2014-04-10 00:05 nicksydney_ has joined #qi-hardware 2014-04-10 00:06 nicksydney has quit [Ping timeout: 264 seconds] 2014-04-10 00:09 Luke-Jr has quit [Remote host closed the connection] 2014-04-10 00:09 Luke-Jr has joined #qi-hardware 2014-04-10 00:14 nicksydney_ has quit [Read error: Connection reset by peer] 2014-04-10 00:14 nicksydney has joined #qi-hardware 2014-04-10 00:25 nicksydney_ has joined #qi-hardware 2014-04-10 00:26 nicksydney has quit [Ping timeout: 264 seconds] 2014-04-10 00:35 nicksydney has joined #qi-hardware 2014-04-10 00:36 nicksydney_ has quit [Ping timeout: 264 seconds] 2014-04-10 00:55 dos1 has quit [Ping timeout: 240 seconds] 2014-04-10 01:19 lindi-_ has joined #qi-hardware 2014-04-10 01:19 bartbes_ has joined #qi-hardware 2014-04-10 01:22 freespace has quit [Ping timeout: 265 seconds] 2014-04-10 01:22 woakas has quit [Ping timeout: 265 seconds] 2014-04-10 01:22 bartbes has quit [Ping timeout: 265 seconds] 2014-04-10 01:22 lindi- has quit [Ping timeout: 265 seconds] 2014-04-10 01:23 woakas has joined #qi-hardware 2014-04-10 01:25 freespace has joined #qi-hardware 2014-04-10 01:26 arielenter has joined #qi-hardware 2014-04-10 01:38 atommann has joined #qi-hardware 2014-04-10 01:44 michael_lee has joined #qi-hardware 2014-04-10 01:44 atommann has quit [Ping timeout: 250 seconds] 2014-04-10 02:00 atommann has joined #qi-hardware 2014-04-10 02:03 Luke-Jr has quit [Remote host closed the connection] 2014-04-10 02:03 Luke-Jr has joined #qi-hardware 2014-04-10 02:23 * whitequark has devised an interesting system for data storage 2014-04-10 02:23 you know dropbox, right? 2014-04-10 02:23 well, it will be sort-of dropbox clone, if you think about the interface it shows the user 2014-04-10 02:23 but internally, it has all-consuming maniacal paranoia 2014-04-10 02:24 it doesn't trust: 1) network, over which you connect to server 2) the server itself 3) whatever storage mechanism server uses 4) other peers 2014-04-10 02:24 taking quite some inspiration from tahoe-lafs 2014-04-10 02:32 arielenter has quit [Quit: Leaving.] 2014-04-10 02:33 arielenter has joined #qi-hardware 2014-04-10 03:14 Luke-Jr has quit [Remote host closed the connection] 2014-04-10 03:14 Luke-Jr has joined #qi-hardware 2014-04-10 03:18 Luke-Jr has quit [Remote host closed the connection] 2014-04-10 03:19 Luke-Jr has joined #qi-hardware 2014-04-10 03:22 Luke-Jr has quit [Remote host closed the connection] 2014-04-10 03:26 Luke-Jr has joined #qi-hardware 2014-04-10 03:30 Luke-Jr has quit [Remote host closed the connection] 2014-04-10 03:34 Luke-Jr has joined #qi-hardware 2014-04-10 03:38 Luke-Jr has quit [Remote host closed the connection] 2014-04-10 03:42 Luke-Jr has joined #qi-hardware 2014-04-10 03:47 arielenter has quit [Quit: Leaving.] 2014-04-10 03:47 xiangfu has joined #qi-hardware 2014-04-10 03:47 rta has quit [Ping timeout: 246 seconds] 2014-04-10 04:05 kristianpaul has quit [Ping timeout: 250 seconds] 2014-04-10 04:16 kristianpaul has joined #qi-hardware 2014-04-10 04:16 kristianpaul has joined #qi-hardware 2014-04-10 04:16 xiangfu has quit [Remote host closed the connection] 2014-04-10 04:18 xiangfu has joined #qi-hardware 2014-04-10 04:24 arielenter has joined #qi-hardware 2014-04-10 05:16 rta has joined #qi-hardware 2014-04-10 05:19 jekhor has joined #qi-hardware 2014-04-10 05:23 arielenter has quit [Read error: Connection timed out] 2014-04-10 05:26 mth has quit [Remote host closed the connection] 2014-04-10 05:55 rz2k has joined #qi-hardware 2014-04-10 06:21 wolfspraul has joined #qi-hardware 2014-04-10 06:26 furthermore, it shall distrust: users, the CPU hardware, cryptography, causality 2014-04-10 06:27 nicksydney has quit [Read error: Connection reset by peer] 2014-04-10 06:28 nicksydney has joined #qi-hardware 2014-04-10 07:23 michael_lee has quit [Quit: Ex-Chat] 2014-04-10 08:33 sb0 has joined #qi-hardware 2014-04-10 09:19 xiangfu has quit [Remote host closed the connection] 2014-04-10 09:24 rz2k has quit [] 2014-04-10 09:29 xiangfu has joined #qi-hardware 2014-04-10 10:06 dandon_ has joined #qi-hardware 2014-04-10 10:07 dandon has quit [Ping timeout: 240 seconds] 2014-04-10 10:07 dandon_ is now known as dandon 2014-04-10 10:08 atommann has quit [Quit: Leaving] 2014-04-10 10:08 xiangfu has quit [Ping timeout: 250 seconds] 2014-04-10 10:10 xiangfu has joined #qi-hardware 2014-04-10 10:35 xiangfu has quit [Ping timeout: 250 seconds] 2014-04-10 10:38 xiangfu has joined #qi-hardware 2014-04-10 10:53 xiangfu has quit [Remote host closed the connection] 2014-04-10 11:27 jekhor has quit [Ping timeout: 240 seconds] 2014-04-10 11:38 that's not a bad idea in general, but no, not in this one :) 2014-04-10 11:44 mth has joined #qi-hardware 2014-04-10 12:35 bzb has joined #qi-hardware 2014-04-10 12:37 bzb has quit [Read error: Connection reset by peer] 2014-04-10 13:04 Luke-Jr has quit [Remote host closed the connection] 2014-04-10 13:05 Luke-Jr has joined #qi-hardware 2014-04-10 14:00 DocScrutinizer05: you wondered about web.de passwords. here you are: http://www.heise.de/newsticker/meldung/Heartbleed-Yahoo-und-Web-de-raten-zum-Passwortwechsel-2167630.html 2014-04-10 14:04 eintopf: one issue with making at86rf23x start sending before all data is in the chip's buffer is that you have to be sure you don't get any unexpected delays between commanding the transmission and the and of the data transfer 2014-04-10 14:07 eintopf: in linux, you usually can't guarantee this yet it may still work most of the time. you should therefore be prepared to handle a frame buffer underrun (access violation) 2014-04-10 14:08 ... aka TRX_UR interrupt 2014-04-10 14:16 wpwrak: thanks and http://www.heise.de/security/artikel/Passwoerter-in-Gefahr-was-nun-2167584.html 2014-04-10 14:17 yeah. so you still have to decide :) 2014-04-10 14:17 I wonder if the passwords that bleeded were simple to associate to the *account data* 2014-04-10 14:17 probably yes 2014-04-10 14:17 well, the account name 2014-04-10 14:18 I mean, I can share 5 passwords here: abcde 12345 qwerty password marry 2014-04-10 14:19 those are not *my* passwords, so they are useless to you 2014-04-10 14:19 (stuff about at86rf23x) oops, wrong channel :( don't type stuff before morning caffeine ... 2014-04-10 14:20 DocScrutinizer05: the data they catch is most likely "DocScrutinizer05/IwantApony7". so they have full login information 2014-04-10 14:20 wpwrak: Yes I know that, there is a irq for frame buffer underrun (access violation) 2014-04-10 14:20 and the bad news 2014-04-10 14:20 the irq occurs :) 2014-04-10 14:21 eintopf: reposted on the right channel :) 2014-04-10 14:21 hmmm 2014-04-10 14:21 tok me an agonizing while to get to this screen http://wstaw.org/m/2014/04/10/plasma-desktopcT1775.png 2014-04-10 14:21 took 2014-04-10 14:22 not the tiny "your password dosn't need to get changed" 2014-04-10 14:22 note 2014-04-10 14:22 do they explain what they base the recommendation on ? does it even refer to heartbleed ? 2014-04-10 14:22 no 2014-04-10 14:22 if they have mandatory periodic password changes, it could be an indicator of that 2014-04-10 14:23 it's incredibly difficult to even get to there 2014-04-10 14:23 they don't 2014-04-10 14:24 getting security right is hard. you really have to use that heavy grey mass that normally only serves to balance the head 2014-04-10 14:24 for web.de, this may be a first ;-) 2014-04-10 14:24 indeed 2014-04-10 14:24 no matter what you do, they always kick you back from https:// to http:// 2014-04-10 14:25 great¡ >:-( 2014-04-10 14:25 seems they somewhat partially stopped that habit though 2014-04-10 14:26 thanks to snowden perhaps 2014-04-10 14:26 yet without JS the site is rubbish/junk 2014-04-10 14:26 and just when you thought you were safe if you didn't log in in the last few days: http://arstechnica.com/security/2014/04/heartbleed-vulnerability-may-have-been-exploited-months-before-patch/ 2014-04-10 14:27 and the first time I logged in they instantly kicked me "for security reasons" and next time they complained that I didn't log out ;-P 2014-04-10 14:27 well, that's been obvious 2014-04-10 14:28 may nave been exploited since 2 years, I'd say 2014-04-10 14:29 even worse: I learned they also might have attacked *my* PC when I connected to a https:// URL 2014-04-10 14:29 naw, not obvious. we didn't know it have been independently discovered 2014-04-10 14:29 what they're saying is that evidence for heartbleed attacks have been found in honeypot going back as far as november 2013 2014-04-10 14:29 ooooh 2014-04-10 14:30 no surprise though 2014-04-10 14:30 I had taken bets 2014-04-10 14:30 seems that *someone* is reviewing that openssl code. it's just not the ones responsible ... 2014-04-10 14:31 I'm just pondering a staeful packet inspection firewall that has a list of "hot terms" 2014-04-10 14:32 some people may just record everything that goes to their honeypot. then, when something happens that makes them suspicious, they can examine the whole history of their traffic for clues 2014-04-10 14:33 of course such firewall MUST be bomb proven by itself, otherwise it might make for a really worthy target 2014-04-10 14:33 the recording in such a honeypot could be completely passive 2014-04-10 14:34 sure sure, honeypot. fine. but hardly feasible for your private PC to harden it 2014-04-10 14:34 a 1 TB disk would be enough for about a day of sustained 100 Mbps traffic. and a honeypot probably gets a lot less 2014-04-10 14:34 naw, but for security firms. 1 disk per day is peanuts if it's part of your business 2014-04-10 14:35 yep, I know a bit about how those companies work 2014-04-10 14:35 most amazing thing is: how do they get all those IPs out of alien ranges 2014-04-10 14:36 I mean, how would I set up a honeypot that has an IP that looks like it was in IBM offices India? 2014-04-10 14:37 and they probably not only want the IP but also the traceroute look plausible 2014-04-10 14:38 just put your own content there ? e.g., who really knows who is behind pics.nase-bohren.de ? :) 2014-04-10 14:38 OK, to a certain degree you can fake traceroute 2014-04-10 14:39 maybe fakebook is just one big honeypot and they record EVERYTHING ;) 2014-04-10 14:39 that's been the basic idea when they invented it 2014-04-10 14:39 but look e.g. here http://www.digitalattackmap.com/#anim=1&color=0&country=ALL&time=16104&view=map 2014-04-10 14:40 wolfspraul has quit [Quit: leaving] 2014-04-10 14:40 wolfspraul has joined #qi-hardware 2014-04-10 14:41 those dudes need other service contracts with internet providers than any mere mortal 2014-04-10 14:42 heh, nice one :) 2014-04-10 14:43 viric has quit [Ping timeout: 240 seconds] 2014-04-10 14:43 malaysia has some domestic issues :) 2014-04-10 14:44 watch "the movie"! 2014-04-10 14:45 dafaq! ~dec-1. 2013 2014-04-10 14:45 and mid of January 2014-04-10 14:46 Feb 8 2014-04-10 14:46 USA nukes itself 2014-04-10 14:48 viric has joined #qi-hardware 2014-04-10 14:48 and 5 days ago korea got pretty active 2014-04-10 14:58 viric has quit [Ping timeout: 276 seconds] 2014-04-10 15:03 viric has joined #qi-hardware 2014-04-10 15:17 arielenter has joined #qi-hardware 2014-04-10 15:32 viric has quit [Ping timeout: 252 seconds] 2014-04-10 15:35 wej has quit [Read error: Connection reset by peer] 2014-04-10 15:35 wej has joined #qi-hardware 2014-04-10 15:37 viric has joined #qi-hardware 2014-04-10 15:58 wej has quit [Read error: Connection reset by peer] 2014-04-10 16:03 wej has joined #qi-hardware 2014-04-10 16:12 rta has quit [Ping timeout: 252 seconds] 2014-04-10 16:26 roh, is there a CNC mill at RFA? 2014-04-10 16:28 rta has joined #qi-hardware 2014-04-10 16:28 FDCX has quit [Ping timeout: 246 seconds] 2014-04-10 16:34 FDCX has joined #qi-hardware 2014-04-10 16:43 pcercuei has joined #qi-hardware 2014-04-10 17:03 dos1 has joined #qi-hardware 2014-04-10 17:03 Web-aptosid876_ has joined #qi-hardware 2014-04-10 17:03 what other mips pocket computers are there? 2014-04-10 17:04 NN,GCW,Dingoo A320.... 2014-04-10 17:07 RMS ultrabook stolen 2014-04-10 17:07 :) 2014-04-10 17:10 again? 2014-04-10 17:50 arielenter has quit [Ping timeout: 240 seconds] 2014-04-10 17:55 arielenter has joined #qi-hardware 2014-04-10 18:18 FDCX has quit [Remote host closed the connection] 2014-04-10 18:55 mth has quit [Remote host closed the connection] 2014-04-10 18:55 mth has joined #qi-hardware 2014-04-10 19:00 jekhor has joined #qi-hardware 2014-04-10 19:01 arielenter has quit [Ping timeout: 240 seconds] 2014-04-10 19:10 idundidit has quit [Quit: I'm off to see the wizard, the wonderful wizard your mom.] 2014-04-10 19:41 arielenter has joined #qi-hardware 2014-04-10 20:19 FDCX has joined #qi-hardware 2014-04-10 21:00 oh well... 2014-04-10 21:00 https://www.eff.org/deeplinks/2014/04/wild-heart-were-intelligence-agencies-using-heartbleed-november-2013 2014-04-10 21:02 and someone posted this comment on facebook under that article: http://pastebin.com/1zYdCiSw 2014-04-10 21:05 arielenter has quit [Quit: Leaving.] 2014-04-10 21:05 arielenter1 has joined #qi-hardware 2014-04-10 21:09 wolfspraul has quit [Quit: leaving] 2014-04-10 21:43 pcercuei has quit [Ping timeout: 252 seconds] 2014-04-10 22:00 dos1: pastebin isn't friendly to tor users 2014-04-10 22:01 try pastebay.com 2014-04-10 22:01 it's pointing to http://cryptome.org/0001/nsa-ip-update14.htm and http://cryptome.org/2014/03/nsa-zologize.htm and noting that there's an entry "193.0.0.0 - 193.255.255.255 (subranges are NSA-affiliated and/or NSA fully-controlled)" which match IPs reported by EFF 2014-04-10 22:13 thanks 2014-04-10 22:24 jekhor has quit [Ping timeout: 252 seconds] 2014-04-10 22:37 sb0 has quit [Quit: Leaving] 2014-04-10 23:13 arielenter1 has quit [Ping timeout: 252 seconds] 2014-04-10 23:51 w3bspl0it has joined #qi-hardware 2014-04-10 23:52 hello