Powered PCI-E Extension Cable 16X To 16X Riser Extender Card with Molex LTC DOGE is for sale on cryptothrift.com for Bitcoin and Litecoin https://cryptothrift.com/auctions/crypto-mining-accessories/powered-pci-e-extension-cable-16x-to-16x-riser-extender-card-with-molex-ltc-doge/
NAXN 650w PSU, non-modular. (Cable management with it is a nightmare.)
2 x 8GB DDR4-3200 Sport Balistix
Galax GTX 1070 (2nd-hand too! Bought it from someone who used it for bitcoin mining.)
AverMedia Live Gamer HD 2 PCI-E Capture Card (Outer shell removed. Can you guess why?)
Fans (2 x SickleFlow 120mm RGB included with AIO, 1 x Silent Wings 3 140mm, 2 x Silent Wings 3 120mm)
IPS 1366 x 768 LCD screen, salvaged from my father's old laptop. Secondary monitor inside my case. ;-) Extra parts ordered from AliExpress: Controller board, acrylic case to house controller board, Molex-to-2.5mm Jacket plug, 19cm HDMI ribbon cable.
Last but not least, first-time installation of LED stripping to the case interior.
3D Printed Housing for External Vive Wireless Card
Sorry I am not providing details as I want to get this info out quickly. I will respond with info if anyone shows interest, though I might be slow. I'm not sure if anyone remembers the talk about extending the range of their Vive wireless setups. Basically, you can get a PCIe extender (built for bitcoin mining rigs I believe), and use USB 3 to move your Vive Wireless WiGig card 35 ft (CORRECTION: 20ft) to your computer. I have found that it works great for me. But you end up with this exposed computer board just sitting there in your room with nothing to keep the board from sliding out of the extender socket and nothing to protect the board while also allowing cooling. I took enough measurements off of the board to create a 3d model of it that captures the design information needed to create an enclosure. I also created a 3d printable enclosure that is "good enough". I haven't posted it because "an artist's work is never done", but if I don't post what I have, I might never post it. So please let me know if anyone is interested in a model of the card and enclosure. Note that the enclosure is specific to the dimensions of the extender I bought, so minor tweaks might be required if you have a different extender. Here is a picture of the final result (yes I used tape for my prototype that I never developed further) I designed it to be modular (see the joiners I left open in the picture, in case a part of the print fails or needs fixing) and also it does not require supports. (Shakes fist at designs that require supports!) https://imgur.com/a/op35gVL (I would appreciate advice on how to get the image to show up in this post, I don't do this a lot) Answers: Here are the exact two products I bought from Amazon. No guarantees. At the time people were looking into extending the wire from the card to antenna, but my first try didn't work. Beware, the part that you plug into your pci slot can, incredibly, be put in backwards and still fit. Also there is nothing keeping the extender in the slot. https://www.amazon.com/gp/product/B07N38Y799/ref=ppx_yo_dt_b_search_asin_title?ie=UTF8&psc=1 https://www.amazon.com/gp/product/B07G93LTVX/ref=ppx_yo_dt_b_asin_title_o00_s01?ie=UTF8&psc=1 I can't find an exact link that I followed for recommendations, but there are tons of hits here: https://www.google.com/search?q=vive+wireless+extension+reddit&oq=vive+wireless+extension+reddit&aqs=chrome..69i57j0.5679j0j7&sourceid=chrome&ie=UTF-8
Can I offload some of the heating load of my electric baseboard heaters on to two old PCs?
Hello I’m in a unique situation. I own my condo, all I have is baseboard electric heating and electricity is cheap at the moment. I also have some leftover gaming machines that are idle (unplugged) and free to use. Instead of heating my home solely with baseboard electric heating I would run the machines and do useful work and get some kind of benefit. Last December I spent over $200 on electricity. I have no plans on using other forms of heating like gas or fireplaces because that would involve renovations. Plus because this wouldn’t cost me anymore than electricity and my time, I’m ok with just having a learning experience/experiment. Small payouts are fine, I have a job. My questions are which coins could I mine? Which set up would you suggest? My first rig is a Q8200 equivalent (actually a Xeon) with 2x PCI-E x16 2.0 slots (I can run two cards in this) with 8gb of RAM and possibly a 750ti and 770. My second rig is a i7 4770 equivalent (actually a Xeon) with 1x PCI-E x16 2.0 slot ( I can only run 1 card in this) with 16gb of RAM and the 770. I can run two GPUs in a 2010 era PC or I can run one GPU in a machine with much more RAM and CPU or I can run two separate machines 1 old CPU/GPU, 1 older GPU/CPU. I was thinking I could mine easier coins and convert them to bitcoin instead of trying for bitcoin directly. Electricity is $0.12 CAD/$0.09 USD per kWh. Hopefully I’m in the right subreddit, please let me know if there’s a better spot to post this. TL;DR Can I offload some of the heating load of my electric baseboard heaters on to two old PCs?
Building my first rig with 6 GPUs using an Asus B250 MB, looking for advice
New member so please be gentle. I have been micro mining for a few months now (with my GTX 1060 and my new RTX 2080 ti) and want to step up my game a notch. I have my sites set on building the following system with the specs listed below so far. Any input on why I should not use a specific item or why I should use a certain item would be greatly appreciated! 1. Kingwin Bitcoin Miner Rig Case W/ 6, or 8 GPU Mining Stackable Frame x 1: I have expansion in mind with this frame. It's stackable and ounces I ROI my first rig I plan on tossing a second level on to it. This frame is currently selling for around $50. Kingwin Bitcoin Miner Rig Case W/ 6, or 8 GPU Mining Stackable Frame 2. ROSEWILL Gaming 80 Plus Gold 1600W Power Supply (HERCULES-1600S) x 1: The heart of any rig, the power! I like this one for it's 1600W and it's price. Currently running around $200. ROSEWILL Gaming 80 Plus Gold 1600W Power Supply (HERCULES-1600S) 3. ASUS B250 MINING EXPERT Motherboard x 1: This motherboard is being used with expansion in mind. I want to start with 6 GPUs then build on that. Currently running around $140. ASUS MINING EXPERT Motherboard (B250) 4. VOLADOR PCI-E Riser 1x to 16x Powered Riser Adapter Card (USB3) x 6: Standard USB 3.0 risers. They come in a six-pack for about $20. VOLADOR PCI-E Riser 1x to 16x Powered Riser Adapter Card (USB3) 5. XFX Radeon RX 580 GTS XXX Edition (RX-580P8DFD6) x 6: Currently cheaper than the Sapphire below. These are currently running around $170. XFX Radeon RX 580 GTS XXX Edition (RX-580P8DFD6) 5-ALT. Sapphire Radeon Pulse RX 580 8GB (11265-05-20G) - BACKUP CHOICE GPU: This is what I was looking at first then I found the cheaper XFX Radeon's above. These are currently running around $180. Sapphire Radeon Pulse RX 580 8GB (11265-05-20G) 6. CPU: Currently I do not have any CPUs in mind to use for this rig. I know I don't need a beefy CPU for running Windows. I plan on ONLY mining with GPUs in this rig. Suggestions are welcome! 7. Memory: Currently I do not have any memory in my sites. Suggestions are welcome! 8. Harddrive: I plan on using a simple 128GB USB thumb drive for the hard drive right now. Possibly something like an SSD if needed, but plan on using USB flash drive to start. Pros/Cons suggestions welcome! I think I my video my endeavor and show everyone how fun/frustrating it all was. Catching all the pitfalls in hopes of helping others out etc. But first I need to have a plan and that's what this is. I need to do some lite research, get a good shopping list, make a payment plan, and an ROI schedule. Any feedback that the community could give me would be very helpful because I only know about 80% of what I need to know to build this rig. The 20% is the overclocking, bios issues (MB and gpu), and general knowledge of building a mining rig. I expect there to be pitfalls and parts I didn't think of until I start the build.
Hi there, I'm running esxi on my home server and I'm slowly coming to the conclusion that there are more discrete PCIe devices (low-power GPUs, USB-cards, SATA-controllers) that I'd like to pass through to individual VMs than my mainboard can provide PCIe slots for. How would esxi handle PCIe bifurcation or riser systems like this? Could I pass through all PCIe devices connected to these kinds of systems to individual VMs or could I only pass through the "original" slot on the motherboard? To clarify, I'm not worried about bandwidth here since I'm neither using high-power GPUs nor 10Gbit ethernet adapters nor NVMe-storage, so I'd be fine with having 16 PCIe x1 slots instead of one PCIe x16 slot. Thanks!
Guys i need help here im new to mining,i have an old socket 775 motherboard paired with a core 2 quad Q6600 and 8gb DDR2 800mhz and i decided to pair it with a gtx 1070 8gb does the motherboard/cpu/slow ram effect the mining power of gpu by any means (Cpu bottleneck/ram bottleneck/slow transfer rate?????
The importance of being mindful of security at all times - nearly everyone is one breach away from total disaster
This is a long one - TL;DR at the end!
If you haven't heard yet: BlankMediaGames, makers of Town of Salem, have been breached which resulted in almost 8 million accounts being leaked. For most people, the first reaction is "lol so what it's just a game, why should I really care?" and that is the wrong way to look at it. I'd like to explain why everyone should always care whenever they are part of a breach. I'd also like to talk about some ways game developers - whether they work solo or on a team - can take easy steps to help protect themselves and their customers/players. First I'd like to state that there is no practical way to achieve 100% solid security to guarantee you'll never be breached or part of a breach. The goal here will be to get as close as possible, or comfortable, so that you can rest easy knowing you can deal with problems when they occur (not if, when).
Why You Should Care About Breaches
The sad reality is most people re-use the same password everywhere. Your email account, your bank account, your steam account, your reddit account, random forums and game websites - you get the idea. If you haven't pieced it together yet the implication is that if anyone gets your one password you use everywhere, it's game over for you - they now own all of your accounts (whether or not they know it yet). Keep in mind that your email account is basically the holy grail of passwords to have. Most websites handle password changes/resets through your email; thus anyone who can login to your email account can get access to pretty much any of your accounts anywhere. Game over, you lose.
But wait, why would anyone want to use my password? I'm nobody!
It doesn't matter, the bad guys sell this information to other bad guys. Bots are used to make as much use of these passwords as possible. If they can get into your bank they might try money transfers. If they get into your Amazon account they might spin up $80,000 worth of servers to mine Bitcoin (or whatever coin is popular at the time). They don't care who you are; it's all automated. By the way, according to this post (which looks believable enough to be real) this is pretty much how they got into the BMG servers initially. They checked for usernames/emails of admins on the BMG website(s) in previous breach dumps (of which there are many) and found at least one that used the same password on other sites - for their admin account! If you want to see how many of your accounts are already breached check out Have I Been Pwned - I recommend registering all of your email addresses as well so you get notified of future breaches. This is how I found out about the Town of Salem breach, myself.
