00:36:02 | | etnguyen03 quits [Client Quit] |
00:49:37 | | Bleo18260072271962 quits [Quit: Ping timeout (120 seconds)] |
00:49:53 | | Bleo18260072271962 joins |
01:20:18 | | Froxcey quits [Remote host closed the connection] |
01:27:27 | | etnguyen03 (etnguyen03) joins |
01:37:43 | | Froxcey (Froxcey) joins |
01:42:25 | | Froxcey quits [Ping timeout: 260 seconds] |
01:42:49 | | Froxcey (Froxcey) joins |
01:49:06 | | simon816 quits [Quit: ZNC 1.9.1 - https://znc.in] |
01:50:50 | | simon816 (simon816) joins |
02:00:32 | | pixel leaves [Error from remote client] |
02:16:10 | <nulldata> | https://x.com/WordPress/status/1852414666238243190 |
02:16:10 | <eggdrop> | nitter: https://nitter.lucabased.xyz/WordPress/status/1852414666238243190 |
02:17:44 | <nicolas17> | cringe |
02:19:50 | <@OrIdow6> | I forgot about the WP drama after not hearing about it for like 5 days |
02:20:14 | <nicolas17> | oh yeah I saw something else |
02:20:47 | <nicolas17> | I mentioned a few days ago that Matt will be at the Nerdearla Mexico conference but I later noticed he'll be there *in person* |
02:26:49 | <nulldata> | https://trust.okta.com/security-advisories/okta-ad-ldap-delegated-authentication-username/ |
02:28:08 | <nicolas17> | ... |
02:28:29 | <nicolas17> | "The input to the bcrypt function is the password string (up to 72 bytes)" |
02:28:42 | <@JAA> | Oh yeah, the stupid bcrypt length limit. |
02:30:47 | <hexa-> | bcrypt in 2024 |
02:30:54 | <hexa-> | at a security focused company |
02:34:09 | <nulldata> | I don't think you can really call Okta "security focused" |
02:34:20 | <nicolas17> | infosec compliance != security |
02:34:56 | | seacow31 quits [Quit: Client closed] |
02:36:11 | | seacow joins |
02:37:44 | <@JAA> | Did I miss some major developments regarding bcrypt? It has a couple weird quirks like this, and it's not the best mechanism anymore, but it's still solid, isn't it? |
02:43:11 | <hexa-> | the length limit is a foot gun and scrypt and argon2 exist |
02:43:18 | <hexa-> | that's all |
02:44:48 | <@JAA> | Yeah |
02:48:01 | <Jake> | Also, did they go from Bcrypt to PBKDF2?? |
02:51:30 | <nicolas17> | well it's a cache key |
02:51:37 | <nicolas17> | not the authoritative copy of the password database |
02:52:03 | <nicolas17> | but still kinda sus |
02:55:03 | <nicolas17> | looks like if I ignore discovery of new items, the current queue will be finished in 16 hours |
02:55:19 | <nicolas17> | (if I take into account discovery, the queue is growing faster than it shrinks so +infinity) |
02:55:45 | <Jake> | ah, I see |
02:56:08 | <nicolas17> | wrong channel -_- |
03:37:17 | | etnguyen03 quits [Remote host closed the connection] |
03:41:15 | | DogsRNice joins |
04:49:06 | <pabs> | Common Crawl are hiring: https://news.ycombinator.com/item?id=42018317 |
05:15:28 | | igloo22225 quits [Quit: Ping timeout (120 seconds)] |
05:15:43 | | igloo22225 (igloo22225) joins |
05:17:40 | | MetaNova quits [Ping timeout: 260 seconds] |
05:18:28 | | f_ quits [Read error: Connection reset by peer] |
05:18:52 | | steering quits [Remote host closed the connection] |
05:19:04 | | steering (steering) joins |
05:19:39 | | MetaNova (MetaNova) joins |
05:23:14 | | f_ (funderscore) joins |
05:24:40 | | nepeat quits [Ping timeout: 260 seconds] |
05:25:45 | | nepeat (nepeat) joins |
05:26:06 | <@JAA> | Apparently, Tor nodes are getting abuse-bombed via spoofed TCP packets: https://delroth.net/posts/spoofed-mass-scan-abuse/ |
05:27:35 | | MetaNova quits [Ping timeout: 260 seconds] |
05:29:14 | | Bleo182600722719623 joins |
05:29:23 | | Bleo18260072271962 quits [Read error: Connection reset by peer] |
05:29:23 | | Bleo182600722719623 is now known as Bleo18260072271962 |
05:29:29 | | decky_e joins |
05:29:37 | | kiska52 quits [Ping timeout: 255 seconds] |
05:30:02 | | kiska52 joins |
05:30:38 | | decky_e_ quits [Ping timeout: 240 seconds] |
05:32:44 | | MetaNova (MetaNova) joins |
06:04:45 | <pabs> | steering: eggdrop's nitter instance just gives me "Enable JavaScript and cookies to continue", I'd suggest the twiiit.com redirector instead |
07:03:11 | | DogsRNice quits [Read error: Connection reset by peer] |
08:13:23 | | dimkauzh (dimkauzh) joins |
08:13:31 | | dimkauzh quits [Remote host closed the connection] |
08:14:20 | <qwertyasdfuiopghjkl> | Looks like twiiit.com currently only redirects to nitter.privacydev.net, which has a really strict ratelimit (but I guess the other ones probably won't work without JS at all...) |
08:49:39 | <thuban> | for my personal twitter announcer i switched to https://publish.twitter.com/oembed?url=<tweet> some time ago |
08:50:33 | <thuban> | inferior to a working nitter in some ways, but if you don't have a working nitter... |
09:13:08 | | dimkauzh (dimkauzh) joins |
09:15:27 | | pixel (pixel) joins |
09:16:23 | | pixel leaves |
09:17:38 | | dimkauzh quits [Ping timeout: 240 seconds] |
09:17:56 | <magmaus3> | https://social.besties.house/@h/113411538282750839 |
09:18:54 | <magmaus3> | someone is archiving loops |
09:19:58 | <magmaus3> | (if you're out of the loop, loops.video is a tiktok-like service for the fediverse, made by pixelfed and currently in beta) |
10:06:14 | | dimkauzh (dimkauzh) joins |
10:06:22 | | dimkauzh quits [Remote host closed the connection] |
10:12:20 | | SootBector quits [Remote host closed the connection] |
10:12:49 | | SootBector (SootBector) joins |
10:26:15 | | sralracer joins |
10:27:20 | | sralracer is now authenticated as sralracer |
10:27:45 | <Barto> | JAA: i had to stop running my relay a couple of months ago due to the abuse letters, that would lock-up internet 2 times a week |
10:35:09 | | BornOn420 quits [Ping timeout: 240 seconds] |
11:00:04 | | Bleo18260072271962 quits [Quit: The Lounge - https://thelounge.chat] |
11:02:49 | | Bleo182600722719623 joins |
11:05:32 | <that_lurker> | -feed- RCE Vulnerability in QBittorrent https://sharpsec.run/rce-vulnerability-in-qbittorrent/ https://news.ycombinator.com/item?id=42004219 |
11:17:23 | | dimkauzh (dimkauzh) joins |
11:21:24 | <alexlehm> | magmaus3: the site is pretty new and is not yet showing public feeds unless you are a logged in user, i don't think there is anything you can archive yet |
11:21:37 | <alexlehm> | i got an account but cannot do anything yet |
11:26:05 | | MrMcNuggets (MrMcNuggets) joins |
11:26:10 | | dimkauzh quits [Remote host closed the connection] |
11:37:24 | | BornOn420 (BornOn420) joins |
11:38:10 | | Froxcey quits [Remote host closed the connection] |
11:50:56 | | Froxcey (Froxcey) joins |
11:55:22 | | dimkauzh (dimkauzh) joins |
11:55:30 | | Froxcey quits [Ping timeout: 260 seconds] |
11:55:32 | | dimkauzh quits [Remote host closed the connection] |
12:06:01 | <magmaus3> | alexlehm: yeah, but it's still cool that someone is doing that |
12:13:03 | <alexlehm> | i assume the regular archive.org crawler will catch that when video posts are linked from other social media, up to now the only videos I have seen were from the developer who demoed his site that came from the mastodon profile of pixelfed |
12:13:24 | <alexlehm> | not sure if the videos are captured by default |
12:28:40 | | Froxcey (Froxcey) joins |
12:32:58 | | Froxcey quits [Ping timeout: 240 seconds] |
12:36:07 | | etnguyen03 (etnguyen03) joins |
12:58:08 | | etnguyen03 quits [Client Quit] |
13:04:32 | | Froxcey (Froxcey) joins |
13:12:50 | | etnguyen03 (etnguyen03) joins |
13:16:18 | | Froxcey quits [Ping timeout: 240 seconds] |
14:11:43 | | Froxcey (Froxcey) joins |
14:31:18 | | etnguyen03 quits [Client Quit] |
14:33:43 | | PredatorIWD2 quits [Read error: Connection reset by peer] |
