Join us now at the IRC channel.
*abeNd-org (~KKlenke@76.0.115.111) has joined #boycottnovell-social | Apr 04 01:59 | |
*oiaohm has quit (Quit: by all) | Apr 04 02:04 | |
*schestowitz has quit (Read error: Connection reset by peer) | Apr 04 04:25 | |
*pidgin_log has quit (Read error: Connection reset by peer) | Apr 04 04:25 | |
*schestowitz (~schestowi@unaffiliated/schestowitz) has joined #boycottnovell-social | Apr 04 04:25 | |
*pidgin_log (~roy@host86-147-16-124.range86-147.btcentralplus.com) has joined #boycottnovell-social | Apr 04 04:25 | |
*abeNd-org has quit (Remote host closed the connection) | Apr 04 06:09 | |
*pidgin_log has quit (Quit: Leaving.) | Apr 04 13:28 | |
XFaCE | gm qu1j0t3 | Apr 04 13:28 |
---|---|---|
*pidgin_log (~roy@host86-147-16-124.range86-147.btcentralplus.com) has joined #boycottnovell-social | Apr 04 13:28 | |
qu1j0t3 | XFaCE: hi | Apr 04 13:34 |
MinceR | http://www.danoah.com/2012/04/a-teens-brave-response-to-im-christian-unless-youre-gay.html | Apr 04 13:34 |
TechrightsSocial | Title: A Teen's Brave Response to "I'm Christian, Unless You're Gay" .::. Size~: 273.79 KB | Apr 04 13:34 |
*oiaohm (~oiaohm@139.brs0109.brs.iprimus.net.au) has joined #boycottnovell-social | Apr 04 13:59 | |
*oiaohm has quit (Changing host) | Apr 04 13:59 | |
*oiaohm (~oiaohm@unaffiliated/oiaohm) has joined #boycottnovell-social | Apr 04 13:59 | |
XFaCE | qu1j0t3: What shit's new today? | Apr 04 14:03 |
qu1j0t3 | dunno. :| | Apr 04 14:05 |
*qu1j0t3 goes to work | Apr 04 14:05 | |
schestowitz | good luck | Apr 04 14:07 |
schestowitz | just got a call, I've been assigned to look into what encryption and security the NHS uses in order to put a proposal for FOSS in it | Apr 04 14:23 |
schestowitz | nhs encryption will hopefully not rely on Microsoft; they used to be using a very old version of IE on all workstations | Apr 04 14:24 |
schestowitz | http://www.connectingforhealth.nhs.uk/systemsandservices/infogov/security/encryptiontool | Apr 04 14:24 |
TechrightsSocial | Title: NHS encryption tool — NHS Connecting for Health .::. Size~: 36.71 KB | Apr 04 14:24 |
schestowitz | " | Apr 04 14:25 |
schestowitz | NHS Connecting for Health has completed the national procurement of an encryption solution for removable media and full disk encryption on behalf of the NHS. | Apr 04 14:25 |
schestowitz | The selected product, McAfee Endpoint Encryption, is provided by Trustmarque Solutions. The product is an enterprise class solution which integrates with existing software deployment tools and can be deployed in both standalone and organisation-wide scenarios. | Apr 04 14:25 |
schestowitz | " | Apr 04 14:25 |
schestowitz | it does not specify exactly what algorithms or standards they adhere to for this particular task | Apr 04 14:26 |
schestowitz | http://www.mcafee.com/us/products/data-protection/endpoint-encryption.aspx | Apr 04 14:26 |
TechrightsSocial | Title: McAfee Endpoint Encryption | McAfee Products .::. Size~: 23.82 KB | Apr 04 14:26 |
schestowitz | It is reasonable to assume network security will differ from something like disk encryption, for cases of lost media with sensitive information about patients | Apr 04 14:26 |
schestowitz | The NHS put out a data encryption policy too, in the form of a report http://www.mkgeneral.nhs.uk/uploads/documents/ict-gl-21.pdf | Apr 04 14:27 |
TechrightsSocial | Not a web page! Aborting application/pdf type | Apr 04 14:27 |
MinceR | could be a patented, proprietary version of the unbreakable ROT13™ algorithm | Apr 04 14:28 |
schestowitz | This is quite a recent document and it will be next reviewed next yeat | Apr 04 14:28 |
schestowitz | MinceR: but does that say so? | Apr 04 14:28 |
MinceR | nope | Apr 04 14:28 |
MinceR | you don't need to know, you just need to pay them :> | Apr 04 14:29 |
schestowitz | " | Apr 04 14:29 |
schestowitz | It is paramount that Milton Keynes Hospital NHS Foundation Trust (MKHFT) has the | Apr 04 14:29 |
schestowitz | ability to protect all personal identifiable/business critical information from | Apr 04 14:29 |
schestowitz | unauthorised access, disclosure or loss. | Apr 04 14:29 |
schestowitz | " | Apr 04 14:29 |
schestowitz | often enough they just package FLOSS | Apr 04 14:29 |
schestowitz | Put some label on it, invest in marketing and packaging | Apr 04 14:30 |
schestowitz | " | Apr 04 14:31 |
schestowitz | The need for encryption has increased over recent years due to the loss of data from | Apr 04 14:31 |
schestowitz | several public sector organisations as reported in the media. Milton Keynes Hospital | Apr 04 14:31 |
schestowitz | NHS Foundation Trust recognises the need to secure its data, protect its staff and | Apr 04 14:31 |
schestowitz | patients and have strict control over data in transit. This has also now become a | Apr 04 14:31 |
schestowitz | mandatory requirement, in accordance with Gateway Reference 10509 (September | Apr 04 14:31 |
schestowitz | 2008). | Apr 04 14:31 |
schestowitz | " | Apr 04 14:31 |
schestowitz | They strongly insist on encryption all media and connectivity too is being limited | Apr 04 14:32 |
schestowitz | " | Apr 04 14:32 |
schestowitz | Users’ privately owned mobile computing equipment or related devices (e.g | Apr 04 14:32 |
schestowitz | laptops, PDAs, mobile phones) will not be permitted to connect to the Trust | Apr 04 14:32 |
schestowitz | network nor to access Trust network resources. The only exception to this rule will | Apr 04 14:32 |
schestowitz | be outlook webmail and via VPN remote access which is tightly controlled | Apr 04 14:32 |
schestowitz | technically and monitored through policy and any specific policies allowing privately | Apr 04 14:32 |
schestowitz | owned devices. | Apr 04 14:32 |
schestowitz | " | Apr 04 14:32 |
schestowitz | it's a non-technical document. At the end it names an actual standard: | Apr 04 14:33 |
schestowitz | " | Apr 04 14:33 |
schestowitz | Standards: | Apr 04 14:33 |
schestowitz | ISO 27001 (BS 7799). | Apr 04 14:33 |
schestowitz | " | Apr 04 14:33 |
schestowitz | http://en.wikipedia.org/wiki/ISO/IEC_27001 | Apr 04 14:34 |
TechrightsSocial | Title: ISO/IEC 27001 - Wikipedia, the free encyclopedia .::. Size~: 60.46 KB | Apr 04 14:34 |
schestowitz | "ISO/IEC 27001, part of the growing ISO/IEC 27000 family of standards, is an Information Security Management System (ISMS) standard published in October 2005 by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC)." | Apr 04 14:34 |
schestowitz | "BS 7799 was a standard originally published by BSI Group in 1995. It was written by the United Kingdom Government's Department of Trade and Industry (DTI), and consisted of several parts." | Apr 04 14:35 |
schestowitz | SearchThe ISO17799 Guide http://iso-17799.safemode.org/ | Apr 04 14:36 |
TechrightsSocial | Title: ISO 17799 and ISO 27001 Wiki - The ISO17799 Guide .::. Size~: 8.49 KB | Apr 04 14:36 |
oiaohm | Yep and most of these ISO standards still have gaping flaws when compared to the old rainbow books. | Apr 04 14:37 |
schestowitz | http://iso-17799.safemode.org/ | Apr 04 14:37 |
TechrightsSocial | Title: ISO 17799 and ISO 27001 Wiki - The ISO17799 Guide .::. Size~: 8.49 KB | Apr 04 14:37 |
schestowitz | This does not seem to deal with actual preferred algorithms | Apr 04 14:37 |
schestowitz | oiaohm: where would you look? | Apr 04 14:38 |
oiaohm | schestowitz: http://en.wikipedia.org/wiki/Rainbow_Series | Apr 04 14:39 |
TechrightsSocial | Title: Rainbow Series - Wikipedia, the free encyclopedia .::. Size~: 43.47 KB | Apr 04 14:39 |
oiaohm | This is basically your starting point when doing a secure system. | Apr 04 14:39 |
oiaohm | Most of the contents is written generically. | Apr 04 14:39 |
schestowitz | McAfee won a contract for encryption of media, not networking/transport layer http://www.ehi.co.uk/news/ehi/3760 | Apr 04 14:40 |
oiaohm | So it guides you threw the problem you have at hand. | Apr 04 14:40 |
TechrightsSocial | Title: E-Health Insider :: McAfee wins contract for NHS data encryption .::. Size~: 69.94 KB | Apr 04 14:40 |
oiaohm | Yep that breaks a rule in the DoD book. | Apr 04 14:40 |
schestowitz | Rainbow Series http://en.wikipedia.org/wiki/Rainbow_Series looks interesting, but it helps cover the US government's requirements, not the NHS' | Apr 04 14:41 |
TechrightsSocial | Title: Rainbow Series - Wikipedia, the free encyclopedia .::. Size~: 43.47 KB | Apr 04 14:41 |
oiaohm | You should have the source code to anything that is encryption. | Apr 04 14:41 |
oiaohm | schestowitz: Rainbow Series the US offically don't use any more. | Apr 04 14:41 |
oiaohm | Because Microsoft and others argued that it was too hard to implement. | Apr 04 14:42 |
MinceR | it probably was, for them :> | Apr 04 14:43 |
oiaohm | Rainbow Series is basically the starting bible for design something secure. | Apr 04 14:43 |
schestowitz | An article from a couple of years ago speaks of the pressure to improve data security at the NHS http://news.bbc.co.uk/1/hi/uk/8066609.stm | Apr 04 14:43 |
TechrightsSocial | Title: BBC NEWS | UK | NHS told to tighten data security .::. Size~: 70.99 KB | Apr 04 14:43 |
oiaohm | Of course its not 100 percent upto date. | Apr 04 14:43 |
oiaohm | Yet you see all these ISO standards go out and try to reinvent the wheel. | Apr 04 14:44 |
oiaohm | Lot of errors were corrected in the rainbow books. | Apr 04 14:44 |
schestowitz | There is a PDF that seems very relevant and very, very recent http://www.nhsdirect.nhs.uk/About/FreedomOfInformation/FOIPublicationScheme/~/media/Files/FreedomOfInformationDocuments/OurPoliciesAndProcedures/ICTPolicies/ICTNetworkSecurityPolicy2011.ashx it's about network security in the NHS | Apr 04 14:44 |
TechrightsSocial | Not a web page! Aborting application/pdf type | Apr 04 14:44 |
schestowitz | Some other guides are specific to regions, e.g. http://www.smhp.nhs.uk/LinkClick.aspx?fileticket=jKbrUHqiNzg%3D&tabid=160&mid=582 | Apr 04 14:45 |
TechrightsSocial | Not a web page! Aborting application/pdf type | Apr 04 14:45 |
oiaohm | schestowitz: read the table of contents of the orange book out the rainbow series. http://en.wikipedia.org/wiki/Trusted_Computer_System_Evaluation_Criteria Then remember that was witten in 1983 | Apr 04 14:46 |
TechrightsSocial | Title: Trusted Computer System Evaluation Criteria - Wikipedia, the free encyclopedia .::. Size~: 39.9 KB | Apr 04 14:46 |
oiaohm | Yes all these years latter we still cannot get the basics right. | Apr 04 14:46 |
schestowitz | This is mostly procedural; as such, technical details are hardly being specified | Apr 04 14:46 |
schestowitz | oiaohm: but my goal is to find out what the NHS requires and uses now | Apr 04 14:47 |
schestowitz | An old book won't help this | Apr 04 14:47 |
schestowitz | we're able to get a contract for this... FOSS | Apr 04 14:47 |
schestowitz | provided it provides the function that complies with what's required | Apr 04 14:47 |
schestowitz | Like openSSL might | Apr 04 14:48 |
oiaohm | schestowitz: basically when you do knowing the old book is handly | Apr 04 14:48 |
qu1j0t3 | COFFEE | Apr 04 14:49 |
schestowitz | CfH Infrastructure Security Team: Good Practice Guidelines | Apr 04 14:49 |
qu1j0t3 | oiaohm: schestowitz morning | Apr 04 14:49 |
schestowitz | http://www.connectingforhealth.nhs.uk/systemsandservices/infogov/securit | Apr 04 14:49 |
schestowitz | y/gpg | Apr 04 14:49 |
TechrightsSocial | Title: Information Governance (IG) — NHS Connecting for Health .::. Size~: 11.45 KB | Apr 04 14:49 |
schestowitz | | Apr 04 14:49 |
schestowitz | NHS N3 Network Security Overview | Apr 04 14:49 |
schestowitz | http://www.n3.nhs.uk/TechnicalInformation/N3NetworkSecurity.cfm | Apr 04 14:49 |
TechrightsSocial | Title: N3 .::. Size~: 16.96 KB | Apr 04 14:49 |
schestowitz | qu1j0t3: already!!!? | Apr 04 14:49 |
schestowitz | do you work in a cafe /sarcasm | Apr 04 14:49 |
qu1j0t3 | schestowitz: would be nice. | Apr 04 14:49 |
schestowitz | less stressful | Apr 04 14:50 |
qu1j0t3 | well | Apr 04 14:50 |
qu1j0t3 | nah | Apr 04 14:50 |
schestowitz | this morning I checked about some university teaching jobs.. | Apr 04 14:50 |
qu1j0t3 | being a barista is hard work. i doubt i'd be up to it. | Apr 04 14:50 |
qu1j0t3 | i'm just a lazy bum programmer | Apr 04 14:50 |
schestowitz | GPG is Good Practice Guidelines | Apr 04 14:50 |
schestowitz | qu1j0t3: I know the feeling | Apr 04 14:51 |
schestowitz | life is not about work | Apr 04 14:51 |
schestowitz | over-ambitious peer-pressure-conscious people can work their arse off | Apr 04 14:51 |
XFaCE | schestowitz: gpg encyption is neat | Apr 04 14:52 |
schestowitz | They keep their cards close to their chest | Apr 04 14:52 |
schestowitz | "Organisations which do not have an N3 connection can contact cfh.infosecteam@nhs.net to request copies of GPG's and other associated Information Security guidance." | Apr 04 14:52 |
XFaCE | especially when the fraemwork can be included in the OS (GNU+Linux) | Apr 04 14:52 |
schestowitz | A bit cryptic about what's being used, maybe for some increased (perceived) security through obscurity | Apr 04 14:53 |
schestowitz | XFaCE: it's a different PGP arconym | Apr 04 14:53 |
schestowitz | acronym | Apr 04 14:53 |
oiaohm | Hi qu1j0t3 | Apr 04 14:53 |
schestowitz | I should write a short report about this | Apr 04 14:53 |
schestowitz | N3 IP Network Addressing | Apr 04 14:54 |
schestowitz | N3 DNS | Apr 04 14:54 |
schestowitz | N3 Network Security | Apr 04 14:54 |
schestowitz | N3 Monitoring and Capacity Reporting | Apr 04 14:54 |
schestowitz | QoS General Overview | Apr 04 14:54 |
schestowitz | FAQs | Apr 04 14:54 |
schestowitz | N3 Network Security | Apr 04 14:54 |
schestowitz | http://www.n3.nhs.uk/TechnicalInformation/N3NetworkSecurity.cfm | Apr 04 14:54 |
TechrightsSocial | Title: N3 .::. Size~: 16.96 KB | Apr 04 14:54 |
schestowitz | "N3 is a very large network, with 1.3 million NHS end users and over 40,000 connections in England and Scotland connected to regional Points of Presence (PoPs). A high speed any to any Multi-Protocol Label Switching (MPLS) core is used to connect the N3 PoPs. There are currently twelve major data centres connected directly to the MPLS network to provide national and local services and applications. Two additional data | Apr 04 14:54 |
schestowitz | centres provide authentication and access profiling." | Apr 04 14:54 |
schestowitz | "Data sent across N3 is not encrypted (unless using the VPN N3-12-4 Catalogue service which encrypts traffic across the Internet and the N3 network to a specific site). As with any data network there is a risk that data can be intercepted. " | Apr 04 14:55 |
oiaohm | I always like this. | Apr 04 14:55 |
oiaohm | Running always secured networks have been possible for years. | Apr 04 14:55 |
schestowitz | They don't encrypt as much as they can: | Apr 04 14:55 |
schestowitz | " | Apr 04 14:56 |
schestowitz | Data transmitted across N3 is not encrypted (unless using the VPN N3-12-4 Catalogue service which encrypts traffic across the Internet and the N3 network to a specific site). Thus N3 is not considered secure enough to transmit patient identifiable or similarly sensitive data across. It does not meet the Caldicott Guidelines requirements alone. It is the joint responsibility of the sender(s) and receiver(s) of such data - not | Apr 04 14:56 |
schestowitz | NHS Connecting for Health, NHS National Services Scotland or N3SP to implement a solution that conforms. | Apr 04 14:56 |
schestowitz | The normal practical solution is to encrypt application data where it traverses N3 between users and application providers. The encryption method must meet NHS Connecting for Health and NHS National Services Scotland requirements. | Apr 04 14:56 |
schestowitz | " | Apr 04 14:56 |
oiaohm | Note something else. | Apr 04 14:56 |
oiaohm | They mention nothing about regulating vpn end points. | Apr 04 14:56 |
oiaohm | So exactly what stops a desgruntel employee taking vpn access information with them. | Apr 04 14:57 |
schestowitz | They rely also on firewalls/blacklists, not much is said about the implementation | Apr 04 14:57 |
schestowitz | oiaohm: it doesn't | Apr 04 14:57 |
schestowitz | what people see people can copy | Apr 04 14:57 |
schestowitz | and Wikileaks showed a lot can be grabbed with little trouble | Apr 04 14:57 |
schestowitz | Not even by a high-level officer | Apr 04 14:58 |
oiaohm | What is talked about in implementation is not regulation of end points. | Apr 04 14:58 |
oiaohm | No cover of must rotate encryption keys. | Apr 04 14:58 |
oiaohm | Basically its crap as I would expect. | Apr 04 14:58 |
oiaohm | It does not even metion using radius with switchs to make sure only authorised computer can connect to the network. | Apr 04 15:00 |
oiaohm | This is basics. | Apr 04 15:00 |
schestowitz | A cambridge researchers did, for a change, publish some technical details in " | Apr 04 15:00 |
schestowitz | Problems with the NHS Cryptography Strategy | Apr 04 15:00 |
schestowitz | Ross Anderson | Apr 04 15:00 |
schestowitz | " | Apr 04 15:00 |
schestowitz | http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.49.5022&rep=rep1&type=pdf | Apr 04 15:00 |
TechrightsSocial | Not a web page! Aborting application/pdf type | Apr 04 15:00 |
oiaohm | Just with the internal network design there. | Apr 04 15:01 |
oiaohm | There is no mention of client control. | Apr 04 15:01 |
oiaohm | People wonder why data gets stolen so much. | Apr 04 15:01 |
schestowitz | " | Apr 04 15:02 |
schestowitz | bona de hospital doctor. | Apr 04 15:02 |
schestowitz | The use of `certi cation authorities' (CAs) is one established way to manage | Apr 04 15:02 |
schestowitz | cryptographic keys. An example is given by the new SET protocols for credit | Apr 04 15:02 |
schestowitz | card transactions over the Internet; each bank (or group of banks) will establish | Apr 04 15:02 |
schestowitz | a service to which customers can send their encryption keys (and the veri cation | Apr 04 15:02 |
schestowitz | keys corresponding to their digital signature keys) and have them certi ed. This | Apr 04 15:02 |
schestowitz | certi cation has the e ect of binding a customer's keys to his or her account | Apr 04 15:02 |
schestowitz | number. | Apr 04 15:02 |
schestowitz | But the solution proposed by IMG is to use a `trusted third party' (TTP), or | Apr 04 15:02 |
schestowitz | a small number of them, rather than CAs. TTPs di er from CAs in that they | Apr 04 15:02 |
schestowitz | retain copies of the private decryption keys in order to provide government access | Apr 04 15:02 |
schestowitz | to encrypted tra c if required. They are an initiative of the US government | Apr 04 15:02 |
schestowitz | whose objective is to bring the civil use of cryptography under the control of | Apr 04 15:03 |
schestowitz | the US government and its allies. | Apr 04 15:03 |
schestowitz | The rationale o ered for TTP services is usually as follows. Cryptography is | Apr 04 15:03 |
schestowitz | " | Apr 04 15:03 |
schestowitz | The paper is in his homepage too http://www.cl.cam.ac.uk/~rja14/Papers/zergo-critique.pdf | Apr 04 15:05 |
TechrightsSocial | Not a web page! Aborting application/pdf type | Apr 04 15:05 |
oiaohm | I guess you were not expecting the flaws to this bad and you have barely scratched it yet. | Apr 04 15:08 |
oiaohm | schestowitz: | Apr 04 15:09 |
oiaohm | Really if you do serousally look using best prac from 1985 at these things you should be able to produce a 50 to 60 page document just going threw the basic design faults. | Apr 04 15:12 |
schestowitz | https://joindiaspora.com/posts/1486940 | Apr 04 15:52 |
TechrightsSocial | @schestowitz@joindiaspora.com: Ubuntu's HUD: Light-years beyond any menu system http://www.techrepublic.com/blog/opensource/ubuntus-hud-light-years-beyond-any-menu-system/3535 #ubuntu #gnu #linux #hud | Apr 04 15:52 |
TechrightsSocial | -> Title: Ubuntu's HUD: Light-years beyond any menu system | TechRepublic .::. Size~: 102.7 KB | Apr 04 15:52 |
schestowitz | "It can, it can, I saw it in PlanetKDE several weeks ago. " | Apr 04 15:52 |
schestowitz | "To be precise: http://www.afiestas.org/appmenu-runner-meet-the-kde-hud/ " | Apr 04 15:52 |
TechrightsSocial | Title: AppMenu Runner, meet the KDE’s HUD | Afiestas Blog .::. Size~: 72.68 KB | Apr 04 15:52 |
schestowitz | MinceR: eventually we found out what the NHS uses | Apr 04 15:55 |
schestowitz | > This looks like the best starting point for us, as it's what they're using for | Apr 04 15:55 |
schestowitz | > encryption of data stored on disk - which is the main requirement we have. | Apr 04 15:55 |
schestowitz | > | Apr 04 15:55 |
schestowitz | > Doing a bit more research on the product reveals that they're using AES-256 | Apr 04 15:55 |
schestowitz | > and RC5-1024 as the main encryption technologies (these are both block ciphers | Apr 04 15:55 |
schestowitz | > using symmetric keys). | Apr 04 15:55 |
schestowitz | > | Apr 04 15:55 |
schestowitz | > http://downloadcenter.mcafee.com/products/evaluation/EE_VDisk/Win/4.1/ds_endpoint_encryption.pdf | Apr 04 15:55 |
TechrightsSocial | Not a web page! Aborting application/pdf type | Apr 04 15:55 |
schestowitz | > https://kc.mcafee.com/corporate/index?page=content&id=KB52041 | Apr 04 15:55 |
schestowitz | > Thanks for that, Roy - a good deal of information there (including notes on | Apr 04 15:55 |
TechrightsSocial | Title: McAfee KnowledgeBase - Cryptographic Algorithms available in Endpoint Encryption for PC 5.x .::. Size~: 21.7 KB | Apr 04 15:55 |
schestowitz | > how little information the NHS or its suppliers put out). | Apr 04 15:55 |
MinceR | :) | Apr 04 15:56 |
*oiaohm has quit (Quit: by all) | Apr 04 16:11 | |
schestowitz | https://twitter.com/shelleyelk/status/187277874686984192 | Apr 04 16:27 |
TechrightsSocial | @shelleyelk: @alastairotter @schestowitz wonder what it looks like today with the Dallas storm.. | Apr 04 16:27 |
schestowitz | https://twitter.com/socialarchive/status/187280916656291840 | Apr 04 16:27 |
TechrightsSocial | @socialarchive: RT @schestowitz Incredible art made with open-source weather data http://t.co/el0X7jPq #opendata #art - http://t.co/18QlxbQC | Apr 04 16:27 |
TechrightsSocial | -> Title: Incredible art made with open-source weather data - Boing Boing .::. Size~: 38.85 KB | Apr 04 16:27 |
TechrightsSocial | -> Title: Cyber Fnox: RT @schestowitz Incredible art made with open-source weather... from .::. Size~: 25.09 KB | Apr 04 16:27 |
schestowitz | Linsux trolls https://joindiaspora.com/posts/1489834 | Apr 04 16:50 |
TechrightsSocial | @slackerd@joindiaspora.com: *looks at stream* ![Alt Text](http://omgcheesecake.net/public/style_emoticons/default/schestowitz.jpg) < I have hijacked your stream. Problem? :P | Apr 04 16:50 |
TechrightsSocial | -> Title: 404 Not Found .::. Size~: 0.32 KB | Apr 04 16:50 |
MinceR | http://www.smbc-comics.com/index.php?db=comics&id=2568#comic | Apr 04 18:49 |
TechrightsSocial | Title: Saturday Morning Breakfast Cereal .::. Size~: 23.1 KB | Apr 04 18:49 |
schestowitz | On Sunday we have the last stage of Mr. Fitness. It will be hard, but I'm favourite to win this last one and the entire competition, retaining my title even in my 30s (I have just turned 30). | Apr 04 19:21 |
schestowitz | Time to write some blog posts... | Apr 04 19:22 |
schestowitz | https://joindiaspora.com/posts/1490401 | Apr 04 20:27 |
TechrightsSocial | Not a Diaspora post? | Apr 04 20:27 |
schestowitz | "This is a good thing." | Apr 04 20:27 |
schestowitz | Lin*** people in diaspora | Apr 04 20:27 |
schestowitz | https://joindiaspora.com/posts/1490447 | Apr 04 20:27 |
TechrightsSocial | Not a Diaspora post? | Apr 04 20:27 |
schestowitz | "And this is good as well." | Apr 04 20:27 |
Generated by irclog2html.py 2.6 by Marius Gedminas - find it at mg.pov.lt!