00:01:59etnguyen03 quits [Client Quit]
00:05:43<TheTechRobo><last name>.ca is unfortunately squatted for me :-(
00:05:44<TheTechRobo>There's a Canadian company with the .com which I'm guessing is why.
00:12:16<steering><lastname>.net is squatted for $4800 (by the same people who are squatting the other domain I mentioned, hugedomains)... <lastname>.com is hover... <lastname>.us appears to actually be owned by someone with my last name
00:16:42<steering>.org points to a landing page although it has MX to microsoft so probably in use by someone with my last name as well
00:20:23IDK quits [Quit: Connection closed for inactivity]
00:21:37<steering>I bought <first><last>.net through geocities (or at least, yahoo) for like 10 years when I was like 10 years old by the way. They had a thing where you could bill through your telco/DSL provider.
00:33:23nine joins
00:33:23nine quits [Changing host]
00:33:23nine (nine) joins
01:09:02<mystique_altrosky>meanwhile i use and own ruben.ge
01:09:04<mystique_altrosky>living the dream
01:10:28etnguyen03 (etnguyen03) joins
01:41:04etnguyen03 quits [Client Quit]
01:45:31etnguyen03 (etnguyen03) joins
01:49:52Umbire quits [Remote host closed the connection]
01:50:27Umbire (Umbire) joins
02:13:27steering has to look up .ge
02:13:53<steering>have never seen a Georgia domain before i guess
02:14:21corentin quits [Ping timeout: 276 seconds]
02:15:27corentin joins
02:22:25etnguyen03 quits [Client Quit]
02:26:02HP_Archivist (HP_Archivist) joins
02:29:03etnguyen03 (etnguyen03) joins
02:44:32lemuria quits [Read error: Connection reset by peer]
02:44:54lemuria (lemuria) joins
02:49:26Umbire quits [Ping timeout: 276 seconds]
02:50:44Umbire (Umbire) joins
02:51:43Umbire quits [Remote host closed the connection]
02:51:43etnguyen03 quits [Remote host closed the connection]
02:52:11Umbire (Umbire) joins
02:55:26<mystique_altrosky>steering: its quite rare and its also pricey if not bought locally :D
04:29:26nine quits [Quit: See ya!]
04:29:39nine joins
04:29:39nine quits [Changing host]
04:29:39nine (nine) joins
04:32:47Umbire quits [Ping timeout: 276 seconds]
04:41:34beardicus quits [Ping timeout: 260 seconds]
04:54:50flotwig_ joins
04:56:11flotwig quits [Ping timeout: 276 seconds]
04:56:12flotwig_ is now known as flotwig
04:58:04sec^nd quits [Remote host closed the connection]
04:58:21sec^nd (second) joins
04:58:26Umbire (Umbire) joins
04:58:27Umbire quits [Remote host closed the connection]
04:59:16Umbire (Umbire) joins
05:42:30<BlankEclair>well that's new: https://files.catbox.moe/h23dn9.png
05:59:45Hackerpcs quits [Quit: Hackerpcs]
06:06:08beardicus (beardicus) joins
06:06:17Hackerpcs (Hackerpcs) joins
06:15:20nine quits [Client Quit]
06:15:32nine joins
06:15:34nine quits [Changing host]
06:15:34nine (nine) joins
06:19:02beardicus quits [Read error: Connection reset by peer]
06:19:20beardicus (beardicus) joins
07:38:24<cruller>While researching Xfree, I found a blog that lists host names and IP addresses of major Japanese web hosting services. https://host.hateblo.jp/
07:43:17<@arkiver>cruller: nice!
07:43:30<BlankEclair>there's a hatenablog theme that looks like vector
07:43:34<BlankEclair>that threw me for a loop lol
07:45:25Guest58 joins
07:46:29beardicus quits [Ping timeout: 260 seconds]
07:46:53Guest58 quits [Client Quit]
07:49:09beardicus (beardicus) joins
08:07:29Umbire quits [Ping timeout: 260 seconds]
08:18:29Guest58 joins
08:31:26IDK (IDK) joins
08:50:39Guest58 quits [Ping timeout: 260 seconds]
09:01:34Dada joins
09:02:10Guest58 joins
09:43:46Umbire (Umbire) joins
09:53:35nepeat quits [Quit: ZNC - https://znc.in]
09:57:16nepeat (nepeat) joins
09:59:35Guest58 quits [Client Quit]
10:00:22Guest58 joins
10:01:56UwU_93bydbco451y joins
10:08:50Umbire quits [Ping timeout: 276 seconds]
10:30:37Guest58 quits [Client Quit]
10:31:53Guest58 joins
10:36:49Guest58 quits [Ping timeout: 260 seconds]
11:00:03Bleo182600722719623455222 quits [Quit: The Lounge - https://thelounge.chat]
11:02:51Bleo182600722719623455222 joins
11:03:57nine quits [Quit: See ya!]
11:04:10nine joins
11:04:10nine quits [Changing host]
11:04:10nine (nine) joins
11:09:29LddPotato quits [Ping timeout: 260 seconds]
11:16:21HackMii_ quits [Remote host closed the connection]
11:16:39HackMii (hacktheplanet) joins
11:19:09<@JAA>BlankEclair: That looks like the infinite WIP trap to me.
11:19:39<BlankEclair>irritating
11:22:45Guest58 joins
11:32:56LddPotato (LddPotato) joins
11:48:51riteo (riteo) joins
12:19:06Snivy quits [Read error: Connection reset by peer]
12:31:47Snivy (Snivy) joins
12:54:12rohvani quits [Read error: Connection reset by peer]
13:01:13@arkiver quits [Remote host closed the connection]
13:02:03arkiver (arkiver) joins
13:02:03@ChanServ sets mode: +o arkiver
13:09:22lemuria quits [Read error: Connection reset by peer]
13:10:22lemuria (lemuria) joins
13:13:23@arkiver quits [Remote host closed the connection]
13:13:40arkiver (arkiver) joins
13:13:40@ChanServ sets mode: +o arkiver
13:29:09@arkiver quits [Remote host closed the connection]
13:30:38arkiver (arkiver) joins
13:30:38@ChanServ sets mode: +o arkiver
13:41:19@arkiver quits [Remote host closed the connection]
13:42:37arkiver (arkiver) joins
13:42:37@ChanServ sets mode: +o arkiver
13:49:00@arkiver quits [Remote host closed the connection]
13:50:05arkiver (arkiver) joins
13:50:05@ChanServ sets mode: +o arkiver
13:54:34APOLLO03 quits [Ping timeout: 260 seconds]
13:55:09APOLLO03 joins
13:58:10@arkiver quits [Remote host closed the connection]
13:58:25arkiver (arkiver) joins
13:58:25@ChanServ sets mode: +o arkiver
14:03:35that_lurker quits [Remote host closed the connection]
14:03:39that_lurker (that_lurker) joins
14:24:54that_lurker quits [Ping timeout: 260 seconds]
14:25:03that_lurker (that_lurker) joins
14:33:03UwU_93bydbco451y quits [Quit: Dats about it, see ya.]
14:46:33ThetaDev quits [Read error: Connection reset by peer]
14:46:55ThetaDev joins
15:04:37Snivy quits [Client Quit]
15:19:48Snivy (Snivy) joins
15:45:13flotwig_ joins
15:46:11flotwig quits [Ping timeout: 276 seconds]
15:46:12flotwig_ is now known as flotwig
16:03:49UwU_93bydbco451y joins
16:38:26grill (grill) joins
16:41:08sludge joins
16:47:49ducky quits [Ping timeout: 260 seconds]
16:53:27ducky (ducky) joins
16:54:41<steering>https://research.checkpoint.com/2025/stealth-falcon-zero-day/ lol windows / lol pwd in path
17:05:05PredatorIWD25 quits [Read error: Connection reset by peer]
17:06:19<nicolas17>>genAI banner image
17:07:30<masterx244|m>genAI--
17:07:30<eggdrop>[karma] 'genAI' now has -1 karma!
17:10:24PredatorIWD25 joins
17:11:24<steering>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053 i wonder if MS has even done anything to fix it, none of the linked KBs appear to mention it :D
17:13:15<steering>hmm I guess they just dont mention security on the KB pages beyond "This update addresses security issues for your Windows operating system" lol
17:13:57Umbire (Umbire) joins
17:18:58<Hans5958>https://www.404media.co/the-open-source-software-saving-the-internet-from-ai-bot-scrapers/
17:18:59<Hans5958>Anubis--
17:18:59<eggdrop>[karma] 'Anubis' now has -3 karma!
17:21:50pixel leaves [Error from remote client]
17:26:56flotwig quits [Ping timeout: 276 seconds]
17:32:58flotwig joins
17:50:23UwU_93bydbco451y quits [Read error: Connection reset by peer]
17:50:29UwU_93bydbco451y joins
17:56:28arch_ (arch) joins
17:56:47arch quits [Remote host closed the connection]
17:56:47arch_ is now known as arch
18:07:15driib9 quits [Quit: The Lounge - https://thelounge.chat]
18:09:50driib9 (driib) joins
18:15:41grill quits [Ping timeout: 276 seconds]
18:28:16arch_ (arch) joins
18:28:22arch quits [Remote host closed the connection]
18:28:27arch_ is now known as arch
18:30:20Umbire quits [Read error: Connection reset by peer]
18:30:54Umbire (Umbire) joins
18:35:30UwU_93bydbco451y quits [Remote host closed the connection]
18:40:28BornOn420 quits [Remote host closed the connection]
18:41:05BornOn420 (BornOn420) joins
18:55:49Lord_Nightmare quits [Quit: ZNC - http://znc.in]
18:58:26Lord_Nightmare (Lord_Nightmare) joins
19:03:08APOLLO03 quits [Ping timeout: 276 seconds]
19:04:55Lord_Nightmare quits [Client Quit]
19:08:21xatixatix3 joins
19:08:24Lord_Nightmare (Lord_Nightmare) joins
19:09:24Larsenv quits [Quit: The Lounge - https://thelounge.chat]
19:09:58Larsenv (Larsenv) joins
19:11:18Larsenv quits [Client Quit]
19:12:22Larsenv (Larsenv) joins
19:13:05Larsenv quits [Client Quit]
19:13:53Larsenv (Larsenv) joins
19:15:04Larsenv quits [Client Quit]
19:15:31Larsenv (Larsenv) joins
19:16:49xatixatix3 quits [Client Quit]
19:46:31FiTheArchiver joins
20:02:11Bob5 joins
20:03:41Bob joins
20:03:47Bob5 leaves
20:04:14<Bob>ᓚᘏᗢ
20:04:41<nyakase>meooow :3
20:30:00Bob leaves
20:49:24Umbire quits [Killed (palermo.hackint.org (Nickname regained by services))]
20:49:31Umbire (Umbire) joins
21:01:39APOLLO03 joins
21:37:34etnguyen03 (etnguyen03) joins
21:56:50<that_lurker>"You Should Run a Certificate Transparency Log" https://words.filippo.io/run-sunlight/ https://news.ycombinator.com/item?id=44494430
21:57:08<that_lurker>anyone know if the CT logs are stored in IA?
22:01:42<nicolas17>aren't the new short-lifetime certificates making CT logs explode in size even more?
22:02:21<that_lurker>just wait for the per session certificates
22:08:22<lemuria>what is it with all of these indonesian gambling websites hosted on old expired domains... sigh
22:13:17<steering>ok how is there not a wiki page for CT logs
22:14:32<steering>that_lurker: indirectly, at least https://archive.org/details/CT-20250309022410-ia03
22:14:53<steering>:P
22:18:43<that_lurker>:-P
22:20:21LddPotato_ joins
22:23:14LddPotato quits [Ping timeout: 260 seconds]
22:23:14LddPotato_ is now known as LddPotato
22:44:01<BlankEclair>> [08/07/2025 08:08] <lemuria> what is it with all of these indonesian gambling websites hosted on old expired domains... sigh
22:44:03<BlankEclair>free backlinks from wikipedia :D
22:57:52FiTheArchiver quits [Read error: Connection reset by peer]
23:04:25lemuria quits [Read error: Connection reset by peer]
23:05:21<steering>how is CT logging even enforced? IOW: what stops you from colluding with (or forcing) two CT operators to sign your cert but not publish it?
23:05:23lemuria (lemuria) joins
23:07:54Dada quits [Remote host closed the connection]
23:08:22<nicolas17>TLS clients can ask CT log servers to prove a cert is included in the logs
23:09:23<steering>sure and they could also use OCSP but well... :P
23:10:50<steering>yes if someone In The Know were to come across it and be curious, or some scanner came across it, it would be caught that way. but presume it only responds to some obscure SNI with that certificate or something.
23:11:27<steering>seems perfectly feasible to me for a govt to attack someone in such a way
23:12:55<BlankEclair>hmm, the whole problem kinda reminds me of the whole pki infrastructure
23:13:07<BlankEclair>can you argue that CT is kinda like having your cert double- or triple-signed?
23:13:18<steering>say some country that sounds like Ishmael orders two CT logs based in or operated by them to sign this thing and not say anything... and intercepts some website used by a country named like the title of a A Flock Of Seagulls hit
23:14:20<steering>the whole point of the thing is to stop countries (ok or other attackers or collaborators) from doing such a thing, IMO
23:15:47<steering>any actor who's *not* capable of standing up a few CT logs under figureheads, probably isn't capable of getting a CA to give them an invalid cert anyway
23:16:10<that_lurker>That would still not be enough if browsers only trust the specific ones
23:16:51<steering>sure, but the link seems to imply that they aren't that picky
23:17:06<steering>to some extent they could require more and more SCTs but that increases size ofc
23:18:59<steering>given that the attacker gets to pick which ones to use, they only need 2 it seems (they just have to make it <180d)
23:19:00<that_lurker>yeah. There is also the Gossip protocol https://datatracker.ietf.org/doc/html/draft-ietf-trans-gossip-05
23:20:14<that_lurker>but still there is no cryptographic mechanism that guarantees logs will not collude so everything is possible.
23:20:18<steering>not that I think the browsers would accept someone who openly said "I work for the CIA and I'd like to run a CT log please", but how are they gonna find out that all that money to connect your house with 100gb internet is coming from the CIA
23:24:48etnguyen03 quits [Client Quit]
23:24:49<that_lurker>would be interesting to see if China is doing something like that already as they could just block the certificate from appearing in the wider web
23:25:08etnguyen03 (etnguyen03) joins
23:26:00<steering>as much as I hate to say it, to some extent the best defense against that is making it an oligopoly IMO
23:27:03<steering>f.e. we can be pretty sure that Google and TrustAsia probably aren't gonna be vulnerable to such collusion
23:27:39<steering>(*ignores how many of them are based in the US or otherwise subject to US influence*)
23:28:53<steering>the internet is a pretty bad place to be xD
23:28:53<that_lurker>it already kinda is. The current ones that run CTL's are Google, Cloudflare, DigiCert, Let’s Encrypt, Sectigo, Comcast, TrustAsia, Google Trust Services, Apple, StartCom and Venafi
23:29:09<steering>yeah, I know
23:30:15<that_lurker>imo adding others to these should only be to validate the big ones and add transparency to them.
23:30:34<steering>yeah.
23:34:54etnguyen03 quits [Client Quit]
23:59:02etnguyen03 (etnguyen03) joins