>refuses to use proprietary software
>uses proprietary hardware
/g/ logic
>it's not pedophelia if they're cartoons
weeb logic
>>52043883
Shh... don't alarm them. Let /g/ live in peace.
>>52043883
You can open up your chasis and inspect the hardware components. You can take apart most of your hardware and inspect them thoroughly.
Software is different. There is no such thing as botnet hardware. The whole Intel processors anti-theft bullshit was exaggerated.
>>52043883
>black people are the problem
>but it's their culture that's the problem
/pol/ logic
>>52043911
I have a hard time believing your auditing your hardware for something like COTTONMOUTH-I.
>>52043883
>>refuses to use proprietary software
>>uses proprietary hardware
>
>/g/ logic
As long as the software that makes the hardware work isn't proprietary, my freedoms aren't restricted.
Now, if I could easily learn within 40 hours of real time how to build a GPU from scratch with all of the tools to fabricate the individual parts being freely available and able to be used in my home, then I'd give a shit.
Fact is, hardware hacking is drastically more complicated than software hacking. With free software, I may not even need to modify the hardware. For example, some video cards can be turned into TV tuner cards by hacking in a patch that allows the HDMI port to become an input.
>>52043964
Stop buying hardware manufactured in burgerland. Problem solved.
>>52043911
>implying the NSA doesn't have programs in place to intercept hardware in transit and add additional modules such as hardware key loggers
>>52043911
No single person could tell you exactly everything that happens in a CPU anymore. they're too fucking complex. And you expect me to believe you can tell whether or not there's a backdoor in the hardware? Fuck off
God damn it, /g/ is a hug box of idiots just like reddit
>>52043883
>Complains about shitposting
>Shitposts
/g/ autism ladies and gentlemen.
>>52044011
>>52044012
In that case stop using computers altogether? Stop using resources because we don't know if the water we drink and the food we eat is not tainted with chemicals to make us more receptive to mind control.
Let me find my tinfoil hat and we can all go to the woods and start over.
>>52044014
>hurrrr u r all stoopit
>I'm not going 2 tell u y bc I'm 2 smart 4 u 2 understand my heads electrical neurons
Well, my logic is that by the time they are close to use their hardware backdoors I'm fucked anyway.
Software backdoors are accessible anywhere, at any time.
>took my Spartan 3 fpga
>built an ARM emulator in VHDL
>compiled linux for arm arch
>frequenting /g/
>not knowing shit from anything
Absolutely disgusting.
>>52043911
I bet my house you wouldn't even know what to look for on a PCB.
>>52043891
problems?
I only buy from a Trusted Foundy anyways. No chink is getting a hardware trojan in my system.
>>52043883
When will there be a hardware TOR?
>>52043988
>As long as the software that makes the hardware work isn't proprietary, my freedoms aren't restricted.
Firmware.
>>52045381
Can you read Japanese? Is Monobeno good?
>>52046219
i dont know i just started it the other day
i dont like natsuha voice she reminds me of rorona
>>52045474
brb setting up a company to scan hardware for enterprise and home users after purchase but before installation
>>52043911
http://libreboot.org/faq/#intelme
Looks bad as fuck m8
>>52043883
>proprietary hardware
>proprietary
kill yourself faggots
>>52044050
You do realize that he's saying exactly same thing as you but trying to prove freetards wrong right ?
>>52043891
first post and already the thread is even worse than what it started as
congratulations
>>52043883
this
i mean seriously - if something bad is happening to you, why should you take steps to reduce the damage? it doesn't make sense
>got slapped in butt once
>refuses to get fucked in the ass by rather large group of black men
women logic
Do you have something to hide?
wanna fudge a smug anime grill aaah
>>52049237
smug anime girls are frighteningly realistic. in real life 3D girls mostly look at me the same way.
What am I doing wrong?
>>52049302
Do u know any grills that look like this
>>52044326
Except for a lack of a network. the easiest way to stop an attack is to remove the device from a network
All of my hardware is 100% libre. I run parabola on a thinkpad x60s. Everything from libreboot to parabola to the libre in kernel driver for the mini-pci atheros card i bought with it respects my freedom.
>>52043883
>>uses proprietary hardware
>implying a choice exists.
fuck off faggot.
OP is a nigger
Posted from an open hardware BeagleBone Black /g/-station running FSF-approved gNewSense with linux-libre typed using hand-assembled open source ErgoDox keyboard.
>>52050357
>IDE
>>52043883
>Implying I didn't code my own cpu in VHDL.
>>52050357
lol.
>inb4 running nonfree firmware/driver for H.264 hardware decoding
>>52045510
At some point after the capitalization of Tor is changed to TOR
>>52048510
spot the pedo
>>52043911
>You can take apart most of your hardware and inspect them thoroughly.
>There is no such thing as botnet hardware. The whole Intel processors anti-theft bullshit was exaggerated.
Wanna take that dank meme to the white house Ahmed?
>>52044011
go to china and buy your hardware there?
>>52043883
i c-can design my own graphics card baka
>>52043883
Ironic considering you're using proprietary logic right now
>>52055403
>chinese hardware
>the country renowned for its great firewall of china
>>52043911
Yeah I doubt Intel is gonna tell you about their backdoors lmao
Its proprietary :^)
>>52044400
>>built an ARM emulator in VHDL
Is that actually possible and would it run usably fast?
What is the definition of proprietary hardware?
>>52044012
I actually can. I can monitor network traffic and deny the traffic that I don't like. problem solved.
>>52050357
Ergodox makes no sense for me with my one hand are there any good open source normal mechanical keyboards (with nordic keys)?
>hardware backdoors don't exist
fucking /g/ never change
>>52056796
>I can monitor network traffic
No you can't.
Some outgoing bytes could very well be intentionally corrupted such that the error correction would make it transparent but the sequence and timing of the corruption would carry data.
There are many other ways to transmit data Wireshark et al. wouldn't see at all
Hello neo-/g/!
I use a Libreboot Thinkpad X200 running Trisquel.