IRCaBot 2.1.0
GPLv3 © acetone, 2021-2022
#saltr
/2026/03/23
@RN_
@T3s|4_
@eyedeekay
@orignal
@postman
@zzz
%Liorar
%acetone
%mareki2p
%snex
+FreefallHeavens
+Onn4l7h
+Onn4|7h
+altec_lansing
+leopold
+nyaa2pguy
+poriori
+profetikla
+qend-irc2p
+r00tobo
+uop23ip
Arch
Danny
Holmes
Irc2PGuest28384
Irc2PGuest63277
Irc2PGuest71791
Irc2PGuest84270
NiceBoat_
OfficialCIA_
Over1
SilentWave
U1F642
Wikk_0
ahiru
cims
dr|z3d
eyedeekay_
floatyfloatilla
mahlay
makoto
mesh
n2
nilbog
not_bob_afk2
pory
r00tobo[2]
red
sektorchef
thetia
user_
utp
vivid_reader56
orignal x25519 is much faster than EdDSA
dr|z3d if you're interested in the pmd and test reports, zzz, update.skank.i2p/reports
dr|z3d not specifically the reports, more the presentation.
dr|z3d and the general usefulness of the pmd output.
zzz what is pmd
dr|z3d -> An extensible cross-language static code analyzer.
dr|z3d bit like spotbugs/findbugs.
dr|z3d the extensible part's useful, and the support for a ton of different languages. I run it on java and js, and as mentioned, it's been extended to embed the offending code snippet in the output.
zzz sure static code analysis is great but mostly great at generating more work
zzz how many pmd report items have you verified real and fixed?
dr|z3d about 300js items since yesterday. haven't started on the java yet.
dr|z3d minor js things, but still. easy fixes.
dr|z3d you can tune what's reported to keep the output manageable.
zzz yeah I'm never linting our js. java if somehow I'm done with findbugs and looking for more, which is unlikely
zzz good for a new hire which is also unlikely
dr|z3d I run a basic recursive check on the js to ensure nothing's syntactically borked: github.com/I2PPlus/i2pplus/blob/master/scripts/check-js-syntax.sh
zzz even findbugs I have to run on my laptop because it overheats and crashes my main dev box
dr|z3d also, the jsdoc target was mostly broken so I reworked it to use a newer library: update.skank.i2p/jsdoc
dr|z3d well, here's the thing, pmd is a lot faster to run than findbugs, and probably less prone to crashing.
zzz although I did buy some more ram and blow off the cpu fan since last time I tried
nyaa2pguy no idea if it got through but my buggy IRC client was lying to me that I was online lmao. Anyway: another weird question from me: if you monitor the leaseset for a certain B32/eepsite for a long time, can you infer a list of nearly all of their "Fast" routers just keeping track of the leasesets inbound/outbound endpoints?
nyaa2pguy or does it kinda rotate enough to completely new routers? so it'd be really hard to do. basically wondering for the threat model which includes an adversary that can easily obtain netflow logs of a smaller set of IP addresses