- Erich Bacher (@thePrevaricator WI, US) https://drive.google.com/open?id=1XWJjWwKzVI10QbRkLh6-L7XbZjE&usp=sharing
- CQ ππ Sarah
{{FWD: Mo Hughes <span class="emoji emoji-spritesheet-0" style="background-position: -108px -72px;" title="point_up_2">:point_up_2:</span><span class="emoji emoji-spritesheet-1" style="background-position: -342px -18px;" title="goat">:goat:</span><span class="emoji emoji-spritesheet-0" style="background-position: -108px -0px;" title="heart_eyes">:heart_eyes:</span>, 20.10.2017 23:47:51}}
Anyone here besides me going to be at Mission Day in Provo? I don't have a counterpart because the green XF-CC got banned for spoofing with 3 accounts.
- Erich Bacher (@thePrevaricator WI, US)
{{FWD: Tiernan (NVX) NQ AU, 21.10.2017 00:16:45}}
So there's been RES leaks, and as a result there's been a desire to expose the presumably similar ENL scrapers of the world as well in a similar manner. I don't run such a tool nor am I affiliate with them, but I do run some tools which, just like IITC, do violate the strict letter of the ToS. As operators we've set an arbitrary view on where that line should be and what tools we are and are not comfortable using and that's fine, however rumours of ENL agents wanting to blow open things is concerning to me because I don't know if your opinion on this matter includes eg flipcard databases and portal location information.
As I have absolutely no desire to get caught up in the middle of this sort of thing, anyone suspected of wanting to willingly leak any information on opsec tools as a preventative measure will not have access to any tools I develop.
- Charlie Arnold " On the ENL side, there's enl.wtf, and cactus, and poptart. I don't know much about these things. Factionally, I'm not a cool kid. People know I'm awkward and moralistic. They don't invite me to controversial stuff. That's fine. If I knew more about them, I'd just blow them open. Everyone knows this."