EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

03.08.16

Links 8/3/2016: Future Kodi Versions, Solus 1.1

Posted in News Roundup at 7:51 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • ​Enterprise ready: OwnCloud 9 handles petabytes of data

    When you think of ownCloud, you think of a cloud Infrastructure-as-a-Service (IaaS) cloud you can run off a home server. OwnCloud 9, which will be released tomorrow, March 8, is far more than that.

  • Still reeling, SourceForge looks to the future

    The SourceForge and Slashdot communities have had a much bumpier ride than the opendesktop.org communities over the years. I won’t go into detail about the ownership changes, but here’s the tl;dr: The founders of Slashdot, Rob ‘CmdrTaco’ Malda and Jeff Bates, sold the site in 1999, about two years after its launch, to Andover.net. Then in 2000, Andover.net merged with VA Linux, which changed its name to SourceForge, Inc. in 2007, and became Geeknet, Inc. 2009.

  • Open source security: know your code [Ed: the FUD firm uses terms like “code hygiene”]

    The adoption of open source is a good thing overall, leading to faster time-to-market and lower development costs. But if we are relying on open source so widely (and we are), we have an obligation as security professionals to understand what we’re deploying. Since 2014, more than 6,000 new vulnerabilities associated with open source have been disclosed. And the fact that the open source code you use today is free from vulnerabilities doesn’t mean that it will remain that way in the future.

  • Google vendor security review tool goes open source

    Google’s decided that the first-phase questionnaire it uses to vet vendors might be useful to the rest of the world.

    Until now an internal document, the Vendor Security Assessment Questionnaire (VSAQ) was created to help Mountain View cope with the huge number of vendor approaches it receives.

    The questionnaires help vendors describe their security posture to Google, so as to thin out the amount of stuff the Chocolate Factory has to let in the door for a presentation.

  • ownCloud 9.0 Released with Major Enhancements, Brings Federation to a New Level

    Today, March 8, 2016, ownCloud Inc. is proud to announce the release and immediate availability of ownCloud 9.0, the next major release of the self-hosting cloud server used by millions of people worldwide.

  • ownCloud 9.0 officially announced; innovative collaboration leads new features
  • Intel Appears To Be Rolling Out FSP 2.0 Blob

    A controversial point of Intel’s Coreboot support has been the FSP, or Firmware Support Package, which is needed for initializing the systems on all recent hardware generations. With the upcoming Apollo Lake it appears there is now a “FSP 2.0″, but still relies upon binary blobs.

  • OSI: Don’t Forget To Vote!

    With just a few days to go in our elections, here’s your gentle reminder to vote on who you would most like to see on the board of the OSI. You have until midnight PST on March 14th, 2016 to do so.

  • ownCloud 9.0 is a Must-Have Upgrade for the Popular Cloud Platform
  • OwnCloud 9.0 Released As Latest Version Of Open-Source Dropbox Alternative
  • 9.0 is the biggest ownCloud release so far
  • Non-Linux FOSS: CreateUserPkg
  • WSO2 Unveils a Lightweight Java Framework for Building Microservices

    “It started about a year ago, from zero to pretty much every single customer asking us: What is your strategy on microservices, and what is your strategy for container-based services?” noted Isabelle Mauny, who is the vice president of product management at WSO2.

    In effect, the customers were telling the middleware company,”That’s what we want to deploy,” Mauny said.

  • Amida Technology Solutions Releases Indaba, an Open Source Data Collaboration and Knowledge Management Tool [Ed: source code]
  • Google opens up VSAQ security assessor to the open source community

    On Monday, the tech giant said the Vendor Security Assessment Questionnaire (VSAQ), a selection of self-adapting questionnaires, have been used in the past to help the firm assess the practices and risk related to hundreds of vendors and their security every year.

  • When selling a site means selling a community

    In January, the CEO of ownCloud, Frank Karlitschek, sold his network of more than 30 community sites. The same month, DHI Group, Inc. announced that it completed the sale of its Slashdot and SourceForge community-driven businesses to BIZX, LLC.

    In both cases, websites weren’t the only things changing virtual hands. Entire online communities transferred to new stewards.

  • Events

  • Web Browsers

  • SaaS/Big Data

  • Databases

  • Pseudo-/Semi-Open Source (Openwashing)

  • BSD

    • LLVM 3.8 Officially Released

      While running late, the release of LLVM 3.8 and Clang 3.8 is now officially available.

      If you missed out on LLVM/Clang 3.8 features, see our feature overview. Aside from all the traditional compiler improvements, LLVM 3.8 is also exciting for AMDGPU users as being an important update for those using the AMD open-source Linux graphics driver stack.

    • Bitcoin Devs Could Learn a Lot from BSD

      There’s never been a whirlwind of politics surrounding an open source project on the scale that we see with Bitcoin. Alternative implementations are considered controversial on principle, and Core devs can’t propose a bug fix without being accused of manipulation on behalf of outside interests. However, BSD, another popular open source project, doesn’t seem to have these problems. Why not?

    • Proactive Security & (re)discovering OpenBSD

      OpenBSD — a security-focused & research-based Operating System — started auditing their source code tree in 1996. They combed their source code repository looking for bugs that could lead to security vulnerabilities. The results were hundreds of security bugs found & patched. Thankfully, some of those fixes made it to Linux, FreeBSD and NetBSD. Today, OpenBSD proudly boasts about 2 vulnerabilities in more than 10 years. Code auditing is still on-going !

  • FSF/FSFE/GNU/SFLC

    • Free Software Foundation submits comment to Copyright Office with over 1200 co-signers calling for end to DMCA anti-circumvention provisions

      The Copyright Office was seeking comments in response to a request from Congress to study the effects of the DMCA’s anti-circumvention provisions and the triennial exemptions process. The DMCA’s anti-circumvention provisions create legal penalties for the circumvention of technologies that restrict access to copyrighted works, known as Digital Restrictions Management (DRM). It further criminalizes the sharing of tools needed to avoid DRM. The DMCA also set up a system where activists, academics and researchers may request that certain uses be exempted from the anti-circumvention provisions. Every three years they may submit a request to the Copyright Office that the circumvention of a particular type of work be free from the DMCA’s penalties. Even when an exemption is granted, it expires three years later when the next round of the exemptions process begins, requiring repeated effort to maintain narrow exemptions.

  • Public Services/Government

    • Juha Saarinen: IT plans need open-source solutions

      Oh, and those open-source-based solutions work too. So well, in fact, that they can be used to build businesses and public services that run on top of them.

      By now there should be more than enough examples of successful, large-scale enterprise open-source solutions for our authorities to at least trial, rather than automatically tying themselves to proprietary software – and burning through enormous amounts of cash in return for nothing in the process.

    • Achieving IT independence through open-source

      The unwelcome possibility arose that we might have to purchase these expensive systems all over again in a few years, once support for the discontinued products ceased.

      In fact, this kind of dependence on a few large foreign software vendors is a common hazard in many industries.

      Fortunately, Kazi Farms group, the parent company of Deepto TV, also runs a software company called Sysnova which has helped our other businesses to run on free and open source software.

    • Millions saved by Spain’s eAdministration tool

      The SIR software is made available for free to all Spanish public administrations. They can download the software from the CTT repository.

  • Licensing

    • GPL Fun

      The other one is Canonical who have announced it plans to ship zfs with Ubuntu. An employee wrote in a confusing blog post “As we have already reached the conclusion, we are not interested in debating license compatibility, but of course welcome the opportunity to discuss the technology.” but in linking to differing opinions feels the need to highlight “please bear in mind that these are opinions.” The Software Freedom Conservancy wrote an post discussing why it was a derived work and why that’s illegal to distribute. And the SFLC’s Eben Moglen wrote another one which based on a link from Dustin’s blog is the opinion they are replying upon for thinking everything is ok. Eben’s blog post is fascinating and makes for page turning bed-time reading by going into exactly why it’s a derived work. It all depends on “literal interpretation of GPLv2’s system library exception” and that based on that

  • Openness/Sharing

    • Open Hardware

      • Tiny Open Source Robot

        We watched the video introduction for this little open source robot, and while we’re not 100% sure we want tiny glowing eyes watching us while we sleep, it does seem to be a nice little platform for hacking. The robot is a side project of [Matthew], who’s studying for a degree in Information Science.

      • TAU Open Source Mini Arduino Zero Development Board Unveiled (video)

        Arduino enthusiasts that are looking for a smaller Arduino Zero board for their next project may be interested in a new piece of hardware called the TAU that has been developed by Rabid Prototypes and which has been equipped with an Atmel ATSAMD21E17A ARM Cortex M0+ micro controller and offers 16KB RAM.

        The TAU has been created to provide an affordable open source miniature version of the large Arduino Zero and offers 32-bit ARM processor running at 48MHz and can be easily programmed using the Arduino IDE.

Leftovers

  • Internet Archive brings hundreds of classic Apple II games to your web browser

    The Internet Archive has been on a roll lately, bringing back classic MS-DOS games, Windows 3.1 software, and even defanged versions of old PC viruses.

    Now, the site has hit a milestone with its Apple II collection: A group of anonymous hackers have successfully broken the elaborate copy-protection schemes on more than 500 classic games and programs. The result is that these Apple II classics are now playable directly in modern web browsers.

  • Retro Apple II software lands at the Internet Archive

    DIGITAL HOARDER the Internet Archive has unleashed a load of previously copy-protected Apple II software from their old floppy prisons and added them to its accessible shelves.

    This is great news for people who like to have a go on things that they used to have a go on in the 1980s and 1990s. You could be in the Apple Computer software library now, running riot and making merry with all the stuff that the 4am Group has found, stored and shared with you. There is a lot of it.

    “Among the tens of thousands of computer programs now emulated in the browser at the Internet Archive, a long-growing special collection has hit a milestone: the 4am Collection is now past 500 available Apple II programs preserved for the first time,” said the Internet Archive in a blog post.

  • These Drone Photos Show the Density of High-Rises in Hong Kong

    Hong Kong is a densely populated city where high-rises are crammed close together and where an estimated 100,000+ people live in 40-square-foot cubicle apartments. Photographer Andy Yeung used a drone to capture this density for his project Urban Jungle.

    The photo above of the Sheung Wan area of the city was selected as a 500px.com Editors’ Choice.

  • Science

    • The End of Journals

      From the Section of Cardiovascular Medicine and the Robert Wood Johnson Foundation Clinical Scholars Program, Department of Internal Medicine, Yale School of Medicine, New Haven, CT; Department of Health Policy and Management, Yale School of Public Health, New Haven, CT; and Center for Outcomes Research and Evaluation, Yale-New Haven Hospital, New Haven, CT.

    • 8 guidelines to advance women in tech on International Women’s Day

      Just in time for International Women’s Day, the University of California, Los Angeles (UCLA)’s Luskin Center for Innovation has released “Rethinking Public, Private and Nonprofit Strategies to Advance Women in Technology,” a 60-page report that articulates just how far the tech industry still needs to go to address its gap in gender diversity – and how it can get there.

    • Guy Who Pretends He Invented Email Whines At Every Journalist For Writing Obit Of Guy Who Actually Helped Create Email

      Over the years, we’ve written a few times about Shiva Ayyadurai, a guy who’s basically staked his entire life on the misleading to false claim that he “invented” email. Every couple of years he pops up again as he’s able to fool some reporters into believing him. In 2012, he fooled the Washington Post and, astoundingly, the Smithsonian. In 2014, he was somehow able to get the Huffington Post to publish a multi-part series claiming he had “invented” email — though after we called them out on it (and after they stood by it) — those stories were eventually deleted. Ayyadurai also threatened to sue us for calling out his false claims, but there’s been no lawsuit yet.

  • Hardware

    • Heat doesn’t kill hard drives. Here’s what does

      “Free-cooled” datacenters use ambient outside air instead of air conditioning. That lets us see how environment affects system components. Biggest surprise: temperature is not the disk drive killing monster we thought. Here’s what is.

  • Health/Nutrition

    • Two Billion People Eat Insects and You Can Too

      Edible insects have long been a part of the human diet and are commonly consumed as a food source in many regions of the world, according to the United Nations Food and Agriculture Organization (FAO). It is estimated that two billion people currently consume insects as part of their diets. Insects may be an increasingly important source of protein because of the rising cost of animal protein, food insecurity, environmental pressures, climate change and population growth.

    • WHO: Zika Virus Spreading, R&D Needs Financing, Sample Sharing Discussed

      The World Health Organization said today that evidence of the relationship between the Zika virus and neonatal malformations and neurological disorders is growing stronger, and that the virus is spreading geographically. The Emergency Committee set up by the WHO at a gathering today issued advice to the WHO director general, including warning pregnant women to avoid travelling to Zika infected countries. Meanwhile, discussions are ongoing on the sharing of the samples of the virus, and on the question of benefit-sharing. And a call was made for research and development to intensify.

