/t/ - Technology

Discussion of Technology

Index Catalog Archive Bottom Refresh
Options
Subject
Message

Max message length: 12000

files

Max file size: 32.00 MB

Total max file size: 50.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

E-mail
Password

(used to delete files and posts)

Misc

Remember to follow the Rules

The backup domains are located at 8chan.se and 8chan.cc. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 3.0.

/wsj/ - Weekly Shonen Jump

8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

You may also be interested in: AI

(308.37 KB 1920x1080 53c2e628d020ff216d35483c85df3bc0.jpg)

(16.45 KB 277x182 proxies.jpeg)

The future of imageboards: Over 9000 server proxies? Anonymous 08/18/2020 (Tue) 08:16:19 No. 1089
Of the new imageboards that launched recently two of them have something in common: Proxies. The new Zchan launched its server normally and proxies their site through a separate sever. This site has a "back door" to its tor hidden service that runs from a proxy on the clearnet. Much like anons using a proxy to evade a ban from a site, entire sites are now using proxies to avoid being banned from the Internet. The effectiveness of this is apparent at a glance. The servers for the main sites have no public IP to know and a much smaller attack surface, and if a proxy gets shut down another one can be spun up faster than relocating a whole server and all of its data. 8chan goes even further by allowing its server to hide on the onion network in case of a major attack or outage. Deplatforming a proxy that doesn't host content is naturally going to be a bit harder than deplatforming a site that does. My question is, is this going to become the status quo for "controversial" sites going into the future? Even a year ago I would have said this was extreme, but the sheer hostility against non-politically correct sites on the Internet, and the willingness of service providers to cave to an angry mob on the basis of emotion has exceeded my worst fever dreams. This is not how the Internet of my youth was supposed to be.
Future imageboards will be hosted from anon's homes, and some kind of proxy/tor solutions will be used to reach them. I'm looking forward to that future.
(19.97 KB 329x67 the dream is dead.jpg)

Welcome to 2015 and yiff.party. >My question is, is this going to become the status quo for "controversial" sites going into the future? >Even a year ago I would have said this was extreme Pic related, there's no going back from this redpill.
>>1092 >yiff.party What happened to them? I never followed furfag community drama.
>>1093 Still functional, apparently meeting donation goals, I think they purged camwhores because they were attracting too much heat. >I never followed furfag community drama. A wise choice.
>>1090 I'm looking forward to it too. I'll hopefully be one of them. Do you have any plans too?
I don't know if smaller sites really need it. Typical altchans aren't subject to the same scrutiny as other sites, and many of them (like cuckchan) have the option to cuck out and get journalists to look the other way. They still get called named, but nobody freaks out and tries to deplatform them, and it probably makes enough money to justify continued investment, which eventually always leads to media support. Funny how that works. The costs associated with running something like 8chan, which has enemies on all sides looking to fuck with it, is much greater. Should the average site stick itself behind seven proxies? It can't hurt if you have the money and want to be resilient, but most hobby sites are toys running on $5 droplets and if they get taken down then it's not the end of the world. The owner just moves on. That's not feasible for imageboards with a community that lives or dies on momentum and also wants to host controversial opinions or content. But I'm convinced that, no matter how innocuous your site is, someone will eventually come for it. And without systems like this, the entire web will soon be wholly corporate. Hopefully the barriers to putting up a site like this can be lowered soon.
>>1103 You say small sites don't need it while half the very small sites in the webring have been ddos'd and spammed into oblivion multiple times. The size of the site isn't relevant, in fact being a smaller more tight knit community makes the goons all the more likely to fuck with you. People really need to start getting onboard with Tor and site scrapers because the way we're going now is not sustainable.
>>1105 >in the webring 8moe and 9chan have also been DDoSed and had attempts of domain/server takedown, and so have many other imageboards, meguca for example comes to mind. There's an obscure kemono (japanese equivalent of furry) imageboard that has basically no activity at all anymore, and even that gets attacked by people with spam bots now and then. You simply cannot run an imageboard anymore and expect not to be attacked in one way or several, except maybe if it's so obscure only a couple people knows about it. If you're not completely politically correct then you can basically guarantee someone will try to take down the domain and/or server. If you're online at all you can basically guarantee bot flood and/or DDoS attacks.
>>1102 I'd host shit right now if it was possible to obtain more than 0.00002kbps upload speed here (see: actual upload speed, not fake speedtest "upload speed"). There's all kinds of imageboard boards I want and software features that would be fun.
>>1103 >I don't know if smaller sites really need it. Smaller sites are the ones most vulnerable to attacks from a small number of persistent autists. >>1108 Tor not being completely DDoS-proof doesn't stop it from being far more robust than clearnet and far less likely to be within the reach of a skid's botnet. Also, its devs try to fix shit like that because the whole point of the project is to defeat censorship, and they've had to deal with far more refined attacks from China and company.
>>1109 >ddos >Tor >China https://blog.torproject.org/closer-look-great-firewall-china How much bandwidth can they put through all those countermeasure? Educate yourself. If anything, Tor (if not already compromised) might protect your identity and privacy. But it sure hell pits you against all skids running Tor. In clearnet, there are Cuckflare and other ddos bulldozers. Tor by it nature does not, since both endpoints are meant to be hidden.
>>1110 The network is more resilient the more nodes exist, especially exit nodes. There's no such thing as a "DDoS-proof" network because there's always some amount of bandwidth saturation that will clog the pipes, but that doesn't actually matter because big enough pipes distributing data effectively will make it nearly impossible to DDoS. Bandwidth has been scaling far past what even most botnets can reasonably do, and the only people with big enough botnets to overcome it are state actors and for-hire. It's still 100x easier and cheaper to knock a clearnet site offline versus an onion one. An attack on a Tor site is effectively an attack on the network itself, and the organization and developers will respond to any threat to the network.
>>1111 11/11 digit, made me reply. >The network is more resilient Yes. Not you nor your basement server. >DDos-proof Never implied as such. >big enough pipes You are retarded. Tor is still server client centralized model. Do you host at a data center? Say you have 10Gbps fiber, no matter how much Tor can handle, bandwidth exceeding 10Gbps will bring you down. Tor is not Cuckflare, it does not cache. >100x easier and cheaper to knock a clearnet site Lmao, you have never hosted a site, have you? Even Cuckflare was partly down a few weeks ago and it has 35Tbps capacity. People paid for that shit and somebody probably got fired for that. Do Tor (((voluntary))) relays has that? How much have you donated for Tor's infrastructure? >An attack on a Tor site is effectively an attack on the network itself If Tor really gets as big as Cuckflare, such attacks will bring your server down first and won't even make a dent on Tor. Stop talking out of your ass, hunter2. Can't believe how far it has fallen. t. user
>>1112 >Even Cuckflare was partly down a few weeks ago To be fair, that was because of some pajeet who forgot to close his Internet Explorer window before pushing to production.
>>1110 >Educate yourself. Kys >>1111 Check em
There is no escape, swit.
Cuckflare makes a site MORE likely to be deplatformed, not less. They are the central point for many sites. Becoming dependent on such services is dangerous.
(84.67 KB 680x453 gentlemen's club.jpg)

>>1090 I already do this, and so do plenty of other people. Running a basement server over TOR is actually easier than running a normie server, because you don't have to deal with a dynamic DNS, HTTPS certificates, etc. >TOR is a honeypot, goy TOR has to be secure enough to resist Russia, and Russian IT is at least as good as American IT. Probably better when it comes to hacking. /leftypol/ use hidden services every day to talk about playing dominoes on pizza and pasta; why should they have all the fun? TOR users aren't outed by software vulnerabilities. They're outed because they tattle and/or because they get greedy and become the subject of an IRL investigation so the cops can use traffic analysis. Dosensuppe is a classic example. Got greedy, started committing IRL crime, and then tattled by signing his name on one of his shipments. Skids and shills don't focus on TOR because its userbase is too small and the targets are too diverse (there are machines running NCSA httpd and gopher for fucks sake). Hackers like to focus on goy tech where the same vuln can affect millions of users. >Tor does not save you from ddos >Smaller sites are the ones most vulnerable to attacks from a small number of persistent autists. I'd argue that we're in a good situation, because we're motivated by more than shekels. If all you want is a straight shota board, you don't care if your personal server is down occasionally, because other people will mirror it for you. This is what happened with 8chan /cuckquean/. I know you guys are millennials but think for a minute about why Ross Ulbricht chose "The Dread Pirate Roberts" for a nickname. "Persistent autists" die, get vanned, find a job or a mail-order bride. Shills have deadlines to meet and limited amounts of money to work with. Goons get caught up in purity spirals and eat each other alive. HENTAI ALONE ENDURES
>>1167 >I already do this, and so do plenty of other people. Running a basement server over TOR is actually easier than running a normie server, because you don't have to deal with a dynamic DNS, HTTPS certificates, etc. I run my own website on my desktop as an onion-site. It doesn't have anywhere near 24/7 uptime, of course, but it's enough for personal stuff. It's a shame more people don't do that. It's an easy way to avoid centralized botnet services.
>>1167 >mail-order bride Sauce, I want one. >Tor isn't a honeypot May be true, but I won't bet my life in this 1984 wrong-think world on a network built by US military, and has a track record of numerous criminals using it vanned. I'd rather use more obscure networks, i2p, loki, etc, for a small forum. >>1168 >avoid centralized services You can avoid CAs, ICANN and cuckflare. But the site is still centralized for users. True ddos protection and anon model is distributed and decentralized. It should be ran on top of overlay networks to provide anonymity. Clients operate as servers, with proof-of-x to ensure single post history.
>>1170 Considering how few people are using Tor or even alternative clearweb services like bitchute or vid8, I don't think ddossing is the biggest issue currently. And by the time it does become a big issue, that's great, because it means we will actually have a self-sustaining userbase by then.
>>1188 (checked) >What is zchan
>>1170 Just need a P2P (via WebRTC) Blockchain Website. I've had to use this project at work, good lib to start such a thing. https://webtorrent.io Keep the whole site largely client-side.
>>1213 Anything blockchain related is either a scam or a waste of resources.
(265.64 KB 429x561 3f3.png)

it's not as bad in yurop but i do like the idea of using proxies to access a chan instance. personally i'm trying to come up with an imageboard client which would just use the json api to load threads. fucky part is writing the part which post on an instance because of the various ways people implement captcha. if captcha issue was resolved it would be trivial to make something like this and if the instance was taken down for example you could just set up another one and it would work out of the box on my (((app))). also yeah - the ui for each instance is different. i'm yet to find an imageboard that is as easy to use as 4chan + 4chanx by default.
>>2062 If you want to support multiple engines then you'll need to handle each of them as a separate case regardless of the captcha. As long as you support the most popular captcha types, you'll cover most boards. >I'm yet to find an imageboard that is as easy to use as 4chan + 4chanx by default. Don't most altchan engines have the same features 4chanx provides via userscript? What's missing?
>>2062 I've seen something like this before, some anon from endchan made a terminal client with several imageboards supported, but the cunt vanished before he finished posting support.
>>1106 Whats your opinion on the bot attacks/ddos? The only reason i can imagine someone launching such attacks would be to shut down competition but i doubt thats the case since most of these imageboards are either dead or unprofitable.
>>1170 >proof-of-x to ensure single post history You want to put post history on a blockchain? Say goodbye to ephemerality and hello to massive storage usage when the site gets big
>>4898 cont. Which isn't neccessarily a bad thing imo


Forms
Delete
Report
Quick Reply