3232:
From
November 2016 through April 2019, I was an active member of the OTRS team—I voluntarily relinquished my access in April because of changes in my real life situation which have now alleviated—so I would be readily able to handle requests to the OTRS queue. Being on the OTRS team exposed me to a more humbling side of Knowledge (XXG): the people whom we write about and the people whom we interact with are real people, and the things we do and say can have real, tangible effects. We cannot forget that. For these reasons, I think I am intimately familiar with the principles underlying the oversight policy. I am very active on IRC, and there I help handle revision deletion requests in the #wikipedia-en-revdel channel—I would be more than happy to respond to the oversight requests there as well. As I mentioned in my CU nomination statement, I find that I get along well with other Wikipedians, so I look forward to working with fellow oversighters if appointed.
1409:
just be another tool in the toolbox to help with the work I already do in that area. Apart from SPI, back in
January of this year I joined the account creation team (ACC), which typically has a backlog of requests awaiting checkuser (the oldest request in that queue at the time I am writing this is from 7 months ago). I would be happy to help out on that front as well. As far as my personal background goes, I am familiar with networking principles and IPv4/IPv6 range blocks, and I consider myself a quick-learner. If there is a tricky or unfamiliar case, I would not hesitate to consult with a fellow checkuser. I am very active on IRC, and I find that I get along pretty well with others on Knowledge (XXG). I look forward to working with the team if appointed.
2190:
of blocking on
Knowledge (XXG) in general, and IP addresses in particular, which as I mentioned above are a staple of CU work. I am not looking for large numbers of blocks, just enough to be able to identify quality and a level of experience. For example, it is one thing to know what an IP address range is - it is another to range block it and deal with all the collateral, complaints, block evasion, and other mess that comes with actually performing such a block. We all learn things from blocking IP addresses. Anyway, the decision is not mine, and I've probably had my say, so I'll step aside and wish you good luck. --
1739:
opening a case for somebody else to follow up on. As a CU, I could see for myself, which might well lead to more blocks. I imagine I'll also be servicing the SPI queue and/or responding to requests from other queues (arbcom, etc) so that would lead to more blocks. Massively? That would be speculation, so I can't really answer that part. Not to mention, that just like with edit-count-itis, I don't believe there's much value in comparing block counts. With the tools I have now, I could certainly be doing more blocking, but I tend to be conservative about blocks, and I don't expect that would change.
2821:
oversight policies. I'll be available to help with the oversight mailing list and to handle any requests e-mailed to me, and while patrolling userpages, the user creation log, and new articles I have encountered many instances calling for oversight; I have never had an oversight request denied, and being able to handle such cases on my own would allow me to better serve the community. I am of the age of majority where I live, and have read the policies on non-public information and the confidentiality agreement; if selected, I will sign the confidentiality agreement. Thank you for your consideration.
1729:
software, etc). At the network layer, a security gateway could mutate HTTP headers (including the user-agent string) on the fly. I would be surprised if our most sophisticated and well-funded users (government-backed disinformation agencies, high-priced PR firms with
Fortune-500 clients, national political parties) were not already doing this. I think it less likely that garden-variety SEO spammers are using technology like that, but it's not beyond reach of a mid-sized company with more money than ethics.
1602:
Google, access to any personally-identifiable information was tightly controlled, on a "need to know" basis, and with strict requirements to limit access to the minimum amount of data required to do the job, for the minimum amount of time, and quarantined to a secure environment. As a CU, I would have access to similarly sensitive user information, and would exercise the same diligence. I'm being vague here, but please feel free to ask questions if I've glossed over anything that you want to know.
1153:
AFD, AN3, and ANI. I'm also an ACC Tool
Administrator on WP:ACC, and assist with processing account creation requests, as well as helping tool users with difficult or complex cases. I'm also an SPI clerk and help with responding to evidence and accusations of sock puppetry. I'm also highly active on IRC and I respond to requests for assistance and input from other users, and I respond to emergencies such as LTA activity, threats, blocking requests, revision deletion and suppression requests.
1139:
been an administrator for three years, an oversighter for one year, and have been consistently active, available, and happy to help with requests and urgent matters on IRC and other communication methods. Having the checkuser tools will help me to be able to help more people, as well as help protect this project from sock puppetry and abuse, and put an end to harassment. If you have any questions, please do not hesitate to ask and I'll be happy to answer them.
1162:
Software
Engineering Technology and a Minor in Applied Mathematics. I have extensive IPv4 and IPv6 experience that I actively use during my daily tasks at my current job, including networking, traffic routing, VPN, encryption, and security. I also have basic and advanced certification with Dell SonicWall firewalls and have written packet sniffing, ARP, and ICMP software GUIs and tools completely by myself using C++, Win32, and the WinPcap library.
78:
2490:, I apologize for the delay, it's been a busy week. By and large one of the primary concerns cited was a one-time issue shortly before CUOS2018. I won't rehash the debate, but I have read and re-read that discussion many times and have taken the feedback I received there to heart. I was too quick in that instance to use the tools, and should have proposed an action and solicited feedback before doing so.
786:. While I think it's great that you have returned, some might say that you should have been desysopped for inactivity. CU/OS are particularly sensitive permissions if put in the wrong hands, even more so than just administrator. If given the tools (and you are applying for both tools), do you think that you will be active enough over the next few years to put them to good use? --
2226:
not be discussed there, but I think that for a good percentage of checks here might be one or two of the current checkusers who would disagree with it, and I know that I often see declines to check where I might have run one. to I think someone with Roy's experience on and off WP will have good judgment, and will especially know enough to go carefully at first.
4470:
2638:
noticing a dearth of activity from oversighters there at certain times of the day which is a hole I'm happy to help patch given I follow a
European timezone. I'm experienced at handling private data, both through my work at ACC and as a current checkuser. I'm also familiar with the revdel tool having handled quite a number of revdel requests from IRC.
3810:
3533:
3321:
3154:
2903:
2715:
2523:
2177:
1484:
1244:
1021:
867:
589:
524:
1709:
connection (although, probably out of a limited-size pool). Mobile users (a large and growing segment, especially outside of North
America) will get dynamic IP addresses. With all of those, the IP address won't change very quickly, so a user who logs out and logs in again as a sock will probably still have the same IP address.
1719:
be the same. On the other hand, in large centrally-managed environments, software is usually rolled out onto desktops via automated processes, so every computer may have the same user-agent string. Thus user-agent matches or mis-matches are just another hint, neither conclusively proving or disproving anything.
1887:
user's first edit is to AfD, that's something that raises suspicion. When several new users all comment on the same AfD, that's a (much) bigger suspicion. And, while I can't put into words exactly what I'm looking for, I've certainly read things that people have written and thought, "Hmmm, that sounds fishy".
3734:
responsible for making initial determinations on the use of CheckUser (endorsing or declining CU requests prior to CU review), evaluating evidence, and blocking users for sockpuppetry. I’ve made over 500 blocks in the ~1 year since my RfA, and many SPI-clerk recommendations for admin action before that.
945:
responsible for making initial determinations on the use of CheckUser (endorsing or declining CU requests prior to CU review), evaluating evidence, and blocking users for sockpuppetry. I’ve made over 500 blocks in the ~1 year since my RfA, and many SPI-clerk recommendations for admin action before that.
3762:
I have a technical background as a student of computer science at
Stanford; although networking is not my area of research, I know the basics and I'm confident I can pick up relevant skills fairly quickly. As for experience dealing with private information, I have held a number of positions requiring
2253:
I'd also like to thank Roy for his detailed responses to my questions, and for totally not calling me out for kinda stretching the rules with 2 and 1/2 questions. Whatever else I may think, in both the past incident in question and here on this page Roy has been forthright and civil despite my rather
2225:
The written policy for CU is of course our basic rule, but in actual work it, like all policies, needs interpretation. Various CUs interpret it differently, because so much of this is judgment. In discussions on the CU list, there are frequently disagreements. Of course, most checks are not and need
2041:
This all happened a year ago, and I barely remember the details. But, I suspect that if, at the time, the magic CU fairy had come down and granted me three wishes, I probably would have used one of them to run a CU. But, that was a year ago. In the intervening time (and especially more recently as
1940:
The same cannot be said of accessing confidential information. Once I've seen something, I can't unsee it. There's no way to completely undo the disclosure, and you never know what you're going to see before you look. Behavior-based blocks should not be made willy-nilly, but the decision to breach
1718:
Corroborating evidence would be identical user-agent strings. For example, I take my laptop with me and use it on various networks, including public hotspots and on mobile networks via tethering to my phone. In those various locations, I'll have different IP addresses, but my user-agent string will
1408:
Hello, I'm Mz7, and I would like to apply for checkuser rights this year. I have a history of evaluating SPIs going back to when I became an administrator in
January 2017, and I am experienced at identifying the behavioral peculiarities that may indicate that two accounts are related. CheckUser would
973:
I have a technical background as a student of computer science at Stanford; although networking is not my area of research, I know the basics and I'm confident I can pick up relevant skills fairly quickly. As for experience dealing with private information, I have held a number of positions requiring
825:
Now, if I'm wrong about all that, the activity requirements for CU and OS are also quite a bit more stringent than for sysop. I believe it is 5 logged actions (with the functionary tools) in a year, and of course ArbCom has the power to change that or otherwise manage the Checkuser or Oversight tools
821:
On point, I do believe I'm here to stay. I went inactive due to college; I now hold a stable full-time job. I've gained some maturity and life experience, and I'm returning with a fresh motivation to contribute to the project well into the future. I've learned the few new tools and processes that are
3072:
user. I'm a computer security researcher and a part time web admin, so I am very familiar with the uses - and limitations - of the tool. I am comfortable calculating IP ranges and issuing range blocks. My Recent Changes and AbuseFilter patrolling causes me to stumble upon likely sock puppet accounts
2820:
I am applying for the oversight permission to increase my participation on Knowledge (XXG), help protect the privacy of users, and keep defamatory content from proliferating. I have been an administrator for almost 8 years, active throughout that time, and am very familiar with both the deletion and
2105:
But, the real answer is that I expect that initially, I'll be seeking a lot of input, and go along with the advice I receive. It's quite clear that if I were to ask you, you would say not to run it. Given that AGK declined this a year ago, I expect they would say the same thing. So, yeah, if this
2014:
felt a CU investigation wasn't warranted. How do I feel about that? I'm fine with it. I made a request, and the CU declined. That's fine, that's their job to decide which ones are justified and which aren't. I'm not trying to be evasive, but I don't know what else you're looking for me to say.
1738:
As for, "Would you expect your blocking activity to massively change?", it's difficult to predict the future. Certainly, as a CU, I would have access to more information than I do now, which would help me make better block-or-no-block decisions. Sometimes I suspect a sock, but not enough to bother
1631:
I'm a little surprised to see, given your apparent technical experience, that you've only blocked 5 IP addresses in the last 10 years. The CU role requires a lot of work with IP addresses, such as blocking, analysing or classifying networks, and evaluating collateral. Could you elaborate on how your
1215:
Since last year, I was promoted to a full clerk on SPI. I've also extended my participation on Knowledge (XXG) by not only responding to suppression requests and suppressing content that required its use with the oversight tool, but also helped to remove missed content that needed supression. I also
1161:
My user page explains the extent of my background in a nutshell - I've grown up around computers and my IT-related experience goes very far back. I performed computer and network administration throughout my youth while in school, and held jobs in IT-related areas ever since. I have a BS in Computer
722:
user. I'm a computer security researcher and a part time web admin, so I am very familiar with the uses - and limitations - of the tool. I am comfortable calculating IP ranges and issuing range blocks. My Recent Changes and AbuseFilter patrolling causes me to stumble upon likely sock puppet accounts
3427:
on splitting oversight from ArbCom, to try to free up ArbCom for more dispute resolution activities – though it was a non-starter I still think that having non-arbcom oversighters is important so that the committee can focus on their core responsibilities. To that end, I'd like to think I have the
3278:
This is my first time applying for advanced permissions beyond sysop on any WMF project. From November 2016 to April 2019, I was an active member of the OTRS team with access to the info-en and permissions queues. I voluntarily requested that my access be removed in April 2019; although my activity
2189:
I'd like to thank RoySmith for their extensive reply to my question above. For the benefit of readers who are less technically minded, it's not to be faulted on technical grounds, ie it shows a fair general knowledge of some of the issues that we face. I remain a little concerned about inexperience
1592:
I've been active for the past few months opening SPI cases. I got into that when I started working on reviewing new drafts, which has a fair amount of socking involved. My role at this point has been gathering whatever evidence I could with the standard admin capabilities. Commonality of editing
1444:
This is my first time applying for advanced permissions beyond sysop on any WMF project. From November 2016 to April 2019, I was an active member of the OTRS team with access to the info-en and permissions queues. I voluntarily requested that my access be removed in April 2019; although my activity
1220:
to make it more clear, detailed, and easy to read for newcomers. I've also helped to improve the ACC process for users by increasing deflection. This was done by helping to create necessary pages in order for users to assist themselves and create their own accounts instead of making them wait up to
496:
Applicants must be aware that they are likely to receive considerable internal and external scrutiny. External scrutiny may include attempts to investigate on- and off-wiki activities; previous candidates have had personal details revealed and unwanted contact made with employers and family. We are
3418:
and I am applying for an oversighter appointment. I have been a Wikipedian since 2005, an administrator since 2006, and a bureaucrat since 2016. I currently function as an oversighter on the meta-wiki project and have previously completed the confidentiality agreement for nonpublic information. If
2851:
I work with disabled adults, and in my professional capacity I handle confidential information on a daily basis. Among many other responsibilities, this involves extensive case notes and writing about specific incidents. I must be able to describe client incidents in adequate detail without giving
2651:
I have been handling revdel requests from IRC for a number of years now, and I'm confident in the use of the tool. I also have extensive experience in handling private data here on-wiki, with more than a decade of ACC and a year of checkuser under my belt. I also do a lot of attack page deletions,
1152:
My time has been mostly spent in recent changes patrolling and attempting to mentor and help new users on Knowledge (XXG). I patrol recent changes and revert vandalism, respond to instances of long-term abuse, username violations, blatant sock puppetry, page protection requests, and (occasionally)
3231:
Hello, I'm Mz7, and I would like to apply for oversight rights this year. I have been involved in the "behind-the-scenes" work on Knowledge (XXG) for almost the entirety of the time that I have been active here, and this has exposed me to numerous situations where I have had to request oversight.
3094:
Through recent changes patrolling, I occasionally find oversightable material that I report to the oversight email queue. I also use the revdel IRC channel to respond to requests for revision deletion by non-admins. As an oversighter I would be able to provide a faster response to people visiting
1922:
If a block is made in error, it can be reversed with no lasting harm. Well, that's not quite true; if the act of blocking somebody ends up chasing away a potentially valuable new user, that's harm. From the point of view of the user's account on the site, however, they've been restored to their
1728:
And, of course, all of the above assumes a technically naive user. A more sophisticated user can intentionally mask their IP address using proxies. User-agent strings are likewise easy to spoof at the desktop (by installing multiple browsers, ua-switcher plugins, virtual machines, custom client
1684:
notation. For example, a small business I help out with their IT needs, has a /29. That means the top 29 bits are their network address, leaving the bottom 3 bits for internal addressing. Excluding 000 and 111 as reserved, that gives them 6 externally routable IP address, any of which might be
1647:
Every incoming HTTP request will have the remote IP address logged. For logged in users, there will be, in addition, a username. The IP addresses can be used as a clue to suggest that multiple requests may have come from the same place. For example, if I make a logged-in edit, then log out and
1601:
My last two positions (Senior Software Engineer at Google, and Director of Engineering at Songza) were both hands-on running web servers and applications. Much diagnostic work involved reading through server logs. In both positions I had access to confidential user information. Particularly at
1138:
I am applying for the CheckUser permissions in order to extend my participation on Knowledge (XXG) and help put a stop to sock puppetry, disruption, and abuse. I'll be available to help with processing requests that I see go unanswered on IRC, as well as help with the backlog at SPI and ACC. I've
3753:
My nomination statement describes a number of pertinent areas in which I've contributed; in particular, I've been an SPI clerk for nearly four years, an ArbCom clerk for over four and a half years, and an administrator for over a year. In these roles, I have worked closely with functionaries and
3733:
Greetings: I’m Kevin, and I’m applying for CheckUser and Oversight access to help with some of the backlogs we’ve seen, particularly at SPI. I’ve been an SPI clerk since December 2015, where I’ve been actively involved in sockpuppetry investigations. As a clerk and patrolling administrator, I am
964:
My nomination statement describes a number of pertinent areas in which I've contributed; in particular, I've been an SPI clerk for nearly four years, an ArbCom clerk for over four and a half years, and an administrator for over a year. In these roles, I have worked closely with functionaries and
944:
Greetings: I’m Kevin, and I’m applying for CheckUser and Oversight access to help with some of the backlogs we’ve seen, particularly at SPI. I’ve been an SPI clerk since December 2015, where I’ve been actively involved in sockpuppetry investigations. As a clerk and patrolling administrator, I am
745:
for cases that are ready for administration, either because a CheckUser has already commented or because no CheckUser is required, so I am familiar with investigating behavioral evidence of sockpuppetry as well as the procedures at SPI. I come across enough likely socks through patrolling Recent
3739:
I have an extensive track record as a thorough evaluator of behavioral evidence in SPI cases, and I have a technical background as a Stanford computer science student. I am regularly available and accessible on IRC, and I am glad to perform CU/OS functions on ACC, UTRS, and OTRS (all of which I
1886:
So, what we're really talking about is how I would make the judgement call to suspect socking when I see unusual behavior at AfD. I can't give you an exact answer. That's why we still employ humans to make judgement calls instead of relying on AI algorithms to do it for us. Certainly, when a
1435:
I have a technical background and am familiar with basic networking principles and IP address assignment. I consider myself a quick learner, and if there is any technical aspect of a case that I am unfamiliar with, I will not hesitate to ask a fellow checkuser for advice. I also have experience
950:
I have an extensive track record as a thorough evaluator of behavioral evidence in SPI cases, and I have a technical background as a Stanford computer science student. I am regularly available and accessible on IRC, and I am glad to perform CU/OS functions on ACC, UTRS, and OTRS (all of which I
2834:
I have extensive experience with deletion and revdel across several namespaces. In particular, I regularly check userpages and subpages for various types of misuse, such as spam or NOTWEBHOST violations, and frequently find private information of various sorts. In addition, I frequently patrol
2637:
I am putting myself forward for Oversight. Having made quite a number of requests for oversight, mostly towards a small handful of oversighters, and as far as I'm aware and recall, (if not all) the vast majority have been actioned. I am quite active on IRC in the -revdel channel, and I've been
1958:
Should you expect that I'll automatically run a CU investigation on every new user that pops up at AfD? No, of course not. Will I look at brand new users who are commenting at AfD and wonder if they're legitimate? Yes. How will I decide that my initial suspicion is strong enough to justify
2199:
Inclined to say not right now - the concern isn't lack of technical expertise but expertise in when running a CU is allowed under policy, and issuing rangeblocks (that could be CU blocks as well). Would be happy to reconsider after serving as a SPI clerk, or more relevant experience (like at
2139:. The same concept applies here. Assuming I'm granted CU, I recognize that on day one, I'll be the least experienced and least knowledgeable of the entire CU cadre. My first job will be to learn as much as I can from those who have more experience than I do. It's one thing for me to read
1708:
On the other end of the spectrum, some users will come from multiple IP addresses. The most obvious case is somebody editing from both home and their office, or from public WiFi hotspots. Users with dial-up connections (increasingly rare these days) will get a different IP address on each
1788:
I generally work under the assumption that when a brand new account immediately heads for AfD, something's not right. It's simply not what you would expect a brand new user to be doing. There was a long AN thread (started by me) about this, which I've taken as an endorsement of this
1422:
As I mentioned in my nomination statement, I have commented on numerous sockpuppetry investigations in the past several years I've been an administrator. Specifically, I have experience spotting behavioral peculiarities that carry over between multiple accounts (which are the key in
1988:"(emphasis added) A Checkuser found one of the accused to be unconnected, and the other, the one whose block was the subject of the previous AN discussion, they declined to CU at all. Given your answer above, I'm curious as to how you feel about the CUs refusal to even run a check?
1685:
visible in the Wikimedia server logs for requests coming from this location. If it were decided that this location was overrun with miscreants and we wanted to block the entire lot of them, we would block the entire /29 range (I don't think I've ever actually used this feature).
530:. Each candidate will receive an application questionnaire to be completed and returned to the arbcom-en-c mailing list before the nomination period ends. This should include a nomination statement, to a maximum of 250 words, for inclusion on the candidate's nomination sub-page(s).
1770:, in which I undid one of your blocks because it was based solely on your assertion that any new user who shows up at AFD is a sock. At the end of that discussion you seemed to understand that that is not ok, and why it isn't ok. To my mind this isn't something that should have
3458:
I have lengthy off-wiki professional experience in the financial industry, information security, and computer security. My experience includes review and classifying information, maintaining technical and professional confidentiality, and information system auditing. —
3441:
Locally, I have years of experience with deletion, rev-del, and redaction as an administrator. I am currently an oversighter on the meta-wiki, so have direct experience both with the tools and its logs, as well as keeping open communications with other functionaries. —
3077:
and elsewhere. Similarly, I do occasionally run into oversightable things from recent changes or sockpuppets, and report them to the oversight team. I often have IRC and email open even while I'm not actively on wiki. So, I offer to take on either or both roles, as you
727:
and elsewhere. Similarly, I do occasionally run into oversightable things from recent changes or sockpuppets, and report them to the oversight team. I often have IRC and email open even while I'm not actively on wiki. So, I offer to take on either or both roles, as you
2807:
3103:
I work in computer security, and I'm a developer/sysadmin for a small hobbyist website, so I regularly work with IP addresses and ranges, WHOIS and port scan data, user agent headers, and am responsible for protecting sensitive data relating to our
1814:
So my question is, if you were granted CU access, could we expect that anyone who was new and made a comment at AFD would be checkusered by you, to try and find evidence to back up this assumption that "new user at AFD = 100% certainty of socking"?
746:
Changes, abuse filters, and a few other venues, to be familiar with the common LTAs. I also issue my fair share of range blocks, balancing the size of the range and the duration against the level of disruption in order to minimize collateral damage.
4409:
2076:(and I'm sure that's what you're getting at). Credible just means "believable", and obviously at the time, I believed it. So, yeah, my reading of the policy is that this would be a legitimate check. And thus the answer to your first question,
4539:
4534:
4529:
4524:
4514:
4509:
4504:
4499:
4494:
4489:
4484:
4432:
2860:
Right now, my only advanced permissions are being an administrator here. I previously had OTRS access from 2012-2014, and handled a few tickets, but let it lapse; at the time I had decided to focus almost exclusively on content creation for a
1055:
A relatively new admin but combined with their ArbCom/SPI clerking experience I feel comfortable supporting both tools. Only hesitation would be increased workload, but these are in areas that generally overlap, so I'm not really concerned.
4555:
4437:
3245:
I have a lot of experience in the behind-the-scenes areas of Knowledge (XXG) that have exposed me to situations where I have needed to request oversight. I'm active on IRC, where I've handled numerous revision deletion requests in the
4442:
2664:
industry, where there are extensive regulatory requirements regarding the confidentiality of information and network security. Due to this, I'm very familiar with the data security requirements and how to handle that sort of data
1904:
Wielding more powerful tools implies the need for greater discretion when using them. The ability to access a user's confidential and personally-identifiable information is indeed a more powerful tool than the ability to block
2106:
were my first case, and I asked for advice, and the two people who came back were you and AGK, I expect I'd have two people advising me not to check, and I'd go along with that. So the answer to your second question,
1423:
investigations—checkuser is just complementary evidence in that sense), and I am familiar with the kind of information that checkuser would return and how it would factor into the outcome of an investigation. I joined
1593:
focus, correlations between users of editing timelines, similarities in usernames, editing style, etc. When there seemed to be enough behavioral evidence, I would open a SPI case for further investigation by a CU.
