00:43:59  * pfrazeequit (Remote host closed the connection)
01:09:21  * fotoveritequit (Quit: fotoverite)
01:51:31  * contrahaxjoined
02:01:50  * akivajoined
02:08:04  * yorick_joined
02:08:05  * yorick_quit (Changing host)
02:08:05  * yorick_joined
02:10:50  * yorickquit (Ping timeout: 250 seconds)
02:13:59  <emilbayes>This is still one of my all time favourite tweets: https://twitter.com/JZdziarski/status/753223642297892864
03:01:50  * phatedquit (Remote host closed the connection)
03:14:00  * fotoveritejoined
03:37:11  * contrahaxquit (Quit: Sleeping)
03:49:21  * contrahaxjoined
04:10:46  * phatedjoined
04:16:12  * phatedquit (Ping timeout: 276 seconds)
05:02:18  * contrahaxquit (Quit: Sleeping)
05:07:39  * warbrettquit (Quit: Connection closed for inactivity)
05:44:45  <akiva>emilbayes: Thanks, I hadn't seen that before. I thoroughly enjoy GnuPG/PGP and it never ceases to amaze me how often people blame it for all of SMTP's and e-mails failings
05:46:06  <emilbayes>akiva: :) The PGP book is really lucid as well! Don't know anything about email
05:46:54  <akiva>emilbayes: Which book is that? Everything I know is simply from experience, `man` pages, and tips from the Arch, GnuPG, and TOR communities.
05:47:04  <emilbayes>ftp://ftp.pgpi.org/pub/pgp/7.0/docs/english/IntroToCrypto.pdf
05:47:06  <akiva>I keep thinking about how to integrate it into some fun Node projects
05:47:13  <akiva>Oh, nice. Thanks!
05:47:27  <akiva>I just *love* FTP. ;)
05:47:38  <emilbayes>I'm working on one now. Not sure I'll use PGP, but definitely will use all the ideas
05:47:39  <emilbayes>Hehe
05:47:49  <emilbayes>Didn't even realise it was served over FTP
05:47:59  <akiva>The greatest resource PGP is lacking is extensive use cases for the layperson
05:48:27  <akiva>Too many people just learn enough to cause damage, such as only encrypting and decrypting messages
05:48:38  <emilbayes>yeah, I'm working on a tool for journalists in countries where freedom of speech is suppressed
05:48:42  <akiva>I just finished revamping my config files for security yesterday
05:48:58  <akiva>emilbayes: You've got my curiousity
05:51:18  <emilbayes>akiva: Hehe, well, I'm still thinking about all the security stuff. I'd like to deliver content to readers that don't have internet access, think Syria. But I fear for the integrity of the content, so I'll have to figure out how to ensure trust, even in face of compromised keys
05:51:34  <emilbayes>pretty much all of the journalists we're working with have gone to prison and been tortured
05:52:47  <emilbayes>it will probably be distributed though ad hoc mest networks and sneakernet
05:53:28  <emilbayes>Right now I'm trying to figure out if I can use existing PKI to bootstrap trust
05:54:31  <akiva>Interesting. Would some form of hash table or blockchain help in maintaining integrity of content?
05:55:21  <akiva>I lived in Israel for a few years and heard plenty of what goes on in the neighbouring countries. A lot doesn't even make it to the news. A shocking amount.
05:55:36  <emilbayes>akiva: Yeah, I'll probably use hypercore, but how to reestablish trust after a key has been compromised is still an issue when there might not be access to a central trusted entity
05:55:53  <emilbayes>akiva: Exactly, that's what this will try and solve as well
05:56:23  <emilbayes>akiva: Help with making it easy to distribute content in and out of the country, and ensure the integrity during transport
05:56:25  <akiva>I would be keen on hearing more about your progress as it developes. :)
05:56:51  <akiva>Is most of this censorship not being addressed currently via TOR?
05:56:58  <emilbayes>akiva: hehe, will probably post lots of questions on here about different aspects of it
05:57:02  <akiva>I figured most free speech was via TOR in these countries.
05:57:13  <emilbayes>akiva: Well, what does tor help when there is no internet? :p
05:57:24  <akiva>True, true. Forgot that part. :)
05:57:53  <emilbayes>anonymity is not as much an issue as integrity and distribution is
05:58:08  <emilbayes>Is there a tor browser for mobile?
05:58:17  <emilbayes>there must be
05:58:41  <emilbayes>arr yeah, a tor proxy
05:59:08  * phatedjoined
05:59:14  <akiva>Yeah there are
05:59:24  <akiva>Also a TOR Browser, but it's rather rubbish
06:00:22  <akiva>I wish I had more experience regarding I2P also. One day when I have more time. :)
06:00:57  <emilbayes>I2P?
06:00:59  <akiva>emilbayes: So how is this tool meant to work if it lacks a reliance on data connectivity
06:01:23  <akiva>emilbayes: I2P and Freenet are two other alternatives to a "dark web" of sorts.
06:01:33  <akiva>But they don't do the TOR routing of the clear web
06:01:44  <akiva>So not helpful for your needs, I suspect.
06:02:09  <emilbayes>Will take a look at I2P
06:02:34  <akiva>emilbayes: Yeah, it's interesting.
06:03:40  * phatedquit (Ping timeout: 244 seconds)
06:03:41  <emilbayes>akiva: Well, that's what I'm working on. But essentially you can just distribute the content by whatever means, P2P, BLE, mDNS, USB. That's why the content need to be signed and verified
06:04:37  <akiva>Very interesting. This sounds like a fun problem to solve.
06:05:06  <akiva>BLE isn't a great option, perhaps.
06:05:25  <emilbayes>akiva: Seems like a problem that a lot of people are trying to solve now with the whole decentralized web movement
06:06:27  <emilbayes>akiva: Oh well, I don't haven't research transports yet, that's just an implementation detail ;)
06:06:39  <akiva>emilbayes: I like decentralisation. A lot of tools built for security purposes make too many assumptions on safety or proper usage, though. I mean, even PGP, a great tool, is only as secure as the knowledge of the user employing it. Which is often nil.
06:07:24  <akiva>I worked on a hugely flawed, massive "IoT" project for a large company... I like to think about things in ways of exploitation...
06:07:37  <akiva>In the sense of pentesting, I suppose you could say.
06:08:12  <akiva>So, when you talk about the capabilities of this app working on phones, I immediately think "Uh oh". :)
06:08:37  <emilbayes>akiva: Yeah, you need to educate your user. In this case I hope that will be a bit easier given the high stakes. And I think a lot of the time, unnecessary introductions to crypto are given or pub/priv keys are an afterthought for the user, like if you just want to get started with git and github
06:08:39  <akiva>But, I suppose I don't know enough as to the approach yet to say.
06:09:16  <emilbayes>akiva: Sure, it's important. But to be honest I don't know enough about the project yet
06:09:35  <emilbayes>akiva: Doing a lot of research and experimentation
06:09:49  <akiva>emilbayes: Yeah, I got it. I think it sounds like you are working on a great project. I look forward to hearing more about it.
06:10:40  <emilbayes>akiva: Is this you? https://github.com/akiva
06:10:49  <akiva>emilbayes: Yes, it is.
06:11:25  <akiva>Mostly rubbish. Sadly, most of my work has been as a contracted/freelancer, not as much OSS as I would desire.
06:11:29  <akiva>LOL
06:12:08  <akiva>emilbayes: Why do you ask?
06:12:23  <emilbayes>cyber stalking ^^
06:12:46  <akiva>*high five*
06:13:35  <emilbayes>checking your stars to see if you have good taste :p
06:13:38  <akiva>Got a job for me? ;)
06:13:40  <akiva>LOL
06:13:44  <akiva>That is too funny
06:14:02  <akiva>emilbayes: Let me know what your findings are.
06:14:14  <akiva>I want to know what my tastes are to cyber stalkers.
06:14:22  <emilbayes>Well I just followed you, so I'll let you be the judge
06:14:31  <akiva>I should also point out that my GH is almost all node stuff. No Lisp yet :)
06:14:46  <emilbayes>But this is circle jerking, I have pretty much the same taste
06:15:01  <akiva>Ha ha ha
06:15:05  <akiva>Just followed you, too.
06:15:30  <akiva>I gather most people who may enter this room have similar tastes in code?
06:15:57  <emilbayes>Haha yeah
06:18:21  <akiva>emilbayes: On a side note, I am available for new work, if you know of anything.
06:18:45  <akiva>At the moment I am hacking some baby monitors that were given to me to run my own software for a ghetto home security system
06:19:10  <akiva>It's pretty hilarious how poorly made these things are, software-wise.
06:19:12  <emilbayes>akiva: Haha, I don't have any money, and don't get anything for doing this, so I'm the wrong person to pitch
06:19:27  <akiva>emilbayes: Wasn't meant as a pitch, don't worry. :)
06:19:40  <emilbayes>Arr cool, you should look into hacking medical stuff. That's scary
06:19:48  <emilbayes>if you're the pentester type
06:19:51  <akiva>Ugh, I could imagine.
06:19:56  <akiva>I like that all, yeah
06:20:45  <akiva>I was trying to work on some medical software to develop and sell, but it's pathetic how that world works. They don't want anything unless it comes from a huge entity and costs millions, yet it's always flawed, has errors, and literally leads to deaths.
06:21:37  <akiva>I am in BC, Canada at the moment, and there is a program being built for $60 million that is now being investigated because it's so flawed and broken... It's not even meant to be done until 2024. What software takes that long to develop!!?
06:23:23  <emilbayes>Always the same story, with major corps doing gov sized software projects. You start to wonder who's at fault. The gov agency or the contractor... Anyway, I was thinking of medical devices
06:28:07  <akiva>emilbayes: Oh, definitely. I was just speaking out loud. Any particular device in mind?
06:28:15  <akiva>I would love to tinker with anything I can get my hands on.
06:28:32  <akiva>Most every device out there is riddled with holes.
06:28:57  <akiva>I will be back momentarily. Feel free to message me and I will respond when I am back.
06:29:10  <emilbayes>akiva: This might inspire you http://www.bloomberg.com/features/2015-hospital-hack/
06:29:55  <emilbayes>Pitched the idea that this might be worth looking into, to a documentary producer. They're doing a thing on it now in Denmark
06:30:24  <emilbayes>anyway, I gotta get some other stuff sorted as well, talk later :)
06:31:41  <akiva>emilbayes: Definitely! Cheers, I will check in to that link shortly.
06:36:35  <joepie91>akiva: loose note, may or may not work depending on the industry you work in, but some clients have no trouble having their thing developed as OSS when pitched to them
06:36:46  <joepie91>akiva: esp . for non-core-business things, internal tooling and such
06:37:20  <joepie91>whoops, I'm in a different channel from where I thought I was
06:37:31  <joepie91>ah well, same still applies :P
06:44:22  <akiva>joepie91: LOL
06:44:29  <akiva>I thought perhaps I was missing something there,
06:46:07  * fotoveritequit (Quit: fotoverite)
06:50:28  <joepie91>akiva: I meant it re: [08:11] <akiva> Mostly rubbish. Sadly, most of my work has been as a contracted/freelancer, not as much OSS as I would desire.
06:50:41  <joepie91>in that 'freelancer' and 'OSS" aren't necessarily mutually exclusive :)
07:02:31  * phatedjoined
07:06:51  * phatedquit (Ping timeout: 244 seconds)
08:06:35  <akiva>joepie91: Oh no, not at all. Just, unfortunately, the jobs I have worked at. I also meant, I haven't done as much on the side as I would've liked.
08:14:31  <joepie91>right :)
10:41:01  * thealphanerdquit (Quit: farewell for now)
10:41:31  * thealphanerdjoined
14:54:49  * pfrazeejoined
15:17:56  * fotoveritejoined
15:39:55  * contrahaxjoined
16:24:01  * warbrettjoined
17:56:08  <akiva>thealphanerd: Hello, friend.
18:25:12  * pfallenopquit (Ping timeout: 258 seconds)
18:30:47  * pfallenopjoined
19:09:32  * paul_irishquit (Ping timeout: 240 seconds)
19:37:52  * contrahaxquit (Quit: Sleeping)
19:49:55  * contrahaxjoined
21:05:52  * phatedjoined
21:50:52  * contrahaxquit (Read error: Connection reset by peer)
21:51:27  * contrahaxjoined
22:51:25  * contrahaxquit (Read error: Connection reset by peer)
22:52:00  * contrahaxjoined
23:18:22  * akivaquit (Quit: WeeChat 1.5)
23:30:31  * fotoverite_joined
23:31:40  * fotoveritequit (Ping timeout: 264 seconds)
23:31:40  * fotoverite_changed nick to fotoverite
23:37:12  * paul_irishjoined
23:37:12  * paul_irishquit (Excess Flood)
23:37:51  * paul_irish_joined
23:41:20  * phatedquit (Remote host closed the connection)