When a network device (such as a phone, tablet, or laptop) considered bound to a user is online, they user is considered online.
inspect DHCP leases, potentially
use NAT state table, potentially
opt in? opt out?
deduce by using the checkins from a user corellated with various "equipment presence traces" derived from network intelligence?
problems where users abuse the system to monitor others without their consent? Is this only an issue if it can be done without people on the IRC channel noticing? If so, a note must be made of this to avoid conflicts with any future feature that allows this system to be used except via IRC.
General Concept
When a network device (such as a phone, tablet, or laptop) considered bound to a user is online, they user is considered online.