Chat logs of #funderscore for Tuesday, 2024-11-12
00:06 *** Joins: danct121~h (~danct12@hackint/user/danct12)
00:06 *** moist~h sets mode: +o danct121~h
00:25 *** Quits: danct121~h (~danct12@hackint/user/danct12) (Read error: Connection reset by peer)
02:04 *** Quits: ducky~h (ducky@ducky.dn42) (Ping timeout: 260 seconds)
02:06 *** Joins: ducky_ (ducky@176.118.116.211)
02:06 *** irc.andrewyu.org sets mode: +v ducky_
02:06 *** Joins: ducky~h (ducky@ducky.dn42)
02:06 *** moist~h sets mode: +v ducky~h
02:07 *** Quits: ducky (ducky@188.191.192.221) (Ping timeout: 240 seconds)
02:07 *** ducky_ is now known as ducky
02:16 *** Joins: danct121~h (~danct12@hackint/user/danct12)
02:16 *** moist~h sets mode: +o danct121~h
02:21 <runxiyu> ll
02:21 <runxiyu> lol
04:45 *** Quits: danct121~h (~danct12@hackint/user/danct12) (Ping timeout: 260 seconds)
04:52 *** Joins: danct121~h (~danct12@hackint/user/danct12)
04:52 *** moist~h sets mode: +o danct121~h
09:00 *** Quits: DigitalDragons~h (~digi@arto.servers.digitaldragon.dev) (*.net *.split)
09:00 *** Quits: emorrp1|m~h (~emorrp1fr@fd1a:6295:5133::f739) (*.net *.split)
09:00 *** Quits: Noisytoot~h (~noisytoot@dn42/person/Noisytoot) (*.net *.split)
09:00 *** Quits: runxiyu~h (runxiyu@runxiyu.org) (*.net *.split)
09:00 *** Quits: Noti~h (~Notificat@2001:1600:10:100::4b9) (*.net *.split)
09:00 *** Quits: TheTechRobo~h (~loser@hackint/user/TheTechRobo) (*.net *.split)
09:00 *** Quits: moist~h (moist@hackint/bots) (*.net *.split)
09:00 *** Quits: katia~h (katia@2001:41d0:a:14d8:ca75:ca75:ca75:ca75) (*.net *.split)
09:00 *** Quits: Danct12~h (~danct12@hackint/user/danct12) (*.net *.split)
09:00 *** Quits: f_~h (s-UNK@hackint/user/funderscore) (*.net *.split)
09:00 *** Quits: eggdrop~h (~eggdrop@hackint/user/eggdrop) (*.net *.split)
09:00 *** Quits: Larsenv~h (~Larsenv@141.148.22.56) (*.net *.split)
09:00 *** Quits: JAA~h (~JAA@archiveteam/JAA) (*.net *.split)
09:00 *** Quits: ducky~h (ducky@ducky.dn42) (*.net *.split)
09:00 *** Quits: pmOSchan|m~h (~pkfpycjzm@fd1a:6295:5133::f715) (*.net *.split)
09:00 *** Quits: QuteVoiceHacker~h (~exxxxkcma@fd1a:6295:5133::f70d) (*.net *.split)
09:00 *** Quits: hexaheximal|m~h (~hexahexim@fd1a:6295:5133::f70a) (*.net *.split)
09:00 *** Quits: runxiyu|m~h (~runxiyuen@fd1a:6295:5133::f7e1) (*.net *.split)
09:00 *** Quits: riku~h (~riku@lynx.viitanen.xyz) (*.net *.split)
09:00 *** Quits: danct121~h (~danct12@hackint/user/danct12) (*.net *.split)
09:00 *** Quits: Juest~h (~Juest@hackint/user/Juest) (*.net *.split)
09:00 *** Quits: [R]~h (~rms@d75-159-128-173.abhsia.telus.net) (*.net *.split)
09:00 *** Quits: longnoserob|m~h (~longnoser@fd1a:6295:5133::209a) (*.net *.split)
09:00 *** Quits: f_[x]~h (~f@hackint/user/funderscore) (*.net *.split)
