code logs -> 2013 -> Tue, 20 Aug 2013< code.20130819.log - code.20130821.log >
--- Log opened Tue Aug 20 00:00:15 2013
00:10 You're now known as TheWatcher[zZzZ]
00:24 ktemkin[awol] is now known as ktemkin[pcb]
00:25 VirusJTG_ [VirusJTG@BAD19E.09A45B.582A63.5AE998] has joined #code
00:28 VirusJTG [VirusJTG@Nightstar-09c31e7a.sta.comporium.net] has quit [Ping timeout: 121 seconds]
00:29 VirusJTG_ [VirusJTG@BAD19E.09A45B.582A63.5AE998] has quit [[NS] Quit: Program Shutting down]
00:29 VirusJTG [VirusJTG@Nightstar-09c31e7a.sta.comporium.net] has joined #code
00:32 Karono [Karono@9C034E.4BE65E.E00AF8.FDA077] has joined #code
00:32 Karono [Karono@9C034E.4BE65E.E00AF8.FDA077] has quit [Client closed the connection]
00:33 Karono [Karono@9C034E.4BE65E.E00AF8.FDA077] has joined #code
00:34 Derakon[AFK] is now known as Derakon
00:51 Karono_ [Karono@9C034E.4BE65E.E00AF8.FDA077] has joined #code
00:52 Karono [Karono@9C034E.4BE65E.E00AF8.FDA077] has quit [NickServ (GHOST command used by Karono_)]
00:52 Karono_ is now known as Karono
00:59 Karono [Karono@9C034E.4BE65E.E00AF8.FDA077] has quit [Ping timeout: 121 seconds]
01:06 RoboCop2 [RoboCop2@Nightstar-dfc93a04.asm.bellsouth.net] has joined #code
01:08
< RoboCop2>
so there i was surrounded by naked men and penguins...needless to say thats the last time i answered an ad on cragslist for a free couch
01:09
<@Tamber>
o.รด
01:10
< RoboCop2>
so i take it this has never happened to anyone else
01:10
<@Tamber>
Can't say it has, no.
01:10
< RoboCop2>
eh whatta shame
01:11 Karono [Karono@9C034E.4BE65E.E00AF8.FDA077] has joined #code
01:13 Karono [Karono@9C034E.4BE65E.E00AF8.FDA077] has quit [Connection reset by peer]
01:13 Karono [Karono@9C034E.4BE65E.E00AF8.FDA077] has joined #code
01:14 Karono [Karono@9C034E.4BE65E.E00AF8.FDA077] has quit [Connection reset by peer]
01:18 RoboCop2 [RoboCop2@Nightstar-dfc93a04.asm.bellsouth.net] has quit [[NS] Quit: Leaving]
01:32
< Azash>
That sounds like the local FSF chapter
01:39 ToxicFrog [ToxicFrog@ServerAdministrator.Nightstar.Net] has quit [Operation timed out]
01:47 Turaiel[Offline] is now known as Turaiel
01:49
< Azash>
Mikko Hypponen
01:49
< Azash>
COPY \windows\system32\cmd.exe \windows\system32\sethc.exe
01:49
< Azash>
Reboot, hit Shift key 5 times, SYSTEM shell will pop up.
01:52
<@gnolam>
?
01:53
< Azash>
gnolam: Replacing the sticky keys binary with cmd.exe
01:53
<@gnolam>
And?
01:53
< Azash>
Apparently sticky keys is run as SYSTEM
01:56
<@gnolam>
Users with admin access can change system behavior. Film at 11.
01:57
<&McMartin>
The admin/SYSTEM split on windows is a reliability feature, not a security feature.
01:57
< Azash>
Eh, I just thought it was interesting
01:57
< Azash>
Sorry
01:58
<&McMartin>
It is a cute trick
01:58
<&McMartin>
And a good demo for "why not to trust in this"
02:02 ToxicFrog [ToxicFrog@ServerAdministrator.Nightstar.Net] has joined #code
02:02 mode/#code [+ao ToxicFrog ToxicFrog] by ChanServ
02:02
<@Reiv>
That is indeed interesting.
02:04 RichyB [RichyB@D553D1.68E9F7.02BB7C.3AF784] has quit [[NS] Quit: Gone.]
02:07 RichyB [RichyB@D553D1.68E9F7.02BB7C.3AF784] has joined #code
02:50 * Derakon sighs at the Angband forums, wherein a player is basically saying "The dev team sucks. They should just not change anything." and everyone else is saying "Feel free to play an older version, or to actually get off your ass and code the changes you want."
