07.15.13

TechBytes Episode 82: Richard Stallman on Data Protection, Collective Responsibility as Tyrannical Tool, and Encryption of Data

Posted in TechBytes at 2:45 am by Dr. Roy Schestowitz

Techbytes 2013

Direct download as Ogg (00:09:58, 7.4 MB)

Summary: Stallman speaks about security, privacy, networks, and the NSA

TODAY’S part (fifth in this series of interviews) deals with several different topics that Stallman rarely speaks about publicly. The full transcript follows.


Dr. Roy S. Schestowitz: The next bunch of things I’d like to speak about is the data, showing whole data security, I mean, security from the point of view of the user, not security from the point of view of, you know, “national security”, which could mean just about anything.

Richard StallmanDr. Richard M. Stallman: I understand.

RSS: The repositioning of the datacentres and the location of datacentres that companies are selecting — what role do you think that plays in privacy?

RMS: Well, if you’re going to deal with a company and it’s going to get some personal information about you and that company’s servers are hosted by a US company — whether in the US or not — then that means that the US government can get all your information.

If a country wants to provide data protection to its citizens, part of their data protection must include not permitting that data to be searched in any way as part of the company’s operations, to have [...] fully reliable and cooperating data protection. So for instance, a European company should not be allowed to host its data on an Amazon server.

“…the encryption of a network hub is not something that you can depend on for your own privacy because, you know, if other people are getting on the network hub, they can listen to your packets too, so if you want to maintain your privacy, you do that with something else like communicating with SSH.”
      –Richard Stallman
RSS: There was one case way back in 2008 or so, several of us European people and people in the FFII were trying to encourage the European Commission not to put Google Analytics in its Web site. That was a public service Web site which was providing, using JavaScript, a helluva lot of details about the European citizens accessing the site to a US company. I don’t think that’s being addressed sufficiently, even now a lot of the servers…

RMS: Well, you’re certainly right and I would suggest that if a Web page is set up so that it will provide information [to] these companies, that should be treated as legally equivalent to the case where the operator of that Web page explicitly sent the same data to [these companies] and of course in Europe that would bring the European data protection rules into play and that would say, “no, you can’t send this data to Google Analytics or to some advertising network or anyone.”

RSS: I want to also ask you about encryption. I’m not sure to what degree you’re into, into all these — I suppose this is an area that enthusiasts in the field of security are very much into — but several of us people are trying to find reliable encryption, ubiquitous encryption method…

RMS: Well, I can help you find that. I know how to use the GNU Privacy Guard. However, in order to use that you’ve got to have somebody’s public key. So that’s why I was wondering if when I go to the UK we might meet and then can I could get your public key.

RSS: We’ll probably come to it later, but in the UK we have this big scandal right now about spying on diplomats in the G8 summit and that’s probably something that Russia — I read about it today — Russia is apparently going to take some legal action over it as well as the NSA leaks. There was spying on people using, basically honeypots as access points, as a way in which it would connect to a wireless access point and of course even if people are using E-mail with SSL/TLS, I’m not sure to what degree this is safe. We know WPA — WPA2 even — is crackble. And…

RMS: Well, okay, the point is, the encryption of a network hub is not something that you can depend on for your own privacy because, you know, if other people are getting on the network hub, they can listen to your packets too, so if you want to maintain your privacy, you do that with something else like communicating with SSH.

Now, the relevance of encryption on the network hub — that’s not just a way of controlling who can use it. It’s very important for people to maintain Wi-Fi networks without any kind of password, because if you don’t, then you’re becoming an enforcer in the war on sharing. One way to resist the application of unjust laws such as the Digital Economy Act is by not having a key on your Wi-Fi network.

RSS: That increases the pressure through liability claims, so…

“Collective responsibility is the policy that says, if you don’t help keep everyone else subjected, we’ll punish you.”
      –Richard Stallman
RMS: Of course, collective responsibility is the tool of tyrants. Collective responsibility is the policy that says, if you don’t help keep everyone else subjected, we’ll punish you. Right now the UK government is using the system of collective responsibility to divide people and turn everybody into an enforcer against everybody else, and that’s why it’s people’s duty to refuse to do it.

RSS: And I suppose the same…

RMS: …Wi-Fi that works without passwords, so that they refuse to enforce the system of unjust control on everyone else.

RSS: I totally agree with you and the same was said about the solidarity when it comes to encrypting E-mail. We should make it a standard thing to encrypt our E-mails although, to tell you the truth, I mean, all the encryption methods are based upon industry standards that are accepted at the other end of the line, so when you send somebody an E-mail you have to make sure they have the same decryption methods upon which…

RMS: Right. That’s why it’s difficult, in practice, to encrypt all our E-mails. We can encrypt E-mail with people that we know and have arranged to exchange keys with. But the other thing to point out is that encrypting E-mail doesn’t disguise any of the metadata, so the NSA can still track who sends E_mail to whom, even if the contents are encrypted.

RSS: And I suppose with all the mathematicians at the NSA — they seem to be hiring quite a few very skilled people who can do analysis on the encryption methods and…

RMS: They’ve been doing that since 19…

RSS: Fifty?

RMS: 1949 or so.

RSS: I think the NSA was only founded in 19…

RMS: Well, it wasn’t then called the NSA, but it doesn’t matter. You know, details like where it’s put don’t matter.


Later today I’ll be meeting Stallman in Oxford to get some video interviews done with him. This time the audio quality will be vastly better.

We hope you will join us for future shows and consider subscribing to the show via the RSS feed. You can also visit our archives for past shows. If you have an Identi.ca account, consider subscribing to TechBytes in order to keep up to date.

As embedded (HTML5):

Keywords: gnu fsf richardstallman

Download:

Ogg Theora

Ubuntu and SUSE ‘Cloud’ Users Spied on Through Microsoft Windows Azure (With NSA Back Doors)

Posted in GNU/Linux, Microsoft, SLES/SLED, Ubuntu at 2:03 am by Dr. Roy Schestowitz

Azure

Summary: Why running GNU/Linux distributions on top of Azure is begging not only to be taxed by Microsoft but also to be under surveillance by Microsoft and the NSA/CIA

OEMs should not preload Windows on PCs because they turn these PCs into spying devices right out of the box (there are NSA back doors in Windows) and no government should ever touch anything from Microsoft anymore (mind this silly promotion), especially knowing how the NSA spies on ‘ally’ governments. Everything has changes since Snowden put out there evidence to show what many of us already knew for years. Here is a bunch of new Windows back doors for those who believe it’s old news (the NSA gets prior notifications about those holes before they are plugged).

“Everything has changes since Snowden put out there evidence to show what many of us already knew for years.”A few days ago we got confirmation of Microsoft not only engaging in Skype spying/eavesdropping (in real-time) but also allowing others to do so. It’s not a design flaw, it’s intentional. Dan Gilmore said, “How can any business even begin to trust Microsoft now?”

When Dr. Glyn Moody, another occasional author who writes for The Guardian found out about NSA book doors, he wrote the article “How Can Any Company Ever Trust Microsoft Again?” This article went viral and also got some translations. It makes similar points to the ones above. Anybody foolish enough to still trust Microsoft is simply deserving of the Darwin Award.

The news about Microsoft-NSA collusion received a lot of press coverage, including some in pro-FOSS sites, even in numerous different languages (I saw over a hundred headlines while researching the subject). This is really hurting Microsoft, which is struggling to spin what it just cannot denied. Not only was Microsoft shown to be colluding with the NSA (PRISM lists Microsoft as the first partner) but it also got caught lying to the public.

“Given what we know, surveillance just ought to be the expectation, not a theory or an hypothesis.”At this stage, anybody foolish enough to host anything on Microsoft Azure just simply deserves to be spied on. Given what we know, surveillance just ought to be the expectation, not a theory or an hypothesis. Canonical was stupid enough to end up aiding the criminals when it signed a deal with the devil (Azure). Then again, it’s not as though Canonical cherishs users’ privacy; it gives Amazon (hence the NSA) some data about users’ local searches — something which even Microsoft is not doing just yet (although other reports which Richard Stallman speaks of say that this has been going on for many years). Knowing that Microsoft uses faux ‘encryption’ with back doors, expect nothing to be secure. It’s just not designed to be secure, it’s designed to serve US “national security”, which basically means US interests — whatever they may be.

Given SUSE’s financial dependence on Microsoft, it is not surprising to see it being hosted on Microsoft servers with surveillance. Watch this new interview with a SUSE official. Notice how almost the entire interview is about Microsoft and it says:

MS and Linux at Loggerheads is History: Peter Lees, Suse

[...]

SUSE Linux is in a great position of being the only enterprise Linux recommended for Microsoft and VMware.

Microsoft would like tax GNU/Linux through SUSE, with or without Azure in the underlying platform.

Gilmore and Moody are currently being joined by John Dvorak, who explains “Why We Can No Longer Trust Microsoft” (after the NSA revelations). To quote:

If anyone should be mad at the NSA for all the snooping that appears to be going on, it should be the Department of Commerce, not privacy advocates. The recent revelations are not a threat to national security so much as a threat to the national economy. And if I were Microsoft, I’d be having around-the-clock meetings to discuss how to fix what is about to happen.

Microsoft, despite denials, appears to be in bed with the NSA. Apparently all encryption and other methods to keep documents and discussions private are bypassed and accessible by the NSA and whomever it is working with. This means a third party, for whatever reason, can easily access confidential business deals, love letters, government classified memos, merger paperwork, financial transactions, intra-corporate schemes, and everything in between.

Anybody who puts GNU/Linux on top of Azure should not only expect to pay patent tax to Microsoft but should also expect government surveillance on everything. We know that storage servers as a whole, not just routers, have back doors. Free software and GNU/Linux are the way to go, provided there is no proprietary bug in the stack.

Another Back Door Found in HP Servers (LeftHand)

Posted in Hardware, Security at 1:54 am by Dr. Roy Schestowitz

LeftHand

Summary: LeftHand has a back door and it’s a gold mine to HP collaborators (perhaps NSA agents) who want full access to massive storage servers all around the world

A BRITISH branch of the German publisher Heise recently wrote about HP back doors, showing that they exist not only in Microsoft Windows. There is a “New backdoor in HP server products,” says this new headline and here are the details:

Computer manufacturer HP has admitted that its StoreVirtual servers also contain an undocumented backdoor. The security vulnerability risks allowing attackers to gain unauthorised access to the storage systems. The backdoor provides users with direct access to the holy of holies, “LeftHand” (the operating system for the StoreVirtual server). HP has previously marketed its StoreVirtual systems as LeftHand Storage and P4000 SAN. LeftHand OS was originally called SAN/iQ.

Since we know that the NSA was cracking routers in China in order to eavesdrop or take control of network backbones (since 2009), this is noteworthy. The US has recently been paranoid about buying Chinese hardware (or hardware manufactured in China), based on NDAA clauses. In reality, it’s the US perhaps that should be feared (biggest spy bar none, just like its military).

I have worked with LeftHand devices before (it’s a fairly recent HP acquisition, costing $360 million in cash) and they’re like the backbone of storage in many enterprises and probably governments, too. It’s like a master key to many hard drives. If you control both network and storage backbones, you’re the jack of all trades and the master of the world.

There is also a back door “in US emergency alert systems,” according to another report from The H:

Backdoor in US emergency alert systems

The US-CERT, which is part of the US Department of Homeland Security, warns that security-critical vulnerabilities in US emergency alert systems potentially allow attackers to switch off the systems or misuse them to broadcast arbitrary emergency alerts. The Linux systems are used at TV and radio stations in the US and enable the US government to interrupt ongoing broadcasts when there is an emergency. This is designed to allow the US president to address the nation within ten minutes.

The latter is unlikely to be a back door by design. The ramifications, however, are noteworthy. These systems are proprietary.

Microsoft Still a Patent Terrorist, Sues the Government for Not Playing Along in Linux/Android Embargoes

Posted in GNU/Linux, Google, Microsoft at 1:45 am by Dr. Roy Schestowitz

The man who should be in jail but isn’t

Al Capone mugshot and Steve Ballmer

Summary: Microsoft so upset that patent terrorism is not accepted by US Customs that it is filing a lawsuit and continues to pursue bans on Linux/Android

MICROSOFT has already sued numerous companies including Motorola over the use of Android. Microsoft later added lawsuits against Google, targeting Android again. That’s not even including all the extortion, back room deals, and lawsuits by proxy. Microsoft, as per the definition of terrorism, is now acting like some kind of a terrorist organisation, focusing solely on injuring the competition (by blackmail accompanied by threats) and not at all on creating a product. This has gone on since shortly after the Microsoft-Novell deal (or two years earlier).

The US ITC, which helps companies like Microsoft and Apple embargo Android devices, not so long ago helped Microsoft ban imports of Google Phone products. Quite rightly, US Customs officials are refusing to obey these ridiculous acts of extortion and guess what happens? The terrorist is suing them.

Microsoft Sues U.S. Customs for Failed Google Phone Ban

Microsoft Corp. (MSFT) accused U.S. Customs officials of refusing to follow a trade agency’s order to block imports of phones made by Google Inc. (GOOG)’s Motorola Mobility unit in a lawsuit that seeks to alter how such cases are handled.

The U.S. International Trade Commission in Washington issued the import ban in May 2012 after deciding that Motorola Mobility devices infringed a Microsoft patent for a way mobile phones synchronize calendar events with other computers. Microsoft’s lawsuit, filed yesterday in Washington, says that order isn’t being enforced.

Many people whom we speak to still agree that Microsoft is the most disgusting corporation bar none when it comes to attacks on software freedom. Given Microsoft’s Mossad-like tactics with MOSAID, why should there be no charges against Microsoft under the RICO Act? Many executives at Microsoft deserve to be in prison, but when corporations control the government, it is rare to see suits in jail, unless of course they speak out against torture while working for the CIA (or defending the Constitution while working for the NSA). The New York Times has this new article titled “Has Patent, Will Sue: An Alert to Corporate America” (actually, those who have patents and sue actually are “Corporate America”, not just patent trolls). It is time to take action against the crime of terrorism with patents. Vice President Biden called Julian Assange “high-tech terrorist” for merely publishing policies and actions paid for by taxpayers. So why can’t one apply the word “terrorism” to describe exactly what companies like Microsoft do these days? It’s all a matter of indoctrination and normalisation; we’re supposed to accept extortion as though it’s an acceptable business practice. Unjust and unethical behaviour is seen by more and more people as the ‘norm’. Several years ago many bloggers and even notable employees of large companies accused Microsoft of "terrorism" for what it was doing with patents. Notice how we no longer see that despite the fact that Microsoft has not changed.

If one actually wants to see what patents Microsoft uses against Linux and Android, look at the Barnes and Noble complaint (before Microsoft paid a hefty bribe for the complaint to be dropped). Software patents are hardly legitimate, certainly not at all in the vast majority of the world. Here is a thought-provoking post that Groklaw shared the other day:

I think you guys will want to see this extraordinarily interesting talk by Carl Hewitt on YouTube. He talks about the future of IP software — future as in when computers start filing patent applications. “If there is no principled way to distinguish computation from human thinking” — then what? Human thinking isn’t patentable. And if the meaning is a mathematical denotation, and mathematics is also unpatentable, what happens when computers are filing thousands and thousands of patent applications on all the patentable IP in the universe?

Groklaw should be commended for coming out in defence of Google and against software patents in recent years (more so than in prior years).

President of the Microsoft Office Division (Kurt DelBene) Leaves the Company

Posted in Microsoft, Office Suites at 1:35 am by Dr. Roy Schestowitz

The #1 cash cow remains headless, a game of musical chairs begins

Muhammed Saeed al Sahaf

Summary: ‘Retirement’ the dubious excuse for the departure of the head of Microsoft Office, a product which saw its market penetration declining in several quarters over the past few years

JUST shortly after the Xbox chief left (a couple of months before him the game chief had left) the head of the product most profitable in Microsoft is leaving, but this has mostly been missed due to the silly ‘reorg’ propaganda we predicted would come to distract [1, 2, 3]. Our Wiki about Microsoft helps show how the company declined in recent years because we are investigating rather than just relaying Microsoft’s own claims. Here is a timely reminder wrapped in PR:

Both Apple and Google now boast higher total market values than Microsoft.

And here inside another PR-filled post are some facts which got relegated to the bottom of the list for some reason:

8. Executive Exits, New Responsibilities:

  • Kurt DelBene will be retiring from Microsoft. “Kurt has been a huge part of our success in evolving Office to be a great cloud service,” Ballmer wrote.
  • Craig Mundie will devote 100% of his time to a special project for Ballmer through the end of this calendar year. Beginning in 2014, Craig will continue as a consultant through his previously agreed upon departure date at the end of calendar 2014.
  • Rick Rashid will step away from running Microsoft Research and move into a new role driving core OS innovation in Microsoft’s operating systems group. 9.

That first item is huge news, but it’s only a bulletpoint in number 8 of the points which are mostly fluff, marketing, and other nonsense. This basically says that a man who is only 52 is ‘retiring’. Sounds like damage control and nonsense, as it wouldn’t be the first such example. Gates too claimed he was ‘retiring’.

Bill Gates Sets Up/Institutionalises GMO Monopoly in Africa, Still Bribes Officials Who Implement His Policies (Feed His Investment), Prepares GMO Doomsday Plan

Posted in Africa, Bill Gates at 1:23 am by Dr. Roy Schestowitz

Higher financial yield for Gates, lower food yield for Africa

Wheat

Summary: Gates is further expanding his war on seed freedom, promoting instead — in very nefarious ways — a GMO (genetically-monopolised ownership) agenda from which he derives great profit

THE Gates Foundation is hungry. It is hungry for more power and wealth and it is trying hard to make billions by investing in genetically-monopolised crops. The marketing strategy is to pretend it’s about curing people’s illnesses and/or ending hunger. In reality it’s about introducing higher cancer risk and making food more expensive, hence harder to acquire.

“It is rule/reign by proxy, relaying Gates’ policies for his investments.”AllAfrica, which Bill Gates has bribed to promote his agenda in Africa (this is a large hub of articles, some say the largest in the continent) published the puff piece “Gates Foundation to Build Standard Biotech Lab in Nigeria” and a similar ‘article’ (more like PR, maybe ghost-written by the peripheral PR agencies) repeats just talking points without doing any investigation. It says: “The Bill and Melinda Gates Foundation, an independent and Non-governmental Organisation, has concluded arrangement to build a standard biotechnology laboratory to help build human capacity in national programmes in Nigeria and Africa as a whole.”

Africa as a whole. Got that?

It is rule/reign by proxy, relaying Gates’ policies for his investments. Here is one part which echoes Gates’ henchman: “My mission in Nigeria as mandated by Bill and Melinda Gates Foundation is to see the possibilities of empowering Nigeria: the National Systems, Programmes in Nigeria, to have the capacity to use biotechnology laboratory technologies for crop improvement”.” Guess who pays this man’s wage. With a black face, a lot of people will fail to spot the ringleader and the foreign profiteer.

Is it actually doing good at all? No, this is not helping Nigeria. In fact, it harms it in many ways. Ask anyone familiar enough with Monsanto why that is. Gates gives these people bribes, as we covered on numerous occasions before (across Africa). Here is the latest example, an award as an excuse for passing bribes (endorsement came with money in the past, maybe this time too).

These people don’t seem to mind the fact that Gates is causing polio in Africa, for profit, through malicious corporations that exploit Africans and harm their health for improved revenue (notably Shell). To them, Africa is an opportunity not just because it has vast oil reserves underground but also because it can be extracted from the ground while causing great pollution (smoke, leaks) without incurring the wrath of lawyers. The same goes for clinical trials (drug experimentation on humans in large numbers, without the threat of litigation).

“The whole idea is to monopolise people’s food even in less Americanised nations.”They keep printing the lie that Gates is working to end polio, giving him credit for other people’s work.

While this plutocrat puts his money in abusive oppression we also see further confirmation that confidence in GMO is somewhat low. “According to Nation Of Change,” says this report, “in an article dated July 6, Bill Gates his foundation are preparing for doomsday by having a seed vault built in a permafrost mountain of Norway. Specifically in the on the Norwegian island of Spitsbergen, which is part of the group of islands known as Svalbard. For those of you that do not know much about Mr. Gates here is a small run down of him according to news reports and articles available internet-wide. Mr. Gates is not only the creator of Microsoft and one of the world’s, if not THE world’s, richest man. But he is also known for funneling tons of money into the genetically modified food (GMO) realm.”

Yes, so sure about the value of GMO that they have a backup vault, eh? But that’s not the full story, as the main issue with GMO is the patents. The whole idea is to monopolise people’s food even in less Americanised nations. And Gates invests in this agenda (profit) while lobbying for it under the guise of “doing good”. We are not going to delve into research about pesticides, cancer, soil toxicity, etc. because it’s not our subject of interest (patents are more relevant to us), but for those who wish to know about GMO, there are plenty of good resources all over the Web and in published literature. Techrights has already covered GMO in African in some of the posts below.

Bill Gates’ AstroTurf in Education (Privatisation for Profit) Recruits More Lobbyists, Necessitates More Bribes

Posted in Bill Gates at 1:12 am by Dr. Roy Schestowitz

TFA (Teach For America)

Summary: A look at some of Gates’ latest attempts to profit from a colossal public service, including new examples of PR and payouts

The Gates Foundation keeps trying to bribe schools to help its privatisation agenda (Gates invests in companies that would profit from it). Here is the latest large bribe. To quote a report: “School officials revealed it is the recipient of a $1.2 million “Smart Spending” grant from the Bill & Melinda Gates Foundation. $850,000 comes from the foundation and a local match, primarily from the Great Schools Partnership, will cover the rest.” What is this latter group and what is it aspiring to achieve? Gates already bankrolls dozens if not hundreds of AstroTurf groups in the schools market (yes, to him its a market, subsidised by taxpayers). We previously covered Teach For America (TFA), one of Gates’ bigger astroturfing groups. We mentioned it recently because it's back in action and this site complains about it. To quote: “Tim Wise specializes in talking to white people about racism. Teach For America is a major player in the elitist and racist scam to privatize public education, supplying mostly white grads of elite colleges as ghetto teacher temps.”

“This ‘charity’ is often doing the exact opposite of charity.”From the comments: “To believe modern education reform is looking out for minorities, you have to believe that all of a sudden, the Walton’s, Gates, Koch’s and A.L.E.C. All have th best interests of poor people in mind, when they have taken advantage of them in every other single realm of society.”

Remember that Gates was funding ALEC [1, 2]. This ‘charity’ is often doing the exact opposite of charity.

The above link came from Metacode and coincidentally we see the teachers’ blog we love so much complaining about FTA again, seeking to “Amplify the voices of those negatively impacted by TFA in their schools and communities” (using a Microsoft/NSA surveillance tool, Skype, to organise).

As always, Gates keeps working on some PR stories to portray himself as helping students and helping children. When you hurt them all so badly for private gain (profit) and corporate indoctrination you may rightly wish to deceive the public. It is easy to do this when you literally buy a lot of the relevant media, including blogs.

IRC Proceedings: July 7th-July 13th, 2013

Posted in IRC Logs at 1:00 am by Dr. Roy Schestowitz

IRC Proceedings: June 7th, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

IRC Proceedings: June 8th, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

IRC Proceedings: June 9th, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

IRC Proceedings: June 10th, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

IRC Proceedings: June 11th, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

IRC Proceedings: June 12th, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

IRC Proceedings: June 13th, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

Missing data due to netsplits (aggregate from backup for #techrights)

Enter the IRC channels now

« Previous entries Next Page » Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts