code logs -> 2016 -> Sat, 30 Jul 2016< code.20160729.log - code.20160731.log >
--- Log opened Sat Jul 30 00:00:09 2016
00:30 Shady [ShadyGuru@Nightstar-8v9css.leh.ptd.net] has joined #code
00:32 Shady [ShadyGuru@Nightstar-8v9css.leh.ptd.net] has quit [[NS] Quit: Yay, he's gone]
01:02 catalyst [catalyst@Nightstar-bt5k4h.81.in-addr.arpa] has quit [Connection closed]
01:02 catadroid [catadroid@Nightstar-ahgerf.dab.02.net] has joined #code
01:35 macdjord [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has joined #code
01:35 mode/#code [+o macdjord] by ChanServ
02:02 Derakon is now known as Derakon[AFK]
02:34 macdjord [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has quit [Connection reset by peer]
02:46 macdjord [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has joined #code
02:46 mode/#code [+o macdjord] by ChanServ
02:47 macdjord [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has quit [Connection closed]
02:47 macdjord [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has joined #code
02:47 mode/#code [+o macdjord] by ChanServ
02:51 macdjord [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has quit [Connection closed]
02:52 macdjord [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has joined #code
02:52 mode/#code [+o macdjord] by ChanServ
02:53 mac [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has joined #code
02:53 mode/#code [+o mac] by ChanServ
02:56 macdjord [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has quit [Ping timeout: 121 seconds]
03:11 mac [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has quit [Ping timeout: 121 seconds]
03:11 macdjord|slep [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has joined #code
03:11 mode/#code [+o macdjord|slep] by ChanServ
03:32 mac [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has joined #code
03:32 mode/#code [+o mac] by ChanServ
03:35 macdjord|slep [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has quit [Ping timeout: 121 seconds]
03:36 macdjord [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has joined #code
03:37 mode/#code [+o macdjord] by ChanServ
03:38 macdjord|slep [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has joined #code
03:38 mode/#code [+o macdjord|slep] by ChanServ
03:39 mac [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has quit [Ping timeout: 121 seconds]
03:41 macdjord [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has quit [Ping timeout: 121 seconds]
03:45 macdjord [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has joined #code
03:45 mode/#code [+o macdjord] by ChanServ
03:47 macdjord|slep [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has quit [Ping timeout: 121 seconds]
03:50 mac [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has joined #code
03:50 mode/#code [+o mac] by ChanServ
03:51 catadroid` [catadroid@Nightstar-lpj9uq.dab.02.net] has joined #code
03:52 macdjord [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has quit [Ping timeout: 121 seconds]
03:53 catadroid [catadroid@Nightstar-ahgerf.dab.02.net] has quit [Ping timeout: 121 seconds]
04:02 macdjord [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has joined #code
04:02 mode/#code [+o macdjord] by ChanServ
04:05 mac [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has quit [Ping timeout: 121 seconds]
04:26 macdjord [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has quit [Connection reset by peer]
04:27 macdjord [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has joined #code
04:27 mode/#code [+o macdjord] by ChanServ
04:31 macdjord [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has quit [Ping timeout: 121 seconds]
06:09 macdjord [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has joined #code
06:09 mode/#code [+o macdjord] by ChanServ
06:21 Derakon[AFK] is now known as Derakon
06:45 Derakon is now known as Derakon[AFK]
06:58 Vornicus [Vorn@ServerAdministrator.Nightstar.Net] has quit [Connection closed]
07:18 Kindamoody|autojoin [Kindamoody@Nightstar-feii78.mobileonline.telia.com] has joined #code
07:18 mode/#code [+o Kindamoody|autojoin] by ChanServ
07:18 Kindamoody|autojoin is now known as Kindamoody
07:23 celticminstrel is now known as celmin|sleep
09:46 Kindamoody is now known as Kindamoody|afk
10:19 catadroid` [catadroid@Nightstar-lpj9uq.dab.02.net] has quit [[NS] Quit: Bye]
10:54 catalyst [catalyst@Nightstar-bt5k4h.81.in-addr.arpa] has joined #code
12:35 * catalyst runs an empty app on her phone, declares some form of victory
12:49
< catalyst>
...I could do that thing where I build another half-working IRC client >.>
13:38
< catalyst>
OK, it looks like android development is pretty sweet, and bounds ahead of WPF's nonsense (my other extensive experience with GUI apps)
14:11
< catalyst>
It appears that the Android SDK's naming for UI views is a lot more straightforward than either JavaFX or WPF
14:11
< catalyst>
heh
14:11
< catalyst>
LinearLayout vs FlowPane vs StackPanel
14:12
< catalyst>
...when did I become a GUI developer?
14:13 * TheWatcher patpats
14:13
< catalyst>
D:
14:13 * catalyst screams and thinks about pointers and memory addresses and
14:13
< catalyst>
It's inevitable though, I'm going to be one of those Lisp people
14:13
< catalyst>
I think I already am
14:13
<@TheWatcher>
It's okay, it could be worse.
14:14
<@TheWatcher>
You could be doign web development
14:14
< catalyst>
Everything is worse, by definition >.>
14:14
< catalyst>
You wait til I start deploying my stuff using clojurescript
14:15
< catalyst>
On the plus side, it seems I'm recovered enough from extreme anxiety/depression to actually develop significant things in my spare time for the first time since I was oh, 16?
14:16
<@TheWatcher>
:D Awesome
14:16
< catalyst>
you have *no* idea :D
14:22
<@TheWatcher>
Probably not, but I'm still happy for you!
14:23 * catalyst celebrates by finally going out to buy lunch
15:00 mac [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has joined #code
15:00 mode/#code [+o mac] by ChanServ
15:01 macdjord [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has quit [Ping timeout: 121 seconds]
15:13 macdjord|slep [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has joined #code
15:13 mode/#code [+o macdjord|slep] by ChanServ
15:16 mac [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has quit [Ping timeout: 121 seconds]
15:20 macdjord [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has joined #code
15:20 mode/#code [+o macdjord] by ChanServ
15:22 macdjord|slep [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has quit [Ping timeout: 121 seconds]
16:07 Kindamoody|afk [Kindamoody@Nightstar-feii78.mobileonline.telia.com] has quit [Connection closed]
16:07 Kindamoody|afk [Kindamoody@Nightstar-feii78.mobileonline.telia.com] has joined #code
16:07 mode/#code [+o Kindamoody|afk] by ChanServ
16:32 mac [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has joined #code
16:32 mode/#code [+o mac] by ChanServ
16:34 macdjord [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has quit [Ping timeout: 121 seconds]
16:38 macdjord|slep [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has joined #code
16:38 mode/#code [+o macdjord|slep] by ChanServ
16:40 mac [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has quit [Ping timeout: 121 seconds]
16:43 mac [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has joined #code
16:43 mode/#code [+o mac] by ChanServ
16:45 macdjord|slep [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has quit [Ping timeout: 121 seconds]
16:50 macdjord [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has joined #code
16:50 mode/#code [+o macdjord] by ChanServ
16:52 mac [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has quit [Ping timeout: 121 seconds]
17:19 mac [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has joined #code
17:19 mode/#code [+o mac] by ChanServ
17:19 celmin|sleep is now known as celticminstrel
17:21 macdjord [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has quit [Ping timeout: 121 seconds]
17:24 Vornicus [Vorn@ServerAdministrator.Nightstar.Net] has joined #code
17:24 mode/#code [+qo Vornicus Vornicus] by ChanServ
17:43 macdjord|slep [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has joined #code
17:43 mode/#code [+o macdjord|slep] by ChanServ
17:45 mac [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has quit [Ping timeout: 121 seconds]
17:49 macdjord [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has joined #code
17:49 mode/#code [+o macdjord] by ChanServ
17:51 macdjord|slep [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has quit [Ping timeout: 121 seconds]
17:54 thalass [thalass@Nightstar-rfp.o7s.158.104.IP] has joined #code
17:54 mode/#code [+o thalass] by ChanServ
18:13 Vornotron [Vorn@ServerAdministrator.Nightstar.Net] has joined #code
18:16 Vornicus [Vorn@ServerAdministrator.Nightstar.Net] has quit [Ping timeout: 121 seconds]
18:47 thalass is now known as thalass|gardenings
19:34 macdjord [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has quit [Ping timeout: 121 seconds]
19:45 macdjord [macdjord@Nightstar-r9vt2h.mc.videotron.ca] has joined #code
19:45 mode/#code [+o macdjord] by ChanServ
20:01 ion_ [Owner@Nightstar-6grqph.vs.shawcable.net] has joined #code
20:01 mode/#code [+o ion_] by ChanServ
20:04 ion [Owner@Nightstar-6grqph.vs.shawcable.net] has quit [Ping timeout: 121 seconds]
20:11 ion_ is now known as ion
20:16 Derakon[AFK] is now known as Derakon
20:17 thalass|gardenings is now known as Thalass|dinopunch
21:33 ion_ [Owner@Nightstar-6grqph.vs.shawcable.net] has joined #code
21:33 mode/#code [+o ion_] by ChanServ
21:36 ion [Owner@Nightstar-6grqph.vs.shawcable.net] has quit [Ping timeout: 121 seconds]
21:53
<@abudhabi>
What's the proper procedure when someone sends you a PGP encrypted message, but you've long lost the damn private key?
21:55
<@abudhabi>
This seems like something that happens a lot to me - losing the keys.
22:10
<@abudhabi>
Should I even care that this happens often? I mean, I can just generate a new key and send that with a retransmit request.
22:11
<@Tamber>
Then it's down to whether or not they trust that it's actually you that's made that retransmit request.
22:11
<@Tamber>
Rather than, perhaps, someone intercepting and pretending to be you.
22:11
<&McMartin>
Because that happens all the time
22:21 ion_ is now known as ion
22:26 catalyst [catalyst@Nightstar-bt5k4h.81.in-addr.arpa] has quit [Connection closed]
22:28
<@Tamber>
McM: Whether or not it happens that often is another matter entirely. :p
22:28
<&[R]>
How the frick are you losing your PGP keys?
22:29
<&McMartin>
Not using them for ten years and four new computer installs, most likely
22:32
<@abudhabi>
^ This.
22:32
<@abudhabi>
I interact with people who are paranoid to actually use that stuff only infrequently, and even those people are not paranoid to use it all the time.
22:35
<&McMartin>
I think I last used PGP in the manner described here (where sender and recipient have their own keys that they transmit via samizdat and use to sign and encrypt messages in email) some time in the 20th Century.
22:37
<@abudhabi>
I think the major issue is that the whole structure of this thing is designed for use by unspecified aliens, not human beings. I mean, humans apparently have great difficulty understanding enough of how it works to actually use it properly.
22:37
<&[R]>
You're supposed to send everything encrypted :/
22:38
<@abudhabi>
I had to walk myself through how this stuff works just now to figure out, again, what to do to make things start working again.
22:38
<&[R]>
It was pretty transparent when I actually had someone to send encrypted messages to. Just took like 5 minutes of setup.
22:39
<&McMartin>
R: I hate to tell you this, but you're on IRC right now
22:39
<&[R]>
Then again, I'm using GPG, so maybe that's different?
22:39
<&McMartin>
No, GPG is a clone of PGP
22:39
<&[R]>
I meant in usability
22:39
<&McMartin>
Exact clone. If GPG is more usable, it's because third-party developers integrate it.
22:40
<@abudhabi>
Thanks to TheWatcher, I have a file called PGP.txt in my dropbox, in a folder called 'magical rituals', that contains simple instructions on how to use PGP.
22:40
<&[R]>
McMartin: I mean, if you infrequently send encrpyted messages, an attacker knows what messages to focus on. If you send as many messages as possible, then they spend effort on non-valuable messages.
22:40
<@abudhabi>
Otherwise I'd have lost an hour or two figuring this shit out myself.
22:40
<@abudhabi>
For the Nth time.
22:40
<&McMartin>
R: So, like
22:41
<&McMartin>
It's the :/ that I'm having trouble reading here
22:41
<@ion>
Tangent from IRC/encryption
22:41
<@ion>
is there any real point to connecting to IRC over SSL?
22:41
<&[R]>
Kind of a half-frown?
22:42
<&McMartin>
No, no. I know what the emoticon is
22:42
<@Tamber>
ion: Other than your nickserv, etc. passwords?
22:42
<&McMartin>
But as far as I can tell you are also a human being using the Internet
22:42
<&[R]>
ion: yes. ircops should be using SSL. If you authenticate, you probably should use SSL.
22:42
<&McMartin>
You know full well that security in its model is basically impossible to use in a manner recognizable as "the Internet"
22:43
<@ion>
I guess those are worthwhile points for it
22:43
<&McMartin>
abudhabi's comment re: "unspecified aliens" is about right.
22:44
<&[R]>
Eitherway, my point was more "maybe your client's PGP/GPG integration is at fault here?"
22:44
<&McMartin>
IIRC, everything that isn't mutt is disastrous at it
22:44
<&McMartin>
But sure, let's blame the entire world for that~
22:44
<&[R]>
That explains my success.
22:45
<&McMartin>
Now to make sure you can't be trivially otherwise compromised, don't write or read the emails on systems connected to the Internet and don't transmit the information to that machine with USB devices
22:45
<&[R]>
mutt does have one extremely annoying case though, when you make it always send encrypted, but try to send to someone who you don't have a key for, you get locked in an infinite loop.
22:45
<&[R]>
infinitite ui loop*
22:47
<@abudhabi>
[R]: I am guessing, but I think my paranoid friend doesn't want his message read by anyone other than me. This includes not having it read by Google, and I use Google's webmail.
22:48
<&[R]>
Right, which is the use-case.
22:49
<&McMartin>
Google's about the only one I'd consider it safe from in that case
22:49
<@JustBob>
Someday, I might connect using SSL.
22:49
<@JustBob>
But today is not that day.
22:50
<@Tamber>
To localhost is cheating!
22:50
<@abudhabi>
Ionno. I heard that someone did a test of whether Google's algoriths use stuff from your mailbox. He set up some never-linked-to website directories and stuff, then sent links in locked archive attachments. And then detected google spiders crawling the website subdirs.
22:51
<@JustBob>
Besides, the concept of cryptography amuses me, because there's always rubber hose cryptanalysis.
22:51
<&McMartin>
Any other attacker dedicated or interested enough in attacking *you* will attempt malware infiltration which will either get your private keys outright and keylog the passphrase or screenscrepe the result
22:51
<&McMartin>
JustBob: Assumes physical access to the sender or recipient~
22:51
<@JustBob>
Anyone sufficiently dedicated can gain physical access.
22:52
<&[R]>
Sure. But they'd only have to do that if your messages were actually encrypted.
22:52
<@JustBob>
For that matter, we're trained to just give up our PINs and physical keys the moment we're interrogated.
22:53
<@abudhabi>
We're sometimes legally required to, yes.
22:53
<@abudhabi>
Oh, wait, what meaning of 'interrogate' do you have in mind?
22:53
<@JustBob>
The thing with cryptography, as far as I can tell, is that it's either tediously inconvenient to use, or sufficiently weak to pose no real challenge to any major entity with access to computational resources.
22:53
<@JustBob>
So, as with every security system, the flaw is in the user.
22:54
<@JustBob>
abudhabi - Oh, pretty much any physical coercion.
22:54
<@abudhabi>
Oh, OK.
22:54
<&McMartin>
"Something happened and you need to press OK to get on with things"
22:55
<@abudhabi>
Heh.
22:55
<&McMartin>
You can blame the user, but at some point you have to admit your initial spec was wrong~
22:55
<@abudhabi>
Yeah, I was unsure whether it was "please input PIN" or "men in blue require the password to your laptop".
22:56
<&McMartin>
JustBob: Schemas that are not the PGP model are actually quite a bit more reliable in this vein
22:56
<@abudhabi>
McMartin: Much of the tedious inconvenience appears to stem from *all the communicating parties needing to use it properly*.
22:56
<@JustBob>
McM - There's a balance between ease of use and user frustration that forces workarounds.
22:56
<&McMartin>
Yeah
22:56
<@JustBob>
i.e. I often just call people and talk about stuff and/or fax it instead of using encrypted email because it takes too damned long to encrypt, sign, and send.
22:57
<&McMartin>
Gonna relink https://www.usenix.org/conference/enigma2016/conference-program/presentation/smi th again
22:57
<@abudhabi>
Which is exponentially more difficult than just having one guy using it properly be safe on his end, and the rest doing it wrongly being unsafe just on their ends.
22:57
<&McMartin>
Because it's still great, and because it has The Best Slide.
22:58
<@abudhabi>
Hoyvin-Glayvin!
22:58
<&McMartin>
Launch photon torpedoes!
22:58
<@JustBob>
Also, password requirements are just as tedious.
22:58 * abudhabi goes to sleep.
22:58
<@JustBob>
For example, I have a system that requires lowercase, uppercase, numbers, and special characters.
22:59
<@JustBob>
And it must be 16 to 32 digits long.
22:59
<@abudhabi>
That is the WORST.
22:59
<@JustBob>
Now, what possible password am I going to use and remember?
22:59
<@JustBob>
Oh, right. qqqq1111!!!!QQQQ
22:59
<@Tamber>
The one written down?
22:59
<&McMartin>
JustBobIsAnAwesomeDude!!!1234
22:59
<@JustBob>
And for the next iteration, wwww2222@@@@WWWW.
22:59
<@JustBob>
Soforth and so on, because 52345kjsg@^@^#GFFgew758sdfhi89%&#SDGSDFG4i56 is not a memorizable password.
22:59
<&McMartin>
Having the password on a post-it note on the machine in question is more secure than you'd think~
23:00
<@JustBob>
They actually do security sweeps for that. :p
23:00
<@abudhabi>
Sometimes, I think the only sensible password system nowadays is some kind of physical notepad you carry around. And if you lose it, you simply get a new one and reset all your passwords.
23:00
<&McMartin>
Biometric two-factor
23:00
<@abudhabi>
Still needs a password.
23:00
<@ion>
abudhabi: Combine that with not recycling passwords accross accounts and you're basically set
23:00
<@JustBob>
Or a PIN. I can tolerate a PIN.
23:00
<&McMartin>
It's less important that it be a *good* password
23:01
<@JustBob>
I use a token and a PIN, personally.
23:01
<@abudhabi>
ion: If you recycled passwords, you don't need the notepad!
23:01
<@JustBob>
Well, for work. Personally, I just use the standard password fuckthispassword
23:01
<@ion>
most of hte passwords I have had to have written down are for things that don't deeply matter and are signed into once in a blue moon
23:01
<@JustBob>
I used to have an equation memorized that would generate passwords. So as long as I remembered what I keyed each password with, I could regenerate it.
23:01
<@JustBob>
Then I realized how asinine that was. :p
23:02
<@ion>
though for added fun I have a really lame cypher applied to the written text just to mess with anybody not me who tries
23:11 * [R] should start keeping a gpg'd txt file of passwords again.
23:12
<&[R]>
It's nice for inclusion in a will. Just provide the key and passphrase to decrypt, and your loved ones can deal with all your accounts properly.
23:14 catadroid [catadroid@Nightstar-k147j5.dab.02.net] has joined #code
23:19
<&McMartin>
[R]: That's a place where GPG *does* exceed PGP. GPG has a mode where you can skip the entire public-key part and just have a symmetrically-encrypted single file, passphrase-protected.
23:19
<&McMartin>
No external key is required.
23:19
<&McMartin>
(post-90s versions of PGP might do that too, I dunno)
23:21 catadroid` [catadroid@Nightstar-g4n9pf.dab.02.net] has joined #code
23:25 catadroid [catadroid@Nightstar-k147j5.dab.02.net] has quit [Ping timeout: 121 seconds]
23:41 catadroid` is now known as catadroid
23:42
<&ToxicFrog>
The answer to both of these is just "use keepass"
--- Log closed Sun Jul 31 00:00:25 2016
code logs -> 2016 -> Sat, 30 Jul 2016< code.20160729.log - code.20160731.log >

[ Latest log file ]