How You Can Protect Yourself
Before I go into all the steps you can (and should) take to protect yourself I should note that security is in a constant tug of war with convenience. What this means is that the more security measures you apply the more inconvenienced you become for many tasks. It's up to you to decide how much is too much either way. First of all I strongly recommend registering your email(s) on https://haveibeenpwned.com/ - this is especially important if your email address is associated to important things like AWS, Steam developer account, bank accounts, social media, etc. You want to know ASAP when an account of yours is compromised so you can take steps to prevent or undo damage. Note that the bad guys have a head start on this!
You probably need to have better password hygiene. If you don't already, you need to make sure every account you have uses a different, unique, secure password. You should change these passwords at least once a year. Depending on how many accounts you have and how good your memory is, this is your first big security vs convenience trade-off battle. That's easily solved, though, by using a password manager. You can find a list of password managers on Wikipedia here or you can search around for some comparison articles. Some notable choices to consider:
1Password - recommend by Troy Hunt, creator of Have I Been Pwned
LastPass - I use this at work and it's generally good
BitWarden - free and open source! I use this at home and in some ways it's better than LastPass
KeePass (and forks) - free, open source, and totally offline; if you don't trust "the cloud" you can trade away some more convenience in exchange for taking full responsibility of your password security (and backups)
Regardless of which one you choose, any of them is 100x better than not using one at all.
The problem with all these passwords is that someone can still use them if they are found in a breach. Your passwords are only as strong as the website you use them on. In the case of the BMG breach mentioned above - all passwords were stored in an ancient format which has been insecure for years. It's likely that every single password in the breach can be reversed/cracked, or already have been. The next step you need to take is to make it harder for someone else to login with your password. This is done using Multi-Factor Authentication (or Two-Factor Authentication). Unfortunately not every website/service supports MFA/2FA, but you should still use it on every single one that does support it. You can check which sites support MFA/2FA here or dig around in account options on any particular site. You should setup MFA/2FA on your email account ASAP! If it's not supported, you need to switch to a provider that does support it. This is more important than your bank account! All of the big email providers support it: GMail, Outlook.com, Yahoo Mail, etc. The type of MFA/2FA you use depends on what is supported by each site/service, but there is a common approach that is compatible on many of them. Most of them involve phone apps because a phone is the most common and convenient "thing you have" that bad guys (or anyone, really) can't access easily. Time-based One-time Password or TOTP is probably the most commonly used method because it's easy to implement and can be used with many different apps. Google Authenticator was the first popular one, but it has some limitations which continue the security vs convenience battle - namely that getting a new phone is a super huge chore (no backup/restore option - you have to disable and setup each site all over again). Many alternatives support cloud backup which is really convenient, though obviously less secure by some measure. Notable choices to consider:
Authy - probably the first big/popular one after Google Authenticator came out (I think) - NOTE: They let you use it on your desktop/browser, too, but this is TOO much convenience! Don't fall for that trap.
LastPass Authenticator - conveniently links up with a LastPass account, some sites support extra features (like not needing to type a code, just answer a phone notification)
Yubikey - A real physical MFA device! Some models are compatible with phones, too.
Duo - this one is more geared towards enterprise, but they have a free option
Some sites/services use their own app, like Blizzard (battle.net) and Steam, and don't allow you to use other ones. You will probably have a few apps on your phone when all your accounts are setup, but it's worth it. You'll definitely want to enable it on your password manager as well if you chose a cloud-based one. Don't forget to save backup codes in an actual secure location! If you lose your backup codes and your auth app/physical key you will be locked out of accounts. It's really not fun recovering in that situation. Most recommendations are to print them and put in a fireproof safe, but using some other secure encrypted storage is fine. There is such a thing as bad MFA/2FA! However, anything is at least better than nothing. A lot of places still use SMS (text messaging) or e-mail for their MFA/2FA implementation. The e-mail one has the most obvious flaw: If someone gets into your email account they have defeated that security measure. The SMS flaws are less obvious and much less likely to affect you, but still a risk: SMS is trivial to intercept (capture data over the air (literally), clone your SIM card data, and some other methods). Still, if you're not a person of interest already, it's still better than nothing.
What Does This Have To Do With GameDev?
Yeah, I do know which subreddit I'm posting in! Here's the section that gets more into things specific to game development (or software development in general).
Secure Your Code
Securing your code actually has multiple meanings here: Securing access to your code, and ensuring your code itself is secure against exploitation. Let's start with access since that's the easier topic to cover! If you're not already using some form of Source Control Management (SCM) you really need to get on board! I'm not going to go in depth on that as it's a whole other topic to itself, but I'll assume you are using Git or Mercurial (hg) already and hosting it on one of these sites (or a similar one):
First, ensure that you have locked down who can access this code already. If you are using private repositories you need to make sure that the only people who have access are the people who need access (i.e. yourself and your team). Second, everyone should have strong passwords and MFA/2FA enabled on their accounts. If 1 person on the team does not follow good security practices it puts your whole project at risk! So make sure everyone on the team is following along. You can also look into tools to do some auditing and even automate it so that if anyone's account becomes less secure over time (say they turned off MFA one day) they would automatically lose their access. Additionally you should never commit secrets (passwords, API keys, tokens, social security numbers, etc) to your code repository. Probably 90% of cases where people have their AWS/Google Cloud/Azure accounts compromised and racking up huge bills for bitcoin mining is due to having their passwords/keys stored in their git repo. They either accidentally made it public or someone got access to the private repo through a compromised account. Never store sensitive information in your code repository! Next topic: Securing your code from vulnerabilities. This one is harder to talk about for game dev as most engines/frameworks are not as susceptible (for lack of a better word) to these situations as others. In a nutshell, you need to keep track of the following:
Is my code doing anything "dangerous"? (system-level stuff, memory access, saving passwords anywhere)
Could someone get the keys to the kingdom (API key, server password, etc) by just opening Cheat Engine and looking at memory values? Or doing a strings/hex edit/decompile/etc on my game executable?
