code logs -> 2021 -> Tue, 07 Dec 2021< code.20211206.log - code.20211208.log >
--- Log opened Tue Dec 07 00:00:20 2021
01:19 gizmore [kvirc@Nightstar-o763n8.dip0.t-ipconnect.de] has joined #code
01:21 gizmore|2 [kvirc@Nightstar-pnuhqd.dip0.t-ipconnect.de] has quit [Ping timeout: 121 seconds]
01:57 Degi_ [Degi@Nightstar-rt31q0.pool.telefonica.de] has joined #code
02:00 Degi [Degi@Nightstar-oamvgh.pool.telefonica.de] has quit [Ping timeout: 121 seconds]
02:00 Degi_ is now known as Degi
03:11 [R] [rs@genoce.org] has quit [Ping timeout: 121 seconds]
03:42 celmin [celticminst@Nightstar-p4p3ll.dsl.bell.ca] has joined #code
03:42 mode/#code [+o celmin] by ChanServ
03:43 celticminstrel [celticminst@Nightstar-a8r9v3.dsl.bell.ca] has quit [Ping timeout: 121 seconds]
03:43 celmin is now known as celticminstrel
04:54 catalyst_ [catalyst@Nightstar-ejd4sd.cable.virginm.net] has joined #code
04:54 catalyst [catalyst@Nightstar-ejd4sd.cable.virginm.net] has quit [Connection closed]
05:11 Vorntastic [uid293981@Nightstar-phvupn.irccloud.com] has joined #code
05:11 mode/#code [+qo Vorntastic Vorntastic] by ChanServ
05:46 Kindamoody[zZz] is now known as Kindamoody|afk
06:27 catalyst_ [catalyst@Nightstar-ejd4sd.cable.virginm.net] has quit [The TLS connection was non-properly terminated.]
07:14 [R] [rs@Nightstar-d7h8ki.org] has joined #code
07:14 mode/#code [+ao [R] [R]] by ChanServ
07:29 [R] [rs@genoce.org] has quit [Ping timeout: 121 seconds]
07:38 * McMartin deploys VT100 terminal control codes in anger
07:39
<&McMartin>
Get pain wrecked, curses.
07:56 abudhabi_ [abudhabi@Nightstar-vmf9tg.adsl.tpnet.pl] has quit [Ping timeout: 121 seconds]
08:13 abudhabi_ [abudhabi@Nightstar-sc8osl.dynamic.t-mobile.pl] has joined #code
08:17 Netsplit Deepthought.Nightstar.Net <-> Krikkit.Nightstar.Net quits: @PinkFreud
08:22 Netsplit over, joins: @PinkFreud
09:38 [R] [rs@Nightstar-d7h8ki.org] has joined #code
09:39 mode/#code [+ao [R] [R]] by ChanServ
09:50 abudhabi_ [abudhabi@Nightstar-sc8osl.dynamic.t-mobile.pl] has quit [Connection reset by peer]
10:08 abudhabi_ [abudhabi@Nightstar-vmf9tg.adsl.tpnet.pl] has joined #code
11:41 abudhabi__ [abudhabi@Nightstar-7lc5ii.adsl.tpnet.pl] has joined #code
11:44 abudhabi_ [abudhabi@Nightstar-vmf9tg.adsl.tpnet.pl] has quit [Ping timeout: 121 seconds]
12:20 catalyst [catalyst@Nightstar-ejd4sd.cable.virginm.net] has joined #code
12:49 catalyst [catalyst@Nightstar-ejd4sd.cable.virginm.net] has quit [Connection closed]
12:54 catalyst [catalyst@Nightstar-ejd4sd.cable.virginm.net] has joined #code
13:34
<@celticminstrel>
?
14:22
<&ToxicFrog>
But curses doesn't have getPaneRect()!
14:22
<&ToxicFrog>
celticminstrel: I suspect that McM is doing something that involves bypassing curses and just blatting terminal control codes to stdout directly
14:22
<&ToxicFrog>
(curses being a library for making text-based GUIs and whatnot)
14:23
<@celticminstrel>
I do know what curses is, yes.
15:02 abudhabi_ [abudhabi@Nightstar-kfb7i1.adsl.tpnet.pl] has joined #code
15:03 abudhabi__ [abudhabi@Nightstar-7lc5ii.adsl.tpnet.pl] has quit [Ping timeout: 121 seconds]
15:05 Vornicus [Vorn@ServerAdministrator.Nightstar.Net] has joined #code
15:05 mode/#code [+qo Vornicus Vornicus] by ChanServ
15:36 catalyst [catalyst@Nightstar-ejd4sd.cable.virginm.net] has quit [[NS] Quit: -a- Connection Timed Out]
15:40 catalyst [catalyst@Nightstar-ejd4sd.cable.virginm.net] has joined #code
16:01 catalyst [catalyst@Nightstar-ejd4sd.cable.virginm.net] has quit [Ping timeout: 121 seconds]
16:01 catalyst_ [catalyst@Nightstar-avref9.dab.02.net] has joined #code
16:08 catalyst [catalyst@Nightstar-ejd4sd.cable.virginm.net] has joined #code
16:10 catalyst_ [catalyst@Nightstar-avref9.dab.02.net] has quit [Ping timeout: 121 seconds]
16:36 catalyst [catalyst@Nightstar-ejd4sd.cable.virginm.net] has quit [[NS] Quit: -a- Connection Timed Out]
16:44 catalyst [catalyst@Nightstar-ejd4sd.cable.virginm.net] has joined #code
17:00 Vorntastic [uid293981@Nightstar-phvupn.irccloud.com] has quit [[NS] Quit: Connection closed for inactivity]
17:02 Emmy [Emmy@Nightstar-l49opt.fixed.kpn.net] has joined #code
17:44 catalyst [catalyst@Nightstar-ejd4sd.cable.virginm.net] has quit [[NS] Quit: -a- Connection Timed Out]
17:45
<&McMartin>
TF is right; specifically I was building a visualizer for an older Advent Of Code problem.
17:48 catalyst [catalyst@Nightstar-ejd4sd.cable.virginm.net] has joined #code
18:21
< Kizor>
Ooh, neato! I just got a mispelled text informing me that my package is on its way and you can track it at such-and-such an address.
18:21
< Kizor>
I haven't ordered any packages.
18:22
< Kizor>
What should I do in order to safely examine the scam site?
18:34
<@ErikMesoy>
Use a sandboxed browser, and don't input any identifying data, whether in a form or in a URL with elements like ?foo=54234 are the first things that come to mind
19:01 Kindamoody|afk is now known as Kindamoody
19:39 catalyst_ [catalyst@Nightstar-68a0fb.dab.02.net] has joined #code
19:41 catalyst [catalyst@Nightstar-ejd4sd.cable.virginm.net] has quit [Ping timeout: 121 seconds]
19:47 catalyst [catalyst@Nightstar-ejd4sd.cable.virginm.net] has joined #code
19:49 catalyst_ [catalyst@Nightstar-68a0fb.dab.02.net] has quit [Ping timeout: 121 seconds]
20:18
< Mahal>
Kizor: if you're asking the question, the answer is "don't".
20:18
< Mahal>
however, urlscan.io is ... passably safe for viewing URL's you're not sure about
20:33
< Kizor>
"... passably safe"?
20:34
< Kizor>
*cool beans. Though, what's "... passaby safe"?
20:34
< Kizor>
*passably
20:35
< Kizor>
And yeah, I got the impression from ErikMesoy's answer that the answer is "don't", since passing them identifying data as an URL element would totally have gotten me.
20:35
< Kizor>
(I deleted the SMS, btw)
20:48
< Mahal>
"passably safe" as in "it's a sandbox online so it's kind of OK if you know how to clean up URL's to strip personal ID"
21:05 catalyst [catalyst@Nightstar-ejd4sd.cable.virginm.net] has quit [[NS] Quit: -a- Connection Timed Out]
21:05 catalyst [catalyst@Nightstar-ejd4sd.cable.virginm.net] has joined #code
21:51
<@gnolam>
Kizor: they're mass texting you guys too, huh?
22:08 gnolam_ [lenin@Nightstar-j9ajs0.priv.bahnhof.se] has joined #code
22:11 gnolam [lenin@Nightstar-j9ajs0.priv.bahnhof.se] has quit [Ping timeout: 121 seconds]
22:27
< Kizor>
Package vill be ärriving soon for you too?
22:27
< Kizor>
(Btw, thanks, ErikMesoy)
22:31 gnolam_ is now known as gnolam
22:31 mode/#code [+o gnolam] by ChanServ
22:31
<@gnolam>
Received two or three. In the past week.
22:32
<@gnolam>
But apparently it is a massive campaign, with some proper phone malware attached.
22:33
< Mahal>
Flubot, in most cases
22:33
< Mahal>
It's down under, too
22:33
<@gnolam>
Appears so, yes.
22:36
<@gnolam>
Huh, apparently we have two simultaneous campaigns going on. But one of them is FluBot, hitting both Finland (where it apparently started a few days earlier) and Sweden.
22:40
<@gnolam>
And this is yet another data point that makes me doubt the usual explanation for why 419 scams are often so badly written ("To make sure the scammers don't waste their time and make sure only really gullible people respond"). Because these are atrociously written, and they definitely want to hit /everyone/ and not just the crème de la crème of the gullible.
23:14 Emmy [Emmy@Nightstar-l49opt.fixed.kpn.net] has quit [Ping timeout: 121 seconds]
--- Log closed Wed Dec 08 00:00:22 2021
code logs -> 2021 -> Tue, 07 Dec 2021< code.20211206.log - code.20211208.log >

[ Latest log file ]