  • Security

  • Defence/Police/Secrecy/Aggression

    • Exclusive: Navy Secretly Conducting Electromagnetic Warfare Training on Washington Roads

      Without public notification of any kind, the US Navy has secretly been conducting electromagnetic warfare testing and training on public roads in western Washington State for more than five years.

      An email thread between the Navy and the US Forest Service between 2010 and 2012, recently obtained via a Freedom of Information Act (FOIA) request filed by Oregon-based author and activist Carol Van Strum in November 2014, revealed that the Navy has likely been driving mobile electromagnetic warfare emitters and conducting electromagnetic warfare training in the Olympic National Forest and on public roads on Washington’s Olympic Peninsula since 2010.

    • Drone Casualty Report Promised as U.S. Airstrike Kills 150 Al Shabaab Members

      AFTER YEARS OF INTENSE SECRECY, the Obama administration on Monday announced that it will for the first time acknowledge the number of people it has killed in drone strikes outside of conventional war zones, including civilians. The report, administration officials said, will be released “in the coming weeks,” and will continue to be released annually. The news came as the Pentagon confirmed that it had carried one of the largest airstrikes in the history of the war on terror.

      Lisa Monaco, the president’s counterterrorism and homeland security adviser, described the plan in comments made during a talk at the Council on Foreign Relations. “We know that not only is greater transparency the right thing to do, it is the best way to maintain the legitimacy of our counterterrorism actions and the broad support of our allies,” Monaco said, adding that the operations described in the report would not cover areas of “active hostilities,” such as Afghanistan, Iraq, and Syria.

    • The Noxious Legacy of Fracking King Aubrey McClendon

      WHEN FRACKING BILLIONAIRE Aubrey McClendon died after crashing his Chevy Tahoe into a bridge last week, the federal investigation into his alleged bid-rigging came to an end. At his memorial in Oklahoma City today, his friends and family will remember him as a “swashbuckling innovator” and a loyal friend, but his most enduring legacy may be his role in convincing policymakers and the public that natural gas could be an environmental boon and a solution to global warming. More than any other individual, McClendon personified the excesses of the fracking boom, gobbling up land so quickly and spinning the boom’s story so effectively that regulators, environmentalists, and even Wall Street struggled to keep pace.

      McClendon was not only the founder of Chesapeake Energy, the most important fracking company in the technique’s history, but he also co-founded one of the gas industry’s most important lobbying arms, America’s Natural Gas Alliance. In creating both, McClendon became an architect of the energy market’s reorientation around a product whose climate-warming emissions rival those of coal.

    • Finding Security by Helping the ‘South’

      Official Washington’s new group think is that more money must be poured into the Military-Industrial Complex to continue wars in the Middle East and hem in Russia and China on their borders. But the real security threats come from mass dislocations in the Third World, says ex-CIA official Graham E. Fuller.

    • Saudi Arabia’s Exploding Christmas Gifts From Hillary Clinton

      As Hillary Clinton emerges as the front-runner for the Democratic Party’s presidential candidate, she is receiving increased scrutiny for her years as Secretary of State. Many are criticizing her hawkish foreign policy, which is the best indication of what President Hillary’s foreign policy would be, with many focusing on her long relationship with Saudi Arabia.

      On Christmas Eve in 2011, Hillary Clinton and her closest aides celebrated a $29.4 billion sale of over 80 F-15 fighter jets, manufactured by US-based Boeing Corporation, to Saudi Arabia. In a chain of enthusiastic emails, an aide exclaimed that it was “not a bad Christmas present.”

      These are the very fighter jets the Saudis have been using to intervene in the internal affairs of Yemen since March 2015. A year later, at least 2,800 Yemeni civilians have been killed, mostly by airstrikes – and there is no end in sight. The indiscriminate Saudi strikes have killed journalists and ambulance drivers. They have hit the Chamber of Commerce, facilities supported by Médecins Sans Frontières (also known as Doctors Without Borders), a wedding hall, and a center for the blind. The attacks have also targeted ancient heritage sites in Yemen. International human rights organizations are saying that the Saudi-led strikes on Yemen may amount to war crimes.

  • Transparency Reporting

    • Former paid agent of Swedish Security Police dictated Amnesty Sweden’s stance against Assange

      Svenska Dagbladet (Svd), one of Sweden’s leading newspapers, has now revealed that a well-known journalist and ‘left activist’ – who, among other things, exerted considerable influence with Amnesty International Sweden – was a paid agent of Sweden’s Security Police (SÄPO). [5]

      The government security agent, Martin Fredriksson, was mainly active during the years that former Foreign Minister Carl Bildt was dictating Sweden’s foreign policy, when the “Assange Affair” was widely publicized on the home page of Sweden’s Ministry of Foreign Affairs. According to statements Fredriksson posted on Twitter, his “work” at SÄPO covered different periods between 2004 and 2010, the year Sweden opened its ‘investigation’ against the WikiLeaks founder Julian Assange.

      The Swedish media establishment awarded this SÄPO secret agent its highest investigative journalism prize, ‘Guldspaden’ (Golden Spade), in 2014. The rationale on which the award was given to Fredriksson referred precisely to the work he had implemented as a paid agent of Sweden’s Secret Police. [6] In the photo below, at the centre of the group, the ex-Security Police agent Martin Fredriksson.

    • Last chance for a pro-transparency trade legacy for Obama

      As the presidential campaign heats up, President Obama continues to press forward with his policy agenda. High on his remaining “to do” list is his trade agenda. With less than a year left in office, President Obama continues to urge Congress to approve the landmark Trans-Pacific Partnership (TPP) while pressing forward on an ambitious trade deal with Europe, the Transatlantic Trade Partnership (TTIP). For the moment, according to Speaker Paul Ryan (R-Wis.), it appears the votes aren’t there for TPP approval. Central to the challenge is a problem of the administration’s own making.

    • Two Former White House Tech Advisors Tell The President To Actually Be Transparent About Trade Deals

      Two former Obama tech staffers — Professor Colleen Chien (who advised the administration on intellectual property issues) and Quentin Palfrey (who worked for years in the Commerce Dept and the Office of Science and Technology Policy on intellectual property issues) — have written a fantastic opinion piece for The Hill, arguing that the White House has one last chance to actually be transparent in trade negotiations as it moves forward with the TTIP agreement with the EU. The piece notes that part of the reason that the TPP agreement is in so much trouble was its secrecy…

  • Environment/Energy/Wildlife

    • You’re Running Out of Time to See One of Nature’s Most Spectacular Sites

      If you have ever been snorkeling in a tropical paradise and seen the psychedelic colors and teeming variety of otherworldly sea critters, you were gazing upon something increasingly rare: a healthy coral reef. That site also does a lot more than dazzle vacationers. Coral reefs occupy just 0.1 percent of the oceans’ bottom but provide habitat to a quarter of the world’s fish species. They also prevent erosion along coastlines and buffer the impact of storms, providing protection, food, and livelihoods for about 500 million people.