Am I using outdated libraries/framework/engine? Do they have any known security bugs?
Secure Your Computer
I'm not going to go in depth on this one because at this point everyone should have a handle on this; if not there are limitless articles, blogs, and videos about the how/what/why. In summary: Keep everything updated, and don't open suspicious links.
Lock your computer when idle - use a password (or PIN or face unlock or whatever your OS uses) - no one should ever be able to walk up to your computer and use it if you're not looking, nor should they be able to get in if they grabbed your closed laptop off the table at starbucks (thanks u/3tt07kjt for reminding me of this one)
Use full disk encryption (especially on laptops)
Update your OS for security updates ASAP
Use anti-virus (yes, Windows Defender is fine) and keep it updated
Update your web browser ALWAYS (this is your 99% chance attack vector, so don't postpone it!)
Don't install browser extensions that you don't need - a LOT of extensions are either malware from the start or become malware later (my favorite emoji extension started mining bitcoins, FFS!) - check reviews regularly after extensions update
DO use adblock and privacy extensions - ads are a common attack vector - I recommend uBlock Origin and Privacy Badger at a minimum (note that some legit sites can break and so you'll have to fiddle with settings or whitelist)
Don't open suspicious or unknown links on e-mail, social media, discord, etc (be sure to hover over the links in this post before clicking them)
Don't open attachments, ever - unless you were expecting it from that person at that time
Don't fill out ANY forms (comments, login, registration, etc) on websites that don't have HTTPS (secure) connection - your browser will show this in the address bar, usually
In general, be suspicious of everything that comes from people you don't know - and even from people you do know if it was unexpected
E-Mail is (probably) the least secure form of communications ever invented - so try not to use it for sensitive things
Secure Your Website
I will have to add more to this later probably, but again there are tons of good articles, blogs, and videos on these topics. Hopefully the information in this section is enough to get you on the right track - if not feel free to ask for more info. Lots of guides can be found on Digital Ocean's site and they are relevant even if you don't use DO for your servers.
Use HTTPS (SSL/TLS) secure connections - it's FREE and EASY thanks to Let's Encrypt
KEEP EVERYTHING UPDATED - automate as much as you can
If you have control over the server, you MUST update the OS, the web server, and any backend application servers/languages/frameworks involved. Equifax breach was due to having out of date server software. BMG breach was worsened by having out of date server software. YOU MUST STAY UPDATED, ALWAYS
Don't store sensitive personal information - it's a huge pain to be PCI compliant, it's a huge fine if you mess it up - avoid storing any customer information that you don't actually need (see also: GDPR )
Do not allow access to SSH/Remote desktop/Database services from the whole world; the general public should only ever be able to reach ports 80 and 443 on your web server (and 80 should permanently redirect to HTTPS)
Use SSH keys instead of passwords on Linux servers
Don't run your own email server - it's just not worth it; use google apps for business, office 365, zoho, or something else for business email
Secure your domain registrar account! Don't lose your domain to a bad password or lack of MFA/2FA or an old email address! If your registrar doesn't support actual security then transfer to one that does. (namecheap, namesilo, google domains, amazon aws route53, even godaddy, the absolutely worst web company, has good security options)
A lot of this will apply to your game servers as well - really any kind of server you expect to setup.
That's it, for now
I ran out of steam while typing this all up after a couple hours, but I may revisit it later to add more info. Feel free to ask any questions about any of these topics and I'll do my best to answer them all.
TL;DR (y u words so much??)
Use a password manager so you can have different, random, secure passwords on every account on every website/service/game
Use MFA/2FA on every account, if possible
Lock your computer when idle/away
Use full disk encryption on laptops
Update your operating system (we all hate Windows Update, but it really is for our own good)
Use anti-virus (Windows Defender is fine)
Update your browser
Use good adblockeprivacy blocker browsers extensions
Don't use browser extensions that you don't really need (they could be a trojan horse of bitcoin mining later)
Don't trust anything sent by anyone, unless you were expecting it and know it's safe
E-mail is the least secure form of communications in use these days; don't trust it for sensitive things
Use source control for your game code (git, mercurial, etc)
Lock down access to your source code
Don't put secrets (passwords, API keys/tokens, social security numbers, credit card numbers) in your code repository
Don't do dumb things like store your AWS keys in your game for players to just find with simple tools
Check your code dependencies for security bugs, update them when needed
Use HTTPS on your website
Update your web server OS and software
Use secure password storage (don't reinvent this wheel, it's been solved by way smarter people)
Use SSH keys instead of passwords for Linux servers
Use a firewall to block the world from getting in with SSH/Remote desktop/database direct connections
Only allow your own IP address (which can change!) into the server for admin tasks
Don't run your own email server, let someone who knows what they are doing handle that for you
Secure your domain registrar account, keep email address up to date
... in general... in general... in general... I sure wrote those 2 words a lot.
Why Should I Trust This Post?
Hopefully I have provided enough information and good links in this post that you can trust the contents to be accurate (or mostly accurate). There is certainly enough information to do some searches on your own to find out how right or wrong I might be about these things. If you want my appeal to authority answer: I've been working at a major (network/computer) security company for almost 7 years as a software developer, and I've had to put up with pretty much every inconvenience brought on by security. I've also witnessed the aftermath of nearly every type of security failure covered in this post, via customers and the industry at large. None of the links I used are related to my employer or its products. Edit: Fixed some typos and added some more links More edit: added a few more points and links
Planning a new fan-cooled 3D rendering workstation. I liked Entagma's build, but its already outdated with the new AMDs coming out in November with 128 PCIe lanes (PCIE 4.0). So ideally, the build can have the option to expand beyond 4 gpus using riser cards to split x16 pci slots into 2 pci x8... potentially 6-10 gpu's. Most cases can only handle 4 double-wide GPUs (rtx 2070). Are the bitcoin mining cases ok for 3D Rendering and fan cooling? I've seen a brand called Hydra III that looks promising. I don't want to buy a huge bulky rack just to use a rackmount style case. Or do you recommend another case? https://www.amazon.com/Hydra-III-Server-Mining-Case/dp/B07B4PPQK8
Minelabs GPZ 7000 GP X 5000 GP X 4500 SDC 2300 CTX 3030 gpz 7000 sdc2300 ctx3030 All Terrain Gold Metal Detector
For Sell Bitmain Antminer Z11,Bitmain Antminer S17 PRO - 53TH/s Minelabs GPZ 7000 GP X 5000 GP X 4500 SDC 2300 CTX 3030 gpz 7000 sdc2300 ctx3030 All Terrain Gold Metal Detector GER DETECT Titan 1000 Professional Geolocator Long Range Professional Metal Detector Underground Depth Scanner BRAND New Version DRS Ground Expert PRO - Best Metal Detector Brand New OKM Gepard GPR - Bodenradar mit Android Tablet-PC GROUNDTECH EVO - Underground 3D Imaging System - Treasure Hunter Free delivery OKM Bionic X4 - Long Range Gold detector mit Android Smartphone New DUAL SYSTEM 3D MAKRO GROUND-PENETRATING RADAR GPR METAL DETECTOR GOLD OFFER FOR-GARRETT AT/ATX ProFisher MAX Gold Pro ACE 400 300 250 200 GTI 2500 Sea Hunter Mark II PRO-POINTER AT Z-LYNK Shipping Method : FedEx & UPS and DHL Delivery Time : 2 / 3 days FREE Delivery To Your Door Step 100% HOME DELIVERY GUARANTEED WORLDWIDE No Tax / Custom Charges Call.Text AND Whatsapp24HOURS: +16363239302 VR10000 Long Range Underground Gold Gem Metal Detector Silver,hunter finder GER DETECT TITAN 1000 Metal Detector - Professional Long Range Metal Detector Genius 5000 XRF X-ray Fluorescence Analyzer Handheld Ruggedized Spectrometer GPA 3000 XS Model 2019 - 3D Underground scanner metal Detector KTS Nokta Invenio Pro Makro Gold Racer Metal Detector Standard Package w/2 Water Proof Coils and Extras Intelligent Imaging System Genius 5000 XRF X-ray Fluorescence Analyzer Handheld Ruggedized Spectrometer Brand New Nord Stage 3 88 Piano Fully Weighted Hammer Action Keyboard Digital Piano Furuno TZtouch2 15" MFD TZTL12F TZT9 9-Inch LCD1971F GPS/Fishfinder Nav Net TZ Touch2 MFD Chart Plotter & Fish Finder, 12.1 in. BRAND NEW Carestream CS3500 CS3600 CS 3600 CS 3500 Intraoral Scanner Dental Color 3d Scanner New Intel Core i9-9900K i9-7980XE i9-7900X i9-7920X i9-7940X i9-7960X i9-9820X i9-9900X i9-9920X i9-9940X i9-9980XE i9-9960X Faro Freestyle 3D Scanner High Quality & Performance for Trimble TX5 3D Laser Scanner FUSIONSILICON X7 (262GH/S) + Power Supply - NEW - STOCK 2019 New Colorful iGame GeForce RTX 2080 Ti GDDR6 11GB Gaming Graphics Cards 1635MHz I6U3 2019 Offer For-Obelisk SC1 Gen 1 ( Batch 2) Slim Siacoin Miner - ( up to 550 ghs ) New Bitmain Antminer S17 Pro T17 53TH/s 56TH/s bitcoin Mining Asic Miner with PSU 50TH/s Gamer PC with monitor Intel i9-9900K 27 inch RTX 2080 8GB Complete set computer FREE SHIPPING Gaming PC Intel Core i9 9900k RTX 2080 Ti 16GB DDR4 Water Cooling Gaming Desktop Free Shipping Korg PA4X 76-Note Professional Arranger Workstation Keyboard with speaker system New Price For Brand New 2018 / 2019 Kawasaki Jet Ski 800 SX-R New KORG KRONOS SE KRONOS2 KRONOS 2 KRONOS3 KRONOS 3 KRONOSX KRONOS X 61 73 88 keys Keyboard Music Workstation All Available Pioneer DDJ-1000 DDJ-400 DDJ-RZX DDJ-RZ DDJ-RR DDJ-SZ2 DDJ-XP1 DDJ-SX3 DDJ-SR2 DDJ-SB3 DDJ-SP1 DDJ-WEGO4 DJ SYSTE Chison Ebit 50Vet Color Ultrasound with Micro Convex Probe Optimum Thermo-cook Pro Thermo-mix Multi Functional Cook, Blend, Mix, Boil, Beat DCK1020D2 20V Max 10-Tool Combo Kit (BRAND NEW!!!) 11pcs. Combo Kit Brushless Cordless Tools Including Carrying Bag 2019 best warranty for original sales Kaabo Wolf Warrior II New Design 11inch 60V 35AH Electric Scooter with suspension 20 Volt 20-v Max Lithium Ion Cordless Combo Kit (15-Piece Tool Kit) COMBO 18V 54V 5.0Ah 6.0Ah XR Li-ion Cordless 12pce TOOLS SET Brushless LXT1500 18V LXT Lithium-Ion Cordless 15-Piece Combo Kit (3.0Ah) Bulk Sales! Intel Xeon Platinum 8180 CPU Processor 28 Core 2.5GHz 38.5MB Cache 205W SR377 Wholesales MSI RX 580 GAMING X 4G, 8G Radeon RX 580 GDDR5 4GB CrossFire VR Ready FinFET DirectX 12 Graphics Card BRAND NEW FOR-LENOVOS ThinkPad X1 1TB Yoga 910 C930 920 720 520 Legion Y530 Y720 Y920 Laptop - Core i7 1.8GHz 2.7GHz 16GB Shipping Method : FedEx & UPS and DHL Delivery Time : 2 / 3 days FREE Delivery To Your Door Step 100% HOME DELIVERY GUARANTEED WORLDWIDE No Tax / Custom Charges Call.Text AND Whatsapp24HOURS: +16363239302 Original FOR-Gibson 2019 model electric guitar FOR-Les Paul Traditional 2019 Left Hand Her NEW Wholesale For Microsofts Surface Pro 6 - 128GB/256GB/512GB - intel core i5/i7/M3 (WiFi High efficiency Good Price Brand New/Used 2014 Mercury 115HP 25in Outboard Motor antminer innosilicon A9 z master 50Ksol/s btc eth bitcoin coin asic miner with PSU DJI Phantom 4 Pro+ & Phantom4 Pro RC Drone with 4K HD 60fps Camera MSI 2080 Ti Ventus 11GB Graphics Card (GeForce RTX 2080 Ti 11G OC) *BRAND NEW* No 1 Gaming laptop MSI GT80 TITAN SLI 18.4 Gamer notebook AMD Sapphire MSI Radeon RX 470 graphics card MSI GTX 1080 Ti GAMING X 11GB Graphics card 352BIT GDDR5X PCI- New Pioneer Nexus 2 DJ Set 2 CDJ 2000 NXS2 Players 1 DJM 900 NXS2 Mixer SALES For New Microsoft Surface Pro 4 256GB Wi-Fi 12.3in - Silver (Intel Core i7 New MSI GP73 Leopard 8RF-296 3052393 43,9 cm (17,3 Zoll) Gaming-Laptop New MSI GV72 8RD 084 - Core i7 2,2 GHz - 17,3 Zoll - 8 GB RAM - 1.512 TB SSD Go Pro HE-RO 7 Action Camera - Black & White edition Go Pro Kite Ozone C4 V6, 12 m 2018 + bag + bar FULL KIT! Shipping Method : FedEx & UPS and DHL Delivery Time : 2 / 3 days FREE Delivery To Your Door Step 100% HOME DELIVERY GUARANTEED WORLDWIDE No Tax / Custom Charges Call.Text AND Whatsapp24HOURS: +16363239302
For what I hope are obvious reasons, I don't want, and probably will never post my threat model publicly online. However, regardless of that, what I'm sure you will extrapolate from this post is that I live my life, digitally in particular, with a fairly high level threat model. This is not because I'm some super sophisticated criminal mastermind, but rather, I am at this level because I genuinely love playing around with this stuff. And I just happen to understand the importance of privacy and just how vital it is to a truly healthy society. I would like to extend a thanks to ProgressiveArchitect for the sharing of the knowledge they have done on this subreddit, /privacytoolsio, and the like. We may have never interacted, but nevertheless, your input into this community is truly interesting and extremely informative and educating. I'm sure those of you familiar with PA's setup will be able to draw some parallels with mine and their's. Thank you. I hope you all enjoy reading this write up.
I run Qubes OS on a Lenovo ThinkPad X230 laptop. Specs for it are as following: - i7-3520M - 16GB RAM - 1TB Samsung 860 Evo SSD - Qualcomm Atheros AR9285 wireless card Additionally, I used a Raspberry Pi Model 3B+ and a Pomono SPI clip to replace the stock BIOS firmware with coreboot+me_cleaner. This wasn't done out of any "real" concern for the Intel ME (though of course proprietary black-boxes like it should be avoided at all costs and not trusted), but rather for open source enthusiasm and for increased security and faster boot times than what the stock BIOS firmware allows for. On that note about the ME, I don't believe the conspiracy theories that claim that it is a state-sponsored attack method for surveillance. I believe that Intel had good intentions for improving the lives of IT professionals who need to manage hundreds, if not thousands of remote machines. However, it has proven time and time again to be insecure, and I don't need the remote management and the "features" that it provides on my machines. In Qubes, I use a combination of AppVMs and StandaloneVMs for a variety of different purposes. All VMs use PVH over HVM, except for the Mirage Unikernel Firewall, which uses PV, and the sys-net and sys-usb StandaloneVMs which have to use HVM because of PCI device passthrough. Right now most of my VMs are AppVMs, but for maintenance and compartmentalization reasons, I am considering moving more towards StandaloneVMs, despite the increase in disk space and bandwidth usage for updates. General route of from Qubes to the Internet for anonymous browsing, general private browsing, accessing Uni services, and Uni-related anonymous browsing respectively: 1. Qubes->sys-mirage-firewall->sys-vpn-wg->sys-corridor->sys-whonix->whonix-ws-15-dvm to the internet. 2. Qubes->sys-mirage-firewall->sys-vpn-wg to the Internet. 3. Qubes->sys-mirage-firewall->uni-vpn-wg to the Internet. 4. Qubes->sys-mirage-firewall->uni-vpn-wg->uni-corridor->uni-whonix->uni-anon-research to the Internet.
(Note: the VPN name is substituted in the "vpn" above. I had to remove it to comply with this subreddit's rules. It is easy to identify what VPN it is as it randomly generates a long numaric string and has fantastic support for WireGuard.)
fedora-29-minimal: Base for the minimal VMs.
fedora-29-uni-persist: Template for uni-campus and uni-home AppVMs.
crypto: A work in progress VM for handling crypto transaction using cleansed Bitcoin and Monero.
printing: Exactly as it sounds like. It is firewalled to only be able to connect to the network printer on my home network.
sys-corridor: corridor is a Tor traffic whitelisting gateway that provides network to sys-whonix. It helps to provide an additional failsafe to defend against clearnet attacks.
sys-mirage-firewall: A version of the Mirage Unikernel to act as an extremely minimal and resource light firewall. It is configured to only allow connections to the individual IP addresses my VPN's WireGuard servers as well as a select few internal IP addresses on my home network (router, home server, and Pi-Hole).
uni-corridor: See sys-corridor for description. Provides network to uni-whonix.
sys-usb: USB stack isolation VM. Uses fedora minimal now.
uni-vpn-wg: A Uni ProxyVM for my VPN.
uni-net: A ProxyVM for all Uni-related domains. Based off fedora minimal.
uni-shared: Acts as an SMB network share for uni-campus and uni-home so that the documents and emails can be accessed easily between them.
fedora-29-dvm: Default disposable Fedora VM.
whonix-ws-15-dvm: Default disposable Whonix VM. This is where I do 95% of my online browsing.
calendar: Exactly as it's named. Has a firewall rule to only allow connections to posteo.de.
nas-access: Used to access my NAS and to watch content on it.
pihole-access: Used to access my Pi-Hole through Firefox. Has a firewall rule to only allow connections to its IP address.
router-access: Used to access my router through Firefox. Has a firewall so its only able to connect to 192.168.0.1.
personal: Personal domain. Used to check personal emails, read rss feeds, stream YouTube videos, and internet banking.
repos: Local copy of my repos. Has a firewall rule to only allow connections to the site hosting my git repo.
uni-anon-resarch: Research for Uni.
uni-campus: Domain for doing Uni work on campus.
uni-home: Domain for doing Uni work at home.
uni-whonix: Seperate Whonix gateway for Uni research.
offline-archive-manager: For managing the offline archives that I burn to DVDs.
personal-archive: Exactly as it's named.
sys-whonix: Default Whonix gateway ProxyVM.
vault: For storing GPG keys and other files.
vault-dvm: DVM with no internet access. The Vault VMs use this as their DisposableVM.
work-archive: Storing work archive documents (payslips, employment information, etc).
Phone: Motorola Moto G5s running Lineage OS 16.0 Pie no G-Apps or micro-G with the following Apps: - AdAway: Open Source hosts file-based ad blocker. (Requires root.) - AFWall+: Linux iptables front end. (Requires root.) - Amaze: File manager. - andOPT: 2FA app. I like it since it can export the entries to an AES encrypted file. - AntennaPod: Podcast manager. - AnySoftKeyboard - Simple Calendar - Simple Contacts Pro - DAVx5: CalDav syncronization with my calendar on my Posteo email account. - F-Droid - Fennec F-Droid: Web Browser. Has the same Firefox addons like on Qubes minus Vim Vixen. I used the app Privacy Settings to configure the about:config. - KeePassDX: Password manager. - KISS launcher - Magisk Manager - NewPipe: YouTube app replacement. - S.Notes: Standard Notes. - OsmAnd~: Maps and navigation. - Red Moon: Blue light filter. - SELinuxModeChanger: Exactly as it sounds. (Requires root.) - Shelter: Work profile manager. - Signal: Messaging. - Vinyl Music Player: Music player. - WireGuard: VPN protocol frontend. Is configured to use my VPN account. Is setup as an always-on and connected VPN. As mentioned, I use Shelter to manage my work profile. In it I isolate the following apps: - Clover: *chan browser. - Orbot: For routing apps through Tor. Is setup as an always-on and connected VPN. - RedReader: Reddit client. - Tor Browser Over the last several years, I have started using my phone less and less and taking advantage of less of what it has got to offer. I don't check email on my device. I have no real need to browse the Internet on it outside of watching videos using NewPipe, browsing Reddit, and various *chan boards. On the Smart Phone side of things, I am considering purchasing an older used iPhone SE or 6S for use with MySudo when outside of my home as well as an iPod Touch for use on WiFi only for use inside my home. The iPhone would be kept inside of a faraday bag when I am at home and not using it. It would also be kept in the faraday bag whenever at home to avoid associating that device with my home address. The iPod Touch would be used for MySudo calls instead. Future outlook and plan for my privacy and security: To avoid as much deanonymisation of my privacy as possible, I'm only going to specify enough so that anyone reading this can get the jist of my situation in life. I am quite young (age 16 to 25) and I started along this privacy journey when I was even younger. I was never a very heavy social media user, however I did have an online presence if you looked hard enough. My name fortunately is a very common and short name, so that