Time Nick Message 00:20 independent56 I have finally got a navigational sidebar for my rapidly growing server wiki. Should help navigation 01:09 jonadab rubenwardy: Maybe have a look at this patch, which seems to have fixed the crash bugs for me, or at least the most common ones. https://termbin.com/amae 01:10 jonadab My lua skills are terrible, so feel free to view that as a starting point or whatever. 01:13 jonadab mazes_81: You also might be interested ^ 01:14 jonadab Since you were expressing interest in the pipeworks autocrafter group: recipe support patch the other day; this one is meant to be applied after that one, to fix crashes. 01:16 Noclip[m] Which group do I need to add a node to so that it can only be destroyed in creative mode but not in survival? 01:16 Noclip[m] Is there group for it or would I need to make such a group myself? 01:27 MTDiscord I believe last I checked neither NodeCore nor MTG had such a group. NodeCore does have an admin item that can unconditionally pick up any node that can be pointed at; devtest is likely to have something very similar. 01:29 jonadab I think you have to take account for all the different ways nodes can be destroyed in your game/modpack. 01:30 jonadab For example, if you have digtron, you have to make sure digtron can't remove it. 01:31 Noclip[m] Well, I mainly wanted to know if such a group already exists. 01:31 jonadab If you have TNT, you have to make sure TNT can't blow it up. 01:31 jonadab I don't think there's a generic "can't be destroyed in any way" group, no. 01:31 Noclip[m] As it doesn't exist I will probably just add it to another group. 01:32 jonadab I assume you either don't have WorldEdit or would consider it equivalent to creative mode. Otherwise, you'd have to look at that too. 01:32 jonadab And I don't even know if it's possible for a node to block we. 01:32 MTDiscord In NodeCore nodes should be indestructible if they don't have any dig groups, and mods that fail to respect that are basically bugged. 01:33 MTDiscord World edit would fall under the "removed by admin" case tho 01:33 jonadab Fair. 01:33 jonadab Personally I consider WE tantamount to creative. 01:34 jonadab It's amazingly useful for testing changes to mods, though. 01:34 MTDiscord Basically each game can establish conventions around destructibility, and mods are technically always able to bypass those.. m 01:34 jonadab Yeah, you really have to know which mods you have. 01:34 Noclip[m] I added a node in MTG and because I didn't add it to a dig group it's indestructible, too. So I wondered if there would be a group that makes it only destructable for creative mode. But it's not really important in the long run, I'm just playing around a bit. 01:35 jonadab Oh, just add a type of tool that has no crafting recipe, and can remove the node. 01:35 jonadab Then it requires creative or admin privs (like /give) 01:35 MTDiscord You could create a tool only creative mode players could access with a custom group, or you could just add an on_punch callback that checks for creative mode privs or something... Lots of ways, no really clear convention I know of. 01:36 jonadab Or that, yeah. 01:36 jonadab Though I think checking for creative mode requires 5.x 01:37 MTDiscord Could be ... but pre-5.x MT is basically pretty dead here now ... using it at all could really be considered like a fork by this point, it's diverged so much. 01:38 MTDiscord It's been so long since I dropped all 0.4.x support for all my stuff... 01:40 MTDiscord Actually, creative mode being a 5.x thing is a builtin thing, not an engine thing, right? That would mean games still have the power to manage that themselves. 01:43 Noclip[m] I think creative mode isn't implemented in the engine, yea. 01:44 Noclip[m] The engine just provides a checkbox in the menu to select creative mode if available. 01:44 MTDiscord Ripping it out for me only required overriding one function in builtin, and finding it accidentally enabled only actually affected one thing, so I suspect it's really mostly in builtin ... 01:45 MTDiscord In 5.5 that checkbox can be hidden ? 01:45 Noclip[m] Cool! 01:45 MTDiscord But adding new checkboxes for different game features is still in the whiteboarding phase... 01:46 Noclip[m] Nahh, I don't like the checkbox thing anyways. 01:46 Noclip[m] That's not how you should configure game based stuff! 01:46 Noclip[m] game based stuff should be configured through privs and commands. 01:48 Noclip[m] One serious issue with the creative and damage checkboxes is that it makes both settings a global thing and can only be changed on server restart. 01:49 Noclip[m] Unlike Minecraft you cannot set damage and creative mode per player and you can't change it while the game is running. 01:49 Noclip[m] Of course as a dev you can solve that issue through modding but that shouldn't be needed in the first place. 01:51 Noclip[m] There should be a priv and a command to change creative and damage on a running server per player. 01:58 jonadab game-based stuff should be configured through minetest.conf mainly, with privs and commands secondarily. 01:59 jonadab But yes, anything you need to change on a per-player basis obviously should be a priv. 02:00 Noclip[m] Everything that the user might want to configure while the game is running should be configurable through privs and commands. 02:01 Noclip[m] jonadab: Privs aren't always enough: You might not want to give a player creative but instead give them access to a command which they can then use to change their mode when ever they like to do so. 02:01 jonadab Noclip[m]: So you have a command that only works if you have a given priv. 02:01 jonadab Like /teleport 02:01 Noclip[m] Exactly 02:02 Noclip[m] Or you use two privs where on privs allows them to change the other priv. 02:02 jonadab I suppose. 02:02 Noclip[m] Or is this not possible? 02:03 jonadab Probably? 02:03 Noclip[m] It should at least be possible through a new command but that would kind of defeat the purpose of a second priv. 02:18 jonadab I mean, make the initial priv allow using a key binding to toggle something, like fly does. 02:20 MTDiscord The problem with configuring things in minetest.conf is that there's only one for all worlds, and SP is a thing. General world-specific config would help a lot. 02:20 MTDiscord I think there are proposals out there to clean up some config handling stuff like that, but I forget specifics. 02:25 Noclip[m] Yea, that's another big issue with it. 02:26 Noclip[m] As we don't have world-specific configs yet I'd say mod and game makers should avoid using minetest.conf as much as they can. 02:27 Noclip[m] Either use commands and privs for configuration or read configs from a file within the world folder. 02:31 MTDiscord minetest.conf stuff can be okay for play style tweaks, or emergency things that you might only use temporarily, or things only relevant to dedicated servers that pretty much always have their own config. 02:32 MTDiscord Other than that, player or mod meta is a good place to store in-game state stuff that doesn't already fit privs. 08:36 erlehmann Which group do I need to add a node to so that it can only be destroyed in creative mode but not in survival? 08:36 erlehmann haha bedrock destruction goes brrrrrr 09:19 MinetestBot 02[git] 04nerzhul -> 03minetest/minetest: Add debian 11 to Gitlab-CI (#11571) 13a7188bd https://git.io/JEzUq (152021-08-27T09:19:15Z) 11:04 independent56 Lets say someone SSH'd into my server and did a rm -r ~ as a joke. I was not aware, nor did i permiss this acion. Would this be legal ground for some punishment under the computer misue act? 11:05 independent56 it is unauthorised access and destroys valuble data 11:06 Tusha I would say that depending where you live, it could be at least a civil illicit act 11:07 independent56 I live in the uk, thus my mention of the computer misuse act. What laws does the criminal follow? do they get imprisioned by britishofficers or law or officers of law of their home country or officers of law of the country they're in> 11:07 Tusha As long as you can give evidence to the authorities and let them investigate the case, and that they want to take it seriously, but as far as I know, getting into other's computer wihout permission usually can be considered a crime 11:08 Tusha It all depends from where the attack came from 11:08 Tusha If it is international maybe interpol can act 11:08 Tusha All depends on how the authorities treat the case though 11:09 independent56 Is reading my sister's browsing history considered a crime? it facilitates unauthorised access. 11:10 Tusha Again, I guess it would depend on the country, doesn't the uk has a site with info about those things? I would say it could constitute a privacy attack, if the user didn't had permission to do 11:11 Tusha to do so*, although it can always be interpreted by a lawyer, like if she left the computer on and logged-in, that could imply a granted permission 11:12 independent56 it does 11:12 Tusha But I would consult an expert, all this is comes from police-based series and I doubt it can hold to real-life cases 11:12 independent56 ha 11:13 independent56 "it does" refer to the governemnt having a site 11:13 Tusha I see, I would ask there then, maybe they can guide you 11:13 independent56 https://www.legislation.gov.uk/ukpga/1990/18/crossheading/computer-misuse-offences 11:13 independent56 I have a unambiguous text here 11:14 Tusha All I know about UK law is that they don't let you have strong encryption, which I feel is lame 11:16 independent56 Citation needed 11:19 Tusha Indeed, I may have understood it, can't find where I found it, but it seems more like a government intention and not actual law, for what I'm finding so far 11:22 Tusha https://en.wikipedia.org/wiki/Encryption_ban_proposal_in_the_United_Kingdom 11:24 Tusha https://techcrunch.com/2021/06/30/uk-tells-messaging-apps-not-to-use-e2e-encryption-for-kids-accounts 11:24 Tusha Can't find the actual place where I saw that info in the first place, sadly 11:36 independent56 hmm 11:37 independent56 it hasn't acted yet. until protonmail stops working,it hasn't 11:37 independent56 It's a horrible idea, and ideas like thisis why we use democracies. 11:41 Tusha Indeed 11:41 Tusha And yeah, reading this: https://www.gp-digital.org/world-map-of-encryption/ I rememered what I read 11:42 Tusha It is that if you have evidence encripted, and it makes you guilty, you are forced by law to unencrypt it to the authorities 11:43 Tusha Maybe I could have phrased it better, but the thing is, you must de-crypt all info if asked by law, even if doing so creates evidence against you 11:43 independent56 Well, my evidence will be in the form of system logs, so i can see why an attacker would like to remove them. 11:44 Guest5224 wiki.minetest.net SEC_ERROR_EXPIRED_CERTIFICATE 2021-08-11 11:44 Tusha I guess this is why veracrypt has plausible denyability which makes you be able to have dual partitions in the file depending on password given 11:44 Tusha They got deleted? 11:45 Tusha There are some linux distros that let you recover files though 11:45 independent56 Guest5224, yeah cirtificate has been expired for months and nobody has fixed it. 11:45 independent56 i hope there is software for that, as i use the fringe bodhi linux 11:46 independent56 And they aren't deleted. they are a tapestry of my server. 11:46 Tusha Who could fix it? I mean, anyone with admin access to the web server could create a cronjob with a certbot nowdays, even I managed to do that xD... 11:46 Guest5224 letsencrypt is widely used for this. https://letsencrypt.org/ 11:47 sfan5 independent56: 2021-08-11 is less than three weeks ago 11:47 Tusha independent56 Just unmount the drive and mount in read only so it isn't altered and files aren't overwritten 11:47 sfan5 in any case we're aware on it and a fix is being worked on 11:48 independent56 sfan5, Feels like months 11:48 independent56 Tusha, good idea. 11:48 independent56 I also create daily backups copied to my main computer 11:49 Tusha Well, you may then just restore the backup and save the hassle of recovering the data, which can be a pita 11:49 Tusha sfan5 nice to know you are working on it :) 11:50 independent56 That's what the backups are for. I hope i can get a cut of the fine if they get such a low punishment. 11:51 Tusha Just keep everything untouched if you plan to ask for compensation, as they may need the evidence 11:52 independent56 yeah, but how do i serve the evidence? ssh access? 11:52 Tusha Dang can't find the article that introduced me to ddrescue 11:52 independent56 entire computer transfer? 11:52 Tusha Maybe they need physical access to the harddrive 11:52 Tusha I don't know as I never saw how law operates in those cases 11:53 Tusha Just common sense kicking-in about having stuff as untampered as possible 11:53 independent56 ah yeah 11:53 Tusha So you can't be accused of manipulating it 11:54 independent56 it would be impossible to login with a removed home directory ( i oncedid that on a vm and it was funny) 11:54 sfan5 Tusha: well not literally me, I don't host the wiki 11:55 Tusha independent56, Interesting, never tried that 11:56 independent56 In actuality, i used the same hardware as the server, but it was a minimal installtion, meant for writing on a usb. So my data was fine, the computer wasn't. Ihad to reinstall bodhi 12:00 Tusha I think there are ways to rebuild the home directory, from adduser I think (or however the command is called) 12:03 Tusha If you want forensic distros (just searched now) last I used for data recovery was CAINE, although it is a bit bloated, also ParrotOS should help 12:21 sfan5 By some unscientific log parsing I have determined that most of the Minetest players who use Windows are on Windows 10 20H1 (65%) 12:21 sfan5 second biggest group is on Windows 7 SP1 (which is EOL), third biggest on Windows 10 19H1 (which is also EOL) 12:22 Tusha I win (no pun intended) as I'm in 1607 12:22 Tusha win10 that is 12:22 sfan5 that's the 9th largest group 12:33 erlehmann independent56 regarding the computer misuse act, you should know that what will be considered a crime by the authorities usually depends on who does it. it is not just about the letter of the law, but about who is inconvenienced. 12:33 independent56 oh god... what about me? how would i be treated? 12:34 erlehmann independent56 if a police person does something that *might* be seen as a crime, they are much less likely to be punished than, say, a journalist or some random person not in a position of power. 12:35 erlehmann independent56 on the contrary, normal people can be punished for stuff that might not even be reasonably considered a crime if they inconvenience the authorities. 12:38 erlehmann independent56 for specific legal advice i would always advise you to ask a lawyer. not only are they professionals, usually lawyer-client communication is protected (in theory) by the law as well. 12:39 independent56 oh 12:39 independent56 well crap 12:40 erlehmann only trust your fists, police will never help you! 12:40 erlehmann (that's a quote from a video game) 12:42 erlehmann https://nitter.snopyta.org/Foone/status/1002735322948440064#m 12:43 erlehmann nah, it's not a quote from a video game after all 13:39 MTDiscord why does this cause a segfault? 13:39 MTDiscord -- on_place = function(itemstack, placer, pointed_thing) -- if pointed_thing.type == "node" then -- local pos = pointed_thing.above -- minetest.set_node(pos , {name="mesewars:stone"}) -- local inv = placer:get_inventory() -- inv:remove_item("main", "mesewars:stone") -- end -- end, -- on_dig = function(pos, node, digger) -- local wielded = digger 13:39 MTDiscord and digger:get_wielded_item() -- local drops = minetest.get_node_drops(node, wielded and wielded:get_name()) -- minetest.handle_node_drops(pos, drops, digger) -- minetest.dig_node(pos) -- end, 13:40 MTDiscord the on_dig 13:41 sfan5 doesn't dig_node call on_dig itself? 13:42 MTDiscord I want to bypass protection 13:42 MTDiscord I guess I should do that by modifying minetest.is_protected 13:43 sfan5 uh what 13:43 sfan5 just call remove_node?! 13:44 MTDiscord I also want to give the player the node 13:44 MTDiscord oh, instead of dignode 13:50 sfan5 on_dig does not get called when protection kicks in 13:50 sfan5 so your approach is indeed wrong 15:02 Noclip[m] independent56: Your IT security shouldn't rely on law enforcement, that's a very dumb strategy to begin with! 15:03 independent56 Ha, yeah, probably 15:06 Noclip[m] You probably want to be able to get full root access through SSH so sandboxing isn't really an option here. Make sure that SSH itself is setup in a very secure way. 15:06 Noclip[m] If possible use only public key login and disable password based login in the SSH config. 15:09 Noclip[m] independent56: Those are my default config optimizations for the SSH server:... (full message at https://libera.ems.host/_matrix/media/r0/download/libera.chat/09b0adddca56e9fac88c0b8f5b08f67e8cfccb86) 15:10 Noclip[m] Make sure that you setup public key authentication before you make those changes otherwise you won't be able to login to your server through ssh anymore! 15:10 independent56 thanks.... >:-) 15:11 independent56 wait why i get error "invalid user"? 15:12 Noclip[m] independent56: Also setup a firewall and allow incoming traffic only for those ports where you really need it. (For example the ports for ssh and minetest.) 15:13 Noclip[m] independent56: "wait why i get error "invalid user"?" 15:13 Noclip[m] -> Not sure what you did there. 15:14 Noclip[m] Because of "PermitRootLogin no" you cannot login as root anymore. You will need to first login to another user and then elevate privs from within that user account. 15:15 independent56 hmm 15:15 independent56 andwhat i did was joking 15:15 independent56 (pronounced "joe-king") 15:18 Noclip[m] independent56: Also do not run the minetest server with root privs, it really doesn't need them! 15:18 independent56 i never do 15:18 independent56 (i never did) 15:19 Noclip[m] Good! If you want some additional security for the mintest server you should run it either inside a sandbox or a virtual machine. 15:20 Noclip[m] Unless your server has a lot of unneeded power a virtual machine is probably a bit overkill. 15:20 Noclip[m] A sandbox on the other hand is less secure but has pretty much no overhead at all so you won't lose any performance. 15:22 Noclip[m] independent56: For sandboxing you could use firejail, bubblewrap or minijail. 15:22 independent56 too much effort 15:22 independent56 for such a weak thing. 15:26 Noclip[m] independent56: Well if someone finds a zero-day exploit in minetest they might be able to run arbitrary code as the user which started the minetest server. Depending on your security setup they might be able to work their way up to root then. With root they would then have full control over the operating system. 15:26 independent56 ahrgh! 15:27 independent56 and that's why backup is so important 15:27 Noclip[m] It wouldn't surprise me if finding such a zero-day in minetest would be fairly easy. 15:30 Noclip[m] independent56: Is there any sensitive/private data on your server which could get you in trouble if someone would publish it? 15:31 independent56 erm... give me some examples to jog my memeory. I certainly do not keep my 0x volumes, exhaustive reruns of my life, showing off my absolute shittiness. 15:31 independent56 ... on the server 15:31 Noclip[m] Backups do not protect you against data theft! 15:34 MinetestBot 02[git] 04sfan5 -> 03minetest/minetestmapper: Modernize CMake build script 138b563f4 https://git.io/JEggc (152021-08-27T15:30:42Z) 15:34 MinetestBot 02[git] 04sfan5 -> 03minetest/minetestmapper: Switch from Travis-CI to Github Actions 13f26070e https://git.io/JEggW (152021-08-27T14:56:24Z) 15:34 Noclip[m] independent56: Examples for sensitive data would be for example pictures of yourself or your family, data that can be used to identify you or official documents like your ID, drivers license or certificates. 15:35 independent56 Oh yeah, that. Darn... i will need to take a minute to think. 15:36 Noclip[m] Especially those official documents would be a serious threat as they can be used for identity theft! 15:38 Noclip[m] independent56: You should delete any sensitive data from the server which doesn't need to be there. (Of course you should do that in such a way that it can't be recovered anymore.) 15:38 independent56 90% sure there is no sensitive information 15:39 independent56 Not even my name, Vitra is over there 15:40 Noclip[m] independent56: You should check that just to be sure. If there is really no sensitive data on the server then relying on backups might be okay. 15:41 independent56 But i might as well put my name on the wiki, for vertification purposes 15:41 Noclip[m] (Of course you should have backups anyways, you often just need some additional protections.) 15:42 Noclip[m] independent56: That's your decision. If it's just for verification you could probably use a public key instead. 15:42 independent56 hmm 15:44 Noclip[m] As long as you don't lose the private key and keep it secret that should actually be the best verification method available today. 15:44 independent56 hmm 15:47 Noclip[m] independent56: public key cryptography seems to be uncrackable without quantum computers from the future. 15:48 independent56 i mean like on other parts of the web "oh yeah, vitra made an account here, he owns his own wiki" 15:48 Noclip[m] "he owns his own wiki" lul 15:50 Noclip[m] independent56: You could make a new account on a platform and then sign a message with your private key to prove that the message is from you. 15:52 independent56 I might as well make fake personal details 15:52 independent56 and fake incriminating evidence. 15:52 independent56 To deter deeper efforts 15:54 Noclip[m] Unlike public key cryptography those fake details could be faked again by others fairly easy. 15:54 Noclip[m] And isn't the point of verification that no one can fake it? 15:55 independent56 meh 16:06 Noclip[m] I will probably be offline for now, bye. 16:13 Hawk777 Hmm, the problem with the “verify via signed message” thing is that, if you lose the private key, you can’t verify; if you verify via personal details, you likely still have those. And if you say, well, back up your private key, I say, if you have good backups, you won’t lose the original password that you were trying to recover anyway, because you’ll back up your machine regularly (with your password manager database on 16:13 Hawk777 and have a way to access those backups later. 17:08 Noclip[m] Hawk777: Normal passwords are far easier to steal and fake than a private key. 17:08 independent56 i do. I copy them using SCP to my main every day 17:08 independent56 It really helps 17:10 Hawk777 It depends on what your goal is. If you’re talking about using private keys instead of passwords as an everyday login system, great; they are definitely superior in lots of ways (but also useless for most services, since when’s the last time you saw a website that uses a private key to log in? really only useful for SSH and a few other things). If you’re talking about using them as an account recovery mechanism, for when you 17:10 Hawk777 your normal credentials, that’s what I was talking about—might as well just back up your passwords instead of your private key, and then you won’t lose them in the first place. 17:10 Noclip[m] Hawk777: And if you use something like a hardware key with fido to store and use your private key then stealing them should be pretty much impossible without also stealing the hardware key as the private key should never leave the hardware key. 17:11 Hawk777 This is true, if you have one of those, though the question then becomes, what do you do when the hardware breaks? You obviously can’t have backed up the key because the point is that it’s nonexportable. 17:13 Tusha Using a disposable usb extension could help with that, saving wearing from the hardware key 17:13 Hawk777 Also, while avoiding credential theft is a nice property, it would be a good idea not to rely on it too much. After all, if I want to gain long-term access to your server (for example), I don’t have to steal your SSH private key. Assuming I’ve already broken into your desktop but I can’t access your private key (i.e. the security perimeter that the hardware key provides), I just wait until you SSH into your server, create a s 17:13 Hawk777 d terminal session in the existing SSH connection, and use it to add my own key to your authorized_keys file. How often do you check that for extra lines being mysteriously added to it? 17:14 Noclip[m] Hawk777: When I came up with public key cryptography I actually wasn't talking about website logins at all. I was talking about a method to prove your identity to other humans and not to a server. For server logins you have to rely of course on what the server offers you as login options. 17:14 Hawk777 Oh yeah, it’s fine there. 17:15 Hawk777 Tusha: Helps with some problems, but doesn’t really help if a lightning bolt comes through the USB cable and into the key, or if you drop it down a sewer grate, or if you get hit by a car and it’s in your pocket and gets crushed, or whatever. I’m still uncomfortable with critical things that can’t be backed up at all. 17:16 Tusha Yeah non-predictable damage is still something to worry about Hawk777 17:17 Hawk777 Sadly, like everything, we can’t have our cake and eat it too. Either you make it really secure but vulnerable to loss, or you make it very redundantly backed up but easier to steal. 17:17 Tusha The further thing I saw about backups was converting bineries to base64 and generate high failsafe qr codes and print them to backup the data 17:17 Tusha binaries* 17:19 Noclip[m] If for example I would have a Twitter account, Twitter would get hacked and someone would take over my account they could post messages with my account but they cannot sign them with my private key and thus can't prove that they are me. In the same scenario I could just create a new Twitter account, post a message which says that my account got taken over and sign it with my key to prove my identity. 17:20 Hawk777 Yep. Which solves the problem for whatever percentage of your followers actually downloaded your public key and know how to use it to verify the message. I think that’s the sort of thing that keybase.io automates a bit, isn’t it? Posting signed attestations of mappings between keys and various online accounts? 17:20 Noclip[m] Hawk777: I don't know that much about those hardware keys. Is there really no way to back them up? 17:21 Hawk777 I don’t either; I don’t own one. I think some of them might have an “export PIN” or something that you can enter to export the key, and another PIN that you can enter to use the key without exporting it, but I’m not sure. And some might not allow exporting at all, or have the option to generate non-exportable keys. 17:21 detrout Noclip[m], backing them up is considered a security vulnerability, the recommendation for backup is either have a couple of them or some other method to authenticate 17:24 Noclip[m] detrout: So you generate the private key on a normal computer which is considered secure and then import it into all your hardware keys? 17:24 detrout I think you can do that, though you can also generate private keys on the token itself 17:25 Noclip[m] Hawk777: Isn't keybase just a alternative to Signal? Iirc Keybase uses proprietary server software. That's not really a security concern but not very nice either. 17:26 detrout I thought keybase is a different product, it was trying to help connect identities to keys 17:26 Noclip[m] detrout: Which you then cannot export and thus can't copy into other hardware keys, right? 17:26 Hawk777 Maybe I’m thinking of something else, but I thought Keybase was (at least when it was first launched) a tool for automating things like posting a GPG-signed message on Twitter, Facebook, or whatever else, and verifying said messages from other people, to bind identities to keys. 17:26 detrout signal was an IM system that had very convienent to use crypto setup. 17:27 Noclip[m] detrout: Mhh, on their website it just says "End-to-end encryption for things that matter. Keybase is secure messaging and file-sharing." 17:27 detrout huh apparently keybase branched out? https://keybase.io/ 17:28 detrout wow they switched a long time ago 17:29 detrout This is the keybase I'm remembering https://web.archive.org/web/20150209180753/https://keybase.io/ 17:29 detrout but they had pivoted to messaging by 2018 17:29 Noclip[m] Interesting 17:29 detrout and i don't care enough to trawl through archive.org to see when they changed 17:34 celeron55_ interesting 17:35 celeron55_ keybase has a blog that goes back man years, you can see what happened there https://keybase.io/blog 17:35 celeron55_ many years* 17:37 celeron55_ https://keybase.io/blog/keybase-chat 17:37 celeron55_ this is where the chat was introduced 17:37 celeron55_ that's 2017 17:40 celeron55_ i think their goal became "crypto for everyone" quite early and then they decided there's no other way forward than a messaging platform 17:41 celeron55_ which makes sense 17:42 celeron55_ messaging is the main use of crypto, and no existing messaging platform is going to take in your technology no matter how nice you make it 17:42 celeron55_ especially if you have a business to run 17:43 celeron55_ but then https://keybase.io/blog/keybase-joins-zoom 17:44 celeron55_ zoom bought the entire thing, and i don't think any original user of keybase wants to use anything published by zoom 17:44 detrout Eh... anyone sufficiently paranoid wasn't going to use keybase in the firstplace 17:45 celeron55_ it was an interesting concept 17:46 celeron55_ sadly zoom isn't going to use any of it, they just want keybase's capable team to work on their existing problems 17:54 rubenwardy Keybase dev also died after zoom bought them 17:54 rubenwardy Like, activity dropped right off 18:03 celeron55_ obviously 18:23 MinetestBot 02[git] 04Treer -> 03minetest/minetest: Add group-based tool filtering for node drops (#10141) 13149d8fc https://git.io/JEgAS (152021-08-27T18:23:20Z) 18:23 MinetestBot 02[git] 04Kalabasa -> 03minetest/minetest: Optimize vector length calculations (#11549) 13d36dca3 https://git.io/JEgA9 (152021-08-27T18:22:35Z) 18:26 MinetestBot 02[git] 04NeroBurner -> 03minetest/minetest: Joystick sensitivity for player movement (#11262) 131d69a23 https://git.io/JEgxt (152021-08-27T18:24:24Z) 18:55 MinetestBot 02[git] 04sfan5 -> 03minetest/minetestmapper: Add simple functional test to CI 135c435f6 https://git.io/JEgjb (152021-08-27T18:53:16Z) 19:07 independent56 Are there times where you become at one with your computer, and end up waching time slip through your hands? 19:08 MTDiscord Yes 19:08 MTDiscord Usually when coding. 19:12 independent56 I do it all the time, and then i stand up and i am all wibbly wobbly ebcause i spent 2 straight hours on the compuer 19:13 MTDiscord Only 2? 19:13 independent56 ha, soemtimes more 19:13 independent56 At night i get too tired, so i end up looking at the clock again and again 1;45... 1:55... 2:05 19:14 Extex I'm using the one-line compiler 19:14 Extex https://forum.minetest.net/viewtopic.php?f=42&t=26509 19:19 Extex But when MT starts compiling it stops and says that IrrlichtMT isn't installed 19:19 Extex "Irrlicht Mt is required to build the client, but it was not found." 19:24 celeron55_ that guide is definitely outdated for the latest development version 19:24 celeron55_ you'll need to take a look at the official readmes 19:47 rubenwardy https://github.blog/2021-08-27-30-free-and-open-source-linux-games-part-3/ 19:49 sfan5 neat 19:55 specing Excellent, Microsoft Minetest 19:55 celeron55_ wait do all of the games mentioned in that series of posts have their code on github 19:55 specing Isn't that the point of a github blog post? 19:56 celeron55_ well, not necessarily, but looks like it 19:57 detrout that's a pretty good list of most of the best open source games 20:01 celeron55_ what is interesting is that basically microsoft (under the name github) links to minetest and recommends it, while they have a commercial proprietary product to sell 20:02 celeron55_ i mean, competing product 20:02 MTDiscord it's free advertising 20:03 celeron55_ i don't think they have competing commercial products for any of the other games mentioned in that blog series unless you count games distributed in their app stores 20:03 MTDiscord people playing something that's basically perceived as "knock-off Minecraft" are people thinking about playing games a lot like Minecraft, such as, say, Minecraft. 20:03 MTDiscord Minecraft isnt a competing product 20:03 MTDiscord Theres no competition 20:04 MTDiscord heh, that's kinda true on a couple levels 20:04 MTDiscord Yeah, and I meant it on a couple levels 20:04 MTDiscord Two separate applications intended for separate purposes 20:05 MTDiscord They just both happen to like blocks 20:06 celeron55_ well in the eyes of the general public, it kind of is 20:07 MTDiscord While that may be true, GitHub/Microsoft and its employees are not the general public 20:07 MTDiscord Besides, some Minecraft devs have (and might still) played Minetest. If they understand the difference, who cares what everyone else thinks 20:12 celeron55_ i can see it's the brand that's most valuable. it wouldn't even matter if minetest became very popular among technically minded people and was developed to some kind of killer product - if that happened, microsoft would literally just start distributing minetest re-branded as minecraft 20:12 celeron55_ in reality, of course, not going to happen 20:14 celeron55_ not that anyone a decade or two ago would have believed some of the stuff microsoft is doing these days 20:14 detrout (Also never assume that large companies have consistent positions, there are always scores of different people or factions who can be in various levels of conflict) 21:42 mazes_81 yes jonadab thumbs up, I'm interested in this new feature