IRCaBot 2.1.0
GPLv3 © acetone, 2021-2022
#saltr
/2025/10/20
@Irc2PGuest32505
@RN
@RN_
@T3s|4_
@eyedeekay
@orignal
@postman
@zzz
%Liorar
%acetone
%cumlord
%snex
+FreefallHeavens
+HowardPlayzOfAdmin
+Onn4l7h
+Sh0ck
+bak83
+profetikla
+qend-irc2p
+r00tobo_BNC
+uop23ip
+weko
Arch
BeepyBee
BubbRubb
DeltaOreo
H20
Irc2PGuest16211
Irc2PGuest18900
Irc2PGuest88693
Irc2PGuest98322
Maylay
Meow
ac9f
anontor
dr|z3d
duck
halloy13412
leopold
makoto
nZDoYBkF__
nilbog
not_bob_afk
one1
poriori_
r00tobo[2]
shiver_sc
simprelay
solidx66_
thetia
u5657
zer0bitz_
dr|z3d ok, I think we're over that little excursion into WTF-land in the + dev builds.
T3s|4 dr|z3d: under IRC tunnel settings, Custom Options, is `crypto.lowTagThreshold=14 crypto.tagsToSend=20 outbound.priority=25` the + default? Are they necessary - and are there better options? Been ages since they were changed...
dr|z3d you can bump up the lowTags and tags to send if you want, not sure if they help much. can't hurt.
dr|z3d outbound priority, leave as is, that ensures your messages arrive on the server in a timely fashion, as timely as your tunnels will allow, anyways.
T3s|4 alright dr|z3d - bumped the lowTags to 20, will see if it impacts my still horrendous IRC initial connection performance on both 5+ and 10+. Weechat, as always, connects to libera tor sever in 2-3 seconds: libera-tor -- | irc: connected to libera75jm6of4wxpxt4aynol3xjmbtxgfyjpu34ss4d7r7q2v5zrpyd.onion/6667 (127.0.0.1)
dr|z3d do a bit more than that, try low tags 30, tags to send 60 or something along those lines.
dr|z3d clearnet, meh.
dr|z3d tor, you're connecting over a chain of consistently fast nodes almost always.
dr|z3d "why isn't my pushbike as fast as a ferrari?"
T3s|4 OK, noted and lols, changed to 30 and 60 :)
dr|z3d ok, in-console updates should now be functioning normally again. sorry for the hassle.
dr|z3d well, for some definition of normally. still slower than I'd like.
dr|z3d signal.org/blog/spqr <- you may find this interesting, zzz.
dr|z3d "The Signal Protocol developers didn't want to remove them or the battle-tested code that produces them. That led to their decision to add quantum resistance by adding a third ratchet. This one uses a quantum-safe Key-Encapsulation Mechanism (KEM) to produce new secrets much like the Diffie-Hellman ratchet did before, ensuring quantum-safe, post-compromise security..."
zzz yeah thanks dr|z3d I read the Andy Greenberg article in Wired about it
zzz somebody at signal took Latin in high school
zzz ofc a lot more ambitious than what we did
T3s|4 dr|z3d: excellent article by the Signal devs; thanks :)
T3s|4_ dr|z3d: running Revision: 70e9cf40 (Build date: 2025-10-20 11:56:04 UTC); with the 30 and 60 Options baked in; took about 10 Mins to connect to IRC; so I'm calling that progress :D
dr|z3d add this to /configlogging, T3s|4_, see what turns up. net.i2p.i2ptunnel.I2PTunnelIRCClient=DEBUG
dr|z3d Good call on the Andy Greenberg article, zzz, I'll look that one up, he tells a good story. Haven't finished the article I linked earlier, taking it in chunks :)
zzz I'll bookmark it to read in 5 years if I'm still alive