14:36:34 | | PredatorIWD2 joins |
14:43:53 | | etnguyen03 (etnguyen03) joins |
14:46:29 | | Naruyoko quits [Quit: Leaving] |
14:50:11 | | dimkauzh (dimkauzh) joins |
14:57:55 | | dimkauzh quits [Client Quit] |
15:23:26 | | Froxcey quits [Remote host closed the connection] |
15:28:18 | <nukke> | https://arstechnica.com/gaming/2024/11/ipod-fans-evade-apples-drm-to-preserve-54-lost-clickwheel-era-games/#gsc.tab=0 |
15:38:07 | | Froxcey (Froxcey) joins |
15:39:31 | | Froxcey quits [Remote host closed the connection] |
15:44:06 | | Naruyoko joins |
15:48:15 | | Froxcey (Froxcey) joins |
15:52:55 | | Froxcey quits [Ping timeout: 260 seconds] |
15:54:50 | | Froxcey (Froxcey) joins |
15:57:37 | | Froxcey quits [Remote host closed the connection] |
16:06:28 | | Froxcey (Froxcey) joins |
16:08:59 | | Juesto (Juest) joins |
16:11:18 | | Juest quits [Ping timeout: 240 seconds] |
16:11:18 | | Juesto is now known as Juest |
16:20:12 | | Terbium quits [Remote host closed the connection] |
16:20:44 | | Terbium joins |
16:30:56 | | Froxcey quits [Remote host closed the connection] |
16:45:21 | | dimkauzh (dimkauzh) joins |
16:57:07 | | Froxcey (Froxcey) joins |
17:09:40 | | Froxcey quits [Remote host closed the connection] |
17:09:43 | | Froxcey (Froxcey) joins |
17:15:16 | | goos joins |
17:23:04 | | Froxcey quits [Remote host closed the connection] |
17:26:54 | | Froxcey (Froxcey) joins |
17:28:41 | | MetaNova quits [Remote host closed the connection] |
17:31:06 | | MetaNova (MetaNova) joins |
17:32:37 | | MrMcNuggets quits [Quit: WeeChat 4.3.2] |
17:32:38 | | Froxcey quits [Ping timeout: 240 seconds] |
17:39:41 | <@JAA> | Barto: Right, I think you mentioned that. Now I wonder whether it's connected to this. |
17:44:12 | | goos quits [Client Quit] |
17:58:05 | | dimkauzh quits [Remote host closed the connection] |
17:58:48 | | dimkauzh (dimkauzh) joins |
17:59:42 | | dimkauzh quits [Client Quit] |
18:02:15 | <eggdrop> | [remind] kiska: downsample influxdb |
18:14:10 | | BornOn420 quits [Remote host closed the connection] |
18:14:10 | | sec^nd quits [Remote host closed the connection] |
18:14:11 | | HackMii quits [Write error: Broken pipe] |
18:14:11 | | SootBector quits [Write error: Broken pipe] |
18:14:31 | | sec^nd (second) joins |
18:14:31 | | SootBector (SootBector) joins |
18:14:37 | | HackMii (hacktheplanet) joins |
18:14:53 | | BornOn420 (BornOn420) joins |
18:50:25 | | goos joins |
18:50:40 | | useretail quits [Quit: Leaving] |
18:51:21 | <nicolas17> | JAA: https://gitlab.com/wireshark/wireshark/-/commit/ecffa7d1f6b75d37562a468e84f17a132cd0db14 |
18:51:48 | | goos quits [Client Quit] |
18:53:47 | <@JAA> | Nice |
19:06:05 | <steering> | pabs: not much better |
19:06:37 | <steering> | it took me to this... https://i.imgur.com/1npCAEV.png |
19:07:18 | <steering> | in fact privacydev is the only one its redirecting me too and yeah just broken |
19:07:21 | <steering> | some 500, some empty pages |
19:11:46 | | sralracer quits [Ping timeout: 255 seconds] |
19:15:53 | <immibis> | does yt-dlp have a way to embed the format ID in the filename? including when it's a mux of two formats? |
19:16:20 | <immibis> | Barto: for the spoofing attack? terrorists win! btw this attack can be done against anyone, including you when you're not running a tor relay |
19:22:55 | | immibis wonders what would happen if one of those cybersecurity companies sent themselves an automated abuse report |
19:25:25 | <nicolas17> | immibis: I read of someone who got a phishing email to his work email, he reported it to RBLs and to the ISP used by the sender, and it turns out it was a badly-executed phishing test hired by his company and the cybersecurity company was pissed about getting blocked worldwide |
19:25:59 | <steering> | immibis: yeah, %(format_id)s |
19:26:09 | <steering> | [Merger] Merging formats into "313+251.webm" |
19:26:58 | <@JAA> | nicolas17: Test passed, I guess. :-) |
19:27:20 | <steering> | all the other usual things work too like %(format) if you want a longer description of it etc |
19:27:52 | <nicolas17> | I think you need the s |
19:28:00 | <steering> | yeah, +s |
19:40:02 | <immibis> | thanks, i didn't test it, i just searched the documentation and didn't seem to find one |
19:46:55 | <immibis> | yup it's not documented in the output templates section |
19:47:04 | <immibis> | glad i'm not blind |
19:54:40 | | Froxcey (Froxcey) joins |
19:54:55 | | Froxcey quits [Read error: Connection reset by peer] |
19:54:55 | | sralracer joins |
19:55:14 | | sralracer is now authenticated as sralracer |
19:56:25 | <steering> | it is. |
19:56:49 | <steering> | >All the fields in Filtering Formats can also be used |
19:57:02 | <steering> | :) |
19:57:19 | <steering> | it's just buried in there and very missable |
20:03:16 | | Froxcey (Froxcey) joins |
20:13:26 | | linuxgemini quits [Quit: getting (hopefully fresh) air o/] |
20:13:56 | | linuxgemini (linuxgemini) joins |
21:05:57 | | qwertyasdfuiopghjkl quits [Client Quit] |
21:07:45 | | qwertyasdfuiopghjkl (qwertyasdfuiopghjkl) joins |
21:11:39 | <@JAA> | Oops: https://www.wired.com/story/synology-zero-click-vulnerability/ |
21:20:45 | | wickedplayer494 quits [Ping timeout: 260 seconds] |
21:21:48 | | wickedplayer494 joins |
21:22:00 | | wickedplayer494 is now authenticated as wickedplayer494 |
21:26:56 | | BlueMaxima joins |
21:30:29 | <steering> | >The researchers tell WIRED that while the systems can be set up with a gateway that requires credentials to access them, the part of the photo application that contains the zero-click vulnerability does not require authentication |
21:30:33 | <steering> | yucko |
21:34:14 | <steering> | I just noticed this in my openvpn logs: 2024-11-02 05:36:59 us=789504 read UDPv4 [EHOSTUNREACH]: No route to host (fd=6,code=113) |
21:34:23 | <steering> | how would a UDP read cause no route to host...? |
21:34:30 | | Froxcey quits [Remote host closed the connection] |
21:35:24 | | Froxcey (Froxcey) joins |
21:39:38 | | Froxcey quits [Ping timeout: 240 seconds] |
22:00:33 | | Froxcey (Froxcey) joins |
22:06:21 | | Froxcey quits [Remote host closed the connection] |
22:06:27 | | Froxcey (Froxcey) joins |
22:21:49 | | Froxcey quits [Remote host closed the connection] |
22:22:47 | | Froxcey (Froxcey) joins |
22:23:29 | | Froxcey_ joins |
22:23:29 | | Froxcey quits [Read error: Connection reset by peer] |
22:31:25 | | Chris50100 (Chris5010) joins |
22:33:40 | | Chris5010 quits [Ping timeout: 260 seconds] |
22:33:40 | | Chris50100 is now known as Chris5010 |
22:38:26 | | Chris50102 (Chris5010) joins |
22:40:40 | | Chris5010 quits [Ping timeout: 260 seconds] |
22:40:40 | | Chris50102 is now known as Chris5010 |
22:43:05 | <immibis> | steering: perhaps a delayed error report from a previous write |
22:47:20 | <steering> | hmm, is that a thing? guess that kinda makes sense |
22:47:49 | <steering> | like the write call succeeded but then I got back some ICMP error packet, so it's indicated on read? |
22:48:04 | <nicolas17> | when would it give you the error otherwise? |
22:48:21 | <steering> | *shrug* that's why I guess it kinda makes sense |
22:48:50 | <nicolas17> | send() would have to block for a minute to wait for a potential error otherwise ^^ |
22:52:31 | | tech234a (tech234a) joins |
22:59:39 | | Froxcey_ quits [Remote host closed the connection] |
23:05:24 | | etnguyen03 quits [Quit: Konversation terminated!] |
23:19:20 | | useretail joins |
23:36:13 | | etnguyen03 (etnguyen03) joins |
23:49:01 | | Bleo182600722719623 quits [Quit: Ping timeout (120 seconds)] |
23:49:19 | | Bleo182600722719623 joins |