00:18:38DogsRNice quits [Read error: Connection reset by peer]
00:22:43nepeat quits [Ping timeout: 255 seconds]
00:25:25nepeat (nepeat) joins
00:31:43nepeat quits [Ping timeout: 255 seconds]
00:36:26nepeat (nepeat) joins
00:45:21etnguyen03 quits [Client Quit]
00:47:43Arcorann (Arcorann) joins
00:50:54parfait (kdqep) joins
00:53:53Arcorann quits [Ping timeout: 272 seconds]
00:55:50Arcorann (Arcorann) joins
01:32:52BlueMaxima quits [Read error: Connection reset by peer]
01:35:41Irenes quits [Quit: WeeChat 4.1.1]
01:37:48etnguyen03 (etnguyen03) joins
01:40:45Irenes (ireneista) joins
01:40:57Irenes quits [Client Quit]
01:41:15Irenes (ireneista) joins
01:52:12yarrow (yarrow) joins
02:00:34shgaqnyrjp quits [Remote host closed the connection]
02:01:02shgaqnyrjp (shgaqnyrjp) joins
02:25:14<nulldata>Apparently Logan Paul decided to sue Coffeezilla after saying he would then wouldn't. https://amp-tmz-com.cdn.ampproject.org/v/s/amp.tmz.com/2024/06/27/logan-paul-sues-youtuber-coffeezilla-cryptozoo-coverage/
02:29:35<fireonlive>:|
02:29:57<fireonlive>https://www.tmz.com/2024/06/27/logan-paul-sues-youtuber-coffeezilla-cryptozoo-coverage/
02:31:13<fireonlive>maybe should re?-throw his coffeezilla/voidzilla/??? into dtt
02:32:22<nulldata>Probably wouldn't be a bad idea - and the episodes of Logan's podcast pertaining to coffee
02:37:09<fireonlive>ah yes indeed
03:01:25<nulldata>fireonlive - wonder if it would be good to do Logan's and Coffee's Discords, if they have them
03:02:46etnguyen03 quits [Client Quit]
03:06:29<fireonlive>hmm yeah
03:13:38etnguyen03 (etnguyen03) joins
03:14:07<fireonlive>found 2
03:14:14<fireonlive>they're very inactive, before 'coffeezilla'
03:14:27<fireonlive>admin of one says 'Cool I kicked them, will probably just delete the server soon'
03:18:18<fireonlive>found https://www.youtube.com/@HighVibrationCongregation/featured
03:26:51etnguyen03 quits [Client Quit]
03:27:02<nicolas17>the fuck is that channel name
03:28:56<fireonlive>apparently it used to be 'The Drip' maybe? but yeah
03:36:47DogsRNice joins
04:06:35DogsRNice quits [Read error: Connection reset by peer]
04:38:41pixel (pixel) joins
04:39:08za3k quits [Quit: ZNC 1.8.2+deb3.1 - https://znc.in]
04:39:28za3k joins
05:17:14Ruthalas59 quits [Quit: END OF LINE]
05:26:07Ruthalas59 (Ruthalas) joins
05:30:41Ruthalas59 quits [Client Quit]
05:49:55Ruthalas59 (Ruthalas) joins
06:00:23Ruthalas59 quits [Client Quit]
06:19:12HackMii quits [Remote host closed the connection]
06:19:37HackMii (hacktheplanet) joins
06:29:58Ruthalas59 (Ruthalas) joins
06:36:54<fireonlive>~nsfw: http://batheinmymilk.com
07:12:35<fireonlive>there's blood constantly pumping through all of your meat
07:25:56nicolas17 quits [Read error: Connection reset by peer]
07:29:07nicolas17 joins
08:13:24yarrow quits [Client Quit]
08:59:38shgaqnyrjp quits [Remote host closed the connection]
09:00:01shgaqnyrjp (shgaqnyrjp) joins
09:00:02Bleo1826007227196 quits [Client Quit]
09:01:22Bleo1826007227196 joins
09:01:33nicolas17 quits [Read error: Connection reset by peer]
09:02:26nicolas17 joins
09:24:04monoxane2 quits [Ping timeout: 255 seconds]
09:26:28monoxane2 (monoxane) joins
09:43:57MrMcNuggets (MrMcNuggets) joins
10:35:59<angenieux>fireonlive bonk
12:39:22BearFortress quits [Ping timeout: 255 seconds]
12:47:25etnguyen03 (etnguyen03) joins
