The Reading Room hidden service
Hello Everyone! About once a week I go in search of TOR hidden services that may be of interest to me. I found one this morning that I think is really great! I purchased a Ebook reader a couple of weeks ago and have been looking for sites to download books on the cheap (free). I found The Reading Room this morning at http://do2j6w3zf2esv4ko.onion/_catalog/ I don't usually promote ANY website but I think whoever did this site deserves a pat on the back (or a donation). I downloaded several Ebooks with no problems. Pardon my posting this if you are offended but I'm SO happy to find a website that will help feed my Ebook addiction! -- Crypto https://lastpass.com/f?3921926
On Mon, 09 Feb 2015 06:11:49 -0600 Crypto <crypto@jpunix.net> wrote:
Hello Everyone!
About once a week I go in search of TOR hidden services that may be of interest to me. I found one this morning that I think is really great! I purchased a Ebook reader a couple of weeks ago and have been looking for sites to download books on the cheap (free). I found The Reading Room this morning at http://do2j6w3zf2esv4ko.onion/_catalog/ I don't usually promote ANY website but I think whoever did this site deserves a pat on the back (or a donation). I downloaded several Ebooks with no problems.
Pardon my posting this if you are offended but I'm SO happy to find a website that will help feed my Ebook addiction!
www.gutenberg.org www.archive.org
On Mon, Feb 9, 2015 at 3:32 PM, Juan <juan.g71@gmail.com> wrote:
Reading Room this morning at http://do2j6w3zf2esv4ko.onion/_catalog/ www.gutenberg.org www.archive.org
Library Genesis is still around and probably needs to be entirely implemented, homed, and mirrored within darknets such as i2p/tor before it goes away.
On Mon, Feb 09, 2015 at 04:07:02PM -0500, grarpamp wrote:
Library Genesis is still around and probably needs to be entirely implemented, homed, and mirrored within darknets such as i2p/tor before it goes away.
Very good idea :) Is there rough estimate for the bytesize of libgen? Would they cooperate? Are they tolerant to (limited) crawling?
On Tue, Feb 10, 2015 at 5:05 AM, Georgi Guninski <guninski@guninski.com> wrote:
Is there rough estimate for the bytesize of libgen?
Well over 30TB. It's doable if distributed. They have some amount of semantic, not hash, duplicates that could be removed with help.
Would they cooperate?
As to originating or multihoming in darknets? Ask them. Same for all these questions really.
Are they tolerant to (limited) crawling?
Dumb bots are not welcome anywhere on the net when smarter mechanisms are available/buildable. Links: https://twitter.com/bodobalazs https://twitter.com/fhuysmans https://twitter.com/OpenBibliotheek http://operatorbeats.tumblr.com/post/37129651818/library-genesis-is-it-bad-t...
On 3/1/15, Juan <juan.g71@gmail.com> wrote:
But, but ... but all those hooks into my kernel are for -security-, they make my kernel -secure- don't they? And I guess they invented them because the kernel might have one or two security bugs or something right? Or because sysadmins (like my 94yo nan) occasionally make mistakes and the security modules protect me from them yeah? And because my lsm override alias is one letter shorter than sudo, it'll be easier to not make mistakes when I'm making complicated and risky changes to my system? I know, I know, I'm making a lot of assumptions you say.. Well, my assumptions are founded in a solid reality - my faith. You see, I believe, and ah seen tha light - Linux *will* set me free. Right?
On Mon, 2 Mar 2015 06:57:29 +1100 Zenaan Harkness <zen@freedbms.net> wrote:
On 3/1/15, Juan <juan.g71@gmail.com> wrote:
But, but ... but all those hooks into my kernel are for -security-, they make my kernel -secure- don't they? . . .
Well, my assumptions are founded in a solid reality - my faith. You see, I believe, and ah seen tha light - Linux *will* set me free.
Right?
Yes brother, linux is the light of the world =) Actually, I meant to link this one http://en.wikipedia.org/wiki/Security-Enhanced_Linux which according to wikipedia was primarily developed by the NSA. But since according to wiki again, the NSA made 'substantial contributions' to the LSM framework as well, I didn't bother correcting my mistake. Granted, one can easily avoid the selinux module. And a quick look at the /security/ directories suggests that there aren't tons of code to audit, though I actually have no clue as to how hard it would be to actually audit that code. Let alone how to audit it. This is probably old news for a lot of people but the fact that the NSA was involved in this kind of thing is just too rich...
2015-03-02 10:48 GMT+09:00 Juan <juan.g71@gmail.com>:
which according to wikipedia was primarily developed by the NSA.
But since according to wiki again, the NSA made 'substantial contributions' to the LSM framework as well, I didn't bother correcting my mistake.
Given their size and mission it's not that strange. The mantra is "unless *you* can check it, it's not safe." the exception is when you can trust someone who can check it. But trust is no easy game.
participants (6)
-
Crypto
-
Georgi Guninski
-
grarpamp
-
Juan
-
Lodewijk andré de la porte
-
Zenaan Harkness