00:10:05IDK quits [Client Quit]
00:15:56nulldata quits [Ping timeout: 255 seconds]
00:17:31nulldata (nulldata) joins
00:34:08magmaus3 quits [Client Quit]
00:36:45magmaus3 (magmaus3) joins
01:24:41BlueMaxima joins
01:39:51qwertyasdfuiopghjkl quits [Remote host closed the connection]
01:48:28qwertyasdfuiopghjkl (qwertyasdfuiopghjkl) joins
01:56:31etnguyen03 quits [Ping timeout: 272 seconds]
02:01:35qwertyasdfuiopghjkl quits [Ping timeout: 255 seconds]
02:05:51sonick (sonick) joins
02:08:11etnguyen03 (etnguyen03) joins
02:35:28qwertyasdfuiopghjkl (qwertyasdfuiopghjkl) joins
02:50:57<fireonlive>
02:51:49<fireonlive>
03:09:21etnguyen03 quits [Ping timeout: 272 seconds]
03:15:03<fireonlive>!8ball more balls?
03:15:04<eggdrop>🎱: fireonlive, signs point to yes
03:15:07<fireonlive>nice
03:28:59threedeeitguy39 quits [Quit: Ping timeout (120 seconds)]
03:29:43threedeeitguy39 (threedeeitguy) joins
03:39:55Doranwen (Doranwen) joins
03:42:49jacksonchen666 (jacksonchen666) joins
03:43:07jacksonchen666 quits [Remote host closed the connection]
03:49:03etnguyen03 (etnguyen03) joins
04:05:45<fireonlive>Forgejo Security Release 1.21.6-0 The Forgejo v1.21.6-0 release contains a security fix for Cross-site scripting (XSS) vulnerabilities. It enabled attackers to inject client-side scripts into web pages displayed to Forgejo visitors. https://forgejo.org/2024-02-release-v1-21-6-0/
04:17:37<fireonlive>thanks facebook i have a new shopify to archive now 😏
04:33:43<@JAA>Where information on when these vulnerabilitiese were introduced? :-(
04:37:08<fireonlive>:(
04:43:47jacksonchen666 (jacksonchen666) joins
04:44:32atphoenix quits [Remote host closed the connection]
04:45:16atphoenix (atphoenix) joins
04:48:24jacksonchen666 quits [Ping timeout: 255 seconds]
04:49:30<fireonlive>+rss- Tyler Perry Puts $800M Studio Expansion on Hold After Seeing OpenAI's Sora: https://www.hollywoodreporter.com/business/business-news/tyler-perry-ai-alarm-1235833276/ https://news.ycombinator.com/item?id=39475610
04:49:31<fireonlive>lol
04:50:35<@JAA>It's a bold strategy, Cotton.
04:51:12<fireonlive>let's see how it plays out
05:15:06qwertyasdfuiopghjkl quits [Ping timeout: 265 seconds]
05:21:36<fireonlive>+rss- Facial recognition error message on vending machine sparks concern at University: https://kitchener.ctvnews.ca/facial-recognition-error-message-on-vending-machine-sparks-concern-at-university-of-waterloo-1.6779835 https://news.ycombinator.com/item?id=39476304
05:21:41<fireonlive>that's a crudely cut hole lol
05:22:28<fireonlive>and uh i guess next time maybe name your exe something more stealthy
05:23:11qwertyasdfuiopghjkl (qwertyasdfuiopghjkl) joins
05:44:41jacksonchen666 (jacksonchen666) joins
05:49:20jacksonchen666 quits [Remote host closed the connection]
06:00:59etnguyen03 quits [Ping timeout: 272 seconds]
06:22:02etnguyen03 (etnguyen03) joins
06:28:11etnguyen03 quits [Remote host closed the connection]
06:48:34jacksonchen666 (jacksonchen666) joins
06:49:07jacksonchen666 quits [Read error: Connection reset by peer]
07:15:55Arcorann (Arcorann) joins
07:26:37le0n quits [Quit: see you later, alligator]
07:29:02le0n (le0n) joins
07:39:06<that_lurker>https://lounge.kuhaon.fun/folder/88565f7bea131e3e/image.png
07:39:19<fireonlive>amaze
07:46:40jacksonchen666 (jacksonchen666) joins
07:49:59jacksonchen666 quits [Remote host closed the connection]
07:54:56nulldata quits [Ping timeout: 255 seconds]
07:56:16nulldata (nulldata) joins
08:01:07magmaus3 quits [Client Quit]
08:01:25magmaus3 (magmaus3) joins
08:34:01BlueMaxima quits [Read error: Connection reset by peer]
08:35:54c3manu quits [Remote host closed the connection]
08:36:00c3manu (c3manu) joins
08:44:25qwertyasdfuiopghjkl quits [Remote host closed the connection]
08:47:39jacksonchen666 (jacksonchen666) joins
08:51:53jacksonchen666 quits [Remote host closed the connection]
09:48:38jacksonchen666 (jacksonchen666) joins
09:51:14jacksonchen666 quits [Remote host closed the connection]
10:00:02Bleo18260 quits [Client Quit]
10:01:21Bleo18260 joins
11:02:10jacksonchen666 (jacksonchen666) joins
11:13:51MetaNova quits [Ping timeout: 272 seconds]
11:19:32MetaNova (MetaNova) joins
13:09:45Arcorann quits [Ping timeout: 272 seconds]
14:14:14etnguyen03 (etnguyen03) joins
14:35:55HP_Archivist quits [Client Quit]
14:45:23etnguyen03 quits [Ping timeout: 272 seconds]
14:54:02mgrytbak quits [Quit: Ping timeout (120 seconds)]
14:54:13mgrytbak joins
14:57:08etnguyen03 (etnguyen03) joins
14:59:13mgrytbak quits [Client Quit]
14:59:24mgrytbak joins
15:01:51mgrytbak quits [Client Quit]
15:02:04mgrytbak joins
15:13:10mgrytbak quits [Client Quit]
15:13:25mgrytbak joins
15:17:50mgrytbak quits [Client Quit]
15:17:57mgrytbak joins
15:34:09etnguyen03 quits [Ping timeout: 272 seconds]
15:34:27<nicolas17>does tinyurl have a way to report malicious links?
15:35:05etnguyen03 (etnguyen03) joins
15:40:13<DigitalDragons>i'm seeing abuse@tinyurl.com mentioned everywhere but their official site
15:40:27Meli quits [Quit: After some time of wasteful lurking, 's brain 63gf4u1ted! X_x]
15:41:30<@JAA>> They reviewed 30,000 Bitcoin addresses, with over 500 Bitcoin addresses active. Those 500+ wallets have received over $120,000,000+. The analysis also shows over $114,000,000 is still unspent (approx. 2,200 BTC unspent, numbers will vary based on price of Bitcoin).
15:41:34<@JAA>> A large portion of this money was the 20% paid to Lockbit ransomware group administrative staff. This indicates the total money stolen could be in excess of $1,000,000,000 from July, 2022 - February, 2024. This means Lockbit ransomware group may have done multi-billion dollars worth of theft internationally.
15:43:02<@JAA>From https://twitter.com/vxunderground/status/1760954165155500453 (good luck with Nitter)
15:43:03<eggdrop>nitter: https://farside.link/nitter/vxunderground/status/1760954165155500453
15:46:56mgrytbak quits [Client Quit]
15:47:09mgrytbak joins
15:47:34Naruyoko5 joins
15:49:59Naruyoko quits [Ping timeout: 272 seconds]
15:51:29etnguyen03 quits [Ping timeout: 255 seconds]
15:51:55mgrytbak quits [Client Quit]
15:52:15mgrytbak joins
15:53:16sonick quits [Client Quit]
15:53:53qwertyasdfuiopghjkl (qwertyasdfuiopghjkl) joins
15:59:12icedice joins
15:59:16icedice quits [Client Quit]
16:17:33Dango360_ joins
16:20:23Kitty quits [Ping timeout: 272 seconds]
16:21:11Dango360 quits [Ping timeout: 255 seconds]
16:26:27Dango360_ quits [Client Quit]
17:06:11f_ quits [Ping timeout: 255 seconds]
17:10:59f_ (funderscore) joins
17:15:29<nukke>https://i.imgur.com/2JKRnX8.png
17:36:45qwertyasdfuiopghjkl quits [Remote host closed the connection]
17:39:26HP_Archivist (HP_Archivist) joins
18:14:01etnguyen03 (etnguyen03) joins
18:44:35Meli (Meli) joins
18:47:29Meli quits [Client Quit]
18:49:13Meli (Meli) joins
19:31:30<fireonlive>https://dl.fireon.live/irc/e3b0251a3170de3f/ai-bullshit.mp4
19:31:36<fireonlive>🙄
19:31:56<fireonlive>“biggest tech companies trying to hide this from you”
19:32:29<nicolas17>biggest tech companies won't shut the fuck up about this
20:00:31<nicolas17>fireonlive: is this an actual ad
20:10:10<fireonlive>nicolas17: it is!
20:10:20<fireonlive>someone paid money to show that to me
20:15:38etnguyen03 quits [Ping timeout: 255 seconds]
20:22:09Meli quits [Client Quit]
20:28:10Meli (Meli) joins
20:31:46Meli quits [Client Quit]
20:36:25Meli (Meli) joins
20:51:07Meli quits [Client Quit]
20:52:38Meli (Meli) joins
20:54:59Meli quits [Client Quit]
21:28:41<nicolas17>the mosquito infestation is still going
21:30:20Meli (Meli) joins
21:31:07<@JAA>Oh yeah, I saw a video of that, big oof.
21:31:39<nulldata>https://www.cbsnews.com/news/military-tracking-balloon-western-us-military/
21:32:01<nulldata><AhShitHereWeGoAgain.gif>
21:33:54<fireonlive>oh lordy
21:33:58<fireonlive>is this another weather baloon
21:42:53<fireonlive>!a https://mmalmi.github.io/satoshi/ -e https://news.ycombinator.com/item?id=39480407
21:43:01<fireonlive>huh
21:43:04<nicolas17>erm
21:43:07<fireonlive>first time for everything
21:46:34Meli quits [Client Quit]
21:47:34Meli (Meli) joins
21:49:16<fireonlive>-+rss- Thanks FedEx, This Is Why We Keep Getting Phished: https://www.troyhunt.com/thanks-fedex-this-is-why-we-keep-getting-phished/ https://news.ycombinator.com/item?id=39479001
21:49:20<fireonlive>A+ design; no notes
21:52:06BlueMaxima joins
22:09:59qwertyasdfuiopghjkl (qwertyasdfuiopghjkl) joins
22:16:41<@JAA>lol, nice
22:16:57Irenes quits [Ping timeout: 272 seconds]
22:23:16systwi quits [Remote host closed the connection]
22:29:51Irenes (ireneista) joins
22:50:16<imer>oh my god.
22:50:18<imer>how
23:00:16Arcorann (Arcorann) joins
23:05:01<fireonlive>right? sooo bad
23:22:23BlueMaxima quits [Read error: Connection reset by peer]
23:33:58wickedplayer494 quits [Remote host closed the connection]
23:43:39wickedplayer494 joins
23:48:18<thuban>x_x
23:50:46Ruthalas59 quits [Read error: Connection reset by peer]
23:51:04Ruthalas59 (Ruthalas) joins