05:09:30 Is anyone else having issues with monerod constantly exiting with core dumped? 05:09:33 Is my node being attacked? 05:23:09 * Infinity8 brb 05:33:30 * Infinity8 back 05:50:59 hello 05:51:06 hi 05:51:16 what is 05:51:19 as the kids say 05:51:24 crackalacken 05:52:06 i just updated my ledger firmware 05:56:07 trezor master race 05:57:00 oic 06:13:26 only 14478 blocks remaining 06:31:40 ledger is for peasants 06:32:07 why 06:32:45 $$$ 06:33:08 so youre saying its for peasants because it costs money? 06:41:24 no, it's for peasants because it's cheaper than Trezor 06:42:05 yeah but ledger is better 06:52:06 * ocb rolls with eyes 06:52:40 remove "with" 06:53:08 qorg11: are you lains experiment? 06:53:51 :) ^^ 06:54:47 narf: i've had a ledger before. stopped using it. its more headaches than useful. 06:54:57 how so 06:59:39 it was somewhat difficult back then to get it working with electrum 2.x, don't like their desktop app for sending, it could or probably sends some information to ledger servers regarding wallet or addresses which could be connected to ledger ID/serial and to the person that ordered it. moreover when bch forked, i had issues getting coins out to dump that shit bch. it could have maximum 2-3 apps 06:59:41 installed, btc,ltc,xmr i chose, more than that was impossible until they upgraded or whatever they did. used monero with monero-wallet-cli + ledger which worked fine but..finally i broke ledger and im happy about it. prior to that moved backup seeds to USB, made 3 copies and a 50$ ibm t43 laptop with live OS for opening seeds. 07:01:22 it just introduced too many problems, which i traded off with a dedicated hardware for the seeds and a live os with no internet connection, just for signing. tx broadcasting was done from online tools 07:02:01 ^ tx broadcasting was either done by bitcoind on the server, litecoind on the server and well monero.. was never moved. 07:02:37 narf: the only good thing i see about it is that seed never leaves device. 07:03:28 but again, that's why a dedicated laptop for that, with no wifi card (removed physically), live os, no internet... so if there is no internet, what can be stolen, no? :) 07:12:09 Saw a paper about an attack that used copper traces on the motherboard as an antenna to send a gsm signal, which would then be intercepted by a modified cellphone listening nearby 07:12:44 They also implemented a variant that did a similar thing using the ram 07:14:02 So if the airgapped device got infected (say, through an infected usb), they could exfiltrate data from it 07:15:57 https://www.researchgate.net/publication/288181440_GSMem_Data_Exfiltration_from_Air-Gapped_Computers_over_GSM_Frequencies 07:19:26 https://www.researchgate.net/publication/347125332_AIR-FI_Generating_Covert_Wi-Fi_Signals_from_Air-Gapped_Computers 07:33:45 interesting text, will look at it. there is always something.. depending how far one is willing to go and if the reward is big enough (for the attacker) 07:39:18 Infinity8: do you have a stack trace ? 07:39:29 i have no clue what that is 07:40:04 * Infinity8 zzzz 07:41:27 Looking inside the core file to see where it crashed: gdb corefilename; bt (and replace corefilename with the actual core file name, probably core.NUMBERS). 10:05:16 we should exclusively use IBM mainframes for nodes ... https://twitter.com/jhamby/status/1473861373285208064 14:12:00 ocb: yes, i am lain's experiment