Volunteer account: @NahidSultan
User Details
- User Since
- Apr 7 2017, 4:35 PM (370 w, 6 d)
- Availability
- Available
- IRC Nick
- Nahid or NahidSultan
- LDAP User
- NahidSultan
- MediaWiki User
- NahidSultan (WMF) [ Global Accounts ]
Tue, May 14
Mon, May 13
Wed, Apr 24
Done per T&S ZD#77603.
Mon, Apr 22
Mar 29 2024
T&S update: Hey all - this is an update on the changes we've implemented regarding the emergency@ inbox, which T&S owns. To ensure optimal support for this critical workflow, we've removed filters and implemented a whitelist to prioritize emails. Additionally, we've incorporated regular checks of the spam folder. We are committed to this process, if anything else comes up please don't hesitate to reach out via ca@wikimedia.org or ping me or @jrbs. Thanks.
Mar 18 2024
Feb 12 2024
We have closed the ticket on T&S' end as we were not successful in confirming the identity. I will close this one as declined for now.
Jan 22 2024
Thank you all.
Jan 19 2024
Jan 8 2024
Thank you, kindly.
Done (ref: ZD#71502).
Dec 16 2023
Thank you.
Dec 14 2023
Dec 12 2023
Dec 4 2023
Nov 27 2023
Done via ca@. ZD#68579.
Oct 4 2023
May 11 2023
T&S has verified the ownership through a video call and 2FA was disabled from wikitech. Leaving the horizon.wikimedia.org 2FA for cloud services team. Thanks.
May 9 2023
We got the email now and will coordinate there. Thank you. For some reason, it was flagged as spam.
May 8 2023
Apr 25 2023
@Epantaleo, If what bd808 suggested doesn't work for you please reach out to ca{{@}}wikimedia.org with reference to this phabricator task and we can explore what we can do to support your request here. Thanks.
Apr 18 2023
Apr 13 2023
Feb 26 2023
Done. Ref: ZD#56750.
Feb 23 2023
Done via ca@, ref: ZD#56595.
Jan 3 2023
It was resolved through ca@. (ZD#52943)
Dec 21 2022
Identity confirmed: T&S has verified the identity of the owner through a video call therefore, it is fine to remove 2FA as requested. Handing back to Cloud services or SRE. Thanks.
Dec 19 2022
From a Trust and Safety standpoint, I don't believe we have an alternate option here to unequivocally verify the ownership of the account other than the option mentioned above as such I'm declining the request, sorry. I'd also recommend creating a new account. Thanks.
Hey @Klein, can you please send a note to T&S through ca@wikimedia.org by referencing this phabricator task? Thanks.
Dec 1 2022
Apologies for the trouble. I forgot that I needed two keys. Here's the new one:
Nov 18 2022
Handling through ca@ (ZD#50839).
Oct 31 2022
Done (T&S ZD#49470)
Aug 15 2022
Done. Thanks.
Jul 3 2022
Thanks for the ping. It was done on 29 April through ca@. I forgot to resolve this task. Sorry for that.
May 18 2022
Apr 27 2022
Hey @LaurentBouvier, please send a brief note about this request from your main account's registered email address to Trust and Safety (ca@wikimedia.org) for the next steps. Thanks.
Mar 22 2022
Mar 14 2022
Disabled (ZD#38526).
Disabled (ZD#38526). T303693
Mar 12 2022
Disabled (ZD#38526). Thanks.
Disabled (ZD#38526). Thanks.
Mar 11 2022
Disabled (ZD#38529). Thanks.
Feb 23 2022
Feb 22 2022
Hey @Oshwah - as Peachey88 has mentioned above, please ask Waggie to send a note to ca@.
Jan 26 2022
Jan 25 2022
Done (ref#ZD36360).
Jan 21 2022
Done (Ref ZD#36327).
Jan 4 2022
Jan 1 2022
The election has concluded so I'm closing this task.
Dec 31 2021
Dec 27 2021
Thanks. I've sent emails to both of you.
Hey @jimmyxu and @Wong128hk, still waiting for the confirmation :) Can you please confirm whether or not you will be able to take the role? I'm happy to support .
Dec 25 2021
Hey @Stang, @1233thehongkonger, and et al. Thanks for the update. Do you prefer local scrutineers at this stage? In which case, do you have enough community support for local oversighters to take on this task? If not, I can also take on that role from the T&S side.
Dec 21 2021
Dec 17 2021
Hey @Operator873, can you please send a quick note to ca@ from the attached address so that we can coordinate there? Thanks.
Nov 29 2021
Hey - As Joe noted here T180648#4039087, we want to see this expanded but at the same time, the resetting sometimes require off-wiki verification which is often difficult the way the system was set up, so if someone losses access to their account and we can't prove that they are the real owner of the account, the account won't be restored. Also, there are only a handful of staff members from T&S who manage this workflow so there is also a capacity issue in case we are to receive a large-scale request.
Oct 20 2021
Disabled per T&S ZD#32437.
Oct 4 2021
T&S ref: ZD#32014
Sep 13 2021
I've talked about this with individual SRE and security team members but let me say it on record as well that this type of script would be immensely helpful for T&S's workflow :) I'm sure as a former member of the T&S, Samuel would also concur with me :)
Sep 1 2021
Aug 30 2021
Aug 23 2021
2FA disabled. Thanks.
Aug 19 2021
Jun 30 2021
Okay; In consultation with Legal, I've now hidden the outdated ones. Only acl*access-policy-approvers can view and manage the documents.
Jun 28 2021
Jun 17 2021
Done from ca@ ZD#28191
Jun 16 2021
Jun 2 2021
May 21 2021
Thank you kindly.