00:01:59 | | etnguyen03 quits [Client Quit] |
00:05:43 | <TheTechRobo> | <last name>.ca is unfortunately squatted for me :-( |
00:05:44 | <TheTechRobo> | There's a Canadian company with the .com which I'm guessing is why. |
00:12:16 | <steering> | <lastname>.net is squatted for $4800 (by the same people who are squatting the other domain I mentioned, hugedomains)... <lastname>.com is hover... <lastname>.us appears to actually be owned by someone with my last name |
00:16:42 | <steering> | .org points to a landing page although it has MX to microsoft so probably in use by someone with my last name as well |
00:20:23 | | IDK quits [Quit: Connection closed for inactivity] |
00:21:37 | <steering> | I bought <first><last>.net through geocities (or at least, yahoo) for like 10 years when I was like 10 years old by the way. They had a thing where you could bill through your telco/DSL provider. |
00:33:23 | | nine joins |
00:33:23 | | nine is now authenticated as nine |
00:33:23 | | nine quits [Changing host] |
00:33:23 | | nine (nine) joins |
01:09:02 | <mystique_altrosky> | meanwhile i use and own ruben.ge |
01:09:04 | <mystique_altrosky> | living the dream |
01:10:28 | | etnguyen03 (etnguyen03) joins |
01:41:04 | | etnguyen03 quits [Client Quit] |
01:45:31 | | etnguyen03 (etnguyen03) joins |
01:49:52 | | Umbire quits [Remote host closed the connection] |
01:50:27 | | Umbire (Umbire) joins |
02:13:27 | | steering has to look up .ge |
02:13:53 | <steering> | have never seen a Georgia domain before i guess |
02:14:21 | | corentin quits [Ping timeout: 276 seconds] |
02:15:27 | | corentin joins |
02:22:25 | | etnguyen03 quits [Client Quit] |
02:26:02 | | HP_Archivist (HP_Archivist) joins |
02:29:03 | | etnguyen03 (etnguyen03) joins |
02:44:32 | | lemuria quits [Read error: Connection reset by peer] |
02:44:54 | | lemuria (lemuria) joins |
02:49:26 | | Umbire quits [Ping timeout: 276 seconds] |
02:50:44 | | Umbire (Umbire) joins |
02:51:43 | | Umbire quits [Remote host closed the connection] |
02:51:43 | | etnguyen03 quits [Remote host closed the connection] |
02:52:11 | | Umbire (Umbire) joins |
02:55:26 | <mystique_altrosky> | steering: its quite rare and its also pricey if not bought locally :D |
04:29:26 | | nine quits [Quit: See ya!] |
04:29:39 | | nine joins |
04:29:39 | | nine is now authenticated as nine |
04:29:39 | | nine quits [Changing host] |
04:29:39 | | nine (nine) joins |
04:32:47 | | Umbire quits [Ping timeout: 276 seconds] |
04:41:34 | | beardicus quits [Ping timeout: 260 seconds] |
04:54:50 | | flotwig_ joins |
04:56:11 | | flotwig quits [Ping timeout: 276 seconds] |
04:56:12 | | flotwig_ is now known as flotwig |
04:58:04 | | sec^nd quits [Remote host closed the connection] |
04:58:21 | | sec^nd (second) joins |
04:58:26 | | Umbire (Umbire) joins |
04:58:27 | | Umbire quits [Remote host closed the connection] |
04:59:16 | | Umbire (Umbire) joins |
05:42:30 | <BlankEclair> | well that's new: https://files.catbox.moe/h23dn9.png |
05:59:45 | | Hackerpcs quits [Quit: Hackerpcs] |
06:06:08 | | beardicus (beardicus) joins |
06:06:17 | | Hackerpcs (Hackerpcs) joins |
06:15:20 | | nine quits [Client Quit] |
06:15:32 | | nine joins |
06:15:34 | | nine is now authenticated as nine |
06:15:34 | | nine quits [Changing host] |
06:15:34 | | nine (nine) joins |
06:19:02 | | beardicus quits [Read error: Connection reset by peer] |
06:19:20 | | beardicus (beardicus) joins |
07:38:24 | <cruller> | While researching Xfree, I found a blog that lists host names and IP addresses of major Japanese web hosting services. https://host.hateblo.jp/ |
07:43:17 | <@arkiver> | cruller: nice! |
07:43:30 | <BlankEclair> | there's a hatenablog theme that looks like vector |
07:43:34 | <BlankEclair> | that threw me for a loop lol |
07:45:25 | | Guest58 joins |
07:46:29 | | beardicus quits [Ping timeout: 260 seconds] |
07:46:53 | | Guest58 quits [Client Quit] |
07:49:09 | | beardicus (beardicus) joins |
08:07:29 | | Umbire quits [Ping timeout: 260 seconds] |
08:18:29 | | Guest58 joins |
08:31:26 | | IDK (IDK) joins |
08:50:39 | | Guest58 quits [Ping timeout: 260 seconds] |
09:01:34 | | Dada joins |
09:02:10 | | Guest58 joins |
09:43:46 | | Umbire (Umbire) joins |
09:53:35 | | nepeat quits [Quit: ZNC - https://znc.in] |
09:57:16 | | nepeat (nepeat) joins |
09:59:35 | | Guest58 quits [Client Quit] |
10:00:22 | | Guest58 joins |
10:01:56 | | UwU_93bydbco451y joins |
10:08:50 | | Umbire quits [Ping timeout: 276 seconds] |
10:30:37 | | Guest58 quits [Client Quit] |
10:31:53 | | Guest58 joins |
10:36:49 | | Guest58 quits [Ping timeout: 260 seconds] |
11:00:03 | | Bleo182600722719623455222 quits [Quit: The Lounge - https://thelounge.chat] |
11:02:51 | | Bleo182600722719623455222 joins |
11:03:57 | | nine quits [Quit: See ya!] |
11:04:10 | | nine joins |
11:04:10 | | nine is now authenticated as nine |
11:04:10 | | nine quits [Changing host] |
11:04:10 | | nine (nine) joins |
11:09:29 | | LddPotato quits [Ping timeout: 260 seconds] |
11:16:21 | | HackMii_ quits [Remote host closed the connection] |
11:16:39 | | HackMii (hacktheplanet) joins |
11:19:09 | <@JAA> | BlankEclair: That looks like the infinite WIP trap to me. |
11:19:39 | <BlankEclair> | irritating |
11:22:45 | | Guest58 joins |
11:32:56 | | LddPotato (LddPotato) joins |
11:48:51 | | riteo (riteo) joins |
12:19:06 | | Snivy quits [Read error: Connection reset by peer] |
12:31:47 | | Snivy (Snivy) joins |
12:54:12 | | rohvani quits [Read error: Connection reset by peer] |
13:01:13 | | @arkiver quits [Remote host closed the connection] |
13:02:03 | | arkiver (arkiver) joins |
13:02:03 | | @ChanServ sets mode: +o arkiver |
13:09:22 | | lemuria quits [Read error: Connection reset by peer] |
13:10:22 | | lemuria (lemuria) joins |
13:13:23 | | @arkiver quits [Remote host closed the connection] |
13:13:40 | | arkiver (arkiver) joins |
13:13:40 | | @ChanServ sets mode: +o arkiver |
13:29:09 | | @arkiver quits [Remote host closed the connection] |
13:30:38 | | arkiver (arkiver) joins |
13:30:38 | | @ChanServ sets mode: +o arkiver |
13:41:19 | | @arkiver quits [Remote host closed the connection] |
13:42:37 | | arkiver (arkiver) joins |
13:42:37 | | @ChanServ sets mode: +o arkiver |
13:49:00 | | @arkiver quits [Remote host closed the connection] |
13:50:05 | | arkiver (arkiver) joins |
13:50:05 | | @ChanServ sets mode: +o arkiver |
13:54:34 | | APOLLO03 quits [Ping timeout: 260 seconds] |
13:55:09 | | APOLLO03 joins |
13:58:10 | | @arkiver quits [Remote host closed the connection] |
13:58:25 | | arkiver (arkiver) joins |
13:58:25 | | @ChanServ sets mode: +o arkiver |
14:03:35 | | that_lurker quits [Remote host closed the connection] |
14:03:39 | | that_lurker (that_lurker) joins |
14:24:54 | | that_lurker quits [Ping timeout: 260 seconds] |
14:25:03 | | that_lurker (that_lurker) joins |
14:33:03 | | UwU_93bydbco451y quits [Quit: Dats about it, see ya.] |
14:46:33 | | ThetaDev quits [Read error: Connection reset by peer] |
14:46:55 | | ThetaDev joins |
15:04:37 | | Snivy quits [Client Quit] |
15:19:48 | | Snivy (Snivy) joins |
15:45:13 | | flotwig_ joins |
15:46:11 | | flotwig quits [Ping timeout: 276 seconds] |
15:46:12 | | flotwig_ is now known as flotwig |
16:03:49 | | UwU_93bydbco451y joins |
16:38:26 | | grill (grill) joins |
16:41:08 | | sludge joins |
16:41:36 | | sludge is now authenticated as sludge |
16:47:49 | | ducky quits [Ping timeout: 260 seconds] |
16:53:27 | | ducky (ducky) joins |
16:54:41 | <steering> | https://research.checkpoint.com/2025/stealth-falcon-zero-day/ lol windows / lol pwd in path |
17:05:05 | | PredatorIWD25 quits [Read error: Connection reset by peer] |
17:06:19 | <nicolas17> | >genAI banner image |
17:07:30 | <masterx244|m> | genAI-- |
17:07:30 | <eggdrop> | [karma] 'genAI' now has -1 karma! |
17:10:24 | | PredatorIWD25 joins |
17:11:24 | <steering> | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053 i wonder if MS has even done anything to fix it, none of the linked KBs appear to mention it :D |
17:13:15 | <steering> | hmm I guess they just dont mention security on the KB pages beyond "This update addresses security issues for your Windows operating system" lol |
17:13:57 | | Umbire (Umbire) joins |
17:18:58 | <Hans5958> | https://www.404media.co/the-open-source-software-saving-the-internet-from-ai-bot-scrapers/ |
17:18:59 | <Hans5958> | Anubis-- |
17:18:59 | <eggdrop> | [karma] 'Anubis' now has -3 karma! |
17:21:50 | | pixel leaves [Error from remote client] |
17:26:56 | | flotwig quits [Ping timeout: 276 seconds] |
17:30:48 | | nicolas17 is now authenticated as nicolas17 |
17:32:58 | | flotwig joins |
17:50:23 | | UwU_93bydbco451y quits [Read error: Connection reset by peer] |
17:50:29 | | UwU_93bydbco451y joins |
17:56:28 | | arch_ (arch) joins |
17:56:47 | | arch quits [Remote host closed the connection] |
17:56:47 | | arch_ is now known as arch |
18:07:15 | | driib9 quits [Quit: The Lounge - https://thelounge.chat] |
18:09:50 | | driib9 (driib) joins |
18:15:41 | | grill quits [Ping timeout: 276 seconds] |
18:28:16 | | arch_ (arch) joins |
18:28:22 | | arch quits [Remote host closed the connection] |
18:28:27 | | arch_ is now known as arch |
18:30:20 | | Umbire quits [Read error: Connection reset by peer] |
18:30:54 | | Umbire (Umbire) joins |
18:35:30 | | UwU_93bydbco451y quits [Remote host closed the connection] |
18:40:28 | | BornOn420 quits [Remote host closed the connection] |
18:41:05 | | BornOn420 (BornOn420) joins |
18:55:49 | | Lord_Nightmare quits [Quit: ZNC - http://znc.in] |
18:58:26 | | Lord_Nightmare (Lord_Nightmare) joins |
19:03:08 | | APOLLO03 quits [Ping timeout: 276 seconds] |
19:04:55 | | Lord_Nightmare quits [Client Quit] |
19:08:21 | | xatixatix3 joins |
19:08:24 | | Lord_Nightmare (Lord_Nightmare) joins |
19:09:24 | | Larsenv quits [Quit: The Lounge - https://thelounge.chat] |
19:09:58 | | Larsenv (Larsenv) joins |
19:11:18 | | Larsenv quits [Client Quit] |
19:12:22 | | Larsenv (Larsenv) joins |
19:13:05 | | Larsenv quits [Client Quit] |
19:13:53 | | Larsenv (Larsenv) joins |
19:15:04 | | Larsenv quits [Client Quit] |
19:15:31 | | Larsenv (Larsenv) joins |
19:16:49 | | xatixatix3 quits [Client Quit] |
19:46:31 | | FiTheArchiver joins |
20:02:11 | | Bob5 joins |
20:03:41 | | Bob joins |
20:03:47 | | Bob5 leaves |
20:04:14 | <Bob> | ᓚᘏᗢ |
20:04:41 | <nyakase> | meooow :3 |
20:30:00 | | Bob leaves |
20:49:24 | | Umbire is now authenticated as * |
20:49:24 | | Umbire quits [Killed (palermo.hackint.org (Nickname regained by services))] |
20:49:31 | | Umbire (Umbire) joins |
21:01:39 | | APOLLO03 joins |
21:37:34 | | etnguyen03 (etnguyen03) joins |
21:56:50 | <that_lurker> | "You Should Run a Certificate Transparency Log" https://words.filippo.io/run-sunlight/ https://news.ycombinator.com/item?id=44494430 |
21:57:08 | <that_lurker> | anyone know if the CT logs are stored in IA? |
22:01:42 | <nicolas17> | aren't the new short-lifetime certificates making CT logs explode in size even more? |
22:02:21 | <that_lurker> | just wait for the per session certificates |
22:08:22 | <lemuria> | what is it with all of these indonesian gambling websites hosted on old expired domains... sigh |
22:13:17 | <steering> | ok how is there not a wiki page for CT logs |
22:14:32 | <steering> | that_lurker: indirectly, at least https://archive.org/details/CT-20250309022410-ia03 |
22:14:53 | <steering> | :P |
22:18:43 | <that_lurker> | :-P |
22:20:21 | | LddPotato_ joins |
22:23:14 | | LddPotato quits [Ping timeout: 260 seconds] |
22:23:14 | | LddPotato_ is now known as LddPotato |
22:44:01 | <BlankEclair> | > [08/07/2025 08:08] <lemuria> what is it with all of these indonesian gambling websites hosted on old expired domains... sigh |
22:44:03 | <BlankEclair> | free backlinks from wikipedia :D |
22:57:52 | | FiTheArchiver quits [Read error: Connection reset by peer] |
23:04:25 | | lemuria quits [Read error: Connection reset by peer] |
23:05:21 | <steering> | how is CT logging even enforced? IOW: what stops you from colluding with (or forcing) two CT operators to sign your cert but not publish it? |
23:05:23 | | lemuria (lemuria) joins |
23:07:54 | | Dada quits [Remote host closed the connection] |
23:08:22 | <nicolas17> | TLS clients can ask CT log servers to prove a cert is included in the logs |
23:09:23 | <steering> | sure and they could also use OCSP but well... :P |
23:10:50 | <steering> | yes if someone In The Know were to come across it and be curious, or some scanner came across it, it would be caught that way. but presume it only responds to some obscure SNI with that certificate or something. |
23:11:27 | <steering> | seems perfectly feasible to me for a govt to attack someone in such a way |
23:12:55 | <BlankEclair> | hmm, the whole problem kinda reminds me of the whole pki infrastructure |
23:13:07 | <BlankEclair> | can you argue that CT is kinda like having your cert double- or triple-signed? |
23:13:18 | <steering> | say some country that sounds like Ishmael orders two CT logs based in or operated by them to sign this thing and not say anything... and intercepts some website used by a country named like the title of a A Flock Of Seagulls hit |
23:14:20 | <steering> | the whole point of the thing is to stop countries (ok or other attackers or collaborators) from doing such a thing, IMO |
23:15:47 | <steering> | any actor who's *not* capable of standing up a few CT logs under figureheads, probably isn't capable of getting a CA to give them an invalid cert anyway |
23:16:10 | <that_lurker> | That would still not be enough if browsers only trust the specific ones |
23:16:51 | <steering> | sure, but the link seems to imply that they aren't that picky |
23:17:06 | <steering> | to some extent they could require more and more SCTs but that increases size ofc |
23:18:59 | <steering> | given that the attacker gets to pick which ones to use, they only need 2 it seems (they just have to make it <180d) |
23:19:00 | <that_lurker> | yeah. There is also the Gossip protocol https://datatracker.ietf.org/doc/html/draft-ietf-trans-gossip-05 |
23:20:14 | <that_lurker> | but still there is no cryptographic mechanism that guarantees logs will not collude so everything is possible. |
23:20:18 | <steering> | not that I think the browsers would accept someone who openly said "I work for the CIA and I'd like to run a CT log please", but how are they gonna find out that all that money to connect your house with 100gb internet is coming from the CIA |
23:24:48 | | etnguyen03 quits [Client Quit] |
23:24:49 | <that_lurker> | would be interesting to see if China is doing something like that already as they could just block the certificate from appearing in the wider web |
23:25:08 | | etnguyen03 (etnguyen03) joins |
23:26:00 | <steering> | as much as I hate to say it, to some extent the best defense against that is making it an oligopoly IMO |
23:27:03 | <steering> | f.e. we can be pretty sure that Google and TrustAsia probably aren't gonna be vulnerable to such collusion |
23:27:39 | <steering> | (*ignores how many of them are based in the US or otherwise subject to US influence*) |
23:28:53 | <steering> | the internet is a pretty bad place to be xD |
23:28:53 | <that_lurker> | it already kinda is. The current ones that run CTL's are Google, Cloudflare, DigiCert, Let’s Encrypt, Sectigo, Comcast, TrustAsia, Google Trust Services, Apple, StartCom and Venafi |
23:29:09 | <steering> | yeah, I know |
23:30:15 | <that_lurker> | imo adding others to these should only be to validate the big ones and add transparency to them. |
23:30:34 | <steering> | yeah. |
23:34:54 | | etnguyen03 quits [Client Quit] |
23:59:02 | | etnguyen03 (etnguyen03) joins |