--- Log opened Wed Dec 11 00:00:33 2019 00:36 < K`Tetch> I had the weirdest car malfunction this weekend. Went to get our new washer and dryer, i'm with a relative in the pickup, wifes driving my saturn, halfway home (~3 miles) she pulls over, says it sound funny and lurching. turns out its misfiring. Limp it home, wait for the engine to cool, and the code says misfire cylinder 4 00:38 -!- DrArkaneX [~drarkanex@unaffiliated/drarkanex] has joined #se2600 00:39 < DrArkaneX> https://www.plundervolt.com 00:39 < PigBot> Plundervolt (at www.plundervolt.com) http://tinyurl.com/vyeb6nx 00:39 < DrArkaneX> another intel "bug" 00:40 < K`Tetch> go to check, and the plug is actually loose. so i pull it, it's covered in soot, clean it, put it back in. idles ok. go to drive, it acts up again, but not all the time, only at low revs, and 3-4000. Previous owner (friend) says 'might be the injectors are dirty, but i pull the plug again. what loops to be a carbon bridge connecting the electrodes. so i tap it clean, and its fine. 00:41 < K`Tetch> its only when i cgo to check te gap, i notice the gaps gone again. The electrode had broken niside the plug, and was free moving from its normal position, to the other electrode. soat times, it was sparking inside the pliug, and others as normal 00:42 < K`Tetch> in 25+ years, i've NEVER seen a lpug do that, not without some obvious outside sign of damage, and not sponatainiously 00:46 < K`Tetch> DrArkaneX - one that requires hardare access, and a lot of detailed control, to 'play' with the voltages to get it, maybe 00:46 < K`Tetch> and each chip is different in what it takes 00:47 < K`Tetch> least, thats what i got from the method from the ars technica piece earlier 02:04 -!- K`Tetch_ [~no@unaffiliated/ktetch] has joined #se2600 02:07 -!- K`Tetch [~no@unaffiliated/ktetch] has quit [Ping timeout: 240 seconds] 02:53 -!- K`Tetch [~no@unaffiliated/ktetch] has joined #se2600 02:57 -!- K`Tetch_ [~no@unaffiliated/ktetch] has quit [Ping timeout: 250 seconds] 04:30 -!- DrArkaneX [~drarkanex@unaffiliated/drarkanex] has quit [Remote host closed the connection] 05:37 -!- NotLarry [~NotLarry@c-68-52-173-111.hsd1.tn.comcast.net] has quit [Ping timeout: 250 seconds] 05:45 -!- NotLarry [~NotLarry@c-68-52-173-111.hsd1.tn.comcast.net] has joined #se2600 05:45 -!- mode/#se2600 [+o NotLarry] by ChanServ 07:13 <@Dolemite> mr0ning, be0tches and h0ez! 07:15 * aestetix hugs Dolemite 07:32 <@Evilpig> this new trend of coming up with stupid names and logos for exploits is something else 07:32 <@Dolemite> I'm waiting for someone to name one "Butthurt" 07:36 < aestetix> oh god is there a new one? 07:37 < aestetix> don't forget vanity urls 07:38 <@Dolemite> aestetix: Plundervolt 07:39 < aestetix> no domain name? 07:39 <@Dolemite> https://www.plundervolt.com 07:39 < PigBot> Plundervolt (at www.plundervolt.com) http://tinyurl.com/vyeb6nx 07:40 < aestetix> that isn't nearly as exciting as heartbleed 07:42 <@Dolemite> nope 07:43 < aestetix> plundershock would be a better name 07:43 < aestetix> or voltamort 07:45 <@Dolemite> No, you don't waste a good name on such an "exploit" 07:45 <@Dolemite> It seems weak in terms of elevation, as in you have to already have access that most folks wouldn't have, in order to run it. 08:18 -!- Mirage [mirage@raw.thehippo.net] has joined #se2600 08:18 -!- mode/#se2600 [+o Mirage] by ChanServ 09:15 < aestetix> oh god 09:15 < aestetix> https://time.com/person-of-the-year-2019-greta-thunberg/ 09:15 < PigBot> Greta Thunberg: TIME's Person of the Year 2019 | Time (at time.com) http://tinyurl.com/uvce4fc 09:58 <@Evilpig> Mirage: https://youtu.be/8HinYYcX7pM 09:58 < PigBot> YouTube (at youtu.be) http://tinyurl.com/wkgeatt 10:32 -!- dc0de [~jim@198.46.153.211] has joined #se2600 10:32 -!- mode/#se2600 [+o dc0de] by ChanServ 10:55 -!- crashcartpro [uid29931@gateway/web/irccloud.com/x-tpqrzeafimqinvex] has joined #se2600 10:55 -!- dc0de [~jim@198.46.153.211] has quit [Ping timeout: 276 seconds] 11:09 -!- dc0de [~jim@198.46.153.211] has joined #se2600 11:09 -!- mode/#se2600 [+o dc0de] by ChanServ 11:59 -!- K`Tetch_ [~no@unaffiliated/ktetch] has joined #se2600 12:03 -!- K`Tetch [~no@unaffiliated/ktetch] has quit [Ping timeout: 268 seconds] 12:05 -!- K`Tetch_ [~no@unaffiliated/ktetch] has quit [Ping timeout: 240 seconds] 12:55 -!- Mirage [mirage@raw.thehippo.net] has quit [Ping timeout: 265 seconds] 13:21 -!- Mirage [mirage@ra.thehippo.net] has joined #se2600 13:21 -!- mode/#se2600 [+o Mirage] by ChanServ 13:29 -!- rpifan [~rpifan@p200300D2671CBE444F37622C2C0CB87A.dip0.t-ipconnect.de] has joined #se2600 16:08 <@Dagmar> https://smile.amazon.com/gp/product/B081348R53/ <-- just got it in. Very respectable speeds and a decent price 16:08 < PigBot> Robot Check (at smile.amazon.com) http://tinyurl.com/reu4vln 16:08 <@Dagmar> THU 128GB External SSD Portable Solid State Drive USB 3.1 Gen 1 Type-R 18:27 -!- dc0de [~jim@198.46.153.211] has quit [Ping timeout: 268 seconds] 18:32 -!- rpifan [~rpifan@p200300D2671CBE444F37622C2C0CB87A.dip0.t-ipconnect.de] has quit [Ping timeout: 245 seconds] 18:46 -!- K`Tetch [~no@unaffiliated/ktetch] has joined #se2600 18:54 -!- DrArkaneX [~drarkanex@unaffiliated/drarkanex] has joined #se2600 18:55 < DrArkaneX> https://www.wsmv.com/news/us_world_news/scary-hacker-plays-tiptoe-through-the-tulips-through-surveillance-camera/article_89b92b03-dde8-5256-83f3-b4e91162ac10.html 18:55 < PigBot> SCARY: Hacker plays 'Tiptoe through the Tulips' through surveillance camera, claims to be Santa | US World News | wsmv.com (at www.wsmv.com) http://tinyurl.com/wy5sn5o 18:55 -!- dfused [~flajackun@50.125.252.102] has joined #se2600 18:56 <@Dagmar> It's a near-certainty that her account was compromised via a re-used password, quite possibly by someone who fits the definition of insider 19:01 < DrArkaneX> @dagmar she got it black friday, i'm sure the default password and a port was opened thru her router.. just some dumb shit 19:01 <@Dagmar> They dont' take passwords like that 19:01 <@Dagmar> They do the Oauth2 dance 19:01 < DrArkaneX> or maybe the ring was a return and they didn't clear defaults 19:02 <@Dagmar> ...but if you're dumb and/or lazy and use the same crap password everywhere, when you make your cloud account with ring, someone can readily login with that publicly-known password 19:02 < DrArkaneX> yea, that's probably wha happened, I could see the deer in a headlight look in her face 19:03 < DrArkaneX> my troll side finds it sort of funny, but as a dad, i'd be pissed as hell 19:04 < DrArkaneX> i'm sure ring will investigate it because now people are gonna go crazy after that report 19:06 <@Dagmar> Also, IIRC that incident happened at least a month ago 19:07 <@Dagmar> If not her then an nearly identical thing to someone else, so it's likely some prankster scraping Ring's site for idiots reusing passwords 19:08 < DrArkaneX> :) 19:08 < DrArkaneX> how ya doing man? 19:10 <@Dagmar> Trying to shake a splitting headache 19:10 < DrArkaneX> :( goody's powder 19:12 <@Dagmar> Actually having a way to guarantee AD auth doesn't magically stop working again would do better 19:12 < DrArkaneX> ah, that kinda headache... 19:21 <@Dagmar> Yeah I was in the middle of the uptake cycle on a large pile of CGI/HTML stuff building a management interface when this other system started playing up 20:54 -!- DrArkaneY [~drarkanex@107.77.240.64] has joined #se2600 20:55 -!- DrArkaneZ [~drarkanex@107.77.240.64] has joined #se2600 20:58 -!- DrArkaneX [~drarkanex@unaffiliated/drarkanex] has quit [Ping timeout: 268 seconds] 20:59 -!- DrArkaneY [~drarkanex@107.77.240.64] has quit [Ping timeout: 250 seconds] 21:00 -!- DrArkaneZ is now known as DrArkaneX 21:00 -!- DrArkaneX [~drarkanex@107.77.240.64] has quit [Changing host] 21:00 -!- DrArkaneX [~drarkanex@unaffiliated/drarkanex] has joined #se2600 --- Log closed Thu Dec 12 00:00:35 2019