**** BEGIN LOGGING AT Thu Jan 30 02:59:58 2014 Jan 30 04:24:44 LOL, what a stupid spammer Jan 30 08:54:23 pabs3: I trust Aaron Seigo about as far as I could throw him Jan 30 08:54:32 pabs3: this guy just does not seem right to me Jan 30 08:54:46 why is that? Jan 30 08:55:13 pabs3: there's one big question in my mind that hasn't been answered yet: what happened to all the money from the Vivaldi pre-orders? Jan 30 08:57:05 pabs3: when will the people who pre-ordered a Vivaldi get what they paid for? Jan 30 08:57:40 on that page, it says "Consider buying an Improv, even if you don’t plan to play with it." Jan 30 08:57:51 that's a pretty shocking request Jan 30 08:58:00 it's a tacit admission that the project has no value Jan 30 08:58:25 https://dot.kde.org/comment/118283#comment-118283 Jan 30 08:58:31 "What we're doing is of no value but please give us money because we don't want to face the fact that we've failed" Jan 30 09:00:39 pabs3: that comment says nothing about the Vivaldi pre-orders Jan 30 09:01:15 pabs3: nor does it actually say that anybody will get money back if the Improv doesn't happen; all it says is that the money "is escrowed" Jan 30 09:03:24 hmm, OK it says "Anyone can get their payment back in full by asking." Jan 30 09:03:57 still, the question of Vivaldi pre-orders is still out there Jan 30 09:07:29 this page says that "Aaron and a few others have personally paid these development costs" and I can't help but wonder if they personally paid them with the money they personally received from Vivaldi pre-orders Jan 30 09:12:50 * rah asks what happened Jan 30 09:12:51 https://discuss.makeplaylive.com/t/vivaldi-pre-order-funds/45 Jan 30 13:17:48 https://discuss.makeplaylive.com/t/delivery-time-improv/40 haha Jan 30 13:19:31 honestly the design is also not really appealing Jan 30 14:24:15 Lel all of you will love it xD http://p.pw/DLV Jan 30 14:50:56 again this idiot spammer Jan 30 15:42:48 seem pretty massive - could it be related to latest x-platform java exploit? Jan 30 16:00:29 the SPAM? Jan 30 16:01:32 yepp Jan 30 16:01:43 don't think it's related to an exploit Jan 30 16:02:21 anyway, I informed freenode staff, they will "educate" that moron Jan 30 16:04:30 * DocScrutinizer05 figures a rule in services bot like grep="p.pw/DLV"kline Jan 30 16:13:55 which exploit? I might want to learn about it nevertheless Jan 30 16:15:22 In a way, its good to know IRC is still popular enough to have some background spam. Jan 30 16:15:52 Heh, although its not that common anymore... Jeeze. Jan 30 16:16:09 HEUR:Backdoor.Java.Agent.a? Jan 30 16:21:10 Good for your health Jan 30 16:34:25 DocScrutinizer05: yepp, that one Jan 30 16:34:36 although it barely works under Linux Jan 30 16:34:47 I mean to run you browser from root... Jan 30 16:35:41 yeah, but that's not really needed Jan 30 16:35:50 but: >>Ivanov said it then connects to an IRC server and joins a channel that is predefined in the bot, awaiting commands.<< Jan 30 16:37:56 while the posted URL could actually have new instructions for the bot and thus the SPAM was an attempt by master to contact existing bots, it seems unlikely that the bots are coded to use freenode IRC and hang on in #openmoko-cdevel to wait for commands Jan 30 16:39:11 I guess there must be IRC networks that are way better suited for such purposes Jan 30 16:41:16 (browser as root) the malware only needs to make sure it gets stored anywhere to disk and gets started with user's next X-session login or even browser startup. No root needed for that Jan 30 16:42:02 the details at http://threatpost.com/cross-platform-java-bot-used-for-ddos-attacks/103912 talk about "different platforms it supports" Jan 30 16:43:18 however it sounds like enabled java (not JS) is a mandatory precondition for the malware to infect your system Jan 30 16:44:29 FF usually asks you before it executes any java applet Jan 30 16:44:43 at least the first time **** ENDING LOGGING AT Fri Jan 31 02:59:58 2014