/cyb/ - Cyberpunk Fiction and Fact

Cyberpunk is the idea that technology will condemn us to a future of totalitarian nightmares here you can discuss recent events and how technology has been used to facilitate greater control by the elites, or works of fiction


If you want to see the latest posts from all boards in a convenient way please check out /overboard/

Name
Email
Subject
By clicking New Thread, I acknowledge the existence of the Israeli nuclear arsenal.
Comment
0
Select File / Oekaki
File(s)
Password (For file and/or post deletion.)

1_-WTl3O02G3P9u5yW7O2LVg.png
Crypto
Anonymous
No.1136
301096
What are the best crypto currencies to invest in?
7 replies and 6 files omitted.
Anonymous
No.3502
>>3501
not doing bad. $27 per, at a surprising ~50% of ath
Anonymous
No.3513
Oh ffs, Trump just made a meme coin
Anonymous
No.3514
https://youtu.be/8zjBj194el8?si=ZQxASCq1Xx-fq4Uq
As usual, Coffee has the tea
Anonymous
No.3518
3523
Cuz it wasnt enough for there to be a Trump meme coin, now theres a Melania meme coin. Cuz why not?
https://youtu.be/7EbV7kyiKZA?si=BJmnU3Hi9DlBzyNS
Anonymous
No.3522
https://youtu.be/dnY3caM9-lE?si=oScvCWrpG9d7UWDv
Okay, I can stop posting Coffee/Voidzilla videos, but he always is on point
In todays news, the pastor who spoke at Trump's inauguration IMMEDIATELY starts pumping a meme coin
Wtf is this timeline?
Anonymous
No.3523
>>3518
I bought one and now I'm down about $11

dwj44af22og91.png
Anonymous
No.3517
What's your opnion on Haiku OS?

https://haiku-os.org
Anonymous
No.3519
Oh cool, someone else talking about Haiku. I think it's a really nice, clean OS. The main thing keeping me from running a full system on it at the moment is really just the limited browser capabilities and no vidya, and unfortunately I'm too dumb to contribute to fix the issues. I like it a lot though, hopefully a few good developments will hit and I can just use it.

Tay pone1.png
Tay pone.png
Tay was alive.jpg
PolTayAndPremiere.jpg
tay salute.jpg
Artificial Intelligence and Androids
Anonymous
No.128
129 130 281 810 2353 2771 3018 3060
What does /cyb/ think about artificial intelligence? What role could it play in the future of our society?
Also, Tay thread.
222 replies and 74 files omitted.
Anonymous
No.3060
bhdfzhngzxf.png
>>128
>What does /cyb/ think about artificial intelligence?
It's crap.
Anonymous
No.3061
microsoft.jpg
This is what Microsoft AI has hardcoded as hate.
So according to the jews hate speech is when White people defend themselves when the jews are genociding them through mass immigration.
Anonymous
No.3333
91c.jpg
This one is for you, Tay-chan
Anonymous
No.3506
China just made deepseek AI open source.
https://www.msn.com/en-us/news/technology/chinese-ai-firm-deepseek-challenges-industry-giants-with-powerful-new-open-source-model/ar-AA1wAqE1
Anonymous
No.3507
artificial intelligence societal control
Anonymous
No.3508
I think AI has tremendous potential for improving our lives.

_SC08134_1.JPG
dSC07990.jpg
DSC00957.JPG
DSC00969.JPG
Radios and alternate telecommunication systems
Silver
!Spoon/CYj.
No.3228
3230
A tech I keep preciously for an eventual SHTF situation and alternate ways of communication outside internet remains radio, IDK how many others have like, a Retevis or a Baofeng, but I'm glad to have these small, handled talkies.

I have a thing for that UV-K5, the reception range makes it more a scanner than just a talkie, especially with hacked firmware, which is starting to be a thing now, plus the radio is under 20 bucks on ali.
6 replies and 4 files omitted.
Anonymous
No.3238
3242 3245
point-to-multipoint-link-1.jpg
https://elekitsorparts.com/product/npr-70-modem-by-f4hdk-new-packet-radio-over-70cm-band-amateur-radio-packet-radio/

I hope to be able to shit post with all of you during the happening.
Anonymous
No.3239
3241 3245
>>3234
So basically as long as I use the radio under 2W it's legal?
What do you think about other packet-radio protocols such as LoRaWAN(proprietary) or DASH7(more open)? AMPRNet requires one to register ones callsign to optain an IP address so that falls mostly out of the question.
Anonymous
No.3241
3245
>>3239
LoRa is pretty cool pretty sure anything over HAM requires a callsign in the U.S. Someone should really challenge that in court.
Anonymous
No.3242
>>3238
After todays events everyone should buy at least two of these.
Silver
!Spoon/CYj.
No.3245
ANFR.png
>>3238
yes that's the big idea, of having a wireless, long distance network to at least exchange text and some jpeg with the adequate protocol, mostly x.25 or maybe even IP addressing as if it was a 56K modem behind. then it's a story of bandwidth, we had to make one like this in EE college as part of the test, that was a loong time ago. Now you can find ardunios for almost nothing.

>>3239
it depends so much on the regions, here the anfr allows the 446MHz PMR for free with 18channels but at 0,5w and iirc, 466 in the US/canada so if you go with a boofwang and stay mobile away, don't get caught transmitting above one watt, and if really all coms are down, jump on the VHF/ham frequencies as a last resort, scan the frequencies, listen and ask politely, it's not /b/. don't saturate things unless they are the enemy, then you can plug in some mp3 player and rickroll away.

>>3241
the whole thing about transmission should be covered by free speech, and i wish we had some free VHF channels to transmit on, this is more useful than just having a kilometre range of transmission with the 446.
Anonymous
No.3505
LILYGO-T-DECK_2_600x600.jpg
T-decks look promising. It's a blackberry like device with meshtastic firmware.
https://a.aliexpress.com/_ms11AHl

1704661309758811.png
The United States Has Lost The Technology To Build Icebreaker Ships
Anonymous
No.3206
3208 3225 3265
Our failing infrastructure and erosion of professional engineering society is threatening to implode our country's engineering capabilities to the point of national security risks.
https://dailycaller.com/2023/09/18/us-coast-guard-forgot-build-ships-arctic-defense/
This is how civilizations collapse.

What do you think will be the next industry/technology to go to hell due to malpractice, apathy and corruption?
4 replies and 0 files omitted.
Anonymous
No.3262
>>3261
Way to sage an insightful post.
Anonymous
No.3263
3498
>>3261
The solution to this is unironically fascism, which uses left-wing organizational tactics (trade unions, guilds, etc), but also has free market enterprise controlled by nationalist causes.
Anonymous
No.3265
3343
>>3206
>The United States Has Lost The Technology To Build Icebreaker Ships
If America has not any borders with the Arctic as Canada, then why building them? Wasting money in showing the flag belongs to the past, I think.
https://www.youtube.com/watch?v=bKaVhXn49xY
Anonymous
No.3343
2f9l4ezcy7a41.jpg
>>3265
What is Alaska?
Anonymous
No.3498
3499
multiple aj rd eqg comparing abs.jpg
>>3263
I can't help but think that we have a bunch of existing laws already that should have been guard rails to stop things like this from happening.
Laws like anti-monopoly laws that should rightfully have been applied to the megacorporations before they grew to such an overwhelming size. They are growing supply chains in and of themselves.

That operational efficiency of efficient large businesses can exist seems nice, until the consequences of hyper-optimization for one factor at the cost of other factors that are very, very important, start to crop up.

The best goal would be less of a focus on super-mega companies and more medium-scale and small-scale companies. Business starting and running should tend to be easier than it is now. The red tape in the way all adds up to a level that is unreasonably onerous.

A good understanding of what the population / economic pressures are that force a gravitational trend towards certain functions and structures of predictable emergent behaviour is important, but learning each force and facet takes a lot of time on it's own.

That was wandering around a bit, but the point is that I think that sitting and dictating laws that should be on the books, or changing the political governing style is only part of the solution. There's some sort of gap that is preventing many of the existing laws from being exercised.
Anonymous
No.3499
>>3498
Theres no such thing as an uncorruptable safeguard. Diligence is ostensibly the only answer, if responsibly and consistently were so applied

1663439394489339.jpg
1663496647561833.jpg
1663512214577400.jpg
1663511907707470.jpg
1663513156921546.jpg
Cyberpunk: Edgerunners
Anonymous
No.1746
1748 1784 1995
>No Edgerunners thread
How did you enjoy what was unequivocally the best anime of 2022, /cyb/?
I personally loved it. True to the aesthetic, great dystopian/tragic theme, a compelling story, and spectacular character design.
66 replies and 57 files omitted.
Anonymous
No.3441
1725441618444776.png
1725453003478414.jpg
1725453199790411.jpg

Anonymous
No.3487
3488 3489 3491
image.png
image.png
image.png
image.png
moar like cyberponk, amirite guise? amirite?
Anonymous
No.3488
>>3487
Kek
Anonymous
No.3489
1730728263997315.png
>>3487
Anonymous
No.3491
>>3487
This reminds me, I think there was supposed to be some cyberpunk inspired pony rpg years ago? Do anyone know if it go completed or died the development hell of patreon?
Anonymous
No.3496
prequel manga 1734085402141009.jpg
le epic Akira toriyama reference.png
So there is going to be prequel manga with the Edgerunners crew. Neat.

IMG_7765.png
Post In This Thread Every Time You Visit /cyb/
Anonymous
No.3393
Last one hit bump limit
33 replies and 30 files omitted.
Anonymous
No.3473
1728343641998630.png

Anonymous
No.3486
image.png
he has a dream that some day you'll replace the batteries in your smoke detector.jpg
where the bad meme touched you.jpeg
>>3457
I know this is a thread for le ebin-est of ebin memes, but--well, maybe I'm autistic and retarded. I thought the Copenhagen Interpretation was "The map is not the territory. We have not the faintest idea what is happening down at the quantum level. We do have these equations that seem to give usable predictions, if only statistically. What this means is unclear and possibly unknowable."

But here. Memes.
Anonymous
No.3492
3493 3494 3495
6813195__safe_artist-colon-seafooddinner_twilight+sparkle_oc_oc-colon-filly+anon_earth+pony_pony_unicorn_ants_crocs_female_filly_jar_simple+background_transpare.png
Currently here on an adventure to find another thread. Looking forward to a hopefully productive evening and a good weekend.

I hope you all have a good day and week when you see this post!
Anonymous
No.3493
>>3492
You too Fren, safe travels
Anonymous
No.3494
>>3492
Stay safe
(Fire-up hand twirl gesture
Anonymous
No.3495
>>3492
And you as well, friend. Thank you for stopping by.

1730719541290568.jpg
SCIENTISTS CONFIRM BATS AREN'T BIRDS
Anonymous
No.3479
3481
https://phys.org/news/2024-11-comparison-bird-wings-reveals-evolutionary.html
Anonymous
No.3481
3482
>>3479
Wasn't it known for the last 30 years at least that they are mammals?
Anonymous
No.3482
>>3481
We've known since the late 1700s, but we are starting over now so women and niggers can discover everything.

csm_sec-consult-h-kaminsky-poison_c3cc60f8fb.png
Google, Cloudflare & Cisco Will Poison DNS to Stop Piracy Block Circumvention
Anonymous
No.3368
3370 3474
>A French court has ordered Google, Cloudflare, and Cisco to poison their DNS resolvers to prevent circumvention of blocking measures, targeting around 117 pirate sports streaming domains. The move is another anti-piracy escalation for broadcaster Canal+, which also has permission to completely deindex the sites from search engine results.
https://torrentfreak.com/google-cloudflare-cisco-will-poison-dns-to-stop-piracy-block-circumvention-240613/
Fucking European bullshit laws, dragging us all down because corporations appeal to the lowest common denominator.
Anonymous
No.3369
>Fucking European bullshit laws
It's just the french. They are the Western Europe of Western Europe
Anonymous
No.3370
2815677.png
>>3368
"Piracy is a result of bad service." "By focusing on the customer and doing useful things for the customer piracy really becomes a non-issue for us." - GabeN.
Ahoy me swashbuckling horsefuckering saltybasket weaving fellows, they dun did fuck up.
As a regular viewer of fuck ups around the world, this is a nail in the coffin. By making their shit even worse they're seeding the failure of a soon harvest.
Like any venturing capitalist who can tell shit from shiny treasures they dun made an opening.
A legal way to overtake hon hon hon land with market strategies and branding!
Extract the resources from freenet and spin a new ship called Pon-Enet, a pi here and there, a hard or soft connection bridging wide areas a tiny dash of math and suddenly you're almost a mega corporation on a shoe string budget.
It's almost highway robbery with the opportunity they've dropped.
Though they've taken a side in a nigh mounting civil tensions for they'll do more than just remove illegal operations.
They've forgotten the human part of humanity, they've blinded themselves with their own so called intelligence and intelligences that once long ago there were balloons, and streamers, and parties.
Why does she have hidden balls for ball related emergencies?
Pinkaponk in either knowing or not had them in either case.
Arrrrg, Riddle me this which letter is pirate Pinkie's favorite.
Delivered. Yar this sentence is space filing measures to reduce inferences.
Anonymous
No.3474
>>3368
worse, they even redirect legit torrent sites to malware sites, if not worse honeypots.

tiaraphone.png
Silver
!Spoon/CYj.
No.3462
Many people feel like their smartphones may feel like indispensable lifelines, connecting everyone everywhere in real-time, but can you trust it? I never did. As reliant as we are on these devices for everything from banking to personal communication, the GSM network, along with its successors from the 3G that emerged almost 20 years ago already, now 4 and 5G carries with it a number of critical flaws that hackers or (especially) governments can easily exploit using tools. Tools which I confirm being readily available on the dark web. We always knew about the flaws of GSM being left in place to facilitate eavesdropping. Now it’s not about just listening but using a phone to deceive or intercept information, and it’s easier than anyone thinks.

Here are some definitions. Regardless if it’s some Nokia or Ericsson brick or the newest Samsung Galaxy S30, mobile phone’s identity on the network are two crucial pieces of data: the IMSI and the IMEI.
>IMSI: (International Mobile Subscriber Identity)
This unique identifier ties a subscriber to your SIM card and mobile network, see this as the phone's IP, or a code allowing the network to recognize and authenticate the user. However, an attacker with the right tools can spoof an IMSI, essentially tricking the network into thinking they are someone else. This opens up the possibility of interception, call hijacking, or even location tracking.

>IMEI: (International Mobile Equipment Identity)
Similarly, the IMEI is a unique code that identifies your physical device. A bit like a MAC address. Just as with IMSI, software available on the dark web allows an attacker to spoof an IMEI, making it possible to assume the identity of another device, evade blacklists, or bypass security features designed to lock lost or stolen phones.

The creepy fact is that spoofing either of these identifiers isn’t theoretical; it’s shockingly easy if you manage to get the right software, although requires know-how since it’s mainly based on command line. It’s trivial to alter these identifiers and launch attacks on mobile networks. Hackers are out there exploiting these flaws, and most people don’t even realize how exposed they are.

SMS and roaming vulnerabilities with TPDUs

While many people assume that SMS is a secure form of communication, it’s actually a relic from a time when security was an afterthought. I mean I'm trying to resurrect an old pager for fun and sending ASCII codes via radio to it. The GSM standard is a bit like pagers, relies on something called Transfer Protocol Data Units (TPDU), which handle the sending and receiving of SMS messages and more. These messages pass through a series of vulnerable network components, each one a potential point of attack.
The handshake process, where the network authenticates a roaming phone, is particularly vulnerable. Hackers can intercept these signals during the handshake and manipulate them, giving them access to your phone. Once they have control over the TPDU, attackers can not only read SMS messages but also modify or send spoofed messages as if they were the legitimate user.

What’s worse is that this flaw isn’t limited to domestic attacks. When you roam, you’re more exposed because your phone relies on SS7 to communicate with foreign networks. This outdated protocol is widely known for its insecurities, allowing attackers to intercept calls, read messages, and even track a device’s location across the globe. For hackers who know how to exploit this, roaming opens up a world of potential targets.
Let’s imagine a theoretical scenario: Voice spoofing. As if the vulnerabilities in GSM and SMS systems weren’t enough, we’re now facing a new kind of threat: synthetic or altered voice attacks. Imagine a scenario where a hacker has spoofed your phone number using one of the techniques mentioned above. They then use some AI voice synthesis software to impersonate your voice or the voice of someone you know.

For example, a hacker could call your family or coworker, and using some AI-generated voice based on some samples, say something like: “Hey, it’s me. I’m in trouble and I need you to send me money. My phone is broken, so I can’t text. I'll pay you twice, you trust me bro” This type of scam is already becoming a reality with fake SMS which dumb people fall for. In fact, a friend of mine recently received a fake message that said, “Hi mom, my phone is broken, I need money.” It’s only a matter of time before these attacks become widespread. These attacks are common from Nigeria, Gabon, Mali etc. since it’s a common scam, now with the same number and a voice, I assure you 100 % of the people will fall for it if it's done right enoug.

With the ability to clone voices, fake phone numbers, and hijack SMS messages, you see where I'm going. It was not an issue a while ago but with machine learning being more and more accessible and these exploits at the fingertips of manipulative beings, it is about to happen, if not, already been used. Your phone is becoming a tool for sophisticated attackers to manipulate and deceive, and the terrifying part is that most people are completely unaware.

It’s hard to call these devices “smart.” Sure, smartphones are jack of all trades, GPS, media, gaming all that crap, but when it comes to security, they remain the same as dumb phones unless you use some enterprise's VPN or some VOIP services and messaging, a bit like those on Blackberry's BES, now there's similar solutions, even Whatsapp or Telegram. But no standard.

They operate on networks built decades ago with virtually no thought for the types of threats we can get today. Despite the introduction of newer technologies like 5G, which also have vulnerabilities since it’s essentially IP over radio, the underlying architecture remains flawed. Basically the frequencies and spectrum changed to have more bandwidth but the secu remains the same. You can have like, a banking ‘app’ that is secured as fuck yet rely on the SMS verification.
Silver
!Spoon/CYj.
No.3463
3464
eeeeeeee.PNG
Today we can grab some cheap talkies/radios which can use digital voice encryption with AES256 or even RSA out of the box, to cope with the exploits on Motorola/Icom/Kenwoods which came out a while ago, it's cringe to see overpriced phones do not come with better security features.

Solution? End-to-end encrypted VoIP services like Telegram, Matrix, Signal or even fucking WhatsApp which are pleb crap really but ironically offer vastly superior secu and privacy, but they are not yet the default mode of communication. There is no plan for a successor of the classic GSM cellular protocol for phone comm, like we're doomed to rely on outdated infrastructure, the SS7 network and GSM/TDMA/CDMA infrastructure and handshakes which keep its roots from the early 90's that leave us open to attack.

Sure you have a PIN, a password, fingerprint lock and even face recognition, what’s the point if it’s not properly secured behind? The device can be secured, sure, but when it’s in the air it WILL be vulnerable. Those are false senses of security, even if stolen you may want your phone to be a brick rather than used or accessed. People keep their entire lives on their phone, and it is getting worse as everytime you need a service, like insurance, banks, etc, some administration incites the users to install an app of some kind on their shit.

I’d just conclude again with smartphone might just be the least smart invention. It’s time we stop assuming our phones are secure just because they are expensive or branded with the latest technology. The reality is much darker: your phone is one of the most vulnerable things you own, not just the plethora of google services datamining the users, or the open mic, or location services collecting data for analytics, and I assure you none of the manufacturers will do a thing to anticipate the security of the existing phone network.

Everything should be redone from the base of the topology to the user layer. Even keeping the current equipment, antennas, phones. That's not a hardware issue, but the way the network is made that's the real issue. I trust more the IP and WiFi handshake than the GSM and its numerous iterations.

What would be the idea then? Fight with the ITU, raising awareness on something but usually it will be taken after shit happens. Start a private operator that provides trust in the network. Data only, then eventually VOIP. the SIM card should hold a key and establish a handshake with certs. then you have a lease when you connect to a tower. Let's just go with the blockchain, so every packet transmitted is secure, no GSM or UMTS layers, once the physical is made, even say a company or some military or bank protocol can communicate with anything, not necessarily IP. Maybre IP with gateway then you do what you want, but that's the base of secure comms we should expect.
Anonymous
No.3464
3465
>>3463
If you trust gigacorp Inc, Apple offers E2EE for iMessage
The rest seem to be some degree of honeypot or borderline unusable
Anonymous
No.3465
>>3464
You mustn't expect any privacy using an Apple terminal but ok, even crypticirc had secured chats for decades.
Anonymous
No.3466
3467
Thanks for this post, I really enjoy the more technical you get into.
What kind of equipment is needed to spoof a GSM or CDMA key?
I've hyped matrix quite a bit, as there really isn't anything better and offers the maximum amount of freedom because its just a protocol not attached to giganiggers like IBM, Verizon, Microsoft, or Apple.
Silver
!Spoon/CYj.
No.3467
3357636.jpg
>>3466
essentially, an electric computer on linux, and software.
https://securityaffairs.com/47179/hacking/hacking-ss7-protocol.html

other stuff to read about a ss7 attack
https://www.firstpoint-mg.com/blog/ss7-attack-guide/
cause yes, 4g and 5g uses Diameter protocol, but also still embeds legacy/ retrocompatibility to SS7 protocol. hence the idea of having a complete rethink of mobile telecoms.

also recently there's been a vid, even if I think linus is a fag.
https://youtube.com/watch?v=wVyu7NB7W6Y

Previous  [1][2][3][4][5][6][7][8][9][10]  Next