    • On Fracking, Clinton And Sanders Give Vastly Different Answers

      Democratic presidential candidates Hillary Clinton and Bernie Sanders gave vastly different answers on fracking at the CNN Democratic debate on Sunday, illustrating a key policy contrast between the two.

      The candidates were asked by University of Michigan student Sarah Bellaire about whether they support fracking, the controversial process of injecting high-pressure water, sand, and chemicals underground to crack shale rock and let gas flow out more easily. Clinton, who answered first, said she does — but only under certain conditions.

      Specifically, Clinton said that she would not support fracking when local communities don’t want it; when it causes pollution; and when fracking companies don’t disclose the chemicals they use.

  • Finance

    • Corporate Sovereignty Now So Toxic, For Once It Isn’t Being Used Against Canada — Yet

      Despite that painful track record, in 2014 Canada signed the Foreign Investor Protection Agreement (FIPA) with China, which not only included corporate sovereignty provisions, but guaranteed that they would take precedence over the Canadian constitution for 31 years. However, it seems that something — maybe the decision by TransCanada to sue the US for $15 billion because of President Obama’s rejection of the Keystone XL pipeline — has started to make people aware of ISDS’s dangers. That, at least, is what a blog post on the Canadian Dogwood Initiative suggests. It’s a story about a Chinese mining company filing a lawsuit against Canada’s provincial government in British Columbia (BC) over a land transfer.

    • The Financial System Is A Larger Threat Than Terrorism

      In the 21st century Americans have been distracted by the hyper-expensive “war on terror.” Trillions of dollars have been added to the taxpayers’ burden and many billions of dollars in profits to the military/security complex in order to combat insignificant foreign “threats,” such as the Taliban, that remain undefeated after 15 years. All this time the financial system, working hand-in-hand with policymakers, has done more damage to Americans than terrorists could possibly inflict.

  • PR/AstroTurf/Lobbying

    • Hillary Is Now Picking and Choosing Which Obama Accomplishments to Take Credit For

      According to Hillary Clinton’s latest campaign ploy, she deserves credit for domestic policies passed under Obama — notably, ObamaCare — but not issues — in this case, trade deals — she negotiated as Secretary of State.

      She rolled out former Governor and erstwhile Michigan resident Jennifer Granholm (when this story hit, some local folks were talking about how Granholm hasn’t been seen in these parts of late) to claim that Hillary can’t be held responsible for NAFTA — which she supported when it got passed by her spouse (who is, of course, a key campaign surrogate) — or for the Trans-Pacific Partnership — which she helped negotiate as Secretary of State. It’s the latter I find particularly remarkable.

    • Tim Cook, Larry Page, And Elon Musk Plan To Stop Donald Trump At A Secretive Meeting

      The top leaders from Silicon Valley and Republican Commiserate recently met at the American Enterprise Institute’s annual World Forum gathering. Apparently, meeting’s main agenda was “How to stop Republican front-runner Donald Trump?”

    • At Secretive Meeting, Tech CEOs And Top Republicans Commiserate, Plot To Stop Trump

      Billionaires, tech CEOs and top members of the Republican establishment flew to a private island resort off the coast of Georgia this weekend for the American Enterprise Institute’s annual World Forum, according to sources familiar with the secretive gathering.

      The main topic at the closed-to-the-press confab? How to stop Republican front-runner Donald Trump.

    • Michigan mayor says he was nearly kicked out of Dem debate

      Fouts, an Independent mayor who attended both the Republican and Democratic debates in his home state, commented on the noticeable differences between the two events.

      “The Democratic debate is totally controlled by Hillarys [sic] good friend DNC Chair Debbie Wasserman Schultz,” Fouts wrote in a Facebook post. “No commentary is allowed by the audience. Particularly if you are cheering Bernie Sanders. Persons who do not adhere to Hillarys [sic] rules are threatened with expulsion.”

      He also said the Democratic Party’s debate process “borders on totalitarian control” and in an interview on Monday, he said Wasserman Schultz should resign.

      This is not the first time fellow Democrats have been publicly critical of Wasserman Schultz and how she’s handled the party’s debates. Critics have accused the DNC chairwoman of limiting the number of debates in order to aid Democratic front-runner Hillary Clinton.

    • An LSD trip story: “Went to a Donald Trump speech on acid SUPER BAD VIBES”

      It may be fact, it may be fiction. We do not know. But this first-hand account of an unfortunate fellow who fell under the delusion that it would be a good idea to attend a campaign rally for GOP presidential candidate and noted racist shitbag Donald Trump while tripping balls–it’s a very good acid trip story.

    • Donald Trump’s Sworn Testimony About His University: “I Don’t Know the People”

      Trump University, a now-defunct sales ploy that promised to teach Donald Trump’s real estate “secrets” to enrollees and make them rich in the process, has become a flashpoint in the Republican presidential primary debates. In last night’s debate in Detroit, for instance, Sen. Marco Rubio lit into Donald Trump over the “handpicked” instructors. Trump retorted with a fabrication, claiming that the Better Business Bureau had given Trump University an A rating. As Rubio pointed out in the exchange, the most recent rating was a D minus.

  • Censorship

  • Privacy

    • Verizon racks up $1.35M fine for violating consumer privacy

      On Monday, the Federal Communications Commission said it had reached a deal with Verizon over the company’s use of a technology that allowed marketers to track customers’ web browsing so they could provide more targeted advertising. The so-called supercookies were hidden bits of code that couldn’t be easily erased when consumers cleared their browsing history.

    • Victory: Verizon Will Stop Tagging Customers for Tracking Without Consent

      Today, Verizon reached an agreement with the FCC to acquire affirmative consent before injecting their UIDH tracking header into their customers’ web activity on non-Verizon owned sites. This is exactly what we asked them to do in November 2014, and is a huge win for Internet privacy. ISPs are trusted carriers of our communications. They should be supporting individuals’ privacy rights, not undermining them.

      Verizon started their tracking header program in 2012, but did not describe the program in its privacy policy at that time. In 2014, EFF analyzed the header and warned that it acted as an undeletable supercookie, bypassing typical steps people take to protect their Internet privacy, like deleting cookies or using browser extensions that block unwanted tracking.

    • Punished for a Paradox: Brazil’s Random Detention of Facebook Executive Fails Justice

      Yesterday, Diego Dzodan, Facebook’s Vice President for Latin America, was arrested at his Sao Paolo home by federal police, escorted to a forensic institute and then held at Pinheiros Provisional Detention Center in the city. His arrest was ordered by Judge Marcel Montalvão, who was been demanding personal data from WhatsApp as part of a drug-related investigation in Brazil’s northeastern state of Sergipe. The arrest comes after the judge had begun serving WhatsApp, which is owned by Facebook, a series of fines for withholding information from the court.

      Davi Tangerino, WhatsApp’s lawyer, told reporters what he told the court: WhatsApp can’t provide the contents of the communications, because the company has no record of those communications. That may be for technological reasons—many WhatsApp communications are end-to-end encrypted. It may also be result of the companies own logging policies: WhatsApp says it makes no permanent record of the data that the court requires. In either case, the court is punishing a single employee for the court’s own impossible demands.

    • Broadband Industry ‘Studies’ Claim Users Don’t Need Privacy Protections Because ISPs Are Just Harmless, Innovative Sweethearts

      With few protections in play, most of the last decade broadband ISPs have collected any and every shred of data about their customers’ online behavior. It began with clickstream data, which ISPs sold to third parties, then either refused to comment on or outright lied about. Since then, more intelligent network hardware has let ISPs use deep packet inspection to track and monetize user online behavior down to the second. In wireless, carriers like AT&T and Verizon not only collect and sell user online behavior and location data, but now embed stealth packet headers to track and profile users across the entire Internet.

      It was that last decision that raised eyebrows at the FCC, prompting the agency recently to consider whether it should use its new Title II authority to build at least some basic rules of the road regarding broadband user privacy. This has, of course made the broadband industry rather nervous. After all, the telecom industry has grown very comfortable with the fact that nobody has bothered to give half a damn about broadband privacy for the better part of a generation.

    • Amid an Inconclusive Answer on Encryption, Hillary Reveals She Doesn’t Understand How Metadata Works

      Right in the middle, however, Hillary reveals not understanding a key part of this controversy. To the extent Syed Rizwan Farook used the Apple software on his work phone to communicate with accomplices, we know who he communicated with, because we have that metadata (as Admiral Mike Rogers recently confirmed). We just don’t know what he said.

      We wouldn’t necessarily know who he talked to if he used an App for which metadata was more transient, like Signal. But if so, that’s not an Apple problem.

      Moreover, if ISIS recruits are — as Hillary said — smart, then they definitely wouldn’t (and in fact generally don’t) use Apple products, because they’d know that would make their communications easily accessible under the PRISM or USA Freedom programs.

      This response is not really any different from what we’re getting from other to Obama officials. But it does come with some indication of the misunderstandings about the problem before us.

    • EFF Opposes McCaul-Warner Encryption Commission

      Senator Mark Warner and Representative Mike McCaul are calling on Congress to create an “Encryption Commission” composed of business, tech, and law enforcement and intelligence agency leaders that will investigate and report on encryption issues. The commission is set to ask questions already answered in the 1990s like whether or not the government should mandate backdoors or otherwise change current law. The answer is no. At the end of the day, the commission shows Congress still hasn’t learned that math is not something you can convince to compromise.

      The Warner-McCaul Commission tasks Senate and House leaders with appointing 16 representatives from private industry, law enforcement, academia, the privacy and civil liberties community, and the intelligence community to publish two reports within a year. Each report will investigate (among other topics) how encryption is used, if current law or warrant procedures should change, the value of encryption, the effects of encryption on law enforcement, and the costs of weakening encryption standards.

    • Of Cockpits And Phone Encryption: Tradeoffs And Probabilities

      Blake Ross (boy genius Firefox founder and later Facebook product guy) has written a somewhat bizarre and meandering — but totally worth reading — article about the whole Apple v. FBI fight, entitled (believe it or not): Mr. Fart’s Favorite Colors. There are a few very good points in there, about the nature of programming, security and the government (some of which even make that title make sense). But I’m going to skip over the farts and colors and even his really excellent description of the ridiculousness of TSA security theater in airports, and leap forward to a key point raised in the article, focused on airplane security, which presents a really good analogy for the iPhone encryption fight. He points out that the only thing that has truly helped stop another 9/11-style plane hijacking (as Bruce Schneier points out repeatedly) is not the TSA security theater, but reinforced, locked cockpit doors that make it impossible for people in the cabin to get into the cockpit.

    • FBI makes clandestine changes to rules governing access to NSA data

      A secret court accepted changes to the rules governing the FBI’s access to NSA data about US citizen’s international emails and phone activity. The Guardian received confirmation from US officials that the classified changes were made to Section 702 of the Foreign Intelligence Surveillance Act (Fisa).

      The Privacy and Civil Liberties Oversight Group (PCLOB) has previously revealed that the FBI was able to search through NSA’s collection of trawled data about international communication. The classified nature of the latest changes mean it is impossible to know exactly what they entail, but they are described as being a step towards “enhancing privacy”.

    • FBI adopts new rules for accessing NSA data: report

      New policies adopted by the FBI reportedly affect the bureau’s access to intelligence gathered by the National Security Agency on U.S. citizens, but officials say they’re barred from explaining since the changes are classified.

      The Guardian newspaper reported on Tuesday that the FBI has “quietly revised” its privacy rules with respect to how it searches NSA databases for phone records, email information and other metadata concerning Americans.

      Specifically, the changes are said to involve the way the FBI uses Section 702 of the Foreign Intelligence Surveillance Act (FISA), the federal law that allows the U.S. intelligence community to collect information regarding non-U.S. persons.

    • FBI quietly changes its privacy rules for accessing NSA data on Americans

      The FBI has quietly revised its privacy rules for searching data involving Americans’ international communications that was collected by the National Security Agency, US officials have confirmed to the Guardian.

      The classified revisions were accepted by the secret US court that governs surveillance, during its annual recertification of the agencies’ broad surveillance powers. The new rules affect a set of powers colloquially known as Section 702, the portion of the law that authorizes the NSA’s sweeping “Prism” program to collect internet data. Section 702 falls under the Foreign Intelligence Surveillance Act (Fisa), and is a provision set to expire later this year.

      A government civil liberties watchdog, the Privacy and Civil Liberties Oversight Group (PCLOB), alluded to the change in its recent overview of ongoing surveillance practices.