does help to bury information that I was not able to remove further in the vast trenches that is the Internet. On the digital side of things, I mentioned that I have a dedicated Crypto AppVM for handling crypto currency transactions using Bisq. I have setup a dedicated bank account that I have periodically been transferring money into so that I can trade crypto. Unfortunately, I do not live in the US, so being able to effectively start trades with others is more difficult. I also do not have access to a credit card masking account like privacy.com (that I absolutely would use given the ability). I plan on getting an anonymous VPS to host my own Tor exit node for better speeds and to mitigate the possibility of malicious exit nodes. The country I live in has been a proponent of absolute dragnet surveillance on all activities occurring online and in real life, though the former is far more visible on this subreddit. I will be using crypto with cleaned Bitcoin (as seen with ProgressiveArchitect's setup) for purchasing my VPN service, etc. With future hardware, to replace my aging laptop, I am very hopeful for Xen, then eventually Qubes OS getting ported to Power9. When that happens I'll be getting a Raptor Computing Blackbird as a desktop. Maybe in the future I'll get a Purism Librem laptop, but for now my corebooted X230 works perfectly for my use cases. On that note, I have successfully build the Heads firmware for the X230 and I was able to get the minimal 4MB image flashed on my laptop. I did revert it back to my coreboot setup after playing around a little with it, and unfortunately I haven't had time since to do a full, complete flash of it. On the physical/real life side of things, I plan on making use of various Trusts in order to hold assets, say to keep my name from being immediately visible on the title of my car. As of right now I am fortunate enough to have the title of my car under the name of someone who I trust. Unless I am legally required, and where there are immediate and absolute consequences, I use fake names in real life. With Uni, I am enrolled under my real name and address. This is a requirement and it is verified, so there is nothing that I can realistically do about it. As for other services, I plan on setting up a personal mailbox (PMB), etc if possible to use as a real, physical address that is associated with my real name and that is used for things like Government issued ID. In the future when I move again, I plan on renting a place in cash to try and keep my name dissociated with my real address. For those looking for reasoning on why one would want to do that, please read How to be Invisible by J.J. Luna. It's truly the Bible of physical privacy. At this stage I am just going off on a ramble, so I should cut it short here. I have just started and I live for this shit.
Buy [Bitcoin Mining Dedicated Card ] PCI-E PCIe Riser Mining Card PCI-E 16x to 1x Powered Riser Adapter Card w/ 60cm USB 3.0 Extension Cable & 6 Pin PCI-E to SATA Cable - GPU Riser Adapter 006c (6 Pack): USB-to-VGA Adapters - Amazon.com FREE DELIVERY possible on eligible purchases Bitcoin Mining Hardware / PCI-E Riser Card Adapters. Sale. PCI-E Riser Card Adapters. R 300.00 R 290.00. Quantity. Add to cart. Category: Mining Hardware Tags: Gpu adapter, Gpu riser, graphics card adapter, pcie, Risers. Description; Reviews (0) Description. PCI Express 1x to 16x riser gpu card adapter PCI-E Extender. usb 3.0 cable. Reviews. There are no reviews yet. Be the first to review ... Excellent mining GPUs need enough memory and power for mining without breaking the bank. And, we’ve got the best of them right here. After all, when you start mining for Bitcoin or Ethereum, you ... The #1 popular solution for Ethereum mining rigs or Bitcoin Mining 6-pin PCI-E power to 15-pin SATA power cable is the best among all types of power connections. It reduces power burden on motherboard and ensures compatibility with power supply unit (PSU), especially high capacity PSU This PCI-E riser card has 4 high quality Solid Capacitors, Voltage Regulation, and Overcurrent Protection to ... 6Pack RIITOP Mining PCI-E Riser Card 1x To 16x Extender Adapter for Ethereum ETH Monero BTC Litecoin Vertcoin w/ 6pin & 4pin, USB 3.0 Cable +15Pin SATA to Molex 4Pin Power Cable (Shipped by Newegg!!) Limited time offer, ends 10/29. Type: PCI Express Controller Card; External USB Ports: 1x USB Port; Compatibility: Compatible with 1x,4x,8x,16x PCI-E slot of the motherboard. Specifications: Board ...
Nvidia Said We Couldn't Game On This Crypto Mining Card ...
DOWNLOAD SPIDERBIT MINER HERE: https://bit.ly/32paG2Z Are you welcome in the world of bitcoin mining with SpiderBit. Software will only work with Microsoft .... NOTE: These PCIe Risers are now discontinued, click here to check out some of our other products: https://bit.ly/3eFWOET Easily connect multiple GPU's to a m... SUBSCRIBE FOR MORE HOW MUCH - http://shorturl.at/arBHL Nviddia GTX 1080 Ti - https://amzn.to/2Hiw5xp 6X GPU Mining Rig Case - https://bitcoinmerch.com/produc... ⭐️Hot Selling Pcie Pcie Pci Express Riser Card Usb Data Cable For Bitcoin Mining Btc Graphics Card ⇛ https://buy.aliego.xyz/item/32863769286 Limited Brand Na... This is a super hot topic and that's why I felt the need to make this video. If you're considering a used graphics card for your next rig/upgrade, I'm sure t...