12.28.15

Gemini version available ♊︎

Links 28/12/2015: Corporate Media Associates Linux With N. Korea and Abuses, Linux 4.4 RC7 Released

Posted in News Roundup at 3:58 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • SaaS/Big Data

    • On the OpenStack Scene, Get Credentials to Get Hired

      As part of its efforts to grow the OpenStack talent pool and global community, the OpenStack Foundation has announced a new professional certification program that is meant to provide a baseline assessment of knowledge and be accessible to OpenStack professionals around the world. Some of the first steps in advancing the program are taking place now, and other companies are also advancing OpenStack certification plans. Here is a sampling of the educational opportunities.

  • Pseudo-/Semi-Open Source (Openwashing)

  • BSD

  • Licensing

    • What topped the GitHub charts in 2015

      It’s been a year of open-source projects. Both enterprises and startups have been releasing their code into the wild as a way to grow their capabilities. It’s not just the code that’s important; it’s the programmers and contributors that can get their hands on it, alter it, fix it, and make it better.

    • Best of Opensource.com: Law
    • Answer to a Frequently Asked Question

      Q: Which open source license is best?

      A: Unlike bilateral copyright licenses, which are negotiated between two parties and embody a truce between them for business purposes, multilateral copyright licenses — of which open source licenses are a kind — are “constitutions of communities”, as Eben Moglen and others have observed. They express the consensus of how a community chooses to collaborate. They also embody its ethical assumptions, even if they are not explicitly enumerated.

  • Openness/Sharing

  • Standards/Consortia

    • Switzerland Wants a Single, Universal Phone Charger by 2017

      Apple’s Lightning cable cartel be damned: Switzerland is moving forward with a plan for a single, universal phone charger across the country, standardizing phone chargers across the board. While the exact standard hasn’t been mentioned yet, it wouldn’t be hard to guess the standard: Micro USB, used across phone platforms, most especially Android, which has a gigantic chunk of the cell phone market worldwide.

Leftovers

  • Security

    • Security Researchers Offer Warnings About Hackable Railroads

      The well-being of critical infrastructure and transportation has long been the elephant in the room when it comes to cybersecurity: plenty of researchers have warned about the possibility of attacks on power-plants, the national grid, and, more recently, even the emergence of internet connected cars.

      Now, researchers are warning of the gaping holes in the security of railroad systems. On Sunday at Chaos Communication Congress, a security, arts and politics conference held annually in Hamburg, Germany, members of the SCADA StrangeLove collective presented a long list of problems with railroad systems that attackers could exploit.

    • DLL Hijacking Just Won’t Die

      To make a long and complicated story short, a bad guy who exploits this vulnerability places a malicious DLL into your browser’s Downloads folder, then waits. When you run an installer built by an earlier version of NSIS from that folder, the elevation prompt (assuming it runs at admin) shows the legitimate installer’s signature asking you for permission to run the installer. After you grant permission, the victim installer loads the malicious DLL which runs its malicious code with the installer’s permissions. And then it’s not your computer anymore.

    • CA Council to Improve Internet Certificate Security in 2016

      At the heart of much of the Internet’s security is the use of Secure Sockets Layer/Transport Layer Security (SSL/TLS), which provides encryption for data in motion. Certificate Authorities (CAs) are the trusted entities that issue TLS certificates, and as a group, the CAs are gearing up for big year in 2016, with multiple efforts designed to improve the security of the Internet.

    • Backspace Flaw Enables Linux Zero-Day Attack
    • Monday’s security updates
  • Environment/Energy/Wildlife

    • Thousands More Homes Face Flooding Threat

      Thousands of homes are being evacuated in York after “unprecedented” levels of rain caused the Foss and Ouse rivers to burst their banks and the city’s flood barrier to be lifted.

    • UK flooding: Government rejected warnings of high flood risk from own advisers

      Minsters were warned by the Government’s own climate change advisers that they needed to take action to protect the increasing number of homes at high risk of flooding – but rejected the advice.

      The decision not to develop a comprehensive strategy to address increased flood risk came in October just a few weeks before the flooding in Cumbria before Christmas and the most recent flooding in Lancashire and Yorkshire.

    • Why Engineers Can’t Stop Los Angeles’ Enormous Methane Leak

      One of the biggest environmental disasters in US history is happening right now, and you’ve probably never heard of it.

      An enormous amount of harmful methane gas is currently erupting from an energy facility in Aliso Canyon, California, at a startling rate of 110,000 pounds per hour. The gas, which carries with it the stench of rotting eggs, has led to the evacuation 1,700 homes so far. Many residents have already filed lawsuits against the company that owns the facility, the Southern California Gas Company.

  • Finance

  • PR/AstroTurf/Lobbying

    • Bill O’Reilly Had A Terrible 2015

      Numerous Journalists Took Apart O’Reilly’s Falklands War Tales. O’Reilly has repeatedly attempted to bolster his reporting credentials by claiming over the years that he reported “in the Falklands” during the 1982 Falklands War. A Mother Jones exposé, however, found that O’Reilly fabricated his reporting resume and his former colleagues said he was actually 1,200 miles away in Buenos Aires. O’Reilly also claimed to have reported on a 1982 Buenos Aires protest in which “many were killed,” but numerous journalists who reported from the scene and a historian disputed his story. Furthermore, O’Reilly claimed to have helped an injured CBS photographer during the protest, but his colleagues have no recollection of that incident.

  • Censorship

    • True or false, decide through self-censorship, says minister

      He said self-censorship was important to see that the information they received and believed were valid and not detrimental and disruptive to harmony in society and country.

    • Public should practice self-censorship on social media, says minister

      Communications and Multimedia Minister Datuk Seri Dr Salleh Said Keruak today called on the people to use their power of self-censorship to reject or accept any information posted on the social media.

      He said self-censorship was important to see that the information they received and believed were valid and not detrimental and disruptive to harmony in society and country.

      “The important thing is, we should not be confused between news and views. Views are people’s own and not necessarily accurate and our views could differ from each other’s. But news contain facts, the veracity of which are verified before being disseminated.

    • Anonymous Attacks Asia Pacific Telecommunity website to protest Internet censorship

      The global hacktivist group, Anonymous has now turned its eyes to the varying degrees of censorship being practised in Asia. The Asia Pacific Telecommunity website (apt.int) has not only been hacked by members of the Anonymous hacker collective, and they also have got entry to the site’s admin panel (running Drupal), and also have been able to get their hands on a database dump.

    • Anonymous Hacks Asia Pacific Telecommunity Against Internet Censorship in Asia

      Anonymous hacker collective has attacked the official website of Asia Pacific telecommunity and defaced it in protest against growing plans for internet censorship in Asia.

      The hackers gained access of the website’s admin panel (running Drupal) and from there, leaked all the data stored on the website along with defacing the site with one of their own pages.

    • Court Orders Shutdown of Libgen, Bookfi and Sci-Hub

      A New York District Court has granted Elsevier’s request for a preliminary injunction against several sites that host academic publications without permission. As a result the site’s operators are now ordered to quit offering access to infringing content, while the associated registries must suspend their domain names.

    • Amidst censorship row, two “porn-coms” are releasing in India in January

      India’s 2016 film calendar will begin on a controversial note. Two Bollywood adult comedies starring the same actor are releasing within a week of each other in January. Both Maastizaade and Kya Kool Hain Hum 3 are releasing after facing considerable objections from India’s censor board.

    • The Splinternet: A New Era of Censorship, Surveillance, and Cyberwarfare

      For more than a decade, the internet has become a seemingly borderless land of free flowing information. It began as a not so open U.S. military data system decades ago, but it evolved over time into the public digital domain it has become.

    • On the Aggressive, Hilarious Theorizing in ‘Censorship Now!!’
    • Harvard Law Review Freaks Out, Sends Christmas Eve Threat Over Public Domain Citation Guide

      In the fall of 2014, we wrote about a plan by public documents guru Carl Malamud and law professor Chris Sprigman, to create a public domain book for legal citations (stay with me, this isn’t as boring as it sounds!). For decades, the “standard” for legal citations has been “the Bluebook” put out by Harvard Law Review, and technically owned by four top law schools. Harvard Law Review insists that this standard of how people can cite stuff in legal documents is covered by copyright. This seems nuts for a variety of reasons. A citation standard is just an method for how to cite stuff. That shouldn’t be copyrightable. But the issue has created ridiculous flare-ups over the years, with the fight between the Bluebook and the open source citation tool Zotero representing just one ridiculous example.

  • Privacy

    • Why ownCloud’s CEO isn’t worried about the death of Safe Harbor [Ed: Katherine Noyes should be smarter than that and not quote Microsoft propagandist Enderle]
    • Windows 10: Microsoft hits new low with ‘Upgrade Now’ or ‘Upgrade Tonight’ pop-up [Ed: how to push spyware]

      The latest pop-up message to consumers, outed on Reddit, removes the explicit option to opt out of the upgrade, instead offering two options: ‘Update Now’ or ‘Update Tonight’. Simply closing the box will make it go away (we’re still trying to ascertain for how long) but it seems that this is a deliberate attempt to prey on the less tech savvie.

    • The Tax Sleuth Who Took Down a Drug Lord

      “I’m not high-tech, but I’m like, ‘This isn’t that complicated. This is just some guy behind a computer,’” he recalled saying to himself. “In these technical investigations, people think they are too good to do the stupid old-school stuff. But I’m like, ‘Well, that stuff still works.’ ”

      Mr. Alford’s preferred tool was Google. He used the advanced search option to look for material posted within specific date ranges. That brought him, during the last weekend of May 2013, to a chat room posting made just before Silk Road had gone online, in early 2011, by someone with the screen name “altoid.”

    • China passes law requiring tech firms to hand over encryption keys

      Under the guise of counter-terrorism, the controversial law is the Chinese government’s attempt to curtail the activities of militants and political activists. China already faces criticism from around the world not only for the infamous Great Firewall of China, but also the blatant online surveillance and censorship that takes place. This latest move is one that will be view very suspiciously by foreign companies operating within China, or looking to do so.

    • New Chinese law takes aim at encryption

      A new law passed by China’s Parliament on Sunday requires technology companies to assist the government in decrypting content, a provision that the country maintains is modeled after Western law.

      A new law passed by China’s Parliament on Sunday requires technology companies to assist the government in decrypting content, a provision that the country maintains is modeled after Western law.

      ISPs and telecommunication companies must provide technical assistance to the government, including decrypting communications, for terrorism-related investigations, according to Xinhua, China’s official news agency.

    • China Using US Encryption Fight To Defend Its New Encryption Backdoor Mandate

      So, again, to all the politicians and lawmakers supporting backdooring encryption, what’s your response when China uses it to say that’s why they’re doing it as well?

    • Senator Richard Burr: Confused And Wrong On Encryption

      Right, except so far officials haven’t been able to show evidence of any of those cases actually using encryption. Similarly, law enforcement has failed to show that criminals using encryption have really been that much of a problem either. And that’s because it’s not a problem. Even in the (still mostly rare) cases where encryption is being used, criminals still reveal plenty of information that would allow law enforcement to track them down. It’s called doing basic detective work.

  • Civil Rights

  • Internet/Net Neutrality

    • India Tells Facebook To Shut Down Controversial Zero Rating Program ‘Free Basics’

      The Indian government has spent much of the last year trying to craft net neutrality rules, and had recently been fielding public comment on whether or not Facebook’s zero rating effort, Free Basics, violates net neutrality. As we’ve covered at length, Facebook’s been trying to corner the developing nation ad market with a zero rated program that offers free access to curated, Facebook approved content. Critics and Free Basic content partners alike haven’t been comfortable with giving Facebook that much control.

    • How the Internet of Things Limits Consumer Choice
    • Why India’s Net Neutrality Activists Hate Facebook

      Facebook Inc. Chairman Mark Zuckerberg made a personal appeal in one of India’s leading newspapers for the country to allow a free Internet service that has stirred controversy and invited questions from regulators.

      Facebook’s proposed Free Basics plan allows customers to access the social network and other services such as education, health care, and employment listings from their phones without a data plan. Yet activists say the program threatens the principles of net neutrality and could change pricing in India for access to different websites.

      The backlash in India centers on net neutrality, the principle that all Internet websites should be equally accessible. Critics accused the world’s largest social networking company of favoring a limited swath of the Internet and excluding rival services. And Facebook’s broader Internet.org initiative, including Free Basics, is seen as an effective way to draw more users onto a social network already used by over a billion people.

    • Facebook’s Zuckerberg: If You Oppose Our International Power Grab, You’re An Enemy Of The Poor

      Last week we noted that India had shut down Facebook’s Free Basics program, arguing the company’s plan for zero rating Facebook-approved content and services is effectively glorified collusion; an attempt to eventually corner global ad markets under the banner of altruism. The country has been trying to craft net neutrality rules, and has slowly realized that whatever neutrality looks like, Facebook deciding what content Indians get access to isn’t it.

    • Comcast Cap Blunder Highlights How Nobody Is Ensuring Broadband Meters Are Accurate

      For years now we’ve noted that while broadband ISPs rush toward broadband caps and usage overage fees, nobody is checking to confirm that ISP meters are accurate. The result has been user network hardware that reports usage dramatically different from an ISPs’ meters, or users who are billed for bandwidth usage even when the power is out or the modem is off. Not only have regulators historically failed to see the anti-innovation, anti-competitive impact of usage caps, you’d be hard pressed to find a single official that has even commented on the problem of inaccurate broadband usage meters.

  • Intellectual Monopolies

    • Copyrights

      • El Paquete Semanal: How Offline Piracy Flourishes in Cuba

        For more than a decade many Cubans have been pirating the latest entertainment without a proper connection to the Internet. Instead, they have built their own person-to-person distribution network to share a weekly package of pirated material: El Paquete Semanal.

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email

Decor ᶃ Gemini Space

Below is a Web proxy. We recommend getting a Gemini client/browser.

Black/white/grey bullet button This post is also available in Gemini over at this address (requires a Gemini client/browser to open).

Decor ✐ Cross-references

Black/white/grey bullet button Pages that cross-reference this one, if any exist, are listed below or will be listed below over time.

Decor ▢ Respond and Discuss

Black/white/grey bullet button If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

DecorWhat Else is New


  1. Proprietary Software is Pollution

    "My daughter asked me about why are we throwing away some bits of technology," Dr. Andy Farnell says. "This is my attempt to put into words for "ordinary" people what I tried to explain to a 6 year old."



  2. Microsoft GitHub Exposé — Part XV — Cover-Up and Defamation

    Defamation of one’s victims might be another offence to add to the long list of offences committed by Microsoft’s Chief Architect of GitHub Copilot, Balabhadra (Alex) Graveley; attempting to discredit the police report is a new low and can get Mr. Graveley even deeper in trouble (Microsoft protecting him only makes matters worse)



  3. [Meme] Alexander Ramsay and Team UPC Inciting Politicians to Break the Law and Violate Constitutions, Based on Misinformation, Fake News, and Deliberate Lies Wrapped up as 'Studies'

    The EPO‘s law-breaking leadership (Benoît Battistelli, António Campinos and their corrupt cronies), helped by liars who don't enjoy diplomatic immunity, are cooperating to undermine courts across the EU, in effect replacing them with EPO puppets who are patent maximalists (Europe’s equivalents of James Rodney Gilstrap and Alan D Albright, a Donald Trump appointee, in the Eastern and Western Districts of Texas, respectively)



  4. Has the Administrative Council Belatedly Realised What Its Job in the European Patent Organisation Really Is?

    The "Mafia" which took over the EPO (the EPO's own workers call it "Mafia") isn't getting its way with a proposal, so it's preventing the states from even voting on it!



  5. [Meme] Team UPC is Celebrating a Pyrrhic Victory

    Pyrrhic victory best describes what's happening at the moment (it’s a lobbying tactic, faking/staging things to help false prophecies be fulfilled, based on hopes and wishes alone), for faking something without bothering to explain the legal basis is going to lead to further escalations and complaints (already impending)



  6. Links 24/1/2022: Scribus 1.5.8 and LXLE Reviewed

    Links for the day



  7. IRC Proceedings: Sunday, January 23, 2022

    IRC logs for Sunday, January 23, 2022



  8. [Meme] Team UPC Congratulating Itself

    The barrage of fake news and misinformation about the UPC deliberately leaves out all the obvious and very important facts; even the EPO‘s António Campinos and Breton (Benoît Battistelli‘s buddy) participated in the lying



  9. Links 24/1/2022: pgBadger 11.7 Released, Catch-up With Patents

    Links for the day



  10. The Demonisation and Stereotyping of Coders Not Working for Big Corporations (or 'The System')

    The war on encrypted communication (or secure communications) carries on despite a lack of evidence that encryption stands in the way of crime investigations (most criminals use none of it)



  11. On the 'Peak Hacker' Series

    Hacker culture, unlike Ludditism, is ultimately a movement for justice, for equality, and for human rights through personal and collective emancipation; Dr. Farnell has done a good job explaining where we stand and his splendid series has come to a close



  12. Links 23/1/2022: First RC of Linux 5.17 and Sway 1.7 Released

    Links for the day



  13. Peak Code — Part III: After Code

    "Surveillance perimeters, smart TVs (Telescreens built to Orwell's original blueprint) watched over our living rooms. Mandatory smart everything kept us 'trustless'. Safe search, safe thoughts. We withdrew. Inside, we went quietly mad."



  14. IRC Proceedings: Saturday, January 22, 2022

    IRC logs for Saturday, January 22, 2022



  15. Links 23/1/2022: MongoDB 5.2, BuddyPress 10.0.0, and GNU Parallel 20220122

    Links for the day



  16. A Parade of Fake News About the UPC Does Not Change the General Consensus or the Simple Facts

    European Patents (EPs) from the EPO are granted in violation of the EPC; Courts are now targeted by António Campinos and the minions he associates with (mostly parasitic litigation firms and monopolists), for they want puppets for “judges” and for invalid patents to be magically rendered “valid” and “enforceable”



  17. Welcome to 2022: Intentional Lies Are 'Benefits' and 'Alternative Facts'

    A crooks-run EPO, together with the patent litigation cabal that we’ve dubbed ‘Team UPC’ (it has nothing to do with science or with innovation), is spreading tons of misinformation; the lies are designed to make the law-breaking seem OK, knowing that Benoît Battistelli and António Campinos are practically above the law, so perjury as well as gross violations of the EPC and constitutions won’t scare them (prosecution as deterrence just isn’t there, which is another inherent problem with the UPC)



  18. From Software Eating the World to the Pentagon Eating All the Software

    “Software is eating the world,” according to Marc Andreessen (co-founder of Netscape), but the Empire Strikes Back (not the movie, the actual empire) by hijacking all code by proxy, via Microsoft, just as it grabbed a lot of the world’s communications via Skype, bypassing the world's many national telecoms; coders need to fight back rather than participate in racist (imperial) shams such as GitHub



  19. Links 22/1/2022: Skrooge 2.27.0 and Ray-Tracing Stuff

    Links for the day



  20. IRC Proceedings: Friday, January 21, 2022

    IRC logs for Friday, January 21, 2022



  21. Peak Code — Part II: Lost Source

    "Debian and Mozilla played along. They were made “Yeoman Freeholders” in return for rewriting their charters to “work closely with the new Ministry in the interests of all stakeholders” – or some-such vacuous spout… because no one remembers… after that it started."



  22. Links 22/1/2022: Ubuntu MATE 21.10 for GPD Pocket 3, MINISFORUM Preloads GNU/Linux

    Links for the day



  23. Computer Users Should be Operators, But Instead They're Being Operated by Vendors and Governments

    Computers have been turned into hostile black boxes (unlike Blackbox) that distrust the person who purchased them; moreover, from a legislative point of view, encryption (i.e. computer security) is perceived and treated by governments like a threat instead of something imperative — a necessity for society’s empowerment (privacy is about control and people in positions of unjust power want total and complete control)



  24. Peak Code — Part I: Before the Wars

    Article/series by Dr. Andy Farnell: "in the period between 1960 and 2060 people had mistaken what they called "The Internet" for a communications system, when it had in fact been an Ideal and a Battleground all along - the site of the 100 years info-war."



  25. Links 21/1/2022: RISC-V Development Board and Rust 1.58.1

    Links for the day



  26. IRC Proceedings: Thursday, January 20, 2022

    IRC logs for Thursday, January 20, 2022



  27. Gemini Lets You Control the Presentation Layer to Suit Your Own Needs

    In Gemini (or the Web as seen through Gemini clients such as Kristall) the user comes first; it's not sites/capsules that tell the user how pages are presented/rendered, as they decide only on structural/semantic aspects



  28. The Future of Techrights

    Futures are difficult to predict, but our general vision for the years ahead revolves around more community involvement and less (none or decreased) reliance on third parties, especially monopolistic corporations, mostly because they oppress the population via the network and via electronic devices



  29. [Meme] UPC for CJEU

    When you do illegal things and knowingly break the law to get started with a “legal” system you know it’ll end up in tears… or the CJEU



  30. Links 20/1/2022: 'Pluton' Pushback and Red Hat Satellite 6.10.2

    Links for the day


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts