Anonymous ID: 8ce561 July 30, 2018, 3:34 a.m. No.2352426   🗄️.is 🔗kun   >>2437

>>2352409

Format is made for desktop, haven't tested on mobile.

 

Frontend it will run on anything that has a relatively modern browser.

 

Backend needs node. Also ext4fs to store large collections of files, but this limitation can be removed.

Anonymous ID: 8ce561 July 30, 2018, 3:38 a.m. No.2352455   🗄️.is 🔗kun   >>2470 >>3569

>>2352437

The frontend runs on any modern browser.

 

Electron could be used to package the app for any platform, frontend and backend. I've started working on it but it needs more work, if this is the best packaging approach.

 

I host the backend in a (linux) virtual machine, but it could be a server in the cloud. Having everything available offline was the driving motivation, so could hosting would defeat that purpose.

Anonymous ID: 8ce561 July 30, 2018, 3:44 a.m. No.2352495   🗄️.is 🔗kun   >>2506 >>2520 >>6792

>>2352462

>>2352470

The frontend is written in JS (modern, requires babel/JSX) and runs in any browser. GUI. (The command line is used to fetch resources, but I'll integrate that to the UI.)

 

Electron embeds a browser and would allow it to run like a native app on Mac & Windows.

 

Distributing in a safe way is my main concern.

>How can user trust that they don't get a malicious version of the app?

>How can I avoid doxxing myself sharing this?

Anonymous ID: 8ce561 July 30, 2018, 3:46 a.m. No.2352507   🗄️.is 🔗kun

If it were a safe solution I'd just put the code up on github, post a link here, and let someone address the packaging/distribution. I'm a simple codeanon.

Anonymous ID: 8ce561 July 30, 2018, 3:52 a.m. No.2352550   🗄️.is 🔗kun   >>2567 >>2571 >>2575

>>2352520

A simple bootstrapper with code signing? Yes, it seems to solve the "anonymous distribution" part of the problem.

 

Why would users trust that I don't get comped resulting in malicious code getting pushed in updates?

Anonymous ID: 8ce561 July 30, 2018, 3:57 a.m. No.2352584   🗄️.is 🔗kun   >>2606

>>2352567

This moves the trust to the anti-virus company. Do the Clowns have a copy of the CA? Is it not safer to use a self-signed CA? I don't know enough about this topic to make a decision.

Anonymous ID: 8ce561 July 30, 2018, 4 a.m. No.2352596   🗄️.is 🔗kun   >>2623 >>2645 >>6039

>>2352575

Code signing solves the tampering problem, but it doesn't prevent malicious actors from getting at me and taking over the distribution infrastructure.

 

If sharing this is going to put me and everybody at more risk than keeping the code for myself, it seems rational not to?

Anonymous ID: 8ce561 July 30, 2018, 4:07 a.m. No.2352645   🗄️.is 🔗kun   >>2681 >>9375 >>2002 >>8698

>>2352596

Writing a great app and distributing it in an apparently safe and anonymous way is an excellent vector to compromise autists. I don't know why the Clowns haven't already done that. Too much effort? Risk of being exposed?

 

>>2352606

The code signing certificate is trusted by a CA. Anyone with a copy of the CA can produce signed code.

 

You are suggesting MD5, but is a very weak hash function.

Anonymous ID: 8ce561 July 30, 2018, 4:15 a.m. No.2352696   🗄️.is 🔗kun   >>4303

>>2352623

There is no database, it's all in local plain files.

 

>>2352634

I understand. It is a difficult topic. I'll keep in mind the signed code bootstrapper idea, it is part of the solution.

 

Thank you for the discussion.

 

If Q team is reading this, maybe get in touch? Extract me and I'll happily write code for the community. Though it's perhaps not worth the hassle for you at this point.

Anonymous ID: 8ce561 July 30, 2018, 8:25 a.m. No.2354516   🗄️.is 🔗kun   >>6039 >>6235

>>2354303

Thank you for the input.

 

Not sure about LE certificates, I believe they are tied to a domain due to the verification process? I don't know that I would be able to secure a domain anonymously. Also LE certs expire after 3 months, they are not meant for code signing.

 

I am hesitant to go with a self-signed CA, it seems maybe risky but I haven't thought it through yet.

 

Local plain files by design. I don't rule out using one or several local DB engines, but they would only contain information that can be reconstructed from the local plain files.

 

Indeed corruption at the source could be a problem. I have a (python) 8chan thread archival tool that could be made available as a service (ran by independent sources), integrating the hashing process. Cross-checking sources would help detecting comped ones.

 

I'll work on this aspect as soon as paying job permits.

 

Is there such a thing as anonymous github without going to the dark web? A trustworthy (NSA/MIL) git server would be awesome, but I have no idea how I would get access to that and have reasons to believe it is safe to use. Also I am neither US resident nor citizen.

Anonymous ID: 8ce561 July 31, 2018, 2:52 a.m. No.2369040   🗄️.is 🔗kun

>>2366039

Thank you Anon! SSB is precisely what I was looking for.

 

@ljtQyLKmVLKw/jGzA1lqugPLL+8sDO7AYnTJqr9lYcI=.ed25519

 

Still setting this up, I'll get there.

Anonymous ID: 8ce561 July 31, 2018, 9:05 a.m. No.2371704   🗄️.is 🔗kun   >>1963

>>2370327

Yes, it loads a local JSON file that comes straight from qanon.news/api/posts. I plan to add support for more sources but time has been scarce lately.

 

Hopefully I can share this before Q starts wrapping up.

Anonymous ID: 8ce561 July 31, 2018, 5:50 p.m. No.2380208   🗄️.is 🔗kun

>>2377944

Wow. Thank you Anon, this is a fantastic response, very well thought out. Will re-read often.

 

Docker? Small images, reproducible builds. Not much isolation, but probably enough. Not very easy to run.

 

Virtualized Alpine-Linux-based iso image? A little heavier, perhaps not so much with careful decisions (go backend instead of python). I think I prefer this approach.

 

I'll try harder. Again, thank you!

Anonymous ID: 8ce561 Aug. 13, 2018, 5:07 p.m. No.2588476   🗄️.is 🔗kun   >>9502

>>2575758

Something like this?

$(function(){ $(document.head).append('<style>#post-counter{position:fixed;top:20px;right:10px;font:24px sans-serif;opacity:0.5;color:#f60;}</style>'); $(document.body).append('<div id="post-counter"/>'); function updateCounter() {$('#post-counter').text($('.thread>.post.reply').length);} setInterval(updateCounter, 500);});

Anonymous ID: 8ce561 Aug. 25, 2018, 12:56 p.m. No.2734127   🗄️.is 🔗kun

>>2659375

For smallish stuff there is pastebin. If necessary, archive, encode as base64, paste with instructions at the top.

Larger files (~4MB) can be attached to posts here.

Tor may help. Or a VPN if you were able to open an account anonymously (prepaid credit card, fake identity if legal).

I do not know if Mega can be trusted. I would not trust AWS (S3).

 

Regarding the related problem of anonymous hosting (i.e., providing services anonymously), I've been thinking about writing a client to (ab)use 8chan as an anonymous communication/storage backend (hopefully with Ron's blessing). There are neat things to do in that direction, including anonymous software distribution.

 

>>2662002

I see how PGP helps with trust, but I do not see how it helps with anonymity. Can you explain what you had in mind?