12:48:13IDK (IDK) joins
13:07:21shibabao joins
13:14:06erb3 quits [Quit: Bye! - Pixium IRC Bouncer]
13:15:34etnguyen03 quits [Client Quit]
13:25:17etnguyen03 (etnguyen03) joins
13:37:29BearFortress joins
14:06:49Arcorann quits [Ping timeout: 272 seconds]
14:09:02etnguyen03 quits [Client Quit]
14:20:32MrMcNuggets quits [Client Quit]
14:22:03etnguyen03 (etnguyen03) joins
15:02:05etnguyen03 quits [Client Quit]
15:44:15Irenes quits [Remote host closed the connection]
15:50:08nertzy joins
16:08:37shibabao quits [Ping timeout: 255 seconds]
16:26:08shibabao joins
16:35:21posumundi joins
16:37:08<kiska>I am making influxdb very sad... https://server8.kiska.pw/uploads/461ac4bd5910540c/image.png
16:39:27shibabao quits [Ping timeout: 272 seconds]
16:48:45Dango360 quits [Read error: Connection reset by peer]
16:52:18Dango360 (Dango360) joins
16:52:26katocala joins
17:21:36<@JAA>RIP Indonesia
17:22:20<@JAA>https://www.thejakartapost.com/indonesia/2024/06/29/public-urge-immediate-data-recovery-after-ransomware-attack.html
17:22:44<@JAA>> Since June 20, at least 282 databases of agencies in central government and regional administrations have been impacted by a cyberattack using Brain Cipher
17:22:50<@JAA>> With 98 percent of all affected data having been rendered inaccessible without any backups, analysts said that the government would have no choice but to recollect it from scratch
17:28:36Lime joins
17:29:27Lime quits [Client Quit]
17:33:29<kiska>I suppose they better pay that ransom :D
17:33:44<kiska>And then promptly order more hard drives :D
17:38:52<that_lurker>https://news.sky.com/story/spacex-given-permission-to-destroy-the-international-space-station-13160041
17:39:06<that_lurker>ohh that might be a nice upcoming live stream
17:51:39nicolas17 quits [Ping timeout: 272 seconds]
17:51:55nicolas17 joins
17:55:20etnguyen03 (etnguyen03) joins
18:10:40<kiska>I have been downsampling #// but my god its taking forever https://server8.kiska.pw/uploads/17953a8376c8bad8/image.png
18:11:34<kiska>!remindme 30d downsample project stats
18:11:35<eggdrop>[remind] ok, i'll remind you at 2024-07-29T18:11:34Z
18:37:41recarmdra joins
18:39:47katocala quits [Ping timeout: 272 seconds]
18:41:10posumundi quits [Ping timeout: 255 seconds]
18:50:57katocala joins
18:53:33recarmdra quits [Client Quit]
18:55:28DogsRNice joins
19:03:06etnguyen03 quits [Client Quit]
19:06:05<that_lurker>JAA: Is there a way for the little-things archivebot-jobs script to filter the pipelines? For example only show jobs in the HEL pipelines.
19:08:31<@JAA>that_lurker: Yes, --filter. See --help output for details.
19:08:49<@JAA>`--filter pipeline^ak-was-here-hel` for example
19:09:04<@JAA>Er, pipenick
19:13:17Jens quits []
19:14:00Jens (JensRex) joins
19:15:26that_lurker was sure he tried that already 🤦
19:17:49<that_lurker>thanks <3
19:34:28<@JAA>> Microsoft AI boss Mustafa Suleyman incorrectly believes that the moment you publish anything on the open web, it becomes “freeware” that anyone can freely copy and use.
19:34:37<@JAA>> I think that with respect to content that’s already on the open web, the social contract of that content since the ‘90s has been that it is fair use. Anyone can copy it, recreate with it, reproduce with it. That has been “freeware,” if you like, that’s been the understanding.
19:34:43<@JAA>Wow, this lad is dense...
19:34:47<@JAA>https://www.theverge.com/2024/6/28/24188391/microsoft-ai-suleyman-social-contract-freeware
19:35:12<fireonlive>o_o
19:35:26<fireonlive>ai bros justifying themselves is something
19:37:18<@JAA>Very confident and very wrong, just like an LLM.
19:37:22etnguyen03 (etnguyen03) joins
19:39:32<fireonlive>:D
19:39:47<nicolas17>the only content that is freely reusable in that way is:
19:39:52<nicolas17>- content that has an explicit license allowing it
19:40:02<nicolas17>- content made by a company that posts this kind of take
19:40:11<nicolas17>Microsoft websites are free game now
19:40:16<@JAA>:-)
19:41:13nulldata quits [Ping timeout: 272 seconds]
19:41:40that_lurker slowly puts the pirate hat on with a sticker of the quote from Microsoft AI boss Mustafa Suleyman on it
19:42:25nulldata (nulldata) joins
19:48:02<fireonlive>!a microsoft.com
19:50:28<that_lurker>https://img.kuhaon.fun/u/BNMxjf.png
19:51:09etnguyen03 quits [Client Quit]
20:02:32<nicolas17>MICROS~1
20:50:27<fireonlive>https://dailyhive.com/vancouver/kraft-kd-dinnerware-collection https://annsandra.com/en-ca/products/kraft-dinnerware-set-of-3
20:50:31<fireonlive>already sold out lmao
20:53:57<nukke>https://www.bleepingcomputer.com/news/security/blacksuit-ransomware-gang-claims-attack-on-kadokawa-corporation/
20:54:08<nukke>>Here is a summary of what was downloaded:
20:54:10<nukke>Contract
20:54:12<nukke>Documents signed with DocuSign Various legal documents Platform user related data (emails, data usage, opened links, etc.)
20:54:14<nukke>Employee related data (personal details, payments, contracts, emails, etc.)
20:54:16<nukke>Business plans (presentations, emails, offers, etc.)
20:54:18<nukke>Project related data (coding, emails, payments, etc.)
20:54:20<nukke>Financial Data (payments, transfers, plans, etc.)
21:01:27<nukke>There was also that Ticketmaster leak a day or two ago
21:01:31<nukke>https://www.bleepstatic.com/images/news/u/1109292/2024/Allegedly_stolen_Ticketmaster_data_for_sale.jpg
21:01:37<nukke>Card details
21:04:11Gereon02 quits [Ping timeout: 272 seconds]
21:04:38Gereon02 (Gereon) joins
21:08:06<@JAA>> customer, last 4 of card, expiration date
21:08:14<@JAA>No idea what you could possibly do with that, but ok.
21:08:28<nukke>https://www.bleepingcomputer.com/news/security/ticketmaster-sends-notifications-about-recent-massive-data-breach/
21:08:33<nukke>>While Ticketmaster lazily said the breach only impacted more than 1000 people (">1000"), it actually impacted millions of customers worldwide and exposed what many would consider much more sensitive information.
21:08:46Suika quits [Quit: Server is ded]
21:09:12<@JAA>Yeah, just saying that the credit card info on this seems virtually useless. The other stuff not so much.
21:09:13Suika joins
21:09:21<nukke>JAA: SIM swapping probably. Some providers ask for stuff like last 4 of SSN or last 4 of card on file
21:09:44<nukke>Carriers*
21:10:03<@JAA>Hmm true, the world is full of stupid companies.
21:11:23<@JAA>Pretty sure this wouldn't work with my provider.
21:11:31<Barto>:-)
21:11:46<nukke>I can try. Did you use Ticketmaster recently?
21:11:58<Barto>i've seen blog posts about people cross-checking leaks to get a full phone number, or enough to attack someone
21:13:20<@JAA>I don't think I did.
21:14:08<@JAA>Barto: Yeah, that works on other things, but virtually everyone keeps the last 4 digits of credit card numbers and discards the first 12. Unless they store the full number, but then you've already reached your goal and don't need to combine stuff.
21:14:46<@JAA>I'm not sure where you'd find partial CC data that you could combine into a full set of all 16 digits + CVV + expiration date.
21:17:00<@JAA>> full names, email addresses, phone numbers, addresses, hashed credit card details, and payment amounts
21:18:23<nukke>It'd.be fun to see which artist had the most expensive tickets, after Taylor Swift
21:20:02<that_lurker>Adele most likely
21:21:18Irenes (ireneista) joins
21:28:32BlueMaxima joins
21:31:39<Barto>JAA: i think this was more about phone numbers, i hope you're right, and i never saved my cc info when buying stuffs online :-)
21:32:07<@JAA>Same, but you can't always control it.
21:32:13@JAA stares in the general direction of Hetzner.
21:32:46<@JAA>At least I think it didn't let me choose.
21:32:54<@JAA>It sure is incredibly convenient though.
21:33:16<Barto>:-)
21:46:41<nicolas17>JAA: some companies only show you the last 4 digits of the credit card, some companies accept the last 4 digits of your credit card as an identity verification step for password recovery and such
21:47:03<nicolas17>"surely that's something only the real user would know"
21:47:38<nicolas17>I read of someone who had his domain taken over through a long chain like that
21:47:49<fireonlive>oof
21:49:00<nicolas17>IIRC attacker called paypal to add a (fake) credit card number A to the victim's account, verified identity with information that they could get from public sources / osint
21:49:39<nicolas17>called paypal again saying they couldn't login, changing the password needs stronger identity verification... such as the last 4 digits of a card in the account... so the attacker gave them the last 4 digits of A
21:50:07<nicolas17>now they could login to paypal and see the last 4 digits of the legitimate card B
21:50:33<nicolas17>called Apple, account recovery, verify identity giving them the last 4 digits of the credit card on file (B)...
21:51:32<nicolas17>you can chain customer support vulnerabilities across different companies
21:52:36<nicolas17>I'm sure those process flaws were "fixed" now but who knows what else is out there
21:53:19<@JAA>Hmm yes
21:55:55etnguyen03 (etnguyen03) joins
22:03:52nertzy quits [Client Quit]
22:06:03nertzy joins
22:07:37<thuban>nicolas17: nice
22:07:38nertzy quits [Client Quit]
22:07:50<thuban>i'm reminded of https://www.schneier.com/blog/archives/2018/04/obscure_e-mail_.html
22:10:46<nicolas17>"the socket that transitions to TIME_WAIT stays there for a period that is 2 x Maximum Segment Lifetime in duration. The MSL is the maximum amount of time that any segment, for all intents and purposes a datagram that forms part of the TCP protocol, can remain valid on the network before being discarded. This time limit is ultimately bounded by the TTL field in the IP datagram that is used to transmit the TCP segment"
22:10:56<fireonlive>The 'pay phone bandit' who baffled the FBI in the '80s https://www.mentalfloss.com/posts/pay-phone-bandit-baffled-fbi https://news.ycombinator.com/item?id=40827650
22:10:57<nicolas17>wait what? the TTL field doesn't specify "time"
22:36:45<steering>I've heard of companies which require the last 6 digits of the CC number for verification, which is a good idea.
22:38:34<steering>but yeah 4 is common to the point it's scary.
22:54:15<fireonlive>https://freakbait.com/
22:54:20<fireonlive>cc JAA for the noscrpit message
22:54:51<fireonlive>these little fake computer websites are always something
23:12:14etnguyen03 quits [Client Quit]
23:17:19youjust joins
23:17:34<youjust>lost the game
23:17:36youjust quits [Remote host closed the connection]
23:22:39etnguyen03 (etnguyen03) joins
23:24:47<fireonlive>ffff
23:39:39<@JAA>https://i.kym-cdn.com/photos/images/original/001/535/091/d97.jpg
23:42:14etnguyen03 quits [Client Quit]
23:42:20<kiska>Influx now doing RP https://server8.kiska.pw/uploads/64efeb244202884a/image.png
23:43:09<kiska>https://server8.kiska.pw/uploads/cfd6c4a5237dd632/image.png So now seeing how much disk is used when its not storing every single websocket message since the start of the instance