00:00:38<fireonlive>https://mkx9delh5a.execute-api.ca-central-1.amazonaws.com/uploads/28ad153dbccc52b0/image.png
00:00:41<fireonlive>wikimebia pls
00:07:02benjinsm joins
00:10:24benjins quits [Ping timeout: 265 seconds]
00:11:29benjinsm is now known as benjins
00:14:22BigBrain quits [Remote host closed the connection]
00:14:41BigBrain (bigbrain) joins
00:25:18<pabs>that_lurker: https://thp.io/2008/urlwatch/ (ignore the year in the URL)
00:25:37<pabs>(cronable, prints diffs)
00:37:52<BPCZ>On principle I won’t donate to wikimedia based on their insane bureaucracy growth in the last 10 years
00:38:58<@JAA>> Easy-to-use YAML-based configuration
00:39:13<@JAA>Easy-to-use, YAML, pick one
00:39:32<BPCZ>I pick YAML
00:39:42<BPCZ>Job security and all that
00:40:56<@JAA>Which of the 63 ways of doing multi-line strings is your favourite? :-)
00:44:10<pabs>the config is simple enough, for eg: https://paste.debian.net/hidden/3e60adac/
00:45:01<@JAA>Yeah, I just like bashing YAML for what it is.
00:45:48<pabs>:)
00:49:50<@JAA>For the unaware, no, the 63 ways of doing multi-line strings in YAML are not a joke, there really are that many: https://stackoverflow.com/questions/3790454/how-do-i-break-a-string-in-yaml-over-multiple-lines
00:52:30Bleo quits [Quit: Ping timeout (120 seconds)]
00:52:44Bleo joins
00:59:04systwi_ quits [Client Quit]
00:59:05nothere quits [Quit: Leaving]
01:07:12gfhh1 joins
01:09:17gfhh quits [Ping timeout: 252 seconds]
01:09:25<fireonlive>how about TOML instead
01:09:32<fireonlive>does that make everyone happy
01:09:50@JAA likes TOML.
01:10:01<fireonlive>:)
01:31:40nothere joins
01:34:25PredatorIWD__ joins
01:34:53gfhh joins
01:35:10gfhh1 quits [Read error: Connection reset by peer]
01:35:10DLoader_ joins
01:35:10DLoader_ quits [Excess Flood]
01:35:10pabs prefers INI to TOML
01:35:10DLoader_ joins
01:35:51sec^nd quits [Ping timeout: 245 seconds]
01:36:20sec^nd (second) joins
01:36:41HackMii quits [Ping timeout: 245 seconds]
01:36:47DLoader quits [Ping timeout: 252 seconds]
01:36:53DLoader_ is now known as DLoader
01:37:19HackMii (hacktheplanet) joins
01:37:53PredatorIWD_ quits [Ping timeout: 265 seconds]
01:44:49<nulldata>Just hard code it all!
01:45:45<TheTechRobo>You guys don't create an undocumented binary format and change it every patch release?
01:53:18<nulldata>TheTechRobo - and be sure to protect it by encrypting it using a decryption key hard coded in the executable!
01:54:25<Doranwen>Lol
02:05:58sec^nd quits [Remote host closed the connection]
02:06:30sec^nd (second) joins
02:11:57<fireonlive>https://mkx9delh5a.execute-api.ca-central-1.amazonaws.com/uploads/71fd9b02da9d0b46/image.png
02:19:37<fireonlive>kiska: https://mkx9delh5a.execute-api.ca-central-1.amazonaws.com/uploads/8d4b623baeb6cfd8/image.png
02:27:08HackMii_ (hacktheplanet) joins
02:27:56HackMii quits [Ping timeout: 245 seconds]
02:50:16<ymgve_>fireonlive: it's funny how the "poison" in that image uses less than 10% of those bricks
03:02:45<fireonlive>lols
03:14:37HackMii_ quits [Remote host closed the connection]
03:15:08HackMii_ (hacktheplanet) joins
03:30:30Doranwen quits [Ping timeout: 265 seconds]
03:33:27DogsRNice quits [Read error: Connection reset by peer]
03:36:08icedice quits [Ping timeout: 252 seconds]
03:44:08decagon__ joins
03:47:44<nulldata>https://www.techdirt.com/2023/08/30/paramount-dmcas-star-trek-fan-project-apparently-deaf-to-the-history-of-star-trek/
03:47:54krvme quits [Ping timeout: 265 seconds]
03:48:15<fireonlive>oof
03:54:51Doranwen (Doranwen) joins
04:05:46etnguyen03 (etnguyen03) joins
04:08:53<pabs>https://xkcd.com/2822/
04:11:23<fireonlive>hahaha
04:12:04<nicolas17>skull emoji
04:19:13<nulldata>Heh oldie
04:19:13<nulldata>https://rodneymbliss.com/2013/10/17/i-survived-bedlam3/
04:19:58<nulldata>https://web.archive.org/web/20120419030511/http://blogs.technet.com/b/exchange/archive/2004/04/08/109626.aspx
04:40:58etnguyen03 quits [Client Quit]
04:46:12<fireonlive>"Linus Media Group (https://linusmediagroup.com/) has changed" 👀
05:11:47BlueMaxima quits [Read error: Connection reset by peer]
06:28:44nicolas17 quits [Client Quit]
06:57:52<that_lurker>https://lounge.kuhaon.fun/folder/da9e69a875e1e9af/7xjdj7.jpg
07:08:08<@JAA>pabs: INI is the worst, on par with CSV, since it's very unspecified and thus varies by implementation.
07:24:54Arcorann (Arcorann) joins
07:49:41nulldata quits [Ping timeout: 252 seconds]
07:52:45nulldata (nulldata) joins
08:18:50kiskaLogBot quits [Ping timeout: 252 seconds]
08:19:05kiskaLogBot joins
08:19:59icedice (icedice) joins
08:50:57kiskaLogBot quits [Ping timeout: 265 seconds]
09:10:33kiskaLogBot joins
09:18:19Exorcism (exorcism) joins
09:21:24kiskaLogBot quits [Ping timeout: 265 seconds]
09:22:03kiskaLogBot joins
09:26:29kiskaLogBot quits [Ping timeout: 252 seconds]
09:26:50kiskaLogBot joins
09:38:35kiskaLogBot quits [Ping timeout: 252 seconds]
09:38:54kiskaLogBot joins
09:59:49toss (toss) joins
10:29:47toss quits [Client Quit]
10:58:36Exorcism quits [Remote host closed the connection]
11:00:18Exorcism (exorcism) joins
11:20:01Exorcism quits [Ping timeout: 245 seconds]
11:44:25<nulldata>https://www.dsogaming.com/news/puredark-adds-a-drm-to-his-red-dead-redemption-2-dlss-3-mod/
11:57:19Mateon1 quits [Read error: Connection reset by peer]
12:27:45Mateon1 joins
12:32:16Mateon1 quits [Remote host closed the connection]
12:32:29Mateon1 joins
12:36:47Mateon1 quits [Ping timeout: 252 seconds]
12:48:13etnguyen03 (etnguyen03) joins
12:55:17Mateon1 joins
12:59:53wickedplayer494 quits [Ping timeout: 252 seconds]
13:03:10Mateon1 quits [Read error: Connection reset by peer]
13:07:01Mateon1 joins
13:14:11AmAnd0A quits [Ping timeout: 252 seconds]
13:14:26AmAnd0A joins
13:24:51qwertyasdfuiopghjkl quits [Client Quit]
13:41:20qwertyasdfuiopghjkl (qwertyasdfuiopghjkl) joins
14:42:20Arcorann quits [Ping timeout: 265 seconds]
14:48:14gfhh quits [Ping timeout: 252 seconds]
15:05:46<fireonlive>JAA: https://developers.cloudflare.com/ssl/edge-certificates/backup-certificates/
15:17:35<@JAA>fireonlive: I'm not sure I understand the purpose there. A key compromise would mean Buttflare's systems have been breached, no? How does automatically deploying another key help there?
15:22:27etnguyen03 quits [Ping timeout: 265 seconds]
15:25:27etnguyen03 (etnguyen03) joins
15:36:25<fireonlive>JAA: i think they’re trying to guard against another Symantec situation i.e. full CA distrust or suddenly the algorithm they use is no longer deemed acceptable… i think maybe they had a blog post about it hmm lemme see if i can find it
15:37:36<fireonlive>IIRC it was also something with their sheer volume of certificates it would take too long to replace every one if something happened
15:38:01<fireonlive>ah, https://blog.cloudflare.com/introducing-backup-certificates/
15:41:11<fireonlive>so i guess it’s kinda an “offline” just in case plan for (the above) as well as stuff like heartbleed
15:43:44<@JAA>Fair enough.
16:06:20etnguyen03 quits [Ping timeout: 252 seconds]
16:33:26<nulldata>https://news.ycombinator.com/item?id=37334486
16:36:32<qyxojzh|m><JAA> "fireonlive: I'm not sure I..." <- Cowflare? =P
16:36:41<qyxojzh|m>Clotflare?
16:36:51<qyxojzh|m>* Clotflare? (with an O, as in clotpole)
16:47:53<@JAA>nulldata: lol, yeah, that'll work.
17:06:37DogsRNice joins
17:10:28etnguyen03 (etnguyen03) joins
17:11:17<fireonlive>HasiCorp doing some thrashing or some ThrashiCorp
18:17:14iCaotix quits [Ping timeout: 252 seconds]
18:23:33iCaotix joins
18:38:39emberquill08 quits [Quit: The Lounge - https://thelounge.chat]
18:39:24emberquill08 (emberquill) joins
18:40:31PredatorIWD__ quits [Read error: Connection reset by peer]
18:47:08AmAnd0A quits [Read error: Connection reset by peer]
18:47:50AmAnd0A joins
18:59:08<immibis>why have an internet when you can have cloudflare
18:59:18<immibis>and google. The two internets
19:05:31qwertyasdfuiopghjkl quits [Remote host closed the connection]
19:07:50etnguyen03 quits [Ping timeout: 252 seconds]
19:12:06sec^nd quits [Ping timeout: 245 seconds]
19:12:26<fireonlive>all we'll ever need
19:14:15qwertyasdfuiopghjkl (qwertyasdfuiopghjkl) joins
19:42:51<immibis>obey your corporate masters
19:45:55<fireonlive>daddy cook gives me all i need
19:46:25<fireonlive>i shall give him penance on the 12th and in return he shalst giveth me the newest iphone 15
19:46:30<fireonlive>and it shall be good
19:53:10nicolas17 joins
20:08:15systwi_ (systwi) joins
20:09:26systwi quits [Ping timeout: 252 seconds]
20:15:13systwi_ is now known as systwi
20:22:21<fireonlive>you know, i wonder what the most used word over all the channels are
20:22:29<fireonlive>i bet it's either J\AA or a\rkiver
20:22:30<fireonlive>:P
20:22:56<fireonlive>(also r\ewby)
20:23:21<@JAA>Probably something boring like 'I' or 'the'.
20:26:10<fireonlive>yeah i guess those would count
20:27:31<fireonlive>https://twitter.com/vxunderground/status/1697027546452259277/photo/1
20:27:31<eggdrop>nitter: https://nitter.net/vxunderground/status/1697027546452259277/photo/1
20:36:37nicolas17 quits [Ping timeout: 265 seconds]
20:40:56nicolas17 joins
20:57:38etnguyen03 (etnguyen03) joins
21:03:41iCaotix quits [Ping timeout: 265 seconds]
21:06:24<fireonlive>https://mkx9delh5a.execute-api.ca-central-1.amazonaws.com/uploads/cbd73449114ad75a/image.png
21:06:27<fireonlive>🤦‍♂️
21:07:37<nstrom|m>bwahaha
21:07:54<@JAA>So... what's the URL? :-)
21:08:38iCaotix joins
21:09:23<fireonlive>apparently it's (nsfw) http://www.appykidsco.com/ but it only seems to work on mobile
21:12:08<@JAA>Which uses JS to create an <iframe> of https://weekendhei.com/ which has the actual content.
21:12:27<@JAA>There's also a link to https://www.imeidh.com/ which is currently dead.
21:12:37<fireonlive>ah!
21:12:41<nicolas17>I dunno what it loaded for you
21:12:51<fireonlive>yep that's the content :) weehendhei
21:12:53<nicolas17>but for me it loaded (on a desktop browser) a mobile-layout-looking list of apps
21:12:57<fireonlive>i was just making a screen recording
21:13:02<nicolas17>all of them nsfw
21:13:13<fireonlive>ohh maybe cause i have adblock on desktop
21:13:22<fireonlive>https://mkx9delh5a.execute-api.ca-central-1.amazonaws.com/uploads/6097a61d8f8feac0/image.png
21:13:24<fireonlive>here's what I saw
21:13:25<@JAA>And a reference at https://batit.aliyun.com/ which seems to return a 'website suspended' thing.
21:13:42<@JAA>Yeah, that's the suspension thing.
21:13:45<fireonlive>https://mkx9delh5a.execute-api.ca-central-1.amazonaws.com/uploads/c79c02524e306a9e/image.png
21:13:48<fireonlive>here's the 'translate'
21:14:01<@JAA>It does a UA check to see whether you're a mobile browser.
21:14:18<@JAA>http://www.appykidsco.com/static.js?2023090105
21:14:20<nicolas17>it Just Worked for me on firefox tho
21:14:25<@JAA>Yeah, same.
21:14:41<@JAA>Oh, there's 'x11' in their UA regex. lol
21:14:55<@JAA>Filthy linuxes
21:15:03<fireonlive>how cursed lol
21:15:10<fireonlive>and ahh x3
21:15:27<fireonlive>the linux can see the small porn gifs
21:18:19DogsRNice_ joins
21:18:42<nicolas17>https://find-and-update.company-information.service.gov.uk/company/08055395
21:19:21<fireonlive>ahh disolved
21:19:25<fireonlive>so i guess the domain expired
21:19:27<@JAA>Over a year ago, lol
21:19:43<@JAA>Creation Date: 2023-02-05T19:09:48Z
21:19:48<@JAA>Yep, domain definitely expired.
21:20:00<nicolas17>yes
21:20:00<fireonlive>lols
21:20:03<nicolas17>but then I wonder
21:20:11<nicolas17>this recall seems to be recent
21:20:13<fireonlive>and no one noticed until now? and they were still using old boxes i guess?
21:20:16<nicolas17>who was manufacturing the snacks
21:20:34<fireonlive>yeah right?
21:20:39<fireonlive>https://www.theargus.co.uk/news/23758030.lidl-paw-patrol-snack-recall-due-link-explicit-website/
21:20:41<fireonlive>just today it seems
21:21:05iCaotix quits [Ping timeout: 265 seconds]
21:21:08<nicolas17>the PDF has last-modified: Tue, 22 Aug 2023 09:28:21 GMT
21:21:18<nicolas17>it's possible they only made it public now tho
21:21:26<fireonlive>i like how the wording from Lidl etc say "has been compromised"
21:21:36<nicolas17>hax
21:21:37<fireonlive>when it's just someone bought a domain and used it for porn ads
21:21:39<fireonlive>lols
21:21:46<@JAA>> Lidl confirmed that the manufacturer of the Paw Patrol products is a company called Appy Kids Co which, according to an article from The Grocer from 2018, is owned by parent company Appy Food and Drinks. This company now appears to trade under a different name and when contacted we were told they do not distribute the Paw Patrol products in question.
21:22:03<fireonlive>PDF: https://www.lidl.co.uk/static/assets/Paw_Patrol_Public_Recall_poster-500790.pdf
21:22:31<fireonlive>interesting
21:22:32DogsRNice quits [Ping timeout: 265 seconds]
21:23:42<@JAA>From Mirror, which hardly qualifies as journalism, so half of it might be rubbish.
21:24:24iCaotix joins
21:24:51<@JAA>The recall is at least a week old, apparently.
21:25:03<fireonlive>ahh
21:25:05<@JAA>But still, yeah, who is making the snacks?
21:25:14<fireonlive>🤔
21:25:30<@JAA>> Shoppers have also vented on social media about the error, with one user saying: "Some VILE hackers around, what a wasted talent."
21:25:33<@JAA>VILE HACKERS!
21:26:03<fireonlive>xD
21:26:10<nicolas17>lol
21:26:14<fireonlive>wasted talent!
21:26:36<@JAA>Who is this hacker called '4chan'?
21:26:41<nicolas17>they think the "hackers" intentionally targeted a domain used in packaging of a kids product
21:26:48<nicolas17>no, they just saw a domain expired and grabbed it
21:27:10<@JAA>Yep, entirely automated, based on some estimate of how valuable/frequented a domain might be.
21:27:25<nicolas17>and now people are visiting it, more due to the recall news than due to its mere presence in the package, so in terms of ad impressions that's a win
21:28:31<fireonlive>in 2018 they made paw patrol milk lol https://www.thegrocer.co.uk/new-product-development/appy-kids-co-launches-first-flavoured-milks-/565591.article
21:30:41<fireonlive>https://www.youtube.com/watch?v=UL3iyqw2go0
21:30:58<fireonlive>"whatever. brands" did a 'rebranding' for them? lol
21:32:03<fireonlive>https://appyfoodanddrinks.tumblr.com/ their tumblr suggests they were indeed the same company "Appy Food & Drinks, the London-based company behind popular children’s brand Appy Kids Co, is one such responsible organisation that has pledged to reduce their carbon footprint and find better ways to care for the environment."
21:32:09<fireonlive>all in all, lol weird
21:32:48<nicolas17>I wonder if Google would add it to their phishing blacklist... dunno if it would fit their policy
21:33:09<nicolas17>ah safebrowsing, couldn't remember the name
21:33:21<fireonlive>gotphish.com
21:33:24<fireonlive>there's a microsoft one too
21:33:41<nicolas17>I think Apple uses Google's safebrowsing
21:33:52<@JAA>Not the Phish that's interesting...
21:34:11<fireonlive>https://mkx9delh5a.execute-api.ca-central-1.amazonaws.com/uploads/80f97102468ea52e/image.png
21:34:16<fireonlive>i'll let you know if lidl gets back to me
21:34:17<fireonlive>;)
21:34:17<nicolas17>I tried clicking the ads and half of them don't even take you to a website... they just go straight to an .apk
21:34:32<@JAA>lol
21:34:41<@JAA>I merely archived it. :-)
21:34:57<fireonlive>nicolas17 is down bad
21:35:00<fireonlive>xP
21:35:05<@JAA>I bet there's some fun stuff in those APKs.
21:35:11<fireonlive>oh for sure
21:35:31<nicolas17>considering the "fun stuff" in some apps in the play store...
21:35:49<nicolas17>must be way worse when you get one like this without a condom... I mean uh
21:36:29<fireonlive>:3
21:36:34<@JAA>It's more fun without protection.
21:36:38<nicolas17>x.x
21:36:45<fireonlive>:3
21:37:15<fireonlive>sometimes if it's raining you put a little rainjacket on though
21:38:48<fireonlive>unless you particularly like splashing in the mud
21:39:15<nicolas17>ew mud
21:39:26<fireonlive>xD
21:41:48<fireonlive>oof i better go meet my appointment
21:41:50<fireonlive>have fun boys~
21:41:53<fireonlive>:3
21:42:03<@JAA>You too :-)
21:43:03<fireonlive>tks :)
21:51:13katocala quits [Remote host closed the connection]
22:20:15katocala joins
22:39:36wickedplayer494 joins
23:48:30nicolas17 quits [Ping timeout: 265 seconds]
23:53:03nicolas17 joins