02:52 Vorntastic [Vorn@Nightstar-ea446291.sub-70-211-12.myvzw.com] has joined #code
03:12 ktemkin[pcb] is now known as ktemkin[awol]
03:22 VirusJTG [VirusJTG@Nightstar-09c31e7a.sta.comporium.net] has quit [[NS] Quit: Program Shutting down]
04:18 Vornlicious [Vorn@Nightstar-221158c7.sd.cox.net] has joined #code
04:18 Vornlicious [Vorn@Nightstar-221158c7.sd.cox.net] has quit [[NS] Quit: Bye]
04:21 Vorntastic [Vorn@Nightstar-ea446291.sub-70-211-12.myvzw.com] has quit [Ping timeout: 121 seconds]
05:09 Derakon is now known as Derakon[AFK]
05:38 Kindamoody[zZz] is now known as Kindamoody
05:58 Turaiel is now known as Turaiel[Offline]
06:36 Kindamoody is now known as Kindamoody|out
06:48 celticminstrel [celticminst@Nightstar-ae361035.dsl.bell.ca] has quit [[NS] Quit: And lo! The computer falls into a deep sleep, to awake again some other day!]
07:00 You're now known as TheWatcher
07:35
< Syka>
heh
07:35
< Syka>
i have so many movies in my backlog that i might have to do a McMartin, but with them instead :p
07:47 ToxicFrog [ToxicFrog@ServerAdministrator.Nightstar.Net] has quit [Operation timed out]
07:54 Karono [Karono@Nightstar-13c26ed9.optusnet.com.au] has joined #code
07:58 ToxicFrog [ToxicFrog@ServerAdministrator.Nightstar.Net] has joined #code
07:58 mode/#code [+ao ToxicFrog ToxicFrog] by ChanServ
08:11
<&McMartin>
Speaking of which, just wrapped up another graphic adventure~
08:11
<&McMartin>
Now I have to speedrun it for the director's commentary tracks~
08:13
< Syka>
ive been playing blood dragon
08:13
< Syka>
fc3: blood dragon, that is
08:14
< Reiver>
you beat games way too fast, McMartin
08:15
< Syka>
also
08:15
< Syka>
i got an intel nuc
08:15
< Syka>
when i open the box, it makes the intel jingle
08:32 Vornicus [vorn@ServerAdministrator.Nightstar.Net] has quit [Operation timed out]
08:34 Vornicus [vorn@ServerAdministrator.Nightstar.Net] has joined #code
08:34 mode/#code [+qo Vornicus Vornicus] by ChanServ
08:56 Vornicus [vorn@ServerAdministrator.Nightstar.Net] has quit [Operation timed out]
08:58 Vornicus [vorn@ServerAdministrator.Nightstar.Net] has joined #code
08:58 mode/#code [+qo Vornicus Vornicus] by ChanServ
09:01 AverageJoe [evil1@Nightstar-4b668a07.ph.cox.net] has joined #code
10:00 Karono [Karono@Nightstar-13c26ed9.optusnet.com.au] has quit [Connection reset by peer]
10:01 Karono [Karono@Nightstar-13c26ed9.optusnet.com.au] has joined #code
10:04 You're now known as TheWatcher[d00m]
10:11 himi [fow035@Nightstar-5d05bada.internode.on.net] has quit [Ping timeout: 121 seconds]
10:42 AverageJoe [evil1@Nightstar-4b668a07.ph.cox.net] has quit [[NS] Quit: Leaving]
10:51
< AnnoDomini>
TheWatcher[d00m]: I'm running into a problem on the Deathcookie boards. When I try to post an [img], it complains about not being able to determine the dimensions. This happens for images from three different places, and I don't think all of them disallow external links.
10:54
< AnnoDomini>
Nevermind. I have solved this by removing limits on image sizes.
11:04
<&McMartin>
Reiver: these games are like 2-3 hours each
11:05 VirusJTG [VirusJTG@Nightstar-09c31e7a.sta.comporium.net] has joined #code
11:05
<&McMartin>
... also the developers have a Wizard of Oz Noir game on Steam
11:05
< RichyB>
Derakon[AFK], hehehe, everybody tell that player to "Go fork, yourself."
11:05
<&McMartin>
I'm not sure if Wizard of Oz Noir is the greatest or the most terrible thing ever
11:08
< RichyB>
It can't be the greatest; the greatest is Alice in Wonderland Noir.
11:08
<&McMartin>
Thus, by unassailable logic, it is the most terrible thing ever.
11:09
<&McMartin>
Also, it's the fourth game, and I've finally warmed up to the main character. -_-
11:11
< Syka>
http://www.groklaw.net/article.php?story=20130818120421175
11:11
< Syka>
groklaw is gone for good
11:16 * McMartin mutters a little at this
11:16
<&McMartin>
Not that I'd want to enhance the paranoia
11:16
<&McMartin>
But if you're *in* America, setting up servers outside of the US to conduct your business is setting yourself in the position where US surveilliance has had free reign for seventy years
11:16
<&McMartin>
Like, on purpose
11:16
<&McMartin>
That is *inviting* surveilliance
11:17
< RichyB>
Argh, people, the situation isn't *that* dire.
11:18
< RichyB>
"Secure email service" is indeed factually a thing that is not possible to run in the real world right now.
11:18
<&McMartin>
Also, if you are in the US, doing your email through Switzerland is making your problem worse
11:18
<&McMartin>
Like, that is, if you are an American, less secure than using Gmail
11:18
< RichyB>
"Email whose contents are unreadable by strangers" is not. Seriously, not even a little bit.
11:18
<&McMartin>
(If you are *German*, this is a wildly different story.)
11:19
< RichyB>
Things like lavabit are broken because they try to violate the end-to-end principle in communications, not because all notion of confidentiality is fundamentally impossible forever.
11:19
<&McMartin>
What, exactly, was Lavabit's value proposition?
11:20
<&McMartin>
I was honestly unclear on what they claimed to be doing that was an improvement over, or that did not require, encrypting the email before it ever touched their servers
11:20
< RichyB>
I haven't got a clue.
11:20
<&McMartin>
I have a theory over what they were ordered to do, as it happens,
11:20
<&McMartin>
but it's about 90% speculation
11:20
< RichyB>
There's all this hand-wringing over the idea that "secure email services are impossible because of spying" but for the love of Pete, "secure email service" is impossible because it's a broken idea.
11:21
<&McMartin>
We're past that, incidentally
11:21
<&McMartin>
We aren't at "secure email services are impossible because of spying."
11:21
<&McMartin>
The freakout is at "secure email services are impossible because of subpoenas."
11:21
< RichyB>
Hmmm.
11:21
< RichyB>
Meh.
11:22
<&McMartin>
I have nothing remotely polite to say about that
11:22
<&McMartin>
It takes incredible effort to not use the word "lolbertarian" while so doing
11:22
< RichyB>
They're vulnerable to subpoenas because and only because they try to violate the end-to-end principle.
11:22
<&McMartin>
Yeah
11:22
<&McMartin>
This is where my theory comes in
11:23
<&McMartin>
I think companies that store encrypted data that they don't have the keys to are getting very unfriendly visits from men in suits, unless they are also generic file storage places
11:23
< RichyB>
The extreme point here is that even end-to-end won't help when there's a law (in the UK there is right now) that says that a court may compel you to hand over encryption keys.
11:23
<&McMartin>
And maybe even then. Storing encrypted files in Dropbox is a violation of the TOS
11:23
<&McMartin>
Yep
11:24
<&McMartin>
And if that's because it's material that a court can compel you to turn over by the normal rules for that, that "shouldn't" be an issue
11:24
<&McMartin>
Try to use technology to do an endrun about what the law says is "discoverable" and lo and behold they suddenly remember they have the monopoly on the legitimate first use of physical force, funny that
11:24
<&McMartin>
Therefore, all Western democracies are fascism
11:24
< Syka>
yaaay
11:25
<&McMartin>
So, yeah
11:25
<&McMartin>
lolbertarians
11:25
<&McMartin>
I still want Lavabit's gag order rescinded, because I want to know what they were asked to do.
11:25
< Syka>
well, it's fairly obvious what they were asked to do
11:26
<&McMartin>
Well, no, not really; I can come up with various versions
11:26
< Syka>
there's not much else that lavabit could do other than "spy for us"
11:26
<&McMartin>
What does that mean in this context?
11:26
< Syka>
it doesn't matter; it's all fucking horrible
11:26
< Syka>
he said he's delivered on subpoenas before, and that's fine
11:27
< Syka>
but this wasn't a subpoena
11:27
< Syka>
it was a NSL
11:27
<&McMartin>
Yeah
11:27
< Syka>
which is basically "you are now an instrument of the NSA"
11:27
<&McMartin>
Right, so
11:27
<&McMartin>
I'm in the Valley
11:27
<&McMartin>
Some of the stuff alleged you couldn't keep quiet with death squads
11:28
< Syka>
but you probably could, with enough money :p
11:28
< Syka>
(plus death squads, naturally)
11:28
<&McMartin>
I honestly don't think you could. The "negative space" would be too damn big.
11:28
<&McMartin>
Tap the backbones? Sure, easy
11:28
<&McMartin>
But that doesn't help you with lavabit, presumably
11:28
< Syka>
McMartin: the general public doesn't know what the next /iphone/ will look like until a month beforehand
11:29
<&McMartin>
Yes.
11:29
<&McMartin>
That is a small secret
11:29
<&McMartin>
This is a conspiracy of every IT tech in Silicon Valley
11:29
<&McMartin>
They just aren't that organized ;-)
11:30
<&McMartin>
My guess is that the NSL was to reorganize their internals so that they could be subject to automated requests.
11:30
<&McMartin>
Because if the issue were subpoenas they wouldn't bother with NSLs, they'd just hold them openly in contempt of court
11:30
< Syka>
well
11:30
< Syka>
considering that encryption == foreign to the NSA
11:30
< Syka>
I think it's more wholesale "give us everything"
11:31
< Syka>
since theyre apparently holding encrypted emails for 5 years
11:31
<&McMartin>
If we believe the rest of the reports, they don't need Lavabit's cooperation for that
11:31
<&McMartin>
They can simply tap the ISPs leading in.
11:31
<&McMartin>
The one thing you can never hide is routing information
11:31
< Syka>
not if it's lavabit -> lavabit
11:32 Vornicus [vorn@ServerAdministrator.Nightstar.Net] has quit [Operation timed out]
11:32
< Xon>
McMartin, due to how the encrypted emails work lavabit needed to basicly compromise thier end-users with social attacks
11:33
<&McMartin>
Yes, this is where my "what exactly are they doing that is not just encryption on the endpoint"
11:33
<&McMartin>
question comes in
11:33
<&McMartin>
Because ultimately, the message has to go in, and it has to be read
11:33
<&McMartin>
Those involve data going to or from the LB servers
11:33
<&McMartin>
That is where SIGINT gets to dance to play
11:33
<&McMartin>
*dance and play
11:33 Vornicus [vorn@ServerAdministrator.Nightstar.Net] has joined #code
11:33 mode/#code [+qo Vornicus Vornicus] by ChanServ
11:34
< Xon>
the contents can still be encrypted even if the header information isn't
11:34
<&McMartin>
Sure
11:34
<&McMartin>
But lavabit *should not have those keys*
11:34
< Xon>
exactly
11:34
< Xon>
they didn't
11:34
<&McMartin>
I do not believe it is yet officially illegal in the US to set up a server in that way
11:34
< Xon>
at least as far as the service description used to before they closed shop
11:35
< Xon>
McMartin, changing an IP address to evad an ipban is now illegal accouring to US courts
11:35
<&McMartin>
(Though I strongly suspect that, like the UK, a court can compel the recipient to give up the keys if the court believes it has a right to the document)
11:36
<&McMartin>
Right, but if lavabit doesn't have the keys
11:36
<&McMartin>
The question of "what, exactly, is being asked for that would take an NSL to get" remains unanswered
11:36
< Syka>
okay so
11:36
<&McMartin>
Because the "obvious" answers are either things Lavabit is known to not have, or things that you can get with nonsecret means
11:36
< Syka>
what if lavabit compromised themselves
11:36
< Syka>
surely there are ways they can make it easier
11:37
<&McMartin>
I don't know enough about them to say =/
11:37
< Xon>
also, holy fuck am I going to have to get a new job. someone @ work is seriously arguing for a completely new set of public rest endpoint APIs so they can continue to throw away authentication tokens on the api's marked anoymous despite both sets /needing/ to return exactly the same set of data
11:37
< Syka>
the emails have to be unencrypted coming in and out
11:37
< Syka>
so unless theyre GPGing them, there you go
11:37
<&McMartin>
ACK
11:37
<&McMartin>
If they're unencrypted in/out, they're providing nothing >_<
11:38
< Syka>
...you know that literally nobody except for gmail has encrypted transport, right?
11:38
<&McMartin>
If they're just automating the GPG stuff on the client side, then you ought to be able to upload the entire server contents to dropbox without a problem
11:38
< Syka>
AOL, Microsoft and Yahoo ONLY ACCEPT unencrypted emails
11:38
< Reiver>
Why on earth would you leave it unenrypted in/out?
11:38
<&McMartin>
Right, so
11:38
<&McMartin>
If Lavabit is unencrypted in/out
11:38
< Syka>
they DO NOT have TLS entry points
11:39
<&McMartin>
Then their "secure" email service is a laughable nullity
11:39
< Syka>
mcmartin: but between lavabit IS
11:39 * AnnoDomini tries tuning outside. Same result.
11:39
< Syka>
which is the point
11:39
<&McMartin>
Er, right
11:39
<&McMartin>
We're assuming that Lavabit is a single server
11:39
< Syka>
and if anyone has TLS, lavabit would use it
11:40
< Syka>
eg. sending to gmail
11:40
<&McMartin>
And that all messages are stored in a form that is encrypted by keys lavabit does not know
11:40
< Reiver>
That's not unencrypted in/out quite as McM is envisioning methinks.
11:40
< Syka>
or servers set up by competent people
11:40
<&McMartin>
The thing is
11:40
<&McMartin>
In that case
11:40
< Syka>
which will have TLS transport
11:40
<&McMartin>
How can Lavabit "compromise itself"?
11:40
<&McMartin>
It could upload every bit of its servers to dropbox and nobody would get an email from it for a thousand years
11:41
< Syka>
mcmartin: well, they have to handle an unencrypted email to deliver it to someone else
11:41
< Syka>
unless the email itself is GPG encrtpted, in which case they handle an unencrypted email with GPG payload
11:41
<&McMartin>
That's true; but then, getting those emails shouldn't require NSLing Lavabit.
11:41
<&McMartin>
You've already intrinsically compromised the other endpoint in that case.
11:42
< Syka>
except NSLing lavabit can compel them to store those emails in unencrypted form
11:42
< Syka>
so that the service works as it does, but everything in and out is captured in the transport phase
11:42
<&McMartin>
How can they do that, when they don't have the GPG keys?
11:42
< Syka>
thats not the point
11:42
< Syka>
thats a mitigation
11:42
<&McMartin>
Hrm
11:42
< Syka>
and the email is still unencrypted
11:43
< Syka>
it just happens to contain a GPG payload
11:43
<&McMartin>
Oh, I get it
11:43
<&McMartin>
You're saying that Lavabit<->Gmail can't even have metadata captured without compromising a key along the way
11:43
<&McMartin>
Is that it?
11:43
< Syka>
well, to deliver an email to gmail
11:44
< Syka>
they need to have an unencrypted email
11:44
< Syka>
and then send it over a TLS transport, encrypting it to everyone elsw
11:44
<&McMartin>
Right
11:44
<&McMartin>
We assume that the NSA can't crack TLS in realtime, but that's OK, let's do that
11:44
< Syka>
BUT nothing is stopping lavabit simply making a copy at that point
11:44
< Syka>
no
11:44
< Syka>
nothing to do with the NSA
11:45
< Syka>
Lavabit THEMSELVES have the unencrypted copy
11:45
<&McMartin>
Oh, right
11:45
< Syka>
the NSL could compel them to store it
11:45
<&McMartin>
Because they need to tell gmail "hey, send this email to this person"
11:45
< Syka>
yep
11:45
<&McMartin>
Meanwhile, lava<->lava doesn't need that because they could treat it as a big dropbox
11:45
< Syka>
so there is your unencrypted email
11:46
<&McMartin>
Your inbox is "every blob in this store that your private key decrypts"
11:46
< Syka>
well, i'm assuming lavabit would have multiple servers using smtp
11:46
< Syka>
so theoretically they could make that vulnerable too
11:46
<&McMartin>
Yeah, I'm trying to build the hardest-to-crack case, which is laughably nonscalable but also never hits the wire except when a client is sending or receiving
11:46
< Syka>
since it needs to be unencrypted for lavabit to send it to itself
11:46
< RichyB>
I thought one of the points of lavabit was that they shipped an applet at your browser to run encryption code in and it was demanded that they trojan-horse that.
11:46
<&McMartin>
I'm not 100% sure that's true, but it probably is
11:47
<&McMartin>
RichyB: Nobody knows what was demanded
11:47
<&McMartin>
That would be a workable guess, though
11:47
<&McMartin>
Along with "you have to start storing information you currently do not"
11:47
<&McMartin>
However, the latter seems less NSLy
11:47
< Syka>
that could work too
11:47
< Syka>
i dont know how lavabit works
11:47
< Syka>
but i know how email works :p
11:48
< Syka>
but yes
11:48
< Syka>
it is certainly possible for lavabit to MITM everything external
11:48
< Xon>
Syka, tbh it sounds like lavabit needed to completely rebuild thier internal systems to allow MITM attacks
11:48
< Syka>
and theoreticallt possible for them to MITM internal
11:48
< Syka>
but it depends how it was built
11:48
<&McMartin>
Part of my skepticism here is also "this is America; we are really fucking open about demanding every scrap of everything fun from everyone, and ordinary Article III judges will sign right the fuck off on that stuff all the time"
11:49
<&McMartin>
The trojan horse theory is good because it seems like all these other things the USG had the option of saying "you cannot prove that you are keeping records that as an email provider you are legally required to keep; shape up or shut down"
11:50
<&McMartin>
And if they're trying to force in malware, that needs to come out and they need to knock that shit off
11:50
< Syka>
um
11:50
< Syka>
usg already makes malware
11:50
<&McMartin>
Well, of course~
11:50
<&McMartin>
But it's supposed to use it a targeted weapon~
11:50
<@froztbyte>
lol
11:50
< Syka>
youre using lavabit
11:50
<&McMartin>
(See: TOR, probably Stuxnet)
11:51
<@froztbyte>
McMartin: I was about to say stuxnet
11:51
< Syka>
encryption == you're foreign, according to the NSA
11:51
<@froztbyte>
anyway
11:51
< Syka>
you are already a target
11:51
< Syka>
:p
11:51
<@froztbyte>
fuck these people
11:51
<&McMartin>
TOR is an interesting case, actually
11:51
<@froztbyte>
they should choke on their own vomit
11:51
<&McMartin>
Becuase that was a malware attack that just 0-dayed the target machines instead of trying to suborn stuff
11:51
<&McMartin>
We have a *mechanism* for suborning stuff, they're supposed to use *that*
11:52
< Syka>
but that requires court time
11:52
< Syka>
which is why the secret courts stamp off on it
11:52
<&McMartin>
Yeah, uh
11:52
<&McMartin>
Our non-secret courts are not exactly stingy about that stuff
11:52
< Syka>
'we want everything because we want it' 'ok then'
11:53
< Syka>
yes, but your non secret courts sometimes deny requests
11:53
< Syka>
the FISA court doesn't
11:53
< Syka>
:p
11:53
<&McMartin>
Well, it's pretty easy to adjudicate law that says "it's OK if one participant might be foreign"
11:53
<&McMartin>
Also, when you let them amend the request in-place
11:55
<&McMartin>
But yes
11:55
<&McMartin>
Part of the problem with secrecy is that you can't see what's going on =P
11:55
<&McMartin>
However, people whose reaction is to assume the worst will fall into the Infinite Paranoia trap instantly, because, well, USG
11:56
<&McMartin>
FBI agents could kick your door down and shoot you in the face for no reason at any moment
11:56
<&McMartin>
The only thing stopping them from doing this is a piece of paper saying they're not allowed to
11:57
<&McMartin>
But that does kind of go back to the Groklaw article.
11:57
<&McMartin>
PJ is, IIRC, based somewhere in New England
11:57
<&McMartin>
If she has her email server in Switzerland
11:57
<&McMartin>
And FISA is presented with a request to tap that email line
11:57
<&McMartin>
The answer is 100% guaranteed to be "yes, go ahead; that's a communication with the Swiss. Switzerland is in Foreignlandia, that's explicitly authorized"
11:58
<&McMartin>
So, if one starts out in America, this seems like a counterproductive thing to do
12:06
< Reiver>
Wait, Tor is malware?
12:29 You're now known as TheWatcher
12:41 ktemkin[awol] is now known as ktemkin
13:01
<&McMartin>
Tor was compromised by hitting both endpoints with malware and correlating
13:02
<&McMartin>
Tor is also apparently a US Navy project, so using it to hide from the US is kind of a bad move~
13:03
<&McMartin>
(That said, Tor is not solving that problem; I'm not super clear on the exact details of how that worked vs what Tor is trying to provide)
13:04
< RichyB>
McMartin, if you're talking about the Firefox exploit that was distributed when the big anonymous TOR hosting service was hit, that wasn't actually an 0-day AIUI.
13:04
< RichyB>
s/you're/you were/
13:05
< RichyB>
I seem to remember hearing that the exploit that they used was already known and patched and only affected the fairly-large proportion of people who were using the Tor browser bundle, didn't update Firefox and did turn off NoScript.
13:07
<&McMartin>
I thought they also had to compromise some of the darknet servers to make it work, and I thought that was done with 0-days against the OS.
13:07
<&McMartin>
You're right about the client stuff, and yeah, that's the hack I mean
13:07
< Syka>
um
13:07
< Syka>
i think it was a known ff vuln
13:07
< Syka>
they didnt need anything else
13:07
< Syka>
iirc
13:07
< Syka>
it was a 'true IP' disclosure attack
13:41
<&ToxicFrog>
McMartin: re communication with Swiss mail servers: the thing is, if you assume the NSA is already tapping all ISP traffic, that is not actually any worse.
13:42
<&ToxicFrog>
And if you have transport encryption to the server, they can't even get metadata apart from "interacted with the mail server at this time"
13:43
<&ToxicFrog>
The perceived benefit to having the actual server outside the US, AIUI, is that they are not then vulnerable to the USG rolling over with a FISA warrant and saying "give us everything and don't tell anyone you have done so ever"
13:44
<&ToxicFrog>
So now you just need to worry about data-in-motion interception and not also about your mail server being silently replaced with an NSA listening post (or, at least, if it is, they will have to work for it)
14:07 Karono_ [Karono@Nightstar-13c26ed9.optusnet.com.au] has joined #code
14:07 Karono_ [Karono@Nightstar-13c26ed9.optusnet.com.au] has quit [Client closed the connection]
14:09 Karono [Karono@Nightstar-13c26ed9.optusnet.com.au] has quit [Ping timeout: 121 seconds]
14:23 You're now known as TheWatcher[afk]
15:07 Vornicus [vorn@ServerAdministrator.Nightstar.Net] has quit [[NS] Quit: Leaving]
15:20 ktemkin is now known as ktemkin[awol]
15:21 Karono [Karono@Nightstar-13c26ed9.optusnet.com.au] has joined #code
15:41
< RichyB>
Mad idea: if you're doing the "Swiss mail servers for privacy" thing, make sure that you're signed up for a bunch of porn spam and you do all your spam-filtering client-side.
15:41
< RichyB>
That will help you defeat traffic analysis. :)
15:41
<@Tamber>
"make sure"? Just use your email address in one place online, and it'll get set up for you!
15:41
<@Alek>
pfffffffffft
15:42
< RichyB>
Without spam: "suspect A sends ~400kB via SSL SMTP at 18:31h, suspect B recieves ~450kB via SSL SMTP at 18:33h. They're probably talking to each other."
15:43
<@Alek>
heh
15:43
< RichyB>
With spam: "suspect A sends ~400kB via SSL SMTP at 18:31h, suspect B receives ~450kB/s of crap email via SSL SMTP day in, day out so who knows what the fuck B did or didn't get a copy of."
15:51 celticminstrel [celticminst@Nightstar-ae361035.dsl.bell.ca] has joined #code
15:51 mode/#code [+o celticminstrel] by ChanServ
16:05 ErikMesoy [Erik@Nightstar-0fb48670.80-203-17.nextgentel.com] has joined #code
16:06
< ErikMesoy>
Why am I having a terrible experience with tortoisesvn?
16:06
< ErikMesoy>
Am I unique in this?
16:08
< AnnoDomini>
No.
16:11
<@gnolam>
What are the terrible experiences you are having?
16:14 Karono [Karono@Nightstar-13c26ed9.optusnet.com.au] has quit [Client closed the connection]
16:15
< ErikMesoy>
Being slow to checkout from internet (halfway through I went to download the files I wanted manually, this was faster enough to finish first), canceling badly (Cancel: TortoiseSVN has stopped working),
16:15
< ErikMesoy>
dying badly (I killed it with Task Manager at that point; it respawned to report an error) and badly inserting itself into context menus (right-clicking a folder now had a multi-second delay before the menu with the new SVN options appeared).
16:34
<&ToxicFrog>
SVN is bad. Tortoise is awful.
16:34
<&ToxicFrog>
Use git-svn if you can.
16:35
< Syka>
svn is overall pain
16:57 ErikMesoy is now known as Harrower
17:24
< Xon>
<ToxicFrog> SVN is bad. Tortoise is awful.
17:24
< Xon>
this, so much this
17:37 You're now known as TheWatcher
17:37
< RichyB>
SVN is only bad in the same sense that amputating wounded limbs is bad.
17:38
<@TheWatcher>
Amuptating wounded limbs in a field hospital with a rusty sawblade.
17:38
< RichyB>
We have Git/antibiotics now, which solve the same problems more effectively, but it's still better than no-source-control/dying-of-gangrene.
17:39
< Syka>
then there is snapshot-tarballs/having a clone
17:39
< RichyB>
No really, SVN isn't *that* bad. I wish I could force you to use CVS for a week so that you'd stop making overly negative statements about SVN. :P
17:40
<&ToxicFrog>
RichyB: I've used CVS. I freely admit that SVN is better than CVS.
17:41
<&ToxicFrog>
That does not actually make it good, especially today.
17:41
< Syka>
you can't say that "svn isn't /that/ bad"
17:42
< Syka>
just because worse things exist does not mean we cannot hold our tools to a higher standard
17:42
< Syka>
it's like saying "Tornado isn't that bad, it's better than sockets!"
17:42
< Syka>
doesn't change Tornado being lols
17:46
<@TheWatcher>
RichyB: I cut my teeth on rcs, before it even became cvs. I used CVS for a nearly a decade.
17:46
<@TheWatcher>
And yeah, like TF said
17:46
< RichyB>
I still think you're all whinging over one tiny little murder here and there
17:46
< RichyB>
we used to have accidental genocides all over the place
17:46
<@TheWatcher>
Pft
17:47
<@TheWatcher>
I must admit, that's probably the first time a discussion of version control systems has actually made me laugh.
17:48
<@iospace>
i use SVN at work, generally don't have that many issues with it
17:52
<@iospace>
fucking tcl
17:52
<@iospace>
fucking expect
17:53 * Tamber hands iospace the applicator of the fire of cleansing.
17:53
<@iospace>
Tamber: i wish
18:00
<&ToxicFrog>
RichyB: more generally, I have no patience for "you can't call X bad because Y is worse"
19:04 Kindamoody|out is now known as Kindamoody
19:37 Kindamoody is now known as Kindamoody[zZz]
20:34 Derakon [chriswei@Nightstar-a3b183ae.ca.comcast.net] has joined #code
20:34 mode/#code [+ao Derakon Derakon] by ChanServ
20:35
<&Derakon>
Whelp, figured out what my "network throttling" issue was, kind of.
20:35
<&Derakon>
The PCI card that the camera uses to send images to my control software is having Issues.
21:19 PinkFreud [WhyNot@NetworkAdministrator.Nightstar.Net] has joined #code
21:19 mode/#code [+o PinkFreud] by ChanServ
21:23
< Azash>
Derakon: Not sure if relieved
21:43 celticminstrel [celticminst@Nightstar-ae361035.dsl.bell.ca] has quit [[NS] Quit: KABOOM! It seems that I have exploded. Please wait while I reinstall the universe.]
21:43 celticminstrel [celticminst@Nightstar-ae361035.dsl.bell.ca] has joined #code
21:43 mode/#code [+o celticminstrel] by ChanServ
21:46
<&McMartin>
Of Erik's list, only the first thing is expected behavior. SVN doesn't do acceptable delta compression and doesn't maintain a secure connection very well, so downloading a tarball will always beat it
21:46
<&McMartin>
The other stuff should not happen
21:53 Harrower is now known as ErikMesoy
22:22 ErikMesoy is now known as ErikMesoy|sleep
22:27
<&McMartin>
Aha, there it is
22:27
<&McMartin>
The thing I was remembering about compromising the servers in the Tor case was how they got the malware distributed in the first place
22:30
<@Tamber>
Wasn't that less "hacking" compromise, more "Turn up on the doorstep with a warrant and an 'or else'"?
23:00
<&McMartin>
For the Tor case? I was not under that impression.
23:01
<&McMartin>
However, I'm also now not clear as to whether they hacked Freedom Hosting or spoofed it to "under maintenance" pages that delivered the payload.
23:06
<@Tamber>
Apparently, the JS crap turned up *after* the feds arrested the owner, and 'apparently' it's a pretty common pattern for FBI sting operations for something like that to get added to the (primarily, child porn) sites they take out the owners of, so they can catch the users too.
23:07
<@Tamber>
Take that with a heavy pinch of salt, though.
23:07
<&McMartin>
Yeah, I am, in part because I thought they hadn't made an arrest for this case yet >_.
23:07
<&McMartin>
(Because he was in Ireland or something, and the FBI tends to lose bureaucratic turf wars~)
23:07
<@Tamber>
"Eric Eoin Marques, a 28-year-old Irish citizen, is being held without bail in Ireland after a preliminary extradition hearing on Saturday aimed at sending him to the US, where he would face charges of distributing child pornography online."
23:07
<&McMartin>
Oh hey, how about that
23:08
<&McMartin>
OK then
23:08
<&McMartin>
Which news feeds are you using here?
23:08
<@Tamber>
http://nakedsecurity.sophos.com/2013/08/05/freedom-hosting-arrest-and-takedown-l inked-to-tor-privacy-compromise/
23:08
<@Tamber>
also https://openwatch.net/i/200/
23:09
<&McMartin>
Cool, thanks
23:37
<@froztbyte>
McMartin: fwiw, if you want a couple of good feeds to tag, @thegrugq, @abad1dea, @dakami
23:37
<@froztbyte>
mostly not full of shit
23:37
<&McMartin>
Are those Twitter?
23:37
<@froztbyte>
yes
23:37
<&McMartin>
Cool
23:37 * McMartin has not been using The Twitters much of late.
23:38
<&McMartin>
Actually, I kind of retired from the non-IRC Internet three years ago >_>
23:38
<@froztbyte>
there's perhaps a couple of crypto people you can add there too
23:38
<@froztbyte>
@zooko and the like
23:38
<@froztbyte>
McMartin: yeah I'm sorta a tourist to most of the non-IRC internet
23:38
<@froztbyte>
utilitarian.
23:39
<@froztbyte>
also I swear I misspelled that, but too tired
23:39
<&McMartin>
Nope, that's right
23:40
<@froztbyte>
teh tireds, it haz us
23:41
<@TheWatcher>
Ditto
23:41 You're now known as TheWatcher[T-2]
23:49 Derakon [chriswei@Nightstar-a3b183ae.ca.comcast.net] has quit [[NS] Quit: leaving]
23:54 You're now known as TheWatcher[zZzZ]
--- Log closed Wed Aug 21 00:00:31 2013
code logs -> 2013 -> Tue, 20 Aug 2013< code.20130819.log - code.20130821.log >

[ Latest log file ]