-land/
https://www.scmp.com/news/china/politics/article/3240259/china-says-humanoid-robots-are-new-engine-growth-pushes-mass-production-2025-and-world-leadership
Anonymous
No.3413
>>3408
I'm sure they would live to have an actual robot slave army to replace the current low+mid class, one of the main thing preventing them is they replaced all compatible Whites and Asians with fat black women and jeets with fake degrees so they would be 110% dependent on chinks """maintaining""" the robots.

1722871703401847.jpg
SUBSCRIPTION HARDWARE
Anonymous
No.3407
>you're really going to love paying a monthly fee to use your mouse goy, trust me.

PoweredByGNULinux.png
Linux Thread.
Anonymous
No.1050
1113 1135 1241 3358 298453
Post GNU/Linux related stuff here.
72 replies and 69 files omitted.
Anonymous
No.3279
zaqwsxc.jpg
>>3278
>OpenBSD
I'm getting good vibes.
Anonymous
No.3280
w4raetxfh.jpg
>>3278
>systemd
Anonymous
No.3281
Scr37.jpg
>>3272
>A backdoor in xz/liblzma tools
This a video from 3 years ago and reuploaded 3 months ago.
The guy prophecies exactly what just happened and wonders how many other sleeping backdoors are in the code.
>Jonathan Blow on the Problem with Open Source
https://www.youtube.com/watch?v=WGekWFxeD6c
Anonymous
No.3283
systemd.jpg
75.jpg
>>3278
>Do not ever install a distribution that relies on systemd
The awareness is growing fast, even among systemd fanboys.
https://github.com/systemd/systemd/issues/32028
Anonymous
No.3358
3359
>>1050
I recommend dual-booting Windows and GNU/Linux. Windows 10 and Windows 11 have CIAnigger backdoors (which is why they gave the update for free). You could just use Kubuntu or Xubuntu (avoid vanilla Ubuntu because it has Gnome 3) but I recommend that you pick EndeavourOS (or Artix/Void/Gentoo if you know what you are doing). You can test Linux with VirtualBox if you want to (VirtualBox can be used to make virtual machines).

Here is a quick guide:
1. Get a flash drive that can be nuked. The capacity should be 4GB or more.
2. Download the installation iso.
3. (optional but recommended) Download the file checksums (SHA256) and verify the iso using PowersHell: Get-FileHash Lunix.iso
4. Use Windows disk management tools to shrink a partition. This could be your C drive. Press WinLogoKey + x to get a menu where you can open it. Linux needs about 60GB or more.
5. Download Rufus https://rufus.ie/en/
6. Open Rufus. Select your device (your flash drive) and the Linux installation iso (press SELECT button). Click start.
7. (optional but recommended) Make Windows use UTC time internally. This does not change how time is displayed to you. https://wiki.archlinux.org/title/System_time#UTC_in_Microsoft_Windows
8. Reboot your computer. Press a key to open the UEFI/BIOS boot menu. Usually you need to press one of these keys: F12, F2, Del. The right key depends on your motherboard.
9. Install Linux! aim the installer to the newly reclaimed free space.
Anonymous
No.3399
>>1096
for being antiX
they seem to be using X11 a lot.

2024-06-10.png
Desktop Thread
Anonymous
No.3365
3366
Post your desktop

Rate others' desktops
Anonymous
No.3366
2024-06-10T23:01:38.png
>>3365
Very comfy! I like the colors, much better suited for evening work than what I have.
I WM-hopped a bit before but after using tiling WMs for maybe two years I'm back in my all-time favorite, FVWM.
bg: https://ponerpics.org/images/3062039
In case anyone needs a vector button:
ButtonStyle 5 Vector 21 25x25@1 35x25@1 35x45@0 45x45@1 45x25@1 \
75x25@1 75x35@0 55x35@0 55x45@0 75x45@1 75x75@0 65x75@0 65x55@1 55x55@0 \
55x75@0 25x75@0 25x65@1 45x65@1 45x55@1 25x55@0 25x25@1

Previous  [1][2][3][4][5][6][7][8][9][10]  Next