1698:
NAT is theoretically possible with IPv6, but the extremely large address space eliminates the main technical driver (i.e. address space exhaustion) which gave rise to NATv4. It is still used at IPv6-IPv4 traffic
834:
one of the mandatory users, I'd certainly look closely into using it if appointed, as another option to improve account security. (My password is already a long random string that is not used for any other site.)
2626:
803:
Hi Rschen, thanks for the question. I won't wade too far into topic of sysop inactivity except to say that I probably wouldn't have started back up if I would have had to go through RfA again. Aside from a
1869:
is a problem. We know socking at AfDs to prevent paid articles from being deleted is a problem. It's not a huge leap of logic to suspect that, when a new user's first edits are to AfD, maybe it's a sock.
2071:
I think it's clear that this example was potential disruption, since we're talking about (potentially) influencing the result of an AfD for illegitimate purposes. So, then we're down to whether this was
1670:
NAT is done on a much larger scale at universities, corporations, libraries, and the like. Even countries. Thus, indiscriminate blocking of IPs can deny service to a large number of users as collateral
1170:
I am an oversighter on the English Knowledge (XXG) here, a bureaucrat on the test protect, and a steward on the Wikimedia beta project. I have OTRS permissions and access to the oversight-en and info-en
299:
2957:
of "humor" and don't think this should disqualify him from being a functionary. But the Arbitration business, and doubling down with pride, is less than I would want to see from a functionary. Best,
4351:
4139:
3401:
1548:
336:
168:
1661:, making multiple computers on my WiFi all appear to have the same IP address. So, all you can really say about a request from that IP is that it was from some computer within range of my WiFi.
754:
I work in computer security, and I'm a developer/sysadmin for a small hobbyist website, so I regularly work with IP addresses and ranges, WHOIS and port scan data, user agent headers, and so on.
3768:
Do you hold advanced permissions (checkuser, oversight, bureaucrat, steward) on this or other WMF projects? If so, please list them. Also, do you have OTRS permissions? If so, to which queues?
3472:
Do you hold advanced permissions (checkuser, oversight, bureaucrat, steward) on this or other WMF projects? If so, please list them. Also, do you have OTRS permissions? If so, to which queues?
3275:
Do you hold advanced permissions (checkuser, oversight, bureaucrat, steward) on this or other WMF projects? If so, please list them. Also, do you have OTRS permissions? If so, to which queues?
3109:
Do you hold advanced permissions (checkuser, oversight, bureaucrat, steward) on this or other WMF projects? If so, please list them. Also, do you have OTRS permissions? If so, to which queues?
2857:
Do you hold advanced permissions (checkuser, oversight, bureaucrat, steward) on this or other WMF projects? If so, please list them. Also, do you have OTRS permissions? If so, to which queues?
2670:
Do you hold advanced permissions (checkuser, oversight, bureaucrat, steward) on this or other WMF projects? If so, please list them. Also, do you have OTRS permissions? If so, to which queues?
2419:
Do you hold advanced permissions (checkuser, oversight, bureaucrat, steward) on this or other WMF projects? If so, please list them. Also, do you have OTRS permissions? If so, to which queues?
1607:
Do you hold advanced permissions (checkuser, oversight, bureaucrat, steward) on this or other WMF projects? If so, please list them. Also, do you have OTRS permissions? If so, to which queues?
1441:
Do you hold advanced permissions (checkuser, oversight, bureaucrat, steward) on this or other WMF projects? If so, please list them. Also, do you have OTRS permissions? If so, to which queues?
1167:
Do you hold advanced permissions (checkuser, oversight, bureaucrat, steward) on this or other WMF projects? If so, please list them. Also, do you have OTRS permissions? If so, to which queues?
979:
Do you hold advanced permissions (checkuser, oversight, bureaucrat, steward) on this or other WMF projects? If so, please list them. Also, do you have OTRS permissions? If so, to which queues?
759:
Do you hold advanced permissions (checkuser, oversight, bureaucrat, steward) on this or other WMF projects? If so, please list them. Also, do you have OTRS permissions? If so, to which queues?
1127:
4395:
101:
21:
3720:
3051:
2735:
team. He has consistently acted with integrity as one of the ACC tool administrators, and has positively contributed to the collegial atmosphere that we have on the team and demonstrating
931:
701:
570:
Editors may comment on each candidate with a limit of 500 words, including replies to other editors. Discussion will be sectioned and monitored by the Arbitration Committee and the clerks;
560:
Nomination statements will be published and candidates invited to answer questions publicly. The community is invited to participate. Please note changes from previous consultation phases:
3862:
3218:
2321:
1395:
4457:
4452:
1977:
330:
1309:
Last year I was in favour of Oshwah becoming a CheckUser and that has not changed - it actually has strengthened. He has handled OS well and is an SPI clerk. I trust his judgement. --
4133:
2771:
2042:
I've considered applying), I've read a lot more about CU policy. I've also opened a bunch of SPI cases and gotten to observe how things get handled in real life. So, let's look at
2783:
4422:
4417:
3064:
I am volunteering for Checkuser and Oversight. I returned to Knowledge (XXG) early this year from a long inactivity - I originally edited from 2006 - 2009. I am familiar with
2976:
714:
I am volunteering for Checkuser and Oversight. I returned to Knowledge (XXG) early this year from a long inactivity - I originally edited from 2006 - 2009. I am familiar with
294:
2801:
2789:
1295:
Oshwah is well versed in policy and has perfomed over 62000 admin actions in over 3 years which has spot on and one of the most active admins in the Project.Clearly an asset.
326:
122:
114:
4382:
2777:
1657:
But, life is more complicated than that. For example, with my residential internet connection, I have a (mostly) static IP (v4) address. Inside my house, my router does
822:
relevant to my work, and I've found ways to apply my skills here that I enjoy and find productive. So yes, I do believe that I would be able to put the tools to good use.
2795:
3816:. Please note that the candidate will be provided the opportunity to respond to a paraphrased version of any emailed comments; the sender's name will not be provided.
3539:. Please note that the candidate will be provided the opportunity to respond to a paraphrased version of any emailed comments; the sender's name will not be provided.
3327:. Please note that the candidate will be provided the opportunity to respond to a paraphrased version of any emailed comments; the sender's name will not be provided.
3160:. Please note that the candidate will be provided the opportunity to respond to a paraphrased version of any emailed comments; the sender's name will not be provided.
2909:. Please note that the candidate will be provided the opportunity to respond to a paraphrased version of any emailed comments; the sender's name will not be provided.
2721:. Please note that the candidate will be provided the opportunity to respond to a paraphrased version of any emailed comments; the sender's name will not be provided.
2529:. Please note that the candidate will be provided the opportunity to respond to a paraphrased version of any emailed comments; the sender's name will not be provided.
2183:. Please note that the candidate will be provided the opportunity to respond to a paraphrased version of any emailed comments; the sender's name will not be provided.
1490:. Please note that the candidate will be provided the opportunity to respond to a paraphrased version of any emailed comments; the sender's name will not be provided.
1250:. Please note that the candidate will be provided the opportunity to respond to a paraphrased version of any emailed comments; the sender's name will not be provided.
1027:. Please note that the candidate will be provided the opportunity to respond to a paraphrased version of any emailed comments; the sender's name will not be provided.
873:. Please note that the candidate will be provided the opportunity to respond to a paraphrased version of any emailed comments; the sender's name will not be provided.
268:
3424:
4157:
1865:
Under "Grounds for checking", it gives "double voting" as one of the disruptive behaviors we're trying to defend against. We know socking is a problem. We know
288:
133:
111:
4300:
610:
606:
550:
The committee will notify candidates going forward for community consultation and create the candidate subpages containing the submitted nomination statements.
321:
259:
178:
106:
427:
and related documents. They must have good communication and team-working skills. CheckUser candidates must be familiar with basic networking topics and with
4145:
3624:
I certainly trust his judgement as a Meta Oversighter colleague and would trust him to use his best judgement for the English Knowledge (XXG). — regards,
2979:, I made a more important point of not restoring it and reminded people who ran into controversy on April Fools jokes not to get into it with each other.
2954:
2852:
away any personally identifying information about other clients, sonI am very familiar with what is legally considered personally identifying information.
818:
is any indication, we should be working to retain and recover experienced editors, particularly those who have left under non-controversial circumstances.
264:
4127:
2984:
2765:
2535:
I have no concerns with SQL's judgement. He is a good administrator with sufficient technical knowledge to be of benefit to the project in this role. --
274:
254:
137:
4344:
4090:
3839:
3661:
3644:
3630:
3619:
3605:
3583:
3567:
3553:
3489:
3465:
3448:
3342:
2990:
2966:
2748:
2544:
2498:
2476:
2437:
2263:
2246:
2220:
2194:
2150:
2036:
2022:
1997:
1824:
1755:
1636:
1336:
1318:
1304:
1290:
1268:
1204:
1068:
1050:
844:
798:
279:
192:
173:
395:
3279:
level was still within the activity requirements of OTRS, I decided I wanted to focus my time more on content work and administrative work on-wiki.
1841:"New user at AFD = 100% certainty of socking" is overstating things. I'll certainly agree, however, that "new user at AFD = suspicion of socking".
1445:
level was still within the activity requirements of OTRS, I decided I wanted to focus my time more on content work and administrative work on-wiki.
313:
204:
4245:
1799:
and it was not a community endorsement of this approach, and I said so on your talk page, and you seemed to indicate again that you got the point.
237:
3754:
arbitrators, especially in sockpuppet investigations, and have developed experience in evaluating evidence and using the block and revdel tools.
2673:
I currently hold checkuser here on enwiki, and I have access to the OTRS queues info-en and checkuser-en-wp. I also have bureaucrat on testwiki.
1632:
experience has prepared you for IP addresses in the context of Knowledge (XXG)? Would you expect your blocking activity to massively change? --
965:
arbitrators, especially in sockpuppet investigations, and have developed experience in evaluating evidence and using the block and revdel tools.
4294:
428:
163:
92:
4188:
4122:
2980:
2760:
1689:
lists some particularly sensitive examples of this, along with cautions for use, and instructions for reporting to the WMF any such blocks.
1967:." And, obviously, I'll avail myself of (off-wiki) advice from other functionaries on close calls, especially as I'm getting up to speed.
2006:
Obviously, I felt what I was seeing was suspicious, for the reasons stated, and deserved greater scrutiny. Based on their SPI comments,
4278:
his CheckUser permission in May 2019, is reappointed as a CheckUser following a request to the committee for return of the permission.
4084:
2590:
2356:
459:
4392:
409:
229:
69:
17:
4368:
4041:
3894:
1963:. The deeper answer, however, will always be, "I'm human and I'll make human judgements based on my experience and intuition, plus
1648:
make another edit, both edits will be associated with the same IP address, and that's a pretty good clue they're by the same person.
814:, the learning curve hasn't been too steep, and I'm far from the only administrator to return from a long period of inactivity. If
215:
158:
3822:
Per my previous comment, I believe Kevin to be clueful and adept enough to deal with the tools if they are chosen for the same. --
3428:
trust of the community to both keep suppressed material secret, and to only suppress materials as supported by policy. Thank you.
2915:
I was reminded of April Fools Day on Knowledge (XXG) today which reminded me of something which happened last year. It wasn't his
4352:
Knowledge (XXG) talk:Arbitration Committee/Noticeboard/Archive 45#2019 CheckUser and Oversight appointments: Candidates appointed
4239:
3992:
3943:
3759:
Please outline, without breaching your personal privacy, what off-Wiki experience or technical expertise you have for this role.
3657:
3579:
3455:
Please outline, without breaching your personal privacy, what off-Wiki experience or technical expertise you have for this role.
3263:
Please outline, without breaching your personal privacy, what off-Wiki experience or technical expertise you have for this role.
3100:
Please outline, without breaching your personal privacy, what off-Wiki experience or technical expertise you have for this role.
2848:
Please outline, without breaching your personal privacy, what off-Wiki experience or technical expertise you have for this role.
2657:
Please outline, without breaching your personal privacy, what off-Wiki experience or technical expertise you have for this role.
2602:
2472:
2411:
Please outline, without breaching your personal privacy, what off-Wiki experience or technical expertise you have for this role.
2216:
1598:
Please outline, without breaching your personal privacy, what off-Wiki experience or technical expertise you have for this role.
1432:
Please outline, without breaching your personal privacy, what off-Wiki experience or technical expertise you have for this role.
1300:
1264:
1200:
1158:
Please outline, without breaching your personal privacy, what off-Wiki experience or technical expertise you have for this role.
1064:
970:
Please outline, without breaching your personal privacy, what off-Wiki experience or technical expertise you have for this role.
794:
751:
Please outline, without breaching your personal privacy, what off-Wiki experience or technical expertise you have for this role.
489:
Active users of non-standard venues, such as IRC, the account creation interface, OTRS, and/or the Unblock Ticket Request System.
150:
3095:
that channel to request oversight, which can otherwise have a delay especially later in the evening when I am primarily active.
2620:
2608:
1427:
back in January 2019, where I have handled approximately 400 requests, about three dozen of which I had to refer to checkusers.
480:
Familiar with identification of factors that may change a result or block, such as ISP, location, activity, or type of network.
51:
3863:
Knowledge (XXG):Arbitration Committee/Noticeboard/Archive 12 § 2019 CheckUser and Oversight appointments: Candidates appointed
200:
98:
4318:
4182:
3365:
2596:
1512:
4375:
210:
128:
3333:
I have no problem with Mz7's judgement and believe that he would be of even greater benefit to the project in this role. --
2569:
Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.
644:
Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.
3849:
Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.
3479:
I am an oversighter on the meta-wiki; a bureaucrat here, on testwiki, and on test2wiki. I am also an administrator on the
2614:
2554:
Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.
2069:
to prevent or reduce potential or actual disruption, or to investigate credible, legitimate concerns of bad faith editing.
3073:
fairly often, and access to the Checkuser tools would allow me to properly resolve those cases and help with backlogs at
723:
fairly often, and access to the Checkuser tools would allow me to properly resolve those cases and help with backlogs at
613:
prior to receiving permissions. Oversighters and CheckUsers who intend to work the OTRS paid editing queue must sign the
4306:
3476:
3377:
2739:
to almost all users we deal with in the ACC queues. I strongly believe that he would be an asset to the oversight team.
1524:
1091:
470:
We welcome all applicants with suitable interest to apply, but this year we have particular need of applicants who are:
388:
4360:
2924:
3575:
3395:
3383:
1658:
1542:
1530:
1296:
1273:
Oshwah is an asset to SPI, has dealt with his bits well, and is also one of the most active administrators we have. --
4221:
The Committee thanks the community and all candidates for helping to bring this process to a successful conclusion.
4288:
4108:
4035:
3888:
3834:
3684:
3600:
3371:
3015:
1518:
1285:
1103:
1045:
895:
665:
249:
4330:
3986:
3937:
3574:
Fine candidate excellent knowledge of policy and technical expertise and has perfomed around 24500 admin actions.
3389:
3182:
2285:
1536:
1359:
1121:
1109:
2027:
I guess what I was getting at is if you think you would have run a CU or if you agree with the decision not to.
1793:
1767:
353:
4263:
4096:
3696:
3635:
I trust Xaosflux's judgement and believe that he would be even more of an asset to the project in this role. --
3027:
2402:
I mention in my nomination some of the various related tools I've written. I've contributed extensively at the
1959:
digging deeper? The simple answer is, "I'll make my determination is accordance with the policies outlined in
1330:
1097:
907:
677:
88:
2349:, a tool used by many functionaries daily to help determine if a given IP is a proxy / webhost / compromised.
3714:
3702:
3194:
3045:
3033:
2843:. I have submitted dozens of oversight requests related to all of these, and all of them have been actioned.
2297:
1371:
1115:
925:
913:
695:
683:
381:
1858:
4251:
4206:
4078:
3690:
3250:
channel. I have already signed the confidentiality agreement for Wikimedia projects as part of my work on
3212:
3200:
3021:
2744:
2584:
2414:
As I mentioned last year, I've had a lot of relevant jobs, NOC / internal support, and cable tech support.
2315:
2303:
1389:
1377:
901:
671:
3420:
417:
413:
4283:
3708:
3615:
3188:
3039:
2291:
1774:
to be explained to an admin with your level of experience, but since you seemed to get it that was that.
1680:
Commercial customers are more likely to publicly expose a range of IP addresses, commonly written using
1365:
1323:
Yes, I support Oshwah's request for CheckUser - I think he's well grasped at SPI and would be an asset.
919:
689:
595:. Editors are encouraged to include a detailed rationale, supported by relevant links where appropriate.
2461:
1189:
628:
To comment on candidates, please use section edit buttons to edit the appropriate candidate subpage(s).
31:
2143:
and think I understand it, but I know that there's nothing that can replace real-life experience. --
4275:
4233:
4194:
3654:
3206:
2840:
2469:
2362:
2309:
2259:
2213:
2032:
1993:
1820:
1383:
1261:
1197:
1061:
1033:
Anyone around SPI will know the good work Kevin does. Thoroughly vetted and clueful administrator. --
791:
2135:
I'll leave you with one last thought. In my career as a software engineer, I've learned to embrace
2962:
2136:
1325:
808:
805:
4340:
4176:
4059:
3912:
3636:
3563:
3359:
3334:
2536:
2426:
2235:
wide background in related technical issues, and we could certainly use his support on the team.
2147:
2019:
1976:
Thanks for your detailed reply. I've just realized I missed a whole other aspect of this, now at
1752:
1506:
1310:
2928:
2140:
2043:
1964:
1960:
423:
Prospective applicants must be familiar with (i) policies relevant to CU and/or OS and (ii) the
2953:
which outside of someone else having to tag as humor is well with-in norms). Now I have my own
784:
4073:
4010:
3961:
3068:
and investigate and resolve cases there regularly, and I have already signed the WMF NDA as a
2740:
2728:
2579:
718:
and investigate and resolve cases there regularly, and I have already signed the WMF NDA as a
424:
3870:
3255:
2383:
463:
436:
4047:
3900:
3611:
2007:
1085:
355:
3545:
Great attention to detail, command of policy, and technical expertise; a fine candidate. –
3251:
3074:
3069:
3065:
2936:
2836:
2736:
2732:
2403:
2387:
2379:
2352:
2201:
1866:
1576:
1424:
815:
742:
724:
719:
715:
432:
4228:
3998:
3949:
3651:
3267:
2487:
2466:
2255:
2210:
2028:
1989:
1816:
1258:
1194:
1058:
788:
3771:
I do not have other advanced permissions, but I do have OTRS access to the info-en queue.
1217:
982:
I do not have other advanced permissions, but I do have OTRS access to the info-en queue.
811:
609:, and publish the resulting appointments. Successful candidates are required to sign the
2365:, a tool used to resolve a given subnet (often helpful to identify webhosts or proxies).
358:
4029:
3882:
3828:
3678:
3594:
3551:
3009:
2958:
1279:
1039:
889:
840:
659:
540:
The committee will review applications and ask the functionary team for their feedback.
2931:
guidelines. No it was the fact that the candidate thought it good judgement to make a
1569:
Extensive unix DevOps experience, including managing web servers at Songza and Google.
583:
Comments may be posted on the candidates' subpages or submitted privately by email to
4171:
3980:
3931:
3559:
3484:
3460:
3443:
3415:
3354:
3176:
2496:
2435:
2279:
2242:
2144:
2016:
1749:
1686:
1501:
1353:
1256:
Inclined to support, he seems to have handled OS well and also became a SPI clerk. --
2975:
I wouldn't consider what I did doubling down. On both the thread on my talkpage and
452:
at least 18 years of age and have legal majority in their jurisdiction of residence;
3804:
Comments may also be submitted to the Arbitration Committee privately by emailing
3527:
Comments may also be submitted to the Arbitration Committee privately by emailing
3315:
Comments may also be submitted to the Arbitration Committee privately by emailing
3148:
Comments may also be submitted to the Arbitration Committee privately by emailing
2897:
Comments may also be submitted to the Arbitration Committee privately by emailing
2709:
Comments may also be submitted to the Arbitration Committee privately by emailing
2517:
Comments may also be submitted to the Arbitration Committee privately by emailing
2171:
Comments may also be submitted to the Arbitration Committee privately by emailing
1766:
I'd like to discuss your approach to blocking suspected socks. Perhaps you recall
1478:
Comments may also be submitted to the Arbitration Committee privately by emailing
1238:
Comments may also be submitted to the Arbitration Committee privately by emailing
1015:
Comments may also be submitted to the Arbitration Committee privately by emailing
861:
Comments may also be submitted to the Arbitration Committee privately by emailing
605:
The committee will review community comments and other relevant factors, finalize
357:
77:
4329:
for his long history of contributions to the functionary team. Timotheus Canens
2191:
1633:
1080:
3625:
4224:
The Committee also welcomes the following user back to the functionary team:
3869:
The Arbitration Committee is pleased to welcome the following editors to the
2346:
483:
Experienced in analyzing behavioral evidence for sockpuppetry investigations.
4024:
3877:
3824:
3673:
3590:
3546:
3004:
1275:
1035:
884:
836:
654:
474:
Familiar with common ISPs and editing patterns from Asia and Eastern Europe.
4469:
497:
unable to prevent this and such risks will continue if you are successful.
492:
Interested in handling sockpuppetry investigations related to paid editing.
455:
willing to disclose all other accounts they have operated to the committee;
3975:
3926:
3480:
3171:
2949:
when asked not to do it. This is comparison to other jokes he made (e..g
2491:
2430:
2335:
2274:
2237:
2011:
1348:
1221:
six months to have one created for them by creating a new ticket request.
3750:
Please describe any relevant on-Wiki experience you have for this role.
3438:
Please describe any relevant on-Wiki experience you have for this role.
3242:
Please describe any relevant on-Wiki experience you have for this role.
3091:
Please describe any relevant on-Wiki experience you have for this role.
2831:
Please describe any relevant on-Wiki experience you have for this role.
2826:
Standard questions for all candidates (The Blade of the Northern Lights)
2648:
Please describe any relevant on-Wiki experience you have for this role.
2399:
Please describe any relevant on-Wiki experience you have for this role.
2369:
1589:
Please describe any relevant on-Wiki experience you have for this role.
1419:
Please describe any relevant on-Wiki experience you have for this role.
1149:
Please describe any relevant on-Wiki experience you have for this role.
961:
Please describe any relevant on-Wiki experience you have for this role.
738:
Please describe any relevant on-Wiki experience you have for this role.
2942:
and then basically responding to critics with "There's always someone."
2661:
2375:
1572:
Engineering team lead for Smarts/EMC's IPv6 network management product.
1863:
legitimate, credible concerns of bad-faith editing or sock-puppetry.
2425:
I suppose I don't know how much it matters - if at all, but I am a
2927:
community commentary and, outside of marking it as a joke with-in
2368:
I was the original developer behind the account creation interface
2205:
446:
familiar with Knowledge (XXG) processes, policies, and guidelines;
2464:
was unsuccessful. What is different about it this time around? --
1192:
was unsuccessful. What is different about it this time around? --
431:
tools and techniques, and preferably are willing to volunteer at
1681:
827:
58:
The current time and date is 10:33, Friday, September 20, 2024 (
4364:
2868:
Questions for this candidate (The Blade of the Northern Lights)
1982:
Behavior and depth of understanding of wiki processes makes it
486:
Interested in mentoring editors who wish to become SPI clerks.
359:
59:
50:
The community consultation phase is closed. The Committee has
3423:. Regarding oversight, some may recall I recently started a
1610:
Other than being an admin on en, none. No OTRS permissions.
4333:
his CheckUser and Oversight permissions in September 2019.
3270:, which required me to fulfill confidentiality obligations.
1978:
Knowledge (XXG):Sockpuppet investigations/JimKrause/Archive
576:, as this is a consultation and not a community consensus.
3784:
Editors may ask a maximum of two questions per candidate.
3504:
Editors may ask a maximum of two questions per candidate.
3292:
Editors may ask a maximum of two questions per candidate.
3125:
Editors may ask a maximum of two questions per candidate.
2874:
Editors may ask a maximum of two questions per candidate.
2686:
Editors may ask a maximum of two questions per candidate.
2452:
Editors may ask a maximum of two questions per candidate.
1623:
Editors may ask a maximum of two questions per candidate.
1458:
Editors may ask a maximum of two questions per candidate.
1184:
Editors may ask a maximum of two questions per candidate.
995:
Editors may ask a maximum of two questions per candidate.
775:
Editors may ask a maximum of two questions per candidate.
614:
567:
Editors may ask a maximum of two questions per candidate;
3266:
I have worked in the past at organizations, including a
1941:
a user's confidentiality has to meet an even higher bar.
1785:
Or so I thought, but then earlier this year you stated "
4324:
4312:
4269:
4257:
4212:
4200:
4163:
4151:
4114:
4102:
4065:
4053:
4016:
4004:
3967:
3955:
3918:
3906:
2950:
2946:
2943:
2932:
2920:
2916:
1800:
1787:
783:
You went almost an entire decade with minimal activity
369:
284:
242:
118:
39:
3610:
Already demonstrated both reliability and judgement
2643:
Standard questions for all candidates (Stwalkerster)
1980:, the entry for 6 October 2018, in which you state "
826:
as they see fit. I'm also aware of the experimental
4548:
4477:
4402:
3649:
Good policy knowledge and already an OS on Meta. --
611:
Confidentiality agreement for nonpublic information
2074:credible, legitimate concerns of bad faith editing
2390:. I would primarily use the tool in those areas.
3433:Standard questions for all candidates (Xaosflux)
2660:I currently work as a software developer in the
1584:Standard questions for all candidates (RoySmith)
1579:, opening cases for investigation by CU holders.
449:an administrator on the English Knowledge (XXG);
443:available to regularly assist with the workload;
412:is seeking to appoint additional editors to the
3823:
3589:
2359:, tools used to list hosts on hosting networks.
2338:. I have served as an Administrator since 2007.
1274:
1034:
1144:Standard questions for all candidates (Oshwah)
4376:
2652:more than a few of which need suppressed too.
2406:. I'm active in the proxy check queue at ACC.
389:
8:
4070:is appointed as a CheckUser and Oversighter.
3972:is appointed as a CheckUser and Oversighter.
3923:is appointed as a CheckUser and Oversighter.
3745:Standard questions for all candidates (L235)
3588:Technically adept and clueful bureaucrat. --
3086:Standard questions for all candidates (ST47)
1561:I am applying only for CU. Qualifications:
956:Standard questions for all candidates (L235)
733:Standard questions for all candidates (ST47)
3237:Standard questions for all candidates (Mz7)
2891:Comments (The Blade of the Northern Lights)
2680:Questions for this candidate (Stwalkerster)
2394:Standard questions for all candidates (SQL)
1414:Standard questions for all candidates (Mz7)
507:Dates are provisional and subject to change
460:WMF Access to Non-Public Information Policy
4383:
4369:
4361:
546:Notification of candidates: 2 Oct to 3 Oct
396:
382:
65:
3483:system. I am not a current OTRS agent. —
3419:appointed, I will diligently support the
2044:WP:CHECK#CheckUser and the privacy policy
2923:of it) to ANI which seems in-keeping of
3498:Questions for this candidate (Xaosflux)
2108:(do) you agree with the decision not to
2078:(do) you think you would have run a CU?
1792:". My read of the reference discussion
1617:Questions for this candidate (RoySmith)
1436:fulfilling confidentiality obligations.
556:Community consultation: 4 Oct to 10 Oct
68:
2073:
2068:
466:Users Confidentiality Agreement (L45).
1986:to believe claims of being new users.
1178:Questions for this candidate (Oshwah)
518:Candidates self-nominate by email to
18:Knowledge (XXG):Arbitration Committee
7:
4396:CheckUser and Oversight appointments
2565:The following discussion is closed.
2231:Additionally, it seem that he has an
640:The following discussion is closed.
615:OTRS Users Confidentiality Agreement
169:Clarification and Amendment requests
3778:Questions for this candidate (L235)
3119:Questions for this candidate (ST47)
2382:(mostly in the proxy check queue),
989:Questions for this candidate (L235)
769:Questions for this candidate (ST47)
3286:Questions for this candidate (Mz7)
2446:Questions for this candidate (SQL)
1452:Questions for this candidate (Mz7)
28:
2940:while there was an active request
2384:the unblock ticket request system
4468:
4123:The Blade of the Northern Lights
3861:This section is an excerpt from
3845:The discussion above is closed.
3808:
3531:
3319:
3152:
2981:The Blade of the Northern Lights
2901:
2761:The Blade of the Northern Lights
2756:The Blade of the Northern Lights
2713:
2550:The discussion above is closed.
2521:
2175:
1482:
1242:
1019:
865:
587:
574:Please refrain from bolded votes
522:
514:Applications: 23 Sept to 29 Sept
76:
4336:For the Arbitration Committee,
4217:is appointed as an Oversighter.
4168:is appointed as an Oversighter.
4119:is appointed as an Oversighter.
3481:Programs & Events Dashboard
2388:the Wikiproject on open proxies
1795:was that there was support for
536:Review period: 30 Sept to 2 Oct
3763:NDAs and/or background checks.
2380:the account creation interface
974:NDAs and/or background checks.
830:support and while local CU is
1:
4345:15:47, 14 October 2019 (UTC)
4021:is appointed as a CheckUser.
2991:01:51, 10 October 2019 (UTC)
2545:03:01, 10 October 2019 (UTC)
1337:06:24, 10 October 2019 (UTC)
300:Conflict of interest reports
3840:17:04, 6 October 2019 (UTC)
3662:05:07, 8 October 2019 (UTC)
3645:15:47, 7 October 2019 (UTC)
3631:05:40, 7 October 2019 (UTC)
3620:18:23, 6 October 2019 (UTC)
3606:17:00, 6 October 2019 (UTC)
3584:12:58, 6 October 2019 (UTC)
3568:06:08, 6 October 2019 (UTC)
3554:03:09, 6 October 2019 (UTC)
3490:01:07, 4 October 2019 (UTC)
3466:01:07, 4 October 2019 (UTC)
3449:01:07, 4 October 2019 (UTC)
3343:15:49, 7 October 2019 (UTC)
2967:23:45, 9 October 2019 (UTC)
2749:01:19, 9 October 2019 (UTC)
2499:04:05, 5 October 2019 (UTC)
2477:01:31, 4 October 2019 (UTC)
2438:03:06, 6 October 2019 (UTC)
2404:Wikiproject on open proxies
2264:23:59, 8 October 2019 (UTC)
2247:03:12, 8 October 2019 (UTC)
2221:06:11, 7 October 2019 (UTC)
2195:18:48, 6 October 2019 (UTC)
2151:03:46, 7 October 2019 (UTC)
2037:02:46, 7 October 2019 (UTC)
2023:22:18, 6 October 2019 (UTC)
1998:20:35, 6 October 2019 (UTC)
1825:20:48, 4 October 2019 (UTC)
1756:14:26, 4 October 2019 (UTC)
1637:06:32, 4 October 2019 (UTC)
1319:05:17, 9 October 2019 (UTC)
1305:23:12, 8 October 2019 (UTC)
1291:13:26, 8 October 2019 (UTC)
1269:05:05, 8 October 2019 (UTC)
1205:01:32, 4 October 2019 (UTC)
1069:05:08, 8 October 2019 (UTC)
1051:17:02, 6 October 2019 (UTC)
845:06:15, 5 October 2019 (UTC)
799:01:14, 5 October 2019 (UTC)
439:. Applicants must also be:
129:Search archived proceedings
70:Knowledge (XXG) Arbitration
4578:
4282:The Committee also thanks
3860:
3740:currently have access to).
2342:I'm the developer behind:
951:currently have access to).
174:Arbitrator motion requests
29:
4466:
3809:
3532:
3320:
3153:
2902:
2727:I've worked closely with
2714:
2522:
2176:
2010:shared my suspicion, but
1483:
1243:
1020:
866:
588:
523:
4350:Archived discussion at:
3847:Please do not modify it.
3254:and my previous work at
2937:Arbitration Case Request
2567:Please do not modify it.
2552:Please do not modify it.
642:Please do not modify it.
458:willing to agree to the
2703:Comments (Stwalkerster)
1768:this incident last year
601:Appointments: by 14 Oct
22:CheckUser and Oversight
3576:Pharaoh of the Wizards
1297:Pharaoh of the Wizards
607:an internal resolution
4453:call for applications
4393:Arbitration Committee
3475:Yes. As listed in my
2429:on the beta cluster.
425:global privacy policy
410:Arbitration Committee
370:Track related changes
230:Arbitration Committee
4549:Rolling appointments
4331:voluntarily resigned
3728:Nomination statement
3409:Nomination statement
3248:#wikipedia-en-revdel
3226:Nomination statement
3059:Nomination statement
2841:Special:Log/newusers
2815:Nomination statement
2634:Nomination statement
2376:Requests for unblock
2329:Nomination statement
1575:Have been active on
1556:Nomination statement
1403:Nomination statement
1135:Nomination statement
939:Nomination statement
709:Nomination statement
179:Enforcement requests
107:Guide to arbitration
4478:Annual appointments
4458:appointments motion
3814:lists.wikimedia.org
3537:lists.wikimedia.org
3521:Comments (Xaosflux)
3477:CentralAuth listing
3325:lists.wikimedia.org
3158:lists.wikimedia.org
2907:lists.wikimedia.org
2719:lists.wikimedia.org
2254:pointed questions.
2165:Comments (RoySmith)
2137:egoless programming
1797:that specific block
741:I regularly patrol
501:Appointment process
477:Familiar with IPv6.
2731:after joining the
2568:
2460:Your candidacy in
2374:I am a regular at
1188:Your candidacy in
643:
201:Contentious topics
99:Arbitration policy
4564:
4563:
2566:
1566:Admin since 2005.
1232:Comments (Oshwah)
641:
406:
405:
373:
341:
211:General sanctions
159:All open requests
89:About arbitration
54:the appointments.
4569:
4472:
4414:October 2008 OS
4391:Knowledge (XXG)
4385:
4378:
4371:
4362:
4343:
4328:
4301:deleted contribs
4284:Timotheus Canens
4273:
4246:deleted contribs
4216:
4189:deleted contribs
4167:
4140:deleted contribs
4118:
4091:deleted contribs
4069:
4042:deleted contribs
4020:
3993:deleted contribs
3971:
3944:deleted contribs
3922:
3895:deleted contribs
3871:functionary team
3838:
3833:
3815:
3813:
3812:
3811:
3724:
3642:
3639:
3628:
3604:
3599:
3538:
3536:
3535:
3534:
3487:
3463:
3446:
3421:oversight policy
3405:
3340:
3337:
3326:
3324:
3323:
3322:
3249:
3222:
3159:
3157:
3156:
3155:
3055:
2987:
2908:
2906:
2905:
2904:
2811:
2720:
2718:
2717:
2716:
2630:
2542:
2539:
2528:
2526:
2525:
2524:
2494:
2433:
2325:
2182:
2180:
2179:
2178:
2008:User:Atlantic306
1552:
1489:
1487:
1486:
1485:
1399:
1335:
1333:
1328:
1316:
1313:
1289:
1284:
1249:
1247:
1246:
1245:
1131:
1049:
1044:
1026:
1024:
1023:
1022:
935:
872:
870:
869:
868:
705:
594:
592:
591:
590:
529:
527:
526:
525:
398:
391:
384:
372:
367:
360:
339:
295:Clerk procedures
287:
245:
216:Editor sanctions
193:Active sanctions
151:Open proceedings
121:
80:
66:
42:
4577:
4576:
4572:
4571:
4570:
4568:
4567:
4566:
4565:
4560:
4544:
4473:
4464:
4403:Early processes
4398:
4389:
4359:
4358:
4357:
4356:
4339:
4286:
4231:
4174:
4125:
4076:
4027:
3978:
3929:
3880:
3866:
3856:
3851:
3850:
3831:
3807:
3805:
3800:
3798:Comments (L235)
3780:
3747:
3676:
3671:
3640:
3637:
3626:
3597:
3530:
3528:
3523:
3500:
3485:
3461:
3444:
3435:
3357:
3352:
3338:
3335:
3318:
3316:
3311:
3288:
3268:stealth startup
3247:
3239:
3174:
3169:
3151:
3149:
3144:
3142:Comments (ST47)
3121:
3088:
3007:
3002:
2985:
2900:
2898:
2893:
2870:
2828:
2763:
2758:
2712:
2710:
2705:
2682:
2645:
2582:
2577:
2571:
2561:
2556:
2555:
2540:
2537:
2520:
2518:
2513:
2492:
2448:
2431:
2396:
2353:ISP Rangefinder
2277:
2272:
2174:
2172:
2167:
1923:previous state.
1619:
1586:
1504:
1499:
1481:
1479:
1474:
1454:
1416:
1351:
1346:
1331:
1326:
1324:
1314:
1311:
1282:
1241:
1239:
1234:
1180:
1146:
1083:
1078:
1042:
1018:
1016:
1011:
1009:Comments (L235)
991:
958:
887:
882:
864:
862:
857:
855:Comments (ST47)
771:
735:
657:
652:
646:
636:
624:
586:
584:
521:
519:
503:
402:
368:
362:
361:
356:
346:
345:
344:
333:
316:
306:
305:
304:
291:
283:
271:
246:
241:
232:
222:
221:
220:
195:
185:
184:
183:
153:
143:
140:
125:
117:
95:
64:
63:
55:
46:
45:
38:
34:
26:
25:
24:
12:
11:
5:
4575:
4573:
4562:
4561:
4559:
4558:
4552:
4550:
4546:
4545:
4543:
4542:
4537:
4532:
4527:
4522:
4517:
4512:
4507:
4502:
4497:
4492:
4487:
4481:
4479:
4475:
4474:
4467:
4465:
4463:
4462:
4461:
4460:
4455:
4447:
4446:
4445:
4440:
4435:
4427:
4426:
4425:
4420:
4412:
4410:August 2008 CU
4406:
4404:
4400:
4399:
4390:
4388:
4387:
4380:
4373:
4365:
4355:
4354:
4280:
4279:
4219:
4218:
4169:
4120:
4071:
4022:
3973:
3924:
3867:
3859:
3858:
3857:
3855:
3852:
3844:
3843:
3842:
3819:
3818:
3799:
3796:
3795:
3794:
3793:
3792:
3787:
3786:
3779:
3776:
3775:
3774:
3773:
3772:
3766:
3765:
3764:
3757:
3756:
3755:
3746:
3743:
3742:
3741:
3736:
3735:
3730:
3729:
3670:
3667:
3666:
3665:
3664:
3647:
3633:
3622:
3608:
3586:
3572:
3571:
3570:
3542:
3541:
3522:
3519:
3517:
3515:
3514:
3513:
3512:
3507:
3506:
3499:
3496:
3495:
3494:
3493:
3492:
3470:
3469:
3468:
3453:
3452:
3451:
3434:
3431:
3430:
3429:
3411:
3410:
3351:
3348:
3347:
3346:
3345:
3330:
3329:
3310:
3309:Comments (Mz7)
3307:
3305:
3303:
3302:
3301:
3300:
3295:
3294:
3287:
3284:
3283:
3282:
3281:
3280:
3273:
3272:
3271:
3261:
3260:
3259:
3238:
3235:
3234:
3233:
3228:
3227:
3168:
3165:
3164:
3163:
3162:
3143:
3140:
3138:
3136:
3135:
3134:
3133:
3128:
3127:
3120:
3117:
3116:
3115:
3114:
3113:
3107:
3106:
3105:
3098:
3097:
3096:
3087:
3084:
3082:
3080:
3079:
3061:
3060:
3001:
2998:
2997:
2996:
2995:
2994:
2993:
2970:
2969:
2912:
2911:
2892:
2889:
2887:
2885:
2884:
2883:
2882:
2877:
2876:
2869:
2866:
2865:
2864:
2863:
2862:
2855:
2854:
2853:
2846:
2845:
2844:
2827:
2824:
2823:
2822:
2817:
2816:
2757:
2754:
2753:
2752:
2751:
2724:
2723:
2704:
2701:
2699:
2697:
2696:
2695:
2694:
2689:
2688:
2681:
2678:
2677:
2676:
2675:
2674:
2668:
2667:
2666:
2655:
2654:
2653:
2644:
2641:
2640:
2639:
2635:
2576:
2573:
2572:
2563:
2562:
2560:
2557:
2549:
2548:
2547:
2532:
2531:
2512:
2511:Comments (SQL)
2509:
2508:
2507:
2506:
2505:
2504:
2503:
2502:
2501:
2480:
2479:
2455:
2454:
2447:
2444:
2443:
2442:
2441:
2440:
2417:
2416:
2415:
2409:
2408:
2407:
2395:
2392:
2372:
2371:
2366:
2360:
2350:
2340:
2339:
2331:
2330:
2271:
2268:
2267:
2266:
2250:
2249:
2228:
2227:
2223:
2197:
2186:
2185:
2166:
2163:
2162:
2161:
2160:
2159:
2158:
2157:
2156:
2155:
2154:
2153:
2124:
2123:
2122:
2121:
2120:
2119:
2118:
2117:
2116:
2115:
2094:
2093:
2092:
2091:
2090:
2089:
2088:
2087:
2086:
2085:
2067:Point 1 says,
2056:
2055:
2054:
2053:
2052:
2051:
2050:
2049:
2048:
2047:
2001:
2000:
1973:
1972:
1971:
1970:
1969:
1968:
1949:
1948:
1947:
1946:
1945:
1944:
1943:
1942:
1931:
1930:
1929:
1928:
1927:
1926:
1925:
1924:
1913:
1912:
1911:
1910:
1909:
1908:
1907:
1906:
1895:
1894:
1893:
1892:
1891:
1890:
1889:
1888:
1877:
1876:
1875:
1874:
1873:
1872:
1871:
1870:
1849:
1848:
1847:
1846:
1845:
1844:
1843:
1842:
1832:
1831:
1830:
1829:
1828:
1827:
1807:
1806:
1805:
1804:
1803:
1802:
1778:
1777:
1776:
1775:
1761:
1760:
1759:
1758:
1743:
1742:
1741:
1740:
1733:
1732:
1731:
1730:
1723:
1722:
1721:
1720:
1713:
1712:
1711:
1710:
1703:
1702:
1701:
1700:
1693:
1692:
1691:
1690:
1675:
1674:
1673:
1672:
1665:
1664:
1663:
1662:
1652:
1651:
1650:
1649:
1642:
1641:
1640:
1639:
1626:
1625:
1618:
1615:
1614:
1613:
1612:
1611:
1605:
1604:
1603:
1596:
1595:
1594:
1585:
1582:
1581:
1580:
1573:
1570:
1567:
1563:
1562:
1558:
1557:
1498:
1495:
1494:
1493:
1492:
1473:
1472:Comments (Mz7)
1470:
1469:
1468:
1467:
1466:
1461:
1460:
1453:
1450:
1449:
1448:
1447:
1446:
1439:
1438:
1437:
1430:
1429:
1428:
1415:
1412:
1411:
1410:
1405:
1404:
1345:
1342:
1341:
1340:
1339:
1321:
1307:
1293:
1271:
1253:
1252:
1233:
1230:
1229:
1228:
1227:
1226:
1225:
1224:
1223:
1222:
1218:oversight page
1208:
1207:
1179:
1176:
1175:
1174:
1173:
1172:
1165:
1164:
1163:
1156:
1155:
1154:
1145:
1142:
1141:
1140:
1136:
1077:
1074:
1073:
1072:
1071:
1053:
1030:
1029:
1010:
1007:
1006:
1005:
1004:
1003:
998:
997:
990:
987:
986:
985:
984:
983:
977:
976:
975:
968:
967:
966:
957:
954:
953:
952:
947:
946:
941:
940:
881:
878:
877:
876:
875:
856:
853:
852:
851:
850:
849:
848:
847:
823:
819:
778:
777:
770:
767:
766:
765:
764:
763:
757:
756:
755:
749:
748:
747:
734:
731:
730:
729:
711:
710:
651:
648:
647:
638:
637:
635:
632:
623:
620:
619:
618:
603:
597:
596:
580:
579:
578:
577:
571:
568:
562:
561:
558:
552:
551:
548:
542:
541:
538:
532:
531:
516:
510:
509:
502:
499:
494:
493:
490:
487:
484:
481:
478:
475:
468:
467:
462:(L37) and the
456:
453:
450:
447:
444:
404:
403:
401:
400:
393:
386:
378:
375:
374:
364:
363:
354:
352:
351:
348:
347:
343:
342:
334:
329:
324:
318:
317:
312:
311:
308:
307:
303:
302:
297:
292:
282:
277:
272:
267:
262:
257:
252:
247:
240:
234:
233:
228:
227:
224:
223:
219:
218:
213:
208:
197:
196:
191:
190:
187:
186:
182:
181:
176:
171:
166:
161:
155:
154:
149:
148:
145:
144:
142:
141:
136:
131:
126:
116:
109:
104:
96:
91:
85:
82:
81:
73:
72:
57:
49:
47:
44:
43:
35:
30:
27:
15:
14:
13:
10:
9:
6:
4:
3:
2:
4574:
4557:
4554:
4553:
4551:
4547:
4541:
4538:
4536:
4533:
4531:
4528:
4526:
4523:
4521:
4518:
4516:
4513:
4511:
4508:
4506:
4503:
4501:
4498:
4496:
4493:
4491:
4488:
4486:
4483:
4482:
4480:
4476:
4471:
4459:
4456:
4454:
4451:
4450:
4448:
4444:
4441:
4439:
4436:
4434:
4433:February 2009
4431:
4430:
4428:
4424:
4421:
4419:
4416:
4415:
4413:
4411:
4408:
4407:
4405:
4401:
4397:
4394:
4386:
4381:
4379:
4374:
4372:
4367:
4366:
4363:
4353:
4349:
4348:
4347:
4346:
4342:
4337:
4334:
4332:
4326:
4323:
4320:
4317:
4314:
4311:
4308:
4305:
4302:
4299:
4296:
4293:
4290:
4285:
4277:
4271:
4268:
4265:
4262:
4259:
4256:
4253:
4250:
4247:
4244:
4241:
4238:
4235:
4230:
4227:
4226:
4225:
4222:
4214:
4211:
4208:
4205:
4202:
4199:
4196:
4193:
4190:
4187:
4184:
4181:
4178:
4173:
4170:
4165:
4162:
4159:
4156:
4153:
4150:
4147:
4144:
4141:
4138:
4135:
4132:
4129:
4124:
4121:
4116:
4113:
4110:
4107:
4104:
4101:
4098:
4095:
4092:
4089:
4086:
4083:
4080:
4075:
4072:
4067:
4064:
4061:
4058:
4055:
4052:
4049:
4046:
4043:
4040:
4037:
4034:
4031:
4026:
4023:
4018:
4015:
4012:
4009:
4006:
4003:
4000:
3997:
3994:
3991:
3988:
3985:
3982:
3977:
3974:
3969:
3966:
3963:
3960:
3957:
3954:
3951:
3948:
3945:
3942:
3939:
3936:
3933:
3928:
3925:
3920:
3917:
3914:
3911:
3908:
3905:
3902:
3899:
3896:
3893:
3890:
3887:
3884:
3879:
3876:
3875:
3874:
3872:
3864:
3853:
3848:
3841:
3836:
3830:
3826:
3821:
3820:
3817:
3802:
3801:
3797:
3791:
3790:
3789:
3788:
3785:
3782:
3781:
3777:
3770:
3769:
3767:
3761:
3760:
3758:
3752:
3751:
3749:
3748:
3744:
3738:
3737:
3732:
3731:
3727:
3726:
3725:
3722:
3719:
3716:
3713:
3710:
3707:
3704:
3701:
3698:
3695:
3692:
3689:
3686:
3683:
3680:
3675:
3668:
3663:
3660:
3659:
3656:
3653:
3648:
3646:
3643:
3634:
3632:
3629:
3623:
3621:
3617:
3613:
3609:
3607:
3602:
3596:
3592:
3587:
3585:
3581:
3577:
3573:
3569:
3565:
3561:
3557:
3556:
3555:
3552:
3550:
3549:
3544:
3543:
3540:
3525:
3524:
3520:
3518:
3511:
3510:
3509:
3508:
3505:
3502:
3501:
3497:
3491:
3488:
3482:
3478:
3474:
3473:
3471:
3467:
3464:
3457:
3456:
3454:
3450:
3447:
3440:
3439:
3437:
3436:
3432:
3426:
3422:
3417:
3413:
3412:
3408:
3407:
3406:
3403:
3400:
3397:
3394:
3391:
3388:
3385:
3382:
3379:
3376:
3373:
3370:
3367:
3364:
3361:
3356:
3349:
3344:
3341:
3332:
3331:
3328:
3313:
3312:
3308:
3306:
3299:
3298:
3297:
3296:
3293:
3290:
3289:
3285:
3277:
3276:
3274:
3269:
3265:
3264:
3262:
3257:
3253:
3244:
3243:
3241:
3240:
3236:
3230:
3229:
3225:
3224:
3223:
3220:
3217:
3214:
3211:
3208:
3205:
3202:
3199:
3196:
3193:
3190:
3187:
3184:
3181:
3178:
3173:
3166:
3161:
3146:
3145:
3141:
3139:
3132:
3131:
3130:
3129:
3126:
3123:
3122:
3118:
3111:
3110:
3108:
3102:
3101:
3099:
3093:
3092:
3090:
3089:
3085:
3083:
3076:
3071:
3067:
3063:
3062:
3058:
3057:
3056:
3053:
3050:
3047:
3044:
3041:
3038:
3035:
3032:
3029:
3026:
3023:
3020:
3017:
3014:
3011:
3006:
2999:
2992:
2988:
2982:
2978:
2974:
2973:
2972:
2971:
2968:
2964:
2960:
2956:
2952:
2948:
2944:
2941:
2938:
2934:
2930:
2926:
2922:
2918:
2914:
2913:
2910:
2895:
2894:
2890:
2888:
2881:
2880:
2879:
2878:
2875:
2872:
2871:
2867:
2859:
2858:
2856:
2850:
2849:
2847:
2842:
2838:
2833:
2832:
2830:
2829:
2825:
2819:
2818:
2814:
2813:
2812:
2809:
2806:
2803:
2800:
2797:
2794:
2791:
2788:
2785:
2782:
2779:
2776:
2773:
2770:
2767:
2762:
2755:
2750:
2746:
2742:
2738:
2734:
2730:
2726:
2725:
2722:
2707:
2706:
2702:
2700:
2693:
2692:
2691:
2690:
2687:
2684:
2683:
2679:
2672:
2671:
2669:
2663:
2659:
2658:
2656:
2650:
2649:
2647:
2646:
2642:
2636:
2633:
2632:
2631:
2628:
2625:
2622:
2619:
2616:
2613:
2610:
2607:
2604:
2601:
2598:
2595:
2592:
2589:
2586:
2581:
2574:
2570:
2558:
2553:
2546:
2543:
2534:
2533:
2530:
2527:wikimedia.org
2515:
2514:
2510:
2500:
2497:
2495:
2489:
2486:
2485:
2484:
2483:
2482:
2481:
2478:
2475:
2474:
2471:
2468:
2463:
2459:
2458:
2457:
2456:
2453:
2450:
2449:
2445:
2439:
2436:
2434:
2428:
2424:
2421:
2420:
2418:
2413:
2412:
2410:
2405:
2401:
2400:
2398:
2397:
2393:
2391:
2389:
2385:
2381:
2377:
2370:
2367:
2364:
2361:
2358:
2354:
2351:
2348:
2345:
2344:
2343:
2337:
2333:
2332:
2328:
2327:
2326:
2323:
2320:
2317:
2314:
2311:
2308:
2305:
2302:
2299:
2296:
2293:
2290:
2287:
2284:
2281:
2276:
2269:
2265:
2261:
2257:
2252:
2251:
2248:
2244:
2240:
2239:
2234:
2233:exceptionally
2230:
2229:
2224:
2222:
2219:
2218:
2215:
2212:
2207:
2203:
2198:
2196:
2193:
2188:
2187:
2184:
2181:wikimedia.org
2169:
2168:
2164:
2152:
2149:
2146:
2142:
2138:
2134:
2133:
2132:
2131:
2130:
2129:
2128:
2127:
2126:
2125:
2113:
2109:
2104:
2103:
2102:
2101:
2100:
2099:
2098:
2097:
2096:
2095:
2083:
2079:
2075:
2070:
2066:
2065:
2064:
2063:
2062:
2061:
2060:
2059:
2058:
2057:
2045:
2040:
2039:
2038:
2034:
2030:
2026:
2025:
2024:
2021:
2018:
2013:
2009:
2005:
2004:
2003:
2002:
1999:
1995:
1991:
1987:
1985:
1979:
1975:
1974:
1966:
1962:
1957:
1956:
1955:
1954:
1953:
1952:
1951:
1950:
1939:
1938:
1937:
1936:
1935:
1934:
1933:
1932:
1921:
1920:
1919:
1918:
1917:
1916:
1915:
1914:
1903:
1902:
1901:
1900:
1899:
1898:
1897:
1896:
1885:
1884:
1883:
1882:
1881:
1880:
1879:
1878:
1868:
1864:
1860:
1859:WP:NOTFISHING
1857:
1856:
1855:
1854:
1853:
1852:
1851:
1850:
1840:
1839:
1838:
1837:
1836:
1835:
1834:
1833:
1826:
1822:
1818:
1813:
1812:
1811:
1810:
1809:
1808:
1801:
1798:
1794:
1791:
1790:
1784:
1783:
1782:
1781:
1780:
1779:
1773:
1769:
1765:
1764:
1763:
1762:
1757:
1754:
1751:
1747:
1746:
1745:
1744:
1737:
1736:
1735:
1734:
1727:
1726:
1725:
1724:
1717:
1716:
1715:
1714:
1707:
1706:
1705:
1704:
1697:
1696:
1695:
1694:
1688:
1687:Special:Block
1683:
1679:
1678:
1677:
1676:
1669:
1668:
1667:
1666:
1660:
1656:
1655:
1654:
1653:
1646:
1645:
1644:
1643:
1638:
1635:
1630:
1629:
1628:
1627:
1624:
1621:
1620:
1616:
1609:
1608:
1606:
1600:
1599:
1597:
1591:
1590:
1588:
1587:
1583:
1578:
1574:
1571:
1568:
1565:
1564:
1560:
1559:
1555:
1554:
1553:
1550:
1547:
1544:
1541:
1538:
1535:
1532:
1529:
1526:
1523:
1520:
1517:
1514:
1511:
1508:
1503:
1496:
1491:
1488:wikimedia.org
1476:
1475:
1471:
1465:
1464:
1463:
1462:
1459:
1456:
1455:
1451:
1443:
1442:
1440:
1434:
1433:
1431:
1426:
1421:
1420:
1418:
1417:
1413:
1407:
1406:
1402:
1401:
1400:
1397:
1394:
1391:
1388:
1385:
1382:
1379:
1376:
1373:
1370:
1367:
1364:
1361:
1358:
1355:
1350:
1343:
1338:
1334:
1329:
1322:
1320:
1317:
1308:
1306:
1302:
1298:
1294:
1292:
1287:
1281:
1277:
1272:
1270:
1267:
1266:
1263:
1260:
1255:
1254:
1251:
1248:wikimedia.org
1236:
1235:
1231:
1219:
1216:expanded the
1214:
1213:
1212:
1211:
1210:
1209:
1206:
1203:
1202:
1199:
1196:
1191:
1187:
1186:
1185:
1182:
1181:
1177:
1169:
1168:
1166:
1160:
1159:
1157:
1151:
1150:
1148:
1147:
1143:
1137:
1134:
1133:
1132:
1129:
1126:
1123:
1120:
1117:
1114:
1111:
1108:
1105:
1102:
1099:
1096:
1093:
1090:
1087:
1082:
1075:
1070:
1067:
1066:
1063:
1060:
1054:
1052:
1047:
1041:
1037:
1032:
1031:
1028:
1025:wikimedia.org
1013:
1012:
1008:
1002:
1001:
1000:
999:
996:
993:
992:
988:
981:
980:
978:
972:
971:
969:
963:
962:
960:
959:
955:
949:
948:
943:
942:
938:
937:
936:
933:
930:
927:
924:
921:
918:
915:
912:
909:
906:
903:
900:
897:
894:
891:
886:
879:
874:
871:wikimedia.org
859:
858:
854:
846:
842:
838:
833:
829:
824:
820:
817:
813:
810:
807:
802:
801:
800:
797:
796:
793:
790:
785:
782:
781:
780:
779:
776:
773:
772:
768:
761:
760:
758:
753:
752:
750:
744:
740:
739:
737:
736:
732:
726:
721:
717:
713:
712:
708:
707:
706:
703:
700:
697:
694:
691:
688:
685:
682:
679:
676:
673:
670:
667:
664:
661:
656:
649:
645:
633:
631:
630:
629:
621:
616:
612:
608:
604:
602:
599:
598:
593:wikimedia.org
582:
581:
575:
572:
569:
566:
565:
564:
563:
559:
557:
554:
553:
549:
547:
544:
543:
539:
537:
534:
533:
528:wikimedia.org
517:
515:
512:
511:
508:
505:
504:
500:
498:
491:
488:
485:
482:
479:
476:
473:
472:
471:
465:
461:
457:
454:
451:
448:
445:
442:
441:
440:
438:
434:
430:
426:
421:
419:
415:
411:
399:
394:
392:
387:
385:
380:
379:
377:
376:
371:
366:
365:
350:
349:
338:
335:
332:
328:
325:
323:
320:
319:
315:
310:
309:
301:
298:
296:
293:
290:
286:
281:
278:
276:
273:
270:
266:
263:
261:
258:
256:
253:
251:
248:
244:
239:
236:
235:
231:
226:
225:
217:
214:
212:
209:
206:
202:
199:
198:
194:
189:
188:
180:
177:
175:
172:
170:
167:
165:
164:Case requests
162:
160:
157:
156:
152:
147:
146:
139:
135:
132:
130:
127:
124:
120:
115:
113:
110:
108:
105:
103:
100:
97:
94:
90:
87:
86:
84:
83:
79:
75:
74:
71:
67:
61:
56:
53:
41:
37:
36:
33:
23:
19:
4519:
4449:August 2010
4338:
4335:
4321:
4315:
4309:
4303:
4297:
4291:
4281:
4266:
4260:
4254:
4248:
4242:
4236:
4223:
4220:
4209:
4203:
4197:
4191:
4185:
4179:
4160:
4154:
4148:
4142:
4136:
4130:
4111:
4105:
4099:
4093:
4087:
4081:
4074:Stwalkerster
4062:
4056:
4050:
4044:
4038:
4032:
4013:
4007:
4001:
3995:
3989:
3983:
3964:
3958:
3952:
3946:
3940:
3934:
3915:
3909:
3903:
3897:
3891:
3885:
3868:
3846:
3803:
3783:
3717:
3711:
3705:
3699:
3693:
3687:
3681:
3672:
3650:
3547:
3526:
3516:
3503:
3414:Hello, I am
3398:
3392:
3386:
3380:
3374:
3368:
3362:
3353:
3314:
3304:
3291:
3215:
3209:
3203:
3197:
3191:
3185:
3179:
3170:
3147:
3137:
3124:
3081:
3048:
3042:
3036:
3030:
3024:
3018:
3012:
3003:
2977:an AN thread
2939:
2925:longstanding
2921:re-insertion
2917:contribution
2896:
2886:
2873:
2804:
2798:
2792:
2786:
2780:
2774:
2768:
2759:
2741:OhKayeSierra
2729:Stwalkerster
2708:
2698:
2685:
2623:
2617:
2611:
2605:
2599:
2593:
2587:
2580:Stwalkerster
2578:
2575:Stwalkerster
2564:
2551:
2516:
2465:
2451:
2422:
2373:
2341:
2318:
2312:
2306:
2300:
2294:
2288:
2282:
2273:
2236:
2232:
2209:
2170:
2111:
2107:
2081:
2077:
1983:
1981:
1862:
1861:talks about
1796:
1786:
1771:
1622:
1545:
1539:
1533:
1527:
1521:
1515:
1509:
1500:
1477:
1457:
1392:
1386:
1380:
1374:
1368:
1362:
1356:
1347:
1257:
1237:
1193:
1183:
1124:
1118:
1112:
1106:
1100:
1094:
1088:
1079:
1057:
1014:
994:
928:
922:
916:
910:
904:
898:
892:
883:
860:
831:
787:
774:
698:
692:
686:
680:
674:
668:
662:
653:
639:
627:
626:
625:
600:
573:
555:
545:
535:
513:
506:
495:
469:
422:
407:
48:
4438:August 2009
4423:appointment
3806:arbcom-en-c
3697:protections
3612:Nosebagbear
3558:^Indeed. –
3529:arbcom-en-c
3378:protections
3317:arbcom-en-c
3195:protections
3150:arbcom-en-c
3028:protections
2899:arbcom-en-c
2784:protections
2711:arbcom-en-c
2603:protections
2519:arbcom-en-c
2298:protections
2173:arbcom-en-c
1699:boundaries.
1525:protections
1480:arbcom-en-c
1372:protections
1240:arbcom-en-c
1104:protections
1017:arbcom-en-c
908:protections
863:arbcom-en-c
678:protections
585:arbcom-en-c
520:arbcom-en-c
134:Ban appeals
112:Noticeboard
40:WP:CUOS2019
4429:Elections
4319:block user
4313:filter log
4264:block user
4258:filter log
4229:Ivanvector
4207:block user
4201:filter log
4158:block user
4152:filter log
4109:block user
4103:filter log
4060:block user
4054:filter log
4011:block user
4005:filter log
3962:block user
3956:filter log
3913:block user
3907:filter log
3709:page moves
3641:SandDoctor
3425:discussion
3390:page moves
3339:SandDoctor
3207:page moves
3040:page moves
2796:page moves
2615:page moves
2541:SandDoctor
2488:Rschen7754
2310:page moves
2256:Beeblebrox
2029:Beeblebrox
1990:Beeblebrox
1984:impossible
1817:Beeblebrox
1537:page moves
1384:page moves
1315:SandDoctor
1116:page moves
920:page moves
690:page moves
622:Candidates
340:(pre-2016)
327:Statistics
260:Procedures
4418:candidacy
4325:block log
4270:block log
4213:block log
4164:block log
4115:block log
4066:block log
4017:block log
3968:block log
3919:block log
3703:deletions
3384:deletions
3201:deletions
3034:deletions
2959:Barkeep49
2790:deletions
2609:deletions
2559:Oversight
2423:I do not.
2304:deletions
2110:is also,
1905:somebody.
1789:approach.
1531:deletions
1378:deletions
1110:deletions
914:deletions
684:deletions
634:CheckUser
418:Oversight
414:CheckUser
265:Elections
52:announced
4443:May 2010
4295:contribs
4276:resigned
4240:contribs
4183:contribs
4172:Xaosflux
4134:contribs
4085:contribs
4036:contribs
3987:contribs
3938:contribs
3889:contribs
3685:contribs
3560:Ammarpad
3486:xaosflux
3462:xaosflux
3445:xaosflux
3416:xaosflux
3366:contribs
3355:Xaosflux
3350:Xaosflux
3183:contribs
3016:contribs
2951:this Afd
2929:WP:FOOLS
2772:contribs
2591:contribs
2334:Hi, I'm
2286:contribs
2204:or even
2145:RoySmith
2141:WP:CHECK
2017:RoySmith
2012:User:AGK
1965:WP:CHECK
1961:WP:CHECK
1750:RoySmith
1513:contribs
1502:RoySmith
1497:RoySmith
1360:contribs
1092:contribs
896:contribs
666:contribs
32:Shortcut
20: |
3854:Results
3256:WP:OTRS
3078:decide.
2955:history
2665:safely.
2662:fintech
2427:steward
2363:IPRange
2347:IPCheck
1671:damage.
1332:Crossin
1171:queues.
812:buttons
728:decide.
420:teams.
337:Reports
275:History
255:Members
250:Contact
238:Discuss
102:(CU/OS)
4274:, who
3715:rights
3691:blocks
3396:rights
3372:blocks
3252:WP:ACC
3213:rights
3189:blocks
3104:users.
3075:WP:SPI
3070:WP:ACC
3066:WP:SPI
3046:rights
3022:blocks
2986:話して下さい
2861:while.
2837:WP:UAA
2802:rights
2778:blocks
2737:WP:AGF
2733:WP:ACC
2621:rights
2597:blocks
2386:, and
2316:rights
2292:blocks
2206:m:SWMT
2202:WP:ACC
2192:zzuuzz
2148:(talk)
2080:, is,
2020:(talk)
1867:WP:UPE
1772:needed
1753:(talk)
1634:zzuuzz
1577:WP:SPI
1543:rights
1519:blocks
1425:WP:ACC
1390:rights
1366:blocks
1327:Steven
1122:rights
1098:blocks
1081:Oshwah
1076:Oshwah
926:rights
902:blocks
816:WP:RBM
743:WP:SPI
725:WP:SPI
720:WP:ACC
716:WP:SPI
696:rights
672:blocks
280:Clerks
138:Report
4556:2023–
4341:Katie
2947:pride
2919:(and
2243:talk
2208:). --
828:m:2FA
314:Audit
16:<
4540:2023
4535:2022
4530:2021
4525:2020
4520:2019
4515:2018
4510:2017
4505:2016
4500:2015
4495:2013
4490:2012
4485:2011
4307:logs
4289:talk
4252:logs
4234:talk
4195:logs
4177:talk
4146:logs
4128:talk
4097:logs
4079:talk
4048:logs
4030:talk
4025:ST47
3999:logs
3981:talk
3950:logs
3932:talk
3901:logs
3883:talk
3878:L235
3825:qedk
3679:talk
3674:L235
3669:L235
3658:7754
3655:chen
3627:Revi
3616:talk
3591:qedk
3580:talk
3564:talk
3548:xeno
3360:talk
3177:talk
3010:talk
3005:ST47
3000:ST47
2963:talk
2945:and
2933:joke
2839:and
2766:talk
2745:talk
2585:talk
2473:7754
2470:chen
2462:2018
2357:NBCH
2355:and
2280:talk
2260:talk
2217:7754
2214:chen
2033:talk
1994:talk
1821:talk
1682:CIDR
1507:talk
1354:talk
1301:talk
1276:qedk
1265:7754
1262:chen
1201:7754
1198:chen
1190:2018
1086:talk
1065:7754
1062:chen
1036:qedk
890:talk
885:L235
880:L235
841:talk
837:ST47
795:7754
792:chen
660:talk
655:ST47
650:ST47
464:OTRS
437:UTRS
416:and
408:The
331:Talk
322:Talk
289:Talk
269:Talk
123:Talk
93:Talk
3976:SQL
3927:Mz7
3721:RfA
3638:The
3402:RfA
3336:The
3219:RfA
3172:Mz7
3167:Mz7
3112:No.
3052:RfA
2935:at
2808:RfA
2627:RfA
2538:The
2493:SQL
2432:SQL
2336:SQL
2322:RfA
2275:SQL
2270:SQL
2238:DGG
2112:yes
2082:yes
2046:...
2015:--
1748:--
1659:NAT
1549:RfA
1396:RfA
1349:Mz7
1344:Mz7
1312:The
1128:RfA
932:RfA
832:not
809:new
806:few
762:No.
702:RfA
435:or
433:ACC
429:SPI
205:Log
62:) .
60:UTC
3873::
3652:Rs
3618:)
3582:)
3566:)
2989:)
2965:)
2747:)
2467:Rs
2378:,
2262:)
2245:)
2211:Rs
2035:)
1996:)
1823:)
1303:)
1259:Rs
1195:Rs
1059:Rs
1056:--
843:)
789:Rs
4384:e
4377:t
4370:v
4327:)
4322:·
4316:·
4310:·
4304:·
4298:·
4292:·
4287:(
4272:)
4267:·
4261:·
4255:·
4249:·
4243:·
4237:·
4232:(
4215:)
4210:·
4204:·
4198:·
4192:·
4186:·
4180:·
4175:(
4166:)
4161:·
4155:·
4149:·
4143:·
4137:·
4131:·
4126:(
4117:)
4112:·
4106:·
4100:·
4094:·
4088:·
4082:·
4077:(
4068:)
4063:·
4057:·
4051:·
4045:·
4039:·
4033:·
4028:(
4019:)
4014:·
4008:·
4002:·
3996:·
3990:·
3984:·
3979:(
3970:)
3965:·
3959:·
3953:·
3947:·
3941:·
3935:·
3930:(
3921:)
3916:·
3910:·
3904:·
3898:·
3892:·
3886:·
3881:(
3865:.
3837:)
3835:c
3832:桜
3829:t
3827:(
3723:)
3718:·
3712:·
3706:·
3700:·
3694:·
3688:·
3682:·
3677:(
3614:(
3603:)
3601:c
3598:桜
3595:t
3593:(
3578:(
3562:(
3404:)
3399:·
3393:·
3387:·
3381:·
3375:·
3369:·
3363:·
3358:(
3258:.
3221:)
3216:·
3210:·
3204:·
3198:·
3192:·
3186:·
3180:·
3175:(
3054:)
3049:·
3043:·
3037:·
3031:·
3025:·
3019:·
3013:·
3008:(
2983:(
2961:(
2810:)
2805:·
2799:·
2793:·
2787:·
2781:·
2775:·
2769:·
2764:(
2743:(
2629:)
2624:·
2618:·
2612:·
2606:·
2600:·
2594:·
2588:·
2583:(
2324:)
2319:·
2313:·
2307:·
2301:·
2295:·
2289:·
2283:·
2278:(
2258:(
2241:(
2114:.
2084:.
2031:(
1992:(
1819:(
1551:)
1546:·
1540:·
1534:·
1528:·
1522:·
1516:·
1510:·
1505:(
1398:)
1393:·
1387:·
1381:·
1375:·
1369:·
1363:·
1357:·
1352:(
1299:(
1288:)
1286:c
1283:桜
1280:t
1278:(
1130:)
1125:·
1119:·
1113:·
1107:·
1101:·
1095:·
1089:·
1084:(
1048:)
1046:c
1043:桜
1040:t
1038:(
934:)
929:·
923:·
917:·
911:·
905:·
899:·
893:·
888:(
839:(
704:)
699:·
693:·
687:·
681:·
675:·
669:·
663:·
658:(
617:.
397:e
390:t
383:v
285:+
243:+
207:)
203:(
119:+
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.