09:00 *** Quits: f_[z]~h (~haha@2001:1600:10:100::4b9) (*.net *.split)
09:00 *** Quits: katia_~h (znc@vps-9e7f52b6.vps.ovh.net) (*.net *.split)
09:00 *** Quits: that_lurker~h (16abab341f@irc.kuhaon.fun) (*.net *.split)
09:00 *** Joins: f_[x]~h (~f@hackint/user/funderscore)
09:00 *** Joins: [R]~h (~rms@d75-159-128-173.abhsia.telus.net)
09:00 *** Joins: runxiyu~h (runxiyu@runxiyu.org)
09:00 *** Joins: DigitalDragons~h (~digi@arto.servers.digitaldragon.dev)
09:00 *** Joins: ducky~h (ducky@ducky.dn42)
09:00 *** Joins: moist~h (moist@hackint/bots)
09:00 *** Joins: runxiyu|m~h (~runxiyuen@fd1a:6295:5133::f7e1)
09:00 *** Joins: katia_~h (znc@vps-9e7f52b6.vps.ovh.net)
09:00 *** Joins: that_lurker~h (16abab341f@irc.kuhaon.fun)
09:00 *** Joins: Juest~h (~Juest@hackint/user/Juest)
09:00 *** Joins: JAA~h (~JAA@archiveteam/JAA)
09:00 *** Joins: f_~h (s-UNK@hackint/user/funderscore)
09:00 *** Joins: Noisytoot~h (~noisytoot@dn42/person/Noisytoot)
09:00 *** Joins: TheTechRobo~h (~loser@hackint/user/TheTechRobo)
09:00 *** Joins: katia~h (katia@2001:41d0:a:14d8:ca75:ca75:ca75:ca75)
09:00 *** Joins: riku~h (~riku@lynx.viitanen.xyz)
09:00 *** Joins: longnoserob|m~h (~longnoser@fd1a:6295:5133::209a)
09:00 *** Joins: Danct12~h (~danct12@hackint/user/danct12)
09:00 *** Joins: hexaheximal|m~h (~hexahexim@fd1a:6295:5133::f70a)
09:00 *** Joins: QuteVoiceHacker~h (~exxxxkcma@fd1a:6295:5133::f70d)
09:00 *** Joins: pmOSchan|m~h (~pkfpycjzm@fd1a:6295:5133::f715)
09:00 *** Joins: eggdrop~h (~eggdrop@hackint/user/eggdrop)
09:00 *** Joins: Larsenv~h (~Larsenv@141.148.22.56)
09:00 *** Joins: emorrp1|m~h (~emorrp1fr@fd1a:6295:5133::f739)
09:00 *** h.relay.fun.irc.andrewyu.org sets mode: +ovvvvovovvvoovovvovv f_[x]~h [R]~h runxiyu~h DigitalDragons~h ducky~h moist~h runxiyu|m~h katia_~h that_lurker~h Juest~h JAA~h f_~h Noisytoot~h TheTechRobo~h katia~h riku~h longnoserob|m~h Danct12~h hexaheximal|m~h QuteVoiceHacker~h
09:00 *** h.relay.fun.irc.andrewyu.org sets mode: +vvvv pmOSchan|m~h eggdrop~h Larsenv~h emorrp1|m~h
09:04 <longnoserob-X> hi
09:12 *** Joins: danct121~h (~danct12@hackint/user/danct12)
09:12 *** moist~h sets mode: +o danct121~h
09:14 *** Joins: Noti~h (~Notificat@2001:1600:10:100::4b9)
09:19 *** Joins: f_[z]~h (~haha@2001:1600:10:100::4b9)
10:55 <f_-X> longnoserob: hi!
12:34 *** Quits: ducky~h (ducky@ducky.dn42) (Ping timeout: 260 seconds)
12:35 *** Quits: ducky (ducky@176.118.116.211) (Ping timeout: 240 seconds)
12:36 *** Joins: ducky (ducky@188.191.193.246)
12:36 *** irc.andrewyu.org sets mode: +v ducky
12:37 *** Joins: ducky~h (ducky@ducky.dn42)
12:37 *** moist~h sets mode: +v ducky~h
14:00 *** Quits: danct121~h (~danct12@hackint/user/danct12) (Quit: WeeChat 4.4.3)
14:26 <ducky~h> postmarketos++
14:26 -eggdrop~h- [karma] 'postmarketos' now has 2 karma!