    • Sweden re-evaluates eID needs and requirements

      The Swedish government is re-evaluating its approach to electronic identification tools. A report will be submitted at the end of the month, summarising the changing needs and requirements of public administrations, compared to the available private sector solutions.

      For their eGovernment services, Swedish public administrations commonly rent private sector eID solutions under a country-wide framework agreement signed in 2008. This contract will end this summer, which is why Sweden is studying the alternatives.

    • DOJ To NY Court: Hey, Can We Have Another Judge Look Over That Ruling About Breaking Into iPhones?

      This is hardly a big surprise, but the Justice Department is not at all happy about NY magistrate judge James Orenstein’s decision last week in the case against accused drug trafficker Jun Feng, that it cannot force Apple to break the security on an iPhone using the All Writs Act. While so much of the attention concerning iPhone encryption has been placed on the case in San Bernardino, the NY case made news well before the California case, and Orenstein was clearly aware that his ruling would have a much wider impact (and it was clearly written with that intent in mind). The Justice Department, of course, is now, in effect asking for a second opinion on the issue, carefully trying to position this case as something quite different than the San Bernardino case. In particular, the Justice Department is claiming that since this particular iPhone is using iOS 7, rather than 8, Apple already has a backdoor, and can easily unlock the contents of the phone.

      [...]

      As we’ve noted, that’s not actually true. The earlier orders involved earlier versions of iPhones where Apple did have easy access to opening up those phones — and the San Bernardino case was different because it used a more modern version of the operating system, where it did not have such access.

    • Amazon will restore Fire OS‘ encryption support in the spring
    • Amazon Decides to Re-Encrypt Fire OS Mobile Device Data for Privacy
    • Hacker Shows How To Hack Anyone’s Facebook Account
    • The technology at the heart of the Apple-FBI debate, explained
    • Apple Fight Could Lead To “Virtually Limitless” Surveillance Powers, Judge Warns
    • Deep Dive: Why Forcing Apple to Write and Sign Code Violates the First Amendment
    • British Spy Agency Chief Says Tech Companies Should Be Able to Provide a Way Around Encryption
    • GCHQ’s Robert Hannigan: Leave internet privacy laws to politicians, not tech companies
    • GCHQ chief urges Government action over data encryption

      The head of GCHQ has called for politicians to set out the boundaries on the use of data as he called for greater co-operation between technology companies and spy agencies over the issues of encryption.

    • Why is GCHQ boss encouraging activists and journalists to use the Tor network?
    • Britain’s GCHQ seeks co-operation from tech firms to facilitate State surveillance
    • GCHQ: Government Should Have Final Say on Encryption, Not Tech Firms
    • GCHQ boss: Tech needs ‘new relationship’ with security services
    • Head of Britain tech security agency backs encryption
    • GCHQ director says Tor is a ‘brilliant invention’
    • GCHQ: Crypto’s great, we’re your mate, don’t be like that and hate
    • GCHQ boss denies Snooper’s Charter will weaken encryption
    • GCHQ director: Tech companies ‘routinely’ help law enforcement
    • British Spy Agency Chief Says Tech Companies Should Provide a Way Around Encryption
    • The head of GCHQ wants a ‘new relationship’ with tech companies
    • GCHQ director: Tor is a ‘brilliant invention’ that highlights the perils of encryption
    • UK Spy Chief Says Tech Companies Need to Work With Government on Encryption
    • GCHQ: US and UK tech firms need to work together to solve encryption challenges
    • Privacy fight risks letting terrorists in, says head of GCHQ [Ed: British media helps the propaganda]
    • UK’s head of GCHQ seeks co-operation with tech groups
    • Welcome common sense on encryption
    • GCHQ chief urges Government action over data encryption
    • UK spy chief calls for tech sector co-operation to combat “abuse of encryption”
    • GCHQ uses MIT speech to get chummy with tech industry over crypto backdoors

      GCHQ’s director, Robert Hannigan, used a speech he gave yesterday at MIT to try to cosy up to the tech industry in order to promote what he called “a constructive dialogue.” That’s a dramatic reversal of his position less than 18 months ago, when he wrote in the Financial Times that Internet companies were “command-and-control networks of choice for terrorists and criminals,” and “in denial” about it.

      On Monday, Hannigan admitted that his comments in the FT had caused “a bigger stir than I expected, and were widely seen as an attack on the tech industry.” Now, he said, “we recognise that we need a new relationship between the tech sector, academia, civil society and Government agencies. We should be bridging the divide, sharing ideas and building a constructive dialogue in a less highly-charged atmosphere.”

      Encryption is the key area where Hannigan believes that dialogue is needed, and he devoted most of his speech to the topic. “The idea that we do not favour strong encryption is alien to anyone who has worked in my organisation,” he said, and went on to emphasise: “I am not in favour of banning encryption. Nor am I asking for mandatory backdoors.”

    • Some impressions from the TorDevMeeting and the Internet Freedom Festival (IFF) in Valencia

      Overheard at the Tor Dev meeting in Valencia, from people speaking about online identities: “You were on top of the list of the people I thought were you.”

    • Advanced Tor Browser Fingerprinting

      The ability to privately communicate through the internet is very important for dissidents living under authoritary regimes, activists and basically everyone concerned about internet privacy.

      While the TOR network itself provides a good level of privacy, making difficult or even practically impossible to discover the real I.P. address of the tor users, this is by no means enough to protect users privacy on the web. When browsing the web, your identity can be discovered using browser exploits, cookies, browser history, browser plugins, etc.

      Tor browser is a firefox browser preconfigured and modified to protect user privacy and identity while browsing the web using TOR. Browser plugins are disabled, history and cache aren’t persistent and everything is erased after closing the browser, etc.

  • Civil Rights

    • In blow to inmates’ families, court halts new prison phone rate caps

      Prison phone companies today were granted a judicial stay that halts implementation of new, lower rate caps on inmate calls. The court did not halt new limits on certain ancillary fees related to inmate calls, though, so the overall price of prison calling should go down.

      Global Tel*Link (GTL) and Securus Technologies had asked the US Court of Appeals in the District of Columbia to stay new price regulations until a lawsuit against the Federal Communications Commission is decided, arguing that they have a high likelihood of prevailing in the case. The companies argue that the FCC overstepped its authority and that the new limits fall short of what prison phone companies are contractually obligated to pay in “site commissions” to correctional facilities. Despite protest from the FCC, the court today partially granted the stay request.

    • DOM Defense Department Seeks SUB Hackers, Tech Companies For Partnership Built On Distrust

      Despite these limitations, Defense Secretary Ash Carter thinks the program will be a success. He believes the DoD and whatever hackers actually make it past the vetting process will “enhance national security” by playing controlled cyberwar games in a controlled environment.

    • International Women’s Day

      On a lighter note, it is also rather charming that International Women’s Day, designed by Communists as a rather heavy handed propaganda vehicle, morphed through the actions and desires of ordinary human beings into a celebration of romance. Throughout the Eastern Bloc, International Women’s Day became indistinguishable from the Western practices of Valentine’s Day, only with the gifts and flowers and dining taken to even higher levels of corniness. Restaurants throughout the UK will be busy today as couples involving at least one partner from our brilliant new large Eastern European population go out to celebrate. Including us.

    • Read Bernie Sanders’ 1961 Testimony on His University’s Racist Housing Policy

      On the campaign trail, Sen. Bernie Sanders often mentions his work as a civil rights activist in the early 1960s, when he was a campus organizer for the Congress of Racial Equality (CORE). As a leader of the University of Chicago chapter, he led sit-ins to protest racial discrimination at university-owned properties and picketed a Howard Johnson’s restaurant.

      Now we know a little bit more. L.E.J. Rachell, a researcher with the CORE Project, which is dedicated to collecting and preserving the records of CORE, recently uploaded four documents offering more details about Sanders’ involvement with the group. During this period in 1961, UChicago’s CORE chapter was sending white and black volunteers to university-owned housing facilities in the neighborhood to determine if the school was honoring its anti-discrimination policy.

      The most interesting of the CORE Project documents is a testimonial written by Sanders himself. In it, he details a “test” he conducted of a hotel just off campus. He visited to see if it would rent a room to his older brother, Larry, and the clerk assured him that they would. When UChicago CORE finished its testing, the results were clear—rooms that were available to white students were not available to black students. The next year they launched a series of sit-ins to force the university’s hand.

    • What Do Children’s Doctors and Nuns Have in Common? They Both Support Women’s Access to Contraception.

      The premiere pediatric association, the American Academy of Pediatrics, and the National Coalition of American Nuns are among a diverse group of organizations and individuals who recently filed friend-of-the-court briefs in the latest Supreme Court challenge to the Affordable Care Act’s contraception requirement. Nearly 30 briefs were filed in support of the federal government’s argument that women are legally entitled to insurance coverage for contraception coverage with no co-pay, regardless of their employer’s religious beliefs.

    • Harvard Law School Wants to Remove Slaveholder’s Crest From Logo

      After months of student protests, Harvard Law School could soon stop using its official symbol, a shield based on the crest of an 18th-century slaveholder whose donation paid for the first professorship of law at the university.

      In a letter to the university’s president and fellows released on Friday, the dean of the law school, Martha L. Minow, argued that the time had come to dissociate the school from the legacy of Isaac Royall, who left Harvard part of a fortune acquired through the labor of slaves at his father’s sugar plantation in Antigua.

      Every year, the dean wrote, she welcomes new students with a discussion of the benefactor’s portrait in which she notes “that while Harvard University at that time acted legally in accepting the gift, it is crucial that we never confine ourselves to solely what is currently lawful, for the great evil of slavery happened within the confines of the law.”

  • Internet/Net Neutrality

    • ICANN Meeting In Marrakesh: More Hiccups On Way To IANA Transition

      The 55th meeting of the Internet Corporation for Assigned Names and Numbers (ICANN) in Marrakesh this week is expected to finalise the last proposal necessary for the transition of the Internet Assigned Numbers Authority (IANA), a set of core functions necessary for the running of the internet.

      [...]

      Sharply criticising the transition proposal, Ismailov said it appeared that ICANN would remain a US corporation and the functions of the NTIA would just be resolved within the ICANN procedures, and be totally laid on US ground. “We hope that will be a temporary situation,” he said, adding concerns about “internal contradictions” in the US, pointing to recent letters from Republican Presidential candidate Sen. Ted Cruz.

  • DRM

  • Intellectual Monopolies

    • UN Global Dialogue On Innovation And Access To Medicines This Week

      The United Nations Secretary General’s High-Level Panel on Access to Medicines is holding a global dialogue this month, attended by governments, civil society, industry and academia, to discuss potential solutions to promote innovation and at the same time increase access to medicines. The first public dialogue session is this week, on 10 March in London.

      The High-Level Panel was established in November. In December, the panel issued a call for contributions to address the issue of alignment of the rights of inventors, and international human rights laws, trade rules and public health (IPW, Public Health, 1 February 2016).

    • Copyrights

      • Perfect 10 and the RIAA Still Trying to Rewrite Copyright to Give Hollywood A Veto Right Over Innovation: EFF Files Brief In Support of Giganews and Sound Copyright Policy

        Some people just never learn. For decades, porn purveyor Perfect 10 has been fighting a losing battle to deputize service providers to police potentially infringing uses of its works. Indeed, at this point Perfect 10 spends far more time on litigation than creation. But court after court has rejected those efforts. In fact, Perfect 10′s main achievement in the courts has been to inadvertently make good copyright law. For example, its litigation led to key decisions ruling that an image search engine was fair use and confirming that rightsholders must follow DMCA Section 512′s clear rules for takedown notices.

      • Author Sues Google For Copyright Infringement For Copying His ‘Philosophy’ In A TV Ad

        Yeah, by now, we get it. The legacy copyright folks have spent decades beating into the minds of the public that every idea and concept and philosophy is “owned” and that you need to get permission for just about everything that it’s no surprise to see crazy, nutty copyright lawsuits pop up every here and there. At least, usually, the really nutty ones are filed pro se (i.e., without a lawyer) and quickly dumped. However, it’s doubly amazing when you get a lawsuit that feels like a pro se lawsuit, but is actually filed by a real lawyer. In this case, the lawyer is Joel D. Peterson, whose website lists “intellectual property” as one of his specialties. If that’s the case, he may want to demand a refund from his law school.

      • Dutch Govt Denies Blame For Movie Piracy Losses

        The Dutch Government has no intention of compensating local film companies for the piracy losses they have allegedly suffered. A coalition of filmmakers is demanding 1.2 billion euros in piracy damages claiming that the Government failed to deter illegal downloading, but the Dutch Minister of Justice denies any liability.

      • “Disgusted” Member of Parliament Intervenes in Internet Piracy Case

        A Member of Parliament has intervened after an 83-year-old grandmother was accused of illegally downloading the Robert Redford movie The Company You Keep and hit with a demand for £600. Ian Austin MP has called on the UK Business Secretary to safeguard consumers from copyright trolls and will also raise the matter in Parliament.

      • Google Asked to Remove 100,000 ‘Pirate Links’ Every Hour

        Copyright holders are continuing to increase the number of pirate links they want Google to remove from its search results, which have now reached a record-breaking 100,000 reported URLs per hour. This remarkable milestone is more than double the number of pirated links that were reported around the same time last year.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Patent Trolls of Microsoft and Ericsson Are Trying to Tax Everything, Especially Linux Devices

    An update on Intellectual Ventures and Unwired Planet, whose operations pose a growing problem for Free software and Linux-based products (e.g. Android)



  2. Asia's Patent Litigation Chaos Getting Worse, Reaching Countries in the West, and Sites Like IAM Actively Promote This

    The race to the bottom (of patent quality) in China, the growth of patent trolls in the region, and the ruinous litigation strategy which now spills over even to the US -- through the Eastern District of Texas -- and may inevitably come to Europe (especially if the UPC ever becomes a reality)



  3. More French Politicians Are Complaining That Benoît Battistelli is a Disgrace to France and Urge for Action

    The backlash against Battistelli spills well outside the EPO and is now apparent even at the French National Assembly



  4. Links 3/12/2016: Mageia 5.1 Released, Mozilla Revenue at $421.3M

    Links for the day



  5. Canadian Intellectual Property Office (CIPO) Sees Decline in Patent Applications and It May Actually be a Good Thing

    Challenging the false belief that the more patents society has the better off it will be, citing examples and news from north America



  6. Blockchain Domain Infested With Software Patents, MasterCard Among the Culprits

    Worrying signs that an area of Free/Open Source software innovation is getting impacted by the plague of software patents



  7. Dutch Media Covers Latest EPO Scandals, German Media Totally Absent (a Media Blackout of Convenience)

    Our observations regarding the apparent media disinterest in EPO scandals, especially at the very core of the EPO (principal host country)



  8. Relocating the Boards of Appeal to Haar is a Poisonous Priority at Battistelli's EPO

    Revisiting Battistelli's effort to chop off the appeal boards that are necessary for ensuring patent quality at the EPO



  9. Links 2/12/2016: Mint Betas, Chrome 55, KDevelop 5.0.3, PHP 7.1.0

    Links for the day



  10. The Rule of Law and Justice Don't Exist Inside the EPO, Confirms the International Labour Organisation (ILO)

    Further analysis of the latest rulings from the ILO -- decisions that were long expected



  11. A Day in the Life of... Battistelli's Banana Republic

    This is part 5 of a fictional diary from the EPO



  12. Links 1/12/2016: Devuan Beta, R3 Liberates Code

    Links for the day



  13. Two ILO Decisions on EPO Cases Are Released, at Least One Judgment is Considered Good for Staff

    Years later (as justice is too slow, partly because of the EPO, being the principal culprit that clogs up the ILO's tribunal system) there is a couple of new judgments about EPO abuses against staff



  14. Dutch and French Politicians Complain About the European Patent Office, British Media Coverage Regular Now

    Pressure from the political systems, the scientific community and from the media is growing, as it becomes abundantly apparent that the EPO cannot go on like this



  15. Links 30/11/2016: Git 2.11, GOG Surprise Tomorrow

    Links for the day



  16. The UPC Scam Part IV: Bumps Along the Road for UPC, With or Without the UK and Brexit

    A sobering reality check regarding the UPC, no matter what Lucy Neville-Rolfe says under pressure from Battistelli and some selfish law firms that are based in London



  17. The UPC Scam Part III: The “Patent Mafia”

    Bigwigs like Lucy Neville-Rolfe and Benoît Battistelli, together with Team UPC and its tiny minority interests (self enrichment), are conspiring to hijack the laws of Europe, doing so across many national borders with unique and locally-steered patent policy in one fell swoop



  18. The UPC Scam Part II: The Patent Echo Chamber at Work, Prematurely Congratulating Itself in Its 'News' Sites





  19. The UPC Scam Part I: EPO-Bribed Media Outlets Lie to Brits (and to Europeans) About the UPC

    An introductory article in a multi-part series about UPC at times of Brexit and Lucy Neville-Rolfe's bizarre sellout to Battistelli



  20. European Public Service Union Asks EPO Administrative Council “to Re-establish the Rule of Law at the European Patent Office”

    The chinchillas of the Administrative Council are assertively asked to tackle the abusive management of the EPO, which gets condemned not only by CERN but also EPSU, which is working with the Dutch government to end lawlessness at the EPO



  21. Links 29/11/2016: Core Apps Hackfest, MuckRock Goes FOSS

    Links for the day



  22. ILOAT Decisions: Upcoming Publication of Two EPO Cases (Abuse Against Staff)

    Reminder about tomorrow's "exceptional public delivery" from the International Labour Organisation (ILO) and a request for additional information



  23. Mixing Politics and EPO: How Battistelli Defies the Very Basic Rules of the Office

    A reminder of the fact that Battistelli was entrenched in French politics even while he was serving at the EPO



  24. EPO DG1 Principal Director “Out of the Muppet Show”

    The ridicule of EPO management is a symptom of a poisonous work environment which now resembles an assembly line of bad patents, where employees are treated unfairly, severely, and in clear defiance of labour laws



  25. Learning From the Mistakes of the US Patent System (and More Latterly China) When Assessing Patent Maximalism

    The warning signs coming both from the East and from the West, demonstrating the pitfalls of a policy too permissive on patents and thus on litigation



  26. The International Labour Organisation Once Again Proves Useless for Labour of the EPO

    The International Labour Organisation (ILO) is once again failing too serve justice, instead just sending complaints elsewhere, in effect into a black hole



  27. CERN Slams the European Patent Office for Abuse of Employees

    The European Organisation for Nuclear Research known as CERN is openly condemning EPO management and the Administrative Council for violation of human/labour rights, not to mention the other abuses that are rampant under Battistelli's notorious regime



  28. Links 28/11/2016: X-Plane 11 Beta, Early Work For C++20, Microsoft Hole in RHEL

    Links for the day



  29. Patents Roundup: Patent Trolls, Patent Quality, and the Patent Trial and Appeal Board (“PTAB”)

    A week's roundup of patent news from the United States, where there's a mixture of good news, bad news, good reporting, and misleading (or selective) reporting



  30. Patent Attorney Mark Summerfield: EPO Administrative Council “Members Should be Ashamed.”

    A recent comment about Battistelli's misbehaviour and the Administrative Council's utter failure to get a grip on him


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts