Plagued 4chan - the Internet hate machine

  • 🐕 I am attempting to get the site runnning as fast as possible. If you are experiencing slow page load times, please report it.

Will the 4chan hack be the end of it?

  • Yes, goodbye forever 4chan

    Votes: 1,031 18.5%
  • No, they will rise from the ashes, stronger than ever

    Votes: 343 6.2%
  • This will rattle them but it will be forgotten about next week

    Votes: 2,322 41.6%
  • I am just here for the janny phonebooking

    Votes: 1,093 19.6%
  • What the fuck is 4chan

    Votes: 218 3.9%
  • Yotsuba&!

    Votes: 569 10.2%

  • Total voters
    5,576
Did you know pedophiles could merge files with images, like Zip files containing CSAM. Those 10 Mb prdobear pictures isn't just for show, opening the image with 7zip gets to file contents.

It's not a joke anymore.
Utilizing large image sizes on 4chan has been used to embed archives for a while. From what I had heard, the old "let's post sinks" threads on /b/ back in the day were eventually banned hard because they were using them to embed CSAM. People figured out ways to use that for less nefarious purposes- people made Greasemonkey scripts that made it possible to embed sounds into files posted on 4chan (so if you had the 4chan sounds userscript you could post sounds, or if a file contained sound(s), play them back).

Of course for obvious reasons (the CSAM) the site administrators made a lot of changes to discourage embedding of files over the years.

The old "save as 4chan.hta run and shit bricks" trojan (which Microsoft classified as Trojan JS/Chafpin) did this too. In addition to propagating itself, copies of the file posted to 4chan contained embedded RAR archives. The RAR would open in WinRAR (or the application that understood RAR files of your choice).

The trojan in the embedded RAR would randomly take one document from the user's My Documents folder every time it posted itself. Opening these you could find anything from homework to meme images to dishonorable discharges to tax returns.

I figured with the behavior of the trojan someone had to be data harvesting the self propagating spam to collect the RAR files and find things of interest.

The 4chan.HTA trojan flooding is also when the CAPTCHA became mandatory.
 
  • Informative
Reactions: Arocyt
No, if they are protected by a master password
View attachment 7230729
My firefox password is protected by 2FA. Meaning even if you did have the password, you would need access to my phone to do so, as it would need verification from my phone.
Unless you managed to SIM swap my number after manipulating a pajeet over customer support.
 
  • Horrifying
Reactions: Internet May Be Gay

Nice. I wanted to reply to that post and got this.

Screenshot (41).webp

What do I do about it?
 
This hasn't been possible for a years now, don't spread misinfo.
Embeds these days are just external extensions to link to catbox and boorus which is simultaneously much tamer and incredibly gay, since it's essentially conceding.
It was possible when people figured out to open picture with WinRAR as folder insert files then close the folder then add appropriate picture format at the end IE . jpg . gif .PNG simple
 
Sony uses FreeBSD for their Playstation consoles.
Considering that FreeBSD is an Operating System, it was probably very easy to update it.
From how old their version of FreeBSD was, it was probably similar to it running on Windows Vista or Windows 8.
Also,
why on earth were 4cuck servers running on a literal-who OS instead of Windows or Linux?
FreeBSD is well known as a server OS . It is #2 after Linux
 
My firefox password is protected by 2FA. Meaning even if you did have the password, you would need access to my phone to do so, as it would need verification from my phone.
Unless you managed to SIM swap my number after manipulating a pajeet over customer support.
ooooh, ive seen this one before! look up Adversary-in-the-middle (AiTM)

anyway still happening all the time. just peek the r/msp or r/sysadmin subreddits.
 
Did you know pedophiles could merge files with images, like Zip files containing CSAM. Those 10 Mb prdobear pictures isn't just for show, opening the image with 7zip gets to file contents.

It's not a joke anymore.

I remember they used to do this with the images of colored squares too, and people would have to post DON'T CLICK THAT. This was pre-captcha, back when pedos would spam anontalk all the time (which, if I recall, is what led to captcha).

They started stripping video title metadata out of webms because people would embed links to CSAM in them. Sucks, it was a good way to embed source information in the file.
Christ. For how fast the party van is going to take them away, why are pedos so intent on sharing their shit.

Do miss idle scrolling x. Also should have saved some of the cool wallpapers posted when I had the chance.

Like tears in the rain~~~
 
while that is technically something being done it also mostly doesn't actually work how they want people to think it does
what I know about voice recognition suggests it does work this way. I think the images could be somewhat-sanitized by running them through a color normalizer that clamps values to near-neighbors, but I don't know what to do about the audio steganography

basically the way text-to-speech works now is that there's a few master databases (I actually only know of one but I assume there are others) of high-frequency (above 15khz) phonemes that are sounded at the start of the enunciation of a word. Like if you're going to say "Sneaker" the inaudible high-frequency hiss of the S is distinctly different from the high-frequency hiss in "Shoe" and the AI can pick up on that. The models they use for speech recognition only key on the high frequencies because you can get high frequency data faster than low frequency data due to the wavelength of the pressure wave carrying the sound. Also it's very cheap (in terms of power usage) to do this rather than fully-parsing voice input.

So almost all of the data used by phones and AI assistants to parse voice input is inaudible to all human ears.
 
Back