Knowledge (XXG)

:Arbitration Committee/CheckUser and Oversight/2019 CUOS appointments - Knowledge (XXG)

Source 📝

3232:
From November 2016 through April 2019, I was an active member of the OTRS team—I voluntarily relinquished my access in April because of changes in my real life situation which have now alleviated—so I would be readily able to handle requests to the OTRS queue. Being on the OTRS team exposed me to a more humbling side of Knowledge (XXG): the people whom we write about and the people whom we interact with are real people, and the things we do and say can have real, tangible effects. We cannot forget that. For these reasons, I think I am intimately familiar with the principles underlying the oversight policy. I am very active on IRC, and there I help handle revision deletion requests in the #wikipedia-en-revdel channel—I would be more than happy to respond to the oversight requests there as well. As I mentioned in my CU nomination statement, I find that I get along well with other Wikipedians, so I look forward to working with fellow oversighters if appointed.
1409:
just be another tool in the toolbox to help with the work I already do in that area. Apart from SPI, back in January of this year I joined the account creation team (ACC), which typically has a backlog of requests awaiting checkuser (the oldest request in that queue at the time I am writing this is from 7 months ago). I would be happy to help out on that front as well. As far as my personal background goes, I am familiar with networking principles and IPv4/IPv6 range blocks, and I consider myself a quick-learner. If there is a tricky or unfamiliar case, I would not hesitate to consult with a fellow checkuser. I am very active on IRC, and I find that I get along pretty well with others on Knowledge (XXG). I look forward to working with the team if appointed.
2190:
of blocking on Knowledge (XXG) in general, and IP addresses in particular, which as I mentioned above are a staple of CU work. I am not looking for large numbers of blocks, just enough to be able to identify quality and a level of experience. For example, it is one thing to know what an IP address range is - it is another to range block it and deal with all the collateral, complaints, block evasion, and other mess that comes with actually performing such a block. We all learn things from blocking IP addresses. Anyway, the decision is not mine, and I've probably had my say, so I'll step aside and wish you good luck. --
1739:
opening a case for somebody else to follow up on. As a CU, I could see for myself, which might well lead to more blocks. I imagine I'll also be servicing the SPI queue and/or responding to requests from other queues (arbcom, etc) so that would lead to more blocks. Massively? That would be speculation, so I can't really answer that part. Not to mention, that just like with edit-count-itis, I don't believe there's much value in comparing block counts. With the tools I have now, I could certainly be doing more blocking, but I tend to be conservative about blocks, and I don't expect that would change.
2821:
oversight policies. I'll be available to help with the oversight mailing list and to handle any requests e-mailed to me, and while patrolling userpages, the user creation log, and new articles I have encountered many instances calling for oversight; I have never had an oversight request denied, and being able to handle such cases on my own would allow me to better serve the community. I am of the age of majority where I live, and have read the policies on non-public information and the confidentiality agreement; if selected, I will sign the confidentiality agreement. Thank you for your consideration.
1729:
software, etc). At the network layer, a security gateway could mutate HTTP headers (including the user-agent string) on the fly. I would be surprised if our most sophisticated and well-funded users (government-backed disinformation agencies, high-priced PR firms with Fortune-500 clients, national political parties) were not already doing this. I think it less likely that garden-variety SEO spammers are using technology like that, but it's not beyond reach of a mid-sized company with more money than ethics.
1602:
Google, access to any personally-identifiable information was tightly controlled, on a "need to know" basis, and with strict requirements to limit access to the minimum amount of data required to do the job, for the minimum amount of time, and quarantined to a secure environment. As a CU, I would have access to similarly sensitive user information, and would exercise the same diligence. I'm being vague here, but please feel free to ask questions if I've glossed over anything that you want to know.
1153:
AFD, AN3, and ANI. I'm also an ACC Tool Administrator on WP:ACC, and assist with processing account creation requests, as well as helping tool users with difficult or complex cases. I'm also an SPI clerk and help with responding to evidence and accusations of sock puppetry. I'm also highly active on IRC and I respond to requests for assistance and input from other users, and I respond to emergencies such as LTA activity, threats, blocking requests, revision deletion and suppression requests.
1139:
been an administrator for three years, an oversighter for one year, and have been consistently active, available, and happy to help with requests and urgent matters on IRC and other communication methods. Having the checkuser tools will help me to be able to help more people, as well as help protect this project from sock puppetry and abuse, and put an end to harassment. If you have any questions, please do not hesitate to ask and I'll be happy to answer them.
1162:
Software Engineering Technology and a Minor in Applied Mathematics. I have extensive IPv4 and IPv6 experience that I actively use during my daily tasks at my current job, including networking, traffic routing, VPN, encryption, and security. I also have basic and advanced certification with Dell SonicWall firewalls and have written packet sniffing, ARP, and ICMP software GUIs and tools completely by myself using C++, Win32, and the WinPcap library.
78: 2490:, I apologize for the delay, it's been a busy week. By and large one of the primary concerns cited was a one-time issue shortly before CUOS2018. I won't rehash the debate, but I have read and re-read that discussion many times and have taken the feedback I received there to heart. I was too quick in that instance to use the tools, and should have proposed an action and solicited feedback before doing so. 786:. While I think it's great that you have returned, some might say that you should have been desysopped for inactivity. CU/OS are particularly sensitive permissions if put in the wrong hands, even more so than just administrator. If given the tools (and you are applying for both tools), do you think that you will be active enough over the next few years to put them to good use? -- 2226:
not be discussed there, but I think that for a good percentage of checks here might be one or two of the current checkusers who would disagree with it, and I know that I often see declines to check where I might have run one. to I think someone with Roy's experience on and off WP will have good judgment, and will especially know enough to go carefully at first.
4470: 2638:
noticing a dearth of activity from oversighters there at certain times of the day which is a hole I'm happy to help patch given I follow a European timezone. I'm experienced at handling private data, both through my work at ACC and as a current checkuser. I'm also familiar with the revdel tool having handled quite a number of revdel requests from IRC.
3810: 3533: 3321: 3154: 2903: 2715: 2523: 2177: 1484: 1244: 1021: 867: 589: 524: 1709:
connection (although, probably out of a limited-size pool). Mobile users (a large and growing segment, especially outside of North America) will get dynamic IP addresses. With all of those, the IP address won't change very quickly, so a user who logs out and logs in again as a sock will probably still have the same IP address.
1719:
be the same. On the other hand, in large centrally-managed environments, software is usually rolled out onto desktops via automated processes, so every computer may have the same user-agent string. Thus user-agent matches or mis-matches are just another hint, neither conclusively proving or disproving anything.
1887:
user's first edit is to AfD, that's something that raises suspicion. When several new users all comment on the same AfD, that's a (much) bigger suspicion. And, while I can't put into words exactly what I'm looking for, I've certainly read things that people have written and thought, "Hmmm, that sounds fishy".
3734:
responsible for making initial determinations on the use of CheckUser (endorsing or declining CU requests prior to CU review), evaluating evidence, and blocking users for sockpuppetry. I’ve made over 500 blocks in the ~1 year since my RfA, and many SPI-clerk recommendations for admin action before that.
945:
responsible for making initial determinations on the use of CheckUser (endorsing or declining CU requests prior to CU review), evaluating evidence, and blocking users for sockpuppetry. I’ve made over 500 blocks in the ~1 year since my RfA, and many SPI-clerk recommendations for admin action before that.
3762:
I have a technical background as a student of computer science at Stanford; although networking is not my area of research, I know the basics and I'm confident I can pick up relevant skills fairly quickly. As for experience dealing with private information, I have held a number of positions requiring
2253:
I'd also like to thank Roy for his detailed responses to my questions, and for totally not calling me out for kinda stretching the rules with 2 and 1/2 questions. Whatever else I may think, in both the past incident in question and here on this page Roy has been forthright and civil despite my rather
2225:
The written policy for CU is of course our basic rule, but in actual work it, like all policies, needs interpretation. Various CUs interpret it differently, because so much of this is judgment. In discussions on the CU list, there are frequently disagreements. Of course, most checks are not and need
2041:
This all happened a year ago, and I barely remember the details. But, I suspect that if, at the time, the magic CU fairy had come down and granted me three wishes, I probably would have used one of them to run a CU. But, that was a year ago. In the intervening time (and especially more recently as
1940:
The same cannot be said of accessing confidential information. Once I've seen something, I can't unsee it. There's no way to completely undo the disclosure, and you never know what you're going to see before you look. Behavior-based blocks should not be made willy-nilly, but the decision to breach
1718:
Corroborating evidence would be identical user-agent strings. For example, I take my laptop with me and use it on various networks, including public hotspots and on mobile networks via tethering to my phone. In those various locations, I'll have different IP addresses, but my user-agent string will
1408:
Hello, I'm Mz7, and I would like to apply for checkuser rights this year. I have a history of evaluating SPIs going back to when I became an administrator in January 2017, and I am experienced at identifying the behavioral peculiarities that may indicate that two accounts are related. CheckUser would
973:
I have a technical background as a student of computer science at Stanford; although networking is not my area of research, I know the basics and I'm confident I can pick up relevant skills fairly quickly. As for experience dealing with private information, I have held a number of positions requiring
825:
Now, if I'm wrong about all that, the activity requirements for CU and OS are also quite a bit more stringent than for sysop. I believe it is 5 logged actions (with the functionary tools) in a year, and of course ArbCom has the power to change that or otherwise manage the Checkuser or Oversight tools
821:
On point, I do believe I'm here to stay. I went inactive due to college; I now hold a stable full-time job. I've gained some maturity and life experience, and I'm returning with a fresh motivation to contribute to the project well into the future. I've learned the few new tools and processes that are
3072:
user. I'm a computer security researcher and a part time web admin, so I am very familiar with the uses - and limitations - of the tool. I am comfortable calculating IP ranges and issuing range blocks. My Recent Changes and AbuseFilter patrolling causes me to stumble upon likely sock puppet accounts
2820:
I am applying for the oversight permission to increase my participation on Knowledge (XXG), help protect the privacy of users, and keep defamatory content from proliferating. I have been an administrator for almost 8 years, active throughout that time, and am very familiar with both the deletion and
2105:
But, the real answer is that I expect that initially, I'll be seeking a lot of input, and go along with the advice I receive. It's quite clear that if I were to ask you, you would say not to run it. Given that AGK declined this a year ago, I expect they would say the same thing. So, yeah, if this
2014:
felt a CU investigation wasn't warranted. How do I feel about that? I'm fine with it. I made a request, and the CU declined. That's fine, that's their job to decide which ones are justified and which aren't. I'm not trying to be evasive, but I don't know what else you're looking for me to say.
1738:
As for, "Would you expect your blocking activity to massively change?", it's difficult to predict the future. Certainly, as a CU, I would have access to more information than I do now, which would help me make better block-or-no-block decisions. Sometimes I suspect a sock, but not enough to bother
1631:
I'm a little surprised to see, given your apparent technical experience, that you've only blocked 5 IP addresses in the last 10 years. The CU role requires a lot of work with IP addresses, such as blocking, analysing or classifying networks, and evaluating collateral. Could you elaborate on how your
1215:
Since last year, I was promoted to a full clerk on SPI. I've also extended my participation on Knowledge (XXG) by not only responding to suppression requests and suppressing content that required its use with the oversight tool, but also helped to remove missed content that needed supression. I also
1161:
My user page explains the extent of my background in a nutshell - I've grown up around computers and my IT-related experience goes very far back. I performed computer and network administration throughout my youth while in school, and held jobs in IT-related areas ever since. I have a BS in Computer
722:
user. I'm a computer security researcher and a part time web admin, so I am very familiar with the uses - and limitations - of the tool. I am comfortable calculating IP ranges and issuing range blocks. My Recent Changes and AbuseFilter patrolling causes me to stumble upon likely sock puppet accounts
3427:
on splitting oversight from ArbCom, to try to free up ArbCom for more dispute resolution activities – though it was a non-starter I still think that having non-arbcom oversighters is important so that the committee can focus on their core responsibilities. To that end, I'd like to think I have the
3278:
This is my first time applying for advanced permissions beyond sysop on any WMF project. From November 2016 to April 2019, I was an active member of the OTRS team with access to the info-en and permissions queues. I voluntarily requested that my access be removed in April 2019; although my activity
2189:
I'd like to thank RoySmith for their extensive reply to my question above. For the benefit of readers who are less technically minded, it's not to be faulted on technical grounds, ie it shows a fair general knowledge of some of the issues that we face. I remain a little concerned about inexperience
1592:
I've been active for the past few months opening SPI cases. I got into that when I started working on reviewing new drafts, which has a fair amount of socking involved. My role at this point has been gathering whatever evidence I could with the standard admin capabilities. Commonality of editing
1444:
This is my first time applying for advanced permissions beyond sysop on any WMF project. From November 2016 to April 2019, I was an active member of the OTRS team with access to the info-en and permissions queues. I voluntarily requested that my access be removed in April 2019; although my activity
1220:
to make it more clear, detailed, and easy to read for newcomers. I've also helped to improve the ACC process for users by increasing deflection. This was done by helping to create necessary pages in order for users to assist themselves and create their own accounts instead of making them wait up to
496:
Applicants must be aware that they are likely to receive considerable internal and external scrutiny. External scrutiny may include attempts to investigate on- and off-wiki activities; previous candidates have had personal details revealed and unwanted contact made with employers and family. We are
3418:
and I am applying for an oversighter appointment. I have been a Wikipedian since 2005, an administrator since 2006, and a bureaucrat since 2016. I currently function as an oversighter on the meta-wiki project and have previously completed the confidentiality agreement for nonpublic information. If
2851:
I work with disabled adults, and in my professional capacity I handle confidential information on a daily basis. Among many other responsibilities, this involves extensive case notes and writing about specific incidents. I must be able to describe client incidents in adequate detail without giving
2651:
I have been handling revdel requests from IRC for a number of years now, and I'm confident in the use of the tool. I also have extensive experience in handling private data here on-wiki, with more than a decade of ACC and a year of checkuser under my belt. I also do a lot of attack page deletions,
1152:
My time has been mostly spent in recent changes patrolling and attempting to mentor and help new users on Knowledge (XXG). I patrol recent changes and revert vandalism, respond to instances of long-term abuse, username violations, blatant sock puppetry, page protection requests, and (occasionally)
3231:
Hello, I'm Mz7, and I would like to apply for oversight rights this year. I have been involved in the "behind-the-scenes" work on Knowledge (XXG) for almost the entirety of the time that I have been active here, and this has exposed me to numerous situations where I have had to request oversight.
3094:
Through recent changes patrolling, I occasionally find oversightable material that I report to the oversight email queue. I also use the revdel IRC channel to respond to requests for revision deletion by non-admins. As an oversighter I would be able to provide a faster response to people visiting
1922:
If a block is made in error, it can be reversed with no lasting harm. Well, that's not quite true; if the act of blocking somebody ends up chasing away a potentially valuable new user, that's harm. From the point of view of the user's account on the site, however, they've been restored to their
1728:
And, of course, all of the above assumes a technically naive user. A more sophisticated user can intentionally mask their IP address using proxies. User-agent strings are likewise easy to spoof at the desktop (by installing multiple browsers, ua-switcher plugins, virtual machines, custom client
1684:
notation. For example, a small business I help out with their IT needs, has a /29. That means the top 29 bits are their network address, leaving the bottom 3 bits for internal addressing. Excluding 000 and 111 as reserved, that gives them 6 externally routable IP address, any of which might be
1647:
Every incoming HTTP request will have the remote IP address logged. For logged in users, there will be, in addition, a username. The IP addresses can be used as a clue to suggest that multiple requests may have come from the same place. For example, if I make a logged-in edit, then log out and
1601:
My last two positions (Senior Software Engineer at Google, and Director of Engineering at Songza) were both hands-on running web servers and applications. Much diagnostic work involved reading through server logs. In both positions I had access to confidential user information. Particularly at
1138:
I am applying for the CheckUser permissions in order to extend my participation on Knowledge (XXG) and help put a stop to sock puppetry, disruption, and abuse. I'll be available to help with processing requests that I see go unanswered on IRC, as well as help with the backlog at SPI and ACC. I've
3753:
My nomination statement describes a number of pertinent areas in which I've contributed; in particular, I've been an SPI clerk for nearly four years, an ArbCom clerk for over four and a half years, and an administrator for over a year. In these roles, I have worked closely with functionaries and
3733:
Greetings: I’m Kevin, and I’m applying for CheckUser and Oversight access to help with some of the backlogs we’ve seen, particularly at SPI. I’ve been an SPI clerk since December 2015, where I’ve been actively involved in sockpuppetry investigations. As a clerk and patrolling administrator, I am
964:
My nomination statement describes a number of pertinent areas in which I've contributed; in particular, I've been an SPI clerk for nearly four years, an ArbCom clerk for over four and a half years, and an administrator for over a year. In these roles, I have worked closely with functionaries and
944:
Greetings: I’m Kevin, and I’m applying for CheckUser and Oversight access to help with some of the backlogs we’ve seen, particularly at SPI. I’ve been an SPI clerk since December 2015, where I’ve been actively involved in sockpuppetry investigations. As a clerk and patrolling administrator, I am
745:
for cases that are ready for administration, either because a CheckUser has already commented or because no CheckUser is required, so I am familiar with investigating behavioral evidence of sockpuppetry as well as the procedures at SPI. I come across enough likely socks through patrolling Recent
3739:
I have an extensive track record as a thorough evaluator of behavioral evidence in SPI cases, and I have a technical background as a Stanford computer science student. I am regularly available and accessible on IRC, and I am glad to perform CU/OS functions on ACC, UTRS, and OTRS (all of which I
1886:
So, what we're really talking about is how I would make the judgement call to suspect socking when I see unusual behavior at AfD. I can't give you an exact answer. That's why we still employ humans to make judgement calls instead of relying on AI algorithms to do it for us. Certainly, when a
1435:
I have a technical background and am familiar with basic networking principles and IP address assignment. I consider myself a quick learner, and if there is any technical aspect of a case that I am unfamiliar with, I will not hesitate to ask a fellow checkuser for advice. I also have experience
950:
I have an extensive track record as a thorough evaluator of behavioral evidence in SPI cases, and I have a technical background as a Stanford computer science student. I am regularly available and accessible on IRC, and I am glad to perform CU/OS functions on ACC, UTRS, and OTRS (all of which I
2834:
I have extensive experience with deletion and revdel across several namespaces. In particular, I regularly check userpages and subpages for various types of misuse, such as spam or NOTWEBHOST violations, and frequently find private information of various sorts. In addition, I frequently patrol
2637:
I am putting myself forward for Oversight. Having made quite a number of requests for oversight, mostly towards a small handful of oversighters, and as far as I'm aware and recall, (if not all) the vast majority have been actioned. I am quite active on IRC in the -revdel channel, and I've been
1958:
Should you expect that I'll automatically run a CU investigation on every new user that pops up at AfD? No, of course not. Will I look at brand new users who are commenting at AfD and wonder if they're legitimate? Yes. How will I decide that my initial suspicion is strong enough to justify
2199:
Inclined to say not right now - the concern isn't lack of technical expertise but expertise in when running a CU is allowed under policy, and issuing rangeblocks (that could be CU blocks as well). Would be happy to reconsider after serving as a SPI clerk, or more relevant experience (like at
2139:. The same concept applies here. Assuming I'm granted CU, I recognize that on day one, I'll be the least experienced and least knowledgeable of the entire CU cadre. My first job will be to learn as much as I can from those who have more experience than I do. It's one thing for me to read 1708:
On the other end of the spectrum, some users will come from multiple IP addresses. The most obvious case is somebody editing from both home and their office, or from public WiFi hotspots. Users with dial-up connections (increasingly rare these days) will get a different IP address on each
1788:
I generally work under the assumption that when a brand new account immediately heads for AfD, something's not right. It's simply not what you would expect a brand new user to be doing. There was a long AN thread (started by me) about this, which I've taken as an endorsement of this
1422:
As I mentioned in my nomination statement, I have commented on numerous sockpuppetry investigations in the past several years I've been an administrator. Specifically, I have experience spotting behavioral peculiarities that carry over between multiple accounts (which are the key in
1988:"(emphasis added) A Checkuser found one of the accused to be unconnected, and the other, the one whose block was the subject of the previous AN discussion, they declined to CU at all. Given your answer above, I'm curious as to how you feel about the CUs refusal to even run a check? 1685:
visible in the Wikimedia server logs for requests coming from this location. If it were decided that this location was overrun with miscreants and we wanted to block the entire lot of them, we would block the entire /29 range (I don't think I've ever actually used this feature).
530:. Each candidate will receive an application questionnaire to be completed and returned to the arbcom-en-c mailing list before the nomination period ends. This should include a nomination statement, to a maximum of 250 words, for inclusion on the candidate's nomination sub-page(s). 1770:, in which I undid one of your blocks because it was based solely on your assertion that any new user who shows up at AFD is a sock. At the end of that discussion you seemed to understand that that is not ok, and why it isn't ok. To my mind this isn't something that should have 3458:
I have lengthy off-wiki professional experience in the financial industry, information security, and computer security. My experience includes review and classifying information, maintaining technical and professional confidentiality, and information system auditing. —
3441:
Locally, I have years of experience with deletion, rev-del, and redaction as an administrator. I am currently an oversighter on the meta-wiki, so have direct experience both with the tools and its logs, as well as keeping open communications with other functionaries. —
3077:
and elsewhere. Similarly, I do occasionally run into oversightable things from recent changes or sockpuppets, and report them to the oversight team. I often have IRC and email open even while I'm not actively on wiki. So, I offer to take on either or both roles, as you
727:
and elsewhere. Similarly, I do occasionally run into oversightable things from recent changes or sockpuppets, and report them to the oversight team. I often have IRC and email open even while I'm not actively on wiki. So, I offer to take on either or both roles, as you
2807: 3103:
I work in computer security, and I'm a developer/sysadmin for a small hobbyist website, so I regularly work with IP addresses and ranges, WHOIS and port scan data, user agent headers, and am responsible for protecting sensitive data relating to our
1814:
So my question is, if you were granted CU access, could we expect that anyone who was new and made a comment at AFD would be checkusered by you, to try and find evidence to back up this assumption that "new user at AFD = 100% certainty of socking"?
746:
Changes, abuse filters, and a few other venues, to be familiar with the common LTAs. I also issue my fair share of range blocks, balancing the size of the range and the duration against the level of disruption in order to minimize collateral damage.
4409: 2076:(and I'm sure that's what you're getting at). Credible just means "believable", and obviously at the time, I believed it. So, yeah, my reading of the policy is that this would be a legitimate check. And thus the answer to your first question, 4539: 4534: 4529: 4524: 4514: 4509: 4504: 4499: 4494: 4489: 4484: 4432: 2860:
Right now, my only advanced permissions are being an administrator here. I previously had OTRS access from 2012-2014, and handled a few tickets, but let it lapse; at the time I had decided to focus almost exclusively on content creation for a
1055:
A relatively new admin but combined with their ArbCom/SPI clerking experience I feel comfortable supporting both tools. Only hesitation would be increased workload, but these are in areas that generally overlap, so I'm not really concerned.
4555: 4437: 3245:
I have a lot of experience in the behind-the-scenes areas of Knowledge (XXG) that have exposed me to situations where I have needed to request oversight. I'm active on IRC, where I've handled numerous revision deletion requests in the
4442: 2664:
industry, where there are extensive regulatory requirements regarding the confidentiality of information and network security. Due to this, I'm very familiar with the data security requirements and how to handle that sort of data
1904:
Wielding more powerful tools implies the need for greater discretion when using them. The ability to access a user's confidential and personally-identifiable information is indeed a more powerful tool than the ability to block
2106:
were my first case, and I asked for advice, and the two people who came back were you and AGK, I expect I'd have two people advising me not to check, and I'd go along with that. So the answer to your second question,
1423:
investigations—checkuser is just complementary evidence in that sense), and I am familiar with the kind of information that checkuser would return and how it would factor into the outcome of an investigation. I joined
1593:
focus, correlations between users of editing timelines, similarities in usernames, editing style, etc. When there seemed to be enough behavioral evidence, I would open a SPI case for further investigation by a CU.
1698:
NAT is theoretically possible with IPv6, but the extremely large address space eliminates the main technical driver (i.e. address space exhaustion) which gave rise to NATv4. It is still used at IPv6-IPv4 traffic
834:
one of the mandatory users, I'd certainly look closely into using it if appointed, as another option to improve account security. (My password is already a long random string that is not used for any other site.)
2626: 803:
Hi Rschen, thanks for the question. I won't wade too far into topic of sysop inactivity except to say that I probably wouldn't have started back up if I would have had to go through RfA again. Aside from a
1869:
is a problem. We know socking at AfDs to prevent paid articles from being deleted is a problem. It's not a huge leap of logic to suspect that, when a new user's first edits are to AfD, maybe it's a sock.
2071:
I think it's clear that this example was potential disruption, since we're talking about (potentially) influencing the result of an AfD for illegitimate purposes. So, then we're down to whether this was
1670:
NAT is done on a much larger scale at universities, corporations, libraries, and the like. Even countries. Thus, indiscriminate blocking of IPs can deny service to a large number of users as collateral
1170:
I am an oversighter on the English Knowledge (XXG) here, a bureaucrat on the test protect, and a steward on the Wikimedia beta project. I have OTRS permissions and access to the oversight-en and info-en
299: 2957:
of "humor" and don't think this should disqualify him from being a functionary. But the Arbitration business, and doubling down with pride, is less than I would want to see from a functionary. Best,
4351: 4139: 3401: 1548: 336: 168: 1661:, making multiple computers on my WiFi all appear to have the same IP address. So, all you can really say about a request from that IP is that it was from some computer within range of my WiFi. 754:
I work in computer security, and I'm a developer/sysadmin for a small hobbyist website, so I regularly work with IP addresses and ranges, WHOIS and port scan data, user agent headers, and so on.
3768:
Do you hold advanced permissions (checkuser, oversight, bureaucrat, steward) on this or other WMF projects? If so, please list them. Also, do you have OTRS permissions? If so, to which queues?
3472:
Do you hold advanced permissions (checkuser, oversight, bureaucrat, steward) on this or other WMF projects? If so, please list them. Also, do you have OTRS permissions? If so, to which queues?
3275:
Do you hold advanced permissions (checkuser, oversight, bureaucrat, steward) on this or other WMF projects? If so, please list them. Also, do you have OTRS permissions? If so, to which queues?
3109:
Do you hold advanced permissions (checkuser, oversight, bureaucrat, steward) on this or other WMF projects? If so, please list them. Also, do you have OTRS permissions? If so, to which queues?
2857:
Do you hold advanced permissions (checkuser, oversight, bureaucrat, steward) on this or other WMF projects? If so, please list them. Also, do you have OTRS permissions? If so, to which queues?
2670:
Do you hold advanced permissions (checkuser, oversight, bureaucrat, steward) on this or other WMF projects? If so, please list them. Also, do you have OTRS permissions? If so, to which queues?
2419:
Do you hold advanced permissions (checkuser, oversight, bureaucrat, steward) on this or other WMF projects? If so, please list them. Also, do you have OTRS permissions? If so, to which queues?
1607:
Do you hold advanced permissions (checkuser, oversight, bureaucrat, steward) on this or other WMF projects? If so, please list them. Also, do you have OTRS permissions? If so, to which queues?
1441:
Do you hold advanced permissions (checkuser, oversight, bureaucrat, steward) on this or other WMF projects? If so, please list them. Also, do you have OTRS permissions? If so, to which queues?
1167:
Do you hold advanced permissions (checkuser, oversight, bureaucrat, steward) on this or other WMF projects? If so, please list them. Also, do you have OTRS permissions? If so, to which queues?
979:
Do you hold advanced permissions (checkuser, oversight, bureaucrat, steward) on this or other WMF projects? If so, please list them. Also, do you have OTRS permissions? If so, to which queues?
759:
Do you hold advanced permissions (checkuser, oversight, bureaucrat, steward) on this or other WMF projects? If so, please list them. Also, do you have OTRS permissions? If so, to which queues?
1127: 4395: 101: 21: 3720: 3051: 2735:
team. He has consistently acted with integrity as one of the ACC tool administrators, and has positively contributed to the collegial atmosphere that we have on the team and demonstrating
931: 701: 570:
Editors may comment on each candidate with a limit of 500 words, including replies to other editors. Discussion will be sectioned and monitored by the Arbitration Committee and the clerks;
560:
Nomination statements will be published and candidates invited to answer questions publicly. The community is invited to participate. Please note changes from previous consultation phases:
3862: 3218: 2321: 1395: 4457: 4452: 1977: 330: 1309:
Last year I was in favour of Oshwah becoming a CheckUser and that has not changed - it actually has strengthened. He has handled OS well and is an SPI clerk. I trust his judgement. --
4133: 2771: 2042:
I've considered applying), I've read a lot more about CU policy. I've also opened a bunch of SPI cases and gotten to observe how things get handled in real life. So, let's look at
2783: 4422: 4417: 3064:
I am volunteering for Checkuser and Oversight. I returned to Knowledge (XXG) early this year from a long inactivity - I originally edited from 2006 - 2009. I am familiar with
2976: 714:
I am volunteering for Checkuser and Oversight. I returned to Knowledge (XXG) early this year from a long inactivity - I originally edited from 2006 - 2009. I am familiar with
294: 2801: 2789: 1295:
Oshwah is well versed in policy and has perfomed over 62000 admin actions in over 3 years which has spot on and one of the most active admins in the Project.Clearly an asset.
326: 122: 114: 4382: 2777: 1657:
But, life is more complicated than that. For example, with my residential internet connection, I have a (mostly) static IP (v4) address. Inside my house, my router does
822:
relevant to my work, and I've found ways to apply my skills here that I enjoy and find productive. So yes, I do believe that I would be able to put the tools to good use.
2795: 3816:. Please note that the candidate will be provided the opportunity to respond to a paraphrased version of any emailed comments; the sender's name will not be provided. 3539:. Please note that the candidate will be provided the opportunity to respond to a paraphrased version of any emailed comments; the sender's name will not be provided. 3327:. Please note that the candidate will be provided the opportunity to respond to a paraphrased version of any emailed comments; the sender's name will not be provided. 3160:. Please note that the candidate will be provided the opportunity to respond to a paraphrased version of any emailed comments; the sender's name will not be provided. 2909:. Please note that the candidate will be provided the opportunity to respond to a paraphrased version of any emailed comments; the sender's name will not be provided. 2721:. Please note that the candidate will be provided the opportunity to respond to a paraphrased version of any emailed comments; the sender's name will not be provided. 2529:. Please note that the candidate will be provided the opportunity to respond to a paraphrased version of any emailed comments; the sender's name will not be provided. 2183:. Please note that the candidate will be provided the opportunity to respond to a paraphrased version of any emailed comments; the sender's name will not be provided. 1490:. Please note that the candidate will be provided the opportunity to respond to a paraphrased version of any emailed comments; the sender's name will not be provided. 1250:. Please note that the candidate will be provided the opportunity to respond to a paraphrased version of any emailed comments; the sender's name will not be provided. 1027:. Please note that the candidate will be provided the opportunity to respond to a paraphrased version of any emailed comments; the sender's name will not be provided. 873:. Please note that the candidate will be provided the opportunity to respond to a paraphrased version of any emailed comments; the sender's name will not be provided. 268: 3424: 4157: 1865:
Under "Grounds for checking", it gives "double voting" as one of the disruptive behaviors we're trying to defend against. We know socking is a problem. We know
288: 133: 111: 4300: 610: 606: 550:
The committee will notify candidates going forward for community consultation and create the candidate subpages containing the submitted nomination statements.
321: 259: 178: 106: 427:
and related documents. They must have good communication and team-working skills. CheckUser candidates must be familiar with basic networking topics and with
4145: 3624:
I certainly trust his judgement as a Meta Oversighter colleague and would trust him to use his best judgement for the English Knowledge (XXG). — regards,
2979:, I made a more important point of not restoring it and reminded people who ran into controversy on April Fools jokes not to get into it with each other. 2954: 2852:
away any personally identifying information about other clients, sonI am very familiar with what is legally considered personally identifying information.
818:
is any indication, we should be working to retain and recover experienced editors, particularly those who have left under non-controversial circumstances.
264: 4127: 2984: 2765: 2535:
I have no concerns with SQL's judgement. He is a good administrator with sufficient technical knowledge to be of benefit to the project in this role. --
274: 254: 137: 4344: 4090: 3839: 3661: 3644: 3630: 3619: 3605: 3583: 3567: 3553: 3489: 3465: 3448: 3342: 2990: 2966: 2748: 2544: 2498: 2476: 2437: 2263: 2246: 2220: 2194: 2150: 2036: 2022: 1997: 1824: 1755: 1636: 1336: 1318: 1304: 1290: 1268: 1204: 1068: 1050: 844: 798: 279: 192: 173: 395: 3279:
level was still within the activity requirements of OTRS, I decided I wanted to focus my time more on content work and administrative work on-wiki.
1841:"New user at AFD = 100% certainty of socking" is overstating things. I'll certainly agree, however, that "new user at AFD = suspicion of socking". 1445:
level was still within the activity requirements of OTRS, I decided I wanted to focus my time more on content work and administrative work on-wiki.
313: 204: 4245: 1799:
and it was not a community endorsement of this approach, and I said so on your talk page, and you seemed to indicate again that you got the point.
237: 3754:
arbitrators, especially in sockpuppet investigations, and have developed experience in evaluating evidence and using the block and revdel tools.
2673:
I currently hold checkuser here on enwiki, and I have access to the OTRS queues info-en and checkuser-en-wp. I also have bureaucrat on testwiki.
1632:
experience has prepared you for IP addresses in the context of Knowledge (XXG)? Would you expect your blocking activity to massively change? --
965:
arbitrators, especially in sockpuppet investigations, and have developed experience in evaluating evidence and using the block and revdel tools.
4294: 428: 163: 92: 4188: 4122: 2980: 2760: 1689:
lists some particularly sensitive examples of this, along with cautions for use, and instructions for reporting to the WMF any such blocks.
1967:." And, obviously, I'll avail myself of (off-wiki) advice from other functionaries on close calls, especially as I'm getting up to speed. 2006:
Obviously, I felt what I was seeing was suspicious, for the reasons stated, and deserved greater scrutiny. Based on their SPI comments,
4278:
his CheckUser permission in May 2019, is reappointed as a CheckUser following a request to the committee for return of the permission.
4084: 2590: 2356: 459: 4392: 409: 229: 69: 17: 4368: 4041: 3894: 1963:. The deeper answer, however, will always be, "I'm human and I'll make human judgements based on my experience and intuition, plus 1648:
make another edit, both edits will be associated with the same IP address, and that's a pretty good clue they're by the same person.
814:, the learning curve hasn't been too steep, and I'm far from the only administrator to return from a long period of inactivity. If 215: 158: 3822:
Per my previous comment, I believe Kevin to be clueful and adept enough to deal with the tools if they are chosen for the same. --
3428:
trust of the community to both keep suppressed material secret, and to only suppress materials as supported by policy. Thank you.
2915:
I was reminded of April Fools Day on Knowledge (XXG) today which reminded me of something which happened last year. It wasn't his
4352:
Knowledge (XXG) talk:Arbitration Committee/Noticeboard/Archive 45#2019 CheckUser and Oversight appointments: Candidates appointed
4239: 3992: 3943: 3759:
Please outline, without breaching your personal privacy, what off-Wiki experience or technical expertise you have for this role.
3657: 3579: 3455:
Please outline, without breaching your personal privacy, what off-Wiki experience or technical expertise you have for this role.
3263:
Please outline, without breaching your personal privacy, what off-Wiki experience or technical expertise you have for this role.
3100:
Please outline, without breaching your personal privacy, what off-Wiki experience or technical expertise you have for this role.
2848:
Please outline, without breaching your personal privacy, what off-Wiki experience or technical expertise you have for this role.
2657:
Please outline, without breaching your personal privacy, what off-Wiki experience or technical expertise you have for this role.
2602: 2472: 2411:
Please outline, without breaching your personal privacy, what off-Wiki experience or technical expertise you have for this role.
2216: 1598:
Please outline, without breaching your personal privacy, what off-Wiki experience or technical expertise you have for this role.
1432:
Please outline, without breaching your personal privacy, what off-Wiki experience or technical expertise you have for this role.
1300: 1264: 1200: 1158:
Please outline, without breaching your personal privacy, what off-Wiki experience or technical expertise you have for this role.
1064: 970:
Please outline, without breaching your personal privacy, what off-Wiki experience or technical expertise you have for this role.
794: 751:
Please outline, without breaching your personal privacy, what off-Wiki experience or technical expertise you have for this role.
489:
Active users of non-standard venues, such as IRC, the account creation interface, OTRS, and/or the Unblock Ticket Request System.
150: 3095:
that channel to request oversight, which can otherwise have a delay especially later in the evening when I am primarily active.
2620: 2608: 1427:
back in January 2019, where I have handled approximately 400 requests, about three dozen of which I had to refer to checkusers.
480:
Familiar with identification of factors that may change a result or block, such as ISP, location, activity, or type of network.
51: 3863:
Knowledge (XXG):Arbitration Committee/Noticeboard/Archive 12 § 2019 CheckUser and Oversight appointments: Candidates appointed
200: 98: 4318: 4182: 3365: 2596: 1512: 4375: 210: 128: 3333:
I have no problem with Mz7's judgement and believe that he would be of even greater benefit to the project in this role. --
2569:
Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.
644:
Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.
3849:
Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.
3479:
I am an oversighter on the meta-wiki; a bureaucrat here, on testwiki, and on test2wiki. I am also an administrator on the
2614: 2554:
Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.
2069:
to prevent or reduce potential or actual disruption, or to investigate credible, legitimate concerns of bad faith editing.
3073:
fairly often, and access to the Checkuser tools would allow me to properly resolve those cases and help with backlogs at
723:
fairly often, and access to the Checkuser tools would allow me to properly resolve those cases and help with backlogs at
613:
prior to receiving permissions. Oversighters and CheckUsers who intend to work the OTRS paid editing queue must sign the
4306: 3476: 3377: 2739:
to almost all users we deal with in the ACC queues. I strongly believe that he would be an asset to the oversight team.
1524: 1091: 470:
We welcome all applicants with suitable interest to apply, but this year we have particular need of applicants who are:
388: 4360: 2924: 3575: 3395: 3383: 1658: 1542: 1530: 1296: 1273:
Oshwah is an asset to SPI, has dealt with his bits well, and is also one of the most active administrators we have. --
4221:
The Committee thanks the community and all candidates for helping to bring this process to a successful conclusion.
4288: 4108: 4035: 3888: 3834: 3684: 3600: 3371: 3015: 1518: 1285: 1103: 1045: 895: 665: 249: 4330: 3986: 3937: 3574:
Fine candidate excellent knowledge of policy and technical expertise and has perfomed around 24500 admin actions.
3389: 3182: 2285: 1536: 1359: 1121: 1109: 2027:
I guess what I was getting at is if you think you would have run a CU or if you agree with the decision not to.
1793: 1767: 353: 4263: 4096: 3696: 3635:
I trust Xaosflux's judgement and believe that he would be even more of an asset to the project in this role. --
3027: 2402:
I mention in my nomination some of the various related tools I've written. I've contributed extensively at the
1959:
digging deeper? The simple answer is, "I'll make my determination is accordance with the policies outlined in
1330: 1097: 907: 677: 88: 2349:, a tool used by many functionaries daily to help determine if a given IP is a proxy / webhost / compromised. 3714: 3702: 3194: 3045: 3033: 2843:. I have submitted dozens of oversight requests related to all of these, and all of them have been actioned. 2297: 1371: 1115: 925: 913: 695: 683: 381: 1858: 4251: 4206: 4078: 3690: 3250:
channel. I have already signed the confidentiality agreement for Wikimedia projects as part of my work on
3212: 3200: 3021: 2744: 2584: 2414:
As I mentioned last year, I've had a lot of relevant jobs, NOC / internal support, and cable tech support.
2315: 2303: 1389: 1377: 901: 671: 3420: 417: 413: 4283: 3708: 3615: 3188: 3039: 2291: 1774:
to be explained to an admin with your level of experience, but since you seemed to get it that was that.
1680:
Commercial customers are more likely to publicly expose a range of IP addresses, commonly written using
1365: 1323:
Yes, I support Oshwah's request for CheckUser - I think he's well grasped at SPI and would be an asset.
919: 689: 595:. Editors are encouraged to include a detailed rationale, supported by relevant links where appropriate. 2461: 1189: 628:
To comment on candidates, please use section edit buttons to edit the appropriate candidate subpage(s).
31: 2143:
and think I understand it, but I know that there's nothing that can replace real-life experience. --
4275: 4233: 4194: 3654: 3206: 2840: 2469: 2362: 2309: 2259: 2213: 2032: 1993: 1820: 1383: 1261: 1197: 1061: 1033:
Anyone around SPI will know the good work Kevin does. Thoroughly vetted and clueful administrator. --
791: 2135:
I'll leave you with one last thought. In my career as a software engineer, I've learned to embrace
2962: 2136: 1325: 808: 805: 4340: 4176: 4059: 3912: 3636: 3563: 3359: 3334: 2536: 2426: 2235:
wide background in related technical issues, and we could certainly use his support on the team.
2147: 2019: 1976:
Thanks for your detailed reply. I've just realized I missed a whole other aspect of this, now at
1752: 1506: 1310: 2928: 2140: 2043: 1964: 1960: 423:
Prospective applicants must be familiar with (i) policies relevant to CU and/or OS and (ii) the
2953:
which outside of someone else having to tag as humor is well with-in norms). Now I have my own
784: 4073: 4010: 3961: 3068:
and investigate and resolve cases there regularly, and I have already signed the WMF NDA as a
2740: 2728: 2579: 718:
and investigate and resolve cases there regularly, and I have already signed the WMF NDA as a
424: 3870: 3255: 2383: 463: 436: 4047: 3900: 3611: 2007: 1085: 355: 3545:
Great attention to detail, command of policy, and technical expertise; a fine candidate. –
3251: 3074: 3069: 3065: 2936: 2836: 2736: 2732: 2403: 2387: 2379: 2352: 2201: 1866: 1576: 1424: 815: 742: 724: 719: 715: 432: 4228: 3998: 3949: 3651: 3267: 2487: 2466: 2255: 2210: 2028: 1989: 1816: 1258: 1194: 1058: 788: 3771:
I do not have other advanced permissions, but I do have OTRS access to the info-en queue.
1217: 982:
I do not have other advanced permissions, but I do have OTRS access to the info-en queue.
811: 609:, and publish the resulting appointments. Successful candidates are required to sign the 2365:, a tool used to resolve a given subnet (often helpful to identify webhosts or proxies). 358: 4029: 3882: 3828: 3678: 3594: 3551: 3009: 2958: 1279: 1039: 889: 840: 659: 540:
The committee will review applications and ask the functionary team for their feedback.
2931:
guidelines. No it was the fact that the candidate thought it good judgement to make a
1569:
Extensive unix DevOps experience, including managing web servers at Songza and Google.
583:
Comments may be posted on the candidates' subpages or submitted privately by email to
4171: 3980: 3931: 3559: 3484: 3460: 3443: 3415: 3354: 3176: 2496: 2435: 2279: 2242: 2144: 2016: 1749: 1686: 1501: 1353: 1256:
Inclined to support, he seems to have handled OS well and also became a SPI clerk. --
2975:
I wouldn't consider what I did doubling down. On both the thread on my talkpage and
452:
at least 18 years of age and have legal majority in their jurisdiction of residence;
3804:
Comments may also be submitted to the Arbitration Committee privately by emailing
3527:
Comments may also be submitted to the Arbitration Committee privately by emailing
3315:
Comments may also be submitted to the Arbitration Committee privately by emailing
3148:
Comments may also be submitted to the Arbitration Committee privately by emailing
2897:
Comments may also be submitted to the Arbitration Committee privately by emailing
2709:
Comments may also be submitted to the Arbitration Committee privately by emailing
2517:
Comments may also be submitted to the Arbitration Committee privately by emailing
2171:
Comments may also be submitted to the Arbitration Committee privately by emailing
1766:
I'd like to discuss your approach to blocking suspected socks. Perhaps you recall
1478:
Comments may also be submitted to the Arbitration Committee privately by emailing
1238:
Comments may also be submitted to the Arbitration Committee privately by emailing
1015:
Comments may also be submitted to the Arbitration Committee privately by emailing
861:
Comments may also be submitted to the Arbitration Committee privately by emailing
605:
The committee will review community comments and other relevant factors, finalize
357: 77: 4329:
for his long history of contributions to the functionary team. Timotheus Canens
2191: 1633: 1080: 3625: 4224:
The Committee also welcomes the following user back to the functionary team:
3869:
The Arbitration Committee is pleased to welcome the following editors to the
2346: 483:
Experienced in analyzing behavioral evidence for sockpuppetry investigations.
4024: 3877: 3824: 3673: 3590: 3546: 3004: 1275: 1035: 884: 836: 654: 474:
Familiar with common ISPs and editing patterns from Asia and Eastern Europe.
4469: 497:
unable to prevent this and such risks will continue if you are successful.
492:
Interested in handling sockpuppetry investigations related to paid editing.
455:
willing to disclose all other accounts they have operated to the committee;
3975: 3926: 3480: 3171: 2949:
when asked not to do it. This is comparison to other jokes he made (e..g
2491: 2430: 2335: 2274: 2237: 2011: 1348: 1221:
six months to have one created for them by creating a new ticket request.
3750:
Please describe any relevant on-Wiki experience you have for this role.
3438:
Please describe any relevant on-Wiki experience you have for this role.
3242:
Please describe any relevant on-Wiki experience you have for this role.
3091:
Please describe any relevant on-Wiki experience you have for this role.
2831:
Please describe any relevant on-Wiki experience you have for this role.
2826:
Standard questions for all candidates (The Blade of the Northern Lights)
2648:
Please describe any relevant on-Wiki experience you have for this role.
2399:
Please describe any relevant on-Wiki experience you have for this role.
2369: 1589:
Please describe any relevant on-Wiki experience you have for this role.
1419:
Please describe any relevant on-Wiki experience you have for this role.
1149:
Please describe any relevant on-Wiki experience you have for this role.
961:
Please describe any relevant on-Wiki experience you have for this role.
738:
Please describe any relevant on-Wiki experience you have for this role.
2942:
and then basically responding to critics with "There's always someone."
2661: 2375: 1572:
Engineering team lead for Smarts/EMC's IPv6 network management product.
1863:
legitimate, credible concerns of bad-faith editing or sock-puppetry.
2425:
I suppose I don't know how much it matters - if at all, but I am a
2927:
community commentary and, outside of marking it as a joke with-in
2368:
I was the original developer behind the account creation interface
2205: 446:
familiar with Knowledge (XXG) processes, policies, and guidelines;
2464:
was unsuccessful. What is different about it this time around? --
1192:
was unsuccessful. What is different about it this time around? --
431:
tools and techniques, and preferably are willing to volunteer at
1681: 827: 58:
The current time and date is 10:33, Friday, September 20, 2024 (
4364: 2868:
Questions for this candidate (The Blade of the Northern Lights)
1982:
Behavior and depth of understanding of wiki processes makes it
486:
Interested in mentoring editors who wish to become SPI clerks.
359: 59: 50:
The community consultation phase is closed. The Committee has
3423:. Regarding oversight, some may recall I recently started a 1610:
Other than being an admin on en, none. No OTRS permissions.
4333:
his CheckUser and Oversight permissions in September 2019.
3270:, which required me to fulfill confidentiality obligations. 1978:
Knowledge (XXG):Sockpuppet investigations/JimKrause/Archive
576:, as this is a consultation and not a community consensus. 3784:
Editors may ask a maximum of two questions per candidate.
3504:
Editors may ask a maximum of two questions per candidate.
3292:
Editors may ask a maximum of two questions per candidate.
3125:
Editors may ask a maximum of two questions per candidate.
2874:
Editors may ask a maximum of two questions per candidate.
2686:
Editors may ask a maximum of two questions per candidate.
2452:
Editors may ask a maximum of two questions per candidate.
1623:
Editors may ask a maximum of two questions per candidate.
1458:
Editors may ask a maximum of two questions per candidate.
1184:
Editors may ask a maximum of two questions per candidate.
995:
Editors may ask a maximum of two questions per candidate.
775:
Editors may ask a maximum of two questions per candidate.
614: 567:
Editors may ask a maximum of two questions per candidate;
3266:
I have worked in the past at organizations, including a
1941:
a user's confidentiality has to meet an even higher bar.
1785:
Or so I thought, but then earlier this year you stated "
4324: 4312: 4269: 4257: 4212: 4200: 4163: 4151: 4114: 4102: 4065: 4053: 4016: 4004: 3967: 3955: 3918: 3906: 2950: 2946: 2943: 2932: 2920: 2916: 1800: 1787: 783:
You went almost an entire decade with minimal activity
369: 284: 242: 118: 39: 3610:
Already demonstrated both reliability and judgement
2643:
Standard questions for all candidates (Stwalkerster)
1980:, the entry for 6 October 2018, in which you state " 826:
as they see fit. I'm also aware of the experimental
4548: 4477: 4402: 3649:
Good policy knowledge and already an OS on Meta. --
611:
Confidentiality agreement for nonpublic information
2074:credible, legitimate concerns of bad faith editing 2390:. I would primarily use the tool in those areas. 3433:Standard questions for all candidates (Xaosflux) 2660:I currently work as a software developer in the 1584:Standard questions for all candidates (RoySmith) 1579:, opening cases for investigation by CU holders. 449:an administrator on the English Knowledge (XXG); 443:available to regularly assist with the workload; 412:is seeking to appoint additional editors to the 3823: 3589: 2359:, tools used to list hosts on hosting networks. 2338:. I have served as an Administrator since 2007. 1274: 1034: 1144:Standard questions for all candidates (Oshwah) 4376: 2652:more than a few of which need suppressed too. 2406:. I'm active in the proxy check queue at ACC. 389: 8: 4070:is appointed as a CheckUser and Oversighter. 3972:is appointed as a CheckUser and Oversighter. 3923:is appointed as a CheckUser and Oversighter. 3745:Standard questions for all candidates (L235) 3588:Technically adept and clueful bureaucrat. -- 3086:Standard questions for all candidates (ST47) 1561:I am applying only for CU. Qualifications: 956:Standard questions for all candidates (L235) 733:Standard questions for all candidates (ST47) 3237:Standard questions for all candidates (Mz7) 2891:Comments (The Blade of the Northern Lights) 2680:Questions for this candidate (Stwalkerster) 2394:Standard questions for all candidates (SQL) 1414:Standard questions for all candidates (Mz7) 507:Dates are provisional and subject to change 460:WMF Access to Non-Public Information Policy 4383: 4369: 4361: 546:Notification of candidates: 2 Oct to 3 Oct 396: 382: 65: 3483:system. I am not a current OTRS agent. — 3419:appointed, I will diligently support the 2044:WP:CHECK#CheckUser and the privacy policy 2923:of it) to ANI which seems in-keeping of 3498:Questions for this candidate (Xaosflux) 2108:(do) you agree with the decision not to 2078:(do) you think you would have run a CU? 1792:". My read of the reference discussion 1617:Questions for this candidate (RoySmith) 1436:fulfilling confidentiality obligations. 556:Community consultation: 4 Oct to 10 Oct 68: 2073: 2068: 466:Users Confidentiality Agreement (L45). 1986:to believe claims of being new users. 1178:Questions for this candidate (Oshwah) 518:Candidates self-nominate by email to 18:Knowledge (XXG):Arbitration Committee 7: 4396:CheckUser and Oversight appointments 2565:The following discussion is closed. 2231:Additionally, it seem that he has an 640:The following discussion is closed. 615:OTRS Users Confidentiality Agreement 169:Clarification and Amendment requests 3778:Questions for this candidate (L235) 3119:Questions for this candidate (ST47) 2382:(mostly in the proxy check queue), 989:Questions for this candidate (L235) 769:Questions for this candidate (ST47) 3286:Questions for this candidate (Mz7) 2446:Questions for this candidate (SQL) 1452:Questions for this candidate (Mz7) 28: 2940:while there was an active request 2384:the unblock ticket request system 4468: 4123:The Blade of the Northern Lights 3861:This section is an excerpt from 3845:The discussion above is closed. 3808: 3531: 3319: 3152: 2981:The Blade of the Northern Lights 2901: 2761:The Blade of the Northern Lights 2756:The Blade of the Northern Lights 2713: 2550:The discussion above is closed. 2521: 2175: 1482: 1242: 1019: 865: 587: 574:Please refrain from bolded votes 522: 514:Applications: 23 Sept to 29 Sept 76: 4336:For the Arbitration Committee, 4217:is appointed as an Oversighter. 4168:is appointed as an Oversighter. 4119:is appointed as an Oversighter. 3481:Programs & Events Dashboard 2388:the Wikiproject on open proxies 1795:was that there was support for 536:Review period: 30 Sept to 2 Oct 3763:NDAs and/or background checks. 2380:the account creation interface 974:NDAs and/or background checks. 830:support and while local CU is 1: 4345:15:47, 14 October 2019 (UTC) 4021:is appointed as a CheckUser. 2991:01:51, 10 October 2019 (UTC) 2545:03:01, 10 October 2019 (UTC) 1337:06:24, 10 October 2019 (UTC) 300:Conflict of interest reports 3840:17:04, 6 October 2019 (UTC) 3662:05:07, 8 October 2019 (UTC) 3645:15:47, 7 October 2019 (UTC) 3631:05:40, 7 October 2019 (UTC) 3620:18:23, 6 October 2019 (UTC) 3606:17:00, 6 October 2019 (UTC) 3584:12:58, 6 October 2019 (UTC) 3568:06:08, 6 October 2019 (UTC) 3554:03:09, 6 October 2019 (UTC) 3490:01:07, 4 October 2019 (UTC) 3466:01:07, 4 October 2019 (UTC) 3449:01:07, 4 October 2019 (UTC) 3343:15:49, 7 October 2019 (UTC) 2967:23:45, 9 October 2019 (UTC) 2749:01:19, 9 October 2019 (UTC) 2499:04:05, 5 October 2019 (UTC) 2477:01:31, 4 October 2019 (UTC) 2438:03:06, 6 October 2019 (UTC) 2404:Wikiproject on open proxies 2264:23:59, 8 October 2019 (UTC) 2247:03:12, 8 October 2019 (UTC) 2221:06:11, 7 October 2019 (UTC) 2195:18:48, 6 October 2019 (UTC) 2151:03:46, 7 October 2019 (UTC) 2037:02:46, 7 October 2019 (UTC) 2023:22:18, 6 October 2019 (UTC) 1998:20:35, 6 October 2019 (UTC) 1825:20:48, 4 October 2019 (UTC) 1756:14:26, 4 October 2019 (UTC) 1637:06:32, 4 October 2019 (UTC) 1319:05:17, 9 October 2019 (UTC) 1305:23:12, 8 October 2019 (UTC) 1291:13:26, 8 October 2019 (UTC) 1269:05:05, 8 October 2019 (UTC) 1205:01:32, 4 October 2019 (UTC) 1069:05:08, 8 October 2019 (UTC) 1051:17:02, 6 October 2019 (UTC) 845:06:15, 5 October 2019 (UTC) 799:01:14, 5 October 2019 (UTC) 439:. Applicants must also be: 129:Search archived proceedings 70:Knowledge (XXG) Arbitration 4578: 4282:The Committee also thanks 3860: 3740:currently have access to). 2342:I'm the developer behind: 951:currently have access to). 174:Arbitrator motion requests 29: 4466: 3809: 3532: 3320: 3153: 2902: 2727:I've worked closely with 2714: 2522: 2176: 2010:shared my suspicion, but 1483: 1243: 1020: 866: 588: 523: 4350:Archived discussion at: 3847:Please do not modify it. 3254:and my previous work at 2937:Arbitration Case Request 2567:Please do not modify it. 2552:Please do not modify it. 642:Please do not modify it. 458:willing to agree to the 2703:Comments (Stwalkerster) 1768:this incident last year 601:Appointments: by 14 Oct 22:CheckUser and Oversight 3576:Pharaoh of the Wizards 1297:Pharaoh of the Wizards 607:an internal resolution 4453:call for applications 4393:Arbitration Committee 3475:Yes. As listed in my 2429:on the beta cluster. 425:global privacy policy 410:Arbitration Committee 370:Track related changes 230:Arbitration Committee 4549:Rolling appointments 4331:voluntarily resigned 3728:Nomination statement 3409:Nomination statement 3248:#wikipedia-en-revdel 3226:Nomination statement 3059:Nomination statement 2841:Special:Log/newusers 2815:Nomination statement 2634:Nomination statement 2376:Requests for unblock 2329:Nomination statement 1575:Have been active on 1556:Nomination statement 1403:Nomination statement 1135:Nomination statement 939:Nomination statement 709:Nomination statement 179:Enforcement requests 107:Guide to arbitration 4478:Annual appointments 4458:appointments motion 3814:lists.wikimedia.org 3537:lists.wikimedia.org 3521:Comments (Xaosflux) 3477:CentralAuth listing 3325:lists.wikimedia.org 3158:lists.wikimedia.org 2907:lists.wikimedia.org 2719:lists.wikimedia.org 2254:pointed questions. 2165:Comments (RoySmith) 2137:egoless programming 1797:that specific block 741:I regularly patrol 501:Appointment process 477:Familiar with IPv6. 2731:after joining the 2568: 2460:Your candidacy in 2374:I am a regular at 1188:Your candidacy in 643: 201:Contentious topics 99:Arbitration policy 4564: 4563: 2566: 1566:Admin since 2005. 1232:Comments (Oshwah) 641: 406: 405: 373: 341: 211:General sanctions 159:All open requests 89:About arbitration 54:the appointments. 4569: 4472: 4414:October 2008 OS 4391:Knowledge (XXG) 4385: 4378: 4371: 4362: 4343: 4328: 4301:deleted contribs 4284:Timotheus Canens 4273: 4246:deleted contribs 4216: 4189:deleted contribs 4167: 4140:deleted contribs 4118: 4091:deleted contribs 4069: 4042:deleted contribs 4020: 3993:deleted contribs 3971: 3944:deleted contribs 3922: 3895:deleted contribs 3871:functionary team 3838: 3833: 3815: 3813: 3812: 3811: 3724: 3642: 3639: 3628: 3604: 3599: 3538: 3536: 3535: 3534: 3487: 3463: 3446: 3421:oversight policy 3405: 3340: 3337: 3326: 3324: 3323: 3322: 3249: 3222: 3159: 3157: 3156: 3155: 3055: 2987: 2908: 2906: 2905: 2904: 2811: 2720: 2718: 2717: 2716: 2630: 2542: 2539: 2528: 2526: 2525: 2524: 2494: 2433: 2325: 2182: 2180: 2179: 2178: 2008:User:Atlantic306 1552: 1489: 1487: 1486: 1485: 1399: 1335: 1333: 1328: 1316: 1313: 1289: 1284: 1249: 1247: 1246: 1245: 1131: 1049: 1044: 1026: 1024: 1023: 1022: 935: 872: 870: 869: 868: 705: 594: 592: 591: 590: 529: 527: 526: 525: 398: 391: 384: 372: 367: 360: 339: 295:Clerk procedures 287: 245: 216:Editor sanctions 193:Active sanctions 151:Open proceedings 121: 80: 66: 42: 4577: 4576: 4572: 4571: 4570: 4568: 4567: 4566: 4565: 4560: 4544: 4473: 4464: 4403:Early processes 4398: 4389: 4359: 4358: 4357: 4356: 4339: 4286: 4231: 4174: 4125: 4076: 4027: 3978: 3929: 3880: 3866: 3856: 3851: 3850: 3831: 3807: 3805: 3800: 3798:Comments (L235) 3780: 3747: 3676: 3671: 3640: 3637: 3626: 3597: 3530: 3528: 3523: 3500: 3485: 3461: 3444: 3435: 3357: 3352: 3338: 3335: 3318: 3316: 3311: 3288: 3268:stealth startup 3247: 3239: 3174: 3169: 3151: 3149: 3144: 3142:Comments (ST47) 3121: 3088: 3007: 3002: 2985: 2900: 2898: 2893: 2870: 2828: 2763: 2758: 2712: 2710: 2705: 2682: 2645: 2582: 2577: 2571: 2561: 2556: 2555: 2540: 2537: 2520: 2518: 2513: 2492: 2448: 2431: 2396: 2353:ISP Rangefinder 2277: 2272: 2174: 2172: 2167: 1923:previous state. 1619: 1586: 1504: 1499: 1481: 1479: 1474: 1454: 1416: 1351: 1346: 1331: 1326: 1324: 1314: 1311: 1282: 1241: 1239: 1234: 1180: 1146: 1083: 1078: 1042: 1018: 1016: 1011: 1009:Comments (L235) 991: 958: 887: 882: 864: 862: 857: 855:Comments (ST47) 771: 735: 657: 652: 646: 636: 624: 586: 584: 521: 519: 503: 402: 368: 362: 361: 356: 346: 345: 344: 333: 316: 306: 305: 304: 291: 283: 271: 246: 241: 232: 222: 221: 220: 195: 185: 184: 183: 153: 143: 140: 125: 117: 95: 64: 63: 55: 46: 45: 38: 34: 26: 25: 24: 12: 11: 5: 4575: 4573: 4562: 4561: 4559: 4558: 4552: 4550: 4546: 4545: 4543: 4542: 4537: 4532: 4527: 4522: 4517: 4512: 4507: 4502: 4497: 4492: 4487: 4481: 4479: 4475: 4474: 4467: 4465: 4463: 4462: 4461: 4460: 4455: 4447: 4446: 4445: 4440: 4435: 4427: 4426: 4425: 4420: 4412: 4410:August 2008 CU 4406: 4404: 4400: 4399: 4390: 4388: 4387: 4380: 4373: 4365: 4355: 4354: 4280: 4279: 4219: 4218: 4169: 4120: 4071: 4022: 3973: 3924: 3867: 3859: 3858: 3857: 3855: 3852: 3844: 3843: 3842: 3819: 3818: 3799: 3796: 3795: 3794: 3793: 3792: 3787: 3786: 3779: 3776: 3775: 3774: 3773: 3772: 3766: 3765: 3764: 3757: 3756: 3755: 3746: 3743: 3742: 3741: 3736: 3735: 3730: 3729: 3670: 3667: 3666: 3665: 3664: 3647: 3633: 3622: 3608: 3586: 3572: 3571: 3570: 3542: 3541: 3522: 3519: 3517: 3515: 3514: 3513: 3512: 3507: 3506: 3499: 3496: 3495: 3494: 3493: 3492: 3470: 3469: 3468: 3453: 3452: 3451: 3434: 3431: 3430: 3429: 3411: 3410: 3351: 3348: 3347: 3346: 3345: 3330: 3329: 3310: 3309:Comments (Mz7) 3307: 3305: 3303: 3302: 3301: 3300: 3295: 3294: 3287: 3284: 3283: 3282: 3281: 3280: 3273: 3272: 3271: 3261: 3260: 3259: 3238: 3235: 3234: 3233: 3228: 3227: 3168: 3165: 3164: 3163: 3162: 3143: 3140: 3138: 3136: 3135: 3134: 3133: 3128: 3127: 3120: 3117: 3116: 3115: 3114: 3113: 3107: 3106: 3105: 3098: 3097: 3096: 3087: 3084: 3082: 3080: 3079: 3061: 3060: 3001: 2998: 2997: 2996: 2995: 2994: 2993: 2970: 2969: 2912: 2911: 2892: 2889: 2887: 2885: 2884: 2883: 2882: 2877: 2876: 2869: 2866: 2865: 2864: 2863: 2862: 2855: 2854: 2853: 2846: 2845: 2844: 2827: 2824: 2823: 2822: 2817: 2816: 2757: 2754: 2753: 2752: 2751: 2724: 2723: 2704: 2701: 2699: 2697: 2696: 2695: 2694: 2689: 2688: 2681: 2678: 2677: 2676: 2675: 2674: 2668: 2667: 2666: 2655: 2654: 2653: 2644: 2641: 2640: 2639: 2635: 2576: 2573: 2572: 2563: 2562: 2560: 2557: 2549: 2548: 2547: 2532: 2531: 2512: 2511:Comments (SQL) 2509: 2508: 2507: 2506: 2505: 2504: 2503: 2502: 2501: 2480: 2479: 2455: 2454: 2447: 2444: 2443: 2442: 2441: 2440: 2417: 2416: 2415: 2409: 2408: 2407: 2395: 2392: 2372: 2371: 2366: 2360: 2350: 2340: 2339: 2331: 2330: 2271: 2268: 2267: 2266: 2250: 2249: 2228: 2227: 2223: 2197: 2186: 2185: 2166: 2163: 2162: 2161: 2160: 2159: 2158: 2157: 2156: 2155: 2154: 2153: 2124: 2123: 2122: 2121: 2120: 2119: 2118: 2117: 2116: 2115: 2094: 2093: 2092: 2091: 2090: 2089: 2088: 2087: 2086: 2085: 2067:Point 1 says, 2056: 2055: 2054: 2053: 2052: 2051: 2050: 2049: 2048: 2047: 2001: 2000: 1973: 1972: 1971: 1970: 1969: 1968: 1949: 1948: 1947: 1946: 1945: 1944: 1943: 1942: 1931: 1930: 1929: 1928: 1927: 1926: 1925: 1924: 1913: 1912: 1911: 1910: 1909: 1908: 1907: 1906: 1895: 1894: 1893: 1892: 1891: 1890: 1889: 1888: 1877: 1876: 1875: 1874: 1873: 1872: 1871: 1870: 1849: 1848: 1847: 1846: 1845: 1844: 1843: 1842: 1832: 1831: 1830: 1829: 1828: 1827: 1807: 1806: 1805: 1804: 1803: 1802: 1778: 1777: 1776: 1775: 1761: 1760: 1759: 1758: 1743: 1742: 1741: 1740: 1733: 1732: 1731: 1730: 1723: 1722: 1721: 1720: 1713: 1712: 1711: 1710: 1703: 1702: 1701: 1700: 1693: 1692: 1691: 1690: 1675: 1674: 1673: 1672: 1665: 1664: 1663: 1662: 1652: 1651: 1650: 1649: 1642: 1641: 1640: 1639: 1626: 1625: 1618: 1615: 1614: 1613: 1612: 1611: 1605: 1604: 1603: 1596: 1595: 1594: 1585: 1582: 1581: 1580: 1573: 1570: 1567: 1563: 1562: 1558: 1557: 1498: 1495: 1494: 1493: 1492: 1473: 1472:Comments (Mz7) 1470: 1469: 1468: 1467: 1466: 1461: 1460: 1453: 1450: 1449: 1448: 1447: 1446: 1439: 1438: 1437: 1430: 1429: 1428: 1415: 1412: 1411: 1410: 1405: 1404: 1345: 1342: 1341: 1340: 1339: 1321: 1307: 1293: 1271: 1253: 1252: 1233: 1230: 1229: 1228: 1227: 1226: 1225: 1224: 1223: 1222: 1218:oversight page 1208: 1207: 1179: 1176: 1175: 1174: 1173: 1172: 1165: 1164: 1163: 1156: 1155: 1154: 1145: 1142: 1141: 1140: 1136: 1077: 1074: 1073: 1072: 1071: 1053: 1030: 1029: 1010: 1007: 1006: 1005: 1004: 1003: 998: 997: 990: 987: 986: 985: 984: 983: 977: 976: 975: 968: 967: 966: 957: 954: 953: 952: 947: 946: 941: 940: 881: 878: 877: 876: 875: 856: 853: 852: 851: 850: 849: 848: 847: 823: 819: 778: 777: 770: 767: 766: 765: 764: 763: 757: 756: 755: 749: 748: 747: 734: 731: 730: 729: 711: 710: 651: 648: 647: 638: 637: 635: 632: 623: 620: 619: 618: 603: 597: 596: 580: 579: 578: 577: 571: 568: 562: 561: 558: 552: 551: 548: 542: 541: 538: 532: 531: 516: 510: 509: 502: 499: 494: 493: 490: 487: 484: 481: 478: 475: 468: 467: 462:(L37) and the 456: 453: 450: 447: 444: 404: 403: 401: 400: 393: 386: 378: 375: 374: 364: 363: 354: 352: 351: 348: 347: 343: 342: 334: 329: 324: 318: 317: 312: 311: 308: 307: 303: 302: 297: 292: 282: 277: 272: 267: 262: 257: 252: 247: 240: 234: 233: 228: 227: 224: 223: 219: 218: 213: 208: 197: 196: 191: 190: 187: 186: 182: 181: 176: 171: 166: 161: 155: 154: 149: 148: 145: 144: 142: 141: 136: 131: 126: 116: 109: 104: 96: 91: 85: 82: 81: 73: 72: 57: 49: 47: 44: 43: 35: 30: 27: 15: 14: 13: 10: 9: 6: 4: 3: 2: 4574: 4557: 4554: 4553: 4551: 4547: 4541: 4538: 4536: 4533: 4531: 4528: 4526: 4523: 4521: 4518: 4516: 4513: 4511: 4508: 4506: 4503: 4501: 4498: 4496: 4493: 4491: 4488: 4486: 4483: 4482: 4480: 4476: 4471: 4459: 4456: 4454: 4451: 4450: 4448: 4444: 4441: 4439: 4436: 4434: 4433:February 2009 4431: 4430: 4428: 4424: 4421: 4419: 4416: 4415: 4413: 4411: 4408: 4407: 4405: 4401: 4397: 4394: 4386: 4381: 4379: 4374: 4372: 4367: 4366: 4363: 4353: 4349: 4348: 4347: 4346: 4342: 4337: 4334: 4332: 4326: 4323: 4320: 4317: 4314: 4311: 4308: 4305: 4302: 4299: 4296: 4293: 4290: 4285: 4277: 4271: 4268: 4265: 4262: 4259: 4256: 4253: 4250: 4247: 4244: 4241: 4238: 4235: 4230: 4227: 4226: 4225: 4222: 4214: 4211: 4208: 4205: 4202: 4199: 4196: 4193: 4190: 4187: 4184: 4181: 4178: 4173: 4170: 4165: 4162: 4159: 4156: 4153: 4150: 4147: 4144: 4141: 4138: 4135: 4132: 4129: 4124: 4121: 4116: 4113: 4110: 4107: 4104: 4101: 4098: 4095: 4092: 4089: 4086: 4083: 4080: 4075: 4072: 4067: 4064: 4061: 4058: 4055: 4052: 4049: 4046: 4043: 4040: 4037: 4034: 4031: 4026: 4023: 4018: 4015: 4012: 4009: 4006: 4003: 4000: 3997: 3994: 3991: 3988: 3985: 3982: 3977: 3974: 3969: 3966: 3963: 3960: 3957: 3954: 3951: 3948: 3945: 3942: 3939: 3936: 3933: 3928: 3925: 3920: 3917: 3914: 3911: 3908: 3905: 3902: 3899: 3896: 3893: 3890: 3887: 3884: 3879: 3876: 3875: 3874: 3872: 3864: 3853: 3848: 3841: 3836: 3830: 3826: 3821: 3820: 3817: 3802: 3801: 3797: 3791: 3790: 3789: 3788: 3785: 3782: 3781: 3777: 3770: 3769: 3767: 3761: 3760: 3758: 3752: 3751: 3749: 3748: 3744: 3738: 3737: 3732: 3731: 3727: 3726: 3725: 3722: 3719: 3716: 3713: 3710: 3707: 3704: 3701: 3698: 3695: 3692: 3689: 3686: 3683: 3680: 3675: 3668: 3663: 3660: 3659: 3656: 3653: 3648: 3646: 3643: 3634: 3632: 3629: 3623: 3621: 3617: 3613: 3609: 3607: 3602: 3596: 3592: 3587: 3585: 3581: 3577: 3573: 3569: 3565: 3561: 3557: 3556: 3555: 3552: 3550: 3549: 3544: 3543: 3540: 3525: 3524: 3520: 3518: 3511: 3510: 3509: 3508: 3505: 3502: 3501: 3497: 3491: 3488: 3482: 3478: 3474: 3473: 3471: 3467: 3464: 3457: 3456: 3454: 3450: 3447: 3440: 3439: 3437: 3436: 3432: 3426: 3422: 3417: 3413: 3412: 3408: 3407: 3406: 3403: 3400: 3397: 3394: 3391: 3388: 3385: 3382: 3379: 3376: 3373: 3370: 3367: 3364: 3361: 3356: 3349: 3344: 3341: 3332: 3331: 3328: 3313: 3312: 3308: 3306: 3299: 3298: 3297: 3296: 3293: 3290: 3289: 3285: 3277: 3276: 3274: 3269: 3265: 3264: 3262: 3257: 3253: 3244: 3243: 3241: 3240: 3236: 3230: 3229: 3225: 3224: 3223: 3220: 3217: 3214: 3211: 3208: 3205: 3202: 3199: 3196: 3193: 3190: 3187: 3184: 3181: 3178: 3173: 3166: 3161: 3146: 3145: 3141: 3139: 3132: 3131: 3130: 3129: 3126: 3123: 3122: 3118: 3111: 3110: 3108: 3102: 3101: 3099: 3093: 3092: 3090: 3089: 3085: 3083: 3076: 3071: 3067: 3063: 3062: 3058: 3057: 3056: 3053: 3050: 3047: 3044: 3041: 3038: 3035: 3032: 3029: 3026: 3023: 3020: 3017: 3014: 3011: 3006: 2999: 2992: 2988: 2982: 2978: 2974: 2973: 2972: 2971: 2968: 2964: 2960: 2956: 2952: 2948: 2944: 2941: 2938: 2934: 2930: 2926: 2922: 2918: 2914: 2913: 2910: 2895: 2894: 2890: 2888: 2881: 2880: 2879: 2878: 2875: 2872: 2871: 2867: 2859: 2858: 2856: 2850: 2849: 2847: 2842: 2838: 2833: 2832: 2830: 2829: 2825: 2819: 2818: 2814: 2813: 2812: 2809: 2806: 2803: 2800: 2797: 2794: 2791: 2788: 2785: 2782: 2779: 2776: 2773: 2770: 2767: 2762: 2755: 2750: 2746: 2742: 2738: 2734: 2730: 2726: 2725: 2722: 2707: 2706: 2702: 2700: 2693: 2692: 2691: 2690: 2687: 2684: 2683: 2679: 2672: 2671: 2669: 2663: 2659: 2658: 2656: 2650: 2649: 2647: 2646: 2642: 2636: 2633: 2632: 2631: 2628: 2625: 2622: 2619: 2616: 2613: 2610: 2607: 2604: 2601: 2598: 2595: 2592: 2589: 2586: 2581: 2574: 2570: 2558: 2553: 2546: 2543: 2534: 2533: 2530: 2527:wikimedia.org 2515: 2514: 2510: 2500: 2497: 2495: 2489: 2486: 2485: 2484: 2483: 2482: 2481: 2478: 2475: 2474: 2471: 2468: 2463: 2459: 2458: 2457: 2456: 2453: 2450: 2449: 2445: 2439: 2436: 2434: 2428: 2424: 2421: 2420: 2418: 2413: 2412: 2410: 2405: 2401: 2400: 2398: 2397: 2393: 2391: 2389: 2385: 2381: 2377: 2370: 2367: 2364: 2361: 2358: 2354: 2351: 2348: 2345: 2344: 2343: 2337: 2333: 2332: 2328: 2327: 2326: 2323: 2320: 2317: 2314: 2311: 2308: 2305: 2302: 2299: 2296: 2293: 2290: 2287: 2284: 2281: 2276: 2269: 2265: 2261: 2257: 2252: 2251: 2248: 2244: 2240: 2239: 2234: 2233:exceptionally 2230: 2229: 2224: 2222: 2219: 2218: 2215: 2212: 2207: 2203: 2198: 2196: 2193: 2188: 2187: 2184: 2181:wikimedia.org 2169: 2168: 2164: 2152: 2149: 2146: 2142: 2138: 2134: 2133: 2132: 2131: 2130: 2129: 2128: 2127: 2126: 2125: 2113: 2109: 2104: 2103: 2102: 2101: 2100: 2099: 2098: 2097: 2096: 2095: 2083: 2079: 2075: 2070: 2066: 2065: 2064: 2063: 2062: 2061: 2060: 2059: 2058: 2057: 2045: 2040: 2039: 2038: 2034: 2030: 2026: 2025: 2024: 2021: 2018: 2013: 2009: 2005: 2004: 2003: 2002: 1999: 1995: 1991: 1987: 1985: 1979: 1975: 1974: 1966: 1962: 1957: 1956: 1955: 1954: 1953: 1952: 1951: 1950: 1939: 1938: 1937: 1936: 1935: 1934: 1933: 1932: 1921: 1920: 1919: 1918: 1917: 1916: 1915: 1914: 1903: 1902: 1901: 1900: 1899: 1898: 1897: 1896: 1885: 1884: 1883: 1882: 1881: 1880: 1879: 1878: 1868: 1864: 1860: 1859:WP:NOTFISHING 1857: 1856: 1855: 1854: 1853: 1852: 1851: 1850: 1840: 1839: 1838: 1837: 1836: 1835: 1834: 1833: 1826: 1822: 1818: 1813: 1812: 1811: 1810: 1809: 1808: 1801: 1798: 1794: 1791: 1790: 1784: 1783: 1782: 1781: 1780: 1779: 1773: 1769: 1765: 1764: 1763: 1762: 1757: 1754: 1751: 1747: 1746: 1745: 1744: 1737: 1736: 1735: 1734: 1727: 1726: 1725: 1724: 1717: 1716: 1715: 1714: 1707: 1706: 1705: 1704: 1697: 1696: 1695: 1694: 1688: 1687:Special:Block 1683: 1679: 1678: 1677: 1676: 1669: 1668: 1667: 1666: 1660: 1656: 1655: 1654: 1653: 1646: 1645: 1644: 1643: 1638: 1635: 1630: 1629: 1628: 1627: 1624: 1621: 1620: 1616: 1609: 1608: 1606: 1600: 1599: 1597: 1591: 1590: 1588: 1587: 1583: 1578: 1574: 1571: 1568: 1565: 1564: 1560: 1559: 1555: 1554: 1553: 1550: 1547: 1544: 1541: 1538: 1535: 1532: 1529: 1526: 1523: 1520: 1517: 1514: 1511: 1508: 1503: 1496: 1491: 1488:wikimedia.org 1476: 1475: 1471: 1465: 1464: 1463: 1462: 1459: 1456: 1455: 1451: 1443: 1442: 1440: 1434: 1433: 1431: 1426: 1421: 1420: 1418: 1417: 1413: 1407: 1406: 1402: 1401: 1400: 1397: 1394: 1391: 1388: 1385: 1382: 1379: 1376: 1373: 1370: 1367: 1364: 1361: 1358: 1355: 1350: 1343: 1338: 1334: 1329: 1322: 1320: 1317: 1308: 1306: 1302: 1298: 1294: 1292: 1287: 1281: 1277: 1272: 1270: 1267: 1266: 1263: 1260: 1255: 1254: 1251: 1248:wikimedia.org 1236: 1235: 1231: 1219: 1216:expanded the 1214: 1213: 1212: 1211: 1210: 1209: 1206: 1203: 1202: 1199: 1196: 1191: 1187: 1186: 1185: 1182: 1181: 1177: 1169: 1168: 1166: 1160: 1159: 1157: 1151: 1150: 1148: 1147: 1143: 1137: 1134: 1133: 1132: 1129: 1126: 1123: 1120: 1117: 1114: 1111: 1108: 1105: 1102: 1099: 1096: 1093: 1090: 1087: 1082: 1075: 1070: 1067: 1066: 1063: 1060: 1054: 1052: 1047: 1041: 1037: 1032: 1031: 1028: 1025:wikimedia.org 1013: 1012: 1008: 1002: 1001: 1000: 999: 996: 993: 992: 988: 981: 980: 978: 972: 971: 969: 963: 962: 960: 959: 955: 949: 948: 943: 942: 938: 937: 936: 933: 930: 927: 924: 921: 918: 915: 912: 909: 906: 903: 900: 897: 894: 891: 886: 879: 874: 871:wikimedia.org 859: 858: 854: 846: 842: 838: 833: 829: 824: 820: 817: 813: 810: 807: 802: 801: 800: 797: 796: 793: 790: 785: 782: 781: 780: 779: 776: 773: 772: 768: 761: 760: 758: 753: 752: 750: 744: 740: 739: 737: 736: 732: 726: 721: 717: 713: 712: 708: 707: 706: 703: 700: 697: 694: 691: 688: 685: 682: 679: 676: 673: 670: 667: 664: 661: 656: 649: 645: 633: 631: 630: 629: 621: 616: 612: 608: 604: 602: 599: 598: 593:wikimedia.org 582: 581: 575: 572: 569: 566: 565: 564: 563: 559: 557: 554: 553: 549: 547: 544: 543: 539: 537: 534: 533: 528:wikimedia.org 517: 515: 512: 511: 508: 505: 504: 500: 498: 491: 488: 485: 482: 479: 476: 473: 472: 471: 465: 461: 457: 454: 451: 448: 445: 442: 441: 440: 438: 434: 430: 426: 421: 419: 415: 411: 399: 394: 392: 387: 385: 380: 379: 377: 376: 371: 366: 365: 350: 349: 338: 335: 332: 328: 325: 323: 320: 319: 315: 310: 309: 301: 298: 296: 293: 290: 286: 281: 278: 276: 273: 270: 266: 263: 261: 258: 256: 253: 251: 248: 244: 239: 236: 235: 231: 226: 225: 217: 214: 212: 209: 206: 202: 199: 198: 194: 189: 188: 180: 177: 175: 172: 170: 167: 165: 164:Case requests 162: 160: 157: 156: 152: 147: 146: 139: 135: 132: 130: 127: 124: 120: 115: 113: 110: 108: 105: 103: 100: 97: 94: 90: 87: 86: 84: 83: 79: 75: 74: 71: 67: 61: 56: 53: 41: 37: 36: 33: 23: 19: 4519: 4449:August 2010 4338: 4335: 4321: 4315: 4309: 4303: 4297: 4291: 4281: 4266: 4260: 4254: 4248: 4242: 4236: 4223: 4220: 4209: 4203: 4197: 4191: 4185: 4179: 4160: 4154: 4148: 4142: 4136: 4130: 4111: 4105: 4099: 4093: 4087: 4081: 4074:Stwalkerster 4062: 4056: 4050: 4044: 4038: 4032: 4013: 4007: 4001: 3995: 3989: 3983: 3964: 3958: 3952: 3946: 3940: 3934: 3915: 3909: 3903: 3897: 3891: 3885: 3868: 3846: 3803: 3783: 3717: 3711: 3705: 3699: 3693: 3687: 3681: 3672: 3650: 3547: 3526: 3516: 3503: 3414:Hello, I am 3398: 3392: 3386: 3380: 3374: 3368: 3362: 3353: 3314: 3304: 3291: 3215: 3209: 3203: 3197: 3191: 3185: 3179: 3170: 3147: 3137: 3124: 3081: 3048: 3042: 3036: 3030: 3024: 3018: 3012: 3003: 2977:an AN thread 2939: 2925:longstanding 2921:re-insertion 2917:contribution 2896: 2886: 2873: 2804: 2798: 2792: 2786: 2780: 2774: 2768: 2759: 2741:OhKayeSierra 2729:Stwalkerster 2708: 2698: 2685: 2623: 2617: 2611: 2605: 2599: 2593: 2587: 2580:Stwalkerster 2578: 2575:Stwalkerster 2564: 2551: 2516: 2465: 2451: 2422: 2373: 2341: 2318: 2312: 2306: 2300: 2294: 2288: 2282: 2273: 2236: 2232: 2209: 2170: 2111: 2107: 2081: 2077: 1983: 1981: 1862: 1861:talks about 1796: 1786: 1771: 1622: 1545: 1539: 1533: 1527: 1521: 1515: 1509: 1500: 1477: 1457: 1392: 1386: 1380: 1374: 1368: 1362: 1356: 1347: 1257: 1237: 1193: 1183: 1124: 1118: 1112: 1106: 1100: 1094: 1088: 1079: 1057: 1014: 994: 928: 922: 916: 910: 904: 898: 892: 883: 860: 831: 787: 774: 698: 692: 686: 680: 674: 668: 662: 653: 639: 627: 626: 625: 600: 573: 555: 545: 535: 513: 506: 495: 469: 422: 407: 48: 4438:August 2009 4423:appointment 3806:arbcom-en-c 3697:protections 3612:Nosebagbear 3558:^Indeed. – 3529:arbcom-en-c 3378:protections 3317:arbcom-en-c 3195:protections 3150:arbcom-en-c 3028:protections 2899:arbcom-en-c 2784:protections 2711:arbcom-en-c 2603:protections 2519:arbcom-en-c 2298:protections 2173:arbcom-en-c 1699:boundaries. 1525:protections 1480:arbcom-en-c 1372:protections 1240:arbcom-en-c 1104:protections 1017:arbcom-en-c 908:protections 863:arbcom-en-c 678:protections 585:arbcom-en-c 520:arbcom-en-c 134:Ban appeals 112:Noticeboard 40:WP:CUOS2019 4429:Elections 4319:block user 4313:filter log 4264:block user 4258:filter log 4229:Ivanvector 4207:block user 4201:filter log 4158:block user 4152:filter log 4109:block user 4103:filter log 4060:block user 4054:filter log 4011:block user 4005:filter log 3962:block user 3956:filter log 3913:block user 3907:filter log 3709:page moves 3641:SandDoctor 3425:discussion 3390:page moves 3339:SandDoctor 3207:page moves 3040:page moves 2796:page moves 2615:page moves 2541:SandDoctor 2488:Rschen7754 2310:page moves 2256:Beeblebrox 2029:Beeblebrox 1990:Beeblebrox 1984:impossible 1817:Beeblebrox 1537:page moves 1384:page moves 1315:SandDoctor 1116:page moves 920:page moves 690:page moves 622:Candidates 340:(pre-2016) 327:Statistics 260:Procedures 4418:candidacy 4325:block log 4270:block log 4213:block log 4164:block log 4115:block log 4066:block log 4017:block log 3968:block log 3919:block log 3703:deletions 3384:deletions 3201:deletions 3034:deletions 2959:Barkeep49 2790:deletions 2609:deletions 2559:Oversight 2423:I do not. 2304:deletions 2110:is also, 1905:somebody. 1789:approach. 1531:deletions 1378:deletions 1110:deletions 914:deletions 684:deletions 634:CheckUser 418:Oversight 414:CheckUser 265:Elections 52:announced 4443:May 2010 4295:contribs 4276:resigned 4240:contribs 4183:contribs 4172:Xaosflux 4134:contribs 4085:contribs 4036:contribs 3987:contribs 3938:contribs 3889:contribs 3685:contribs 3560:Ammarpad 3486:xaosflux 3462:xaosflux 3445:xaosflux 3416:xaosflux 3366:contribs 3355:Xaosflux 3350:Xaosflux 3183:contribs 3016:contribs 2951:this Afd 2929:WP:FOOLS 2772:contribs 2591:contribs 2334:Hi, I'm 2286:contribs 2204:or even 2145:RoySmith 2141:WP:CHECK 2017:RoySmith 2012:User:AGK 1965:WP:CHECK 1961:WP:CHECK 1750:RoySmith 1513:contribs 1502:RoySmith 1497:RoySmith 1360:contribs 1092:contribs 896:contribs 666:contribs 32:Shortcut 20:‎ | 3854:Results 3256:WP:OTRS 3078:decide. 2955:history 2665:safely. 2662:fintech 2427:steward 2363:IPRange 2347:IPCheck 1671:damage. 1332:Crossin 1171:queues. 812:buttons 728:decide. 420:teams. 337:Reports 275:History 255:Members 250:Contact 238:Discuss 102:(CU/OS) 4274:, who 3715:rights 3691:blocks 3396:rights 3372:blocks 3252:WP:ACC 3213:rights 3189:blocks 3104:users. 3075:WP:SPI 3070:WP:ACC 3066:WP:SPI 3046:rights 3022:blocks 2986:話して下さい 2861:while. 2837:WP:UAA 2802:rights 2778:blocks 2737:WP:AGF 2733:WP:ACC 2621:rights 2597:blocks 2386:, and 2316:rights 2292:blocks 2206:m:SWMT 2202:WP:ACC 2192:zzuuzz 2148:(talk) 2080:, is, 2020:(talk) 1867:WP:UPE 1772:needed 1753:(talk) 1634:zzuuzz 1577:WP:SPI 1543:rights 1519:blocks 1425:WP:ACC 1390:rights 1366:blocks 1327:Steven 1122:rights 1098:blocks 1081:Oshwah 1076:Oshwah 926:rights 902:blocks 816:WP:RBM 743:WP:SPI 725:WP:SPI 720:WP:ACC 716:WP:SPI 696:rights 672:blocks 280:Clerks 138:Report 4556:2023– 4341:Katie 2947:pride 2919:(and 2243:talk 2208:). -- 828:m:2FA 314:Audit 16:< 4540:2023 4535:2022 4530:2021 4525:2020 4520:2019 4515:2018 4510:2017 4505:2016 4500:2015 4495:2013 4490:2012 4485:2011 4307:logs 4289:talk 4252:logs 4234:talk 4195:logs 4177:talk 4146:logs 4128:talk 4097:logs 4079:talk 4048:logs 4030:talk 4025:ST47 3999:logs 3981:talk 3950:logs 3932:talk 3901:logs 3883:talk 3878:L235 3825:qedk 3679:talk 3674:L235 3669:L235 3658:7754 3655:chen 3627:Revi 3616:talk 3591:qedk 3580:talk 3564:talk 3548:xeno 3360:talk 3177:talk 3010:talk 3005:ST47 3000:ST47 2963:talk 2945:and 2933:joke 2839:and 2766:talk 2745:talk 2585:talk 2473:7754 2470:chen 2462:2018 2357:NBCH 2355:and 2280:talk 2260:talk 2217:7754 2214:chen 2033:talk 1994:talk 1821:talk 1682:CIDR 1507:talk 1354:talk 1301:talk 1276:qedk 1265:7754 1262:chen 1201:7754 1198:chen 1190:2018 1086:talk 1065:7754 1062:chen 1036:qedk 890:talk 885:L235 880:L235 841:talk 837:ST47 795:7754 792:chen 660:talk 655:ST47 650:ST47 464:OTRS 437:UTRS 416:and 408:The 331:Talk 322:Talk 289:Talk 269:Talk 123:Talk 93:Talk 3976:SQL 3927:Mz7 3721:RfA 3638:The 3402:RfA 3336:The 3219:RfA 3172:Mz7 3167:Mz7 3112:No. 3052:RfA 2935:at 2808:RfA 2627:RfA 2538:The 2493:SQL 2432:SQL 2336:SQL 2322:RfA 2275:SQL 2270:SQL 2238:DGG 2112:yes 2082:yes 2046:... 2015:-- 1748:-- 1659:NAT 1549:RfA 1396:RfA 1349:Mz7 1344:Mz7 1312:The 1128:RfA 932:RfA 832:not 809:new 806:few 762:No. 702:RfA 435:or 433:ACC 429:SPI 205:Log 62:) . 60:UTC 3873:: 3652:Rs 3618:) 3582:) 3566:) 2989:) 2965:) 2747:) 2467:Rs 2378:, 2262:) 2245:) 2211:Rs 2035:) 1996:) 1823:) 1303:) 1259:Rs 1195:Rs 1059:Rs 1056:-- 843:) 789:Rs 4384:e 4377:t 4370:v 4327:) 4322:· 4316:· 4310:· 4304:· 4298:· 4292:· 4287:( 4272:) 4267:· 4261:· 4255:· 4249:· 4243:· 4237:· 4232:( 4215:) 4210:· 4204:· 4198:· 4192:· 4186:· 4180:· 4175:( 4166:) 4161:· 4155:· 4149:· 4143:· 4137:· 4131:· 4126:( 4117:) 4112:· 4106:· 4100:· 4094:· 4088:· 4082:· 4077:( 4068:) 4063:· 4057:· 4051:· 4045:· 4039:· 4033:· 4028:( 4019:) 4014:· 4008:· 4002:· 3996:· 3990:· 3984:· 3979:( 3970:) 3965:· 3959:· 3953:· 3947:· 3941:· 3935:· 3930:( 3921:) 3916:· 3910:· 3904:· 3898:· 3892:· 3886:· 3881:( 3865:. 3837:) 3835:c 3832:桜 3829:t 3827:( 3723:) 3718:· 3712:· 3706:· 3700:· 3694:· 3688:· 3682:· 3677:( 3614:( 3603:) 3601:c 3598:桜 3595:t 3593:( 3578:( 3562:( 3404:) 3399:· 3393:· 3387:· 3381:· 3375:· 3369:· 3363:· 3358:( 3258:. 3221:) 3216:· 3210:· 3204:· 3198:· 3192:· 3186:· 3180:· 3175:( 3054:) 3049:· 3043:· 3037:· 3031:· 3025:· 3019:· 3013:· 3008:( 2983:( 2961:( 2810:) 2805:· 2799:· 2793:· 2787:· 2781:· 2775:· 2769:· 2764:( 2743:( 2629:) 2624:· 2618:· 2612:· 2606:· 2600:· 2594:· 2588:· 2583:( 2324:) 2319:· 2313:· 2307:· 2301:· 2295:· 2289:· 2283:· 2278:( 2258:( 2241:( 2114:. 2084:. 2031:( 1992:( 1819:( 1551:) 1546:· 1540:· 1534:· 1528:· 1522:· 1516:· 1510:· 1505:( 1398:) 1393:· 1387:· 1381:· 1375:· 1369:· 1363:· 1357:· 1352:( 1299:( 1288:) 1286:c 1283:桜 1280:t 1278:( 1130:) 1125:· 1119:· 1113:· 1107:· 1101:· 1095:· 1089:· 1084:( 1048:) 1046:c 1043:桜 1040:t 1038:( 934:) 929:· 923:· 917:· 911:· 905:· 899:· 893:· 888:( 839:( 704:) 699:· 693:· 687:· 681:· 675:· 669:· 663:· 658:( 617:. 397:e 390:t 383:v 285:+ 243:+ 207:) 203:( 119:+

Index

Knowledge (XXG):Arbitration Committee
CheckUser and Oversight
Shortcut
WP:CUOS2019
announced
UTC
Knowledge (XXG) Arbitration

About arbitration
Talk
Arbitration policy
(CU/OS)
Guide to arbitration
Noticeboard

+
Talk
Search archived proceedings
Ban appeals
Report
Open proceedings
All open requests
Case requests
Clarification and Amendment requests
Arbitrator motion requests
Enforcement requests
Active sanctions
Contentious topics
Log
General sanctions

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.