--- Log opened Mon Jan 08 00:00:46 2018 00:35 -!- strages [uid11297@gateway/web/irccloud.com/x-rekgephmfogyjbmf] has joined #se2600 02:05 -!- skiboy [skiboy@gateway/vpn/privateinternetaccess/skiboy] has joined #se2600 02:29 -!- Dagmar [dagmar@unaffiliated/dagmar] has quit [Ping timeout: 260 seconds] 04:30 -!- Dagmar [dagmar@c-69-180-254-140.hsd1.tn.comcast.net] has joined #se2600 04:30 -!- Dagmar [dagmar@c-69-180-254-140.hsd1.tn.comcast.net] has quit [Changing host] 04:30 -!- Dagmar [dagmar@unaffiliated/dagmar] has joined #se2600 04:30 -!- mode/#se2600 [+o Dagmar] by ChanServ 06:00 -!- skiboy [skiboy@gateway/vpn/privateinternetaccess/skiboy] has quit [Quit: Leaving] 06:56 -!- scam [~sicsscam@24.154.71.208] has joined #se2600 07:04 -!- opticron [opticron@nat/digium/x-eonngycodhejyljh] has joined #se2600 07:04 -!- mode/#se2600 [+o opticron] by ChanServ 07:04 -!- skiboy [skiboy@gateway/vpn/privateinternetaccess/skiboy] has joined #se2600 07:10 -!- remoford [~remo_lapt@c-69-137-84-154.hsd1.tn.comcast.net] has joined #se2600 08:35 -!- LastChild [~RasPi@c-71-228-205-189.hsd1.tn.comcast.net] has quit [Read error: No route to host] 08:37 -!- crashcartpro [uid29931@gateway/web/irccloud.com/x-nxhmbbkcnvksgauy] has joined #se2600 09:35 -!- skiboy [skiboy@gateway/vpn/privateinternetaccess/skiboy] has quit [Ping timeout: 264 seconds] 10:25 < aestetix> http://money.cnn.com/2018/01/08/media/oprah-golden-globes/index.html 10:25 < PigBot> Title: Sources: Oprah Winfrey 'actively thinking' about running for president - Jan. 8, 2018 (at money.cnn.com) http://tinyurl.com/ybgfy97c 10:26 -!- K4k [elw@unaffiliated/k4k] has quit [Read error: Connection reset by peer] 10:42 -!- skiboy [skiboy@gateway/vpn/privateinternetaccess/skiboy] has joined #se2600 11:08 -!- K4k [elw@unaffiliated/k4k] has joined #se2600 11:37 <@Dagmar> Sweeet crap... https://www.mcsweeneys.net/articles/nihilistic-password-security-questions 11:37 < PigBot> Couldn't snarf url: [Errno 1] _ssl.c:492: error:14077438:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert internal error. http://tinyurl.com/jge669d 11:38 <@Dagmar> Those are some _awesome_ account security questions 11:39 < xray> since I answer all security questions with random gibberish it really doesn't matter what the question is. 11:39 < xray> Might as well be "Do you walk to school or carry your lunch?" 11:40 <@Dagmar> "What is the name of your least favorite child?" 11:40 < xray> se2600 of course 11:40 <@Dagmar> "What is your ex-wife's newest last name?" 11:40 <@Dagmar> Questions like that are _awesome_ 11:40 < xray> fetish barf gland reality no some grief letter 11:41 < xray> I think 11:41 < xray> will have to check password database to be wure 11:41 < xray> sure 11:42 < xray> :) 11:58 <@Catonic> oh man, I heart that. 11:58 <@Catonic> it's so dark 12:02 <@Catonic> "What is the lastname of your third craziest girlfriend ever?" 13:54 <@Evilpig> fuckin' clowns here I swear to god 13:54 <@Evilpig> STOP TRYING TO PHISH ME! https://gist.github.com/wilpig/4bfc1b23555368d783dc59423579018e 13:54 < PigBot> Title: phishing fail ยท GitHub (at gist.github.com) http://tinyurl.com/y93g6sqf 14:01 <@Corydon76> Evilpig: I've heard that the mistakes in those emails are intentional. They're trying to ensure that they only snag the truly gullible. Those in the middle can take up valuable time while they work out that the email is fraudulent. 14:06 <@Evilpig> They are wasting my fucking time 14:06 <@Evilpig> at least if you're going to try to phish, really go for it 14:07 <@Corydon76> Nope, they want smart people to look, laugh, and delete. 14:07 < xray> Just send the phish via mail chimp 14:07 <@Evilpig> they expect the people like me to call helpdesk, report it, forward it, etc 14:08 < xray> I love it when the send a phishing training announcement out using mail chimp. 14:08 <@Corydon76> Stupid people not only are fooled and send them money, but they may never catch on until the scammers are long gone. They DON'T want people to report it and get a criminal investigation started before they're done collecting from idiots. 14:09 < xray> they don't realize it's and oxymoron 14:09 < xray> they won't investigate before they scam people 14:09 < xray> there is a damage $$ limit that has to be exceeded before they will investigate 14:10 < xray> by the time they get evidence of that the scammers are long gone 14:10 <@Corydon76> To us ordinary plebes, yes. Scam a politician or a well-connected individual, and those limits go out the window. 14:11 < xray> I have tried to get credit card fraud investigated and the police won't even talk to me about it when I can give them the name and address of the offender and all the evidence. 14:12 <@Corydon76> Well, you aren't really the aggrieved party. If you report it, the credit card company has to reverse all but $50 of it, and it's the merchants who get stuck with the bill 14:12 < xray> The couldn't even decide if the police report should come from my local police station or the police station the offender lives in 14:12 < xray> lives near 14:13 < xray> I still had to go the fraud process with the credit card company and get new card. My time counts given I'm an infosec pro 14:13 <@Corydon76> We dealt with this as a merchant by using a trust service. If the credit card company ever reverses a charge that they said was reputable, they'll pay for the charge. 14:14 < xray> I was never charged any money, not even the $50 minimum. 14:14 <@Corydon76> Yep, standard industry practice 14:14 < xray> It just galls me that the offender walked away and I'm sure I wasn't the only one the defrauded. 14:14 <@Corydon76> $50 is what they're allowed to keep on you. In practice, no credit card company ever does. 14:15 <@Corydon76> xray: if it didn't cost you anything, he didn't defraud you 14:15 <@Corydon76> He defrauded the merchant 14:15 < xray> It cost me time 14:15 < xray> I get paid for my time 14:15 < xray> it cost me money 14:15 < xray> that I didn't get paid for 14:16 < xray> It looks like if you keep the criminal damages below a few million you get to walk away with the items/money 14:17 < xray> no wonder it's an epidemic 14:18 < xray> I should bill the credit card service for investigative costs. 14:19 < xray> So if they don't pay the bill is it fraud then? 14:19 < xray> Given that the perp caused me not to get paid? 14:20 < xray> Unfortunately it would be a Pyrrhic victory. 14:36 <@Catonic> If it's too good to be true, it probably is. 15:03 -!- K4k [elw@unaffiliated/k4k] has quit [Read error: Connection reset by peer] 15:18 -!- opticron [opticron@nat/digium/x-eonngycodhejyljh] has quit [Quit: leaving] 15:50 -!- K4k [elw@unaffiliated/k4k] has joined #se2600 16:05 -!- K4k [elw@unaffiliated/k4k] has quit [Read error: Connection reset by peer] 16:06 -!- dasunt [~dasunt@unaffiliated/dasunt] has joined #se2600 16:06 -!- mode/#se2600 [+o dasunt] by ChanServ 16:09 -!- K4k [elw@unaffiliated/k4k] has joined #se2600 16:21 -!- opticron [~opticron@75.76.59.35] has joined #se2600 16:21 -!- mode/#se2600 [+o opticron] by ChanServ 16:21 <@dasunt> It is ama,ing how many city regulations I'm actively breaking. 16:29 <@dasunt> I'd ask a council member if they could try to amend them in a way befitting current city conventions, but I don't want to give them ideas. 18:22 -!- remoford [~remo_lapt@c-69-137-84-154.hsd1.tn.comcast.net] has quit [Quit: Leaving.] 20:04 -!- LastChild [~RasPi@71.228.205.189] has joined #se2600 20:04 -!- mode/#se2600 [+o LastChild] by ChanServ 20:05 -!- ezelkow1 [~sasquatch@2601:282:702:1eb8:d198:5817:67c0:2485] has quit [Read error: Connection reset by peer] 20:25 <@Dagmar> I'm glad to see that Damore is filing a suit 20:33 < aestetix> Dagmar: did you look at it? 20:33 < aestetix> The emails and g+ posts it includes.... just wow. 20:34 < aestetix> At this point you'd have to pay me a *lot* of money to work at Google. And I still probably wouldn't. If they are that hostile to non-radical-left ideas. 21:18 <@Dagmar> I'd just have to have a lawyer handy 21:20 < aestetix> Google is gonna pay him fuckload of money to settle. They will get destroyed by discovery otherwise. 21:56 -!- skiboy [skiboy@gateway/vpn/privateinternetaccess/skiboy] has quit [Ping timeout: 264 seconds] 22:03 -!- skiboy [skiboy@gateway/vpn/privateinternetaccess/skiboy] has joined #se2600 22:06 -!- K`Tetch [~no@unaffiliated/ktetch] has joined #se2600 22:16 < K`Tetch> so.... 23:04 -!- K4k [elw@unaffiliated/k4k] has quit [Read error: Connection reset by peer] 23:16 -!- ezelkow1 [~sasquatch@2601:282:702:1eb8:e8be:e05f:35bb:96a0] has joined #se2600 23:16 -!- mode/#se2600 [+o ezelkow1] by ChanServ --- Log closed Tue Jan 09 00:00:47 2018