00:22:50katocala joins
00:34:02BlueMaxima joins
00:36:39Mateon2 joins
00:37:20Mateon1 quits [Ping timeout: 252 seconds]
00:37:20Mateon2 is now known as Mateon1
00:56:35etnguyen03 quits [Ping timeout: 252 seconds]
01:01:51etnguyen03 (etnguyen03) joins
01:10:20BearFortress quits [Ping timeout: 252 seconds]
01:13:51lunik1730 joins
01:13:51Larsenv3 (Larsenv) joins
01:13:53vukky0 (vukky) joins
01:13:58nic96 (nic) joins
01:14:03myself5 (myself) joins
01:14:07emberquill084 (emberquill) joins
01:14:08Ruthalas59 (Ruthalas) joins
01:14:14DigitalDragons1 (DigitalDragons) joins
01:14:45fangfufu_ joins
01:14:48RKenshin joins
01:14:57Kinille_ (Kinille) joins
01:14:58jspiros_ (jspiros) joins
01:14:59Hecz- joins
01:15:22pabs quits [Killed (ing.hackint.org (Nickname regained by services))]
01:15:25pabs (pabs) joins
01:15:27danwellby-1 joins
01:16:18ThetaDev_ joins
01:16:26aGerman5 (aGerman) joins
01:16:29yawkat` (yawkat) joins
01:16:32OrIdow6^2 (OrIdow6) joins
01:16:32@ChanServ sets mode: +o OrIdow6^2
01:16:33sknebel_ (sknebel) joins
01:16:36kiska3 (kiska) joins
01:16:37Jake8 (Jake) joins
01:16:38ArchivalEfforts_ joins
01:16:42magmaus32 (magmaus3) joins
01:16:45pie_[bnc] joins
01:16:48monoxane5 (monoxane) joins
01:16:54neggles_ (neggles) joins
01:17:00girst_ (girst) joins
01:17:02Frogging- joins
01:17:02DLoader_ joins
01:17:07lunik173 quits [Quit: Ping timeout (120 seconds)]
01:17:07Larsenv quits [Quit: Ping timeout (120 seconds)]
01:17:07magmaus3 quits [Client Quit]
01:17:07aGerman quits [Client Quit]
01:17:07yawkat quits [Quit: No Ping reply in 180 seconds.]
01:17:07andrew quits [Quit: Ping timeout (120 seconds)]
01:17:07TheTechRobo quits [Quit: Ping timeout (120 seconds)]
01:17:07nic9 quits [Quit: Ping timeout (120 seconds)]
01:17:07Jake quits [Quit: Ping timeout (120 seconds)]
01:17:07ThetaDev quits [Quit: No Ping reply in 180 seconds.]
01:17:07neggles quits [Quit: bye friends - ZNC - https://znc.in]
01:17:07systwi_ quits [Client Quit]
01:17:07IDK_ quits [Quit: Ping timeout (120 seconds)]
01:17:07rohvani quits [Client Quit]
01:17:07project10 quits [Quit: Ping timeout (120 seconds)]
01:17:07vukky quits [Quit: Ping timeout (120 seconds)]
01:17:07nulldata quits [Client Quit]
01:17:07kiska quits [Quit: Ping timeout (120 seconds)]
01:17:07Earendil7 quits [Quit: No Ping reply in 180 seconds.]
