Short statement on the Ovarit situation
This commit is contained in:
		
							parent
							
								
									2639aba46c
								
							
						
					
					
						commit
						7728287dcd
					
				
					 24 changed files with 529 additions and 69 deletions
				
			
		
							
								
								
									
										33
									
								
								garden/android_root/hltevzw.gmi
									
										
									
									
									
										Executable file
									
								
							
							
						
						
									
										33
									
								
								garden/android_root/hltevzw.gmi
									
										
									
									
									
										Executable file
									
								
							|  | @ -0,0 +1,33 @@ | |||
| # Rooting the Samsung Galaxy Note 3 (Verizon) and installing LineageOS | ||||
| 
 | ||||
| ## Stuff you need | ||||
| 
 | ||||
| => https://download.lineageos.org/hltetmo	The latest LineageOS recovery file | ||||
| => https://download.lineageos.org/hltetmo	The latest LineageOS ROM file | ||||
| => https://androidfilehost.com/?fid=4349826312261712202	This very specific version of the Odin image flashing tool | ||||
| => https://developer.samsung.com/android-usb-driver	Samsung Android USB Driver | ||||
| => https://ipfs.letsdecentralize.org/ipfs/QmNhEPB2oCAmkwM7rD6bN2EhmXxVTRZKxLckRh7DHAZnNf	ArabicToolApp.exe (ignore virus warnings. Of course an Android exploit is going to be classified as "malware") | ||||
| => https://web.archive.org/web/20221010233203/https://forum.xda-developers.com/t/official-note-3-verizon-bootloader-unlock.3359370/	Note 3 Verizon Bootloader Unlock | ||||
| 
 | ||||
| ### If some of the links are broken, try these mirrors | ||||
| => ../../dl/hltevzw/Odin_3.13.1.zip	Odin image flashing tool | ||||
| => ipfs://QmaBWnbqJsWMFXS8aDspWsga7s3MtH7Gt3xF5sfKL6qGxr	Odin image flashing tool (IPFS) | ||||
| => ipfs://QmaRn2E65XPT1YHFXL5qkMeWdgd7MwnNCtWzmQQtgWguNR	Note 3 Verizon Bootloader Unlock script (IPFS) | ||||
| => ipfs://QmNhEPB2oCAmkwM7rD6bN2EhmXxVTRZKxLckRh7DHAZnNf	ArabicToolApp.exe (IPFS) | ||||
| 
 | ||||
| ### Also: | ||||
| 
 | ||||
| * a machine running Windows 10 (a VM will likely not work) | ||||
| * the Note 3 has to be running build version "OB6" (not "SEPL") | ||||
| * a blank microSD card (the bootloader unlock script will say how big it has to be) | ||||
| 
 | ||||
| ## Instructions | ||||
| 
 | ||||
| 1. Wipe the phone | ||||
| 2. Downgrade the software to OB6 using Odin (you don't need to do anything fancy to downgrade; just flash the image) | ||||
| 3. Enable ADB in developer settings | ||||
| 4. Get root using ArabicToolApp.exe | ||||
| 5. Follow the instructions on the bootloader unlock page to push the "unlock_n3" binary to the device and run it | ||||
| 6. Follow these instructions (it says "hltetmo", but it counts for "hltevzw" too): | ||||
| 
 | ||||
| => https://wiki.lineageos.org/devices/hltetmo/install	Install LineageOS on hltetmo | ||||
							
								
								
									
										69
									
								
								garden/android_root/nook1.gmi
									
										
									
									
									
										Executable file
									
								
							
							
						
						
									
										69
									
								
								garden/android_root/nook1.gmi
									
										
									
									
									
										Executable file
									
								
							|  | @ -0,0 +1,69 @@ | |||
| # Rooting the Barnes & Noble Nook 1st Generation | ||||
| 
 | ||||
| ## Stuff you need | ||||
| 
 | ||||
| => ../../dl/nook/	Individual files | ||||
| => https://upload.letsdecentralize.org/misc/nook.7z	All the files in one .7z pack | ||||
| => ipfs://QmPV9YTCNV3StpfbbXGpcJQWDbxstrato1keqprvBG7Gw9	All the files in one .7z pack (IPFS) | ||||
| 
 | ||||
| ## Instructions | ||||
| 
 | ||||
| 1. Get a server running on port 80 on a machine on the same Wi-Fi network as the Nook. | ||||
| 
 | ||||
| All the server needs to host is "exploit.html" from the pack linked above. For best results, rename the HTML file to "index.html". | ||||
| 
 | ||||
| 2. Crash your Nook's browser to enable ADB. | ||||
| 
 | ||||
| Using the Nook's browser, navigate to the web server via its local IPv4 address. The browser should refresh a few times and then crash to the home menu. | ||||
| 
 | ||||
| 3. Connect to the Nook over ADB. | ||||
| 
 | ||||
| ``` | ||||
| adb connect YOUR_NOOKS_LOCAL_IP_HERE | ||||
| ``` | ||||
| 
 | ||||
| If ADB refuses to connect, run step 2 repeatedly until ADB manages to connect. It could take between one and one hundred tries. | ||||
| 
 | ||||
| 4. Get and edit "/init.rc". | ||||
| 
 | ||||
| ``` | ||||
| adb pull /init.rc | ||||
| ``` | ||||
| 
 | ||||
| Open "init.rc" in your favorite text editor on your local machine. Find the line that says: | ||||
| 
 | ||||
| ``` | ||||
| service adbd /sbin/adbd | ||||
| ``` | ||||
| 
 | ||||
| Below that should say "disabled". Change that to "enabled". | ||||
| 
 | ||||
| 5. Get root access. | ||||
| 
 | ||||
| While still connected to the Nook over ADB, run: | ||||
| 
 | ||||
| ``` | ||||
| adb push ratc.bin /sqlite_stmt_journals | ||||
| adb shell | ||||
| cd /sqlite_stmt_journals | ||||
| /system/bin/chmod 777 ./ratc.bin | ||||
| ./ratc.bin | ||||
| ``` | ||||
| 
 | ||||
| Several lines of output will appear. Do not press anything. A few seconds later, adb will disconnect you. | ||||
| 
 | ||||
| ``` | ||||
| adb kill-server | ||||
| ``` | ||||
| 
 | ||||
| 6. Push the patched "init.rc" to the Nook. | ||||
| 
 | ||||
| Repeat step 3 to reconnect to the Nook over ADB. Then run: | ||||
| 
 | ||||
| ``` | ||||
| adb push init.rc / | ||||
| ``` | ||||
| 
 | ||||
| After a reboot, your Nook should now be rooted. | ||||
| 
 | ||||
| The default launcher will not show third-party apps. "ru.mynook.launcher.apk" included in the pack is an alternative launcher that will show all apps installed, including third-party ones. | ||||
							
								
								
									
										73
									
								
								garden/darknet/tor.gmi
									
										
									
									
									
										Executable file
									
								
							
							
						
						
									
										73
									
								
								garden/darknet/tor.gmi
									
										
									
									
									
										Executable file
									
								
							|  | @ -0,0 +1,73 @@ | |||
| # Creating a Tor hidden service using Caddy and Debian 11 | ||||
| 
 | ||||
| 1. Install Tor. | ||||
| 
 | ||||
| ``` | ||||
| sudo apt install tor | ||||
| ``` | ||||
| 
 | ||||
| 2. Install the Caddy web server. | ||||
| 
 | ||||
| ``` | ||||
| echo "deb [trusted=yes] https://apt.fury.io/caddy/ /" | sudo tee -a /etc/apt/sources.list.d/caddy-fury.list | ||||
| sudo apt update; sudo apt install caddy -y | ||||
| ``` | ||||
| 
 | ||||
| 3. Edit "/etc/tor/torrc" to create the hidden service. | ||||
| 
 | ||||
| Open "/etc/tor/torrc" in your favorite text editor. (Please note that this usually requires root privileges.) | ||||
| 
 | ||||
| Go to the lines that say: | ||||
| 
 | ||||
| ``` | ||||
| #HiddenServiceDir /var/lib/tor/hidden_service/ | ||||
| #HiddenServicePort 80 127.0.0.1:80 | ||||
| ``` | ||||
| 
 | ||||
| Uncomment them by deleting the # mark in front of each line. | ||||
| 
 | ||||
| If you want, you can change the HiddenServiceDir directory, but you will need to remember it for later. For security purposes, keep the new directory inside of "/var/lib/tor/". | ||||
| 
 | ||||
| 4. Restart the Tor daemon. | ||||
| 
 | ||||
| ``` | ||||
| sudo systemctl restart tor@default | ||||
| ``` | ||||
| 
 | ||||
| 5. As root, go to the hidden service directory and get the new hidden service's domain. | ||||
| 
 | ||||
| ``` | ||||
| sudo -i | ||||
| cd /var/lib/tor/directory/ | ||||
| ``` | ||||
| 
 | ||||
| Replace "directory" with the actual directory you chose in step 3. | ||||
| 
 | ||||
| ``` | ||||
| cat hostname | ||||
| ``` | ||||
| 
 | ||||
| If all is well, you should now see a long string of letters and numbers that ends in ".onion". Copy this somewhere safe. You'll need it next step. | ||||
| 
 | ||||
| 6. Configure Caddy to serve the hidden service. | ||||
| 
 | ||||
| Open "/etc/caddy/Caddyfile" with your favorite text editor. You should already be root, but if you did "exit" after getting the Tor hostname, just "sudo -i" again. | ||||
| 
 | ||||
| Type the following in: | ||||
| 
 | ||||
| ``` | ||||
| http://YourTorHostnameHere.onion { | ||||
| 	root * /your/website/file/path/here | ||||
| 	file_server | ||||
| 	encode gzip | ||||
| 	bind 127.0.0.1 | ||||
| } | ||||
| ``` | ||||
| 
 | ||||
| The "http://" in front of the address is important as that tells Caddy to not try to enable HTTPS on that domain. HTTPS is unnecessary for Tor hidden services as all traffic to and from the server is already encrypted in transit. And since Tor hidden services aren't accessible on the normal clearnet, the request for Let's Encrypt to give Caddy a certificate would fail as they wouldn't be able to access the domain. | ||||
| 
 | ||||
| 7. Restart Caddy to apply your changes. | ||||
| 
 | ||||
| ``` | ||||
| sudo systemctl restart caddy | ||||
| ``` | ||||
							
								
								
									
										81
									
								
								garden/darknet/yggdrasil.gmi
									
										
									
									
									
										Executable file
									
								
							
							
						
						
									
										81
									
								
								garden/darknet/yggdrasil.gmi
									
										
									
									
									
										Executable file
									
								
							|  | @ -0,0 +1,81 @@ | |||
| # Creating a Yggdrasil website using Caddy and Debian 11 | ||||
| 
 | ||||
| 1. Install Yggdrasil. | ||||
| 
 | ||||
| ``` | ||||
| sudo apt install dirmngr | ||||
| gpg --fetch-keys https://neilalexander.s3.dualstack.eu-west-2.amazonaws.com/deb/key.txt | ||||
| gpg --export 569130E8CA20FBC4CB3FDE555898470A764B32C9 | sudo apt-key add - | ||||
| echo 'deb http://neilalexander.s3.dualstack.eu-west-2.amazonaws.com/deb/ debian yggdrasil' | sudo tee /etc/apt/sources.list.d/yggdrasil.list | ||||
| sudo apt update; sudo apt install yggdrasil | ||||
| ``` | ||||
| 
 | ||||
| 2. Install Caddy. | ||||
| 
 | ||||
| ``` | ||||
| echo "deb [trusted=yes] https://apt.fury.io/caddy/ /" | sudo tee -a /etc/apt/sources.list.d/caddy-fury.list | ||||
| sudo apt update; sudo apt install caddy -y | ||||
| ``` | ||||
| 
 | ||||
| 3. Get the IP Yggdrasil generates for you. | ||||
| 
 | ||||
| ``` | ||||
| sudo systemctl start yggdrasil; sudo systemctl enable yggdrasil | ||||
| sudo journalctl -xfe -u yggdrasil | ||||
| ``` | ||||
| 
 | ||||
| There will be a line that says "Your IPv6 address is". Copy the rest of that line somewhere safe. | ||||
| 
 | ||||
| Press the Control and C buttons on your keyboard at the same time to exit "journalctl". | ||||
| 
 | ||||
| 4. Configure Caddy to serve the hidden service. | ||||
| 
 | ||||
| Open "/etc/caddy/Caddyfile" as root with your favorite text editor. | ||||
| 
 | ||||
| Type the following in: | ||||
| 
 | ||||
| ``` | ||||
| http://[YGGDRASIL_IP_ADDRESS_HERE] { | ||||
| 	root * /your/website/file/path/here | ||||
| 	file_server | ||||
| 	encode gzip | ||||
| } | ||||
| ``` | ||||
| 
 | ||||
| The "http://" in front of the address is important as that tells Caddy to not try to enable HTTPS for that website. HTTPS is unnecessary for Yggdrasil hidden services as all traffic to and from the server is already encrypted in transit. Besides, Let's Encrypt wouldn't be able to issue a certificate for an IP address anyway. | ||||
| 
 | ||||
| 5. Restart Caddy to apply your changes. | ||||
| 
 | ||||
| ``` | ||||
| sudo systemctl restart caddy | ||||
| ``` | ||||
| 
 | ||||
| 6. Get some peers for Yggdrasil. | ||||
| 
 | ||||
| => https://github.com/yggdrasil-network/public-peers	Copy some peers from this page. Try to select ones closest to your geographical location. | ||||
| 
 | ||||
| On your server, open "/etc/yggdrasil.conf" as root with your favorite text editor. At the top of the configuration file will be a section that looks like this: | ||||
| 
 | ||||
| ``` | ||||
| Peers: [] | ||||
| ``` | ||||
| 
 | ||||
| Pick some peers from the list and add them to that section of the file (one per line) so it now looks something like this: | ||||
| 
 | ||||
| ``` | ||||
| Peers: | ||||
| 	[ | ||||
| 	tls://01.scv.usa.ygg.yt:443 | ||||
| 	tls://lax.yuetau.net:6643 | ||||
| 	tls://tasty.chowder.land:9001 | ||||
| 	tls://supergay.network:9001 | ||||
| 	tls://lancis.iscute.moe:49274 | ||||
| 	tls://mayvaneday.org:1414 | ||||
| ]				 | ||||
| ``` | ||||
| 
 | ||||
| Save the file and close it, then run: | ||||
| 
 | ||||
| ``` | ||||
| sudo systemctl restart yggdrasil | ||||
| ``` | ||||
							
								
								
									
										38
									
								
								garden/gpg.gmi
									
										
									
									
									
										Executable file
									
								
							
							
						
						
									
										38
									
								
								garden/gpg.gmi
									
										
									
									
									
										Executable file
									
								
							|  | @ -0,0 +1,38 @@ | |||
| # Quick guide to GPG | ||||
| 
 | ||||
| ## Generate a key | ||||
| 
 | ||||
| ``` | ||||
| gpg --generate-key | ||||
| ``` | ||||
| 
 | ||||
| ## Import an existing key | ||||
| 
 | ||||
| ``` | ||||
| gpg --import key.txt | ||||
| ``` | ||||
| 
 | ||||
| ## Export a key | ||||
| 
 | ||||
| ``` | ||||
| gpg --export -a person@domain.tld public.gpg | ||||
| gpg --export-secret-keys -a person@domain.tld | ||||
| ``` | ||||
| 
 | ||||
| ## Encrypt a file using a specific key | ||||
| 
 | ||||
| ``` | ||||
| gpg --encrypt -a -r person@domain.tld file.ext | ||||
| ``` | ||||
| 
 | ||||
| ## Sign a file using a specific key | ||||
| 
 | ||||
| ``` | ||||
| gpg --clear-sign -a file.ext | ||||
| ``` | ||||
| 
 | ||||
| ## List all keys in the keyring | ||||
| 
 | ||||
| ``` | ||||
| gpg --list-keys | ||||
| ``` | ||||
							
								
								
									
										19
									
								
								garden/index.gmi
									
										
									
									
									
										Executable file
									
								
							
							
						
						
									
										19
									
								
								garden/index.gmi
									
										
									
									
									
										Executable file
									
								
							|  | @ -0,0 +1,19 @@ | |||
| # MayVaneDay Wiki | ||||
| 
 | ||||
| => ./vlc.gmi	VLC has an ncurses frontend that also supports equalizers | ||||
| => ./gpg.gmi	Quick guide to GPG | ||||
| => ./list.gmi	List of miscellaneous useful things | ||||
| 
 | ||||
| ## Android rooting | ||||
| 
 | ||||
| => ./android_root/hltevzw.gmi	Samsung Galaxy Note 3 (Verizon) | ||||
| => ./android_root/nook1.gmi	Barnes & Noble Nook 1st Generation | ||||
| 
 | ||||
| ## Darknet setup | ||||
| 
 | ||||
| => ./darknet/tor.gmi	Tor | ||||
| => ./darknet/yggdrasil.gmi	Yggdrasil | ||||
| 
 | ||||
| ## Making operating systems usable | ||||
| 
 | ||||
| => ./os/openbsd.gmi	(Abandoned) notes for OpenBSD | ||||
							
								
								
									
										38
									
								
								garden/list.gmi
									
										
									
									
									
										Executable file
									
								
							
							
						
						
									
										38
									
								
								garden/list.gmi
									
										
									
									
									
										Executable file
									
								
							|  | @ -0,0 +1,38 @@ | |||
| # A big list of useful links | ||||
| 
 | ||||
| ## Alternate search engines | ||||
| 
 | ||||
| => https://wiby.me	Wiby | ||||
| => https://millionshort.com	Million Short | ||||
| => https://search.marginalia.nu	Marginalia | ||||
| => https://www.seekport.com	Seekport | ||||
| => https://teclis.com	Teclis | ||||
| 
 | ||||
| ## Obscure site discovery | ||||
| 
 | ||||
| => https://theforest.link	The Forest | ||||
| 
 | ||||
| ## AI image generation | ||||
| 
 | ||||
| => https://huggingface.co/spaces/stabilityai/stable-diffusion	Stable Diffusion Demo | ||||
| => https://stabilityai.us.auth0.com/u/login?state=hKFo2SBqWXBRQ25mblJrSGFuZzNIM1l2VGJxNk1SeERKUEdMWqFur3VuaXZlcnNhbC1sb2dpbqN0aWTZIHJvN2huZFA1QWJDOUhfMmNaTHJoQmtNT2xvWUw1bVlyo2NpZNkgS3ZZWkpLU2htVW9PalhwY2xRbEtZVXh1Y0FWZXNsSE4	StabilityAI | ||||
| => https://www.drawanything.app	Draw Anything | ||||
| => https://huggingface.co/spaces/hakurei/waifu-diffusion-demo	Waifu Diffusion | ||||
| => https://neuralblender.com	Neuralblender | ||||
| => https://www.wombo.art/create	Dream by WOMBO | ||||
| 
 | ||||
| ## IP anon check | ||||
| 
 | ||||
| => https://www.whatismyip.com	What Is My IP? | ||||
| => https://myip.wtf	WTF is my IP?!?!?!?? | ||||
| => https://check.torproject.org	Am I using Tor? | ||||
| 
 | ||||
| ## Piracy | ||||
| 
 | ||||
| => https://fitgirl-repacks.site	FitGirl Repacks | ||||
| => https://piratebayproxy.info	List of Pirate Bay proxies | ||||
| => https://gog-games.com	GOG Games | ||||
| => https://hshop.erista.me	hShop for 3DS | ||||
| => https://archive.org/details/psxgames	Console Living Room: Playstation  | ||||
| => https://nxbrew.com	NXBrew | ||||
| => https://nsw2u.in	nsw2u | ||||
							
								
								
									
										30
									
								
								garden/os/openbsd.md
									
										
									
									
									
										Executable file
									
								
							
							
						
						
									
										30
									
								
								garden/os/openbsd.md
									
										
									
									
									
										Executable file
									
								
							|  | @ -0,0 +1,30 @@ | |||
| ## installation | ||||
| 
 | ||||
| https://www.openbsd.org/faq/faq14.html#softraid | ||||
| 
 | ||||
| remember to run `ifconfig re0 up` before starting any shell operations | ||||
| 
 | ||||
| ## package manager | ||||
| 
 | ||||
| https://www.openbsd.org/faq/faq15.html#Intro | ||||
| 
 | ||||
| apt search | pkg_info -Q | ||||
| apt install | pkg_add | ||||
| apt remove | pkg_delete | ||||
| 
 | ||||
| ## wifi | ||||
| 
 | ||||
| run `ifconfig` and get name of wifi interface (for example, mine is `urtwn0`) | ||||
| 
 | ||||
| make a text file (as root) at `/etc/hostname.InterfaceName` (for example, `/etc/hostname.urtwn0`) with the following contents: | ||||
| 
 | ||||
| ``` | ||||
| join SSID wpakey WIFIPASSWORD | ||||
| inet autoconf | ||||
| ``` | ||||
| 
 | ||||
| then run `doas sh /etc/netstart` | ||||
| 
 | ||||
| ## misc | ||||
| 
 | ||||
| there is no `lsblk`. to get a list of all disks connected, run `sysctl hw.disknames` | ||||
							
								
								
									
										37
									
								
								garden/vlc.gmi
									
										
									
									
									
										Executable file
									
								
							
							
						
						
									
										37
									
								
								garden/vlc.gmi
									
										
									
									
									
										Executable file
									
								
							|  | @ -0,0 +1,37 @@ | |||
| # Using VLC via its ncurses frontend with equalizers | ||||
| 
 | ||||
| 1. Install VLC. | ||||
| 2. Open VLC and drag some music in. | ||||
| 3. While playing some music, open the Tools > Effects and Filters menu. Play around with the presets until you find one that sounds good. | ||||
| 4. Write down the name of the preset you used and then close VLC. | ||||
| 5. In a terminal, "cd" to where the music you want to play is. | ||||
| 6. In that terminal, execute this command: | ||||
| 
 | ||||
| ``` | ||||
| cvlc --equalizer-preset=INSERT_PRESET_NAME_HERE -I ncurses *.ext | ||||
| ``` | ||||
| 
 | ||||
| ".ext" is the file extension of your music files, like ".mp3" or ".flac". | ||||
| 
 | ||||
| Here is a list of possible presets as of 2020: | ||||
| 
 | ||||
| * flat | ||||
| * classical | ||||
| * club | ||||
| * dance | ||||
| * fullbass | ||||
| * fulltreble | ||||
| * fullbasstreble | ||||
| * headphones | ||||
| * largehall | ||||
| * live | ||||
| * party | ||||
| * pop | ||||
| * reggae | ||||
| * rock | ||||
| * ska | ||||
| * soft | ||||
| * softrock | ||||
| * techno | ||||
| 
 | ||||
| Pressing the "h" key will open the help menu, which will show you the plyer controls. | ||||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue