In T303774#7775964, @MZMcBride wrote:
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed Advanced Search
Advanced Search
Advanced Search
Mar 15 2022
Mar 15 2022
GeneralNotability added a comment to T303774: Investigate the practice of making thousands of global blocks per day on Meta-Wiki.
Mar 13 2022
Mar 13 2022
GeneralNotability added a comment to T294995: Deadlocks from job setting VectorSkinVersion user preference to 1.
Confirming that it's inconsistent - I've done CreateLocalAccount several times today and it's only triggered once.
Feb 20 2022
Feb 20 2022
Confirmed, just got a wave of emails.
Feb 19 2022
Feb 19 2022
Feb 3 2022
Feb 3 2022
GeneralNotability added a comment to T295073: <Org-Wide Impact> Google Chrome User-Agent Deprecation Impact.
If you all need a CU to test/provide feedback, I would be happy to volunteer!
Jan 12 2022
Jan 12 2022
GeneralNotability updated the task description for T298912: Access to aggregate User Agent statistics.
Jan 10 2022
Jan 10 2022
Dec 2 2021
Dec 2 2021
Nov 10 2021
Nov 10 2021
GeneralNotability added a comment to T295099: Raise bullseye maximum concurrent database connections.
Thanks @Legoktm, I wasn't aware of that, will give it a try. I don't think it'll solve all the problems without a major overhaul of my code to do what bd808 suggested earlier with the queue + bulk write, but it should improve things a bit.
Nov 5 2021
Nov 5 2021
GeneralNotability added a comment to T295099: Raise bullseye maximum concurrent database connections.
This isn't a time-critical issue, so I would be happy to be a guinea pig for working with WMCS to figure this out. And from what I've read online, the "right" approach here generally would involve memcached, but as far as I can tell that isn't available to toolforge projects.
GeneralNotability added a comment to T295099: Raise bullseye maximum concurrent database connections.
Thanks @bd808 - I didn't see that, so I was following the "request a memory increase" template. The page you linked me to says that only requests for changes to wiki replica connections are being considered, and this request is about an increase in connections to toolsdb; should I just close this ticket as "not going to happen"?
Oct 27 2021
Oct 27 2021
GeneralNotability added a comment to T293379: [[:w:en:User:Firefly/checkuseragenthelper.js]] sends CU user-agents to a third party.
Thank you @Jrogers-WMF, the prompt response is much appreciated!
Oct 19 2021
Oct 19 2021
GeneralNotability added a comment to T293811: Clarify whether CUs should share non-public information with external services.
Thank you @sguebo_WMF. The specific question from the ticket was about UAs, but I ask that Legal also account for IPs, since those are covered under the same privacy policy and there is a much greater need to query external data on those. And as a caveat, none of these checks would link a username to the IPs - we're doing things like checking whois (https://whois-referral.toolforge.org/gateway.py?lookup=true&ip=8.8.8.8) or parsing a useragent (https://www.whatsmyua.info/api/v1/ua?ua=Mozilla/5.0%20(Windows%20NT%2010.0;%20Win64;%20x64;%20rv:93.0)%20Gecko/20100101%20Firefox/93.0), but nothing in these checks ties the private data to a specific user or users.
Oct 18 2021
Oct 18 2021
GeneralNotability added a comment to T293379: [[:w:en:User:Firefly/checkuseragenthelper.js]] sends CU user-agents to a third party.
I won't argue the close, but I ask that security makes answering the broader question of "does this violate the privacy policy" this a high priority. It is a routine and ongoing practice for checkusers to consult external services for information on IPs, which are also protected as private information by the privacy policy and calling that unacceptable (which this closure somewhat implies) would have significant repercussions on checkusers' ability to combat harassment.
Oct 16 2021
Oct 16 2021
GeneralNotability added a comment to T293379: [[:w:en:User:Firefly/checkuseragenthelper.js]] sends CU user-agents to a third party.
After talking with Martin, I've redeployed my script without the external call (directly using one of the libraries the external service used). There is still a big question to be answered here, though, since feeding IPs (mentioned in the same line as UA in "personal information") into external services (for proxy checks, geolocation, even just WHOIS to get their range) is a routine part of the checkuser process and we do not have on-wiki tools that can provide those services. I'm not saying that as in "that's how I personally do it" - I've talked with checkusers before about their workflow and they have frequently mentioned those as part of their process. Again, my opinion is that _as long as those data points are not tied to a named account_ there is no privacy concern here, and it would be impractical to use the timing to connect these lookups to specific checks.
GeneralNotability added a comment to T293379: [[:w:en:User:Firefly/checkuseragenthelper.js]] sends CU user-agents to a third party.
I spoke briefly with Martin on IRC about this to voice my concerns, but I will repeat them here: while I recognize that I am a newly-minted checkuser and am not the one making or interpreting the rules, I cannot see this as any different from how checkusers use routinely use WHOIS, geolocation tools, proxy detectors, and the like when investigating IP addresses (and I note that IP addresses are mentioned in the same section of the privacy policy as useragents). Yes, it is sending the UA to an external service, and it obviously ties the request to my IP, but as far as I know there is nothing coming out of MediaWiki that would also leak my username to the external website and so it would be a non-trivial task to match up checkuser actions with queries to this site.
Oct 6 2021
Oct 6 2021
GeneralNotability added a comment to T292623: [SPIKE] Investigate getting global contribution information for IP Info [8H].
A couple tools that do cross-wiki IP contribution searches, might be helpful:
Sep 28 2021
Sep 28 2021
Comment from enwiki - we routinely hardblock open proxies, including CDNs being used as proxies, which is why @Maryana was blocked from editing. Cloudflare already has Cloudflare WARP, and earlier data indicated that Cloudflare, Fastly, and Akamai were all possible exit points for Private Relay traffic, they are all on our block-open-ranges-on-sight list. We have made a specific block template for these services, but we haven't gone through and reblocked all of the known Private Relay exits using that template yet. Related discussion on enwiki from a few months ago can be found at https://en.wikipedia.org/wiki/Wikipedia:Administrators%27_noticeboard/Archive334#Upcoming_Apple%27s_iCloud_Private_Relay_(sort-of_VPN). If it helps anyone, a list of current egress points can be found at https://mask-api.icloud.com/egress-ip-ranges.csv (credit to @Urbanecm for showing that to me)
Jul 30 2021
Jul 30 2021
May 12 2021
May 12 2021
@jrbs the problem, as I see it, is that this is being presented as a fait accompli - the decision has been made, but if you want to complain, you may submit your concerns, to partially quote Douglas Adams, "in the bottom of a locked filing cabinet stuck in a disused lavatory with a sign on the door saying 'Beware of the Leopard.'" (in all seriousness - I think we all know that there exist no "questions or concerns" someone could raise that would actually change the outcome here). There have been discussions with the steward team, yes but not with the people who previously granted the right. It's too late now, but next time this sort of thing happens, I suggest at least talking to the impacted parties before the change is submitted for merge rather than blindsiding them such that they find out at the same time as everyone else.
Apr 6 2021
Apr 6 2021
GeneralNotability added a comment to T278838: Mobile user communication issues (WP:THEYCANTHEARYOU).
In T278838#6972791, @Valereee wrote:I tried to fix a typo and a notice came up that said I had been blocked from editing. There was no explanation why, nor any indication of how I could find out why. How can I find out? This has happened before, and I think it happens when I'm not using WiFi.
Dec 8 2020
Dec 8 2020
GeneralNotability added a comment to T268558: Allow minor (<small>-wrapped) comments to be saved via the reply link without duplicate signature.
How about a simpler option - just add a "don't append a signature" button to the advanced panel?
Nov 22 2020
Nov 22 2020
Oct 19 2020
Oct 19 2020
Oct 5 2020
Oct 5 2020
Commenting as an admin + Twinkle user (pretty sure @Amorymeltzer has TW in mind here) that this functionality would be very useful - I routinely use Twinkle and I make rangeblocks fairly often, but when making rangeblocks my workflow is disrupted since Twinkle can't block from Special:Contribs/(IP)/(mask) so I have to use the normal block interface.
Oct 1 2020
Oct 1 2020
Sep 26 2020
Sep 26 2020
Sep 16 2020
Sep 16 2020
Now that we've upgraded to OTRS 6, I'm happy to be a volunteer to test this.
Sep 4 2020
Sep 4 2020
Sure - there are changes to edit summary wording in my version so the current regex probably won't match it but I have no problem with the two being lumped together. Adding
\(using \[\[:w:en:User:GeneralNotability\/spihelper
to that regex would probably be enough to always match my version.
Aug 12 2020
Aug 12 2020
@Aklapper thank you!
xSavitar awarded T260135: Change my Phabricator username to GeneralNotability a Like token.
Aug 11 2020
Aug 11 2020
Jun 16 2020
Jun 16 2020
Apr 30 2020
Apr 30 2020
Content licensed under Creative Commons Attribution-ShareAlike 3.0 (CC-BY-SA) unless otherwise noted; code licensed under GNU General Public License (GPL) or other open source licenses. By using this site, you agree to the Terms of Use, Privacy Policy, and Code of Conduct. · Wikimedia Foundation · Privacy Policy · Code of Conduct · Terms of Use · Disclaimer · CC-BY-SA · GPL