[06:39] Maaz hi [06:39] Howzit Kilos [06:39] morning all [07:36] * Kilos cries [07:38] last year hail wiped out all fruit. this year black frost wiped mulderry trees clean of leaves and fruit [07:38] * Kilos loves mulberries and mulberry jam [07:39] and its called global warming? [07:39] im freezing my nuts off [07:39] hi Tonberry_ drussell [07:41] drussell can you make our meeting tuesday night at 20.30 and tell us where unity is heading maybe [09:32] o/ [09:34] \o [09:54] hi nuvolari Cantide [09:58] hello~ [09:59] nuvolari dis die begin van eie pad loop [09:59] https://spinnup.com/en/release/not-sorry/ [10:17] Maaz: coffee on [10:17] * Maaz washes some mugs [10:18] good afternoon all [10:18] hi Kilos, Cantide, nuvolari [10:18] Cantide: long time no spoken to, how's it going [10:18] hi charl [10:18] :) [10:21] Coffee's ready for charl! [10:22] Maaz: thanks [10:22] charl: Sure [10:30] charl, it's going well :) [10:30] how about you? [10:30] * Cantide is busy soldering something [10:31] i'm doing well [10:31] what are you doing ? [10:31] with the soldering i mean [10:32] haha trying to get 2 things to stick together [10:47] http://switchmodedesign.com/collections/arduino-shields/products/open-source-nixie-tube-shield [10:47] this :p [10:52] cool ! [12:56] ohi superfly [13:08] lol. Doing speedtest.net test. Best ping = Vodacom Lesotho [13:09] hi bushtech [13:10] hi charl, kilos, others [13:12] hi bushtech [13:12] koud ne [13:13] Ja, en ek sien gaan Donderdag weer koud word [13:13] eish ons het dan twee nagte swart ryp gehad, hoe veel kouer moet dit word [13:14] Eish, ons het dit gelukkig gemis [13:15] al die moerbye weg [13:15] blare en vrugte [13:15] moerbeie? [13:16] sjoe ek vergeet [13:16] daai goeters [13:16] ok 'n woord wat ek lanklaas gesien het [14:10] hi Kilos [16:20] Maaz coffee on [16:20] * Maaz washes some mugs [16:21] Maaz with cremora [16:21] Ah! At last someone with taste [16:21] Maaz and milk [16:21] Now you're talking [16:24] Coffee's ready for Kilos! [16:25] Maaz thanks [16:25] Kilos: Okay :-) [16:32] hi magespawn [16:32] hi Kilos [17:20] hi magespawn [17:20] hi charl [18:43] Hey all, Kilos. [18:44] Anyone here IT for UP? [18:44] Found something I shouldn't... [18:44] hi theblazehen [18:47] hi theblazehen [18:47] hi magespawn [18:47] IT for UP? [18:48] magespawn, yeah [18:48] not getting it, what is UP? [18:48] university of pretoria [18:48] ahh right [18:48] Symmetria, might know [18:48] ty [18:49] It's personal info of people so I kinda wanna let someone know [18:51] i think someone that comes on here is at that varsity [18:51] one of the newish guys [18:52] Kilos, ty [18:52] ill try remember who it is and let you know [18:53] thanks Kilos [18:54] np [18:54] hope i got it right though, someone said they studying atm [18:57] kk [19:05] Got data of 218417 people ... :/ [19:06] ouch [19:06] yeah.. [19:07] also marketing data, but yeah.. [19:07] wow theblazehen, open database or something/ [19:08] magespawn, db dump in csv... [19:08] hectic, looks like someone left something open that should be closed [19:10] yeah, all marketing data is open :( [19:12] >180 MB of data [19:17] good thing it was found by you and not by anonymous otherwise people would have been reading it on pastebin [19:17] contact the UP CERT and let them know [19:20] charl, CERT ? [19:20] http://en.wikipedia.org/wiki/Computer_emergency_response_team [19:20] where i work we also have one [19:20] every university *should* have a CERT [19:21] Can't find with quick google, any tips? [19:21] nah then just contact the ict department [19:21] kk, ty [19:22] maybe they offer a reward for the tip :) [19:22] ya free coffee and biscuits with the head [19:23] nah man you ask for too little [19:23] at least ask for a cake [19:23] you are paving the way for your future studies [19:23] hahaha [19:23] charl, yeah, that'd be nice! :D [19:36] or considering the way some people react to this sort of disclosure, a lawsuit [19:40] magespawn, that'd suck... [19:40] fuck it, ill STFU [19:41] lol [19:41] Or anonymous mail.. yeah [19:43] that might be better [19:54] Yeah, I'll do that [19:55] Safe to do it with straight mail from my current server, which has reverse DNS pointing to theblazehen.com? I've been in the monthly meetings here with my IRL name [19:58] do you own theblazehen.com/ [19:58] magespawn, yeah, but not with real name on whois [19:59] magespawn, better to just create new VPS? [20:04] yeah that's true magespawn [20:04] might be a bit paranoid, i was just thinking about this http://www.htxt.co.za/2013/08/20/your-pins-accounts-and-invoices-leaked-onto-net-by-city-of-joburg/ [20:04] some people are really dumb [20:04] theblazehen: no that would be dumb, your domain records point straight back at you [20:05] unless you use anonymous whois but even then the registrar has the info [20:05] your credit card everything [20:05] use tor and send mail through some anonymous channel [20:05] magespawn, got a friend who is in UP to send me the email address for someone in CS dept [20:05] in every mail you send your IP of the sender is also recorded [20:05] charl, anon whois, plus fake name [20:05] yeah, TOR sounds good [20:06] then they stll have your credit card details [20:06] the registrar i mean [20:06] charl, shit. Can't disable? [20:06] charl, used paypal with fake name also [20:06] ah whow [20:06] you are thorough :) [20:06] you border on the illegal :P [20:06] lol [20:06] charl, hehe ; [20:06] ) [20:06] but yeah your real name is linked here [20:06] bleading edge [20:06] nah use tor [20:06] bleeding [20:07] charl, yeah, thats why I was thinking. Will use TOR. Any recommendations? Or just sign up for a hotmail or something? [20:07] hotmail is good [20:07] kk, ty [20:08] you can use a service like one of https://www.google.nl/search?q=send+anonymous+email [20:08] but i don't know how realiable they are [20:08] and they might get caught in the spam filter [20:08] hotmail is best [20:08] nobody blocks hotmail [20:09] yeah, I'll use hotmail then. Thanks for the advice :) [20:09] but it's sad that some people are too stupid to see the value in these tipoffs [20:09] how they see it as a threat, it's so brain dead [20:10] at least i can say these tipoffs are very much appreciated where i work [20:10] and that students can do it under their own name without any fear of law suits [20:10] i just don't know if they get cake either :P but i hope they do [20:10] charl, hmm, thats nice. Where would that be? [20:10] A university? [20:10] yes [20:11] i work in the ict department so to speak [20:11] kk. Think it's likely that they'd check logs to see who accessed the files? [20:12] they will most definitely do that if they are smart [20:12] we also had an incident and they went through the logs to see who did the "pen testing" [20:12] So they'd then see I accessed it? Maybe it's better to leave it then.. [20:12] i think so too [20:12] don't put yourself in the risk [20:12] yeah [20:13] as sad as it is to say that [20:13] just get a friend to do it for you [20:13] yep :( I'd really have liked to have cake :( [20:13] lol [20:13] Kilos, lol [20:13] Kilos: then they will still look at the logs and get theblazehen's IP [20:14] oi [20:14] it doesn't matter who reports it now [20:14] if you want to do pen testing you have to use tor right from the start [20:14] well nothing bad was done so what [20:14] charl, it was actually an accident really [20:14] yeah exactly that's what i also thought [20:14] then it's too late :) [20:15] Was looking at their mirrors, went up a directory, then saw the "marketing" folder [20:15] the fact that you did not go in via tor but openly proves no evil intent [20:16] night guys, sleep tight. [20:16] bushtech: it depends on the way *they* look at it [20:16] nn Kilos [20:16] ask the fly for advice [20:16] but it makes a logical defence [20:17] bushtech, logic does not always apply... [20:18] I think I'll leave it... [20:18] theblazehen: I say report it. More than likely the admin will be apreciative [20:19] btw was looking at https://www.whonix.org/ the other day [20:19] Had a look at data, didn't have ID no's in [20:19] that's pretty fascinating [20:19] SilverCode, but if not? I'd rather be safe [20:19] theblazehen: it is unlikely the admin who fucked up, but rather someone who doesn't understand security [20:20] theblazehen: so the admin will see the info in the correct light [20:20] SilverCode, yeah, it was in a folder with other marketing stuff [20:20] Still rather be safe. [20:20] Maybe if I access the files from a few other machines? [20:21] theblazehen: use tor and force a different proxy every time [20:21] yeah! [20:21] then at least it procudes reasonable doubt [20:21] systemctl status openvpn@client [20:21] a different exit node i mean [20:21] there is a way to force that [20:21] > active (running) [20:21] :D [20:21] yes and some other non-tor nodes in the mix [20:21] charl, good idea [20:22] BTW my VPN is a tor node too [20:22] But not exit :( [20:22] paranoia mode: on :) [20:22] nah you can never be too secure [20:22] yeah [20:23] theblazehen: is it a publically accessible server, or just accessible from with the UP network? [20:23] Well unless you run LFS and communicate over IPOAC and check every packet, and route it all through TOR and then to one of your VPN's that you paid for via bitcoin? [20:24] SilverCode, public access. [20:24] charl, and run all that on a FPGA [20:24] too secure? [20:24] makes my head spin :) [20:25] a field programmable gate array ... [20:25] sheesh [20:25] no hardware backdoors! [20:25] ip over avian carriers ?! [20:25] yeah! [20:25] yeah that does perhaps go over the top [20:25] :D [20:26] What do they say? The safest machine is one not plugged in? [20:26] Oh AND power off a UPS to prevent side cahnnel attacks [20:26] yeah [20:26] and keep it underground and in faraday cage [20:27] prevents thaty laser window listening thing, as well as EMI [20:27] yeah and if you do want to host something host in http://www.cyberbunker.com/ :) [20:27] charl, I wish I could :( [20:27] Barely able to pay for digital oceans cheapest + backup [20:28] ah digital ocean [20:28] was looking at them the other day [20:28] decided to go with tilaa instead though [20:28] ah kk. Personal or work? [20:28] because digital ocean has some traffic limits [20:28] for personal this time [20:28] and tilaa has unmetered traffic [20:28] i just want to have ddos protection [20:29] so that if i do get a ddos that i don't get insane bills [20:29] charl, hmm. Any locations in africa? [20:29] Wait, so you pay per TB? [20:29] Afaik DO has $0.03 per TB over cap [20:29] or GB, can't remember [20:29] probably per GB [20:29] if you get a major incoming ddos you're screwed [20:30] yeah, that's true. Can't you use cloudflare? [20:30] it's not an http server [20:30] ah [20:30] i want to use it combination smtp+irc+xmpp [20:30] ok, found the folder [20:31] hetzner just limits you down to 10mbps after the first 1tb [20:31] yeah ... that is pretty well hidden [20:31] DIY cloudflare? One or two cheap VPS's with hard data cap + round robin DNS or something? [20:31] tilaa is fully unlimited [20:31] I mean, not hidden [20:31] SilverCode, ah, kk. See what I'm talking about.. [20:31] charl, nice [20:31] it is very doubtful that they can do anything to you if it's that open [20:32] but i don't know the legal system in z [20:32] za [20:32] charl, you also see it? [20:32] but just looking at the other stuff there, I'm not sure it is supposed to be private [20:32] SilverCode, have you looked at the data? [20:32] no [20:32] i have to go now, work tomorrow [20:32] have a good evening all [20:32] just the filenames for now :) [20:32] and good night :) [20:33] but now I see the "UP ALUMNI DATABASE SCAN" [20:33] cya charl [20:33] which probably *isn't* supposed to be there [20:33] SilverCode, yeah, the DB is what I got.. [20:34] so... STFU or not? [20:36] meh, it looks like it has been sitting there for a year [20:36] so I don't think it really matters either way [20:37] yeah [20:40] it looks like even the IT guys store stuff on that public FTP server [20:44] SilverCode, yeah [20:44] well fuck it, I won't do anything about it [20:45] ....so I think that DB dump are the least of their problems [20:45] I'm pretty sure one of these log file backups has the unshadowed version of their root password [21:00] SilverCode, damn.. [21:00] well.. /me gets tor browser :D [21:02] SilverCode, directory? Nothing in pub/up/it [21:10] SilverCode, I'm not finding anything?