EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

10.30.15

Links 30/10/2015: System76 Sells Oryx Pro, Plasma 5.5 Looks for Wallpapers

Posted in News Roundup at 11:54 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • The new era of community

    The new Director of Community at GitHub, Jono Bacon, delivered a keynote at All Things Open this year titled: The new era of community. His talk was largely a call action to do better job of leading, guiding, and engaging in open source communities. Here’s how.

  • The Race to Develop an Open-Source Voting System Is On

    The City and County of San Francisco joined Los Angeles County and Travis County, Texas, in their pursuit of open source voting systems, where the public can review the software code for evidence of ballot tampering.

    The Local Agency Formation Commission (LAFCo) adopted a report titled “Study on Open Source Voting Systems” on Friday, recommending how the county can build its own in San Francisco.

  • Look at that nice looking FreedomBox!

    I’m rebuilding one my home server and decided to take a look at the FreedomBox project as the base for it.

    The 0.6 version was recently released and I wasn’t aware of how advanced the project is already!

    They have a virtualbox image ready for some quick test. It took me longer to download it than to start using it.

  • Tor Messenger chat client beta available

    Messaging is generally thought to be safer than PGP encrypted email because there aren’t emails sitting around for interested parties to decrypt at their leisure. Once a messaging session is over, the messages, if not logged, disappear.

  • Greenplum goes open source — and a new cloud analytics star is born

    Greenplum Database, Pivotal’s data warehouse solution, has come full circle. Once derived from the open source PostgreSQL, Greenplum is open source once again.

    Greenplum could be used to yank the rug out from under the stagnant legacy players in data warehousing and analytic RDBMSes, but Oracle, Impala, and Teradata alone aren’t the competition. Rather, cloud leaders are also at risk.

  • What good is open source nobody knows about?

    Here’s a pet peeve of mine, because I see it time and time again: Folks work on software or projects, put in a ton of effort, and then do nothing to promote the project or release. (And, for bonus points, complain that they don’t understand why the project isn’t getting more attention!)

    [...]

    This isn’t necessarily intuitive for folks, I understand. But it is absolutely, vitally, necessary. Maybe, occasionally, a project is just so darn awesome that somebody happens to stumble on it via GitHub or whatever and word of mouth makes it a success – but typically, things get out into the world via consistent updates and communications to the right channels to get the word out.

  • Tor Just Launched the Easiest App Yet for Anonymous, Encrypted IM

    The anonymity network Tor has long been the paranoid standard for privacy online, and the Tor Browser that runs on it remains the best way to use the web while revealing the least identifying data. Now the non-profit Tor Project has officially released another piece of software that could bring that same level of privacy to instant messaging: a seamless and simple app that both encrypts the content of IMs and also makes it very difficult for an eavesdropper to identify the person sending them.

    On Thursday the Tor Project launched its first beta version of Tor Messenger, its long-in-the-works, open source instant messenger client. The app, perhaps more than any other desktop instant messaging program, is designed for both simplicity and privacy by default: It integrates the “Off-the-Record” (OTR) protocol to encrypt messages and routes them over Tor just as seamlessly as the Tor Browser does for web data. It’s also compatible with the same XMPP or “Jabber” chat protocol used by millions of Facebook and Google accounts, as well as desktop clients like Adium for Mac and Pidgin for Windows. The result is that anyone can download the software and in seconds start sending messages to their pre-existing contacts that are not only strongly encrypted, but tunneled through Tor’s maze of volunteer computers around the world to hide the sender’s IP address.

  • Tor Messenger Beta: Chat over Tor, Easily

    Tor Messenger is a cross-platform chat program that aims to be secure by default and sends all of its traffic over Tor. It supports a wide variety of transport networks, including Jabber (XMPP), IRC, Google Talk, Facebook Chat, Twitter, Yahoo, and others; enables Off-the-Record (OTR) Messaging automatically; and has an easy-to-use graphical user interface localized into multiple languages.

  • Events

    • OpenStack Summit Tokyo 2015

      Yesterday I conducted my presentation about “99.999% available OpenStack Cloud – A builder’s guide”. The room was full. If you could not join, you can find the slide deck on slideshare and the video is also already available online.

    • How to keep a technical conference relevant for decades

      LISA is an annual technical conference for IT operations professionals, organized by The USENIX Association. The first LISA was held back in 1986, and the event still has a reputation for delivering top-notch technical content and an exceptional hallway track. This year, Amy Rich (Mozilla Corporation) and Cory Lueninghoener (Los Alamos National Laboratory) co-chaired the conference.

  • SaaS/Big Data

  • Oracle/Java/LibreOffice

    • Sharing Work Is Easier With An Open Document Format

      The Open Document Format (ODF) is one such format. ODF was specified by the Organization for the Advancement of Structured Information Standards (OASIS), an industry consortium which aims to produce standards for e-business.

      Key players in OASIS include the tech giants Sun Microsystems (now part of the Oracle) and IBM. Sun has been one of the main drivers of the format as it grew out of the format used by its free OpenOffice application. In 2006 the Open Document Format was approved jointly by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) as an international standard for office software.

      Sun promised not to enforce any of its patents against implementations using the OpenDocument standard, although there can be much uncertainty associated with patents.

    • LibreOffice 5.1 to Start Twice as Fast, Has MS Office 2016 Interoperability

      The first major point release for LibreOffice, the 5.1 branch, is being worked on this weekend during the 1st Bug Hunting Session. This promises to be an important upgrade that should really make a difference.

    • LibreOffice Hackfest at Hamburg

      Thanks to CIB, who sponsored the event with their office location, drinks and food, we again had a LibreOffice Hackfest at Hamburg on Saturday/Sunday October 24/25, and a get-together on Friday evening with the opportunity to meat also some long time colleagues from Sun and Star.

  • Education

    • Lawrence school district joins open source initiative

      The Lawrence school district is taking part in a new U.S. Department of Education campaign, #GoOpen, to encourage states, school districts and educators to use openly licensed educational materials.

      The Lawrence school district is one of 10 districts nationwide that have taken up the #GoOpen challenge to replace at least one textbook with openly licensed educational resources within the next year.

  • Electronic Payments

  • BSD

    • Deweloperzy OpenBSD: joshua stein

      I started using OpenBSD in 1998 (version 2.3 or 2.4) to host a BBS that I was running. I switched from Slackware Linux to OpenBSD because of its focus on security and eventually stuck with it because of its simple design and ease of administration. The ports system was a big draw for me as well.

    • Deweloperzy OpenBSD: Stefan Sperling

      I’m currently self-employed, with a focus on open source development and consulting for companies interacting with open source projects.

      Besides OpenBSD, I have been contributing to Apache Subversion since 2007. One of my main jobs is to provide support, workshops, and consulting for Subversion, plus fixing bugs and working on new features. I am somewhat involved in the Apache Software Foundation as a whole, but at this point in time my contributions there are more symbolic in nature, mostly because of lack of time and focus.

  • FSF/FSFE/GNU/SFLC

    • A road trip into the Free Software Foundation’s early days

      On my 21st birthday in 1998, I received a phone call from Richard Stallman, founder of the GNU Project and Free Software Foundation (FSF), to tell me the root password of the GNU Project’s web server.

      I’d learned about something called UNIX a great many years prior, and in 1993, on a two-week language course in Swansea, Wales, I managed to up my storage quota on the university’s Pyramid system from 2MB to 4MB, enough to download Slackware from the University of Vaasa’s FTP server and bring it back home with me.

  • Licensing

    • Christoph Hellwig Continues VMware GPL Enforcement Suit in Germany

      The lawsuit continues to progress. VMware has filed a statement of defense, in which they assert arguments for the dismissal of the action. Christoph, with the assistance of his lawyer Till Jaeger, has filed his response to these arguments. Unfortunately, VMware has explicitly asked for the filings not to be published and, accordingly, Conservancy has not been able to review either document. With the guidance of counsel, Christoph was able to provide Conservancy with a high-level summary of the filings from which we are able to provide this update. VMware’s statement of defense primarily focuses on two issues. First, VMware questions Christoph’s copyright interest in the Linux kernel and his right to bring this action. Second, VMware claims vmklinux is an “interoperability module” which communicates through a stable interface called VMK API.

    • VMware vs German kernel dev: Filings flung in Linux-lifting lawsuit

      Software Freedom Conservancy has spat out a “high level” update on the GPL enforcement case it is backing against VMware, ahead of an expected first hearing next year.

      SFC said that VMware had filed its defence against the suit brought by German kernel developer Christoph Hellwig back in March, which alleges VMware’s proprietary ESXi hypervisor products use portions of the code that Hellwig wrote for the Linux kernel, in violation of the terms of version 2 of the GPL.

  • Openness/Sharing

    • Romania prepares its second Action Plan

      “Creating an open governance process requires a larger commitment and a more engaged dialogue between the government, civil society, citizens and the private sector. Having an efficient administration can drive a better communication between public institutions, civil servants, and other stakeholders,” according to an evaluation report published by the Romanian government, which will form the basis of its second OGP Action Plan (2014-2016).

    • Can Greenpeace become an open organization?

      I’m fascinated by what the open community takes for granted. Outside FOSS, free and open source software, the idea that work needs to have a solid foundation before being released is deeply seeded. But, in open source communities we say, “Release early, release often,” a phrase I regularly substitute now for: “Throw it into the world as soon as you can formulate words around it.” Heck, even if you aren’t coherent, someone might still understand you. Go ahead and share!

    • Open Hardware

      • Novena: A Laptop With No Secrets

        Our next choice had social repercussions. When you adopt a CPU/operating-system combination, you also adopt its developers. We decided against Google Android because it’s optimized for phones and tablets, its graphical display typically shows only one application at a time, and its touch-screen paradigm is too imprecise for computer-aided design work. Therefore, in order to create a system that our target market of developers and creators could use, we decided to run on our ARM chip a version of Linux called GNU/Linux. GNU, which authored both the OS libraries and the license that the Linux kernel uses, is a coder’s organization, right down to the self-referential acronym itself (it stands for “Gnu’s Not Unix”).

      • Open Source Laptop

        Andrew “bunnie” Huang & Sean Cross tell, in great detail, how they created the Novena laptop, using solely open source software and hardware. For anyone familiar with or even interested in how computers really work, it’s quite a gripping tale. I believe their work could have lasting beneficial effects on the hobbyist computing and open source communities.

      • Open-Source Robotic Arm Exceeds 1200% of Initial Crowdfunding Goal

        The open-source robotic arm called Dobot that can be used by everyday consumers and experience makers alike has now raised over $430,000 on crowdfunding website, Kickstarter, with funds still rising.

  • Programming

    • Top 3 open source Python IDEs

      Python is everywhere. These days, it seems it powers everything from major websites to desktop utilities to enterprise software. Python has been used to write all, or parts of, popular software projects like dnf/yum, OpenStack, OpenShot, Blender, Calibre, and even the original BitTorrent client.

    • Azul’s Open Source JVM Supports Java 9 a Year Before Release

      While DZone was at JavaOne 2015 this week, Azul Systems released an early access version of Zulu, which is a certified OpenJDK build / JVM, that supports the latest JDK 9 features.

Leftovers

  • Hardware

    • Oracle ships first Sparc M7 systems with security in silicon

      ORACLE HAS STARTED SHIPPING systems based on its latest Sparc M7 processor, which the firm said will go a long way to solving the world’s online security problems by building protection into the silicon.

      The Sparc M7 chip was originally unveiled at last year’s Openworld show in San Francisco, and was touted at the time as a Heartbleed-prevention tool.

      A year on, and Oracle announced the Oracle SuperCluster M7, along with Sparc T7 and M7 servers, at the show. The servers are all based on the 32-core, 256-thread M7 microprocessor, which offers Security in Silicon for better intrusion protection and encryption, and SQL in Silicon for improved database efficiency.

  • Security

    • Intel x86 considered harmful (new paper)

      Back in summer I have read a new book published by one of the core Intel architects about the Management Engine (ME). I didn’t quite like what I read there. In fact I even found this a bit depressing, even though Intel ME wasn’t particular news to me as we, at the ITL, have already studied this topic quite in-depth, so to say, back in 2008… But, as you can see in the linked article, I believed we could use VT-d to protect the host OS from the potentially malicious ME-based rootkits (which we demonstrated back then).

    • MySQL Windows servers come under malware attack

      Researchers at Symantec say they have discovered a form of malware that attacks MySQL on Windows servers, using them to launch distributed denial of service attacks.

    • Sustaining Digital Certificate Security

      Following our notification, Symantec published a report in response to our inquiries and disclosed that 23 test certificates had been issued without the domain owner’s knowledge covering five organizations, including Google and Opera.

      However, we were still able to find several more questionable certificates using only the Certificate Transparency logs and a few minutes of work. We shared these results with other root store operators on October 6th, to allow them to independently assess and verify our research.

      Symantec performed another audit and, on October 12th, announced that they had found an additional 164 certificates over 76 domains and 2,458 certificates issued for domains that were never registered.

    • British Gas leak sees 2,400 customer passwords posted online

      COOKING AND HEATING ENABLER British Gas has confessed to a data loss that has seen the details of many of its customers released online.

      British Gas has written to affected customers to tell them that, while it may not have been hacked, the effect is the same. It has somehow managed to leak information that has found its way onto the internet and in the direction of ne-er-do-wells.

      Reports have it that 2,399 email addresses and passwords have been leaked online. A package of emails and passwords is a pretty good haul for an online exploiter, particularly if the same details are used for access on other sites and services.

  • Defence/Police/Secrecy/Aggression

    • Britain’s Poppy Fascism

      Some brave television figures refuse to go along with the established “norm”. It was Channel 4 news presenter Jon Snow who coined the phrase “poppy fascism” a few years ago when he was publicly berated by BBC journalists and other media outlets for refusing to don the flower during his nightly broadcasts. It remains to be seen if the Channel 4 news anchor will this year cave to public pressure – a pressure which seems to be growing every year.

    • Over 16,000 Alleged Terrorists Believed Dead, Yet Many Remain Watchlisted

      EVEN DEATH WON’T GET YOU OFF the U.S. terrorism watchlist. As of last July, over 3,500 suspected terrorists included in the U.S. government’s central terror database were “confirmed dead” and another 13,000 were “reportedly dead,” yet many of their names continued to be actively monitored in databases like the no-fly list, according to an intelligence assessment prepared by the Department of Homeland Security in August of this year.

    • Israel only country at UN to join US in supporting Cuba embargo

      The UN General Assembly on Tuesday called for an end to the decades-long US embargo on Cuba in a resolution adopted by a near-unanimous vote, three months after US-Cuba diplomatic ties were restored.

      The United States and Israel voted against the non-binding resolution, but a resounding 191 countries supported the measure in the 193-member assembly, the highest number ever.

    • We are lifelong Zionists. Here’s why we’ve chosen to boycott Israel.

      But we must face reality: The occupation has become permanent. Nearly half a century after the Six-Day War, Israel is settling into the apartheid-like regime against which many of its former leaders warned. The settler population in the West Bank has grown 30-fold, from about 12,000 in 1980 to 389,000 today. The West Bank is increasingly treated as part of Israel, with the green line demarcating the occupied territories erased from many maps. Israeli President Reuven Rivlin declared recently that control over the West Bank is “not a matter of political debate. It is a basic fact of modern Zionism.”

    • Sentenced to Be Crucified

      Any day now, our Saudi Arabian allies may behead and crucify a young man named Ali al-Nimr.

    • Exclusive: Saudi Arabia Admits Bombing MSF Hospital in Yemen — But Faults MSF

      Saudi Arabia’s ambassador to the UN has admitted a “mistake” was made when Riyadh-led coalition jets bombed a Doctors Without Borders hospital in Yemen, but says the medical charity provided incorrect geographic coordinates for the facility, leading to the incident.

      MSF, as the organization is known by its French acronym, reported on Tuesday that a hospital they supported in Haydan district in the northern Saada province was hit by several airstrikes starting at around 10:30PM local time on Monday. Initial blasts occurred outside the building, and all staff and patients were able to flee before it was destroyed by subsequent airstrikes. One MSF employee suffered minor injuries.

      In a statement, MSF said that the hospital’s GPS coordinates “were shared with Coalition forces. They are sent every week to the Coalition operations room, and the last time they were shared was on October 24.” The organization also said that it’s logo had been painted on the facility’s roof and was visible from the air.

    • Yemen: MSF Hospital Destroyed by Airstrikes

      Airstrikes carried out late last night by the Saudi-led coalition in northern Yemen destroyed a hospital supported by the international medical humanitarian organization Doctors Without Borders/Médecins Sans Frontières (MSF), MSF announced today.

      The small hospital, in the Haydan District in Saada Province, was hit by several airstrikes beginning at 10:30 p.m. last night. Hospital staff and two patients managed to escape before subsequent airstrikes occurred over a two-hour period. One staff member was slightly injured while escaping. With the hospital destroyed, at least 200,000 people now have no access to lifesaving medical care.

    • Saudi prince arrested on private plane with 2 tons of drugs – reports

      Lebanese security forces are interrogating a Saudi prince on charges of carrying drugs on his private plane after they allegedly retrieved 2 tons of narcotics from the aircraft, local media reported.

      Abd al-Muhsen bin Walid bin Abd al-Aziz Al Saud was detained on Monday in Beirut’s Rafik Hariri International Airport.

      The prince was about to conduct a flight on his private plane to Saudi Arabia.

    • Saudi Arabia executes people over drugs while its princes are caught with tons of drugs at the airport

      Saudi prince Abdel Mohsen bin Walid bin Abdulaziz was caught in an airport in Lebanon on Monday with over two tons of drugs.

      Lebanese security found 40 suitcases full of more than 4,000 pounds of amphetamine pills and cocaine on the prince’s private plane, which was on its way to Saudi capital city Riyadh. A security source told AFP that this was the largest smuggling operation ever foiled by Beirut International Airport security.

      While this may seem like just another case of rich and powerful aristocrats going wild, the implications of this drug bust are much more insidious: In Saudi Arabia, people are executed over drugs. And not rarely — several times a month, on average.

    • The Pentagon’s Missionary Spies: U.S. Military Used Christian NGO as Front for North Korea Espionage

      Hiramine’s NGO, Humanitarian International Services Group, or HISG, won special praise from the president for having demonstrated how a private charity could step in quickly in response to a crisis. “In the aftermath of Hurricane Katrina,” read Hiramine’s citation, “HISG’s team launched a private sector operation center in Houston that mobilized over 1,500 volunteers into the disaster zone within one month after the hurricane.”

      But as the evangelical Christian Hiramine crossed the stage to shake hands with President Bush and receive his award, he was hiding a key fact from those in attendance: He was a Pentagon spy whose NGO was funded through a highly classified Defense Department program.

  • Transparency Reporting

    • Obama Bypassed OLC on Bin Laden Killing

      This means that on the OBL raid, Donilon excluded the Attorney General in the same way Dick Cheney excluded John Ashcroft from key information about torture and wiretapping. I find that interesting enough, given hints that Holder raised concerns about the legal authority to kill Anwar al-Awlaki in the weeks after we missed him on December 24, 2009, which led to OLC writing two crappy memos authorizing that killing in ways that have never been all that convincing.

      But Savage provides no explanation for why Krass was excluded, which is particularly interesting given that the month after OBL’s killing, Savage revealed that President Obama had blown off Krass’ advice on Libya (as I read it, the decision to blow off her advice would have happened after the OBL killing, though I am not certain on that point). The silence about Krass is also remarkable given that she was looped in on the initial Libya decision — and asked to write a really bizarre memo memorializing advice purportedly given after the fact.

    • WikiLeaks emails from head of CIA reveal he ‘consulted a mental health expert’, suggested US spying on own citizens may be illegal and that his own security firm had been ‘disingenuous’ to win contract

      Highly sensitive personal details about the head of the CIA from his hacked emails have been leaked, including his phone number, home address, passport number and how he once consulted a mental health expert.

      The emails, obtained by WikiLeaks, show that John Brennan had concerns about the US spying on its own citizens and called for ‘firm criteria’, warning that the activities ‘must be consistent with our laws and reflect the democratic principles and values of our Nation’.

      The files also show how a security firm he established was accused of ‘disingenuous’ behavior by the CIA in its bid to win a government contract for a terrorist watch list.

      In a further memo released by the anti-secrecy agency, Brennan takes a swipe at former President George W. Bush for his ‘gratuitous’ labeling of Iran as part of a worldwide ‘axis of evil’.

    • European Parliament Urges Protection for Edward Snowden

      On Twitter, Mr. Snowden, the former National Security Agency contractor who leaked millions of documents about electronic surveillance by the United States government, called the vote a “game-changer.” But the resolution has no legal force and limited practical effect for Mr. Snowden, who is living in Russia on a three-year residency permit.

    • EU Parliament Calls On EU Countries To Drop All Charges Against Snowden, Protect Him From Extradition

      The EU Parliament has just approved a measure (by a narrow 285 to 281 vote) telling EU member states to “drop any criminal charges against Edward Snowden, grant him protection and consequently prevent extradition or rendition by third parties, in recognition of his status as whistle-blower and international human rights defender.” That’s pretty huge. Of course, as a resolution, it’s more symbolic than actually meaningful, because the member states may not follow through on the request. But it is an important step in the right direction.

      At the same time, the EU Parliament reviewed some other issues concerning mass surveillance, including the whole EU-US safe harbor setup. As we noted, the EU Court of Justice recently tossed out that agreement, which is really creating a huge mess for the internet right now. The EU Parliament “welcomed” the ruling, and pushed for alternatives to the safe harbor agreement. As we noted, the safe harbor agreement was a bit of a mess, but it’s important to have something in place to allow the internet to function — and the real problem was the NSA surveillance program.

    • European Parliament Says Snowden Should Be Welcomed in Europe

      The European Parliament voted on Thursday to call on its member states to welcome “human rights defender” Edward Snowden to Europe with open arms.

      The member states should “drop any criminal charges against Edwards Snowden, grant him protection and consequently prevent extradition or rendition by third parties, in recognition of his status as a whistle-blower and international human rights defender,” read the resolution.

  • Environment/Energy/Wildlife

    • Lions Declining in Africa

      A predictive population model suggests that lion populations in West, Central, and East Africa are likely to be halved in the next 20 years.

    • 22 more elephants killed by cyanide in Zimbabwe

      National park officials say 22 more elephants have been killed by cyanide in Zimbabwe, adding to a worrying poaching trend.

      A source with knowledge of an investigation of the killings says 78 elephants have been poisoned in the country this month.

      The elephants were found in the remote Sinamatella area of Hwange National Park on Monday, Zimbabwe national park officials say. The park received international attention in July as the site where American dentist Walter Palmer shot and killed Cecil the lion.

    • Joseph Stiglitz: Under TPP, Polluters Could Sue U.S. for Setting Carbon Emissions Limits

      Nobel Prize-winning economist and Columbia University professor Joseph Stiglitz warns about the dangers of the TPP, the Trans-Pacific Partnership. “We know we’re going to need regulations to restrict the emissions of carbon,” Stiglitz said. “But under these provisions, corporations can sue the government, including the American government, by the way, so it’s all the governments in the TPP can be sued for the loss of profits as a result of the regulations that restrict their ability to emit carbon emissions that lead to global warming.”

    • The African lion: what faster decline of apex predator means for ecosystems

      There is nothing as awe-inspiring as watching the brutal power of a lion capturing its prey. At close range, their throaty roars thump through your body, raising a cold sweat triggered by the fear of what these animals are capable of doing now, and what they once did to our ancestors. They are the most majestic animals left on our planet, and yet we are currently faced with the very real possibility that they will be functionally extinct within our lifetime.

      In fact, lion populations throughout much of Africa are heading towards extinction more rapidly than previously thought, according to new research by Oxford biologist Hans Bauer and colleagues, published in PNAS. The team looked at 47 sites with credible and repeated lion surveys since 1990, and found they were declining everywhere in Africa aside from four countries: Botswana, Namibia, South Africa and Zimbabwe.

    • Indonesia is burning. So why is the world looking away?

      I’ve often wondered how the media would respond when eco-apocalypse struck. I pictured the news programmes producing brief, sensational reports, while failing to explain why it was happening or how it might be stopped. Then they would ask their financial correspondents how the disaster affected share prices, before turning to the sport. As you can probably tell, I don’t have an ocean of faith in the industry for which I work. What I did not expect was that they would ignore it.

      [...]

      At the climate summit in Paris in December the media, trapped within the intergovernmental bubble of abstract diplomacy and manufactured drama, will cover the negotiations almost without reference to what is happening elsewhere. The talks will be removed to a realm with which we have no moral contact. And, when the circus moves on, the silence will resume. Is there any other industry that serves its customers so badly?

    • NASA warns of worst ever forest fires, environmental disaster, as smoke blankets six countries

      IT’S the biggest environmental disaster in our region and Australia cannot avoid being affected by its enormous reach.

      A sickening haze that has spread across southeast Asia is being described as a “crime against humanity” and has NASA warning of a disaster of its kind never before seen.

      For more than two months, raging forest fires on the Indonesian island of Sumatra have released vast plumes of smoke that has spread across neighbouring countries including Malaysia, Singapore, southern Thailand, Vietnam, Cambodia and the Philippines.

  • PR/AstroTurf/Lobbying

  • Censorship

    • AdBlock Plus accuses Axel Springer of censorship after ad-block move

      Axel Springer’s war with ad-blocking firm Eyeo’s Adblock Plus continues to rage.

      According to AdBlock Plus, the German publisher has tried to quash conversations about how to get around the wall that Axel Springer erected to keep ad block users from accessing its tabloid site Bild. Adblock Plus is claiming Axel Springer’s approach smacks of censorship.

    • Anti-Israel Activism Criminalized in the Land of Charlie Hebdo and “Free Speech“

      Worst of all, the march took place in a country that is one of the most hostile to free speech rights in the West, as France quickly demonstrated in the days after the march by rounding up and prosecuting Muslims and other anti-Israel activists for the political views they expressed. A great, best-selling book by French philosopher Emmanuel Todd released this year argues that these “free speech” marches were a “sham,” driven by many political sentiments — nativism, nationalism, anti-Muslim bigotry — that had nothing to do with free speech.

    • ORG response to David Cameron’s call for web filter law

      ORG has responded to the Prime Minister’s calls for legislation that will implement filters for adult content. This follows the European’s Parliament vote for net neutrality regulations, which will ban the current voluntary agreement made between ISPs and the government to provide filters, which some providers switch on by default.

    • UK Prime Minister Apparently Last To Realize New EU Net Neutrality Rules Mean No Porn Filtering

      The EU’s new net neutrality “protections” are largely deserving of the scare quotes, what with their myriad loopholes and built-in provisions that allow ISPs to throttle/manipulate traffic to prevent “congestion” — something that has yet to be the actual source of any ISP’s “traffic $haping” efforts.

      But what the rules did do is throw off David Cameron’s ongoing plans for a porn-free UK. And, of course — considering Cameron has no idea how ISP-level filters work, much less aware of numerous logical fallacies “supporting” his claims this will actually prevent porn consumption by minors — the Prime Minister was the last to know.

    • ‘Soft’ Censorship Threatens Serbian Press Freedom

      The Serbian government’s use of “soft” censorship remains a threat to press freedom, a report issued on Thursday by the World Association of Newspapers and News Publishers, WAN-IFRA, and the Center for International Media Assistance, CIMA, in Washington says.

      The report, “Media reform stalled in the slow lane: Soft censorship in Serbia”, was published with the support of the Open Society Foundation while BIRN Serbia was a research partner.

      The report noted that Serbia lacks a functional, vital and competitive media market.

      “Taxpayers’ funds are now one of the most important sources for survival of media outlets. However, public monies are deployed with partisan intent,” the report said.

    • Censorship at Ubud writers’ festival proves a creeping menace

      The censorship of the Ubud Writers and Readers Festival has spread from sessions discussing the 1965 anti-communist massacres to other politically sensitive topics on the resort island.

      A panel has now been scratched on the controversial reclamation of land in Benoa Bay in southern Bali for a massive luxury development that critics say will devastate the environment.

    • Ubud festival kicks off amid censorship pressure

      Last week, the UWRF organizer, however, was forced to drop all sessions that were to look at the massacre of communists in Indonesia in the 1960s following pressure from local authorities.

    • Bali Nine lawyer joins Indonesians warning against return to Suharto censorship

      Panel sessions and a film on the 1965 anti-communist massacres in Indonesia were prohibited at an international literary festival in Bali due to a 1966 government regulation banning communism and Marxism-Leninism, according to a Balinese police chief.

      Gianyar police chief Farman told Fairfax Media there was also a 1999 criminal code which made the spreading of communism, Marxism and Leninism in public a punishable offence with a maximum sentence of 12 years’ jail.

    • Ubud Writers Fest Censorship Pressure: Indonesians can’t freely talk about 1965 killings

      The Ubud Writers and Readers Festival (UWRF) has cancelled events discussing the 1965 Indonesian massacres, after police threatened to revoke the festival permit.

      I research and write about the massacres’ impact on Indonesia. I was to moderate one of the five events that were dropped from this week’s festival.

    • Censorship is returning to Indonesia in the name of the 1965 purges

      A week ago I received a message from Janet DeNeefe, director of the Ubud Writers and Readers Festival.

      “I just wanted to let you know that the UWRF is being censored this year, and we have been told to remove all programs to do with ‘1965’,” she wrote. “Or else next year they will not give us a permit to hold the festival.”

    • Report: Global internet surveillance, censorship on rise

      Governments around the world are expanding censorship and surveillance of the internet as overall online freedom declined for the fifth consecutive year, according to a report from a group that tracks democracy and human rights.

      Nearly half of 65 countries examined have seen online freedom weaken since June 2014, Freedom House said in an annual survey released on Wednesday.

      One of the steepest declines occurred in France, which passed a law that many observers likened to the US Patriot Act in the wake of the Charlie Hebdo terrorist attacks earlier this year, according to the report.

      Ukraine, mired in a territorial conflict with Russia, and Libya also experienced sharp drops.

      The report highlighted China as the country with the most severe restrictions on internet freedom, followed by Syria and Iran.

      Sri Lanka and Zambia, both of which recently underwent changes in government leadership, were credited with making the biggest improvements in overall online freedom.

    • Internet freedom falls for fifth year in row: survey

      The annual report by non-government watchdog Freedom House said the setbacks were especially noticeable in the Middle East, reversing gains seen in the Arab Spring.

      Freedom House found declines in online freedom of expression in 32 of the 65 countries assessed since June 2014, with “notable declines” in Libya, France and Ukraine.

      The researchers found 61 percent of the world’s population lives in countries where criticism of the government, military or ruling family has been subject to censorship.

      And 58 percent live in countries where bloggers or others were jailed for sharing content online on political, social and religious issues, according to the “Freedom on the Net 2015″ report.

    • Porn filters: Cameron vows to protect internet censorship from EU law

      Prime Minister David Cameron has promised to counter a European Union ruling that branded his internet porn filters illegal. He reiterated his stance that children must be protected from adult material online.

      The EU ruling states that information must be allowed to travel through the internet “without discrimination, restriction or interference.” The measures are intended to allow data companies to reduce roaming charges.

      The British government says it will protect internet companies from the EU laws and make it a legal right for the firms to use porn filters.

      Speaking in the House of Commons on Wednesday, Cameron said parents should be able to control the materials their children are exposed to.

    • UK.gov plans to legislate on smut filters after EU net neutrality ruling

      Prime Minister David Cameron confirmed today that the Tory government planned to legislate on smut filters, following yesterday’s net neutrality ruling in the European Union.

      Cameron told MPs during PMQs that he had “spluttered over my cornflakes” when he read this morning that the EU measures would fail to think of the children by protecting their prying eyes from “indecent images”.

      “I think it’s absolutely vitally important that we enable parents to have that protection for their children from this material on the internet,” he told the Palace of Westminster.

      “We worked so hard to put in place these filters,” the PM added. “But I can reassure her [Conservative MP for Derby North, Amanda Solloway] because we actually secured an opt-out yesterday so we can keep our family-friendly filters to protect children.”

    • EU Unbans Occult Websites Banned By David Cameron

      This rather shows the bias inherent in the Independent’s editorial style, for these filters applied not just to porn sites, but to websites that dealt with topics and lifestyles that somehow made David Cameron and his government uncomfortable — such as those dealing with the Occult.

    • Porn Under Attack Once Again By Clueless British Government

      Sometimes politicians make me mad enough to scream at my computer. Today is a great example of that as the British Prime Minister, David Cameron, has restated his claim that he will block internet-based porn and adult content to “protect children”.

      But this isn’t about protecting children at all, it’s about controlling the internet and stopping British people’s freedom to browse as they wish without having to subject themselves to a registration process in order to watch adult material. The whole idea of blocking porn to protect “children” is a fiction, you can’t protect children from porn – it’s impossible. And anyway “children” don’t watch porn, young adults do. Getting the government to understand the difference between a child and an adolescent is impossible though.

    • Shadow-Censorship on Social Media Sparks New Concerns for Open-Internet Advocates

      The future of information suppression may be much harder to detect—and thus enormously more difficult to counteract. The digital censors of tomorrow will not require intimidation or force; instead, they can exploit the dark art of “shadow-censorship.”

      Shadow-censorship is a way to control information by secretly limiting or obscuring the ways that people can access it. Rather than outright banning or removing problematic communications, shadow-censors can instead wall off social-media posts or users in inaccessible obscurity without the target’s knowledge. To an individual user, it just looks like no one is interested in his or her content. But behind the scenes, sharing algorithms are being covertly manipulated so that it’s extremely difficult for other users to view the blacklisted information.

      In theory, there are a variety of ways that shadow-censorship could be applied on platforms like Twitter, Facebook, and YouTube. Users may be automatically unsubscribed from blacklisted feeds without notice. Social media analytics can be selectively edited after the fact to make some posts look more or less popular than they really were. Individual posts or users can be flagged so that they are shown in as few feeds as possible by default. Or provocative content that originally escaped selective filtering may be memory-holed after the fact, retrievable only by the eagle-eyed few who notice and care to draw attention to such curious antics.

    • Putin’s New Censorship Rules Will Weaken Russian Science

      In a surprising development this past week, Russia has notified all scientists at Moscow State University (MSU) that they must submit their research papers to the state security service before they will be permitted to publish them. Nature News reports that Russia is imposing this policy on universities and research institutes throughout the country.

    • Smooth censorship in Russia

      The history of censorship in Russian media runs for pages and pages. There’s little point dealing with Soviet censorship here, but the 1990s, which many people remember as a time when press freedom prevailed, are different. Journalists of the time reminisce about how they used to push bureaucrats’ doors open, the public officials scared of them: bureaucrats and politicians had never been so vulnerable.

      The media, however, was another part of the country’s terrain of political conflict—just as articles could be pulled, so could journalists. Take Dmitry Kholodov, for instance, a journalist for Moskovsky komsomolets who died as he collected a booby-trapped suitcase in 1994. Ministry of Defence officials weren’t pleased with Kholodov’s coverage of army corruption and, having asked their subordinates to ‘shut him up’, their subordinates took the order literally.

    • S. Korean journalists criticize MoU for failing to prevent censorship

      South Korean journalists released a statement on Tuesday urging that the Ministry of Unification (MoU) demand that North Korea not interfere in their reporting during family reunions.

      The journalists from 38 media outlets criticized North Korea for interfering in their reporting during the family reunions that finished Monday at Mount Kumgang, North Korea. North Korea examined the journalists’ computers and USB drives, they said, returning the devices a day later despite the journalists’ complaints.

    • Zimbabwe: Censorship board should be abolished, says workshop group

      Zimbabwe should abolish the censorship board and other bodies censoring or regulating artistic expressions in order to comply with Zimbabwe’s new constitution. Instead a new classification board should be mandated to issue age recommendations to protect children. This was a recommendation made by arts practitioners, artists, journalists and human rights lawyers at a workshop on artistic freedom, held on 23-24 October 2015 in Harare, Zimbabwe.

      [...]

      It says the effects of art censorship or unjustified restrictions of the right to freedom of artistic expression and creativity deprive artists of means of expression and livelihood and generate important cultural, social and economic losses to society.

    • Lego refuses to supply bricks for Weiwei installation at National Gallery of Victoria because of ‘political context’

      Part of a major international exhibition planned for Melbourne has been thrown into doubt after toymaker, Lego, refused to supply building blocks for the project.
      External Link: Ai Weiwei instagram

      Chinese dissident artist Ai Weiwei said Lego refused his studio’s request for a bulk order of Lego to create an artwork to be shown at the National Gallery of Victoria.

    • Chinese activist Ai Weiwei accuses Lego of ‘censorship’

      Dissident Chinese artist Ai Weiwei says Lego refused to sell him toy bricks for his artwork, calling it an “an act of censorship and discrimination.”

    • Australia gallery collects Lego for Ai Weiwei

      An Australian gallery has set up a collection point for Lego for a work by artist Ai Weiwei, after the Danish company refused a bulk order from him.

      The National Gallery of Victoria (NGV) wants Australians to donate the toy bricks by pouring them through the sunroof of a car parked at the gallery.

    • Chinese artist Ai Weiwei fights Lego Group ‘censorship’

      Chinese artist Ai Weiwei has begun gathering the building blocks for his next artwork, asking fans from all over the world to donate their Lego pieces for use in his next project.

    • Video showing censorship plan by Erdoğan’s chief advisor sparks outrage

      There has been a recent development concerning the removal of critical channels from TV streaming platforms in which newly emerged video footage provides evidence that such movements are politically motivated, as the chief advisor of President Recep Tayyip Erdoğan is featured urging a minister to drop critical TV channels from the state-owned Turkish Satellite Communications Company (Türksat) — a move that has attracted widespread criticism.

    • US says Turkey not keeping with democratic values after media takeover

      The United States has reiterated its concern over the hostile takeover of five media outlets in Turkey, saying that Turkey is not keeping with its own democratic values.

    • Turkish Police Storm TV Channels Linked to Erdogan Foe Gulen

      Cops sprayed water cannon to disperse crowds in front of the offices of Kanalturk and Bugun TV in Istanbul, a live broadcast on Bugun’s website showed.

      The media groups are owned by Koza Ipek Holding, which has links to Islamic preacher Fethullah Gulen. The authorities on Tuesday took over 22 companies owned by Koza Ipek in an investigation of alleged financial irregularities, including whether it funded Gulen. The company denies wrongdoing.

    • International press rights groups slam growing censorship in Turkey
    • Shutting down online comments: Censorship or sanity?

      Vile comments and phenomena such as trolling are simply a small part of the avalanche of electronic detritus that we have to learn to cope with as the internet revolution progresses. Dubious and unethical practices have proliferated and yet, the only sustained attempt to moderate the internet, in China, is notable for its failures as Chinese internet users have quickly learnt how to dodge censors and spread news and opinions in flash comments reaching hundreds of millions.

      Racist and violent comments can easily be identified, and then simply ignored. Many websites urge users “not to feed the trolls”, even with traffic signs. In Brazil, trolls are called pombos enxadristas (chess player pigeons), and the advice is not to play them, since all they can do is defecate on the board and knock over the pieces.

    • Malaysian cartoonist facing 43 years in prison

      Malaysian cartoonist Zulkiflee Anwar Haque, aka Zunar, is facing nine simultaneous charges under the country’s Sedition Act and will appear in court on 6 November. He could be sentenced to 43 years in prison for drawing cartoons that mock Malaysia’s corrupt government officials.

      Ahead of his court appearance, Zunar is coming to the UK to display a small selection of his work as part of the permanent exhibition at the Cartoon Museum and several other events.

    • Government Censorship Of Internet Speech

      Repressive regimes have sought to quell the speech of dissidents throughout history, and long before the advent of the Internet. It therefore is not entirely surprising that attempted censorship by governments will continue in the online world. But, hopefully, the Internet will help to foster free speech and communication, and will not be a means of governmental surveillance on citizens.

    • Quentin Tarantino, the NYPD and the First Amendment

      Filmmaker Quentin Tarantino exercised his First Amendment rights by speaking at a New York City protest against police brutality. At the October 24 event, he denounced “police terror,” and reportedly said this: “I have to call a murder a murder, and I have to call the murderers the murderers.”

      In response, Patrick Lynch, the head of New York’s Patrolmen’s Benevolent Association union, called Tarantino a “cop-hater” and said that it was “time for a boycott of Quentin Tarantino’s films.” A union affiliated with the Los Angeles Police Department has reportedly endorsed the boycott as well.

    • Arpat uproar points to censorship flaws

      The hullabaloo around the Thai film Arpat, which features a misbehaving young monk, is the latest example of problems caused by what some people in the film industry perceive as flaws in the Film and Video Act 2008.

      Some of the controversial aspects of the law, which was passed by the coup-appointed National Legislative Assembly, include the composition of the censor committees, and the measure that allows a film to be banned for national security reasons.

      Also criticised were a conservative interpretation of the rules, and most importantly strict state control over film, compared to lighter regulation of other cheaper and more accessible media such as television and print.

    • Bollywood Directors and TVF Comedians Troll Censorship in New Video

      Kanu Behl, the debutant director of Titli which releases this Friday, October 30, along with producer Dibakar Banerjee, teamed up with TVF to make an episode on censorship in India. The fun video Censor Qtiyapa which released online on October 26, has gone viral and got more than two lakh views in less than 24 hours.

      The video featuring eminent filmmakers Mahesh Bhatt, Sudhir Mishra, Hansal Mehta, Kamal Swaroop, Ajay Bahl, producer Guneet Monga, Vasan Bala along with the Titli director and producer is directed by Shlok Sharma (director of Haramkhor).

      Excited about the tremendous response, the director Kanu Behl says, “The response to the video has been overwhelming. Close to 2 lakh hits in less than 24 hours, as we write this. It’s interesting to know that the audience across the board can bite in to the humour and get all the nuances of a film maker’s labour pains!”

    • Google Asked to Remove One Billion “Pirate” Search Results

      Copyright holders have asked Google to remove more than 1,000,000,000 allegedly infringing links from its search engine in recent years. The remarkable milestone, reached this week, is at the center of an ongoing debate over how search engines are expected to deal with pirate sites.

    • How The EU’s Proposed New ‘Privacy’ Rules Will Be A Tool For Massive Censorship

      We recently wrote about some concerns about the new Data Protection Directive that is being set up in Europe. The law is driven by people with good intentions: looking to better protect the privacy of European citizens. Privacy protection is an important concept — but the current plans appear to be so focused on privacy protection that it gives very little regard for the unintended consequences of the way it’s been set up. As we wrote in our last post, Daphne Keller at Stanford’s Center for Internet and Society is writing a series of blog posts raising concerns about how the new rules clash with basic concepts of free speech. She’s now written one about the immensely troubling setup of the “notice and takedown” rules included in the General Data Protection Regulation (GDPR). For years, we’ve been concerned by problematic notice and takedown procedures — we’ve seen the DMCA frequently abused to stifle speech, rather than for genuine copyright challenges. But, for some reason, people often immediately leap to “notice and takedown solutions” for any kind of content they don’t like, they and the drafters of the GDPR are no different.

  • Privacy

    • JLENS blimp returns to Earth in Central Pennsylvania; military recovery ‘in progress’

      The military surveillance blimp that broke free of its mooring at Aberdeen Proving Ground Wednesday morning has returned to Earth after a four-hour, 160-mile, power line-snapping odyssey, authorities said.

      NORAD spokesman Michael Kucharek said the runaway aircraft was on the ground near Moreland Township, Pa. — 160 miles north of its mooring in Edgewood — and was deflating. The blimp had slowly been losing helium, he said, and appears to have drifted to the ground.

    • Runaway Military Surveillance Blimp Drifts From Maryland to Pennsylvania

      Military officials scrambled Wednesday to retrieve an unmanned Army surveillance blimp that detached from its moorings in Maryland and drifted north over Pennsylvania.

      Two American fighter jets tracked the blimp, military officials said, that had been tethered at Aberdeen Proving Ground and broke free around noon.

    • Billion Dollar Surveillance Blimp to Launch over Maryland

      In just a few days, the Army will launch the first of two massive blimps over Maryland, the last gasp of an 18-year-long $2.8-billion Army project intended to use giant airships to defend against cruise missiles.

      And while the blimps may never stave off a barrage of enemy missiles, their ability to spot and track cars, trucks and boats hundreds of miles away is raising serious privacy concerns.

    • Did Your Senator Vote for CISA?

      The most outspoken group opposing the bill, Fight For the Future, noted in a scathing statement that the vote would be one we one day look back at as being formative for the internet.

      “This vote will go down in history as the moment that lawmakers decided not only what sort of Internet our children and our children’s children will have, but what sort of world they will live in,” the group wrote in an emailed statement. “Every Senator who voted for CISA has voted for a world without freedom of expression, a world without true democracy, a world without basic human rights.”

      It may not be that simple, but then again, maybe it is. So here’s a list of who voted for CISA, who voted against it, and who abstained. Republican presidential candidates Marco Rubio, Ted Cruz, Rand Paul, and Lindsey Graham are all in Denver for Wednesday’s debate. Paul is anti-CISA but didn’t think it was worth sticking around in Washington for the vote.

    • U.S. Senate Roll Call Votes 114th Congress – 1st Session
    • Mark Zuckerberg Courts China With Speech on People and Perseverance
    • Mark Zuckerberg, in India, Defends Facebook’s Plan to Expand Internet Access [Ed: zero-rating]

      Despite the promising, if difficult to verify, statistics, the program has not gone without complaints in India, the world’s largest democracy. Critics argue that by controlling which companies and individuals can offer services on Internet.org, Facebook is creating a walled-off kingdom in which it decides the beneficiaries of its initiative.

    • Email Encryption Is Broken

      Email was never designed to be private. When the Simple Mail Transfer Protocol (SMTP) was first invented, it didn’t come with protections or ways to check that a message really came from where it claimed to. Those came later, with the addition of extensions like STARTTLS for encrypting communications and others for authenticating messages.

    • Turns Out Police Stingray Spy Tools Can Indeed Record Calls

      The federal government has been fighting hard for years hide details about its use of so-called stingray surveillance technology from the public.

      The surveillance devices simulate cell phone towers in order to trick nearby mobile phones into connecting to them and revealing the phones’ locations.

      Now newly released documents confirm long-held suspicions that the controversial devices are also capable of recording numbers for a mobile phone’s incoming and outgoing calls, as well as intercepting the content of voice and text communications. The documents also discuss the possibility of flashing a phone’s firmware “so that you can intercept conversations using a suspect’s cell phone as a bug.”

    • Low-cost IMSI catcher for 4G/LTE networks tracks phones’ precise locations

      Researchers have devised a low-cost way to discover the precise location of smartphones using the latest LTE standard for mobile networks, a feat that shatters widely held perceptions that the standard is immune to the types of attacks that targeted earlier specifications.

      The attacks target the LTE specification, which is expected to have a user base of about 1.37 billion people by the end of the year, and require about $1,400 worth of hardware that run freely available open source software. The equipment can cause all LTE-compliant phones to leak their location to within a 32- to 64-foot (about 10 to 20 meter) radius and in some cases their GPS coordinates, although such attacks may be detected by savvy phone users. A separate method that’s almost impossible to detect teases out locations to within an area of roughly one square mile in an urban setting.

    • Europe wants a fresh data transfer pact with the US

      The European Union said on Monday it agreed in principle with the US on a new trans-Atlantic data transfer pact that’s still in the works, reports The Wall Street Journal.

      Earlier this month, a European court invalidated Safe Harbor, a 15-year old agreement that included laws which allowed technology companies to move user data between data centers if they guaranteed it would receive an “adequate level” of protection.

      The ruling came after Austrian privacy activist Max Schrems brought a case against Facebook in Ireland claiming that his privacy had been violated by the NSA’s mass surveillance programs. Following the court’s decision, Irish authorities said last week that they plan to investigate the social network’s data transfers under the act.

    • U.S. sees new EU data-sharing pact within reach

      A new transatlantic data-sharing agreement is within reach after the “Safe Harbour” deal used by thousands of companies to comply with EU privacy law was struck down by the highest EU court this month, U.S. Secretary of Commerce Penny Pritzker said.

      The so-called “Safe Harbour 2.0″ agreement currently being negotiated would meet European concerns about the transfer of data to the United States, Pritzker told journalists in Frankfurt on Thursday during a visit to Germany.

    • Safe Harbor 2.0: Judges to keep NSA spying in check – EU justice boss

      The NSA’s blanket surveillance of Europeans will be subject to judicial review, according to EU Justice Commissioner Vera Jourová.

      At a committee meeting of the European Parliament this week, Jourová provided details of the replacement to the struck-down safe harbor framework, which until this month allowed people’s personal information to flow across the Atlantic and into American servers.

      She told the hearing the new agreement would move away from the previous self-regulatory approach to one that allows for “pro-active” enforcement and sanctions.

    • EU Round-UP: Safe Harbor 2.0 And Upcoming National Challenges
    • Germany to investigate Google, Facebook data transfers to US

      Data protection authorities in Germany have announced that they will review the legality of internet giants’ data transfers from the EU to the US, after the European Court of Justice ruled that Europeans’ data isn’t safe from intelligence services on US-based servers.

    • Germany investigates claims of NSA-backed malware spying

      When word got out that both the US’ NSA and the UK’s GCHQ were likely using purpose-built Regin malware for their spying campaigns, that raised more than a few alarm bells… including in the German government, apparently. The country’s prosecutor’s office has launched an investigation into a report that Regin infected (and thus monitored) the laptop of a Chancellery division leader. Officials aren’t jumping to conclusions yet, but it’s easy to guess where their suspicions lie — the concern is that allies are hacking into the devices of multiple German higher-ups, not just its Chancellor. If the evidence holds up, it could worsen political relationships that have already turned a bit sour.

    • Top German official infected by highly advanced spy trojan with NSA ties

      German Chancellor Angela Merkel may not be the only high-ranking leader from that country to be spied on by the National Security Agency. According to a report published over the weekend, German authorities are investigating whether the head of the German Federal Chancellery unit had his laptop infected with Regin, a highly sophisticated suite of malware programs that has been linked to the NSA and its British counterpart, the Government Communications Headquarters.

    • The Economic Consequences Of State Surveillance Programs

      State surveillance programs spell serious consequences for business — could Canada be next?

    • Anti-Surveillance Campaign Urges NSA Employees to Quit their Posts

      As part of the campaign, which is called Intelexit, the group have sought to place billboards as close as possible to the intelligence agency’s buildings across the world.

      A billboard posted near the NSA outpost and military base in Darmstadt, Germany, for example, said: “listen to your heart, not to private phone calls.”

      The group is planning to place a billboard outside GCHQ headquarters in Cheltenham, UK. It is expected to read “the intelligence community needs a backdoor,” in a jibe at the UK and US governments, who are attempting to push through legislation allowing them to de-crypt all encrypted digital communications between their citizens.

    • The Senate’s New ‘Give the NSA All Your Private Info’ Bill Would Make George Orwell Blush

      While nobody was watching, the Senate a couple of days ago passed something called the Cybersecurity Information Sharing Act (CISA), which passed at least partly because if you say “Cyber warfare, boogedy-boogedy!” around nervous legislators these days, they’ll pass a bill agreeing to have the NSA plant microchips in their spleens. The bill passed by one of those bipartisan majorities so beloved by Beltway pundits, 74-21. Now it goes to conference, and its final passage may be stalled because of the currently fluid state of the House Republican leadership.

    • These Senators Voted “Yes” on CISA, But There’s Still Time to Change Their Minds

      As a cybersecurity bill, CISA is a joke: It doesn’t address the security problems that create the conditions for hacks. What it will create a streamlined information pipeline for the NSA.

    • Is the NSA trying to warn us that cryptography is dead?

      Back in August, the NSA released an updated advisory that was at once interesting and expected: It said that the world had to prepare for the oncoming impact of quantum computers, and the possibility that these devices could render existing computer cryptography almost completely obsolete. They called for the cryptographic community to invest heavily in developing so-called post-quantum cryptographic solutions that could survive this hypothetical watershed invention. And, as you might imagine, this advisory has very nearly driven the internet insane. Now, two security researchers have published a paper compiling all the various theories surrounding this advisory, and trying to make sense of the situation.

    • Online freedom hit as governments ramp up surveillance

      Global online freedom declined for a fifth consecutive year as governments around the world stepped up surveillance and censorship efforts, a study showed Wednesday.

      The annual report by non-government watchdog Freedom House said the setbacks were especially noticeable in the Middle East, reversing gains seen in the Arab Spring.

      Freedom House found declines in online freedom of expression in 32 of the 65 countries assessed since June 2014, with “notable declines” in Libya, France and Ukraine.

    • Mass surveillance: EU citizens’ rights still in danger, says Parliament

      Too little has been done to safeguard citizens’ fundamental rights following revelations of electronic mass surveillance, say MEPs in a resolution voted on Thursday. They urge the EU Commission to ensure that all data transfers to the US are subject to an “effective level of protection” and ask EU member states to grant protection to Edward Snowden, as a “human rights defender”. Parliament also raises concerns about surveillance laws in several EU countries.

    • UK government: We don’t want backdoors, just access to all communications

      The UK government has said that it recognises the “essential role that strong encryption plays in enabling the protection of sensitive personal data and securing online communications and transactions,” and does not “advocate or require the provision of a back-door key or support arbitrarily weakening the security of internet applications and services.” However, speaking in the House of Lords, the Parliamentary Under-Secretary of State at the Department for Culture, Media and Sport, Baroness Shields, went on to say: “This is not about creating back doors; this is about companies being able to access communications on their network when presented with a warrant.”

      Shields singled out “an alarming movement towards end-to-end encrypted application” for criticism. She said that David Cameron “expressed concern that many companies are building end-to-end encrypted applications and services and not retaining the keys. The Prime Minister has repeatedly said that there cannot be a safe place for terrorists, criminals and paedophiles to operate freely, with impunity and beyond the reach of law.” For this reason, she claimed, “It is absolutely essential that these companies which understand and build those stacks of technology are able to decrypt that information and provide it to law enforcement in extremis.”

    • UK police push for powers to access your Web browsing history for the last year

      UK police are lobbying the government to be given access to every UK Internet user’s Web browsing history as part of the new Snooper’s Charter—the Investigatory Powers Bill—which is expected to be published next week. According to The Guardian, the police want to revive the controversial plan for ISPs to store details about every website visited by customers for 12 months, an idea first mooted in the original Communications Data Bill, which was dropped after opposition from the Liberal Democrats when they were part of the previous coalition government.

      Richard Berry, the National Police Chiefs’ Council spokesman for data communications, is quoted as saying: “We essentially need the ‘who, where, when and what’ of any communication”—who initiated it, where were they and when did it happened. And a little bit of the ‘what’, were they on Facebook, or a banking site, or an illegal child-abuse image-sharing website?”

    • Police to be granted powers to view your internet history

      Police are to get the power to view the web browsing history of everyone in the country.

      Home Secretary Theresa May will announce the plans when she introduces the Government’s new surveillance bill in the House of Commons on Wednesday.

      The Telegraph understands the new powers for the police will form part of the new bill.

    • Michigan State Police Used Forfeiture Funds To Upgrade Its Stingray

      There are a few ways law enforcement agencies acquire cell tower spoofers. Very rarely do agencies pay for these expensive devices themselves. (Meaning with their funds drawn from their own departments. Obviously, no government agency is self-funded.) In most cases, funding in whole or in part is obtained from the DHS — something nearly any agency can obtain simply by checking [X] BECAUSE TERRORISM when applying for a Homeland Security grant.

    • Open source intelligence techniques and the Dark Web

      Techniques like Open Source Intelligence (OSINT) gathering and a proper understanding of the Dark Web is the first step in combating the Internet’s dark places. With an understanding of how to use open source encrypted anonymity services safely, organisations can explore OSINT sources – which include web-based communities, user-generated content, social-networking sites, wikis, blogs and news sources – to investigate potential threats or analyse relevant information for business purposes.

      Whether that’s using Deep and Dark web sites and directories to support intelligence gathering for investigation purposes, manage incidents or to combat cyber crime.

    • Court says it’s legal for NSA to spy on you because Congress says it’s OK

      You gotta love this twisted logic.

      In May, a federal appeals court declared the National Security Agency’s bulk telephone metadata collection program illegal because it wasn’t authorized under the Patriot Act, as the Obama administration and its predecessor administration had maintained.

      Then, in June, Congress semi-dismantled the program with the passage of the USA Freedom Act, which President Obama signed on June 2. As part of the new act, Congress authorized a spying transition period of sorts where the old tactics could continue until new laws were in place.

    • Ex-NSA Cybersecurity Leader’s Startup Secures $32.5M

      IronNet, a cybersecurity company founded by the former director of the National Security Agency and head of U.S. Cyber Command, secured $32.5 million in a Series A funding round.

    • IronNet, Founded by Ex-NSA Boss, Gains Funding
    • Ex-NSA head’s start-up raises $32.5m

      Former US National Security Agency (NSA) director Keith Alexander’s cyber security start-up, IronNet Cybersecurity, said yesterday it had raised $32.5 million in a “Series A” funding round led by Trident Capital Cybersecurity.

    • Former NSA Subcontractor Pleads Guilty To Filing False Time Sheets

      A former National Security Agency (NSA) subcontractor from Augusta has pleaded guilty to charges that he filed falsified time sheets.

    • NSA-Proof Wallpaper? Utah Company Invents Material to Keep Spies Out
    • The IRS Has Some of the Same Spy Tech As the NSA and FBI

      Previous investigations by the ACLU have shown that Stingrays are used by many government agencies—including the DEA, FBI, NSA, and local and state police​—across many states. Their use is so widespread in part because they only require a relatively low-level court order for use, which makes them an enticing alternative to attempting to get actual cell tower records with a warrant.

    • More on Standing As a Barrier to Surveillance Challenges: Bug or Feature?
    • United States judge dismisses Wikimedia lawsuit over NSA mass spying
    • Two ACLU Defeats Highlight Judiciary’s Lopsided Deference to Executive Branch Secrecy

      The American Civil Liberties Union suffered major defeats on Friday, when two of its cases involving clear violations of civil rights and civil liberties were dismissed, both undone by the judiciary’s deference to executive-branch secrecy.

    • Federal judge dismisses challenge to NSA surveillance

      The court modeled its opinion on the US Supreme Court’s 2013 decision in Clapper v. Amnesty International [JURIST report] that on matters of unconstitutionality surrounding intelligence gathering, the court is to be particularly rigorous.

  • Civil Rights

    • Newsnight journalist’s laptop seized by UK police under Terrorism Act

      Police have used special powers from the counter-terrorism laws in order to seize a laptop that belongs to a journalist from BBC Newsnight, it has emerged.

      The BBC and Secunder Kermani, who joined the broadcaster’s flagship current affairs programme last year and has reported extensively on UK-born jihadis, were the target of an order officers obtained from a judge under the Terrorism Act.

      Police sought the order to read communications between Kermani and a man in Syria who had publicly identified himself as a member of Islamic State and who had featured in Newsnight reports.

    • Police use terror powers to seize BBC Newsnight journalist’s laptop

      Police have used powers under the Terrorism Act to seize the laptop of a young Newsnight journalist in a case that has shocked BBC colleagues and alarmed freedom of speech campaigners, The Independent can disclose.

      Officers obtained an order from a judge that was served on the BBC and Secunder Kermani, who joined the flagship BBC2 news show early last year and has produced a series of reports on British-born jihadis.

      The development has caused alarm among BBC journalists. The editor of Newsnight, Ian Katz said: “While we would not seek to obstruct any police investigation we are concerned that the use of the Terrorism Act to obtain communication between journalists and sources will make it very difficult for reporters to cover this issue of critical public interest.”

    • Media Figures Blame Student After She Is Slammed To The Ground By Police Officer

      Media figures defended a school resource officer who was seen on video violently “slamm[ing] to the ground” a student in South Carolina, and blamed the student for not showing the officer and her teachers respect.

    • Student Arrested Says She Was Standing Up for Classmate

      Niya Kenny, 18, is speaking out after she was taken into custody in her Spring Valley High School math class. She says she was standing up for her classmate who was being arrested by Student Resource Officer Ben Fields.

    • Second student arrested for filming classroom takedown describes officer’s reputation: “He’s known as Officer Slam around our school”

      Officer Ben Fields, the South Carolina deputy who slammed and then threw a female high school student across a classroom this week, has been fired after video of his physical assault went viral. While the young girl recovers from injuries she sustained from the attack, according to her lawyer, officials have refused to drop criminal charges of disrupting a classroom against her and now one of the few students who protested against her violent arrest is speaking out about the fired deputy’s longstanding reputation at Spring Valley High.

    • Police clash with Kosovo Albanian protesters

      United Nations police fired tear gas during clashes with ethnic Albanians protesting in the Kosovo capital yesterday against a UN plan on the fate of the breakaway Serbian province.

    • Europe Union Risks ‘Tectonic Changes’ as Migrant Flow Swells to Over 700,000

      Europe’s worst migration crisis since World War II risks triggering “tectonic changes”, a top EU official warned Tuesday, as figures showed more than 700,000 newcomers have reached the continent’s Mediterranean shores this year.

    • Court: Your Fourth And Fifth Amendment Rights No Longer Exist If You Leave The Country

      The DC Appeals Court has just come to an unfortunate conclusion: because terrorism exists, your rights as a citizen will not be upheld if you travel outside of the United States. This summary of the case is from Lawfare’s David Ryan, whose article claims this is a “victory” for the DOJ, rather than a loss for the American public.

    • Victory for DOJ in Bivens Suit Related to Overseas Terrorism Investigation

      The Department of Justice won a significant victory yesterday when the D.C. Circuit held in Meshal v. Higgenbotham that a plaintiff cannot state a cause of action under Bivens for alleged constitutional violations that occur during a terrorism investigation in a foreign country.

    • Marking One Year in Prison for Alaa Abd El Fattah

      Alaa is currently serving a five-year sentence for his role in a protest just two days after the passing of Egypt’s 2013 anti-protest law. While many others involved in the protest were pardoned after serving their first year, Alaa, along with Ahmed Abdel Rahman, has remained imprisoned. Since January 2011, when Egypt rose up against Hosni Mubarak, Alaa has spent more than 500 days in prison. His first arrest after the revolution coincided with his second trip to the United States, to attend RightsCon. He left San Francisco to fly directly back to Cairo, where he immediately faced a military prosecutor and a set of trumped-up charges that kept him in jail for 55 days. He has since been in and out of prison several times. He missed the birth of his first child, Khaled, and the death of his father last summer. He has undoubtedly missed so much more.

    • “With ‘free’ services, you are the product”: Censorship, the internet — and why fighting back works

      I am a free speech absolutist. Free speech, however, does not protect criminality, or threats of violence.

      Threats of violence must be taken seriously and prosecuted by law enforcement.

      That’s why — like The Rebel — I’m watching the case of “Israel vs Facebook” very closely.

      There’s no reason why companies such as Twitter or Facebook should be protected from legal actions when clear and present threats are being uploaded and circulated on their networks. As private companies, they can decide who is allowed to have an account or not, but they have a responsibility to existing criminal laws regarding threats of violence against general or specific targets.

    • USDA whistleblower claims censorship of pesticide research

      A senior scientist at the U.S. Department of Agriculture filed a whistleblower complaint on Wednesday accusing the federal agency of suppressing research findings that could call into question the use of a popular pesticide class that is a revenue powerhouse for the agrichemical industry.

      Jonathan Lundgren, a senior research entomologist with the USDA’s Agriculture Research Service who has spent 11 years with the agency based in Brookings, S.D., said that retaliation and harassment from inside USDA started in April 2014, following media interviews he gave in March of that year regarding some of his research conclusions.

      Lundgren’s work has included extensive examination of a class of insecticides known as neonicotinoids, or neonics, which are widely used by U.S. farmers to control pest damage to corn and other crops, helping protect production. The insecticides are sold in forms that both are sprayed on plants or coated on seeds before they are planted. They are also used on plants sold by lawns and garden retailers.

    • DEA Agents Caught Soliciting Prostitutes Rewarded With Light Punishments, Bonus Checks

      At the end of September, Brad Heath and Meghan Hoyer of USA Today published a DEA disciplinary log they’d obtained through an FOIA request. The document was obviously misnamed, as it showed plenty of misconduct by DEA agents, but not much in the way of discipline.

    • VICTORY: State Department Decides Not to Classify “Cyber Products” as “Munitions”

      This week, the U.S. Department of State’s Defense Trade Advisory Group (DTAG) met to decide whether to classify “cyber products” as munitions, placing them in the same export control regime as hand grenades and fighter planes. Thankfully, common sense won out and the DTAG recommended that “cyber products” not be added to the control list. EFF and Access Now filed a brief joint statement with the DTAG urging this outcome and we applaud the DTAG’s decision.

      There were a number of problems with the proposal to place “cyber products” on the U.S. Munitions List, but most importantly, no one knows how “cyber products” would be defined. As we’ve long argued in other contexts, trying to draw definitions around “defensive” and “offensive” tools is essentially impossible and any vagueness would have significant chilling effects on the security community. In essence, we think that the threshold problem of defining which “cyber products” are subject to control is likely an insurmountable obstacle to effective regulation.

    • An Award for a Jailed Saudi Blogger

      Saudi blogger Raif Badawi was sentenced last year to a decade in prison and 50 lashes a week for 20 weeks—a punishment that has been carried out once so far—for the crime of insulting Islam on his website. On Thursday, the European Parliament awarded Badawi the Sakharov Prize, its human-rights award.

      “The conference of Presidents decided that the Sakharov Prize will go to Saudi blogger Raif Badawi,” Martin Schulz, the parliament’s president, said. “This man, who is an extremely good man and an exemplary good man, has had imposed on him one of the most gruesome penalties that exist in this country which can only be described as brutal torture.”

      Schulz called on Saudi King Salman to release Badawi, who was arrested in 2012 and initially sentenced to 600 lashes and seven years in prison—a punishment that was increased to 1,000 lashes and 10 years in prison after an appeal. Badawi was accused of insulting Islam on his website Free Saudi Liberals, which served as a forum for debate.

  • Internet/Net Neutrality

    • EU Parliament adopts highly ambiguous Net Neutrality legislation

      Unfortunately, MEPs have created large loopholes and left ambiguity in much of the legislation. Net neutrality is the principle whereby Internet access providers treat internet traffic equally. Because of the vagueness of the new regulations, telecoms regulators in EU Member States will now have to decide whether telecoms companies in their country will be able to prioritise different categories of data.

    • Wi-Fi was no accident

      Wi-Fi is an incredible success story– carrying the majority of Internet traffic, responsible for over $90 billion in economic value for the United States in 2013 and a powerful force in closing the digital divide. The success of Wi-Fi demonstrates the power of unlicensed spectrum. But how did we get here? The story of how technologies like Wi-Fi have come to have such a significant impact on our lives will help us think about the future of unlicensed spectrum.

    • The FCC Has To Remind ISPs Not To Spend Taxpayer Subsidies On Booze, Trips To Disney World

      For many years now, the General Accounting Office has warned the FCC that if it’s going to throw billions of dollars at giant ISPs, it might just want to track how that money is spent. GAO reports like this one from 2009 (pdf) noted that not only has the FCC historically done a dismal job at tracking subsidy spending, most government broadband policies have been based on flawed, incomplete or downright hallucinated data (just check out our $300 million US broadband map). In other words, for the better part of fifteen years our government not only didn’t really know where broadband funding was needed, it couldn’t be bothered to track if it was actually going there.

    • Mark Zuckerberg: net neutrality is a first-world problem

      Facebook founder Mark Zuckerberg has hit out at net neutrality advocates who claim that zero-rating – the practice of offering access to certain popular online services for free – should be prohibited.

    • Telekom will put a cash till on Internet video/gaming/coms and monetize it from start-ups
    • A multi-speed Europe

      INTERNET providers will be barred from charging online businesses for “fast lanes”—that is, giving priority to their traffic—except for certain specialised services, such as videoconferencing or telesurgery. They also must not block or slow traffic other than reasonably to manage their networks, such as to avoid congestion.

  • Intellectual Monopolies

    • Lego Tells Political Artist To Hit The Bricks, Refusing To Sell Him Legos

      LEGOs. Yes, the basic building block of our youthful imagination also holds a rather ugly over-protective side, in which it uses whatever tool happens to be nearest by to smash up any use of its products that it doesn’t fully endorse. Which, when you think about it, is really weird for a company that makes products that are essentially all about imaginative uses. Children building their own colorful castle? Awesome! But an adult using LEGOs to create political art? Oh, no, no, no.

    • 3D printing may not be for every home–and that is a good thing for IP

      Will IP matter? The question seems to arise in the wake of every new disruptive technology. It is no surprise, therefore, that it is being asked in connection with 3D printing, where digital content, easily distributed over the network, is married to the potential for making a myriad of objects in any location where a 3D printer can be operated (think: your home). If the concern a decade ago was how to regulate the downloading of a movie or a song, today it is how to regulate the downloading of a digital file containing all the instructions to make a perfect copy of a product, down to its trade mark. Recalling the discussion a decade or two ago regarding the downloading of digital songs and movies, suggestions are made for various technological solutions. More generally, calls are made for a cultural make-over, where the consumer will habitually come to prefer the genuine product, e.g., using authorized digital instructions and the correct product materials, within the context of 3D printing.

    • Copyrights

      • Dotcom’s Bid to Halt Extradition Hearing Fails, Defense Begins

        Efforts by Kim Dotcom’s legal team to have his extradition hearing thrown out have failed today. As a result the Megaupload founder will begin his defense next week, presenting legal argument that he hopes will stop New Zealand authorities sending him to the United States. Defiant, Dotcom insists that he “won’t be silenced by bullies!”

      • Academics have found a way to access insanely expensive research papers—for free

        Most academic journals charge expensive subscriptions and, for those without a login, fees of $30 or more per article. Now academics are using the hashtag #icanhazpdf to freely share copyrighted papers.

        Scientists are tweeting a link of the paywalled article along with their email address in the hashtag—a riff on the infamous meme of a fluffy cat’s “I Can Has Cheezburger?” line. Someone else who does have access to the article downloads a pdf of the paper and emails the file to the person requesting it. The initial tweet is then deleted as soon as the requester receives the file.

      • Copyright Fail: ‘Pirating’ Academic Papers Not Only Commonplace, But Now Seen As Mainstream

        Techdirt has been writing about open access for many years. The idea and practice are certainly spreading, but they’re spreading more slowly than many in the academic world had hoped. That’s particularly frustrating when you’re a researcher who can’t find a particular academic paper freely available as open access, and you really need it now. So it’s no surprise that people resort to other methods, like asking around if anyone has a copy they could send. The Internet being the Internet, it’s also no surprise that this ad-hoc practice has evolved into a formalized system, using Twitter and the hashtag #icanhazpdf to ask other researchers if they have a copy of the article in question. But what is surprising is that recently there have been two articles on mainstream sites that treat the approach as if it’s really quite a reasonable thing to do.

      • Spotify reduces piracy, but also cuts into digital track sales

        New research from the European Commission’s Joint Research Centre shows that Spotify has helped to reduce the level of piracy in the countries where it is available. The work also reveals that Spotify reduces the number of digital track sales, but that those losses are cancelled out by the licensing fees paid by Spotify.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Computer-Generated Patent Applications Show That Patents and Innovations Are Very Different Things

    The 'cheapening' of the concept of 'inventor' (or 'invention') undermines the whole foundation/basis of the patent system and deep inside patent law firms know it



  2. Concerns About IBM's Commitment to OpenSource.com After the Fall of Linux.com and Linux Journal

    The Web site OpenSource.com is over two decades old; in its current form it's about a decade old and it contains plenty of good articles, but will IBM think so too and, if so, will investment in the site carry on?



  3. Electronic Frontier Foundation Makes a Mistake by Giving Award to Microsoft Surveillance Person

    At age 30 (almost) the Electronic Frontier Foundation still campaigns for privacy; so why does it grant awards to enemies of privacy?



  4. Caturdays and Sundays at Techrights Will Get Busier

    Our plan to spend the weekends writing more articles about Software Freedom; it seems like a high-priority issue



  5. Why Techrights Doesn't Do Social Control Media

    Being managed and censored by platform owners (sometimes their shareholders) isn’t an alluring proposition when a site challenges conformist norms and the status quo; Techrights belongs in a platform of its own



  6. Patent Prosecution Highways and Examination Highways Are Dooming the EPO

    Speed is not a measure of quality; but today's EPO is just trying to get as much money as possible, as fast as possible (before the whole thing implodes)



  7. Software Patents Won't Come Back Just Because They're (Re)Framed/Branded as "HEY HI" (AI)

    The pattern we've been observing in recent years is, patent applicants and law firms simply rewrite applications to make these seem patent-eligible on the surface (owing to deliberate deception) and patent offices facilitate these loopholes in order to fake 'growth'



  8. IP Kat Pays the Price for Being a Megaphone of Team UPC

    The typical or the usual suspects speak out about the so-called 'prospects' (with delusions of inevitability) of the Unified Patent Court Agreement, neglecting to account for their own longterm credibility



  9. Links 17/8/2019: Wine 4.14 is Out, Debian Celebrates 26 years

    Links for the day



  10. Nothing Says 'New' Microsoft Like Microsoft Component Firmware Update (More Hardware Lock-in)

    Vicious old Microsoft is still trying to make life very hard for GNU/Linux, especially in the OEM channel/s, but we're somehow supposed to think that "Microsoft loves Linux"



  11. Bill Gates and His Special Relationship With Jeffrey Epstein Still Stirring Speculations

    Love of the "children" has long been a controversial subject for Microsoft; can Bill Gates and his connections to Jeffrey Epstein unearth some unsavoury secrets?



  12. Links 16/8/2019: Kdevops and QEMU 4.1

    Links for the day



  13. The EPO's War on the Convention on the Grant of European Patents 2000 (EPC 2000), Not Just Brexit, Kills the Unitary Patent (UP/UPC) and Dooms Justice

    Team UPC continues to ignore the utter failures that have led to lawlessness at the EPO, attributing the demise of the Unified Patent Court (UPC) to Brexit alone and pretending that it's not even a problem



  14. Links 15/8/2019: GNOME's Birthday, LLVM 9.0 RC2

    Links for the day



  15. 'Foundation' Hype Spreads in China

    Nonprofits seem to have become more of a business loophole than a charitable endeavour; the problem is, this erodes confidence in legitimate Free software and good causes



  16. Links Are Not Endorsements

    If the only alternative is to say nothing and link to nothing, then we have a problem; a lot of people still assume that because someone links to something it therefore implies agreement and consent



  17. The Myth of 'Professionalism'

    Perception of professionalism, a vehicle or a motivation for making Linux more 'corporate-friendly' (i.e. owned by corporations), is a growing threat to Software Freedom inside Linux, as well as freedom of speech and many other things



  18. Links 14/8/2019: Best Chromebooks, EPEL 8.0, LibreOffice 6.2.6

    Links for the day



  19. Being in Favour of Free/Libre Open Source Software Means Rejecting Software Patents

    Those who believe in Software Freedom cannot at the same time believe that software patents are desirable; we've sadly come to a point where many companies that dominate so-called 'Open Source' groups actively lobby for such patents, in effect betraying the community they claim to be a part of



  20. Links 14/8/2019: Apache Evaluated, HardenedBSD Has New Release

    Links for the day



  21. Planet Python is Being Overrun by Microsoft, Just Like PyCon and Python in General

    Microsoft is perturbing the Free/Open Source software (FOSS) world from the inside, promoting Microsoft's most malicious proprietary software from within that world while taking positions of power in powerful FOSS projects



  22. Coming Soon: The Innards of the Eric Lundgren Case That Microsoft is Desperate to Hide or Spin (by Defaming Lundgren)

    Microsoft is rather stressed about Eric Lundgren coming out of prison and telling how Microsoft put him there; right now Microsoft is mostly name-calling while seeking to control public dialogues



  23. Wrong Person in Charge of the Linux Foundation (and in Charge of Linus Torvalds)

    There are several glaring issues when it comes to the leadership of Linux's steward; for one thing, it lacks actual background in... Linux



  24. 2019 Tech Glossary

    This clavis refers to what the de facto definition may be, based on how (and when) media uses the words nowadays



  25. The Silence of the Media Lamb

    There are reasons that are perfectly legitimate to criticise media which is unable and more so unwilling to cover particular scandals for fear that coverage can be detrimental to the media's owners and sponsors



  26. LINUX.COM Managed by Apple’s MacOS Users, Open Source Managed and Covered by People Who Reject Open Source

    The narratives are being hijacked; people who we're supposed to assume speak for Linux and for Open Source support neither of these things; they're only in it for the money



  27. The Linux Foundation's Open Source Summit is a Proprietary Software Marketing Venue

    The distortion of the term Open Source and promotion of proprietary software such as GitHub shows that the foundation called after “Linux” is actually more of a front group of hostile corporations — large brands and rich people to whom Open Source represents a threat that needs to be controlled



  28. Links 13/8/2019: Mir 1.4 Released, Qt PDF Discussed

    Links for the day



  29. Links 13/8/2019: KDevelop 5.4.1 and DragonFly 5.6.2 Released

    Links for the day



  30. Spreading False Rumours or What's Most Likely Lies (Falsehoods) Won't Help Restore Justice at the EPO

    EPO management lies to everyone routinely (to courts, to the press, to staff and so on); it’s not helping when lies or baseless hearsay are spread about EPO management as it helps Team Campinos censor/block/slander sites that expose EPO corruption (under he guise/pretext that these sites are disseminating lies; Campinos, by the way, has blocked Techrights for over a year without explanation, just like a truly insecure autocrat)


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts