02:09:01
torir:matrix.org:
I want to switch Matrix homeserver, any recommendations?
02:37:49
ocean:nope.chat:
nope.chat seems pretty stable
02:38:53
gan:skhron.org:
unredacted.org fairly stable too
02:39:35
gan:skhron.org:
and belongs to anti-censorship project that runs thousand of Tor nodes
03:18:01
ravfx:xmr.mx:
xmr.mx still far from being overloaded and so can accept more people.
03:18:02
ravfx:xmr.mx:
DM me if you want one
03:19:32
gan:skhron.org:
RavFX, you saw ongoing attacks on I2P and Tor by the way
03:19:44
gan:skhron.org:
I believe you run some stuff over it
03:20:40
gan:skhron.org:
https://mastodon.social/@nusenu/116019465111074574
03:20:41
gan:skhron.org:
https://github.com/PurpleI2P/i2pd/issues/2312
03:20:41
gan:skhron.org:
https://www.reddit.com/r/i2p/comments/1qvalmq/megathread_ongoing_attack_on_i2p_network_causing
03:30:11
ravfx:xmr.mx:
@gan:skhron.org: Someone did dos/ddos my explorer two days ago (until I went nuclear and put it behind anubis)
03:30:11
ravfx:xmr.mx:
As far as I2P, I do find it extremely unreliable since a while, I personally don't connect to my own with i2p anymore (when it work, it's just too slow)
03:30:11
ravfx:xmr.mx:
Other than that, tor is often under attack like from time to time some of my random service can't TOR anymore until I relaunch them... but there still reliable.
03:31:07
ravfx:xmr.mx:
my monitoring so it's offline at lot of time
03:32:16
ravfx:xmr.mx:
But if tor is "under attack", it's nothing new...
03:32:30
ravfx:xmr.mx:
right now i'm connecting with tor, it's working fine (unlike i2p)
03:34:44
ravfx:xmr.mx:
Right now both i2p nodes show as online, something must be wrong 😂
03:34:45
gan:skhron.org:
@ravfx:xmr.mx: yeah
03:34:45
ravfx:xmr.mx:
https://mrelay.p2pool.observer/m/xmr.mx/iysrEaczdUSDkQuRTAPZjKZV.png (clipboard.png)
03:35:02
gan:skhron.org:
funny, my router killed itself
03:35:08
gan:skhron.org:
I2P router *
03:36:32
ravfx:xmr.mx:
both i2p are on the bottom so it say by itself (I send probes all at the same time, first shit to answer get on top)
03:36:51
ravfx:xmr.mx:
slowest one at the bottom and after 30 seconds they show as offline
03:38:27
ravfx:xmr.mx:
There we go, it was juust a fluke
03:38:29
ravfx:xmr.mx:
https://mrelay.p2pool.observer/m/xmr.mx/fLYJAvwgumNxsuygqGduYBmT.png (clipboard.png)
03:40:42
gan:skhron.org:
Tor isn't really affected by attack in terms of speed, but i2p (beside being already pretty slow) is now grinding to a halt
03:41:09
ravfx:xmr.mx:
Yeah, and i2p is been unusable for months imo
03:41:18
gan:skhron.org:
my i2p router on a commercial machine can't really make tunnels at all
03:41:53
ravfx:xmr.mx:
Everything is back to normal!!
03:41:54
ravfx:xmr.mx:
https://mrelay.p2pool.observer/m/xmr.mx/YxfHvlNwOjoPulZrntWfkNUr.png (clipboard.png)
03:41:56
gan:skhron.org:
anyway, awaiting a fix - https://github.com/PurpleI2P/i2pd/issues/2312#issuecomment-3843110012
03:42:13
gan:skhron.org:
@ravfx:xmr.mx: classical I2P
03:43:21
ravfx:xmr.mx:
I know there a crapton of "spy" i2p nodes.
03:43:21
ravfx:xmr.mx:
Can they be just there to just disrupt i2p? without just trying to spy on them?
03:44:28
gan:skhron.org:
perhaps, hard to tell
03:44:32
ravfx:xmr.mx:
Since they moved out of Lionlink or whatever that shit was called, I did not find them back (they did not move where the monero spy nodes moved)
04:10:42
ravfx:xmr.mx:
That's one node for one month of operation. Tor was clearly working the whole time
04:10:44
ravfx:xmr.mx:
https://mrelay.p2pool.observer/m/xmr.mx/NQXxmRHvmDFIhVzCvOGNUklX.png (clipboard.png)
04:11:44
ravfx:xmr.mx:
That's the two other nodes.
04:11:45
ravfx:xmr.mx:
The two last big dips was maintainance
04:11:45
ravfx:xmr.mx:
The first big dip of "long duration" was a TOR outerage
04:11:45
ravfx:xmr.mx:
https://mrelay.p2pool.observer/m/xmr.mx/GftRNaKZwezQqIjCXYTHydHK.png (clipboard.png)
04:11:58
ravfx:xmr.mx:
Red arrow pointing when tor was dead
04:12:22
ravfx:xmr.mx:
So no, tor is quite reliable even if supposedly "under attack"
04:13:42
ravfx:xmr.mx:
But when tor die, I have to restart the service
04:14:16
gan:skhron.org:
yeah, however I believe the attacker isn't disrupt it directly, they want to mount a Sybil attack for the moment
04:15:03
gan:skhron.org:
the attack on Tor is likely coming from a botnet judging by residential ASNs
04:15:25
ravfx:xmr.mx:
Yeah, it's very possible.
04:15:25
ravfx:xmr.mx:
You you have the ASN/related IPs?
04:15:31
gan:skhron.org:
Nobody sane would spend that money on residential proxies
04:16:11
gan:skhron.org:
first masto link contains a post with the observatory > <@gan:skhron.org> https://mastodon.social/@nusenu/116019465111074574
04:18:53
ravfx:xmr.mx:
Oh wow, and there all over the place too
04:19:05
gan:skhron.org:
yeah, that's probably a botnet
04:19:41
gan:skhron.org:
and not the classical mass deployment by our beloved multi letter agencies
04:19:58
ravfx:xmr.mx:
yep, it's different
04:21:06
ravfx:xmr.mx:
But maybe the multi letter agencies just evolved, who know.
04:21:07
ravfx:xmr.mx:
There old tactic of running 69 services on the same IP (with different ports) don't work anymore and is too easy to block
10:19:28
321bob321:
https://systemweakness.com/building-a-local-ai-agent-security-lab-part-2-persistent-memory-poisoning-71124ef5b534
13:05:48
basses:matrix.org:
https://mrbruh.com/amd/
13:07:21
0xfffc:
https://xcancel.com/anthropicai/status/2019496582698397945
13:12:37
Cindy:
20,000 dollars just to make a compiler that's barely up to GCC's standard
13:13:34
testtank:matrix.org:
But it’s the worst it’s every gonna be
13:13:48
kico:
a couple year ago you would ask for a compiler and it would draw a cat
13:13:54
kico:
now it makes a crappy compiles
13:13:59
kico:
compiler*
13:14:05
kico:
give it a couple more years
13:14:32
Cindy:
anything but pay programmers fair wages
13:14:35
kico:
basses, nice stuff man! stupid AMD
13:14:58
kico:
Cindy, last time I checked programmers were amongst the best paid
13:15:06
kico:
might change soon yeah
13:15:16
kico:
but again who has a fair wage nowadays?
13:47:06
BlueyHealer:
I'm now watching videos on DIYers that are in way over their heads, and all of them think "I don't want to spend this much money", do something for cheap and end up having to fix it anyway.
13:47:10
BlueyHealer:
ye this reminds me of that
13:47:52
BlueyHealer:
"but it works short-term, and by the time it blows up, I'll already be out of the company and on my yacht"
13:49:31
gan:skhron.org:
https://xcancel.com/windscribecom/status/2019529769008685438
13:49:32
gan:skhron.org:
> THIS IS NOT A DRILL: The Dutch authorities, without a warrant, just seized one of our VPN servers saying they'll give it back after they "fully analyze it".
13:49:32
gan:skhron.org:
> [...]
15:46:02
ravfx:xmr.mx:
There is nothing like stealing ramdisks and expect to do forensic on it.
16:11:48
plowsof:
live forensics for a period of weeks/months then take ram as a F YOU
16:16:03
ofrnxmr:xmr.mx:
Ram expensive these days..
16:16:20
ofrnxmr:xmr.mx:
Probably just needed to borrow it
16:19:30
plowsof:
https://windscribe.com/knowledge-base/articles/where-is-windscribe-located/
16:21:34
plowsof:
translation: we are working with five eyes
16:50:11
basses:matrix.org:
location doesn't matter
16:50:20
ravfx:xmr.mx:
https://rentahuman.ai/
20:44:39
321bob321:
replace plowsof now ?
20:45:17
plowsof:
again? i've just started
20:46:12
321bob321:
we can rent a person as a ai now
22:25:15
nioc:
No, ai is renting humans
22:25:40
nioc:
Where does ai get the $ 4 dis
22:49:37
321bob321:
https://www.404media.co/vibe-coding-is-killing-open-source-software-researchers-argue/