Easiest way to get back on 8kun for now
?? 733T H@xx0rz ?️
- Disable any sort of internet time sync
- Set your system time back a day
- Do not use creds or auth anywhere while you are doing this EDIT: Looks like the cert renewal has been applied, restore your time sync back and you should be fine. MODS: Probably best to remove the sticky now, thanks.
Ty. What happened?
Expired SSL cert.
Certs are absolutely bullshit.
You can get certificates for free from Let’s Encrypt, fully automated renewal process.
I agree... Having them for sites that exchange 'sensitive data'... credit cards, etcetera... Yeah, have at 'em. For all else, it's a make work circle jerk. Kin to the 'agree to cookies on every fricking site on the internet' garbage we currently have.
I would encourage doing some research here as you may have some knowledge gaps - certs are indeed about security and protecting you more than protecting the site owner.
SSL Certificates have an Issued Date and an Expiration Date (amongst other things), but from what I'm understanding it just past the Expiration Date the certificate was initially issued with.
They are pretty amateur for letting that expire.
Not expensive to renew, they ought to do it fast.
You don't need to change the date to get past certs. There are ways to bypass expired certs. Then again I'm on a Linux box. I'm sure winblows makes it impossible. Never mind.
It gets more complicated if you wanna be able to post and pass captcha, like I said, easiest way for now.
I'm not and 8kun guy but aren't all the posts public? Who cares if your browser traffic is encrypted? Run a freaking VPN. Sorry... I just can't stand when people over complicate computer issues for no good reason.
I'm on Linux (Fedora) as well. I haven't tried to access 8kun yet but shouldn't we be able to get our browser to make an exemption for SSL certificate? I've done this a few times but I know it's not a safe practice to do so.
SSL certs are about the encryption being used to pass https traffic. Technically under certain conditions your traffic can be intercepted easier if the certs are not squared away. The problem is there is a handful of places that hand out these certs and most are big tech outfits. So they are probibly listening in on you anyway because they know the encryption keys any dam way. The whole thing is a giant scam they attempted to setup so they could control the internet. It didn't work because REAL computer people laughed at it or rather their attempt to control it.
Basically it was the equivalence of them trying to setup a toll road. Real computer people just drove their 4x4 through the field next to the road while blowing their Dixie horn.
https://en.wikipedia.org/wiki/Public_key_certificate
https://en.wikipedia.org/wiki/Certificate_authority
See big tech/governments want everyone to think they are the only ones that can be the "authority" for a cert. That way they can control everything by denying certs. I don't know who is who is this squabble and I'm not an expert, but I know plenty of people are out their fighting the good fight for internet freedom. This is just one of the battlefields.
The simple answer is to run a VPN so they can't track your real IP. You become lost in the crowd and they can't target you easily. Then if they sniff your packets they have to figure out WHICH packets belong to you etc.
I have this same problem with a torrent site. One other thing. 99% of what you do on 8kun is open to the public. They can just go sign up on the server and read all the posts themselves. So why does anyone care if they sniff your 8kun traffic? Unless you are exchanging private messages with Q via 8kun this is a giant nothing burger. Setup a VPN and exempt the SSL for that server.
The main time this stuff is truly important is when you are doing eCommerce. Having someone intercept your credit card and other personal info is bad. :)
Can't you just accept it? Like allowing Firefox to make an exemption?
Yes. However, if you are a windows user and want to post you will likely be unable or have challenges getting around the captcha.