01:17:07Arcorann quits [Remote host closed the connection]
01:17:07DogsRNice quits [Remote host closed the connection]
01:17:07parfait_ quits [Remote host closed the connection]
01:17:07DigitalDragons quits [Quit: Ping timeout (120 seconds)]
01:17:08lunik1730 is now known as lunik173
01:17:08Larsenv3 is now known as Larsenv
01:17:08aGerman5 is now known as aGerman
01:17:08magmaus32 is now known as magmaus3
01:17:08@OrIdow6 quits [Quit: ZNC 1.8.2+deb3.1 - https://znc.in]
01:17:08fangfufu quits [Remote host closed the connection]
01:17:08danwellby quits [Quit: Watch out For sysops carrying carpet and quicklime]
01:17:08Kenshin quits [Client Quit]
01:17:08jspiros quits []
01:17:08iCaotix quits [Client Quit]
01:17:08kiskaLogBot quits [Remote host closed the connection]
01:17:08pie_ quits [Remote host closed the connection]
01:17:08sknebel quits [Remote host closed the connection]
01:17:08ArchivalEfforts quits [Remote host closed the connection]
01:17:08vukky0 is now known as vukky
01:17:08Jake8 is now known as Jake
01:17:08nic96 is now known as nic9
01:17:08kiska3 is now known as kiska
01:17:08DigitalDragons1 is now known as DigitalDragons
01:17:08danwellby-1 is now known as danwellby
01:17:09Ruthalas5 quits [Client Quit]
01:17:09sss quits [Client Quit]
01:17:09emberquill08 quits [Quit: Ping timeout (120 seconds)]
01:17:09myself quits [Quit: Ping timeout (120 seconds)]
01:17:09monoxane quits [Quit: Ping timeout (120 seconds)]
01:17:09decky quits [Remote host closed the connection]
01:17:09ymgve_ quits [Remote host closed the connection]
01:17:09T31M quits [Quit: ZNC - https://znc.in]
01:17:09le0n quits [Quit: see you later, alligator]
01:17:09girst quits [Quit: ZNC 1.8.2 - https://znc.in]
01:17:09Kinille quits []
01:17:09Ruthalas59 is now known as Ruthalas5
01:17:09emberquill084 is now known as emberquill08
01:17:09myself5 is now known as myself
01:17:09monoxane5 is now known as monoxane
01:17:10h3ndr1k quits [Client Quit]
01:17:10JensRex quits [Quit: No Ping reply in 180 seconds.]
01:17:10Frogging101 quits [Quit: Close the World, Open the nExt]
01:17:10Earendil7_ (Earendil7) joins
01:17:11Hecz quits [Remote host closed the connection]
01:17:11Hecz- is now known as Hecz
01:17:11BPCZ quits [Remote host closed the connection]
01:17:11Hecz quits [Changing host]
01:17:11Hecz (Hecz) joins
01:17:17kiskaLogBot joins
01:17:18neggles_ is now known as neggles
01:17:18project10 (project10) joins
01:17:21T31M joins
01:17:22girst_ is now known as girst
01:17:22Frogging- is now known as Frogging101
01:17:27andrew (andrew) joins
01:17:30nulldata (nulldata) joins
01:17:31IDK_ joins
01:17:31systwi_ joins
01:17:35zhongfu_ (zhongfu) joins
01:17:38h3ndr1k (h3ndr1k) joins
01:17:42le0n (le0n) joins
01:17:42TheTechRobo (TheTechRobo) joins
01:17:53JensRex (JensRex) joins
01:17:55BearFortress joins
01:19:20Arcorann (Arcorann) joins
01:20:21DogsRNice joins
01:20:32BPCZ (BPCZ) joins
01:21:41DLoader quits [Ping timeout: 265 seconds]
01:21:42zhongfu quits [Ping timeout: 265 seconds]
01:21:43DLoader_ is now known as DLoader
01:21:45pabs quits [Changing host]
01:21:45pabs (pabs) joins
01:23:32BearFortress quits [Ping timeout: 252 seconds]
01:25:01pabs quits [Client Quit]
01:25:28pabs (pabs) joins
01:26:13rohvani joins
01:27:23etnguyen03 quits [Ping timeout: 252 seconds]
01:29:03etnguyen03 (etnguyen03) joins
01:41:57BearFortress joins
01:50:59pabs quits [Remote host closed the connection]
01:53:08pabs (pabs) joins
01:59:34pabs quits [Remote host closed the connection]
02:00:03pabs (pabs) joins
02:27:08sss joins
02:35:25nicolas17 quits [Client Quit]
03:25:02Shjosan quits [Quit: Am sleepy (-, – )…zzzZZZ]
03:25:39Shjosan (Shjosan) joins
04:05:43DogsRNice quits [Read error: Connection reset by peer]
04:39:20etnguyen03 quits [Ping timeout: 252 seconds]
04:43:36etnguyen03 (etnguyen03) joins
04:46:52etnguyen03 quits [Client Quit]
04:56:22katocala quits [Remote host closed the connection]
05:32:19<fireonlive>+rss- Irish privacy group files complaint against YouTube adblock detection system: https://twitter.com/alexanderhanff/status/1714944718205755483 https://news.ycombinator.com/item?id=37952279
05:32:19<eggdrop>nitter: https://nitter.net/alexanderhanff/status/1714944718205755483
05:32:21<fireonlive>hmmmmm
05:36:29<pabs>https://people.inf.ethz.ch/omutlu/pub/RowPress_isca23.pdf https://arstechnica.com/security/2023/10/theres-a-new-way-to-flip-bits-in-dram-and-it-works-against-the-latest-defenses/
06:03:14BlueMaxima quits [Read error: Connection reset by peer]
06:06:47nukke quits [Ping timeout: 252 seconds]
06:08:47nukke (nukke) joins
06:53:56shinji257 quits [Quit: https://quassel-irc.org - Chat comfortably. Anywhere.]
07:44:06decky joins
07:50:44magmaus3 quits [Ping timeout: 252 seconds]
07:51:39magmaus3 (magmaus3) joins
07:58:53Peroniko (Peroniko) joins
08:57:57Peroniko quits [Ping timeout: 265 seconds]
08:58:47Peroniko (Peroniko) joins
09:01:21Peroniko quits [Remote host closed the connection]
10:12:37driib quits [Quit: The Lounge - https://thelounge.chat]
10:13:08driib (driib) joins
10:14:19Arcorann quits [Ping timeout: 265 seconds]
10:15:22nulldata quits [Client Quit]
10:15:43nulldata (nulldata) joins
10:16:41Arcorann (Arcorann) joins
10:24:11emily quits [Ping timeout: 252 seconds]
10:36:54pseudorizer (pseudorizer) joins
11:58:46sec^nd quits [Ping timeout: 245 seconds]
12:00:51HackMii_ quits [Ping timeout: 245 seconds]
12:02:58HackMii_ (hacktheplanet) joins
12:03:04Arcorann quits [Ping timeout: 265 seconds]
12:05:26sec^nd (second) joins
12:10:11qwertyasdfuiopghjkl (qwertyasdfuiopghjkl) joins
12:12:17Arcorann (Arcorann) joins
12:22:29AK quits [Quit: AK]
12:23:24AK (AK) joins
12:36:00hitgrr8 joins
13:13:43etnguyen03 (etnguyen03) joins
13:15:53shinji257 (shinji257) joins
14:05:11balrog quits [Max SendQ exceeded]
14:05:59balrog (balrog) joins
14:37:11Arcorann quits [Ping timeout: 252 seconds]
15:55:30sss quits [Remote host closed the connection]
16:12:57shinji257 quits [Ping timeout: 265 seconds]
16:46:16shinji257 (shinji257) joins
17:11:10emberquill08 quits [Client Quit]
17:11:30emberquill08 (emberquill) joins
17:11:38emberquill08 quits [Client Quit]
17:12:36emberquill08 (emberquill) joins
17:33:41<@JAA>Whew: https://notes.valdikss.org.ru/jabber.ru-mitm/
17:34:06<@JAA>> TL;DR: we have discovered XMPP (Jabber) instant messaging protocol encrypted TLS connection wiretapping (Man-in-the-Middle attack) of jabber.ru (aka xmpp.ru) service’s servers on Hetzner and Linode hosting providers in Germany.
17:34:50TastyWiener95 quits [Ping timeout: 252 seconds]
17:35:33icedice (icedice) joins
17:39:58<@JAA>And the only reason it was noticed is because the MITM cert expired.
17:58:23emery joins
17:58:56ehmry quits [Read error: Connection reset by peer]
18:03:26<@arkiver>well that is not good
18:04:20<@arkiver>can a provider in germany simply be forced to cooperate with this without anything public being released?
18:05:03<@arkiver>for Archive Team i should note this likely does not impact our archiving using hetzner.
18:05:25<@JAA>Concealed court orders are a thing in almost any jurisdiction.
18:05:44<@JAA>And yeah, probably doesn't, although it's not impossible either obviously.
18:06:19<@arkiver>this kind of stuff brings one back to reality
18:06:22<@arkiver>(or at least me)
18:07:07<@arkiver>or well
18:07:16<@arkiver>reminds is a better word than "back to"
18:07:39<@JAA>TLS cert recording when? ;-)
18:09:44<@arkiver>yeah it's in the pipeline! :)
18:09:56<@arkiver>have some plans around that, and will get to it
18:11:44<@arkiver>actually those plans were for dns
18:11:48<@arkiver>but we'll get tls in too
18:12:35<@JAA>:-)
18:12:37<@arkiver>will*
18:12:51<@arkiver>DNS and TLS/SSL are the last big pieces basically
18:13:11<@arkiver>perhaps DNS over HTTPS as well, but that is not too difficult to start supporting.
18:19:01<imer>so, the mitm people were able to issue a cert since they intercepted the traffic, so could pretend to be the host to lets encrypt? that's kinda gross
18:19:13<imer>suspected of course
18:21:31<@JAA>Yeah true, actually, they could only do that in the other direction (affecting our archival) for things hosted at Hetzner, essentially.
18:22:02<@JAA>But yeah, expected attack vector and gross.
18:22:30<@JAA>I find it interesting that apparently XMPP has a feature that would prevent it from working.
18:45:08iCaotix joins
18:46:08<@JAA>> Amazon's bestselling "bitter lemon" energy drink was bottled delivery driver piss
18:46:12<@JAA>:-)
18:46:12<@JAA>https://pluralistic.net/2023/10/20/release-energy/
18:48:29icedice quits [Client Quit]
19:01:24<fireonlive>can
19:01:26<fireonlive>can i
19:01:30<fireonlive>can i choose which driver's
19:01:39<fireonlive>🤐
19:06:49icedice (icedice) joins
19:07:14<icedice><arkiver> well that is not good
19:07:17<icedice>What happened?
19:09:00<@JAA>https://notes.valdikss.org.ru/jabber.ru-mitm/
19:12:10<icedice><arkiver> can a provider in germany simply be forced to cooperate with this without anything public being released?
19:12:37<icedice>Yes, German court orders are sealed by default and can only be challenged after the data has been handed over to glowies: https://arstechnica.com/tech-policy/2013/10/europe-wont-save-you-why-e-mail-is-probably-safer-in-the-us/
19:12:50<icedice>The US even gives you more legal protection than Germany
19:14:05<icedice>Also, Hetzner loves responding to obviously bogus abuse reports, especially from the Russian government: https://en.wikipedia.org/wiki/Hetzner#Incidents
19:15:14<icedice>Blocked two news sites on the request of the Russian government and war.ukraine.ua (Ukraine's official site)
19:15:37<icedice>They reversed the decision on Ukraine's website after they were called out about it
19:15:50<icedice>They also took down an anti-spam site after a spammer reported it
19:16:10<icedice>And there was also this: https://old.reddit.com/r/hetzner/comments/13j381l/harassment_by_hetzner_abuse_team_possibly_ip/?sort=top
19:16:57<icedice>^ A district heating company got fucked over by Hetzner after Hetzner gave them a dirty IP
19:17:24<icedice>As for Germany, they love a good data center raid: https://vc.gg/blog/announcing-the-iron-dong-hidden-service-backup-system.html
19:18:18<icedice>"In December 2015 and January 2016, cock.li was subject to two raids by German police by the hands of the US government, that clearly demonstrated an attempt to disrupt the website. The first raid took the first hard drive, and was a gross overreach of power by the hands of Uncle Sam. However, the site was able to continue running thanks to a RAID 1 system which utilized two hard drives both containing equal data. Since the order wasn't to
19:18:18<icedice>disrupt the site but to seize the data, this sufficiently satisfied the order and the site was able to remain online. However just three weeks later, the other hard drive was taken. The authorities that ordered the raid, including stupid ****** German prosecutor Jürgen Pfeiffer, already had a copy of the site's data, meaning the second raid was a clear attempt to disrupt the site, presumably with the intent to knock it offline or scare me
19:18:19<icedice> out of operating the site."
19:19:16<icedice>Tutanota has also been forced to silently hand over user data
19:20:28<@arkiver>"after data has been handed over"
19:20:55<@arkiver>so, if they ask you to keep handing over data "forever", then the process of handing over data never finishes and you can never challenge it?
19:22:25<icedice>No idea
19:22:40<icedice>If you scroll down to about half of the ArsTechnica article they have a link to the law
19:28:04<icedice>At least in the Netherlands, 99% of wiretaps are because of blackhat stuff like malware, phishing, and DDoS according to my contact in the Dutch hosting industry
19:28:49<icedice>And given the Russian cybercrime world's affinity for Jabber and the fact that it's a Russian XMPP server, I'd bet good money on it being related to malware
19:28:59<icedice>Gut feeling says ransomware
19:30:05<icedice><JAA> Concealed court orders are a thing in almost any jurisdiction.
19:30:19<icedice>Yeah, but there are lots of other countries that aren't as cucked as Germany
19:30:24<fireonlive>hmm
19:30:36<fireonlive>for those two XMPP servers i guess no one was watching the CT logs for them?
19:30:47<fireonlive>oh wait, if they were compelled
19:30:49<icedice>This would probably not have happened in Iceland or Switzerland
19:31:27<icedice>They tend to be pretty level headed and would probably not wiretap an entire chat server for a few bad apples
19:31:31<fireonlive>re hetzner abuse team: someone said not to run tailscale there :/
19:31:39<icedice>At least not Iceland
19:31:49<fireonlive>since tailscale probes some things to detect nat and hetzner doesn't like that
19:32:09<@JAA>fireonlive: They mention at the very end that monitoring CT logs would've helped.
19:32:14<icedice>Reasonable data request for individuals will get approved though, of course
19:32:28<fireonlive>JAA: ah ok
19:32:37<anarcat>yeah
19:32:44<fireonlive>JAA: sorry about that
19:32:51<anarcat>except that's Hard
19:33:30<fireonlive>not finding google results for tailscale hetzner... maybe i'm safe then
19:33:52<anarcat>my research is here https://gitlab.torproject.org/tpo/tpa/team/-/issues/33602
19:34:05<icedice>And it also depends on the hosting providers
19:34:10<anarcat>er, rather https://gitlab.torproject.org/tpo/tpa/team/-/issues/40677
19:34:53<anarcat>just keeping up with the log is blockchain-y
19:35:00<icedice>Some hosting providers like Bahnhof in Sweden, FlokiNET (registered in Iceland/Seychelles, run out of Romania), and Freedom Internet in the Netherlands would fight it
19:36:30<fireonlive>does anyone remember tailscale + hosting provider complaining about someone running tailscale?
19:36:34<fireonlive>or was that a fever dream
19:37:33<icedice>And I wouldn't be surprised if OrangeWebsite in Iceland, Data Center Light in Switzerland, Terrahost in Norway, and 1984 Hosting in Iceland would refuse unreasonable data requests
19:38:16<icedice>They haven't had anything like that happen yet though, at least not publicly
19:38:21<fireonlive>ah!
19:38:30<fireonlive>that's been bugging me for like a month anarcat haha
19:38:39<fireonlive>thanks for your work on tor :)
19:38:46<fireonlive>i thought i saw your nick before
19:38:53<@JAA>anarcat is everywhere. :-)
19:39:07<fireonlive>^_^
19:39:26<fireonlive>'very familiar but I can't quite place...'
19:39:44<icedice>I guess we made it onto a watchlist now lol
19:39:50<@JAA>The other day, I was searching through some issues on GitHub. Guess who filed it? :-)
19:40:24<@JAA>icedice: As if we weren't on one already.
19:40:25<fireonlive>:)
19:40:34<icedice>True
19:40:39<fireonlive>"cool kids"
19:40:43<icedice>All the cool kids are on one
19:40:51<icedice>I got ninja'd
19:41:09<fireonlive>:3
19:41:20Ruthalas5 quits [Ping timeout: 252 seconds]
19:42:04<icedice>The only ones not already on one only use the Internet to post photos of their food on Instagram and browser memes from 2012 on Facebook
19:42:13<icedice>* browse
19:43:53<fireonlive>i found it! no help to google
19:43:56<fireonlive>s/to/from/
19:43:57<fireonlive>https://news.ycombinator.com/item?id=37519011
19:44:16<fireonlive>"tailscale runs a continuous netcheck to an unroutable IP (203.0.113.1:12345:UDP) [1] for whatever reason. This triggered Hetzner's ghetto-ass DDOS protection, thinking my server was compromised or I was netscanning the world. They sent me an email saying my server was compromised and I had 24hrs to remedy it."
19:44:37<fireonlive>looks like since i saw that someone followed up with "got a lot of boxes running tailscale at Hetzner never had this issue" "Maybe they've added a fix to their detection system since? I quite literally have a netscan abuse report from them filled with the above UDP IP and port."
19:44:42<fireonlive>so maybe all gucci now
19:46:42<icedice>Standard Hetzner
19:46:46<icedice>Like this case: https://old.reddit.com/r/hetzner/comments/13j381l/harassment_by_hetzner_abuse_team_possibly_ip/?sort=top
19:47:55katia quits [Remote host closed the connection]
19:48:18katia (katia) joins
19:54:52<fireonlive>ahh I remember that post
19:55:19<fireonlive>didn't see the update though
19:56:33<fireonlive>that was a weird one.
19:58:56emery quits [Ping timeout: 252 seconds]
20:00:30<icedice>Germans being German
20:00:45<icedice>Germany is for buying cars, not hosting
20:01:14<icedice>Too uptight with cucked rules and regulation
20:02:18<icedice>And also the country driving for and against the EU becoming a union of surveillance states
20:02:31<icedice>The for side is winning though
20:33:28etnguyen03 quits [Ping timeout: 265 seconds]
20:52:15decky quits [Read error: Connection reset by peer]
20:52:23decky_e quits [Read error: Connection reset by peer]
20:52:41decky joins
20:52:46decky_e joins
20:54:29nepeat quits [Ping timeout: 252 seconds]
20:55:56nepeat (nepeat) joins
20:56:58ave quits [Quit: Ping timeout (120 seconds)]
20:57:20ave (ave) joins
21:13:44decky_e_ joins
21:16:15decky_e_ quits [Read error: Connection reset by peer]
21:16:58decky quits [Ping timeout: 265 seconds]
21:16:58BPCZ quits [Ping timeout: 265 seconds]
21:17:27nepeat quits [Ping timeout: 265 seconds]
21:17:27decky_e quits [Ping timeout: 265 seconds]
21:17:27IDK_ quits [Ping timeout: 265 seconds]
21:19:52anarcat quits [Ping timeout: 265 seconds]
21:23:37BPCZ (BPCZ) joins
21:24:36BlueMaxima joins
21:27:36MetaNova quits [Ping timeout: 265 seconds]
21:31:03MetaNova (MetaNova) joins
21:37:14nepeat (nepeat) joins
21:38:52<nulldata>The Scooby-Doo and Krypto Too movie that WB originally canned for tax purposes after it was completed finally got a release last month. https://www.amazon.com/Scooby-Doo-Krypto-Too-Frank-Welker/dp/B0CC7FY5M8
21:40:25<fireonlive>oh wow, i thought the leaked copy would be the only one
21:40:40<fireonlive>...now i wonder if there's any differences between leak + final
21:44:59<nulldata>Runtime at least looks to be the same
21:45:48dddddddd joins
21:49:18<nulldata>Interesting speculation I spotted - it was released due to the strikes causing content release gaps
22:00:17decky_e joins
22:00:18decky joins
22:00:50IDK_ joins
22:03:22icedice quits [Client Quit]
22:03:26<nulldata>According to Tim Sheridan, a writer for WB, it was never cancelled. https://twitter.com/iamtimsheridan/status/1684312975128006657
22:03:26<eggdrop>nitter: https://nitter.net/iamtimsheridan/status/1684312975128006657
22:06:39anarcat (anarcat) joins
22:11:21<fireonlive>weird
22:11:25<nulldata>Though he also claims he wrote the movie - but the only credited writer I see is T.K. O'Brian?
22:22:52etnguyen03 (etnguyen03) joins
22:28:27icedice (icedice) joins
22:34:15hitgrr8 quits [Client Quit]
22:39:32etnguyen03 quits [Ping timeout: 252 seconds]
23:09:20Arcorann (Arcorann) joins
23:32:09<project10>Faze Clan Acquired for $17 Million, One Year After Its $725 Million SPAC 👀
23:37:40<nulldata>They paid $17 million too much imo
23:38:08<icedice>lmao
23:38:21<icedice>This made my day
23:40:37<icedice>Who the fuck would pay $725 million for FaZe Clan
23:40:59<icedice>Good that investors get a reality check before they ruin more companies
23:41:07<icedice>Though, let's be honest, they still will
23:58:05<pabs>https://www.devever.net/~hl/xmpp-incident
23:58:21ehmry joins