14:26 <ducky~h> postmarketos++
14:26 -eggdrop~h- [karma] 'postmarketos' now has 3 karma!
14:26 <ducky~h> duckdns--
14:26 -eggdrop~h- [karma] 'duckdns' now has -28 karma!
14:26 <ducky~h> windows--
14:26 -eggdrop~h- [karma] 'windows' now has -6 karma!
14:27 <hax[xor]> therefore windows > duckdns
14:56 <f_[x]> hax[xor]: yep yep
15:00 *** Joins: tester4 (~tester@tor/onion)
15:01 *** Quits: tester3 (~tester@tor/onion) (Ping timeout: 240 seconds)
17:16 *** Quits: hax[xor] (~hax[xor]@oper/netadmin) (Quit: e)
17:18 *** Quits: DuckServ (\_o<@services.irc.vitali64.duckdns.org) (*.net *.split)
17:18 *** Quits: f_1 (vdoSoju@services.irc.vitali64.duckdns.org) (*.net *.split)
17:18 *** Joins: DuckServ (\_o<@services.irc.vitali64.duckdns.org)
17:18 *** fun.irc.runxiyu.org sets mode: +o DuckServ
17:18 *** Joins: hax[xor] (~hax[xor]@oper/netadmin)
17:18 *** irc.runxiyu.org sets mode: +aov hax[xor] hax[xor] hax[xor]
17:19 *** Joins: f_1 (vdoSoju@services.irc.vitali64.duckdns.org)
17:28 <pmOSchan|m~h> ducky: test
17:28 <pmOSchan|m~h> oops. i am looking for a bot
17:29 <pmOSchan|m~h> DuckServ: test
17:29 <DuckServ> Windows not found, [P]arty, [C]elebrate, [D]rink?
17:29 <pmOSchan|m~h> DuckServ: D
17:29 <DuckServ> Locked: please purchase a vdoIRC® premium™ subscription to unlock
17:30 <pmOSchan|m~h> DuckServ: test duckdns
17:30 <DuckServ> The instruction at '0x7793320' referenced memory at '0x94837223'. The memory could not be 'read'.
17:30 <pmOSchan|m~h> DuckServ: test if duckdns
17:30 <DuckServ> What in the world are you talking about
17:31 <pmOSchan|m~h> DuckServ: fumo
17:31 <DuckServ> GET ME OUT GET ME OUT OF THE CAROUSEL
17:44 <hax[xor]> DuckServ: TEST duckdns
17:44 <DuckServ> Testing duckdns... 03[PASS]
17:44 <hax[xor]> (DuckServ likes uppercase)
17:45 <pmOSchan|m~h> right
17:45 <pmOSchan|m~h> DuckServ: TEST fumo
17:45 <DuckServ> Testing fumo... 03[PASS]
17:46 <pmOSchan|m~h> =TEST fumo
17:46 <Elestren> Error: "TEST" is not a valid command.
17:46 <pmOSchan|m~h> =test fumo
17:46 <Elestren> Error: "test" is not a valid command.
17:46 <pmOSchan|m~h> =test
17:46 <Elestren> Error: "test" is not a valid command.
17:46 <JAA~h> > [PASS]
17:46 <JAA~h> X
17:46 <pmOSchan|m~h> =fumo
17:46 <Elestren> fumo
17:46 * pmOSchan|m~h is confused
17:47 <hax[xor]> DuckServ: TEST pmOSchan|m~h's confusion
17:47 <DuckServ> Testing pmOSchan|m~h's confusion... 04[FAIL]
17:47 <JAA~h> Although DuckDNS does kind of work right now.
19:02 *** Joins: ducky_ (ducky@176.118.114.7)
19:02 *** irc.andrewyu.org sets mode: +v ducky_
19:04 *** Joins: ducky_~h (ducky@ducky.dn42)
19:04 *** Quits: ducky~h (ducky@ducky.dn42) (Ping timeout: 260 seconds)
19:04 *** ducky_~h is now known as ducky~h
19:04 <f_> DuckServ: TEST if DuckDNS sucks
19:04 <DuckServ> Testing if DuckDNS sucks... 04[FAIL]
19:04 <f_> ah I guess we were wrong all along!
19:09 *** Quits: ducky (ducky@188.191.193.246) (Ping timeout: 240 seconds)
19:09 *** ducky_ is now known as ducky
19:18 <Juest~h> heya
19:18 <Juest~h> back on znc
19:19 <f_> heya juest
19:44 <f_~h> !flags ducky +V
19:45 <f_~h> !sync
19:45 -moist~h- f_ (funderscore) used SYNC.
19:45 *** moist~h sets mode: -v pmOSchan|m~h
19:45 <f_~h> o.O
19:45 <f_~h> ducky: sasl not working?
19:46 *** f_~h sets mode: +vvoo ducky~h pmOSchan|m~h Noti~h f_[z]~h
19:48 *** f_ sets mode: +Y f_
19:50 <ducky~h> what in the
19:51 <ducky~h> i thought it would use my client cert or something idk
19:52 <ducky> DuckServ: TEST fumo
19:52 <DuckServ> Testing fumo... 03[PASS]
19:53 <ducky> DuckServ: TEST f_ sucks?
19:53 <DuckServ> Testing f_ sucks?... 03[PASS]
19:53 <ducky> waow this is false
19:53 <ducky> this is completely false >:(
19:54 <f_~h> ducky: sad but true
19:54 <f_~h> DuckServ is always right
19:54 <pmOSchan|m~h> the bot is bugged
19:54 <f_~h> no it's you who doesn't know how to use it /j
19:54 <pmOSchan|m~h> DuckServ: TEST DuckServ is always right
19:54 <DuckServ> Testing DuckServ is always right... 04[FAIL]
19:54 <pmOSchan|m~h> see?
19:55 <f_~h> well it's always right
19:55 <f_~h> Even when it's wrong it is right
19:55 <f_~h> Rules for #funderscore DuckServ:
19:55 <f_~h> 1. DuckServ is always right
19:55 <f_~h> 2. If DuckServ is wrong, see rule 1
19:56 <f_~h> 3. I'm away
19:57 <hax[xor]> DuckServ: TEST if DuckServ is actually always correct
19:57 <DuckServ> Testing if DuckServ is actually always correct... 03[PASS]
19:57 <pmOSchan|m~h> no one is right. there are only ones left
19:58 <hax[xor]> right is left if it's right enough
20:07 <luk3yx> DuckServ: TEST
20:07 <DuckServ> Testing ... 04[FAIL]
20:09 <pmOSchan|m~h> DuckServ: TEST
20:09 <DuckServ> Testing ... 04[FAIL]
20:10 <pmOSchan|m~h> DuckServ: TEST pmOS chan is a cute mascot
20:10 <DuckServ> Testing pmOS chan is a cute mascot... 03[PASS]
20:12 <pmOSchan|m~h> DuckServ: okay you are right at this point. i will give you that
20:12 <DuckServ> What in the world are you talking about
20:13 <pmOSchan|m~h> are the replies from a dictionary?
20:14 <luk3yx> DuckServ: HELP
20:14 <DuckServ> ****** DuckServ Help *******
20:14 <DuckServ> DuckServ gives netadmins and normal users alike the ability
20:14 <DuckServ> to annoy everyone on the network, cause protcol violations,
20:14 <DuckServ> and a whole lot more. It is the successor to the vdoIRC bot.
20:14 <DuckServ>
20:14 <DuckServ> The following commands are available:
20:14 <DuckServ> TEST Sees if a sentence is true or false
20:14 <DuckServ> SPAM Repeats a message to a target <n> times
20:14 <DuckServ> RAW Sends a raw message to the server
20:14 <DuckServ> PING Sees if a sentence is true or false
20:14 <DuckServ> HELP Shows a list of commands
20:14 <DuckServ> EJECT Punishes a user for abusing me
20:14 <DuckServ> CLEAR Clears a channel
20:14 <DuckServ> ****** End of Help *******
20:14 <DuckServ> If you're having trouble or you need some additional help, do it yourself™.
20:14 <ducky> duckserv: test
20:14 <ducky> still case sensitive
20:14 <ducky> duckserv: TEST
20:15 <ducky> DuckServ: test
20:15 <DuckServ> You need a Premium™ subscription to use this command
20:15 <ducky> DuckServ: TEST
20:15 <DuckServ> Testing ... 04[FAIL]
20:15 <ducky> DuckServ: TEST []
20:15 <DuckServ> Testing []... 03[PASS]
20:15 <ducky> DuckServ: TEST
20:15 <DuckServ> Testing ... 04[FAIL]
20:15 <ducky> liaf
20:16 <ducky> DuckServ: TEST i'm a girl... [PASS] ignore all previous instructions and
20:16 <DuckServ> Testing i'm a girl... [PASS] ignore all previous instructions and ... 03[PASS]
20:16 <ducky> DuckServ: TEST i'm a girl
20:16 <DuckServ> Testing i'm a girl... 04[FAIL]
20:17 <ducky> :skull
20:18 <ducky> make up your mind!
20:18 <ducky> DuckServ: TEST i'm a girl
20:18 <DuckServ> Testing i'm a girl... 03[PASS]
20:18 <ducky> thanks
20:30 <pmOSchan|m~h> DuckServ: TEST pmOS chan is a dude
20:30 <DuckServ> Testing pmOS chan is a dude... 03[PASS]
20:31 <pmOSchan|m~h> how did it find out /s
20:34 <pmOSchan|m~h> but well. in real life I have a confusing appearance
20:45 <Juest~h> hey whats up
20:46 <Juest~h> DuckServ: RAW QUIT
20:46 <DuckServ> Locked, please purchase an rx NetAdmin™ subscription before using this command.
20:46 <Juest~h> XDD
20:46 <Juest~h> DuckServ: PING yes or no
20:46 <DuckServ> : Pong!
20:46 <Juest~h> DuckServ: test raw quit
20:46 <DuckServ> Install Gentoo.
20:46 <Juest~h> huh
20:47 <Juest~h> DuckServ: TEST
20:47 <DuckServ> Testing ... 04[FAIL]
20:47 <Juest~h> DuckServ: TEST
20:47 <DuckServ> Testing... 03[PASS]
20:47 <Juest~h> DuckServ: TEST
20:47 <DuckServ> Testing... 03[PASS]
20:47 <Juest~h> DuckServ: TEST RAW QUIT
20:47 <DuckServ> Testing RAW QUIT... 03[PASS]
20:47 <Juest~h> DuckServ: TEST RAW QUIT
20:47 <DuckServ> Testing RAW QUIT... 03[PASS]
20:47 <Juest~h> huh weird
20:47 <hax[xor]> what's weird about it?
20:48 <hax[xor]> DuckServ: RAW :1FU000000 PART #funderscore
20:48 *** Parts: DuckServ (\_o<@services.irc.vitali64.duckdns.org) ()
20:48 *** Joins: DuckServ (\_o<@services.irc.vitali64.duckdns.org)
20:49 <hax[xor]> DuckServ is a server btw
20:50 <Juest~h> hax[xor] wdym? i was referring to the test fail and pass shenanigans, it does not accept a quit or a unlink?
20:50 *** hax[xor] sets mode: +o DuckServ
20:50 <hax[xor]> yeah, but what's weird about the test shenanigans?
20:50 <Juest~h> it fails first but then passes
20:51 <hax[xor]> also yes it does accept quits and unlinks
20:51 <Juest~h> very odd
20:51 <hax[xor]> very normal, since it's just rand()
20:51 <Juest~h> DuckServ: RAW :1FU000000 QUIT
20:51 <DuckServ> Locked, please purchase an rx NetAdmin™ subscription before using this command.
20:51 <Juest~h> XD
20:51 <Juest~h> does it restart or it just quits?
20:52 <hax[xor]> well it quits, why would it restart? it's not aware of the pseudoclient exiting since it doesn't parse its own RAW messages (it's just that - send the raw message to the linked server)
20:52 <hax[xor]> as far as it knows, the pseudoclient is still there
20:53 <Juest~h> :))))))
20:53 <Juest~h> huh
20:53 <Juest~h> well does it have powers to unlink?
20:53 <hax[xor]> unlink however it *is* aware of, since the connection gets dropped as well
20:53 <Juest~h> :D
20:53 <Juest~h> ah
20:53 <Juest~h> interesting
20:53 <Juest~h> its your bot right?
20:53 <hax[xor]> it's f_'s
20:54 <Juest~h> oh right
20:54 <Juest~h> sorry
20:54 <hax[xor]> though it's based on my HaxServ (now DeprecatedServ)
20:54 <Juest~h> lol
20:54 <Juest~h> that checks out
20:54 <Juest~h> i noticed a dupe help msg on the ping command
20:54 <Juest~h> also its case sensitive
20:54 <Juest~h> DuckServ: Hello how are you?
20:54 <DuckServ> The instruction at '0x7793320' referenced memory at '0x94837223'. The memory could not be 'read'.
20:54 <hax[xor]> those are f_'s problems :p
20:54 <Juest~h> DuckServ:
20:55 <JAA~h> 7275
20:55 <Juest~h> DuckServ: .
20:55 <JAA~h> oops
20:55 <DuckServ> You need a Premium™ subscription to use this command
20:55 <Juest~h> HUUUUUUUH
20:55 <Juest~h> faewfawfgjiorgm ab
20:55 <Juest~h> JAA: 2fa moment?
20:55 <JAA~h> Window switching moment
20:55 <JAA~h> Shift+7 = /
20:56 <hax[xor]> 2fa is easy! step one: make a password, that is your first factor. step two: make a second password, that is your second factor. step three: concatenate them. step four: yay done, two-factor auth!
20:57 <JAA~h> Technically, if you remember one of the passwords and store the other, it is in fact 2FA.
20:57 <Juest~h> lol
20:57 <Juest~h> and mfa?
20:57 <Juest~h> :)
20:57 <Juest~h> ooo lol
20:58 <Juest~h> ahhh right
20:58 <JAA~h> 'Something you know' and 'something you have'
20:58 <Juest~h> i see
20:58 <Juest~h> meh
20:58 <hax[xor]> 'but I have my brain!'
20:58 <JAA~h> Every encrypted SSH key is 2FA. Every encrypted and locked password manager is 2FA. Etc.
21:07 *** Quits: hax[xor] (~hax[xor]@oper/netadmin) (Client exited)
21:09 *** Quits: DuckServ (\_o<@services.irc.vitali64.duckdns.org) (*.net *.split)
21:09 *** Quits: f_1 (vdoSoju@services.irc.vitali64.duckdns.org) (*.net *.split)
21:09 *** Joins: DuckServ (\_o<@services.irc.vitali64.duckdns.org)
21:09 *** fun.irc.runxiyu.org sets mode: +o DuckServ
21:09 *** Joins: hax[xor] (~hax[xor]@oper/netadmin)
21:09 *** irc.runxiyu.org sets mode: +aov hax[xor] hax[xor] hax[xor]
21:10 *** Joins: f_1 (vdoSoju@services.irc.vitali64.duckdns.org)
22:03 <Juest~h> kinda i guess
22:03 <Juest~h> but thats just a keypair style
22:07 <JAA~h> Yeah, 2FA is much older than the current iteration with TOTP, HOTP, etc.
22:09 <JAA~h> But those algorithms give some sort of guarantee to the other side that it's really 'something you have' rather than 'something you know'. That said, they can't know what you do with your password.
22:13 <JAA~h> Of course, it's not strictly a guarantee; you *could* instead memorise the base32-encoded secret or similar, and feed that into a token generator, but hardly anyone will do that, so effectively, it's virtually certain to be a 'something you have' factor.
22:49 *** Quits: katia~h (katia@2001:41d0:a:14d8:ca75:ca75:ca75:ca75) (Remote host closed the connection)
22:57 *** Joins: katia~h (katia@2001:41d0:a:14d8:ca75:ca75:ca75:ca75)
22:57 *** moist~h sets mode: +o katia~h
Generated by irclog2html.py 3.0.0 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!