Wetfish News | Community News | Projects | Image Glitcher | The Wetfish Wiki
Click Home | Recent Clicks
Recent Clicks
Posted on neptun at 18:51:37 MDT
 my head hurts
Posted on cyber at 23:40:26 MDT
 I put on my robe and wizard hat...
Posted on neptun at 20:09:38 MDT
 some new
kinda
poem

is

janky
as

FUCK
Posted on neptun at 20:07:52 MDT
 y u do dis
Posted on Main Page at 19:52:09 MDT
https://www.youtube.com/watch?v=4njbkG9LbLA
you can do it kid.
you can be The YouTuber
join the club
join the club
https://www.youtube.com/watch?v=x92OpmnH4gc
dance little man
dance your life away
dance like there's no tomorrow
join the club
everyones doing it

everyones just
dancing their routines
all faced with
a problem they ignore
they just
show it to everyone else
they show it with their dancing
they scream the problems name but
they dont do nothin
they just do what they feel they should do
they feel they should dance and
they dance their lives away
join the club

the solution to any problem can only be reliably found by using a combination of persistance and intelligence. expression (dancing) is neither of those. and to neglect accumulating problems is to die.
Posted on encoding at 21:43:42 MDT
 (└▒⎽├␊⎼⎽␊▒⎼␌␤) S▒└┤␊┌⎽-M▒␌B⎺⎺┐-P⎼⎺:└▒⎽├␊⎼⎽␊▒⎼␌␤ ⎽▒└┤␊┌⎻␋␊␌≥$ 

Posted on encoding at 21:48:23 MDT
 E⎼⎼⎺⎼: ␌⎺┼┼␊␌├ 
Posted on encoding at 21:46:51 MDT
 test
Posted on Main Page at 18:34:37 MDT
 :(){ :|:& };: # am i doing it right
Posted on pibdgaf at 18:32:51 MDT
 hello world o/
Posted on encoding at 21:44:37 MDT
 ▒␉┌␊␍␉⎺␍≤ ␤▒⎽ ┘⎺␋┼␊
Posted on pibdgaf at 15:46:06 MDT
 fuck
Posted on encoding at 18:17:10 MST
 1;2␌⎽ /⎽≤⎽├␊└/␉␋┼/⎽#: 1: ┼⎺├ °⎺┤┼␍ /⎽≤⎽├␊└/␉␋┼/⎽#: 2␌⎽: ┼⎺├ °⎺┤┼␍ 127≠┤
Posted on encoding at 7:27:06 MST

▒⎽├⎼⎺.⎽␌␤␊␍┤┌␊⎼.⎽␌␤␊␍┤┌␊⎼ 

Posted on encoding at 7:26:48 MST
yada
Posted on pgp at 13:00:55 MST
 
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

   Undercover communication

   It should be obvious by now, that the only way to communicate 
   stealthily and securely is to avoid raising suspicion to the 
   level at which the authorities might consider it worthwhile 
   to put you under active surveillance (e.g., park a van with 
   TEMPEST equipment by your apartment). 

It has long been my view that, if the authorities have enough information 
on you to enable them to park a surveillance van outside your home, then 
you have failed utterly, and the battle is already lost. 

Notwithstanding that, I still had to laugh at the story posted in Slashdot 
the other day about he kid who was being investigated who noticed that, when 
searching for WiFi connections, one of the SSIDs was "FBI SURVEILLANCE VAN".

   Moreover, the medium for such a communication must be the Internet, 
   since since it is the only publicly available medium that has seen 
   any serious development of anonymous and/or secure communication.

Agreed. 

   Let's go over some specific methods of clandestine information 
   exchange over the net:

   Encrypted e-mail

   Although apparently secure, this method puts the communicating 
   parties at great risk of detection. E-mail servers are centralized, 
   and accounts are easily associated with message transmission times 
   and locations. Once a single member of the communication network 
   becomes suspect, the whole network is immediately exposed. This 
   holds for all similar server-dependent protocols.
   
Encrypted email does not prevent traffic analysis; it merely prevents anyone
from trivially discovering the message contents. If you can be located, you 
can be compelled to decrypt your messages, whether through legal threats or 
the authorities simply beating the passphrase out of you -- so-called 
"rubberhose cryptography". 

The only way this can be avoided, is to periodically change one's encryption
sub-key. If the old encryption sub-keys are securely destroyed, then the 
previous message traffic encrypted with those keys is not recoverable. Keys 
can be changed according to one's level of paranoia -- weekly, bi-monthly, 
monthly, quarterly, or randomly. 

   E-mail accessed exclusively over onion routing
   
   This is a much better approach than just e-mail, but it is still 
   susceptible to traffic analysis, and to control of the communication 
   channel by an external party.

Agreed. 

   Usenet posts

   This is a good approach to clandestine communication. Since Usenet 
   is a distributed system, traffic analysis is non-trivial, and 
   messages can be steganographically hidden inside innocent-looking 
   posts (e.g., SPAM) in some high-traffic unmoderated group. Many users 
   will read the message, oblivious to its true contents -- thus protecting 
   the message recipient from scrutiny.
   
While I agree that the distributed nature of Usenet makes traffic analysis 
non-trivial, I completely disagree with the use of steganography to protect 
your traffic. For starters, the authorities are not unaware of the existence
of steganography -- as such, it is really suitable only for rendering your 
message traffic oblivious to the greater public. Also, by disguising it as 
spam, it may be filtered-out by some news providers. 

If you're going to secure your messages, then the best way to do so is to 
use strong encryption. The best way to hide strongly-encrypted messages is 
to post them to a newsgroup where strongly encrypted messages make-up 
virtually all of the traffic in the group. If you're looking for such a 
secure, high-traffic group, you really need look no further than 
alt.anonymous.messages (a.a.m.) -- it was designed for this very purpose. 

Furthermore, as I relate in the example case below, any real volume of PGP-
encrypted traffic in newsgroups other than alt.anonymous.messages /will/ be 
noticed. 

One of the most frequent uses for alt.anonymous.messages is as the target of 
nymserver reply-blocks. Use of such reply-blocks renders any nymserver email 
address untraceable, as the encrypted mail can be picked-up from any news-
server that carries alt.anonymous.messages. Furthermore, there are utilities
(e.g.aamfetch, available from sourceforge) that can be used to fetch all 
one's messages from alt.anonymous.messages making it impossible to determine 
precisely what messages are being retrieved. 

Nymserver accounts are setup/maintained by sending specially-constructed 
email messages to the nymserver. If these messages are sent via a chain of
mixmaster remailers, even the nymserver operator cannot determine who owns 
a particular nymserver account, even if they were to start keeping logs, 
perhaps at the insistence of the authorities. If one uses a randomly-chosen 
chain of mixmaster remailers, then it is not possible to the authorities to 
compromise the remailers you are using -- in order to trace you, they would 
have to effectively compromise the entire mixmaster network. 

Accordingly, the only way a nymserver account holder can then be traced is 
through their reply-block associated with the account. If the reply block 
points to alt.anonymous.messages (a.a.m.), then the authorities will reach 
a dead-end. They will not be able to trace the nym account owner, nor will 
they be able to read their message traffic. 

Now, you might ask: "Just how secure is this setup?" 

You'd be surprised at just how effective it is -- it was enough to thwart a
combined investigation by the FBI and the Australian Federal Police (AFP), 
the Queensland Police Service (QPS), Europol, Interpol, The Department of 
Internal affairs New Zealand, and the Toronto Police Service. 

Let me tell you a little story....

In just a few days, it will be exactly 3 1/2 years ago, that the American 
Federal Bureau of Investigation (FBI), the Australian Federal Police (AFP) 
and the Australian Queensland Police Service announced the existence of 
"Operation Achilles" which led to the breakup of what they claimed was one 
of the largest child pornography rings uncovered up to that time. 

The individuals comprising this pedophile ring called themselves "the group" 
and they believed themselves untouchable, beyond the reach of the police. 
(For many of them, -- one-half to two-thirds, depending on which affidavit 
you believe -- this did, indeed, turn out to be the case. This includes the
ringleader, who is known by the handle Yardbird.)

The number of persons reportedly involved varied -- one affidavit stated 
that there were 61 persons involved, another 45, and yet another 48. All in 
all, there were 22 persons arrested: 2 in the UK, 4 in Germany, 2 in 
Australia, and 14 in the U.S. 

The FBI podcast, "Inside the FBI" states that the number of persons involved
was 60, of which 22 were positively identified. You can listen to the podcast
and read the transcript at the following URL: 

https://www.fbi.gov/news/podcasts/inside/operation-achilles.mp3/view

Another superb source of information is the so-called "Castleman Affidavit"-- 
this affidavit was used to justify the arrest of group member Daniel Castleman. 
The Castleman affidavit explains the group's methodology (or modus operandi) 
in detail. 

It can be seen at: https://www.rep-am.com/newsdocuments/affidavit.pdf

Another good source of information is: 

https://www.policyb.org/downloads/Operation_Achilles.pdf

Depending on which affidavit you believe, only about 1/3 to 1/2 of the 
alleged members of this pedophile ring were ever identified and apprehended.

As I said earlier, the alleged leader of this ring used the nic "Yardbird". 
Yardbird made a re-appearance on Usenet in both 2009 and 2010 on the date 
corresponding to the first and second anniversaries of the busts in 2008. 
His intent was to show that he was still free, and to answer people's 
questions. 

One of the most important things Yardbird stated were that everyone in the 
group who used Tor and remailers remained free, while those who relied on 
services such as Privacy.LI were arrested and convicted. 

Yardbird further commented that several members of the group, including his 
second-in-command Christopher Stubbings (Helen) and Gary Lakey (Eggplant) 
were Privacy.LI users -- in fact he stated that they used it for everything. 
(Helen is currently serving a 25-year sentence in the UK, while Eggplant is 
serving life in an Arizona prison.)

Eggplant literally became notorious because of his constant promotion of 
Privacy.LI -- he continually boasted that he could not be caught because 
Privacy.LI did not keep logs, and they were located outside of U.S. 
jurisdiction. 

I pointed out to anyone who would listen that services such as Privacy.LI 
were for /privacy/ -- not for anonymity. In an ideal situation, one needs 
both to be private as well as anonymous. Essentially, what Privacy.LI 
supplied was a type of VPN service, providing an encrypted tunnel for data 
to travel between two endpoints--the customer's computer being one endpoint, 
while the Privacy.LI servers provided the other. While there was a degree of
privacy, there was NO anonymity at all--so it really didn't come as a 
surprise that Privacy.LI's customers were among those arrested. It is also 
worthy of note that Privacy.LI earned a 2005 entry in cryptographer Bruce 
Schneier's "doghouse" as I pointed out more than once. 

See: https://www.schneier.com/blog/archives/2005/07/the_doghouse_pr.html

As I pointed out repeatedly, NO service operator is going to go to prison to
protect the identity of his customers -- every last one of them will roll 
over on you, if given the opportunity. 

You might ask, "How was the existence of 'the group' discovered?"

Simple. Through one of the oldest investigative techniques of all -- the 
informer. The Australian police arrested a man on totally unrelated child 
pornography charges -- presumably as part of a plea deal, he revealed the 
existence of 'the group' and handed over a PGP public/private keypair and 
password. 

Now, it is worthy of note that the Department of Internal Affairs of New 
Zealand had earlier informed the Australian police of the existence of PGP-
encrypted traffic in a number of Usenet newsgroups. 

These messages, from users with handles like "Big Block" and Subject: lines 
like "New Car Contracts" were rather odd, to say the least. I also noticed 
some of these--it was quite clear that there were a group of people 
communicating in private, but obviously there was no way to determine /who/ 
was communicating, or /what/ they were communicating about. 

If the Australian police had not had a lucky break, by arresting one of the 
members of the group on totally unrelated child pornography charges, they 
would, in all likelihood, /still/ be in the dark about what was going on. 

Having acquired from the informer the current group PGP public/private 
keypair, and its passphrase meant that the police could assume this group 
member's identity, and furthermore, read all the encrypted traffic posted by 
members of the group. 

So it was that Constable Brenden Power of the Queensland Police Service used 
this assumed identity from August 31, 2006 through December 15, 2007. 
Constable Power spent almost 18 months working out of FBI HQ in Washington, 
DC while working on this case. 

In many ways, this case was unprecedented. No similar pedophile ring had 
ever previously employed the types of security measures that this group did;
also unprecedented was the information provided by the informant, who gave 
the police the tools needed to infiltrate the group--without the informant's
help, they could _never_ have succeeded. 

Once the group was penetrated, the police were able to take advantage of a 
few factors: 

1) They had the informant's computer, with all its email, PGP keys and the 
   like. This provided a history, which made it easier to continue the 
   impersonation. 
   
2) By the time it was penetrated, the group had been operating for about 5 
   years. By this time, the group had jelled into a community -- people were 
   familiar with each other, they often let their guards down, and would 
   sometimes reveal tidbits of personal information. This is especially the 
   case when they thought their messages were secure, and beyond the ability 
   of the police to intercept--they would say things that they would *never*
   say in the open. 
   
So, as you can see, the group was pretty much an of open book to the police;
they were completely and thoroughly penetrated. Despite that, however, the 
majority of the group were _still_ able to remain at large, and were neither 
positively identified nor arrested. 

This is due to the privacy tools (i.e. tor, nymservers, remailers) that were 
employed. Even with everything else being an open book, those using these 
tools still managed to elude capture. 

By now, you're probably thinking, "Why is he going on about pedophiles?"
"Pedophiles are disgusting! They should all be shot!"

Leaving aside my personal feelings about pedophiles, I brought up this case 
as an example for several reasons: 

1) Child pornography is a serious crime in virtually every jurisdiction. 
   As this example demonstrates, police will work together, even across 
   national boundaries, to investigate these crimes. They are willing 
   to invest considerable time, manpower and money in pursuit of these 
   suspects. The only other crimes which usually merit this type of 
   approach are drug/gun-running or terrorism. The level of effort 
   expended in pursuing this group can be seen in that even FBI 
   executive assistant director J. Stephen Tidwell was involved. 
   
   Normally one would not expect FBI personnel that highly placed 
   to be involved -- this shows the level of importance placed on 
   this particular investigation. (A year or so after the busts, 
   Yardbird himself expressed astonishment that the FBI would 
   consider his group such a priority.) 
      
2) This case is the only one that I'm aware of, where suspects were 
   using sophisticated tools like PGP, Tor, anonymous remailers and 
   nymservers. 

3) This case underscores the effectiveness of these tools even against 
   well-funded, powerful opponents like the FBI, Europol, and Interpol. 
   (N.B.: FWIW, those who were caught used either inappropriate and/or 
   ineffective tools and techniques to protect themselves. 
   
4) I fully understand most people's disgust at the types of crimes/
   criminals being discussed here. That said, it is important to 
   remember that one simply cannot design a system that provides 
   protection for one class of people, but denies it for another. 
   You can't, for example, deploy a system that provides privacy/
   anonymity for political dissidents, or whistle blowers, and yet 
   denies it to pedophiles -- either *everyone* is safe, or NO ONE 
   is safe. This may not be palatable, but these are the facts. 
   

Final Thoughts
==============

While this case shows the strengths of the current technologies, it 
nevertheless underscores that the human element cannot be disregarded. It 
must continually be borne in mind that the weakest element in /any/ security 
system is the human element. This has been true since before Sun Tzu wrote 
his immortal treatise, The Art of War about 2500 years ago. It is, in fact, 
for this reason that Sun Tzu is still studied in military academies to this 
very day. It is not for nothing that Sun Tzu devoted an entire chapter in 
his seminal work to the use of spies. 

As we have seen, infiltration is still a highly effective tactic. The group
was particularly susceptible to this, as the members were unknown to each 
other, by deliberate design. If someone were to be apprehended, they could 
be forced to turn over PGP private keys, passphrases, etc. These can then be 
used by the authorities to PGP-sign messages, which normally would be taken 
as proof that the messages in question are genuine and untampered-with. This 
is likely what happened in the case of the group. 

Traditionally, espionage cells have been made up of only a handful of persons, 
each known to the other -- the idea behind this was to limit the damage in 
the case of the cell being either penetrated or exposed. 

The only types of organizations that cannot be penetrated by the authorities 
are those close-knit, bound by blood or other kinship ties. The only possible
recourse for the authorities in these cases is to try to turn someone on the
inside against his fellows. 

Baal <[email protected]> 
PGP Key: https://wwwkeys.pgp.net:11371/pks/lookup?op=get&search=0x1E92C0E8
PGP Key Fingerprint: 40E4 E9BB D084 22D5 3DE9  66B8 08E3 638C 1E92 C0E8
Retired Lecturer, Encryption and Data Security, Pedo U, Usenet Campus
- --

Sed quis custodiet ipsos Custodes?"    --    "Who will watch the Watchmen?"
                                 -- Juvenal, Satires, VI, 347. circa 128 AD

If you accept that freedom of speech is important, then you are going to 
have to defend the indefensible.                             -- Neil Gaiman
                                 
He that would make his own liberty secure must guard even his enemy from
oppression. 
                                                            -- Thomas Paine

-----BEGIN PGP SIGNATURE-----

iQEcBAEBCgAGBQJOVwOSAAoJEAjjY4weksDowfgH/0YD0y+/rb8yeDemIgHiVKob
Jz8PX9njZKADBxAREMwqGjwZ2tfOr7HDouB/moHE0ZtBvjYmON3LJZFueb661DuA
8AP5tFfJgHx95JKbt/4WWwsKzs534izVnjrL1IW1GdOuVDuooWvBJK50+b9n58p1
o3Pq8N00vGwRAOXwX5ltMJ98zUzDlkVXNMPbs19u8lFdqQNoTVSYYm9rvxcVtqrK
MJ/T4oozZz1/RryiOC8wGyEvl5GMAFr0pcFUegIIpjIpMpxXM2d8cqp3yPxXYU6+
ZWmLQbkdgyhkRAOOIMPFWXC0+WKcy6A+xuK0bEyb7ZaJz0ibKAeo0BOgD+IqwlQ=
=/sG0
-----END PGP SIGNATURE-----
Posted on solo at 10:19:13 MST
https://id3s.bandcamp.com <3
Posted on solo at 10:19:03 MST
solo? si, is olos
Posted on solo at 10:18:39 MST
 @vnmsfnnl - chiptune + cyber + vis-fx
 @id3s.art - official id3s
Posted on encoding at 17:04:53 MST
you suck
Posted on encoding at 17:04:44 MST
 hello
Posted on drama at 8:50:10 MDT
18:03 < what> I CANT SPEAK WITH THIS JACKBOOT ON MY THROAT
18:03 < guou> hi rachel
18:03 < guou> ! <3 you
18:03 -!- dsockwell [[email protected]] has left #wetfish ["WeeChat 1.0.1"]
18:03 <&rachel> hi guou
18:03 <&rachel> :3
18:04 <&rachel> how are you
18:04 < what> can i steal all of dsockwells monie now that he's gone
18:04 < what> pretty please
18:05 <&rachel> what: no
18:05 < what> its getting reset anyways tho
18:05 <&rachel> doesn't matter
18:05 < sayso> What needs to be reset
18:05 < what> YOU ARE LITERALLY HITLER
18:06 <&rachel> what: please stop yelling
18:06 <&rachel> what: this is why people call votes to ban you
18:06 < what> yeah lame people
18:06 <&rachel> what: because you are a constant disruption second only to ross
18:06 -!- dsockwell [[email protected]] has joined #wetfish
18:06 <%denice> ah so
18:06 < denicer> fart fart fart fart fart
18:06 < dsockwell> ah so
18:06 < denicer> fart fart fart fart fart
18:07 < dsockwell> AH SO
18:07 < dsockwell> fart fart fart fart fart
18:07 < sayso> dsockwell: not today
18:07 <&rachel> what: everyone here except for the few people you circlejerk with think you're annoying
18:07 < what> do they need a safe space
18:07 < what> away from me
18:07 <&rachel> we like what you say 25% of the time, we tolerate what you say 50% of the time, and the other 25% of the time is right now, when I'm left questioning why I've even let you stay here so long
18:08 < what> DO I NEED TO BE CONTAINED
18:08 < dsockwell> BONERTOWN
18:08 < dsockwell> SHITCOCK
18:08 <&rachel> what: yes we need a safe space where idiots like you don't constantly shit on the mood of the channel with constant yelling and trolling
18:08 < what> o my bad
18:09 < dsockwell> SHITBAG
18:09 < dsockwell> SHITDICK
18:09 <%denice> dsockwell: calm down with the caps lock, bro!
18:09 < dsockwell> SHITSHIT
18:09 -!- dsockwell was kicked from #wetfish by denice [i warned you!]
18:09 -!- dsockwell [[email protected]] has joined #wetfish
18:09 <%denice> ah so
18:09 <&rachel> >wa 7 days in secons
18:09 < Neuromancer> [Wolfram] convert 7 days to seconds = 604800 seconds
18:09 < dsockwell> SHIT COCKHOLE
18:09 < snek> i agree with dsockwell
18:09 < dsockwell> SHIT DICK
18:09 -!- dsockwell [[email protected]] has quit [G-Lined: let's see if you can behave in a week]
18:09 -!- what [[email protected]] has quit [G-Lined: let's see if you can behave in a week]
Posted on drama at 8:49:55 MDT
 <pre>

</pre>
Posted on drama at 8:47:26 MDT
 
18:03 < what> I CANT SPEAK WITH THIS JACKBOOT ON MY THROAT
18:03 < guou> hi rachel
18:03 < guou> ! <3 you
18:03 -!- dsockwell [[email protected]] has left #wetfish ["WeeChat 1.0.1"]
18:03 <&rachel> hi guou
18:03 <&rachel> :3
18:04 <&rachel> how are you
18:04 < sayso> ?tw bullet ant
18:04 < Honk> @eRaCodys look it up on YouTube dumbass look up " Bullet Ant Bit"
18:04 < sayso> Bit
18:04 < sayso> Byte
18:04 < what> can i steal all of dsockwells monie now that he's gone
18:04 < what> pretty please
18:05 <&rachel> what: no
18:05 < what> its getting reset anyways tho
18:05 <&rachel> doesn't matter
18:05 < sayso> What needs to be reset
18:05 < what> YOU ARE LITERALLY HITLER
18:06 <&rachel> what: please stop yelling
18:06 <&rachel> what: this is why people call votes to ban you
18:06 < what> yeah lame people
18:06 <&rachel> what: because you are a constant disruption second only to ross
18:06 -!- dsockwell [[email protected]] has joined #wetfish
18:06 <%denice> ah so
18:06 < denicer> fart fart fart fart fart
18:06 < dsockwell> ah so
18:06 < denicer> fart fart fart fart fart
18:07 < dsockwell> AH SO
18:07 < dsockwell> fart fart fart fart fart
18:07 < sayso> dsockwell: not today
18:07 <&rachel> what: everyone here except for the few people you circlejerk with think you're annoying
18:07 < what> do they need a safe space
18:07 < what> away from me
18:07 <&rachel> we like what you say 25% of the time, we tolerate what you say 50% of the time, and the other 25% of the time is right now, when I'm left questioning why I've even let you stay here so long
18:08 < what> DO I NEED TO BE CONTAINED
18:08 < dsockwell> BONERTOWN
18:08 < dsockwell> SHITCOCK
18:08 <&rachel> what: yes we need a safe space where idiots like you don't constantly shit on the mood of the channel with constant yelling and trolling
18:08 < what> o my bad
18:09 < dsockwell> SHITBAG
18:09 < dsockwell> SHITDICK
18:09 <%denice> dsockwell: calm down with the caps lock, bro!
18:09 < dsockwell> SHITSHIT
18:09 -!- dsockwell was kicked from #wetfish by denice [i warned you!]
18:09 -!- dsockwell [[email protected]] has joined #wetfish
18:09 <%denice> ah so
18:09 <&rachel> >wa 7 days in secons
18:09 < Neuromancer> [Wolfram] convert 7 days to seconds = 604800 seconds
18:09 < dsockwell> SHIT COCKHOLE
18:09 < snek> i agree with dsockwell
18:09 < dsockwell> SHIT DICK
18:09 -!- dsockwell [[email protected]] has quit [G-Lined: let's see if you can behave in a week]
18:09 -!- what [[email protected]] has quit [G-Lined: let's see if you can behave in a week]



Posted on drama at 18:05:05 MDT

09:00 <&rachel> lol
09:00 <&rachel> https://wiki.wetfish.net/code-of-conduct
09:00 < Neuromancer> [ wetfish.net - A code of conduct - Wow, so future! ] - wiki.wetfish.net
09:00 <&rachel> updated the code of conduct
09:06 <&dbladez> neato
09:12 < copt> can we prune the bots from spamming "nigger"
09:13 <&dbladez> that'd be neat
09:13 <&rachel> copt: how do we do that
09:13 <&rachel> which bots spam that word?
09:15 < copt> denicer at least once
09:15 < copt> also can we just g-line what already
09:16 <&rachel> why
09:16 < copt> adds zero positive content just spams edgelord garbage
09:18 <&rachel> copt: unless he does something that's actually hateful and not just stupid I don't feel justified banning him
09:18 < copt> rachel: unless you think nicking to NIGGERFAGGOT is valuable intellectual discourse
09:18 <&rachel> I don't
09:18 <&rachel> which is why I asked him to stop
09:20 <&rachel> I'm not going to ban someone for skirting the line of the rules because then the rules will just keep getting more strict
09:20 <&rachel> I'd rather ban someone who is obviously crossing the line and will not stop when asked to
09:20 < Honk> same here
09:20 <&rachel> that's the thing
09:20 <&rachel> any time I ask what to stop, he does
09:20 <&rachel> >dunno
09:20 < Neuromancer> ‾(ツ)/‾
09:20 < copt> how many people do you repeatedly have to ask to stop?
09:21 < copt> it's not accidental jokes that go to far it's just obnoxious and toxic
09:23 <&rachel> ok
09:23 <&rachel> :topic prepend PLEASE VOTE! www.strawpoll.me/11265392


1 2 3